input stringlengths 30 54 | output stringlengths 69 4.21k |
|---|---|
Techniques related with vulnerability CVE-2012-5958 | CVE-2012-5958 in portable SDK for UPnP Devices before 1.6.18. Is related with T1133 : External Remote Services. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2018-2893 | CVE-2018-2893 in WebLogic Server. Is related with T1190 : Exploit Public-Facing Application. |
Describe MITRE technique T1133 | MITRE T1133 : External Remote Services from enterprise Adversaries may leverage external-facing remote services to initially access and/or persist within a network. Remote services such as VPNs, Citrix, and other access mechanisms allow users to connect to internal enterprise network resources from external locations. ... |
Describe the vulnerability CVE-2009-3459 | CVE-2009-3459, State: PUBLISHED, Published: 2009-10-13T10:00:00, Updated: 2024-08-07T06:31:10.547Z, Description: Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory cor... |
Techniques related with vulnerability CVE-2018-11051 | CVE-2018-11051 in Certificate Manager Path Traversal Vulnerability. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2017-8291 | CVE-2017-8291 in Artifex Ghostscript through 2017-04-26. Is related with T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2020-11087 | CVE-2020-11087, State: PUBLISHED, Published: 2020-05-29T00:00:00, Updated: 2024-08-04T11:21:14.621Z, Description: In FreeRDP less than or equal to 2.0.0, there is an out-of-bound read in ntlm_read_AuthenticateMessage. This has been fixed in 2.1.0., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availabili... |
Describe the vulnerability CVE-2019-11886 | CVE-2019-11886, State: PUBLISHED, Published: 2019-05-13T04:03:16, Updated: 2024-08-04T23:10:29.209Z, Description: The WaspThemes Visual CSS Style Editor (aka yellow-pencil-visual-theme-customizer) plugin before 7.2.1 for WordPress allows yp_option_update CSRF, as demonstrated by use of yp_remote_get to obtain admin acc... |
Techniques related with vulnerability CVE-2019-1790 | CVE-2019-1790 in Cisco NX-OS Software. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1078 : Valid Accounts. |
Techniques related with vulnerability CVE-2020-11668 | CVE-2020-11668 in Linux kernel before 5.6.1. Is related with T1499.004 : Application or System Exploitation. |
Techniques related with vulnerability CVE-2020-1347 | CVE-2020-1347 in Windows 10 Version 2004 for 32-bit Systems. Has primary impact with T1068 : Exploitation for Privilege Escalation. |
Techniques related with vulnerability CVE-2020-15109 | CVE-2020-15109 in solidus. Has primary impact with T1190 : Exploit Public-Facing Application. Has secondary impact with T1565 : Data Manipulation. Has an exploitation technique T1133 : External Remote Services. |
Describe the vulnerability CVE-2019-1106 | CVE-2019-1106, State: PUBLISHED, Published: 2019-07-29T14:08:07, Updated: 2024-08-04T18:06:31.740Z, Description: A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE I... |
Describe the vulnerability CVE-2015-7755 | CVE-2015-7755, State: PUBLISHED, Published: 2015-12-19T11:00:00, Updated: 2024-08-06T07:58:59.950Z, Description: Juniper ScreenOS 6.2.0r15 through 6.2.0r18, 6.3.0r12 before 6.3.0r12b, 6.3.0r13 before 6.3.0r13b, 6.3.0r14 before 6.3.0r14b, 6.3.0r15 before 6.3.0r15b, 6.3.0r16 before 6.3.0r16b, 6.3.0r17 before 6.3.0r17b, 6... |
Techniques related with vulnerability CVE-2015-7935 | CVE-2015-7935 in Motorola Solutions MOSCAD IP Gateway. Is related with T1133 : External Remote Services. Is related with T1005 : Data from Local System. |
Techniques related with vulnerability CVE-2013-3918 | CVE-2013-3918 in ActiveX control in icardie.dll in Microsoft Windows. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise. Is related with T1499 : Endpoint Denial of Service. |
Describe the vulnerability CVE-2019-0604 | CVE-2019-0604, State: PUBLISHED, Published: 2019-03-06T00:00:00, Updated: 2024-08-04T17:51:27.261Z, Description: A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerabilit... |
