input stringlengths 30 54 | output stringlengths 69 4.21k |
|---|---|
Describe the vulnerability CVE-2009-1671 | CVE-2009-1671, State: PUBLISHED, Published: 2009-05-18T18:00:00, Updated: 2024-08-07T05:20:35.056Z, Description: Multiple buffer overflows in the Deployment Toolkit ActiveX control in deploytk.dll 6.0.130.3 in Sun Java SE Runtime Environment (aka JRE) 6 Update 13 allow remote attackers to execute arbitrary code via a l... |
Techniques related with vulnerability CVE-2009-3041 | CVE-2009-3041 in SPIP 1.9 before 1.9.2i and 2.0.x through 2.0.8. Is related with T1190 : Exploit Public-Facing Application. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2017-5613 | CVE-2017-5613, State: PUBLISHED, Published: 2017-03-03T15:00:00, Updated: 2024-08-05T15:04:15.489Z, Description: Format string vulnerability in cgiemail and cgiecho allows remote attackers to execute arbitrary code via format string specifiers in a template file., No CVSS metrics available, Exploit Info: No exploit inf... |
Techniques related with vulnerability CVE-2013-4335 | CVE-2013-4335 in opOpenSocialPlugin. Is related with T1190 : Exploit Public-Facing Application. Is related with T1005 : Data from Local System. Is related with T1565 : Data Manipulation. Is related with T1499.004 : Application or System Exploitation. |
Describe MITRE technique T0816 | MITRE T0816 : Device Restart/Shutdown from ics Adversaries may forcibly restart or shutdown a device in an ICS environment to disrupt and potentially negatively impact physical processes. Methods of device restart and shutdown exist in some devices as built-in, standard functionalities. These functionalities can be e... |
Techniques related with vulnerability CVE-2014-1815 | CVE-2014-1815 in Internet Explorer 6 through 11. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise. |
Describe MITRE technique T1005 | MITRE T1005 : Data from Local System from enterprise Adversaries may search local system sources, such as file systems and configuration files or local databases, to find files of interest and sensitive data prior to Exfiltration.
Adversaries may do this using a [Command and Scripting Interpreter](T1059), such as [cmd... |
Describe the vulnerability CVE-2020-5345 | CVE-2020-5345, State: PUBLISHED, Published: 2020-06-23T20:00:17.264990Z, Updated: 2024-09-17T01:51:14.465Z, Description: Dell EMC Unisphere for PowerMax versions prior to 9.1.0.17, Dell EMC Unisphere for PowerMax Virtual Appliance versions prior to 9.1.0.17, and PowerMax OS Release 5978 contain an authorization bypass ... |
Techniques related with vulnerability CVE-2015-2425 | CVE-2015-2425 in Internet Explorer 11. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2012-0158 | CVE-2012-0158 in Common Controls in Microsoft Office. Is related with T1189 : Drive-by Compromise. Is related with T1059 : Command and Scripting Interpreter. Is related with T1546 : Event Triggered Execution. Is related with T1554 : Compromise Client Software Binary. Is related with T1491 : Defacement. Is related with ... |
Describe the vulnerability CVE-2012-2539 | CVE-2012-2539, State: PUBLISHED, Published: 2012-12-12T00:00:00, Updated: 2024-08-06T19:34:25.771Z, Description: Microsoft Word 2003 SP3, 2007 SP2 and SP3, and 2010 SP1; Word Viewer; Office Compatibility Pack SP2 and SP3; and Office Web Apps 2010 SP1 allow remote attackers to execute arbitrary code or cause a denial of... |
Describe the vulnerability CVE-2020-3403 | CVE-2020-3403, State: PUBLISHED, Published: 2020-09-24T18:02:13.753969Z, Updated: 2024-11-13T17:54:50.702Z, Description: A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker to inject a command to the underlying operating system that will execute with root privileges upon the... |
Techniques related with vulnerability CVE-2020-2883 | CVE-2020-2883 in WebLogic Server. Is related with T1203 : Exploitation for Client Execution. Is related with T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2019-2725 | CVE-2019-2725 in Tape Library ACSLS. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059 : Command and Scripting Interpreter. |
Techniques related with vulnerability CVE-2018-7496 | CVE-2018-7496 in OSIsoft PI Vision. Is related with T1190 : Exploit Public-Facing Application. Is related with T1211 : Exploitation for Defense Evasion. |
