input stringlengths 30 54 | output stringlengths 69 4.21k |
|---|---|
Techniques related with vulnerability CVE-2019-11932 | CVE-2019-11932 in android-gif-drawable. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2018-15444 | CVE-2018-15444 in Cisco Energy Management Suite. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1005 : Data from Local System. Has an exploitation technique T1133 : External Remote Services. |
Describe the vulnerability CVE-2017-16115 | CVE-2017-16115, State: PUBLISHED, Published: 2018-06-07T02:00:00Z, Updated: 2024-09-17T01:12:20.165Z, Description: The timespan module is vulnerable to regular expression denial of service. Given 50k characters of untrusted user input it will block the event loop for around 10 seconds., No CVSS metrics available, Explo... |
Describe the vulnerability CVE-2016-5645 | CVE-2016-5645, State: PUBLISHED, Published: 2016-08-24T01:00:00, Updated: 2024-08-06T01:08:00.362Z, Description: Rockwell Automation MicroLogix 1400 PLC 1766-L32BWA, 1766-L32AWA, 1766-L32BXB, 1766-L32BWAA, 1766-L32AWAA, and 1766-L32BXBA devices have a hardcoded SNMP community, which makes it easier for remote attackers... |
Describe the vulnerability CVE-2020-4068 | CVE-2020-4068, State: PUBLISHED, Published: 2020-06-22T15:30:17, Updated: 2024-08-04T07:52:20.911Z, Description: In APNSwift 1.0.0, calling APNSwiftSigner.sign(digest:) is likely to result in a heap buffer overflow. This has been fixed in 1.0.1., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability ... |
Techniques related with vulnerability CVE-2020-6819 | CVE-2020-6819 in Thunderbird. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise. |
Describe the vulnerability CVE-2020-5328 | CVE-2020-5328, State: PUBLISHED, Published: 2020-03-06T20:25:14.219804Z, Updated: 2024-09-16T18:29:46.134Z, Description: Dell EMC Isilon OneFS versions prior to 8.2.0 contain an unauthorized access vulnerability due to a lack of thorough authorization checks when SyncIQ is licensed, but encrypted syncs are not marked a... |
Describe the vulnerability CVE-2020-7456 | CVE-2020-7456, State: PUBLISHED, Published: 2020-06-09T18:44:58, Updated: 2024-08-04T09:25:48.974Z, Description: In FreeBSD 12.1-STABLE before r361918, 12.1-RELEASE before p6, 11.4-STABLE before r361919, 11.3-RELEASE before p10, and 11.4-RC2 before p1, an invalid memory location may be used for HID items if the push/po... |
Describe the vulnerability CVE-2020-0898 | CVE-2020-0898, State: PUBLISHED, Published: 2020-03-12T15:48:57, Updated: 2024-08-04T06:18:03.484Z, Description: An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory, aka 'Windows Graphics Component Elevation of Privilege Vulnerability'. This CVE ID is ... |
Techniques related with vulnerability CVE-2020-1027 | CVE-2020-1027 in Windows. Is related with T1068 : Exploitation for Privilege Escalation. |
Techniques related with vulnerability CVE-2014-6277 | CVE-2014-6277 in GNU Bash through 4.3 bash43-026. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059.004 : Unix Shell. |
Describe the vulnerability CVE-2010-3338 | CVE-2010-3338, State: PUBLISHED, Published: 2010-12-16T19:00:00, Updated: 2024-08-07T03:03:18.911Z, Description: The Windows Task Scheduler in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly determine the security context of scheduled tasks, which allows local... |
Techniques related with vulnerability CVE-2018-20838 | CVE-2018-20838 in AMP for WP plugin before 0.9.97.21 for WordPress. Is related with T1203 : Exploitation for Client Execution. |
Describe MITRE technique T1565.001 | MITRE T1565.001 : Stored Data Manipulation from enterprise Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.(Citation: FireEye APT38 Oct 2018)(Citation: DOJ Lazarus Sony 2018) By manipulating stored data, adve... |
Techniques related with vulnerability CVE-2019-1620 | CVE-2019-1620 in Cisco Data Center Network Manager. Has primary impact with T1105 : Ingress Tool Transfer. Has secondary impact with T1059 : Command and Scripting Interpreter. |
