input
stringlengths 30
54
| output
stringlengths 69
4.21k
|
|---|---|
Techniques related with vulnerability CVE-2019-11932
|
CVE-2019-11932 in android-gif-drawable. Is related with T1203 : Exploitation for Client Execution.
|
Techniques related with vulnerability CVE-2018-15444
|
CVE-2018-15444 in Cisco Energy Management Suite. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1005 : Data from Local System. Has an exploitation technique T1133 : External Remote Services.
|
Describe the vulnerability CVE-2017-16115
|
CVE-2017-16115, State: PUBLISHED, Published: 2018-06-07T02:00:00Z, Updated: 2024-09-17T01:12:20.165Z, Description: The timespan module is vulnerable to regular expression denial of service. Given 50k characters of untrusted user input it will block the event loop for around 10 seconds., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2016-5645
|
CVE-2016-5645, State: PUBLISHED, Published: 2016-08-24T01:00:00, Updated: 2024-08-06T01:08:00.362Z, Description: Rockwell Automation MicroLogix 1400 PLC 1766-L32BWA, 1766-L32AWA, 1766-L32BXB, 1766-L32BWAA, 1766-L32AWAA, and 1766-L32BXBA devices have a hardcoded SNMP community, which makes it easier for remote attackers to load arbitrary firmware updates by leveraging knowledge of this community., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-4068
|
CVE-2020-4068, State: PUBLISHED, Published: 2020-06-22T15:30:17, Updated: 2024-08-04T07:52:20.911Z, Description: In APNSwift 1.0.0, calling APNSwiftSigner.sign(digest:) is likely to result in a heap buffer overflow. This has been fixed in 1.0.1., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: LOW, Base Score: 6.3, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-6819
|
CVE-2020-6819 in Thunderbird. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise.
|
Describe the vulnerability CVE-2020-5328
|
CVE-2020-5328, State: PUBLISHED, Published: 2020-03-06T20:25:14.219804Z, Updated: 2024-09-16T18:29:46.134Z, Description: Dell EMC Isilon OneFS versions prior to 8.2.0 contain an unauthorized access vulnerability due to a lack of thorough authorization checks when SyncIQ is licensed, but encrypted syncs are not marked as required. When this happens, loss of control of the cluster can occur., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 9.8, Base Severity: CRITICAL, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-7456
|
CVE-2020-7456, State: PUBLISHED, Published: 2020-06-09T18:44:58, Updated: 2024-08-04T09:25:48.974Z, Description: In FreeBSD 12.1-STABLE before r361918, 12.1-RELEASE before p6, 11.4-STABLE before r361919, 11.3-RELEASE before p10, and 11.4-RC2 before p1, an invalid memory location may be used for HID items if the push/pop level is not restored within the processing of that HID item allowing an attacker with physical access to a USB port to be able to use a specially crafted USB device to gain kernel or user-space code execution., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-0898
|
CVE-2020-0898, State: PUBLISHED, Published: 2020-03-12T15:48:57, Updated: 2024-08-04T06:18:03.484Z, Description: An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory, aka 'Windows Graphics Component Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0791., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-1027
|
CVE-2020-1027 in Windows. Is related with T1068 : Exploitation for Privilege Escalation.
|
Techniques related with vulnerability CVE-2014-6277
|
CVE-2014-6277 in GNU Bash through 4.3 bash43-026. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059.004 : Unix Shell.
|
Describe the vulnerability CVE-2010-3338
|
CVE-2010-3338, State: PUBLISHED, Published: 2010-12-16T19:00:00, Updated: 2024-08-07T03:03:18.911Z, Description: The Windows Task Scheduler in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly determine the security context of scheduled tasks, which allows local users to gain privileges via a crafted application, aka "Task Scheduler Vulnerability." NOTE: this might overlap CVE-2010-3888., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-20838
|
CVE-2018-20838 in AMP for WP plugin before 0.9.97.21 for WordPress. Is related with T1203 : Exploitation for Client Execution.
|
Describe MITRE technique T1565.001
|
MITRE T1565.001 : Stored Data Manipulation from enterprise Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.(Citation: FireEye APT38 Oct 2018)(Citation: DOJ Lazarus Sony 2018) By manipulating stored data, adversaries may attempt to affect a business process, organizational understanding, and decision making.
