input
stringlengths
30
54
output
stringlengths
69
4.21k
Describe MITRE technique T1505.003
MITRE T1505.003 : Web Shell from enterprise Adversaries may backdoor web servers with web shells to establish persistent access to systems. A Web shell is a Web script that is placed on an openly accessible Web server to allow an adversary to access the Web server as a gateway into a network. A Web shell may provide a set of functions to execute or a command-line interface on the system that hosts the Web server.(Citation: volexity_0day_sophos_FW) In addition to a server-side script, a Web shell may have a client interface program that is used to talk to the Web server (e.g. [China Chopper](S0020) Web shell client).(Citation: Lee 2013)
Describe the vulnerability CVE-2016-3393
CVE-2016-3393, State: PUBLISHED, Published: 2016-10-14T01:00:00, Updated: 2024-08-05T23:56:13.408Z, Description: Graphics Device Interface (aka GDI or GDI+) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows remote attackers to execute arbitrary code via a crafted web site, aka "Windows Graphics Component RCE Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2018-14809
CVE-2018-14809 in V-Server. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has primary impact with T1005 : Data from Local System. Has primary impact with T1557 : Man-in-the-Middle.
Describe the vulnerability CVE-2015-0072
CVE-2015-0072, State: PUBLISHED, Published: 2015-02-07T18:00:00, Updated: 2024-08-06T03:55:27.986Z, Description: Cross-site scripting (XSS) vulnerability in Microsoft Internet Explorer 9 through 11 allows remote attackers to bypass the Same Origin Policy and inject arbitrary web script or HTML via vectors involving an IFRAME element that triggers a redirect, a second IFRAME element that does not trigger a redirect, and an eval of a WindowProxy object, aka "Universal XSS (UXSS).", No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2010-0817
CVE-2010-0817, State: PUBLISHED, Published: 2010-04-29T21:00:00, Updated: 2024-08-07T00:59:39.332Z, Description: Cross-site scripting (XSS) vulnerability in _layouts/help.aspx in Microsoft SharePoint Server 2007 12.0.0.6421 and possibly earlier, and SharePoint Services 3.0 SP1 and SP2, versions, allows remote attackers to inject arbitrary web script or HTML via the cid0 parameter., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-11068
CVE-2020-11068, State: PUBLISHED, Published: 2020-06-23T16:40:12, Updated: 2024-08-04T11:21:14.647Z, Description: In LoRaMac-node before 4.4.4, a reception buffer overflow can happen due to the received buffer size not being checked. This has been fixed in 4.4.4., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: LOW, Base Score: 5, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-11055
CVE-2020-11055, State: PUBLISHED, Published: 2020-05-07T20:40:14, Updated: 2024-08-04T11:21:14.640Z, Description: In BookStack greater than or equal to 0.18.0 and less than 0.29.2, there is an XSS vulnerability in comment creation. A user with permission to create comments could POST HTML directly to the system to be saved in a comment, which would then be executed/displayed to others users viewing the comment. Through this vulnerability custom JavaScript code could be injected and therefore ran on other user machines. This most impacts scenarios where not-trusted users are given permission to create comments. This has been fixed in 0.29.2., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: LOW, Base Score: 6.3, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-11023
CVE-2020-11023, State: PUBLISHED, Published: 2020-04-29T00:00:00, Updated: 2024-08-04T11:21:14.226Z, Description: In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 6.9, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: LOW, Privileges Required: NONE, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
Describe the vulnerability CVE-2013-0707
CVE-2013-0707, State: PUBLISHED, Published: 2013-03-01T02:00:00Z, Updated: 2024-09-16T19:35:50.586Z, Description: Unspecified vulnerability in JustSystems Ichitaro 2006 and 2007, Ichitaro Government 2006 and 2007, Ichitaro Portable with oreplug, Hanako 2006 through 2013, Hanako Police, Hanako Police 3, and Hanako Police 2010 allows remote attackers to execute arbitrary code via a crafted file., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2015-6480
CVE-2015-6480 in MessageBrokerServlet servlet in Moxa OnCell Central Manager before 2.2. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059 : Command and Scripting Interpreter.
Describe the vulnerability CVE-2020-15188
CVE-2020-15188, State: PUBLISHED, Published: 2020-09-18T17:05:18, Updated: 2024-08-04T13:08:22.678Z, Description: SOY CMS 3.0.2.327 and earlier is affected by Unauthenticated Remote Code Execution (RCE). The allows remote attackers to execute any arbitrary code when the inquiry form feature is enabled by the service. The vulnerability is caused by unserializing the form without any restrictions. This was fixed in 3.0.2.328., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 10, Base Severity: CRITICAL, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe the vulnerability CVE-2016-0728
CVE-2016-0728, State: PUBLISHED, Published: 2016-02-08T02:00:00, Updated: 2024-08-05T22:30:03.960Z, Description: The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2017-18362
CVE-2017-18362 in ConnectWise ManagedITSync integration through 2017 for Kaseya VSA. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059 : Command and Scripting Interpreter.