Describe the vulnerability CVE-2016-4655 | CVE-2016-4655, State: PUBLISHED, Published: 2016-08-25T21:00:00, Updated: 2024-08-06T00:39:25.596Z, Description: The kernel in Apple iOS before 9.3.5 allows attackers to obtain sensitive information from memory via a crafted app., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2010-0480 | CVE-2010-0480 in MPEG Layer-3 audio codecs in Microsoft Windows. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2018-15397 | CVE-2018-15397, State: PUBLISHED, Published: 2018-10-05T14:00:00Z, Updated: 2024-09-17T02:16:04.264Z, Description: A vulnerability in the implementation of Traffic Flow Confidentiality (TFC) over IPsec functionality in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software co... |
Techniques related with vulnerability CVE-2020-11068 | CVE-2020-11068 in LoRaMac-node. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. |
Techniques related with vulnerability CVE-2020-6974 | CVE-2020-6974 in Honeywell Notifier Web Server (NWS). Is related with T1190 : Exploit Public-Facing Application. Is related with T1005 : Data from Local System. Is related with T1565 : Data Manipulation. |
Techniques related with vulnerability CVE-2020-5300 | CVE-2020-5300 in hydra. Is related with T1528 : Steal Application Access Token. Is related with T1068 : Exploitation for Privilege Escalation. |
Describe MITRE technique T0814 | MITRE T0814 : Denial of Service from ics Adversaries may perform Denial-of-Service (DoS) attacks to disrupt expected device functionality. Examples of DoS attacks include overwhelming the target device with a high volume of requests in a short time period and sending the target device a request it does not know how t... |
Techniques related with vulnerability CVE-2020-5345 | CVE-2020-5345 in Unisphere for PowerMax. Has primary impact with T1190 : Exploit Public-Facing Application. Has an exploitation technique T1565.001 : Stored Data Manipulation. |
Describe the vulnerability CVE-2019-13541 | CVE-2019-13541, State: PUBLISHED, Published: 2019-10-18T18:26:35, Updated: 2024-08-04T23:57:39.273Z, Description: In Horner Automation Cscape 9.90 and prior, an improper input validation vulnerability has been identified that may be exploited by processing files lacking user input validation. This may allow an attacker... |
Describe the vulnerability CVE-2019-3704 | CVE-2019-3704, State: PUBLISHED, Published: 2019-02-07T19:00:00Z, Updated: 2024-09-16T17:58:08.973Z, Description: VNX Control Station in Dell EMC VNX2 OE for File versions prior to 8.1.9.236 contains OS command injection vulnerability. Due to inadequate restriction configured in sudores, a local authenticated malicious... |
Describe the vulnerability CVE-2020-5220 | CVE-2020-5220, State: PUBLISHED, Published: 2020-01-27T20:15:17, Updated: 2024-08-04T08:22:08.763Z, Description: Sylius ResourceBundle accepts and uses any serialisation groups to be passed via a HTTP header. This might lead to data exposure by using an unintended serialisation group - for example it could make Shop AP... |
Techniques related with vulnerability CVE-2017-10810 | CVE-2017-10810 in Linux kernel through 4.11.8. Is related with T1499.004 : Application or System Exploitation. |
Techniques related with vulnerability CVE-2011-2900 | CVE-2011-2900 in Mongoose 3.0. Is related with T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2019-3788 | CVE-2019-3788, State: PUBLISHED, Published: 2019-04-25T20:17:37.233754Z, Updated: 2024-09-16T22:02:12.371Z, Description: Cloud Foundry UAA Release, versions prior to 71.0, allows clients to be configured with an insecure redirect uri. Given a UAA client was configured with a wildcard in the redirect uri's subdomain, a ... |
Techniques related with vulnerability CVE-2018-17889 | CVE-2018-17889 in PI Studio HMI. Has primary impact with T1059 : Command and Scripting Interpreter. |
Describe MITRE technique T1068 | MITRE T1068 : Exploitation for Privilege Escalation from enterprise Adversaries may exploit software vulnerabilities in an attempt to elevate privileges. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system softwar... |
Describe the vulnerability CVE-2019-3762 | CVE-2019-3762, State: PUBLISHED, Published: 2020-03-18T18:20:16.283199Z, Updated: 2024-09-16T23:15:44.160Z, Description: Data Protection Central versions 1.0, 1.0.1, 18.1, 18.2, and 19.1 contains an Improper Certificate Chain of Trust Vulnerability. A remote unauthenticated attacker could potentially exploit this vulne... |
Describe the vulnerability CVE-2019-15287 | CVE-2019-15287, State: PUBLISHED, Published: 2020-09-23T00:35:26.666806Z, Updated: 2024-11-13T18:02:31.417Z, Description: Multiple vulnerabilities in Cisco Webex Network Recording Player for Microsoft Windows and Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected s... |