Stored data could include a variety of file formats, such as Office files, databases, stored emails, and custom file formats. The type of modification and the impact it will have depends on the type of data as well as the goals and objectives of the adversary. For complex systems, an adversary would likely need special expertise and possibly access to specialized software related to the system that would typically be gained through a prolonged information gathering campaign in order to have the desired impact.
|
Techniques related with vulnerability CVE-2019-1620
|
CVE-2019-1620 in Cisco Data Center Network Manager. Has primary impact with T1105 : Ingress Tool Transfer. Has secondary impact with T1059 : Command and Scripting Interpreter.
|
Describe the vulnerability CVE-2016-4655
|
CVE-2016-4655, State: PUBLISHED, Published: 2016-08-25T21:00:00, Updated: 2024-08-06T00:39:25.596Z, Description: The kernel in Apple iOS before 9.3.5 allows attackers to obtain sensitive information from memory via a crafted app., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2010-0480
|
CVE-2010-0480 in MPEG Layer-3 audio codecs in Microsoft Windows. Is related with T1203 : Exploitation for Client Execution.
|
Describe the vulnerability CVE-2018-15397
|
CVE-2018-15397, State: PUBLISHED, Published: 2018-10-05T14:00:00Z, Updated: 2024-09-17T02:16:04.264Z, Description: A vulnerability in the implementation of Traffic Flow Confidentiality (TFC) over IPsec functionality in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to an error that may occur if the affected software renegotiates the encryption key for an IPsec tunnel when certain TFC traffic is in flight. An attacker could exploit this vulnerability by sending a malicious stream of TFC traffic through an established IPsec tunnel on an affected device. A successful exploit could allow the attacker to cause a daemon process on the affected device to crash, which could cause the device to crash and result in a DoS condition., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-11068
|
CVE-2020-11068 in LoRaMac-node. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation.
|
Techniques related with vulnerability CVE-2020-6974
|
CVE-2020-6974 in Honeywell Notifier Web Server (NWS). Is related with T1190 : Exploit Public-Facing Application. Is related with T1005 : Data from Local System. Is related with T1565 : Data Manipulation.
|
Techniques related with vulnerability CVE-2020-5300
|
CVE-2020-5300 in hydra. Is related with T1528 : Steal Application Access Token. Is related with T1068 : Exploitation for Privilege Escalation.
|
Describe MITRE technique T0814
|
MITRE T0814 : Denial of Service from ics Adversaries may perform Denial-of-Service (DoS) attacks to disrupt expected device functionality. Examples of DoS attacks include overwhelming the target device with a high volume of requests in a short time period and sending the target device a request it does not know how to handle. Disrupting device state may temporarily render it unresponsive, possibly lasting until a reboot can occur. When placed in this state, devices may be unable to send and receive requests, and may not perform expected response functions in reaction to other events in the environment.
Some ICS devices are particularly sensitive to DoS events, and may become unresponsive in reaction to even a simple ping sweep. Adversaries may also attempt to execute a Permanent Denial-of-Service (PDoS) against certain devices, such as in the case of the BrickerBot malware. (Citation: ICS-CERT April 2017)
Adversaries may exploit a software vulnerability to cause a denial of service by taking advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. Vulnerabilities may exist in software that can be used to cause a denial of service condition.
Adversaries may have prior knowledge about industrial protocols or control devices used in the environment through [Remote System Information Discovery](T0888). There are examples of adversaries remotely causing a [Device Restart/Shutdown](T0816) by exploiting a vulnerability that induces uncontrolled resource consumption. (Citation: ICS-CERT August 2018) (Citation: Common Weakness Enumeration January 2019) (Citation: MITRE March 2018)
|
Techniques related with vulnerability CVE-2020-5345
|
CVE-2020-5345 in Unisphere for PowerMax. Has primary impact with T1190 : Exploit Public-Facing Application. Has an exploitation technique T1565.001 : Stored Data Manipulation.
|
Describe the vulnerability CVE-2019-13541
|
CVE-2019-13541, State: PUBLISHED, Published: 2019-10-18T18:26:35, Updated: 2024-08-04T23:57:39.273Z, Description: In Horner Automation Cscape 9.90 and prior, an improper input validation vulnerability has been identified that may be exploited by processing files lacking user input validation. This may allow an attacker to access information and remotely execute arbitrary code., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-3704
|
CVE-2019-3704, State: PUBLISHED, Published: 2019-02-07T19:00:00Z, Updated: 2024-09-16T17:58:08.973Z, Description: VNX Control Station in Dell EMC VNX2 OE for File versions prior to 8.1.9.236 contains OS command injection vulnerability. Due to inadequate restriction configured in sudores, a local authenticated malicious user could potentially execute arbitrary OS commands as root by exploiting this vulnerability., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: HIGH, Base Score: 7.8, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-5220
|
CVE-2020-5220, State: PUBLISHED, Published: 2020-01-27T20:15:17, Updated: 2024-08-04T08:22:08.763Z, Description: Sylius ResourceBundle accepts and uses any serialisation groups to be passed via a HTTP header. This might lead to data exposure by using an unintended serialisation group - for example it could make Shop API use a more permissive group from Admin API. Anyone exposing an API with ResourceBundle's controller is affected. The vulnerable versions are: <1.3 || >=1.3.0 <=1.3.12 || >=1.4.0 <=1.4.5 || >=1.5.0 <=1.5.0 || >=1.6.0 <=1.6.2. The patch is provided for Sylius ResourceBundle 1.3.13, 1.4.6, 1.5.1 and 1.6.3, but not for any versions below 1.3., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 4.4, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: LOW, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2017-10810
|
CVE-2017-10810 in Linux kernel through 4.11.8. Is related with T1499.004 : Application or System Exploitation.
