input stringlengths 30 54 | output stringlengths 69 4.21k |
|---|---|
Describe MITRE technique T1505.003 | MITRE T1505.003 : Web Shell from enterprise Adversaries may backdoor web servers with web shells to establish persistent access to systems. A Web shell is a Web script that is placed on an openly accessible Web server to allow an adversary to access the Web server as a gateway into a network. A Web shell may provide a ... |
Describe the vulnerability CVE-2016-3393 | CVE-2016-3393, State: PUBLISHED, Published: 2016-10-14T01:00:00, Updated: 2024-08-05T23:56:13.408Z, Description: Graphics Device Interface (aka GDI or GDI+) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gol... |
Techniques related with vulnerability CVE-2018-14809 | CVE-2018-14809 in V-Server. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has primary impact with T1005 : Data from Local System. Has primary impact with T1557 : Man-in-the-Middle. |
Describe the vulnerability CVE-2015-0072 | CVE-2015-0072, State: PUBLISHED, Published: 2015-02-07T18:00:00, Updated: 2024-08-06T03:55:27.986Z, Description: Cross-site scripting (XSS) vulnerability in Microsoft Internet Explorer 9 through 11 allows remote attackers to bypass the Same Origin Policy and inject arbitrary web script or HTML via vectors involving an ... |
Describe the vulnerability CVE-2010-0817 | CVE-2010-0817, State: PUBLISHED, Published: 2010-04-29T21:00:00, Updated: 2024-08-07T00:59:39.332Z, Description: Cross-site scripting (XSS) vulnerability in _layouts/help.aspx in Microsoft SharePoint Server 2007 12.0.0.6421 and possibly earlier, and SharePoint Services 3.0 SP1 and SP2, versions, allows remote attackers... |
Describe the vulnerability CVE-2020-11068 | CVE-2020-11068, State: PUBLISHED, Published: 2020-06-23T16:40:12, Updated: 2024-08-04T11:21:14.647Z, Description: In LoRaMac-node before 4.4.4, a reception buffer overflow can happen due to the received buffer size not being checked. This has been fixed in 4.4.4., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NET... |
Describe the vulnerability CVE-2020-11055 | CVE-2020-11055, State: PUBLISHED, Published: 2020-05-07T20:40:14, Updated: 2024-08-04T11:21:14.640Z, Description: In BookStack greater than or equal to 0.18.0 and less than 0.29.2, there is an XSS vulnerability in comment creation. A user with permission to create comments could POST HTML directly to the system to be s... |
Describe the vulnerability CVE-2020-11023 | CVE-2020-11023, State: PUBLISHED, Published: 2020-04-29T00:00:00, Updated: 2024-08-04T11:21:14.226Z, Description: In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods ... |
Describe the vulnerability CVE-2013-0707 | CVE-2013-0707, State: PUBLISHED, Published: 2013-03-01T02:00:00Z, Updated: 2024-09-16T19:35:50.586Z, Description: Unspecified vulnerability in JustSystems Ichitaro 2006 and 2007, Ichitaro Government 2006 and 2007, Ichitaro Portable with oreplug, Hanako 2006 through 2013, Hanako Police, Hanako Police 3, and Hanako Polic... |
Techniques related with vulnerability CVE-2015-6480 | CVE-2015-6480 in MessageBrokerServlet servlet in Moxa OnCell Central Manager before 2.2. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059 : Command and Scripting Interpreter. |
Describe the vulnerability CVE-2020-15188 | CVE-2020-15188, State: PUBLISHED, Published: 2020-09-18T17:05:18, Updated: 2024-08-04T13:08:22.678Z, Description: SOY CMS 3.0.2.327 and earlier is affected by Unauthenticated Remote Code Execution (RCE). The allows remote attackers to execute any arbitrary code when the inquiry form feature is enabled by the service. T... |
Describe the vulnerability CVE-2016-0728 | CVE-2016-0728, State: PUBLISHED, Published: 2016-02-08T02:00:00, Updated: 2024-08-05T22:30:03.960Z, Description: The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a... |
Techniques related with vulnerability CVE-2017-18362 | CVE-2017-18362 in ConnectWise ManagedITSync integration through 2017 for Kaseya VSA. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059 : Command and Scripting Interpreter. |
Describe the vulnerability CVE-2020-3198 | CVE-2020-3198, State: PUBLISHED, Published: 2020-06-03T17:45:13.516630Z, Updated: 2024-11-15T17:13:29.986Z, Description: Multiple vulnerabilities in Cisco IOS Software for Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could allow an una... |