Techniques related with vulnerability CVE-2018-2894 | CVE-2018-2894 in WebLogic Server. Is related with T1190 : Exploit Public-Facing Application. Is related with T1505.003 : Web Shell. |
Describe the vulnerability CVE-2009-4324 | CVE-2009-4324, State: PUBLISHED, Published: 2009-12-15T02:00:00, Updated: 2024-08-07T07:01:20.249Z, Description: Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arb... |
Describe the vulnerability CVE-2019-10973 | CVE-2019-10973, State: PUBLISHED, Published: 2019-07-08T17:25:30, Updated: 2024-08-04T22:40:15.634Z, Description: Quest KACE, all versions prior to version 8.0.x, 8.1.x, and 9.0.x, allows unintentional access to the appliance leveraging functions of the troubleshooting tools located in the administrator user interface.... |
Describe the vulnerability CVE-2019-2725 | CVE-2019-2725, State: PUBLISHED, Published: 2019-04-26T18:21:08, Updated: 2024-10-01T16:24:23.512Z, Description: Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0 and 12.1.3.0.0. Easily exploitable vulnerab... |
Describe the vulnerability CVE-2019-3780 | CVE-2019-3780, State: PUBLISHED, Published: 2019-03-08T16:00:00Z, Updated: 2024-09-16T22:45:16.571Z, Description: Cloud Foundry Container Runtime, versions prior to 0.28.0, deploys K8s worker nodes that contains a configuration file with IAAS credentials. A malicious user with access to the k8s nodes can obtain IAAS cr... |
Describe the vulnerability CVE-2020-1495 | CVE-2020-1495, State: PUBLISHED, Published: 2020-08-17T19:13:14, Updated: 2024-08-04T06:39:10.513Z, Description: No description available, No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2020-3477 | CVE-2020-3477 in Cisco IOS. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1078 : Valid Accounts. |
Techniques related with vulnerability CVE-2018-8337 | CVE-2018-8337 in Windows 10. Is related with T1211 : Exploitation for Defense Evasion. Is related with T1565 : Data Manipulation. Is related with T1485 : Data Destruction. |
Describe the vulnerability CVE-2020-1141 | CVE-2020-1141, State: PUBLISHED, Published: 2020-05-21T22:53:22, Updated: 2024-08-04T06:25:01.306Z, Description: An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, allowing an attacker to retrieve information from a targeted system, aka ... |
Techniques related with vulnerability CVE-2019-3717 | CVE-2019-3717 in Dell Client Commercial and Consumer platforms. Has primary impact with T1548 : Abuse Elevation Control Mechanism. Has an exploitation technique T1200 : Hardware Additions. |
Describe the vulnerability CVE-2010-0840 | CVE-2010-0840, State: PUBLISHED, Published: 2010-04-01T16:00:00, Updated: 2024-08-07T00:59:39.358Z, Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integri... |
Techniques related with vulnerability CVE-2019-6340 | CVE-2019-6340 in Drupal Core. Is related with T1566.001 : Spearphishing Attachment. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2016-3393 | CVE-2016-3393 in Graphics Device Interface (aka GDI or GDI+) in Microsoft Windows. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise. |
Describe the vulnerability CVE-2016-0034 | CVE-2016-0034, State: PUBLISHED, Published: 2016-01-13T02:00:00, Updated: 2024-08-05T22:08:12.993Z, Description: Microsoft Silverlight 5 before 5.1.41212.0 mishandles negative offsets during decoding, which allows remote attackers to execute arbitrary code or cause a denial of service (object-header corruption) via a c... |
Techniques related with vulnerability CVE-2020-15093 | CVE-2020-15093 in tough. Has primary impact with T1078 : Valid Accounts. Has primary impact with T1557 : Man-in-the-Middle. Has primary impact with T1040 : Network Sniffing. Has an exploitation technique T1110 : Brute Force. |