Describe MITRE technique T1078 | MITRE T1078 : Valid Accounts from enterprise Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Compromised credentials may be used to bypass access controls placed on various resources on systems within the netw... |
Techniques related with vulnerability CVE-2020-0758 | CVE-2020-0758 in Team Foundation Server 2018. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1098 : Account Manipulation. |
Describe the vulnerability CVE-2019-10149 | CVE-2019-10149, State: PUBLISHED, Published: 2019-06-05T00:00:00, Updated: 2024-08-04T22:10:09.944Z, Description: A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution., CVSS v3.0 - Attack... |
Techniques related with vulnerability CVE-2017-3066 | CVE-2017-3066 in Adobe ColdFusion ColdFusion 2016 Update 3 and earlier, ColdFusion 11 update 11 and earlier, ColdFusion 10 Update 22 and earlier. Is related with T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2009-2265 | CVE-2009-2265, State: PUBLISHED, Published: 2009-07-05T16:00:00, Updated: 2024-08-07T05:44:55.927Z, Description: Multiple directory traversal vulnerabilities in FCKeditor before 2.6.4.1 allow remote attackers to create executable files in arbitrary directories via directory traversal sequences in the input to unspecifi... |
Techniques related with vulnerability CVE-2018-1000861 | CVE-2018-1000861 in Stapler web framework used by Jenkins 2.153 and earlier. Is related with T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2020-11050 | CVE-2020-11050 in Java-WebSocket. Has primary impact with T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2019-18578 | CVE-2019-18578 in XtremIO. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1185 : Man in the Browser. Has an exploitation technique T1189 : Drive-by Compromise. |
Techniques related with vulnerability CVE-2020-5210 | CVE-2020-5210 in NetHack. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. |
Describe the vulnerability CVE-2010-1423 | CVE-2010-1423, State: PUBLISHED, Published: 2010-04-15T21:12:00, Updated: 2024-08-07T01:21:19.151Z, Description: Argument injection vulnerability in the URI handler in (a) Java NPAPI plugin and (b) Java Deployment Toolkit in Java 6 Update 10, 19, and other versions, when running on Windows and possibly on Linux, allows... |
Techniques related with vulnerability CVE-2015-7910 | CVE-2015-7910 in Exemys Telemetry Web Server. Is related with T1068 : Exploitation for Privilege Escalation. |
Describe the vulnerability CVE-2020-6964 | CVE-2020-6964, State: PUBLISHED, Published: 2020-01-24T16:32:13, Updated: 2024-08-04T09:18:02.496Z, Description: In ApexPro Telemetry Server Versions 4.2 and prior, CARESCAPE Telemetry Server v4.2 & prior, Clinical Information Center (CIC) Versions 4.X and 5.X, CARESCAPE Central Station (CSCS) Versions 1.X and CARESCAP... |
Techniques related with vulnerability CVE-2020-12655 | CVE-2020-12655 in Linux kernel through 5.6.10. Is related with T1499.004 : Application or System Exploitation. |
Techniques related with vulnerability CVE-2016-3714 | CVE-2016-3714 in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.001 : Malicious Link. |
Techniques related with vulnerability CVE-2018-17924 | CVE-2018-17924 in Rockwell Automation. Has primary impact with T0826 : Loss of Availability. Has secondary impact with T0803 : Block Command Message. Has secondary impact with T0804 : Block Reporting Message. Has an exploitation technique T0855 : Unauthorized Command Message. |
Techniques related with vulnerability CVE-2013-1493 | CVE-2013-1493 in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2014-2817 | CVE-2014-2817 in Internet Explorer 6. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2020-5217 | CVE-2020-5217, State: PUBLISHED, Published: 2020-01-23T02:15:17, Updated: 2024-08-04T08:22:08.919Z, Description: In Secure Headers (RubyGem secure_headers), a directive injection vulnerability is present in versions before 3.8.0, 5.1.0, and 6.2.0. If user-supplied input was passed into append/override_content_security_... |
Describe the vulnerability CVE-2020-0884 | CVE-2020-0884, State: PUBLISHED, Published: 2020-03-12T15:48:53, Updated: 2024-08-04T06:18:03.533Z, Description: A spoofing vulnerability exists in Microsoft Visual Studio as it includes a reply URL that is not secured by SSL, aka 'Microsoft Visual Studio Spoofing Vulnerability'., No CVSS metrics available, Exploit Inf... |