Describe MITRE technique T1491.002 | MITRE T1491.002 : External Defacement from enterprise An adversary may deface systems external to an organization in an attempt to deliver messaging, intimidate, or otherwise mislead an organization or users. [External Defacement](T1491.002) may ultimately cause users to distrust the systems and to question/discredit t... |
Techniques related with vulnerability CVE-2018-15771 | CVE-2018-15771 in Dell EMC RecoverPoint. Has primary impact with T1078.001 : Default Accounts. Has secondary impact with T1005 : Data from Local System. |
Describe the vulnerability CVE-2020-5376 | CVE-2020-5376, State: PUBLISHED, Published: 2020-09-02T20:55:18.175503Z, Updated: 2024-09-16T22:55:30.381Z, Description: Dell Inspiron 7347 BIOS versions prior to A13 contain a UEFI BIOS Boot Services overwrite vulnerability. A local attacker with access to system memory may exploit this vulnerability by overwriting th... |
Describe the vulnerability CVE-2020-4408 | CVE-2020-4408, State: PUBLISHED, Published: 2020-07-27T13:31:24.390133Z, Updated: 2024-09-16T22:21:01.778Z, Description: The IBM QRadar Advisor 1.1 through 2.5.2 with Watson App for IBM QRadar SIEM does not adequately mask all passwords during input, which could be obtained by a physical attacker nearby. IBM X-Force ID... |
Techniques related with vulnerability CVE-2013-0641 | CVE-2013-0641 in Adobe Reader and Acrobat 9.x before 9.5.4, 10.x before 10.1.6, and 11.x before 11.0.02. Is related with T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2015-2419 | CVE-2015-2419, State: PUBLISHED, Published: 2015-07-14T21:00:00, Updated: 2024-08-06T05:10:16.731Z, Description: JScript 9 in Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "JScript9 Memory Corruption V... |
Describe the vulnerability CVE-2017-1001000 | CVE-2017-1001000, State: PUBLISHED, Published: 2017-04-03T01:00:00, Updated: 2024-08-05T22:00:41.671Z, Description: The register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in the REST API in WordPress 4.7.x before 4.7.2 does not require an integer identifier, which allows remot... |
Techniques related with vulnerability CVE-2020-11039 | CVE-2020-11039 in FreeRDP. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1005 : Data from Local System. Has primary impact with T1499.004 : Application or System Exploitation. |
Describe the vulnerability CVE-2020-15143 | CVE-2020-15143, State: PUBLISHED, Published: 2020-08-19T20:40:12, Updated: 2024-08-04T13:08:22.247Z, Description: In SyliusResourceBundle before versions 1.3.14, 1.4.7, 1.5.2 and 1.6.4, rrequest parameters injected inside an expression evaluated by `symfony/expression-language` package haven't been sanitized properly. ... |
Techniques related with vulnerability CVE-2019-6522 | CVE-2019-6522 in Moxa IKS, EDS. Has primary impact with T1005 : Data from Local System. Has primary impact with T1499.004 : Application or System Exploitation. |
Techniques related with vulnerability CVE-2020-3233 | CVE-2020-3233 in Cisco IOx. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link. |
Describe the vulnerability CVE-2018-18665 | CVE-2018-18665, State: PUBLISHED, Published: 2018-12-28T17:00:00, Updated: 2024-08-05T11:16:00.187Z, Description: The mintToken function of Nexxus (NXX) aka NexxusToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value., No CVSS metric... |
Describe the vulnerability CVE-2020-5336 | CVE-2020-5336, State: PUBLISHED, Published: 2020-05-04T18:50:21.452332Z, Updated: 2024-09-17T03:14:04.607Z, Description: RSA Archer, versions prior to 6.7 P1 (6.7.0.1), contain a URL injection vulnerability. An unauthenticated attacker could potentially exploit this vulnerability by tricking a victim application user t... |
Describe the vulnerability CVE-2019-1747 | CVE-2019-1747, State: PUBLISHED, Published: 2019-03-27T23:50:19.444956Z, Updated: 2024-11-19T19:13:22.995Z, Description: A vulnerability in the implementation of the Short Message Service (SMS) handling functionality of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trig... |
Describe the vulnerability CVE-2018-17934 | CVE-2018-17934, State: PUBLISHED, Published: 2018-11-27T21:00:00, Updated: 2024-08-05T11:01:14.683Z, Description: NUUO CMS All versions 3.3 and prior the application allows external input to construct a pathname that is able to be resolved outside the intended directory. This could allow an attacker to impersonate a le... |