Describe the vulnerability CVE-2020-3198
CVE-2020-3198, State: PUBLISHED, Published: 2020-06-03T17:45:13.516630Z, Updated: 2024-11-15T17:13:29.986Z, Description: Multiple vulnerabilities in Cisco IOS Software for Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could allow an unauthenticated, remote attacker or an authenticated, local attacker to execute arbitrary code on an affected system or cause an affected system to crash and reload. For more information about these vulnerabilities, see the Details section of this advisory., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 9.8, Base Severity: CRITICAL, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.
Describe MITRE technique T1491.002
MITRE T1491.002 : External Defacement from enterprise An adversary may deface systems external to an organization in an attempt to deliver messaging, intimidate, or otherwise mislead an organization or users. [External Defacement](T1491.002) may ultimately cause users to distrust the systems and to question/discredit the system’s integrity. Externally-facing websites are a common victim of defacement; often targeted by adversary and hacktivist groups in order to push a political message or spread propaganda.(Citation: FireEye Cyber Threats to Media Industries)(Citation: Kevin Mandia Statement to US Senate Committee on Intelligence)(Citation: Anonymous Hackers Deface Russian Govt Site) [External Defacement](T1491.002) may be used as a catalyst to trigger events, or as a response to actions taken by an organization or government. Similarly, website defacement may also be used as setup, or a precursor, for future attacks such as [Drive-by Compromise](T1189).(Citation: Trend Micro Deep Dive Into Defacement)
Techniques related with vulnerability CVE-2018-15771
CVE-2018-15771 in Dell EMC RecoverPoint. Has primary impact with T1078.001 : Default Accounts. Has secondary impact with T1005 : Data from Local System.
Describe the vulnerability CVE-2020-5376
CVE-2020-5376, State: PUBLISHED, Published: 2020-09-02T20:55:18.175503Z, Updated: 2024-09-16T22:55:30.381Z, Description: Dell Inspiron 7347 BIOS versions prior to A13 contain a UEFI BIOS Boot Services overwrite vulnerability. A local attacker with access to system memory may exploit this vulnerability by overwriting the EFI_BOOT_SERVICES structure to execute arbitrary code in System Management Mode (SMM)., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: PHYSICAL, Availability Impact: HIGH, Base Score: 6.8, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-4408
CVE-2020-4408, State: PUBLISHED, Published: 2020-07-27T13:31:24.390133Z, Updated: 2024-09-16T22:21:01.778Z, Description: The IBM QRadar Advisor 1.1 through 2.5.2 with Watson App for IBM QRadar SIEM does not adequately mask all passwords during input, which could be obtained by a physical attacker nearby. IBM X-Force ID: 179536., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: PHYSICAL, Availability Impact: NONE, Base Score: 4.2, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: NONE, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2013-0641
CVE-2013-0641 in Adobe Reader and Acrobat 9.x before 9.5.4, 10.x before 10.1.6, and 11.x before 11.0.02. Is related with T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2015-2419
CVE-2015-2419, State: PUBLISHED, Published: 2015-07-14T21:00:00, Updated: 2024-08-06T05:10:16.731Z, Description: JScript 9 in Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "JScript9 Memory Corruption Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2017-1001000
CVE-2017-1001000, State: PUBLISHED, Published: 2017-04-03T01:00:00, Updated: 2024-08-05T22:00:41.671Z, Description: The register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in the REST API in WordPress 4.7.x before 4.7.2 does not require an integer identifier, which allows remote attackers to modify arbitrary pages via a request for wp-json/wp/v2/posts followed by a numeric value and a non-numeric value, as demonstrated by the wp-json/wp/v2/posts/123?id=123helloworld URI., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-11039
CVE-2020-11039 in FreeRDP. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1005 : Data from Local System. Has primary impact with T1499.004 : Application or System Exploitation.
Describe the vulnerability CVE-2020-15143
CVE-2020-15143, State: PUBLISHED, Published: 2020-08-19T20:40:12, Updated: 2024-08-04T13:08:22.247Z, Description: In SyliusResourceBundle before versions 1.3.14, 1.4.7, 1.5.2 and 1.6.4, rrequest parameters injected inside an expression evaluated by `symfony/expression-language` package haven't been sanitized properly. This allows the attacker to access any public service by manipulating that request parameter, allowing for Remote Code Execution. This issue has been patched for versions 1.3.14, 1.4.7, 1.5.2 and 1.6.4. Versions prior to 1.3 were not patched., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 7.7, Base Severity: HIGH, Confidentiality Impact: NONE, Integrity Impact: HIGH, Privileges Required: LOW, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2019-6522
CVE-2019-6522 in Moxa IKS, EDS. Has primary impact with T1005 : Data from Local System. Has primary impact with T1499.004 : Application or System Exploitation.
Techniques related with vulnerability CVE-2020-3233
CVE-2020-3233 in Cisco IOx. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link.
