input stringlengths 30 54 | output stringlengths 69 4.21k |
|---|---|
Describe the vulnerability CVE-2019-0609 | CVE-2019-0609, State: PUBLISHED, Published: 2019-04-08T22:31:49, Updated: 2024-08-04T17:51:26.816Z, Description: A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique fro... |
Techniques related with vulnerability CVE-2013-1289 | CVE-2013-1289 in Microsoft SharePoint Server 2010 SP1, Groove Server 2010 SP1, SharePoint Foundation 2010 SP1, and Office Web Apps 2010 SP1. Is related with T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2018-8575 | CVE-2018-8575, State: PUBLISHED, Published: 2018-11-14T01:00:00, Updated: 2024-08-05T07:02:25.601Z, Description: A remote code execution vulnerability exists in Microsoft Project software when it fails to properly handle objects in memory, aka "Microsoft Project Remote Code Execution Vulnerability." This affects Micros... |
Techniques related with vulnerability CVE-2020-3440 | CVE-2020-3440 in Cisco Webex Meetings. Has primary impact with T1565.001 : Stored Data Manipulation. Has an exploitation technique T1566 : Phishing. Has an exploitation technique T1204.002 : Malicious File. |
Techniques related with vulnerability CVE-2013-0625 | CVE-2013-0625 in Adobe ColdFusion 9.0, 9.0.1, and 9.0.2. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2019-15289 | CVE-2019-15289 in Cisco TelePresence TC Software. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2019-1724 | CVE-2019-1724 in Cisco Small Business RV Series Router Firmware. Has primary impact with T1563 : Remote Service Session Hijacking. |
Describe the vulnerability CVE-2020-5254 | CVE-2020-5254, State: PUBLISHED, Published: 2020-03-10T16:45:14, Updated: 2024-08-04T08:22:09.084Z, Description: In NetHack before 3.6.6, some out-of-bound values for the hilite_status option can be exploited. NetHack 3.6.6 resolves this issue., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: LOCAL, Availability Im... |
Describe the vulnerability CVE-2018-8489 | CVE-2018-8489, State: PUBLISHED, Published: 2018-10-10T13:00:00, Updated: 2024-08-05T06:54:36.918Z, Description: A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system, aka "Windows Hyper-V Remote Code Ex... |
Techniques related with vulnerability CVE-2019-10987 | CVE-2019-10987 in WebAccess/SCADA. Has primary impact with T1575 : Native Code. |
Describe the vulnerability CVE-2020-5339 | CVE-2020-5339, State: PUBLISHED, Published: 2020-03-25T21:05:14.708471Z, Updated: 2024-09-17T00:06:00.697Z, Description: RSA Authentication Manager versions prior to 8.4 P10 contain a stored cross-site scripting vulnerability in the Security Console. A malicious RSA Authentication Manager Security Console administrator... |
Techniques related with vulnerability CVE-2018-8489 | CVE-2018-8489 in Windows 7. Has primary impact with T1497 : Virtualization/Sandbox Evasion. |
Describe the vulnerability CVE-2017-1274 | CVE-2017-1274, State: PUBLISHED, Published: 2017-04-25T18:00:00, Updated: 2024-08-05T13:25:17.480Z, Description: IBM Domino 8.5.3, and 9.0 is vulnerable to a stack based overflow in the IMAP service that could allow an authenticated attacker to execute arbitrary code by specifying a large mailbox name. IBM X-Force ID: ... |
Techniques related with vulnerability CVE-2015-4051 | CVE-2015-4051 in Beckhoff IPC Diagnostics before 1.8. Is related with T1136 : Create Account. Is related with T1499.004 : Application or System Exploitation. |
Describe the vulnerability CVE-2020-5279 | CVE-2020-5279, State: PUBLISHED, Published: 2020-04-20T16:50:18, Updated: 2024-08-04T08:22:09.090Z, Description: In PrestaShop between versions 1.5.0.0 and 1.7.6.5, there are improper access control since the the version 1.5.0.0 for legacy controllers. - admin-dev/index.php/configure/shop/customer-preferences/ - admin-... |