|
Techniques related with vulnerability CVE-2011-2900
|
CVE-2011-2900 in Mongoose 3.0. Is related with T1190 : Exploit Public-Facing Application.
|
Describe the vulnerability CVE-2019-3788
|
CVE-2019-3788, State: PUBLISHED, Published: 2019-04-25T20:17:37.233754Z, Updated: 2024-09-16T22:02:12.371Z, Description: Cloud Foundry UAA Release, versions prior to 71.0, allows clients to be configured with an insecure redirect uri. Given a UAA client was configured with a wildcard in the redirect uri's subdomain, a remote malicious unauthenticated user can craft a phishing link to get a UAA access code from the victim., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 8.7, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-17889
|
CVE-2018-17889 in PI Studio HMI. Has primary impact with T1059 : Command and Scripting Interpreter.
|
Describe MITRE technique T1068
|
MITRE T1068 : Exploitation for Privilege Escalation from enterprise Adversaries may exploit software vulnerabilities in an attempt to elevate privileges. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. Security constructs such as permission levels will often hinder access to information and use of certain techniques, so adversaries will likely need to perform privilege escalation to include use of software exploitation to circumvent those restrictions.
When initially gaining access to a system, an adversary may be operating within a lower privileged process which will prevent them from accessing certain resources on the system. Vulnerabilities may exist, usually in operating system components and software commonly running at higher permissions, that can be exploited to gain higher levels of access on the system. This could enable someone to move from unprivileged or user level permissions to SYSTEM or root permissions depending on the component that is vulnerable. This could also enable an adversary to move from a virtualized environment, such as within a virtual machine or container, onto the underlying host. This may be a necessary step for an adversary compromising an endpoint system that has been properly configured and limits other privilege escalation methods.
Adversaries may bring a signed vulnerable driver onto a compromised machine so that they can exploit the vulnerability to execute code in kernel mode. This process is sometimes referred to as Bring Your Own Vulnerable Driver (BYOVD).(Citation: ESET InvisiMole June 2020)(Citation: Unit42 AcidBox June 2020) Adversaries may include the vulnerable driver with files delivered during Initial Access or download it to a compromised system via [Ingress Tool Transfer](T1105) or [Lateral Tool Transfer](T1570).
|
Describe the vulnerability CVE-2019-3762
|
CVE-2019-3762, State: PUBLISHED, Published: 2020-03-18T18:20:16.283199Z, Updated: 2024-09-16T23:15:44.160Z, Description: Data Protection Central versions 1.0, 1.0.1, 18.1, 18.2, and 19.1 contains an Improper Certificate Chain of Trust Vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability by obtaining a CA signed certificate from Data Protection Central to impersonate a valid system to compromise the integrity of data., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 7.5, Base Severity: HIGH, Confidentiality Impact: NONE, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-15287
|
CVE-2019-15287, State: PUBLISHED, Published: 2020-09-23T00:35:26.666806Z, Updated: 2024-11-13T18:02:31.417Z, Description: Multiple vulnerabilities in Cisco Webex Network Recording Player for Microsoft Windows and Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerabilities exist due to insufficient validation of certain elements with a Webex recording stored in either the Advanced Recording Format (ARF) or the Webex Recording Format (WRF). An attacker could exploit these vulnerabilities by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: HIGH, Base Score: 7.8, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Describe the vulnerability CVE-2010-2743
|
CVE-2010-2743, State: PUBLISHED, Published: 2011-01-20T20:00:00, Updated: 2024-08-07T02:46:47.217Z, Description: The kernel-mode drivers in Microsoft Windows XP SP3 do not properly perform indexing of a function-pointer table during the loading of keyboard layouts from disk, which allows local users to gain privileges via a crafted application, as demonstrated in the wild in July 2010 by the Stuxnet worm, aka "Win32k Keyboard Layout Vulnerability." NOTE: this might be a duplicate of CVE-2010-3888 or CVE-2010-3889., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-8453
|
CVE-2018-8453 in Windows 7. Is related with T1608 : Stage Capabilities.
|
Techniques related with vulnerability CVE-2019-7287
|
CVE-2019-7287 in iOS. Is related with T1404 : Exploit OS Vulnerability.
|
Describe the vulnerability CVE-2015-2509
|
CVE-2015-2509, State: PUBLISHED, Published: 2015-09-09T00:00:00, Updated: 2024-08-06T05:17:27.222Z, Description: Windows Media Center in Microsoft Windows Vista SP2, Windows 7 SP1, Windows 8, and Windows 8.1 allows user-assisted remote attackers to execute arbitrary code via a crafted Media Center link (mcl) file, aka "Windows Media Center RCE Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-5281
|
CVE-2020-5281, State: PUBLISHED, Published: 2020-03-25T18:00:20, Updated: 2024-08-04T08:22:09.083Z, Description: In Perun before version 3.9.1, VO or group manager can modify configuration of the LDAP extSource to retrieve all from Perun LDAP. Issue is fixed in version 3.9.1 by sanitisation of the input., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 6.2, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: LOW, Privileges Required: HIGH, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2019-16782
|
CVE-2019-16782 in rack. Has primary impact with T1563 : Remote Service Session Hijacking. Has an exploitation technique T1110 : Brute Force.