Describe the vulnerability CVE-2019-3731 | CVE-2019-3731, State: PUBLISHED, Published: 2019-09-30T21:48:40.294314Z, Updated: 2024-09-16T23:56:35.629Z, Description: RSA BSAFE Crypto-C Micro Edition versions prior to 4.1.4 and RSA Micro Edition Suite versions prior to 4.4 are vulnerable to an Information Exposure Through Timing Discrepancy. A malicious remote use... |
Describe the vulnerability CVE-2020-5250 | CVE-2020-5250, State: PUBLISHED, Published: 2020-03-05T17:00:18, Updated: 2024-08-04T08:22:09.084Z, Description: In PrestaShop before version 1.7.6.4, when a customer edits their address, they can freely change the id_address in the form, and thus steal someone else's address. It is the same with CustomerForm, you are ... |
Describe the vulnerability CVE-2020-5369 | CVE-2020-5369, State: PUBLISHED, Published: 2020-09-02T20:55:17.768175Z, Updated: 2024-09-16T19:46:53.889Z, Description: Dell EMC Isilon OneFS versions 8.2.2 and earlier and Dell EMC PowerScale OneFS version 9.0.0 contain a privilege escalation vulnerability. An authenticated malicious user may exploit this vulnerabili... |
Describe MITRE technique T0812 | MITRE T0812 : Default Credentials from ics Adversaries may leverage manufacturer or supplier set default credentials on control system devices. These default credentials may have administrative permissions and may be necessary for initial configuration of the device. It is general best practice to change the password... |
Describe the vulnerability CVE-2014-4113 | CVE-2014-4113, State: PUBLISHED, Published: 2014-10-15T10:00:00, Updated: 2024-08-06T11:04:28.739Z, Description: win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and ... |
Describe the vulnerability CVE-2008-2992 | CVE-2008-2992, State: PUBLISHED, Published: 2008-11-04T18:00:00, Updated: 2024-08-07T09:21:34.450Z, Description: Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a PDF file that calls the util.printf JavaScript function with a crafted format... |
Describe the vulnerability CVE-2013-3893 | CVE-2013-3893, State: PUBLISHED, Published: 2013-09-18T10:00:00, Updated: 2024-08-06T16:22:01.292Z, Description: Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code via crafted JavaScript strings, ... |
Techniques related with vulnerability CVE-2018-15764 | CVE-2018-15764 in ESRS Policy Manager. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2018-10376 | CVE-2018-10376, State: PUBLISHED, Published: 2018-04-25T09:00:00, Updated: 2024-08-05T07:39:07.523Z, Description: An integer overflow in the transferProxy function of a smart contract implementation for SmartMesh (aka SMT), an Ethereum ERC20 token, allows attackers to accomplish an unauthorized increase of digital asse... |
Techniques related with vulnerability CVE-2018-18987 | CVE-2018-18987 in VT-Designer Version 2.1.7.31. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1574 : Hijack Execution Flow. Has secondary impact with T1499.004 : Application or System Exploitation. |
Describe the vulnerability CVE-2019-18263 | CVE-2019-18263, State: PUBLISHED, Published: 2019-12-20T15:27:16, Updated: 2024-08-05T01:47:14.119Z, Description: An issue was found in Philips Veradius Unity, Pulsera, and Endura Dual WAN Router, Veradius Unity (718132) with wireless option (shipped between 2016-August 2018), Veradius Unity (718132) with ViewForum opt... |
Describe the vulnerability CVE-2019-1214 | CVE-2019-1214, State: PUBLISHED, Published: 2019-09-11T21:24:58, Updated: 2024-08-04T18:13:29.129Z, Description: An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory, aka 'Windows Common Log File System Driver Elevation of Privilege Vu... |
Techniques related with vulnerability CVE-2014-1812 | CVE-2014-1812 in Windows. Is related with T1003 : OS Credential Dumping. Is related with T1552.001 : Credentials In Files. |
Describe the vulnerability CVE-2010-2729 | CVE-2010-2729, State: PUBLISHED, Published: 2010-09-15T18:00:00, Updated: 2024-08-07T02:46:48.161Z, Description: The Print Spooler service in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, when printer sharing is enabled, does ... |
Describe the vulnerability CVE-2020-3177 | CVE-2020-3177, State: PUBLISHED, Published: 2020-04-15T20:10:20.904083Z, Updated: 2024-11-15T17:31:41.239Z, Description: A vulnerability in the Tool for Auto-Registered Phones Support (TAPS) of Cisco Unified Communications Manager (UCM) and Cisco Unified Communications Manager Session Management Edition (SME) could all... |