Techniques related with vulnerability CVE-2019-16768 | CVE-2019-16768 in Sylius. Has primary impact with T1005 : Data from Local System. |
Describe the vulnerability CVE-2015-2360 | CVE-2015-2360, State: PUBLISHED, Published: 2015-06-10T01:00:00, Updated: 2024-08-06T05:10:16.498Z, Description: win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold a... |
Techniques related with vulnerability CVE-2020-10602 | CVE-2020-10602 in OSIsoft PI System multiple products and versions. Has primary impact with T1499.004 : Application or System Exploitation. |
Describe the vulnerability CVE-2020-15093 | CVE-2020-15093, State: PUBLISHED, Published: 2020-07-09T18:45:16, Updated: 2024-08-04T13:08:21.663Z, Description: The tough library (Rust/crates.io) prior to version 0.7.1 does not properly verify the threshold of cryptographic signatures. It allows an attacker to duplicate a valid signature in order to circumvent TUF ... |
Techniques related with vulnerability CVE-2015-1642 | CVE-2015-1642 in Microsoft Office. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File. |
Describe the vulnerability CVE-2014-6332 | CVE-2014-6332, State: PUBLISHED, Published: 2014-11-11T22:00:00, Updated: 2024-08-06T12:10:13.255Z, Description: OleAut32.dll in OLE in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold an... |
Describe the vulnerability CVE-2020-3133 | CVE-2020-3133, State: PUBLISHED, Published: 2020-09-23T00:25:34.624599Z, Updated: 2024-11-13T18:06:30.524Z, Description: A vulnerability in the email message scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured filters on the de... |
Techniques related with vulnerability CVE-2010-0840 | CVE-2010-0840 in Java Runtime Environment. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File. |
Techniques related with vulnerability CVE-2020-14508 | CVE-2020-14508 in GateManager. Has primary impact with T1059 : Command and Scripting Interpreter. Has primary impact with T1499 : Endpoint Denial of Service. Has an exploitation technique T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2020-12000 | CVE-2020-12000 in Ignition 8 Gateway. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1133 : External Remote Services. |
Describe the vulnerability CVE-2018-15764 | CVE-2018-15764, State: PUBLISHED, Published: 2018-09-28T18:00:00Z, Updated: 2024-09-16T23:26:42.377Z, Description: Dell EMC ESRS Policy Manager versions 6.8 and prior contain a remote code execution vulnerability due to improper configurations of triggered JMX services. A remote unauthenticated attacker may potentially... |
Techniques related with vulnerability CVE-2019-18582 | CVE-2019-18582 in Data Protection Advisor. Has primary impact with T1059 : Command and Scripting Interpreter. |
Describe the vulnerability CVE-2012-0181 | CVE-2012-0181, State: PUBLISHED, Published: 2012-05-09T00:00:00, Updated: 2024-08-06T18:16:19.277Z, Description: win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer ... |
Techniques related with vulnerability CVE-2020-16198 | CVE-2020-16198 in Philips Clinical Collaboration Platform. Has primary impact with T1036 : Masquerading. |
Describe the vulnerability CVE-2019-1620 | CVE-2019-1620, State: PUBLISHED, Published: 2019-06-27T03:05:26.301580Z, Updated: 2024-11-19T19:03:59.115Z, Description: A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to upload arbitrary files on an affected device. The ... |
Describe MITRE technique T1059.001 | MITRE T1059.001 : PowerShell from enterprise Adversaries may abuse PowerShell commands and scripts for execution. PowerShell is a powerful interactive command-line interface and scripting environment included in the Windows operating system.(Citation: TechNet PowerShell) Adversaries can use PowerShell to perform a numb... |
Techniques related with vulnerability CVE-2018-0802 | CVE-2018-0802 in Equation Editor. Is related with T1189 : Drive-by Compromise. |
Describe the vulnerability CVE-2019-18935 | CVE-2019-18935, State: PUBLISHED, Published: 2019-12-11T00:00:00, Updated: 2024-08-05T02:02:40.029Z, Description: Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deserialization vulnerability in the RadAsyncUpload function. This is exploitable when the encryption keys are known due to the prese... |
Describe MITRE technique T1496 | MITRE T1496 : Resource Hijacking from enterprise Adversaries may leverage the resources of co-opted systems to complete resource-intensive tasks, which may impact system and/or hosted service availability.