|
Describe the vulnerability CVE-2016-7256
|
CVE-2016-7256, State: PUBLISHED, Published: 2016-11-10T06:16:00, Updated: 2024-08-06T01:57:47.267Z, Description: atmfd.dll in the Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows remote attackers to execute arbitrary code via a crafted web site, aka "Open Type Font Remote Code Execution Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2014-7247
|
CVE-2014-7247, State: PUBLISHED, Published: 2014-11-26T02:00:00, Updated: 2024-08-06T12:40:19.217Z, Description: Unspecified vulnerability in JustSystems Ichitaro 2008 through 2011; Ichitaro Government 6, 7, 2008, 2009, and 2010; Ichitaro Pro; Ichitaro Pro 2; Ichitaro 2011 Sou; Ichitaro 2012 Shou; Ichitaro 2013 Gen; and Ichitaro 2014 Tetsu allows remote attackers to execute arbitrary code via a crafted file., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe MITRE technique T1542.001
|
MITRE T1542.001 : System Firmware from enterprise Adversaries may modify system firmware to persist on systems.The BIOS (Basic Input/Output System) and The Unified Extensible Firmware Interface (UEFI) or Extensible Firmware Interface (EFI) are examples of system firmware that operate as the software interface between the operating system and hardware of a computer.(Citation: Wikipedia BIOS)(Citation: Wikipedia UEFI)(Citation: About UEFI)
System firmware like BIOS and (U)EFI underly the functionality of a computer and may be modified by an adversary to perform or assist in malicious activity. Capabilities exist to overwrite the system firmware, which may give sophisticated adversaries a means to install malicious firmware updates as a means of persistence on a system that may be difficult to detect.
|
Describe the vulnerability CVE-2019-16009
|
CVE-2019-16009, State: PUBLISHED, Published: 2020-09-23T00:26:40.485378Z, Updated: 2024-11-13T18:04:10.953Z, Description: A vulnerability in the web UI of Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web UI on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. If the user has administrative privileges, the attacker could alter the configuration, execute commands, or reload an affected device., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.8, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Techniques related with vulnerability CVE-2020-3416
|
CVE-2020-3416 in Cisco IOS XE Software. Has primary impact with T1542.004 : ROMMONkit. Has an exploitation technique T1078 : Valid Accounts.
|
Techniques related with vulnerability CVE-2020-12024
|
CVE-2020-12024 in Baxter ExactaMix EM 2400 & EM 1200. Has primary impact with T1091 : Replication Through Removable Media.
|
Techniques related with vulnerability CVE-2015-1769
|
CVE-2015-1769 in Microsoft Windows Mount Manager. Is related with T1091 : Replication Through Removable Media. Is related with T1068 : Exploitation for Privilege Escalation.
|
Describe MITRE technique T1134
|
MITRE T1134 : Access Token Manipulation from enterprise Adversaries may modify access tokens to operate under a different user or system security context to perform actions and bypass access controls. Windows uses access tokens to determine the ownership of a running process. A user can manipulate access tokens to make a running process appear as though it is the child of a different process or belongs to someone other than the user that started the process. When this occurs, the process also takes on the security context associated with the new token.
An adversary can use built-in Windows API functions to copy access tokens from existing processes; this is known as token stealing. These token can then be applied to an existing process (i.e. [Token Impersonation/Theft](T1134.001)) or used to spawn a new process (i.e. [Create Process with Token](T1134.002)). An adversary must already be in a privileged user context (i.e. administrator) to steal a token. However, adversaries commonly use token stealing to elevate their security context from the administrator level to the SYSTEM level. An adversary can then use a token to authenticate to a remote system as the account for that token if the account has appropriate permissions on the remote system.(Citation: Pentestlab Token Manipulation)
Any standard user can use the `runas` command, and the Windows API functions, to create impersonation tokens; it does not require access to an administrator account. There are also other mechanisms, such as Active Directory fields, that can be used to modify access tokens.
|
Techniques related with vulnerability CVE-2012-6467
|
CVE-2012-6467 in Opera before 12.10. Is related with T1566 : Phishing. Is related with T1203 : Exploitation for Client Execution.
|
Describe the vulnerability CVE-2020-0671
|
CVE-2020-0671, State: PUBLISHED, Published: 2020-02-11T21:22:52, Updated: 2024-08-04T06:11:04.918Z, Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0668, CVE-2020-0669, CVE-2020-0670, CVE-2020-0672., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe MITRE technique T1528
|
MITRE T1528 : Steal Application Access Token from enterprise Adversaries can steal application access tokens as a means of acquiring credentials to access remote systems and resources.