Techniques related with vulnerability CVE-2018-11067 | CVE-2018-11067 in Avamar. Has secondary impact with T1036 : Masquerading. Has an exploitation technique T1566.002 : Spearphishing Link. |
Describe the vulnerability CVE-2018-15780 | CVE-2018-15780, State: PUBLISHED, Published: 2019-01-03T21:00:00Z, Updated: 2024-09-17T03:37:26.681Z, Description: RSA Archer versions prior to 6.5.0.1 contain an improper access control vulnerability. A remote malicious user could potentially exploit this vulnerability to bypass authorization checks and gain read acce... |
Techniques related with vulnerability CVE-2019-3786 | CVE-2019-3786 in BOSH Backup and Restore. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1565.001 : Stored Data Manipulation. |
Describe the vulnerability CVE-2019-1831 | CVE-2019-1831, State: PUBLISHED, Published: 2019-04-18T01:20:26.675817Z, Updated: 2024-11-19T19:10:48.135Z, Description: A vulnerability in the email message scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured content filters o... |
Describe the vulnerability CVE-2018-5459 | CVE-2018-5459, State: PUBLISHED, Published: 2018-02-13T21:00:00, Updated: 2024-08-05T05:33:44.375Z, Description: An Improper Authentication issue was discovered in WAGO PFC200 Series 3S CoDeSys Runtime versions 2.3.X and 2.4.X. An attacker can execute different unauthenticated remote operations because of the CoDeSys R... |
Describe the vulnerability CVE-2020-3379 | CVE-2020-3379, State: PUBLISHED, Published: 2020-07-16T17:21:51.004104Z, Updated: 2024-11-15T16:53:01.086Z, Description: A vulnerability in Cisco SD-WAN Solution Software could allow an authenticated, local attacker to elevate privileges to Administrator on the underlying operating system. The vulnerability is due to i... |
Techniques related with vulnerability CVE-2020-5350 | CVE-2020-5350 in Integrated Data Protection Appliance. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1098 : Account Manipulation. |
Techniques related with vulnerability CVE-2020-5331 | CVE-2020-5331 in RSA Archer. Has primary impact with T1005 : Data from Local System. |
Describe the vulnerability CVE-2019-1013 | CVE-2019-1013, State: PUBLISHED, Published: 2019-06-12T13:49:39, Updated: 2024-08-04T18:06:31.296Z, Description: An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'. This CVE ID is unique fr... |
Describe the vulnerability CVE-2014-6324 | CVE-2014-6324, State: PUBLISHED, Published: 2014-11-18T23:00:00, Updated: 2024-08-06T12:10:13.306Z, Description: The Kerberos Key Distribution Center (KDC) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and... |
Describe the vulnerability CVE-2017-8464 | CVE-2017-8464, State: PUBLISHED, Published: 2017-06-15T01:00:00, Updated: 2024-08-05T16:34:23.052Z, Description: Windows Shell in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 20... |
Techniques related with vulnerability CVE-2019-1781 | CVE-2019-1781 in Cisco NX-OS Software. Has primary impact with T1608 : Stage Capabilities. Has secondary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1078 : Valid Accounts. |
Describe the vulnerability CVE-2020-5358 | CVE-2020-5358, State: PUBLISHED, Published: 2020-06-15T20:20:11.377037Z, Updated: 2024-09-17T01:56:50.455Z, Description: Dell Encryption versions prior to 10.7 and Dell Endpoint Security Suite versions prior to 2.7 contain a privilege escalation vulnerability due to incorrect permissions. A local malicious user with lo... |
Techniques related with vulnerability CVE-2019-10971 | CVE-2019-10971 in Network Configurator for DeviceNet Safety. Has primary impact with T1574.001 : DLL Search Order Hijacking. |
Describe the vulnerability CVE-2020-12769 | CVE-2020-12769, State: PUBLISHED, Published: 2020-05-09T20:16:45, Updated: 2024-08-04T12:04:22.954Z, Description: An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8., No CVSS m... |
Techniques related with vulnerability CVE-2019-1772 | CVE-2019-1772 in Cisco WebEx WRF Player. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1566 : Phishing. Has an exploitation technique T1204.002 : Malicious File. |
Describe the vulnerability CVE-2013-0632 | CVE-2013-0632, State: PUBLISHED, Published: 2013-01-17T00:00:00, Updated: 2024-08-06T14:33:05.651Z, Description: administrator.cfc in Adobe ColdFusion 9.0, 9.0.1, 9.0.2, and 10 allows remote attackers to bypass authentication and possibly execute arbitrary code by logging in to the RDS component using the default empty... |