One common purpose for Resource Hijacking is to validate transactions of cryptocurrency networks and earn virtua... |
Techniques related with vulnerability CVE-2011-3402 | CVE-2011-3402 in win32k.sys in the kernel-mode drivers in Microsoft Windows. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2020-1206 | CVE-2020-1206 in Windows 10 Version 1909 for 32-bit Systems. Is related with T1210 : Exploitation of Remote Services. |
Describe the vulnerability CVE-2019-15994 | CVE-2019-15994, State: PUBLISHED, Published: 2019-11-26T03:41:56.324794Z, Updated: 2024-09-17T00:11:54.519Z, Description: A vulnerability in the web-based management interface of Cisco Stealthwatch Enterprise could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user o... |
Describe the vulnerability CVE-2019-15963 | CVE-2019-15963, State: PUBLISHED, Published: 2020-09-23T00:27:17.490785Z, Updated: 2024-11-13T18:03:07.693Z, Description: A vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an authenticated, remote attacker to view sensitive information in the web-based management ... |
Describe the vulnerability CVE-2019-5954 | CVE-2019-5954, State: PUBLISHED, Published: 2019-05-17T15:25:56, Updated: 2024-08-04T20:09:23.965Z, Description: JR East Japan train operation information push notification App for Android version 1.2.4 and earlier allows remote attackers to bypass access restriction to obtain or alter the user's registered information... |
Describe the vulnerability CVE-2019-3763 | CVE-2019-3763, State: PUBLISHED, Published: 2019-09-11T19:17:30.440600Z, Updated: 2024-09-16T22:20:25.143Z, Description: The RSA Identity Governance and Lifecycle software and RSA Via Lifecycle and Governance products prior to 7.1.0 P08 contain an information exposure vulnerability. The Office 365 user password may get... |
Describe the vulnerability CVE-2018-8431 | CVE-2018-8431, State: PUBLISHED, Published: 2018-09-13T00:00:00, Updated: 2024-08-05T06:54:36.320Z, Description: An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint Elevatio... |
Techniques related with vulnerability CVE-2020-11896 | CVE-2020-11896 in Treck TCP/IP stack before 6.0.1.66. Is related with T1190 : Exploit Public-Facing Application. Is related with T1203 : Exploitation for Client Execution. Is related with T1499 : Endpoint Denial of Service. |
Techniques related with vulnerability CVE-2010-3653 | CVE-2010-3653 in Adobe Shockwave Player before 11.5.9.615. Is related with T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2014-4123 | CVE-2014-4123 in Internet Explorer 7 through 11. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File. |
Describe the vulnerability CVE-2017-15211 | CVE-2017-15211, State: PUBLISHED, Published: 2017-10-10T05:00:00Z, Updated: 2024-09-16T18:33:26.083Z, Description: In Kanboard before 1.0.47, by altering form data, an authenticated user can add an external link to a private project of another user., No CVSS metrics available, Exploit Info: No exploit information avail... |
Describe the vulnerability CVE-2020-5261 | CVE-2020-5261, State: PUBLISHED, Published: 2020-03-25T01:15:15, Updated: 2024-08-04T08:22:09.101Z, Description: Saml2 Authentication services for ASP.NET (NuGet package Sustainsys.Saml2) greater than 2.0.0, and less than version 2.5.0 has a faulty implementation of Token Replay Detection. Token Replay Detection is an ... |
Describe the vulnerability CVE-2019-15956 | CVE-2019-15956, State: PUBLISHED, Published: 2019-11-26T03:11:43.562771Z, Updated: 2024-11-20T17:04:44.749Z, Description: A vulnerability in the web management interface of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform an unauthorized system reset... |