Describe the vulnerability CVE-2010-2743 | CVE-2010-2743, State: PUBLISHED, Published: 2011-01-20T20:00:00, Updated: 2024-08-07T02:46:47.217Z, Description: The kernel-mode drivers in Microsoft Windows XP SP3 do not properly perform indexing of a function-pointer table during the loading of keyboard layouts from disk, which allows local users to gain privileges ... |
Techniques related with vulnerability CVE-2018-8453 | CVE-2018-8453 in Windows 7. Is related with T1608 : Stage Capabilities. |
Techniques related with vulnerability CVE-2019-7287 | CVE-2019-7287 in iOS. Is related with T1404 : Exploit OS Vulnerability. |
Describe the vulnerability CVE-2015-2509 | CVE-2015-2509, State: PUBLISHED, Published: 2015-09-09T00:00:00, Updated: 2024-08-06T05:17:27.222Z, Description: Windows Media Center in Microsoft Windows Vista SP2, Windows 7 SP1, Windows 8, and Windows 8.1 allows user-assisted remote attackers to execute arbitrary code via a crafted Media Center link (mcl) file, aka ... |
Describe the vulnerability CVE-2020-5281 | CVE-2020-5281, State: PUBLISHED, Published: 2020-03-25T18:00:20, Updated: 2024-08-04T08:22:09.083Z, Description: In Perun before version 3.9.1, VO or group manager can modify configuration of the LDAP extSource to retrieve all from Perun LDAP. Issue is fixed in version 3.9.1 by sanitisation of the input., CVSS v3.1 - A... |
Techniques related with vulnerability CVE-2019-16782 | CVE-2019-16782 in rack. Has primary impact with T1563 : Remote Service Session Hijacking. Has an exploitation technique T1110 : Brute Force. |
Describe the vulnerability CVE-2016-7256 | CVE-2016-7256, State: PUBLISHED, Published: 2016-11-10T06:16:00, Updated: 2024-08-06T01:57:47.267Z, Description: atmfd.dll in the Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, a... |
Describe the vulnerability CVE-2014-7247 | CVE-2014-7247, State: PUBLISHED, Published: 2014-11-26T02:00:00, Updated: 2024-08-06T12:40:19.217Z, Description: Unspecified vulnerability in JustSystems Ichitaro 2008 through 2011; Ichitaro Government 6, 7, 2008, 2009, and 2010; Ichitaro Pro; Ichitaro Pro 2; Ichitaro 2011 Sou; Ichitaro 2012 Shou; Ichitaro 2013 Gen; an... |
Describe MITRE technique T1542.001 | MITRE T1542.001 : System Firmware from enterprise Adversaries may modify system firmware to persist on systems.The BIOS (Basic Input/Output System) and The Unified Extensible Firmware Interface (UEFI) or Extensible Firmware Interface (EFI) are examples of system firmware that operate as the software interface between t... |
Describe the vulnerability CVE-2019-16009 | CVE-2019-16009, State: PUBLISHED, Published: 2020-09-23T00:26:40.485378Z, Updated: 2024-11-13T18:04:10.953Z, Description: A vulnerability in the web UI of Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The ... |
Techniques related with vulnerability CVE-2020-3416 | CVE-2020-3416 in Cisco IOS XE Software. Has primary impact with T1542.004 : ROMMONkit. Has an exploitation technique T1078 : Valid Accounts. |
Techniques related with vulnerability CVE-2020-12024 | CVE-2020-12024 in Baxter ExactaMix EM 2400 & EM 1200. Has primary impact with T1091 : Replication Through Removable Media. |
Techniques related with vulnerability CVE-2015-1769 | CVE-2015-1769 in Microsoft Windows Mount Manager. Is related with T1091 : Replication Through Removable Media. Is related with T1068 : Exploitation for Privilege Escalation. |
Describe MITRE technique T1134 | MITRE T1134 : Access Token Manipulation from enterprise Adversaries may modify access tokens to operate under a different user or system security context to perform actions and bypass access controls. Windows uses access tokens to determine the ownership of a running process. A user can manipulate access tokens to make... |
Techniques related with vulnerability CVE-2012-6467 | CVE-2012-6467 in Opera before 12.10. Is related with T1566 : Phishing. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2020-0671 | CVE-2020-0671, State: PUBLISHED, Published: 2020-02-11T21:22:52, Updated: 2024-08-04T06:11:04.918Z, Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-20... |
Describe MITRE technique T1528 | MITRE T1528 : Steal Application Access Token from enterprise Adversaries can steal application access tokens as a means of acquiring credentials to access remote systems and resources.