Describe the vulnerability CVE-2018-18665
CVE-2018-18665, State: PUBLISHED, Published: 2018-12-28T17:00:00, Updated: 2024-08-05T11:16:00.187Z, Description: The mintToken function of Nexxus (NXX) aka NexxusToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-5336
CVE-2020-5336, State: PUBLISHED, Published: 2020-05-04T18:50:21.452332Z, Updated: 2024-09-17T03:14:04.607Z, Description: RSA Archer, versions prior to 6.7 P1 (6.7.0.1), contain a URL injection vulnerability. An unauthenticated attacker could potentially exploit this vulnerability by tricking a victim application user to execute malicious JavaScript code on the affected system., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 4.6, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-1747
CVE-2019-1747, State: PUBLISHED, Published: 2019-03-27T23:50:19.444956Z, Updated: 2024-11-19T19:13:22.995Z, Description: A vulnerability in the implementation of the Short Message Service (SMS) handling functionality of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to improper processing of SMS protocol data units (PDUs) that are encoded with a special character set. An attacker could exploit this vulnerability by sending a malicious SMS message to an affected device. A successful exploit could allow the attacker to cause the wireless WAN (WWAN) cellular interface module on an affected device to crash, resulting in a DoS condition that would require manual intervention to restore normal operating conditions., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.6, Base Severity: HIGH, Confidentiality Impact: NONE, Integrity Impact: NONE, Privileges Required: NONE, Scope: CHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Describe the vulnerability CVE-2018-17934
CVE-2018-17934, State: PUBLISHED, Published: 2018-11-27T21:00:00, Updated: 2024-08-05T11:01:14.683Z, Description: NUUO CMS All versions 3.3 and prior the application allows external input to construct a pathname that is able to be resolved outside the intended directory. This could allow an attacker to impersonate a legitimate user, obtain restricted information, or execute arbitrary code., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2019-16768
CVE-2019-16768 in Sylius. Has primary impact with T1005 : Data from Local System.
Describe the vulnerability CVE-2015-2360
CVE-2015-2360, State: PUBLISHED, Published: 2015-06-10T01:00:00, Updated: 2024-08-06T05:10:16.498Z, Description: win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application, aka "Win32k Elevation of Privilege Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-10602
CVE-2020-10602 in OSIsoft PI System multiple products and versions. Has primary impact with T1499.004 : Application or System Exploitation.
Describe the vulnerability CVE-2020-15093
CVE-2020-15093, State: PUBLISHED, Published: 2020-07-09T18:45:16, Updated: 2024-08-04T13:08:21.663Z, Description: The tough library (Rust/crates.io) prior to version 0.7.1 does not properly verify the threshold of cryptographic signatures. It allows an attacker to duplicate a valid signature in order to circumvent TUF requiring a minimum threshold of unique signatures before the metadata is considered valid. A fix is available in version 0.7.1. CVE-2020-6174 is assigned to the same vulnerability in the TUF reference implementation., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 8.6, Base Severity: HIGH, Confidentiality Impact: NONE, Integrity Impact: HIGH, Privileges Required: NONE, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2015-1642
CVE-2015-1642 in Microsoft Office. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File.
Describe the vulnerability CVE-2014-6332
CVE-2014-6332, State: PUBLISHED, Published: 2014-11-11T22:00:00, Updated: 2024-08-06T12:10:13.255Z, Description: OleAut32.dll in OLE in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted web site, as demonstrated by an array-redimensioning attempt that triggers improper handling of a size value in the SafeArrayDimen function, aka "Windows OLE Automation Array Remote Code Execution Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-3133
CVE-2020-3133, State: PUBLISHED, Published: 2020-09-23T00:25:34.624599Z, Updated: 2024-11-13T18:06:30.524Z, Description: A vulnerability in the email message scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured filters on the device. The vulnerability is due to improper validation of incoming emails. An attacker could exploit this vulnerability by sending a crafted email message to a recipient protected by the ESA. A successful exploit could allow the attacker to bypass the configured content filters, which could allow malicious content to pass through the device., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 5.8, Base Severity: MEDIUM, Confidentiality Impact: NONE, Integrity Impact: LOW, Privileges Required: NONE, Scope: CHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Techniques related with vulnerability CVE-2010-0840
CVE-2010-0840 in Java Runtime Environment. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File.
Techniques related with vulnerability CVE-2020-14508
CVE-2020-14508 in GateManager. Has primary impact with T1059 : Command and Scripting Interpreter. Has primary impact with T1499 : Endpoint Denial of Service. Has an exploitation technique T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2020-12000
CVE-2020-12000 in Ignition 8 Gateway. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1133 : External Remote Services.
Describe the vulnerability CVE-2018-15764
CVE-2018-15764, State: PUBLISHED, Published: 2018-09-28T18:00:00Z, Updated: 2024-09-16T23:26:42.377Z, Description: Dell EMC ESRS Policy Manager versions 6.8 and prior contain a remote code execution vulnerability due to improper configurations of triggered JMX services. A remote unauthenticated attacker may potentially exploit this vulnerability to execute arbitrary code in the server's JVM., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 9.8, Base Severity: CRITICAL, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2019-18582
CVE-2019-18582 in Data Protection Advisor. Has primary impact with T1059 : Command and Scripting Interpreter.