Describe the vulnerability CVE-2019-13522 | CVE-2019-13522, State: PUBLISHED, Published: 2019-09-04T14:29:00, Updated: 2024-08-04T23:57:39.167Z, Description: An attacker could use a specially crafted project file to corrupt the memory and execute code under the privileges of the EZ PLC Editor Versions 1.8.41 and prior., No CVSS metrics available, Exploit Info: N... |
Techniques related with vulnerability CVE-2012-1675 | CVE-2012-1675 in Oracle Database 11g and 10g. Is related with T1190 : Exploit Public-Facing Application. Is related with T1499.004 : Application or System Exploitation. |
Describe the vulnerability CVE-2020-11044 | CVE-2020-11044, State: PUBLISHED, Published: 2020-05-07T00:00:00, Updated: 2024-08-04T11:21:14.476Z, Description: In FreeRDP greater than 1.2 and before 2.0.0, a double free in update_read_cache_bitmap_v3_order crashes the client application if corrupted data from a manipulated server is parsed. This has been patched i... |
Describe MITRE technique T1485 | MITRE T1485 : Data Destruction from enterprise Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources. Data destruction is likely to render stored data irrecoverable by forensic techniques through overwriting file... |
Techniques related with vulnerability CVE-2018-8599 | CVE-2018-8599 in Microsoft Visual Studio. Is related with T1068 : Exploitation for Privilege Escalation. |
Techniques related with vulnerability CVE-2018-18667 | CVE-2018-18667 in mintToken function of Pylon. Is related with T0828 : Loss of Productivity and Revenue. Is related with T1565 : Data Manipulation. |
Techniques related with vulnerability CVE-2018-15397 | CVE-2018-15397 in Cisco Adaptive Security Appliance (ASA) Software. Has primary impact with T1529 : System Shutdown/Reboot. Has an exploitation technique T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2010-3333 | CVE-2010-3333 in Microsoft Office. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2020-12029 | CVE-2020-12029, State: PUBLISHED, Published: 2020-07-20T14:56:42.195322Z, Updated: 2024-09-16T22:02:56.282Z, Description: All versions of FactoryTalk View SE do not properly validate input of filenames within a project directory. A remote, unauthenticated attacker may be able to execute a crafted file on a remote endpo... |
Describe the vulnerability CVE-2020-16874 | CVE-2020-16874, State: PUBLISHED, Published: 2020-09-11T17:08:47, Updated: 2024-08-04T13:45:34.227Z, Description: No description available, CVSS v3.1 - Attack Complexity: N/A, Attack Vector: N/A, Availability Impact: N/A, Base Score: 7.8, Base Severity: HIGH, Confidentiality Impact: N/A, Integrity Impact: N/A, Privileg... |
Techniques related with vulnerability CVE-2011-4106 | CVE-2011-4106 in TimThumb (timthumb.php) before 2.0. Is related with T1190 : Exploit Public-Facing Application. Is related with T1505.003 : Web Shell. |
Describe the vulnerability CVE-2020-5366 | CVE-2020-5366, State: PUBLISHED, Published: 2020-07-09T13:45:13.810635Z, Updated: 2024-09-16T17:29:00.784Z, Description: Dell EMC iDRAC9 versions prior to 4.20.20.20 contain a Path Traversal Vulnerability. A remote authenticated malicious user with low privileges could potentially exploit this vulnerability by manipula... |
Describe the vulnerability CVE-2018-10610 | CVE-2018-10610, State: PUBLISHED, Published: 2018-10-09T21:00:00Z, Updated: 2024-09-16T21:04:28.173Z, Description: An out-of-bounds vulnerability in LeviStudioU, Versions 1.8.29 and 1.8.44 can be exploited when the application processes specially crafted project files., No CVSS metrics available, Exploit Info: No explo... |