Techniques related with vulnerability CVE-2019-18581 | CVE-2019-18581 in Data Protection Advisor. Has primary impact with T1562 : Impair Defenses. Has secondary impact with T1059 : Command and Scripting Interpreter. |
Techniques related with vulnerability CVE-2015-2419 | CVE-2015-2419 in JScript 9 in Microsoft Internet Explorer 10 and 11. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise. |
Describe MITRE technique T1574.001 | MITRE T1574.001 : DLL Search Order Hijacking from enterprise Adversaries may execute their own malicious payloads by hijacking the search order used to load DLLs. Windows systems use a common method to look for required DLLs to load into a program. (Citation: Microsoft Dynamic Link Library Search Order)(Citation: FireE... |
Describe the vulnerability CVE-2019-0797 | CVE-2019-0797, State: PUBLISHED, Published: 2019-04-09T02:34:55, Updated: 2024-08-04T17:58:59.172Z, Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from C... |
Techniques related with vulnerability CVE-2018-17892 | CVE-2018-17892 in NUUO CMS. Has primary impact with T1562 : Impair Defenses. |
Describe the vulnerability CVE-2018-19207 | CVE-2018-19207, State: PUBLISHED, Published: 2018-11-12T17:00:00, Updated: 2024-08-05T11:30:04.040Z, Description: The Van Ons WP GDPR Compliance (aka wp-gdpr-compliance) plugin before 1.4.3 for WordPress allows remote attackers to execute arbitrary code because $wpdb->prepare() input is mishandled, as exploited in the ... |
Techniques related with vulnerability CVE-2011-2005 | CVE-2011-2005 in Ancillary Function Driver in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2017-1274 | CVE-2017-1274 in Domino. Is related with T1068 : Exploitation for Privilege Escalation. |
Techniques related with vulnerability CVE-2015-2590 | CVE-2015-2590 in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2020-11897 | CVE-2020-11897 in Treck TCP/IP stack before 5.0.1.3. Is related with T1190 : Exploit Public-Facing Application. Is related with T1203 : Exploitation for Client Execution. Is related with T1499 : Endpoint Denial of Service. |
Describe MITRE technique T0826 | MITRE T0826 : Loss of Availability from ics Adversaries may attempt to disrupt essential components or systems to prevent owner and operator from delivering products or services. (Citation: Corero) (Citation: Michael J. Assante and Robert M. Lee) (Citation: Tyson Macaulay)
Adversaries may leverage malware to delete... |
Describe MITRE technique T1552.004 | MITRE T1552.004 : Private Keys from enterprise Adversaries may search for private key certificate files on compromised systems for insecurely stored credentials. Private cryptographic keys and certificates are used for authentication, encryption/decryption, and digital signatures.(Citation: Wikipedia Public Key Crypto)... |
Describe the vulnerability CVE-2018-19007 | CVE-2018-19007, State: PUBLISHED, Published: 2018-12-14T20:00:00, Updated: 2024-08-05T11:23:09.034Z, Description: In Geutebrueck GmbH E2 Camera Series versions prior to 1.12.0.25 the DDNS configuration (in the Network Configuration panel) is vulnerable to an OS system command injection as root., No CVSS metrics availab... |
Techniques related with vulnerability CVE-2019-15821 | CVE-2019-15821 in bold-page-builder plugin before 2.3.2 for WordPress. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1133 : External Remote Services. Is related with T1136 : Create Account. Is related with T1565 : Data Manipulation. Is related with T1149 : LC_MAIN Hijacking . |
Techniques related with vulnerability CVE-2018-0798 | CVE-2018-0798 in Equation Editor. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2020-5328 | CVE-2020-5328 in Isilon OneFS. Has secondary impact with T1068 : Exploitation for Privilege Escalation. |
Techniques related with vulnerability CVE-2019-1943 | CVE-2019-1943 in Cisco Small Business 300 Series Managed Switches. Has primary impact with T1565.002 : Transmitted Data Manipulation. Has secondary impact with T1189 : Drive-by Compromise. Has an exploitation technique T1557 : Man-in-the-Middle. |