Describe the vulnerability CVE-2012-0181
CVE-2012-0181, State: PUBLISHED, Published: 2012-05-09T00:00:00, Updated: 2024-08-06T18:16:19.277Z, Description: win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview does not properly manage Keyboard Layout files, which allows local users to gain privileges via a crafted application, aka "Keyboard Layout File Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-16198
CVE-2020-16198 in Philips Clinical Collaboration Platform. Has primary impact with T1036 : Masquerading.
Describe the vulnerability CVE-2019-1620
CVE-2019-1620, State: PUBLISHED, Published: 2019-06-27T03:05:26.301580Z, Updated: 2024-11-19T19:03:59.115Z, Description: A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to upload arbitrary files on an affected device. The vulnerability is due to incorrect permission settings in affected DCNM software. An attacker could exploit this vulnerability by uploading specially crafted data to the affected device. A successful exploit could allow the attacker to write arbitrary files on the filesystem and execute code with root privileges on the affected device., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 9.8, Base Severity: CRITICAL, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any malicious use of the vulnerability that is described in this advisory.
Describe MITRE technique T1059.001
MITRE T1059.001 : PowerShell from enterprise Adversaries may abuse PowerShell commands and scripts for execution. PowerShell is a powerful interactive command-line interface and scripting environment included in the Windows operating system.(Citation: TechNet PowerShell) Adversaries can use PowerShell to perform a number of actions, including discovery of information and execution of code. Examples include the `Start-Process` cmdlet which can be used to run an executable and the `Invoke-Command` cmdlet which runs a command locally or on a remote computer (though administrator permissions are required to use PowerShell to connect to remote systems). PowerShell may also be used to download and run executables from the Internet, which can be executed from disk or in memory without touching disk. A number of PowerShell-based offensive testing tools are available, including [Empire](S0363), [PowerSploit](S0194), [PoshC2](S0378), and PSAttack.(Citation: Github PSAttack) PowerShell commands/scripts can also be executed without directly invoking the `powershell.exe` binary through interfaces to PowerShell's underlying `System.Management.Automation` assembly DLL exposed through the .NET framework and Windows Common Language Interface (CLI).(Citation: Sixdub PowerPick Jan 2016)(Citation: SilentBreak Offensive PS Dec 2015)(Citation: Microsoft PSfromCsharp APR 2014)
Techniques related with vulnerability CVE-2018-0802
CVE-2018-0802 in Equation Editor. Is related with T1189 : Drive-by Compromise.
Describe the vulnerability CVE-2019-18935
CVE-2019-18935, State: PUBLISHED, Published: 2019-12-11T00:00:00, Updated: 2024-08-05T02:02:40.029Z, Description: Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deserialization vulnerability in the RadAsyncUpload function. This is exploitable when the encryption keys are known due to the presence of CVE-2017-11317 or CVE-2017-11357, or other means. Exploitation can result in remote code execution. (As of 2020.1.114, a default setting prevents the exploit. In 2019.3.1023, but not earlier versions, a non-default setting can prevent exploitation.), No CVSS metrics available, Exploit Info: No exploit information available
Describe MITRE technique T1496
MITRE T1496 : Resource Hijacking from enterprise Adversaries may leverage the resources of co-opted systems to complete resource-intensive tasks, which may impact system and/or hosted service availability. One common purpose for Resource Hijacking is to validate transactions of cryptocurrency networks and earn virtual currency. Adversaries may consume enough system resources to negatively impact and/or cause affected machines to become unresponsive.(Citation: Kaspersky Lazarus Under The Hood Blog 2017) Servers and cloud-based systems are common targets because of the high potential for available resources, but user endpoint systems may also be compromised and used for Resource Hijacking and cryptocurrency mining.(Citation: CloudSploit - Unused AWS Regions) Containerized environments may also be targeted due to the ease of deployment via exposed APIs and the potential for scaling mining activities by deploying or compromising multiple containers within an environment or cluster.(Citation: Unit 42 Hildegard Malware)(Citation: Trend Micro Exposed Docker APIs) Additionally, some cryptocurrency mining malware identify then kill off processes for competing malware to ensure it’s not competing for resources.(Citation: Trend Micro War of Crypto Miners) Adversaries may also use malware that leverages a system's network bandwidth as part of a botnet in order to facilitate [Network Denial of Service](T1498) campaigns and/or to seed malicious torrents.(Citation: GoBotKR) Alternatively, they may engage in proxyjacking by selling use of the victims' network bandwidth and IP address to proxyware services.(Citation: Sysdig Proxyjacking)
Techniques related with vulnerability CVE-2011-3402
CVE-2011-3402 in win32k.sys in the kernel-mode drivers in Microsoft Windows. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
Techniques related with vulnerability CVE-2020-1206
CVE-2020-1206 in Windows 10 Version 1909 for 32-bit Systems. Is related with T1210 : Exploitation of Remote Services.