Describe the vulnerability CVE-2018-18995 | CVE-2018-18995, State: PUBLISHED, Published: 2019-01-03T22:00:00, Updated: 2024-08-05T11:23:08.574Z, Description: Pluto Safety PLC Gateway Ethernet devices ABB GATE-E1 and GATE-E2 all versions do not allow authentication to be configured on administrative telnet or web interfaces, which could enable various effects vec... |
Describe the vulnerability CVE-2019-11219 | CVE-2019-11219, State: PUBLISHED, Published: 2019-04-26T18:47:24, Updated: 2024-08-04T22:48:09.008Z, Description: The algorithm used to generate device IDs (UIDs) for devices that utilize Shenzhen Yunni Technology iLnkP2P suffers from a predictability flaw that allows remote attackers to establish direct connections to... |
Describe MITRE technique T1091 | MITRE T1091 : Replication Through Removable Media from enterprise Adversaries may move onto systems, possibly those on disconnected or air-gapped networks, by copying malware to removable media and taking advantage of Autorun features when the media is inserted into a system and executes. In the case of Lateral Movemen... |
Techniques related with vulnerability CVE-2019-1118 | CVE-2019-1118 in Windows. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation. Has secondary impact with T1485 : Data Destruction. Has ... |
Describe the vulnerability CVE-2017-14486 | CVE-2017-14486, State: PUBLISHED, Published: 2017-12-01T17:00:00, Updated: 2024-08-05T19:27:40.630Z, Description: The Vibease Wireless Remote Vibrator app for Android and the Vibease Chat app for iOS use cleartext to exchange messages with other apps and the PLAIN SASL mechanism to send auth tokens to Vibease servers, ... |
Describe the vulnerability CVE-2020-11668 | CVE-2020-11668, State: PUBLISHED, Published: 2020-04-09T20:13:02, Updated: 2024-08-04T11:35:13.625Z, Description: In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770., No CVSS metrics available, Exploit Info: No... |
Describe the vulnerability CVE-2018-18990 | CVE-2018-18990, State: PUBLISHED, Published: 2019-02-05T18:00:00Z, Updated: 2024-09-17T01:21:51.337Z, Description: LCDS Laquis SCADA prior to version 4.1.0.4150 allows a user-supplied path in file operations prior to proper validation. An attacker can leverage this vulnerability to disclose sensitive information under ... |
Describe the vulnerability CVE-2020-5365 | CVE-2020-5365, State: PUBLISHED, Published: 2020-05-20T20:45:18.564948Z, Updated: 2024-09-16T17:17:39.870Z, Description: Dell EMC Isilon versions 8.2.2 and earlier contain a remotesupport vulnerability. The pre-configured support account, remotesupport, is bundled in the Dell EMC Isilon OneFS installation. This account... |
Describe the vulnerability CVE-2020-5902 | CVE-2020-5902, State: PUBLISHED, Published: 2020-07-01T00:00:00, Updated: 2024-08-04T08:47:40.698Z, Description: In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a ... |
Describe the vulnerability CVE-2020-15189 | CVE-2020-15189, State: PUBLISHED, Published: 2020-09-18T17:20:16, Updated: 2024-08-04T13:08:22.649Z, Description: SOY CMS 3.0.2 and earlier is affected by Remote Code Execution (RCE) using Unrestricted File Upload. Cross-Site Scripting(XSS) vulnerability that was used in CVE-2020-15183 can be used to increase impact by... |
Describe the vulnerability CVE-2019-3754 | CVE-2019-3754, State: PUBLISHED, Published: 2019-09-03T16:52:53.915317Z, Updated: 2024-09-17T02:00:48.399Z, Description: Dell EMC Unity Operating Environment versions prior to 5.0.0.0.5.116, Dell EMC UnityVSA versions prior to 5.0.0.0.5.116 and Dell EMC VNXe3200 versions prior to 3.1.10.9946299 contain a reflected cros... |