Application access tokens are used to make authorized API requests on behalf of a user or service and are commonly used as a way to ac... |
Describe the vulnerability CVE-2015-0096 | CVE-2015-0096, State: PUBLISHED, Published: 2015-03-11T10:00:00, Updated: 2024-08-06T03:55:27.985Z, Description: Untrusted search path vulnerability in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Wi... |
Techniques related with vulnerability CVE-2019-3790 | CVE-2019-3790 in Pivotal Ops Manager. Has primary impact with T1563 : Remote Service Session Hijacking. Has an exploitation technique T1078 : Valid Accounts. |
Describe the vulnerability CVE-2020-5284 | CVE-2020-5284, State: PUBLISHED, Published: 2020-03-30T20:40:11, Updated: 2024-08-04T08:22:09.087Z, Description: Next.js versions before 9.3.2 have a directory traversal vulnerability. Attackers could craft special requests to access files in the dist directory (.next). This does not affect files outside of the dist di... |
Techniques related with vulnerability CVE-2015-2546 | CVE-2015-2546 in Windows kernel. Is related with T1608 : Stage Capabilities. |
Techniques related with vulnerability CVE-2020-9459 | CVE-2020-9459 in Webnus Modern Events Calendar Lite plugin through 5.1.6 for WordPress. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059.007 : JavaScript. Is related with T1539 : Steal Web Session Cookie. Is related with T1565 : Data Manipulation. Is related with T1491 : Defacement. |
Describe the vulnerability CVE-2019-13533 | CVE-2019-13533, State: PUBLISHED, Published: 2019-12-16T19:25:00, Updated: 2024-08-04T23:57:39.436Z, Description: In Omron PLC CJ series, all versions, and Omron PLC CS series, all versions, an attacker could monitor traffic between the PLC and the controller and replay requests that could result in the opening and clo... |
Describe the vulnerability CVE-2019-18573 | CVE-2019-18573, State: PUBLISHED, Published: 2019-12-18T20:50:14.868223Z, Updated: 2024-09-16T16:28:49.370Z, Description: The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain a Session Fixation vulnerability. An authenticated malicious local user could poten... |
Techniques related with vulnerability CVE-2020-1190 | CVE-2020-1190 in Windows. Has primary impact with T1068 : Exploitation for Privilege Escalation. |
Techniques related with vulnerability CVE-2020-1425 | CVE-2020-1425 in Windows 10 Version 2004 for x64-based Systems. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. |
Techniques related with vulnerability CVE-2019-1746 | CVE-2019-1746 in Cisco IOS and IOS XE Software. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2018-20250 | CVE-2018-20250, State: PUBLISHED, Published: 2019-02-05T20:00:00Z, Updated: 2024-09-17T00:11:50.340Z, Description: In WinRAR versions prior to and including 5.61, There is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specif... |
Describe the vulnerability CVE-2020-15140 | CVE-2020-15140, State: PUBLISHED, Published: 2020-08-21T16:40:15, Updated: 2024-08-04T13:08:22.257Z, Description: In Red Discord Bot before version 3.3.11, a RCE exploit has been discovered in the Trivia module: this exploit allows Discord users with specifically crafted usernames to inject code into the Trivia module'... |
Describe the vulnerability CVE-2020-5331 | CVE-2020-5331, State: PUBLISHED, Published: 2020-05-04T18:50:19.125428Z, Updated: 2024-09-17T02:06:43.093Z, Description: RSA Archer, versions prior to 6.7 P3 (6.7.0.3), contain an information exposure vulnerability. Users’ session information could potentially be stored in cache or log files. An authenticated malicious... |
Describe the vulnerability CVE-2018-2893 | CVE-2018-2893, State: PUBLISHED, Published: 2018-07-18T13:00:00, Updated: 2024-10-02T20:21:36.225Z, Description: Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easi... |
Techniques related with vulnerability CVE-2011-3544 | CVE-2011-3544 in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. Is related with T1497 : Virtualization/Sandbox Evasion. |