Application access tokens are used to make authorized API requests on behalf of a user or service and are commonly used as a way to access resources in cloud and container-based applications and software-as-a-service (SaaS).(Citation: Auth0 - Why You Should Always Use Access Tokens to Secure APIs Sept 2019) Adversaries who steal account API tokens in cloud and containerized environments may be able to access data and perform actions with the permissions of these accounts, which can lead to privilege escalation and further compromise of the environment.
For example, in Kubernetes environments, processes running inside a container may communicate with the Kubernetes API server using service account tokens. If a container is compromised, an adversary may be able to steal the container’s token and thereby gain access to Kubernetes API commands.(Citation: Kubernetes Service Accounts) Similarly, instances within continuous-development / continuous-integration (CI/CD) pipelines will often use API tokens to authenticate to other services for testing and deployment.(Citation: Cider Security Top 10 CICD Security Risks) If these pipelines are compromised, adversaries may be able to steal these tokens and leverage their privileges.
Token theft can also occur through social engineering, in which case user action may be required to grant access. OAuth is one commonly implemented framework that issues tokens to users for access to systems. An application desiring access to cloud-based services or protected APIs can gain entry using OAuth 2.0 through a variety of authorization protocols. An example commonly-used sequence is Microsoft's Authorization Code Grant flow.(Citation: Microsoft Identity Platform Protocols May 2019)(Citation: Microsoft - OAuth Code Authorization flow - June 2019) An OAuth access token enables a third-party application to interact with resources containing user data in the ways requested by the application without obtaining user credentials.
Adversaries can leverage OAuth authorization by constructing a malicious application designed to be granted access to resources with the target user's OAuth token.(Citation: Amnesty OAuth Phishing Attacks, August 2019)(Citation: Trend Micro Pawn Storm OAuth 2017) The adversary will need to complete registration of their application with the authorization server, for example Microsoft Identity Platform using Azure Portal, the Visual Studio IDE, the command-line interface, PowerShell, or REST API calls.(Citation: Microsoft - Azure AD App Registration - May 2019) Then, they can send a [Spearphishing Link](T1566.002) to the target user to entice them to grant access to the application. Once the OAuth access token is granted, the application can gain potentially long-term access to features of the user account through [Application Access Token](T1550.001).(Citation: Microsoft - Azure AD Identity Tokens - Aug 2019)
Application access tokens may function within a limited lifetime, limiting how long an adversary can utilize the stolen token. However, in some cases, adversaries can also steal application refresh tokens(Citation: Auth0 Understanding Refresh Tokens), allowing them to obtain new access tokens without prompting the user.
|
Describe the vulnerability CVE-2015-0096
|
CVE-2015-0096, State: PUBLISHED, Published: 2015-03-11T10:00:00, Updated: 2024-08-06T03:55:27.985Z, Description: Untrusted search path vulnerability in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, leading to DLL loading during Windows Explorer access to the icon of a crafted shortcut, aka "DLL Planting Remote Code Execution Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2019-3790
|
CVE-2019-3790 in Pivotal Ops Manager. Has primary impact with T1563 : Remote Service Session Hijacking. Has an exploitation technique T1078 : Valid Accounts.
|
Describe the vulnerability CVE-2020-5284
|
CVE-2020-5284, State: PUBLISHED, Published: 2020-03-30T20:40:11, Updated: 2024-08-04T08:22:09.087Z, Description: Next.js versions before 9.3.2 have a directory traversal vulnerability. Attackers could craft special requests to access files in the dist directory (.next). This does not affect files outside of the dist directory (.next). In general, the dist directory only holds build assets unless your application intentionally stores other assets under this directory. This issue is fixed in version 9.3.2., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 4.4, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: LOW, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2015-2546
|
CVE-2015-2546 in Windows kernel. Is related with T1608 : Stage Capabilities.
|
Techniques related with vulnerability CVE-2020-9459
|
CVE-2020-9459 in Webnus Modern Events Calendar Lite plugin through 5.1.6 for WordPress. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059.007 : JavaScript. Is related with T1539 : Steal Web Session Cookie. Is related with T1565 : Data Manipulation. Is related with T1491 : Defacement.
|
Describe the vulnerability CVE-2019-13533
|
CVE-2019-13533, State: PUBLISHED, Published: 2019-12-16T19:25:00, Updated: 2024-08-04T23:57:39.436Z, Description: In Omron PLC CJ series, all versions, and Omron PLC CS series, all versions, an attacker could monitor traffic between the PLC and the controller and replay requests that could result in the opening and closing of industrial valves., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-18573
|
CVE-2019-18573, State: PUBLISHED, Published: 2019-12-18T20:50:14.868223Z, Updated: 2024-09-16T16:28:49.370Z, Description: The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain a Session Fixation vulnerability. An authenticated malicious local user could potentially exploit this vulnerability as the session token is exposed as part of the URL. A remote attacker can gain access to victim’s session and perform arbitrary actions with privileges of the user within the compromised session., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 8.7, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-1190
|
CVE-2020-1190 in Windows. Has primary impact with T1068 : Exploitation for Privilege Escalation.