Techniques related with vulnerability CVE-2018-8414 | CVE-2018-8414 in Windows 10 Servers. Is related with T1210 : Exploitation of Remote Services. Is related with T1190 : Exploit Public-Facing Application. Is related with T1499.004 : Application or System Exploitation. |
Techniques related with vulnerability CVE-2019-15107 | CVE-2019-15107 in Webmin <=1.920. Is related with T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2020-9818 | CVE-2020-9818, State: PUBLISHED, Published: 2020-06-09T16:12:39, Updated: 2024-08-04T10:43:05.159Z, Description: An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 13.5 and iPadOS 13.5, iOS 12.4.7, watchOS 6.2.5. Processing a maliciously crafted mail message may lead to... |
Techniques related with vulnerability CVE-2020-3510 | CVE-2020-3510 in Cisco IOS XE Software. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2020-12008 | CVE-2020-12008 in Baxter ExactaMix EM 2400 & EM 1200. Has primary impact with T1552 : Unsecured Credentials. Has secondary impact with T0859 : Valid Accounts. Has an exploitation technique T0842 : Network Sniffing. |
Techniques related with vulnerability CVE-2020-3312 | CVE-2020-3312 in Cisco Firepower Threat Defense Software. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2017-10271 | CVE-2017-10271, State: PUBLISHED, Published: 2017-10-19T17:00:00, Updated: 2024-10-04T14:21:11.183Z, Description: Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Ea... |
Describe MITRE technique T1548.002 | MITRE T1548.002 : Bypass User Account Control from enterprise Adversaries may bypass UAC mechanisms to elevate process privileges on system. Windows User Account Control (UAC) allows a program to elevate its privileges (tracked as integrity levels ranging from low to high) to perform a task under administrator-level pe... |
Describe the vulnerability CVE-2020-3120 | CVE-2020-3120, State: PUBLISHED, Published: 2020-02-05T17:50:18.427416Z, Updated: 2024-11-15T17:42:14.893Z, Description: A vulnerability in the Cisco Discovery Protocol implementation for Cisco FXOS Software, Cisco IOS XR Software, and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a re... |
Describe the vulnerability CVE-2018-11072 | CVE-2018-11072, State: PUBLISHED, Published: 2018-10-02T13:00:00Z, Updated: 2024-09-16T19:57:00.694Z, Description: Dell Digital Delivery versions prior to 3.5.1 contain a DLL Injection Vulnerability. A local authenticated malicious user with advance knowledge of the application workflow could potentially load and execu... |
Describe the vulnerability CVE-2020-12888 | CVE-2020-12888, State: PUBLISHED, Published: 2020-05-15T17:02:20, Updated: 2024-08-04T12:11:18.700Z, Description: The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2010-2884 | CVE-2010-2884 in Adobe Flash Player 10.1.82.76 and earlier. Is related with T1068 : Exploitation for Privilege Escalation. |
Techniques related with vulnerability CVE-2019-1876 | CVE-2019-1876 in Cisco Wide Area Application Services (WAAS). Has primary impact with T1190 : Exploit Public-Facing Application. Has secondary impact with T1068 : Exploitation for Privilege Escalation. |
Describe the vulnerability CVE-2020-6418 | CVE-2020-6418, State: PUBLISHED, Published: 2020-02-27T22:55:25, Updated: 2024-08-04T09:02:40.477Z, Description: Type confusion in V8 in Google Chrome prior to 80.0.3987.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page., No CVSS metrics available, Exploit Info: No exploit inf... |
Describe MITRE technique T1046 | MITRE T1046 : Network Service Discovery from enterprise Adversaries may attempt to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote software exploitation. Common methods to acquire this information include port and/or vulnerabil... |
Describe MITRE technique T1005 | MITRE T1005 : Data from Local System from enterprise Adversaries may search local system sources, such as file systems and configuration files or local databases, to find files of interest and sensitive data prior to Exfiltration.