Describe the vulnerability CVE-2019-15994
CVE-2019-15994, State: PUBLISHED, Published: 2019-11-26T03:41:56.324794Z, Updated: 2024-09-17T00:11:54.519Z, Description: A vulnerability in the web-based management interface of Cisco Stealthwatch Enterprise could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 5.4, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Describe the vulnerability CVE-2019-15963
CVE-2019-15963, State: PUBLISHED, Published: 2020-09-23T00:27:17.490785Z, Updated: 2024-11-13T18:03:07.693Z, Description: A vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an authenticated, remote attacker to view sensitive information in the web-based management interface of the affected software. The vulnerability is due to insufficient protection of user-supplied input by the web-based management interface of the affected service. An attacker could exploit this vulnerability by accessing the interface and viewing restricted portions of the software configuration. A successful exploit could allow the attacker to gain access to sensitive information or conduct further attacks., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 4.3, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: NONE, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Describe the vulnerability CVE-2019-5954
CVE-2019-5954, State: PUBLISHED, Published: 2019-05-17T15:25:56, Updated: 2024-08-04T20:09:23.965Z, Description: JR East Japan train operation information push notification App for Android version 1.2.4 and earlier allows remote attackers to bypass access restriction to obtain or alter the user's registered information via unspecified vectors., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-3763
CVE-2019-3763, State: PUBLISHED, Published: 2019-09-11T19:17:30.440600Z, Updated: 2024-09-16T22:20:25.143Z, Description: The RSA Identity Governance and Lifecycle software and RSA Via Lifecycle and Governance products prior to 7.1.0 P08 contain an information exposure vulnerability. The Office 365 user password may get logged in a plain text format in the Office 365 connector debug log file. An authenticated malicious local user with access to the debug logs may obtain the exposed password to use in further attacks., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: HIGH, Base Score: 8.8, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-8431
CVE-2018-8431, State: PUBLISHED, Published: 2018-09-13T00:00:00, Updated: 2024-08-05T06:54:36.320Z, Description: An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint Elevation of Privilege Vulnerability." This affects Microsoft SharePoint Server, Microsoft SharePoint. This CVE ID is unique from CVE-2018-8428., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-11896
CVE-2020-11896 in Treck TCP/IP stack before 6.0.1.66. Is related with T1190 : Exploit Public-Facing Application. Is related with T1203 : Exploitation for Client Execution. Is related with T1499 : Endpoint Denial of Service.
Techniques related with vulnerability CVE-2010-3653
CVE-2010-3653 in Adobe Shockwave Player before 11.5.9.615. Is related with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2014-4123
CVE-2014-4123 in Internet Explorer 7 through 11. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File.
Describe the vulnerability CVE-2017-15211
CVE-2017-15211, State: PUBLISHED, Published: 2017-10-10T05:00:00Z, Updated: 2024-09-16T18:33:26.083Z, Description: In Kanboard before 1.0.47, by altering form data, an authenticated user can add an external link to a private project of another user., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-5261
CVE-2020-5261, State: PUBLISHED, Published: 2020-03-25T01:15:15, Updated: 2024-08-04T08:22:09.101Z, Description: Saml2 Authentication services for ASP.NET (NuGet package Sustainsys.Saml2) greater than 2.0.0, and less than version 2.5.0 has a faulty implementation of Token Replay Detection. Token Replay Detection is an important defence in depth measure for Single Sign On solutions. The 2.5.0 version is patched. Note that version 1.0.1 is not affected. It has a correct Token Replay Implementation and is safe to use. Saml2 Authentication services for ASP.NET (NuGet package Sustainsys.Saml2) greater than 2.0.0, and less than version 2.5.0 have a faulty implementation of Token Replay Detection. Token Replay Detection is an important defense measure for Single Sign On solutions. The 2.5.0 version is patched. Note that version 1.0.1 and prior versions are not affected. These versions have a correct Token Replay Implementation and are safe to use., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 8.2, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-15956
CVE-2019-15956, State: PUBLISHED, Published: 2019-11-26T03:11:43.562771Z, Updated: 2024-11-20T17:04:44.749Z, Description: A vulnerability in the web management interface of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform an unauthorized system reset on an affected device. The vulnerability is due to improper authorization controls for a specific URL in the web management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could have a twofold impact: the attacker could either change the administrator password, gaining privileged access, or reset the network configuration details, causing a denial of service (DoS) condition. In both scenarios, manual intervention is required to restore normal operations., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.8, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Describe the vulnerability CVE-2019-13522
CVE-2019-13522, State: PUBLISHED, Published: 2019-09-04T14:29:00, Updated: 2024-08-04T23:57:39.167Z, Description: An attacker could use a specially crafted project file to corrupt the memory and execute code under the privileges of the EZ PLC Editor Versions 1.8.41 and prior., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2012-1675
CVE-2012-1675 in Oracle Database 11g and 10g. Is related with T1190 : Exploit Public-Facing Application. Is related with T1499.004 : Application or System Exploitation.