|
Techniques related with vulnerability CVE-2020-1425
|
CVE-2020-1425 in Windows 10 Version 2004 for x64-based Systems. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation.
|
Techniques related with vulnerability CVE-2019-1746
|
CVE-2019-1746 in Cisco IOS and IOS XE Software. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1190 : Exploit Public-Facing Application.
|
Describe the vulnerability CVE-2018-20250
|
CVE-2018-20250, State: PUBLISHED, Published: 2019-02-05T20:00:00Z, Updated: 2024-09-17T00:11:50.340Z, Description: In WinRAR versions prior to and including 5.61, There is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as an absolute path., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-15140
|
CVE-2020-15140, State: PUBLISHED, Published: 2020-08-21T16:40:15, Updated: 2024-08-04T13:08:22.257Z, Description: In Red Discord Bot before version 3.3.11, a RCE exploit has been discovered in the Trivia module: this exploit allows Discord users with specifically crafted usernames to inject code into the Trivia module's leaderboard command. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information. This critical exploit has been fixed on version 3.3.11., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 8.2, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-5331
|
CVE-2020-5331, State: PUBLISHED, Published: 2020-05-04T18:50:19.125428Z, Updated: 2024-09-17T02:06:43.093Z, Description: RSA Archer, versions prior to 6.7 P3 (6.7.0.3), contain an information exposure vulnerability. Users’ session information could potentially be stored in cache or log files. An authenticated malicious local user with access to the log files may obtain the exposed information to use it in further attacks., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.8, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-2893
|
CVE-2018-2893, State: PUBLISHED, Published: 2018-07-18T13:00:00, Updated: 2024-10-02T20:21:36.225Z, Description: Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2011-3544
|
CVE-2011-3544 in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. Is related with T1497 : Virtualization/Sandbox Evasion.
|
Describe the vulnerability CVE-2018-0798
|
CVE-2018-0798, State: PUBLISHED, Published: 2018-01-10T01:00:00Z, Updated: 2024-09-16T18:56:12.217Z, Description: Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Memory Corruption Vulnerability"., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2019-1860
|
CVE-2019-1860 in Cisco Unified Intelligence Center. Has primary impact with T1557 : Man-in-the-Middle. Has secondary impact with T1005 : Data from Local System.
|
Techniques related with vulnerability CVE-2019-6703
|
CVE-2019-6703 in Calmar Webmedia Total Donations plugin through 2.0.5 for WordPress. Is related with T1190 : Exploit Public-Facing Application.
|
Describe the vulnerability CVE-2018-10589
|
CVE-2018-10589, State: PUBLISHED, Published: 2018-05-15T22:00:00Z, Updated: 2024-09-17T01:20:33.098Z, Description: In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, a path transversal vulnerability has been identified, which may allow an attacker to execute arbitrary code., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-6960
|
CVE-2020-6960, State: PUBLISHED, Published: 2020-01-22T14:17:07, Updated: 2024-08-04T09:18:02.477Z, Description: The following versions of MAXPRO VMS and NVR, MAXPRO VMS:HNMSWVMS prior to Version VMS560 Build 595 T2-Patch, HNMSWVMSLT prior to Version VMS560 Build 595 T2-Patch, MAXPRO NVR: MAXPRO NVR XE prior to Version NVR 5.6 Build 595 T2-Patch, MAXPRO NVR SE prior to Version NVR 5.6 Build 595 T2-Patch, MAXPRO NVR PE prior to Version NVR 5.6 Build 595 T2-Patch, and MPNVRSWXX prior to Version NVR 5.6 Build 595 T2-Patch contain an SQL injection vulnerability that could give an attacker remote unauthenticated access to the web user interface with administrator-level privileges., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2015-0096
|
CVE-2015-0096 in Windows. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File.
|
Techniques related with vulnerability CVE-2013-3893
|
CVE-2013-3893 in Internet Explorer 6 through 11. Is related with T1202 : Indirect Command Execution. Is related with T1059 : Command and Scripting Interpreter. Is related with T1203 : Exploitation for Client Execution.
|
Techniques related with vulnerability CVE-2019-1215
|
CVE-2019-1215 in Windows. Is related with T1068 : Exploitation for Privilege Escalation.
|
Techniques related with vulnerability CVE-2014-5334
|
CVE-2014-5334 in FreeNAS before 9.3-M3. Is related with T1203 : Exploitation for Client Execution.
|
Techniques related with vulnerability CVE-2018-14802
|
CVE-2018-14802 in FRENIC LOADER of FRENIC-Mini (C1), FRENIC-Mini (C2), FRENIC-Eco, FRENIC-Multi, FRENIC-MEGA, FRENIC-Ace. Has primary impact with T1575 : Native Code.