Adversaries may do this using a [Command and Scripting Interpreter](T1059), such as [cmd... |
Describe the vulnerability CVE-2020-5253 | CVE-2020-5253, State: PUBLISHED, Published: 2020-03-10T16:35:14, Updated: 2024-08-04T08:22:09.098Z, Description: NetHack before version 3.6.0 allowed malicious use of escaping of characters in the configuration file (usually .nethackrc) which could be exploited. This bug is patched in NetHack 3.6.0., CVSS v3.1 - Attack... |
Techniques related with vulnerability CVE-2020-15118 | CVE-2020-15118 in wagtail. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1185 : Man in the Browser. |
Techniques related with vulnerability CVE-2015-7912 | CVE-2015-7912 in Ice Faces servlet. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059 : Command and Scripting Interpreter. |
Describe the vulnerability CVE-2020-11082 | CVE-2020-11082, State: PUBLISHED, Published: 2020-05-28T21:10:12, Updated: 2024-08-04T11:21:14.622Z, Description: In Kaminari before 1.2.1, there is a vulnerability that would allow an attacker to inject arbitrary code into pages with pagination links. This has been fixed in 1.2.1., CVSS v3.1 - Attack Complexity: HIGH,... |
Techniques related with vulnerability CVE-2014-0050 | CVE-2014-0050 in Apache Commons FileUpload before 1.3.1. Is related with T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2019-1711 | CVE-2019-1711, State: PUBLISHED, Published: 2019-04-17T21:55:13.630095Z, Updated: 2024-11-19T19:11:31.295Z, Description: A vulnerability in the Event Management Service daemon (emsd) of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected devi... |
Describe the vulnerability CVE-2020-0955 | CVE-2020-0955, State: PUBLISHED, Published: 2020-04-15T15:13:02, Updated: 2024-08-04T06:18:03.664Z, Description: An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory, aka 'Windows Kernel Information Disclosure in CPU Memory Access'., No CVSS metrics avai... |
Describe MITRE technique T1600 | MITRE T1600 : Weaken Encryption from enterprise Adversaries may compromise a network device’s encryption capability in order to bypass encryption that would otherwise protect data communications. (Citation: Cisco Synful Knock Evolution)
Encryption can be used to protect transmitted network traffic to maintain its conf... |
Describe MITRE technique T1204.001 | MITRE T1204.001 : Malicious Link from enterprise An adversary may rely upon a user clicking a malicious link in order to gain execution. Users may be subjected to social engineering to get them to click on a link that will lead to code execution. This user action will typically be observed as follow-on behavior from [S... |
Techniques related with vulnerability CVE-2016-4655 | CVE-2016-4655 in Apple iOS before 9.3.5. Is related with T1456 : Drive-by Compromise. |
Techniques related with vulnerability CVE-2013-0631 | CVE-2013-0631 in Adobe ColdFusion 9.0, 9.0.1, and 9.0.2. Is related with T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2019-1021 | CVE-2019-1021 in Windows. Has primary impact with T1068 : Exploitation for Privilege Escalation. |
Techniques related with vulnerability CVE-2020-11073 | CVE-2020-11073 in zsh-autoswitch-virtualenv. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1204.002 : Malicious File. |
Techniques related with vulnerability CVE-2019-3763 | CVE-2019-3763 in RSA Identity Governance and Lifecycle. Has primary impact with T1552 : Unsecured Credentials. Has secondary impact with T1078 : Valid Accounts. |
Techniques related with vulnerability CVE-2016-4656 | CVE-2016-4656 in kernel in Apple iOS before 9.3.5. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2012-4681 | CVE-2012-4681 in Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier. Is related with T1189 : Drive-by Compromise. Is related with T1059 : Command and Scripting Interpreter. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1057 : Process Discovery. Is related... |
Techniques related with vulnerability CVE-2020-8649 | CVE-2020-8649 in Linux kernel through 5.5.2. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1499.004 : Application or System Exploitation. |