Describe the vulnerability CVE-2018-0798 | CVE-2018-0798, State: PUBLISHED, Published: 2018-01-10T01:00:00Z, Updated: 2024-09-16T18:56:12.217Z, Description: Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, a... |
Techniques related with vulnerability CVE-2019-1860 | CVE-2019-1860 in Cisco Unified Intelligence Center. Has primary impact with T1557 : Man-in-the-Middle. Has secondary impact with T1005 : Data from Local System. |
Techniques related with vulnerability CVE-2019-6703 | CVE-2019-6703 in Calmar Webmedia Total Donations plugin through 2.0.5 for WordPress. Is related with T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2018-10589 | CVE-2018-10589, State: PUBLISHED, Published: 2018-05-15T22:00:00Z, Updated: 2024-09-17T01:20:33.098Z, Description: In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NM... |
Describe the vulnerability CVE-2020-6960 | CVE-2020-6960, State: PUBLISHED, Published: 2020-01-22T14:17:07, Updated: 2024-08-04T09:18:02.477Z, Description: The following versions of MAXPRO VMS and NVR, MAXPRO VMS:HNMSWVMS prior to Version VMS560 Build 595 T2-Patch, HNMSWVMSLT prior to Version VMS560 Build 595 T2-Patch, MAXPRO NVR: MAXPRO NVR XE prior to Version... |
Techniques related with vulnerability CVE-2015-0096 | CVE-2015-0096 in Windows. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File. |
Techniques related with vulnerability CVE-2013-3893 | CVE-2013-3893 in Internet Explorer 6 through 11. Is related with T1202 : Indirect Command Execution. Is related with T1059 : Command and Scripting Interpreter. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2019-1215 | CVE-2019-1215 in Windows. Is related with T1068 : Exploitation for Privilege Escalation. |
Techniques related with vulnerability CVE-2014-5334 | CVE-2014-5334 in FreeNAS before 9.3-M3. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2018-14802 | CVE-2018-14802 in FRENIC LOADER of FRENIC-Mini (C1), FRENIC-Mini (C2), FRENIC-Eco, FRENIC-Multi, FRENIC-MEGA, FRENIC-Ace. Has primary impact with T1575 : Native Code. |
Describe the vulnerability CVE-2018-9206 | CVE-2018-9206, State: PUBLISHED, Published: 2018-10-11T15:00:00, Updated: 2024-08-05T07:17:51.545Z, Description: Unauthenticated arbitrary file upload vulnerability in Blueimp jQuery-File-Upload <= v9.22.0, No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2019-1612 | CVE-2019-1612, State: PUBLISHED, Published: 2019-03-11T22:00:00Z, Updated: 2024-09-16T19:05:20.312Z, Description: A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is d... |
Techniques related with vulnerability CVE-2020-1471 | CVE-2020-1471 in Windows 10 Version 1803. Has primary impact with T1068 : Exploitation for Privilege Escalation. |
Techniques related with vulnerability CVE-2019-1609 | CVE-2019-1609 in MDS 9000 Series Multilayer Switches. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1078 : Valid Accounts. |
Techniques related with vulnerability CVE-2015-6175 | CVE-2015-6175 in Windows kernel. Is related with T1608 : Stage Capabilities. |
Describe the vulnerability CVE-2019-2729 | CVE-2019-2729, State: PUBLISHED, Published: 2019-06-19T22:24:10, Updated: 2024-10-15T19:01:01.374Z, Description: Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploita... |
Techniques related with vulnerability CVE-2017-5638 | CVE-2017-5638 in Apache Struts. Is related with T1203 : Exploitation for Client Execution. Is related with T1068 : Exploitation for Privilege Escalation. |
Techniques related with vulnerability CVE-2019-9081 | CVE-2019-9081 in Laravel Framework. Is related with T1497 : Virtualization/Sandbox Evasion. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2014-7235 | CVE-2014-7235 in Asterisk Recording Interface Framework module/FreePBX before 2.9.0.9, 2.10.x, and 2.11 before 2.11.1.5. Is related with T1190 : Exploit Public-Facing Application. Is related with T1550 : Use Alternate Authentication Material. |
Techniques related with vulnerability CVE-2020-15143 | CVE-2020-15143 in SyliusResourceBundle. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1133 : External Remote Services. |