Describe the vulnerability CVE-2020-11044
CVE-2020-11044, State: PUBLISHED, Published: 2020-05-07T00:00:00, Updated: 2024-08-04T11:21:14.476Z, Description: In FreeRDP greater than 1.2 and before 2.0.0, a double free in update_read_cache_bitmap_v3_order crashes the client application if corrupted data from a manipulated server is parsed. This has been patched in 2.0.0., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: LOW, Base Score: 2.2, Base Severity: LOW, Confidentiality Impact: NONE, Integrity Impact: NONE, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe MITRE technique T1485
MITRE T1485 : Data Destruction from enterprise Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources. Data destruction is likely to render stored data irrecoverable by forensic techniques through overwriting files or data on local and remote drives.(Citation: Symantec Shamoon 2012)(Citation: FireEye Shamoon Nov 2016)(Citation: Palo Alto Shamoon Nov 2016)(Citation: Kaspersky StoneDrill 2017)(Citation: Unit 42 Shamoon3 2018)(Citation: Talos Olympic Destroyer 2018) Common operating system file deletion commands such as `del` and `rm` often only remove pointers to files without wiping the contents of the files themselves, making the files recoverable by proper forensic methodology. This behavior is distinct from [Disk Content Wipe](T1561.001) and [Disk Structure Wipe](T1561.002) because individual files are destroyed rather than sections of a storage disk or the disk's logical structure. Adversaries may attempt to overwrite files and directories with randomly generated data to make it irrecoverable.(Citation: Kaspersky StoneDrill 2017)(Citation: Unit 42 Shamoon3 2018) In some cases politically oriented image files have been used to overwrite data.(Citation: FireEye Shamoon Nov 2016)(Citation: Palo Alto Shamoon Nov 2016)(Citation: Kaspersky StoneDrill 2017) To maximize impact on the target organization in operations where network-wide availability interruption is the goal, malware designed for destroying data may have worm-like features to propagate across a network by leveraging additional techniques like [Valid Accounts](T1078), [OS Credential Dumping](T1003), and [SMB/Windows Admin Shares](T1021.002).(Citation: Symantec Shamoon 2012)(Citation: FireEye Shamoon Nov 2016)(Citation: Palo Alto Shamoon Nov 2016)(Citation: Kaspersky StoneDrill 2017)(Citation: Talos Olympic Destroyer 2018). In cloud environments, adversaries may leverage access to delete cloud storage, cloud storage accounts, machine images, and other infrastructure crucial to operations to damage an organization or their customers.(Citation: Data Destruction - Threat Post)(Citation: DOJ - Cisco Insider)
Techniques related with vulnerability CVE-2018-8599
CVE-2018-8599 in Microsoft Visual Studio. Is related with T1068 : Exploitation for Privilege Escalation.
Techniques related with vulnerability CVE-2018-18667
CVE-2018-18667 in mintToken function of Pylon. Is related with T0828 : Loss of Productivity and Revenue. Is related with T1565 : Data Manipulation.
Techniques related with vulnerability CVE-2018-15397
CVE-2018-15397 in Cisco Adaptive Security Appliance (ASA) Software. Has primary impact with T1529 : System Shutdown/Reboot. Has an exploitation technique T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2010-3333
CVE-2010-3333 in Microsoft Office. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2020-12029
CVE-2020-12029, State: PUBLISHED, Published: 2020-07-20T14:56:42.195322Z, Updated: 2024-09-16T22:02:56.282Z, Description: All versions of FactoryTalk View SE do not properly validate input of filenames within a project directory. A remote, unauthenticated attacker may be able to execute a crafted file on a remote endpoint that may result in remote code execution (RCE). Rockwell Automation recommends applying patch 1126289. Before installing this patch, the patch rollup dated 06 Apr 2020 or later MUST be applied. 1066644 – Patch Roll-up for CPR9 SRx., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: NONE, Base Score: 9, Base Severity: CRITICAL, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-16874
CVE-2020-16874, State: PUBLISHED, Published: 2020-09-11T17:08:47, Updated: 2024-08-04T13:45:34.227Z, Description: No description available, CVSS v3.1 - Attack Complexity: N/A, Attack Vector: N/A, Availability Impact: N/A, Base Score: 7.8, Base Severity: HIGH, Confidentiality Impact: N/A, Integrity Impact: N/A, Privileges Required: N/A, Scope: N/A, User Interaction: N/A, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2011-4106
CVE-2011-4106 in TimThumb (timthumb.php) before 2.0. Is related with T1190 : Exploit Public-Facing Application. Is related with T1505.003 : Web Shell.