Describe MITRE technique T0880 | MITRE T0880 : Loss of Safety from ics Adversaries may compromise safety system functions designed to maintain safe operation of a process when unacceptable or dangerous conditions occur. Safety systems are often composed of the same elements as control systems but have the sole purpose of ensuring the process fails i... |
Techniques related with vulnerability CVE-2018-15772 | CVE-2018-15772 in Dell EMC RecoverPoint. Has primary impact with T1499 : Endpoint Denial of Service. |
Describe the vulnerability CVE-2019-17026 | CVE-2019-17026, State: PUBLISHED, Published: 2020-03-02T04:05:03, Updated: 2024-08-05T01:24:48.586Z, Description: Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Fi... |
Techniques related with vulnerability CVE-2020-14510 | CVE-2020-14510 in GateManager. Has primary impact with T1078.001 : Default Accounts. Has secondary impact with T1068 : Exploitation for Privilege Escalation. Has secondary impact with T1059 : Command and Scripting Interpreter. |
Describe the vulnerability CVE-2013-3900 | CVE-2013-3900, State: PUBLISHED, Published: 2013-12-11T00:00:00, Updated: 2024-11-14T20:07:40.814Z, Description: No description available, CVSS v3.1 - Attack Complexity: N/A, Attack Vector: N/A, Availability Impact: N/A, Base Score: 7.4, Base Severity: HIGH, Confidentiality Impact: N/A, Integrity Impact: N/A, Privilege... |
Techniques related with vulnerability CVE-2019-0903 | CVE-2019-0903 in Windows. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2020-15096 | CVE-2020-15096 in electron. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2020-5339 | CVE-2020-5339 in RSA Authentication Manager. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1185 : Man in the Browser. Has an exploitation technique T1189 : Drive-by Compromise. |
Techniques related with vulnerability CVE-2020-5271 | CVE-2020-5271 in PrestaShop. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link. |
Describe the vulnerability CVE-2015-0984 | CVE-2015-0984, State: PUBLISHED, Published: 2015-03-31T01:00:00, Updated: 2024-08-06T04:26:11.564Z, Description: Directory traversal vulnerability in the FTP server on Honeywell Excel Web XL1000C50 52 I/O, XL1000C100 104 I/O, XL1000C500 300 I/O, XL1000C1000 600 I/O, XL1000C50U 52 I/O UUKL, XL1000C100U 104 I/O UUKL, XL1... |
Describe the vulnerability CVE-2020-1109 | CVE-2020-1109, State: PUBLISHED, Published: 2020-05-21T22:53:10, Updated: 2024-08-04T06:25:01.100Z, Description: An elevation of privilege vulnerability exists when the Windows Update Stack fails to properly handle objects in memory, aka 'Windows Update Stack Elevation of Privilege Vulnerability'. This CVE ID is unique... |
Describe the vulnerability CVE-2020-5374 | CVE-2020-5374, State: PUBLISHED, Published: 2020-07-14T19:30:15.221914Z, Updated: 2024-09-16T18:43:38.509Z, Description: Dell EMC OpenManage Integration for Microsoft System Center (OMIMSSC) for SCCM and SCVMM versions prior to 7.2.1 contain a hard-coded cryptographic key vulnerability. A remote unauthenticated attacke... |
Describe the vulnerability CVE-2019-0708 | CVE-2019-0708, State: PUBLISHED, Published: 2019-05-16T18:17:00, Updated: 2024-08-04T17:51:27.186Z, Description: A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafte... |
Techniques related with vulnerability CVE-2019-16009 | CVE-2019-16009 in Cisco IOS 12.2(15)B. Has primary impact with T1608 : Stage Capabilities. Has an exploitation technique T1204.001 : Malicious Link. |
Techniques related with vulnerability CVE-2012-3015 | CVE-2012-3015 in Siemens SIMATIC STEP7 before 5.5 SP1, as used in SIMATIC PCS7 7.1 SP3 and earlier. Is related with T1190 : Exploit Public-Facing Application. Is related with T1557 : Man-in-the-Middle. Is related with T1213 : Data from Information Repositories. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.