|
Describe the vulnerability CVE-2018-9206
|
CVE-2018-9206, State: PUBLISHED, Published: 2018-10-11T15:00:00, Updated: 2024-08-05T07:17:51.545Z, Description: Unauthenticated arbitrary file upload vulnerability in Blueimp jQuery-File-Upload <= v9.22.0, No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-1612
|
CVE-2019-1612, State: PUBLISHED, Published: 2019-03-11T22:00:00Z, Updated: 2024-09-16T19:05:20.312Z, Description: A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. Nexus 3000 Series Switches are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 3500 Platform Switches are affected running software versions prior to 7.0(3)I7(4). Nexus 3600 Platform Switches are affected running software versions prior to 7.0(3)F3(5). Nexus 9000 Series Switches in Stand are affected running software versions prior to 7.0(3)F3(5)., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: LOW, Base Score: 4.2, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Techniques related with vulnerability CVE-2020-1471
|
CVE-2020-1471 in Windows 10 Version 1803. Has primary impact with T1068 : Exploitation for Privilege Escalation.
|
Techniques related with vulnerability CVE-2019-1609
|
CVE-2019-1609 in MDS 9000 Series Multilayer Switches. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1078 : Valid Accounts.
|
Techniques related with vulnerability CVE-2015-6175
|
CVE-2015-6175 in Windows kernel. Is related with T1608 : Stage Capabilities.
|
Describe the vulnerability CVE-2019-2729
|
CVE-2019-2729, State: PUBLISHED, Published: 2019-06-19T22:24:10, Updated: 2024-10-15T19:01:01.374Z, Description: Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 9.8, Base Severity: CRITICAL, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2017-5638
|
CVE-2017-5638 in Apache Struts. Is related with T1203 : Exploitation for Client Execution. Is related with T1068 : Exploitation for Privilege Escalation.
|
Techniques related with vulnerability CVE-2019-9081
|
CVE-2019-9081 in Laravel Framework. Is related with T1497 : Virtualization/Sandbox Evasion. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1203 : Exploitation for Client Execution.
|
Techniques related with vulnerability CVE-2014-7235
|
CVE-2014-7235 in Asterisk Recording Interface Framework module/FreePBX before 2.9.0.9, 2.10.x, and 2.11 before 2.11.1.5. Is related with T1190 : Exploit Public-Facing Application. Is related with T1550 : Use Alternate Authentication Material.
|
Techniques related with vulnerability CVE-2020-15143
|
CVE-2020-15143 in SyliusResourceBundle. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1133 : External Remote Services.
|
Describe the vulnerability CVE-2019-1836
|
CVE-2019-1836, State: PUBLISHED, Published: 2019-05-03T16:30:16.269379Z, Updated: 2024-09-16T23:50:46.170Z, Description: A vulnerability in the system shell for Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an authenticated, local attacker to use symbolic links to overwrite system files. These system files may be sensitive and should not be overwritable by non-root users. The attacker would need valid device credentials. The vulnerability is due to incorrect symbolic link verification of directory paths when they are used in the system shell. An attacker could exploit this vulnerability by authenticating to the device and providing crafted user input to specific symbolic link CLI commands. Successful exploitation could allow the attacker to overwrite system files that should be restricted. This vulnerability has been fixed in software version 14.1(1i)., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: NONE, Base Score: 5.5, Base Severity: MEDIUM, Confidentiality Impact: NONE, Integrity Impact: HIGH, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Describe the vulnerability CVE-2020-11013
|
CVE-2020-11013, State: PUBLISHED, Published: 2020-04-24T20:05:15, Updated: 2024-08-04T11:21:14.350Z, Description: Their is an information disclosure vulnerability in Helm from version 3.1.0 and before version 3.2.0. `lookup` is a Helm template function introduced in Helm v3. It is able to lookup resources in the cluster to check for the existence of specific resources and get details about them. This can be used as part of the process to render templates. The documented behavior of `helm template` states that it does not attach to a remote cluster. However, a the recently added `lookup` template function circumvents this restriction and connects to the cluster even during `helm template` and `helm install|update|delete|rollback --dry-run`. The user is not notified of this behavior. Running `helm template` should not make calls to a cluster. This is different from `install`, which is presumed to have access to a cluster in order to load resources into Kubernetes. Helm 2 is unaffected by this vulnerability. A malicious chart author could inject a `lookup` into a chart that, when rendered through `helm template`, performs unannounced lookups against the cluster a user's `KUBECONFIG` file points to. This information can then be disclosed via the output of `helm template`. This issue has been fixed in Helm 3.2.0, CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 8.5, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: LOW, Privileges Required: LOW, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe MITRE technique T1574.008
|
MITRE T1574.008 : Path Interception by Search Order Hijacking from enterprise Adversaries may execute their own malicious payloads by hijacking the search order used to load other programs. Because some programs do not call other programs using the full path, adversaries may place their own file in the directory where the calling program is located, causing the operating system to launch their malicious software at the request of the calling program.