Describe the vulnerability CVE-2020-5366
CVE-2020-5366, State: PUBLISHED, Published: 2020-07-09T13:45:13.810635Z, Updated: 2024-09-16T17:29:00.784Z, Description: Dell EMC iDRAC9 versions prior to 4.20.20.20 contain a Path Traversal Vulnerability. A remote authenticated malicious user with low privileges could potentially exploit this vulnerability by manipulating input parameters to gain unauthorized read access to the arbitrary files., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: LOW, Base Score: 7.1, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: NONE, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-10610
CVE-2018-10610, State: PUBLISHED, Published: 2018-10-09T21:00:00Z, Updated: 2024-09-16T21:04:28.173Z, Description: An out-of-bounds vulnerability in LeviStudioU, Versions 1.8.29 and 1.8.44 can be exploited when the application processes specially crafted project files., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-18995
CVE-2018-18995, State: PUBLISHED, Published: 2019-01-03T22:00:00, Updated: 2024-08-05T11:23:08.574Z, Description: Pluto Safety PLC Gateway Ethernet devices ABB GATE-E1 and GATE-E2 all versions do not allow authentication to be configured on administrative telnet or web interfaces, which could enable various effects vectors, including conducting device resets, reading or modifying registers, and changing configuration settings such as IP addresses., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-11219
CVE-2019-11219, State: PUBLISHED, Published: 2019-04-26T18:47:24, Updated: 2024-08-04T22:48:09.008Z, Description: The algorithm used to generate device IDs (UIDs) for devices that utilize Shenzhen Yunni Technology iLnkP2P suffers from a predictability flaw that allows remote attackers to establish direct connections to arbitrary devices., No CVSS metrics available, Exploit Info: No exploit information available
Describe MITRE technique T1091
MITRE T1091 : Replication Through Removable Media from enterprise Adversaries may move onto systems, possibly those on disconnected or air-gapped networks, by copying malware to removable media and taking advantage of Autorun features when the media is inserted into a system and executes. In the case of Lateral Movement, this may occur through modification of executable files stored on removable media or by copying malware and renaming it to look like a legitimate file to trick users into executing it on a separate system. In the case of Initial Access, this may occur through manual manipulation of the media, modification of systems used to initially format the media, or modification to the media's firmware itself. Mobile devices may also be used to infect PCs with malware if connected via USB.(Citation: Exploiting Smartphone USB ) This infection may be achieved using devices (Android, iOS, etc.) and, in some instances, USB charging cables.(Citation: Windows Malware Infecting Android)(Citation: iPhone Charging Cable Hack) For example, when a smartphone is connected to a system, it may appear to be mounted similar to a USB-connected disk drive. If malware that is compatible with the connected system is on the mobile device, the malware could infect the machine (especially if Autorun features are enabled).
Techniques related with vulnerability CVE-2019-1118
CVE-2019-1118 in Windows. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation. Has secondary impact with T1485 : Data Destruction. Has secondary impact with T1136 : Create Account. Has an exploitation technique T1189 : Drive-by Compromise. Has an exploitation technique T1204.002 : Malicious File.
Describe the vulnerability CVE-2017-14486
CVE-2017-14486, State: PUBLISHED, Published: 2017-12-01T17:00:00, Updated: 2024-08-05T19:27:40.630Z, Description: The Vibease Wireless Remote Vibrator app for Android and the Vibease Chat app for iOS use cleartext to exchange messages with other apps and the PLAIN SASL mechanism to send auth tokens to Vibease servers, which allows remote attackers to obtain user credentials, messages, and other sensitive information by sniffing the network for XMPP traffic., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-11668
CVE-2020-11668, State: PUBLISHED, Published: 2020-04-09T20:13:02, Updated: 2024-08-04T11:35:13.625Z, Description: In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-18990
CVE-2018-18990, State: PUBLISHED, Published: 2019-02-05T18:00:00Z, Updated: 2024-09-17T01:21:51.337Z, Description: LCDS Laquis SCADA prior to version 4.1.0.4150 allows a user-supplied path in file operations prior to proper validation. An attacker can leverage this vulnerability to disclose sensitive information under the context of the web server process., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-5365
CVE-2020-5365, State: PUBLISHED, Published: 2020-05-20T20:45:18.564948Z, Updated: 2024-09-16T17:17:39.870Z, Description: Dell EMC Isilon versions 8.2.2 and earlier contain a remotesupport vulnerability. The pre-configured support account, remotesupport, is bundled in the Dell EMC Isilon OneFS installation. This account is used for diagnostics and other support functions. Although the default password is different for every cluster, it is predictable., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: LOW, Base Score: 5.3, Base Severity: MEDIUM, Confidentiality Impact: NONE, Integrity Impact: NONE, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-5902
CVE-2020-5902, State: PUBLISHED, Published: 2020-07-01T00:00:00, Updated: 2024-08-04T08:47:40.698Z, Description: In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-15189
CVE-2020-15189, State: PUBLISHED, Published: 2020-09-18T17:20:16, Updated: 2024-08-04T13:08:22.649Z, Description: SOY CMS 3.0.2 and earlier is affected by Remote Code Execution (RCE) using Unrestricted File Upload. Cross-Site Scripting(XSS) vulnerability that was used in CVE-2020-15183 can be used to increase impact by redirecting the administrator to access a specially crafted page. This vulnerability is caused by insecure configuration in elFinder. This is fixed in version 3.0.2.328., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 6.8, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-3754
CVE-2019-3754, State: PUBLISHED, Published: 2019-09-03T16:52:53.915317Z, Updated: 2024-09-17T02:00:48.399Z, Description: Dell EMC Unity Operating Environment versions prior to 5.0.0.0.5.116, Dell EMC UnityVSA versions prior to 5.0.0.0.5.116 and Dell EMC VNXe3200 versions prior to 3.1.10.9946299 contain a reflected cross-site scripting vulnerability on the cas/logout page. A remote unauthenticated attacker could potentially exploit this vulnerability by tricking a victim application user to supply malicious HTML or Java Script code to Unisphere, which is then reflected back to the victim and executed by the web browser., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 4.7, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: NONE, Privileges Required: NONE, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
Describe MITRE technique T0880
MITRE T0880 : Loss of Safety from ics Adversaries may compromise safety system functions designed to maintain safe operation of a process when unacceptable or dangerous conditions occur. Safety systems are often composed of the same elements as control systems but have the sole purpose of ensuring the process fails in a predetermined safe manner. Many unsafe conditions in process control happen too quickly for a human operator to react to. Speed is critical in correcting these conditions to limit serious impacts such as Loss of Control and Property Damage. Adversaries may target and disable safety system functions as a prerequisite to subsequent attack execution or to allow for future unsafe conditionals to go unchecked. Detection of a Loss of Safety by operators can result in the shutdown of a process due to strict policies regarding safety systems. This can cause a Loss of Productivity and Revenue and may meet the technical goals of adversaries seeking to cause process disruptions.