Describe MITRE technique T1565.003 | MITRE T1565.003 : Runtime Data Manipulation from enterprise Adversaries may modify systems in order to manipulate the data as it is accessed and displayed to an end user, thus threatening the integrity of the data.(Citation: FireEye APT38 Oct 2018)(Citation: DOJ Lazarus Sony 2018) By manipulating runtime data, adversar... |
Describe the vulnerability CVE-2019-9978 | CVE-2019-9978, State: PUBLISHED, Published: 2019-03-24T14:47:26, Updated: 2024-08-04T22:10:08.719Z, Description: The social-warfare plugin before 3.5.3 for WordPress has stored XSS via the wp-admin/admin-post.php?swp_debug=load_options swp_url parameter, as exploited in the wild in March 2019. This affects Social Warfa... |
Describe the vulnerability CVE-2018-17924 | CVE-2018-17924, State: PUBLISHED, Published: 2018-12-07T14:00:00, Updated: 2024-08-05T11:01:14.626Z, Description: Rockwell Automation MicroLogix 1400 Controllers and 1756 ControlLogix Communications Modules An unauthenticated, remote threat actor could send a CIP connection request to an affected device, and upon succe... |
Describe the vulnerability CVE-2013-3163 | CVE-2013-3163, State: PUBLISHED, Published: 2013-07-10T01:00:00, Updated: 2024-08-06T16:00:10.059Z, Description: Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vu... |
Techniques related with vulnerability CVE-2018-15784 | CVE-2018-15784 in Dell Networking OS10. Has primary impact with T1557 : Man-in-the-Middle. |
Describe the vulnerability CVE-2017-12637 | CVE-2017-12637, State: PUBLISHED, Published: 2017-08-07T20:00:00, Updated: 2024-08-05T18:43:56.407Z, Description: Directory traversal vulnerability in scheduler/ui/js/ffffffffbca41eb4/UIUtilJavaScriptJS in SAP NetWeaver Application Server Java 7.5 allows remote attackers to read arbitrary files via a .. (dot dot) in th... |
Techniques related with vulnerability CVE-2018-17910 | CVE-2018-17910 in WebAccess Versions 8.3.2 and prior.. Has primary impact with T1574 : Hijack Execution Flow. |
Describe MITRE technique T1080 | MITRE T1080 : Taint Shared Content from enterprise
Adversaries may deliver payloads to remote systems by adding content to shared storage locations, such as network drives or internal code repositories. Content stored on network drives or in other shared locations may be tainted by adding malicious programs, scripts, ... |
Describe the vulnerability CVE-2017-16651 | CVE-2017-16651, State: PUBLISHED, Published: 2017-11-09T14:00:00, Updated: 2024-08-05T20:27:04.304Z, Description: Roundcube Webmail before 1.1.10, 1.2.x before 1.2.7, and 1.3.x before 1.3.3 allows unauthorized access to arbitrary files on the host's filesystem, including configuration files, as exploited in the wild in... |
Techniques related with vulnerability CVE-2010-1885 | CVE-2010-1885 in Microsoft Windows Help and Support Center. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File. |
Describe MITRE technique T1563 | MITRE T1563 : Remote Service Session Hijacking from enterprise Adversaries may take control of preexisting sessions with remote services to move laterally in an environment. Users may use valid credentials to log into a service specifically designed to accept remote connections, such as telnet, SSH, and RDP. When a use... |
Techniques related with vulnerability CVE-2013-2423 | CVE-2013-2423 in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 7. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise. |
Describe MITRE technique T0855 | MITRE T0855 : Unauthorized Command Message from ics Adversaries may send unauthorized command messages to instruct control system assets to perform actions outside of their intended functionality, or without the logical preconditions to trigger their expected function. Command messages are used in ICS networks to giv... |
Describe MITRE technique T1003 | MITRE T1003 : OS Credential Dumping from enterprise Adversaries may attempt to dump credentials to obtain account login and credential material, normally in the form of a hash or a clear text password. Credentials can be obtained from OS caches, memory, or structures.(Citation: Brining MimiKatz to Unix) Credentials can... |