Describe the vulnerability CVE-2016-9192 | CVE-2016-9192, State: PUBLISHED, Published: 2016-12-14T00:37:00, Updated: 2024-08-06T02:42:11.120Z, Description: A vulnerability in Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to install and execute an arbitrary executable file with privileges equivalent to the Micro... |
Techniques related with vulnerability CVE-2012-2539 | CVE-2012-2539 in Microsoft Word. Is related with T1189 : Drive-by Compromise. |
Techniques related with vulnerability CVE-2017-0176 | CVE-2017-0176 in Microsoft Windows Server 2003 SP1, SP2 Windows XP - SP3. Is related with T1210 : Exploitation of Remote Services. |
Techniques related with vulnerability CVE-2020-12464 | CVE-2020-12464 in Linux kernel before 5.6.8. Is related with T1091 : Replication Through Removable Media. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2018-8607 | CVE-2018-8607, State: PUBLISHED, Published: 2018-11-14T01:00:00, Updated: 2024-08-05T07:02:25.866Z, Description: A cross site scripting vulnerability exists when Microsoft Dynamics 365 (on-premises) version 8 does not properly sanitize a specially crafted web request to an affected Dynamics server, aka "Microsoft Dynam... |
Describe the vulnerability CVE-2019-1772 | CVE-2019-1772, State: PUBLISHED, Published: 2019-05-15T19:25:28.311816Z, Updated: 2024-11-20T17:21:42.272Z, Description: A vulnerability in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected sys... |
Techniques related with vulnerability CVE-2015-8562 | CVE-2015-8562 in Joomla! 1.5.x, 2.x, and 3.x before 3.4.6. Is related with T1190 : Exploit Public-Facing Application. Is related with T1528 : Steal Application Access Token. Is related with T1548 : Abuse Elevation Control Mechanism. Is related with T1552 : Unsecured Credentials. |
Describe the vulnerability CVE-2019-11869 | CVE-2019-11869, State: PUBLISHED, Published: 2019-05-09T21:24:59, Updated: 2024-08-04T23:03:32.818Z, Description: The Yuzo Related Posts plugin 5.12.94 for WordPress has XSS because it mistakenly expects that is_admin() verifies that the request comes from an admin user (it actually only verifies that the request is fo... |
Describe the vulnerability CVE-2019-3707 | CVE-2019-3707, State: PUBLISHED, Published: 2019-04-26T18:22:09.049204Z, Updated: 2024-09-16T18:09:07.804Z, Description: Dell EMC iDRAC9 versions prior to 3.30.30.30 contain an authentication bypass vulnerability. A remote attacker may potentially exploit this vulnerability to bypass authentication and gain access to t... |
Techniques related with vulnerability CVE-2020-11036 | CVE-2020-11036 in GLPI. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1185 : Man in the Browser. Has an exploitation technique T1189 : Drive-by Compromise. |
Describe MITRE technique T1210 | MITRE T1210 : Exploitation of Remote Services from enterprise Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the op... |
Techniques related with vulnerability CVE-2019-1594 | CVE-2019-1594 in Nexus 1000V Switch for VMware vSphere. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2018-15780 | CVE-2018-15780 in RSA Archer. Has primary impact with T1190 : Exploit Public-Facing Application. Has secondary impact with T1005 : Data from Local System. |
Describe the vulnerability CVE-2019-15976 | CVE-2019-15976, State: PUBLISHED, Published: 2020-01-06T07:40:13.517736Z, Updated: 2024-11-15T17:53:04.673Z, Description: Multiple vulnerabilities in the authentication mechanisms of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary a... |
Techniques related with vulnerability CVE-2019-18571 | CVE-2019-18571 in RSA Identity Governance & Lifecycle. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1185 : Man in the Browser. Has an exploitation technique T1204.002 : Malicious File. |
Techniques related with vulnerability CVE-2020-14059 | CVE-2020-14059 in Squid 5.x before 5.0.3. Is related with T1499.004 : Application or System Exploitation. |
Techniques related with vulnerability CVE-2019-15974 | CVE-2019-15974 in Cisco Managed Services Accelerator. Has primary impact with T1565.002 : Transmitted Data Manipulation. Has secondary impact with T1189 : Drive-by Compromise. |
Describe the vulnerability CVE-2015-1641 | CVE-2015-1641, State: PUBLISHED, Published: 2015-04-14T20:00:00, Updated: 2024-08-06T04:47:17.492Z, Description: Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1... |