Describe the vulnerability CVE-2020-8468 | CVE-2020-8468, State: PUBLISHED, Published: 2020-03-18T00:30:43, Updated: 2024-08-04T10:03:44.778Z, Description: Trend Micro Apex One (2019), OfficeScan XG and Worry-Free Business Security (9.0, 9.5, 10.0) agents are affected by a content validation escape vulnerability which could allow an attacker to manipulate certa... |
Describe the vulnerability CVE-2019-1132 | CVE-2019-1132, State: PUBLISHED, Published: 2019-07-29T14:13:38, Updated: 2024-08-04T18:06:31.730Z, Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'., No CVSS metrics available, ... |
Describe the vulnerability CVE-2019-1857 | CVE-2019-1857, State: PUBLISHED, Published: 2019-05-03T16:40:23.067089Z, Updated: 2024-09-17T02:27:18.712Z, Description: A vulnerability in the web-based management interface of Cisco HyperFlex HX-Series could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform ar... |
Describe the vulnerability CVE-2019-15289 | CVE-2019-15289, State: PUBLISHED, Published: 2020-09-23T00:30:13.703662Z, Updated: 2024-11-13T18:02:40.021Z, Description: Multiple vulnerabilities in the video service of Cisco TelePresence Collaboration Endpoint (CE) and Cisco RoomOS Software could allow an unauthenticated, remote attacker to cause a denial of service... |
Techniques related with vulnerability CVE-2018-15466 | CVE-2018-15466 in Cisco Policy Suite (CPS) Software. Has primary impact with T1608 : Stage Capabilities. Has secondary impact with T1005 : Data from Local System. |
Techniques related with vulnerability CVE-2018-8589 | CVE-2018-8589 in Windows Server 2008. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2017-18362 | CVE-2017-18362, State: PUBLISHED, Published: 2019-02-05T05:00:00, Updated: 2024-08-05T21:20:50.848Z, Description: ConnectWise ManagedITSync integration through 2017 for Kaseya VSA is vulnerable to unauthenticated remote commands that allow full direct access to the Kaseya VSA database. In February 2019, attackers have ... |
Techniques related with vulnerability CVE-2019-3775 | CVE-2019-3775 in UAA Release (OSS). Has primary impact with T1098 : Account Manipulation. |
Techniques related with vulnerability CVE-2020-5253 | CVE-2020-5253 in NetHack. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1478 : Install Insecure or Malicious Configuration. |
Techniques related with vulnerability CVE-2020-11087 | CVE-2020-11087 in FreeRDP. Has primary impact with T1005 : Data from Local System. Has secondary impact with T1211 : Exploitation for Defense Evasion. |
Describe the vulnerability CVE-2019-1031 | CVE-2019-1031, State: PUBLISHED, Published: 2019-06-12T13:49:40, Updated: 2024-08-04T18:06:31.538Z, Description: A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoin... |
Describe the vulnerability CVE-2014-0266 | CVE-2014-0266, State: PUBLISHED, Published: 2014-02-12T02:00:00, Updated: 2024-08-06T09:13:09.697Z, Description: The XMLHTTP ActiveX controls in XML Core Services 3.0 in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.... |
Describe MITRE technique T1489 | MITRE T1489 : Service Stop from enterprise Adversaries may stop or disable services on a system to render those services unavailable to legitimate users. Stopping critical services or processes can inhibit or stop response to an incident or aid in the adversary's overall objectives to cause damage to the environment.(C... |
Describe the vulnerability CVE-2020-5295 | CVE-2020-5295, State: PUBLISHED, Published: 2020-06-03T21:50:12, Updated: 2024-08-04T08:22:09.093Z, Description: In OctoberCMS (october/october composer package) versions from 1.0.319 and before 1.0.466, an attacker can exploit this vulnerability to read local files of an October CMS server. The vulnerability is only e... |
Describe the vulnerability CVE-2019-18571 | CVE-2019-18571, State: PUBLISHED, Published: 2019-12-18T20:50:13.968502Z, Updated: 2024-09-16T19:10:42.619Z, Description: The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain a reflected cross-site scripting vulnerability in the My Access Live module [MAL]. ... |
Techniques related with vulnerability CVE-2018-11060 | CVE-2018-11060 in RSA Archer. Has primary impact with T1068 : Exploitation for Privilege Escalation. |
Describe the vulnerability CVE-2017-0222 | CVE-2017-0222, State: PUBLISHED, Published: 2017-05-12T14:00:00, Updated: 2024-08-05T12:55:19.287Z, Description: A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0226., ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.