Describe the vulnerability CVE-2019-1836 | CVE-2019-1836, State: PUBLISHED, Published: 2019-05-03T16:30:16.269379Z, Updated: 2024-09-16T23:50:46.170Z, Description: A vulnerability in the system shell for Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an authenticated, local attacker to use symbolic links to ... |
Describe the vulnerability CVE-2020-11013 | CVE-2020-11013, State: PUBLISHED, Published: 2020-04-24T20:05:15, Updated: 2024-08-04T11:21:14.350Z, Description: Their is an information disclosure vulnerability in Helm from version 3.1.0 and before version 3.2.0. `lookup` is a Helm template function introduced in Helm v3. It is able to lookup resources in the cluste... |
Describe MITRE technique T1574.008 | MITRE T1574.008 : Path Interception by Search Order Hijacking from enterprise Adversaries may execute their own malicious payloads by hijacking the search order used to load other programs. Because some programs do not call other programs using the full path, adversaries may place their own file in the directory where ... |
Describe the vulnerability CVE-2019-3750 | CVE-2019-3750, State: PUBLISHED, Published: 2019-12-03T20:20:16.832347Z, Updated: 2024-09-16T23:11:52.600Z, Description: Dell Command Update versions prior to 3.1 contain an Arbitrary File Deletion Vulnerability. A local authenticated malicious user with low privileges potentially could exploit this vulnerability to de... |
Techniques related with vulnerability CVE-2019-1086 | CVE-2019-1086 in Windows. Has primary impact with T1068 : Exploitation for Privilege Escalation. |
Describe the vulnerability CVE-2012-2311 | CVE-2012-2311, State: PUBLISHED, Published: 2012-05-11T10:00:00, Updated: 2024-08-06T19:26:09.031Z, Description: sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that contain a %3D sequence but no = (equals sign) chara... |
Techniques related with vulnerability CVE-2010-2152 | CVE-2010-2152 in Ichitaro. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2011-3172 | CVE-2011-3172 in SUSE Linux Enterprise. Is related with T1078.003 : Local Accounts. |
Techniques related with vulnerability CVE-2019-1704 | CVE-2019-1704 in Cisco Firepower Threat Defense Software. Has primary impact with T1499 : Endpoint Denial of Service. Has an exploitation technique T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2018-11049 | CVE-2018-11049 in Pivotal Operations Manager. Has primary impact with T1574 : Hijack Execution Flow. Is related with T1574.008 : Path Interception by Search Order Hijacking. |
Describe the vulnerability CVE-2017-12817 | CVE-2017-12817, State: PUBLISHED, Published: 2017-08-25T20:00:00, Updated: 2024-08-05T18:51:06.654Z, Description: In Kaspersky Internet Security for Android 11.12.4.1622, some of the application trace files were not encrypted., No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2019-13511 | CVE-2019-13511, State: PUBLISHED, Published: 2019-08-15T18:15:13, Updated: 2024-08-04T23:57:39.281Z, Description: Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier contain an INFORMATION EXPOSURE CWE-200. A maliciously crafted Arena file opened by an unsuspecting user may result in the limited... |
Techniques related with vulnerability CVE-2019-1689 | CVE-2019-1689 in Cisco Webex Teams. Has primary impact with T1105 : Ingress Tool Transfer. Has secondary impact with T1565.001 : Stored Data Manipulation. Has secondary impact with T1531 : Account Access Removal. |
Techniques related with vulnerability CVE-2018-15393 | CVE-2018-15393 in Cisco Content Security Management Appliance (SMA). Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link. |
Describe MITRE technique T1078 | MITRE T1078 : Valid Accounts from enterprise Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Compromised credentials may be used to bypass access controls placed on various resources on systems within the netw... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.