Techniques related with vulnerability CVE-2016-0034 | CVE-2016-0034 in Microsoft Silverlight 5 before 5.1.41212.0. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. Is related with T1499.004 : Application or System Exploitation. |
Techniques related with vulnerability CVE-2019-1579 | CVE-2019-1579 in Palo Alto Networks GlobalProtect Portal/Gateway Interface. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2015-5123 | CVE-2015-5123, State: PUBLISHED, Published: 2015-07-14T10:00:00, Updated: 2024-08-06T06:32:32.897Z, Description: Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X,... |
Describe the vulnerability CVE-2011-1249 | CVE-2011-1249, State: PUBLISHED, Published: 2011-06-16T20:21:00, Updated: 2024-08-06T22:21:33.913Z, Description: The Ancillary Function Driver (AFD) in afd.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and S... |
Describe the vulnerability CVE-2019-3799 | CVE-2019-3799, State: PUBLISHED, Published: 2019-05-06T15:21:37.135488Z, Updated: 2024-09-17T00:16:21.820Z, Description: Spring Cloud Config, versions 2.1.x prior to 2.1.2, versions 2.0.x prior to 2.0.4, and versions 1.4.x prior to 1.4.6, and older unsupported versions allow applications to serve arbitrary configuratio... |
Techniques related with vulnerability CVE-2019-0576 | CVE-2019-0576 in Windows 7. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1204.002 : Malicious File. |
Describe the vulnerability CVE-2018-17892 | CVE-2018-17892, State: PUBLISHED, Published: 2018-10-12T14:00:00Z, Updated: 2024-09-16T17:23:58.295Z, Description: NUUO CMS all versions 3.1 and prior, The application implements a method of user account control that causes standard account security features to not be utilized as intended, which could allow user accoun... |
Techniques related with vulnerability CVE-2019-1817 | CVE-2019-1817 in Cisco Web Security Appliance (WSA). Has primary impact with T1529 : System Shutdown/Reboot. Has an exploitation technique T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2015-2426 | CVE-2015-2426 in Windows Adobe Type Manager Library. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. Is related with T1499.004 : Application or System Exploitation. |
Techniques related with vulnerability CVE-2019-3754 | CVE-2019-3754 in Unity Operating Environment. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link. |
Describe the vulnerability CVE-2019-0803 | CVE-2019-0803, State: PUBLISHED, Published: 2019-04-09T20:15:28, Updated: 2024-08-04T17:58:58.494Z, Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from C... |
Techniques related with vulnerability CVE-2011-1752 | CVE-2011-1752 in Apache HTTP Server, Subversion before 1.6.17. Is related with T1499.004 : Application or System Exploitation. |
Describe the vulnerability CVE-2020-3309 | CVE-2020-3309, State: PUBLISHED, Published: 2020-05-06T16:40:18.441299Z, Updated: 2024-11-15T17:27:25.116Z, Description: A vulnerability in Cisco Firepower Device Manager (FDM) On-Box software could allow an authenticated, remote attacker to overwrite arbitrary files on the underlying operating system of an affected de... |
Techniques related with vulnerability CVE-2020-1569 | CVE-2020-1569 in Microsoft Edge (EdgeHTML-based). Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation. Has secondary impact with T1485 ... |
Describe the vulnerability CVE-2010-3081 | CVE-2010-3081, State: PUBLISHED, Published: 2010-09-24T19:00:00, Updated: 2024-08-07T02:55:46.715Z, Description: The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compat... |
Techniques related with vulnerability CVE-2019-1747 | CVE-2019-1747 in Cisco IOS and IOS XE Software. Has primary impact with T1477 : Exploit via Radio Interfaces. Has secondary impact with T1489 : Service Stop. |
Describe the vulnerability CVE-2017-8543 | CVE-2017-8543, State: PUBLISHED, Published: 2017-06-15T01:00:00, Updated: 2024-08-05T16:41:22.287Z, Description: Microsoft Windows XP SP3, Windows XP x64 XP2, Windows Server 2003 SP2, Windows Vista, Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2,... |