Search order hijacking occurs when an adversary abuses the order in which Windows searches for programs that are not given a path. Unlike [DLL Search Order Hijacking](T1574.001), the search order differs depending on the method that is used to execute the program. (Citation: Microsoft CreateProcess) (Citation: Windows NT Command Shell) (Citation: Microsoft WinExec) However, it is common for Windows to search in the directory of the initiating program before searching through the Windows system directory. An adversary who finds a program vulnerable to search order hijacking (i.e., a program that does not specify the path to an executable) may take advantage of this vulnerability by creating a program named after the improperly specified program and placing it within the initiating program's directory.
For example, "example.exe" runs "cmd.exe" with the command-line argument `net user`. An adversary may place a program called "net.exe" within the same directory as example.exe, "net.exe" will be run instead of the Windows system utility net. In addition, if an adversary places a program called "net.com" in the same directory as "net.exe", then `cmd.exe /C net user` will execute "net.com" instead of "net.exe" due to the order of executable extensions defined under PATHEXT. (Citation: Microsoft Environment Property)
Search order hijacking is also a common practice for hijacking DLL loads and is covered in [DLL Search Order Hijacking](T1574.001).
|
Describe the vulnerability CVE-2019-3750
|
CVE-2019-3750, State: PUBLISHED, Published: 2019-12-03T20:20:16.832347Z, Updated: 2024-09-16T23:11:52.600Z, Description: Dell Command Update versions prior to 3.1 contain an Arbitrary File Deletion Vulnerability. A local authenticated malicious user with low privileges potentially could exploit this vulnerability to delete arbitrary files by creating a symlink from the "Temp\IC\ICDebugLog.txt" to any targeted file. This issue occurs because of insecure handling of Temp directory permissions that were set incorrectly., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: HIGH, Base Score: 5.6, Base Severity: MEDIUM, Confidentiality Impact: NONE, Integrity Impact: LOW, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2019-1086
|
CVE-2019-1086 in Windows. Has primary impact with T1068 : Exploitation for Privilege Escalation.
|
Describe the vulnerability CVE-2012-2311
|
CVE-2012-2311, State: PUBLISHED, Published: 2012-05-11T10:00:00, Updated: 2024-08-06T19:26:09.031Z, Description: sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that contain a %3D sequence but no = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2010-2152
|
CVE-2010-2152 in Ichitaro. Is related with T1203 : Exploitation for Client Execution.
|
Techniques related with vulnerability CVE-2011-3172
|
CVE-2011-3172 in SUSE Linux Enterprise. Is related with T1078.003 : Local Accounts.
|
Techniques related with vulnerability CVE-2019-1704
|
CVE-2019-1704 in Cisco Firepower Threat Defense Software. Has primary impact with T1499 : Endpoint Denial of Service. Has an exploitation technique T1190 : Exploit Public-Facing Application.
|
Techniques related with vulnerability CVE-2018-11049
|
CVE-2018-11049 in Pivotal Operations Manager. Has primary impact with T1574 : Hijack Execution Flow. Is related with T1574.008 : Path Interception by Search Order Hijacking.
|
Describe the vulnerability CVE-2017-12817
|
CVE-2017-12817, State: PUBLISHED, Published: 2017-08-25T20:00:00, Updated: 2024-08-05T18:51:06.654Z, Description: In Kaspersky Internet Security for Android 11.12.4.1622, some of the application trace files were not encrypted., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-13511
|
CVE-2019-13511, State: PUBLISHED, Published: 2019-08-15T18:15:13, Updated: 2024-08-04T23:57:39.281Z, Description: Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier contain an INFORMATION EXPOSURE CWE-200. A maliciously crafted Arena file opened by an unsuspecting user may result in the limited exposure of information related to the targeted workstation., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2019-1689
|
CVE-2019-1689 in Cisco Webex Teams. Has primary impact with T1105 : Ingress Tool Transfer. Has secondary impact with T1565.001 : Stored Data Manipulation. Has secondary impact with T1531 : Account Access Removal.
|
Techniques related with vulnerability CVE-2018-15393
|
CVE-2018-15393 in Cisco Content Security Management Appliance (SMA). Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link.
|
Describe MITRE technique T1078
|
MITRE T1078 : Valid Accounts from enterprise Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Compromised credentials may be used to bypass access controls placed on various resources on systems within the network and may even be used for persistent access to remote systems and externally available services, such as VPNs, Outlook Web Access, network devices, and remote desktop.(Citation: volexity_0day_sophos_FW) Compromised credentials may also grant an adversary increased privilege to specific systems or access to restricted areas of the network. Adversaries may choose not to use malware or tools in conjunction with the legitimate access those credentials provide to make it harder to detect their presence.
In some cases, adversaries may abuse inactive accounts: for example, those belonging to individuals who are no longer part of an organization. Using these accounts may allow the adversary to evade detection, as the original account user will not be present to identify any anomalous activity taking place on their account.(Citation: CISA MFA PrintNightmare)
The overlap of permissions for local, domain, and cloud accounts across a network of systems is of concern because the adversary may be able to pivot across accounts and systems to reach a high level of access (i.e., domain or enterprise administrator) to bypass access controls set within the enterprise.(Citation: TechNet Credential Theft)
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.