Techniques related with vulnerability CVE-2018-15772
CVE-2018-15772 in Dell EMC RecoverPoint. Has primary impact with T1499 : Endpoint Denial of Service.
Describe the vulnerability CVE-2019-17026
CVE-2019-17026, State: PUBLISHED, Published: 2020-03-02T04:05:03, Updated: 2024-08-05T01:24:48.586Z, Description: Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR < 68.4.1, Thunderbird < 68.4.1, and Firefox < 72.0.1., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-14510
CVE-2020-14510 in GateManager. Has primary impact with T1078.001 : Default Accounts. Has secondary impact with T1068 : Exploitation for Privilege Escalation. Has secondary impact with T1059 : Command and Scripting Interpreter.
Describe the vulnerability CVE-2013-3900
CVE-2013-3900, State: PUBLISHED, Published: 2013-12-11T00:00:00, Updated: 2024-11-14T20:07:40.814Z, Description: No description available, CVSS v3.1 - Attack Complexity: N/A, Attack Vector: N/A, Availability Impact: N/A, Base Score: 7.4, Base Severity: HIGH, Confidentiality Impact: N/A, Integrity Impact: N/A, Privileges Required: N/A, Scope: N/A, User Interaction: N/A, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2019-0903
CVE-2019-0903 in Windows. Is related with T1203 : Exploitation for Client Execution.
Techniques related with vulnerability CVE-2020-15096
CVE-2020-15096 in electron. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2020-5339
CVE-2020-5339 in RSA Authentication Manager. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1185 : Man in the Browser. Has an exploitation technique T1189 : Drive-by Compromise.
Techniques related with vulnerability CVE-2020-5271
CVE-2020-5271 in PrestaShop. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link.
Describe the vulnerability CVE-2015-0984
CVE-2015-0984, State: PUBLISHED, Published: 2015-03-31T01:00:00, Updated: 2024-08-06T04:26:11.564Z, Description: Directory traversal vulnerability in the FTP server on Honeywell Excel Web XL1000C50 52 I/O, XL1000C100 104 I/O, XL1000C500 300 I/O, XL1000C1000 600 I/O, XL1000C50U 52 I/O UUKL, XL1000C100U 104 I/O UUKL, XL1000C500U 300 I/O UUKL, and XL1000C1000U 600 I/O UUKL controllers before 2.04.01 allows remote attackers to read files under the web root, and consequently obtain administrative login access, via a crafted pathname., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-1109
CVE-2020-1109, State: PUBLISHED, Published: 2020-05-21T22:53:10, Updated: 2024-08-04T06:25:01.100Z, Description: An elevation of privilege vulnerability exists when the Windows Update Stack fails to properly handle objects in memory, aka 'Windows Update Stack Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1110., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-5374
CVE-2020-5374, State: PUBLISHED, Published: 2020-07-14T19:30:15.221914Z, Updated: 2024-09-16T18:43:38.509Z, Description: Dell EMC OpenManage Integration for Microsoft System Center (OMIMSSC) for SCCM and SCVMM versions prior to 7.2.1 contain a hard-coded cryptographic key vulnerability. A remote unauthenticated attacker may exploit this vulnerability to gain access to the appliance data for remotely managed devices., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: LOW, Base Score: 8.8, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: LOW, Privileges Required: NONE, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-0708
CVE-2019-0708, State: PUBLISHED, Published: 2019-05-16T18:17:00, Updated: 2024-08-04T17:51:27.186Z, Description: A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2019-16009
CVE-2019-16009 in Cisco IOS 12.2(15)B. Has primary impact with T1608 : Stage Capabilities. Has an exploitation technique T1204.001 : Malicious Link.
Techniques related with vulnerability CVE-2012-3015
CVE-2012-3015 in Siemens SIMATIC STEP7 before 5.5 SP1, as used in SIMATIC PCS7 7.1 SP3 and earlier. Is related with T1190 : Exploit Public-Facing Application. Is related with T1557 : Man-in-the-Middle. Is related with T1213 : Data from Information Repositories.