Describe the vulnerability CVE-2008-4996 | CVE-2008-4996, State: PUBLISHED, Published: 2008-11-07T19:00:00Z, Updated: 2024-09-16T22:09:49.164Z, Description: init in initramfs-tools 0.92f allows local users to overwrite arbitrary files via a symlink attack on the /tmp/initramfs.debug temporary file. NOTE: the vendor disputes this vulnerability, stating that "in... |
Techniques related with vulnerability CVE-2019-19735 | CVE-2019-19735 in MFScripts YetiShare 3.5.2 through 4.5.3. Is related with T1110 : Brute Force. |
Describe the vulnerability CVE-2014-7186 | CVE-2014-7186, State: PUBLISHED, Published: 2014-09-28T19:00:00, Updated: 2024-08-06T12:40:19.198Z, Description: The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecifi... |
Techniques related with vulnerability CVE-2020-3460 | CVE-2020-3460 in Cisco Data Center Network Manager. Has primary impact with T1565.002 : Transmitted Data Manipulation. Has secondary impact with T1185 : Man in the Browser. |
Describe the vulnerability CVE-2016-6415 | CVE-2016-6415, State: PUBLISHED, Published: 2016-09-19T01:00:00, Updated: 2024-11-15T18:01:55.878Z, Description: The server IKEv1 implementation in Cisco IOS 12.2 through 12.4 and 15.0 through 15.6, IOS XE through 3.18S, IOS XR 4.3.x and 5.0.x through 5.2.x, and PIX before 7.0 allows remote attackers to obtain sensitiv... |
Techniques related with vulnerability CVE-2018-15961 | CVE-2018-15961 in ColdFusion. Is related with T1190 : Exploit Public-Facing Application. Is related with T1505.003 : Web Shell. Is related with T1491 : Defacement. |
Describe the vulnerability CVE-2020-12464 | CVE-2020-12464, State: PUBLISHED, Published: 2020-04-29T17:59:51, Updated: 2024-08-04T11:56:52.059Z, Description: usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925., No CVSS metrics available, Exploit Inf... |
Techniques related with vulnerability CVE-2019-3778 | CVE-2019-3778 in Spring Security OAuth. Has secondary impact with T1036 : Masquerading. Has an exploitation technique T1566.002 : Spearphishing Link. |
Describe the vulnerability CVE-2019-2215 | CVE-2019-2215, State: PUBLISHED, Published: 2019-10-11T18:16:48, Updated: 2024-08-04T18:42:50.933Z, Description: A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either ... |
Techniques related with vulnerability CVE-2020-10751 | CVE-2020-10751 in kernel. Is related with T1068 : Exploitation for Privilege Escalation. |
Describe the vulnerability CVE-2019-1715 | CVE-2019-1715, State: PUBLISHED, Published: 2019-05-03T16:20:30.170634Z, Updated: 2024-11-19T19:08:18.850Z, Description: A vulnerability in the Deterministic Random Bit Generator (DRBG), also known as Pseudorandom Number Generator (PRNG), used in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Thre... |
Describe the vulnerability CVE-2010-5290 | CVE-2010-5290, State: PUBLISHED, Published: 2013-09-20T16:00:00, Updated: 2024-08-07T04:17:10.205Z, Description: The authentication process in Adobe ColdFusion before 10 does not require knowledge of the cleartext password if the password hash is known, which makes it easier for context-dependent attackers to obtain ad... |
Techniques related with vulnerability CVE-2019-18935 | CVE-2019-18935 in ASP.NET AJAX through 2019.3.1023. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2013-0641 | CVE-2013-0641, State: PUBLISHED, Published: 2013-02-14T01:00:00, Updated: 2024-08-06T14:33:05.628Z, Description: Buffer overflow in Adobe Reader and Acrobat 9.x before 9.5.4, 10.x before 10.1.6, and 11.x before 11.0.02 allows remote attackers to execute arbitrary code via a crafted PDF document, as exploited in the wil... |
Describe the vulnerability CVE-2019-18872 | CVE-2019-18872, State: PUBLISHED, Published: 2020-05-07T13:04:24, Updated: 2024-08-05T02:02:39.496Z, Description: Weak password requirements in Blaauw Remote Kiln Control through v3.00r4 allow a user to set short or guessable passwords (e.g., 1 or 1234)., No CVSS metrics available, Exploit Info: No exploit information ... |
Techniques related with vulnerability CVE-2017-11774 | CVE-2017-11774 in Microsoft Outlook. Is related with T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2020-0938 | CVE-2020-0938 in Windows. Is related with T1203 : Exploitation for Client Execution. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.