Describe the vulnerability CVE-2019-10971 | CVE-2019-10971, State: PUBLISHED, Published: 2019-06-12T15:03:59, Updated: 2024-08-04T22:40:15.456Z, Description: The application (Network Configurator for DeviceNet Safety 3.41 and prior) searches for resources by means of an untrusted search path that could execute a malicious .dll file not under the application's di... |
Techniques related with vulnerability CVE-2019-1915 | CVE-2019-1915 in Cisco Unified Communications Manager. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has secondary impact with T1098 : Account Manipulation. Has an exploitation technique T1189 : Drive-by Compromise. Has an exploitation technique T1190 : Exploit Public-Facing Application. Has an... |
Techniques related with vulnerability CVE-2019-1214 | CVE-2019-1214 in Windows. Is related with T1068 : Exploitation for Privilege Escalation. |
Describe MITRE technique T1588.004 | MITRE T1588.004 : Digital Certificates from enterprise Adversaries may buy and/or steal SSL/TLS certificates that can be used during targeting. SSL/TLS certificates are designed to instill trust. They include information about the key, information about its owner's identity, and the digital signature of an entity that ... |
Describe MITRE technique T1569 | MITRE T1569 : System Services from enterprise Adversaries may abuse system services or daemons to execute commands or programs. Adversaries can execute malicious content by interacting with or creating services either locally or remotely. Many services are set to run at boot, which can aid in achieving persistence ([Cr... |
Describe the vulnerability CVE-2020-3244 | CVE-2020-3244, State: PUBLISHED, Published: 2020-06-18T02:21:23.181506Z, Updated: 2024-11-15T16:59:30.320Z, Description: A vulnerability in the Enhanced Charging Service (ECS) functionality of Cisco ASR 5000 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to bypass the traffic classi... |
Techniques related with vulnerability CVE-2017-8464 | CVE-2017-8464 in Windows Shell. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File. |
Describe the vulnerability CVE-2016-3351 | CVE-2016-3351, State: PUBLISHED, Published: 2016-09-14T10:00:00, Updated: 2024-08-05T23:56:12.967Z, Description: Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to obtain sensitive information via a crafted web site, aka "Microsoft Browser Information Disclosure Vulnerability.", No CV... |
Describe MITRE technique T1566 | MITRE T1566 : Phishing from enterprise Adversaries may send phishing messages to gain access to victim systems. All forms of phishing are electronically delivered social engineering. Phishing can be targeted, known as spearphishing. In spearphishing, a specific individual, company, or industry will be targeted by the a... |
Describe the vulnerability CVE-2020-1027 | CVE-2020-1027, State: PUBLISHED, Published: 2020-04-15T15:13:29, Updated: 2024-08-04T06:25:00.878Z, Description: An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-091... |
Techniques related with vulnerability CVE-2020-11019 | CVE-2020-11019 in FreeRDP. Has primary impact with T1005 : Data from Local System. Has primary impact with T1499.004 : Application or System Exploitation. Has secondary impact with T1211 : Exploitation for Defense Evasion. |
Describe the vulnerability CVE-2018-11087 | CVE-2018-11087, State: PUBLISHED, Published: 2018-09-14T20:00:00Z, Updated: 2024-09-17T03:58:41.663Z, Description: Pivotal Spring AMQP, 1.x versions prior to 1.7.10 and 2.x versions prior to 2.0.6, expose a man-in-the-middle vulnerability due to lack of hostname validation. A malicious user that has the ability to inte... |
Describe the vulnerability CVE-2013-7102 | CVE-2013-7102, State: PUBLISHED, Published: 2013-12-23T23:00:00, Updated: 2024-08-06T17:53:45.880Z, Description: Multiple unrestricted file upload vulnerabilities in (1) media-upload.php, (2) media-upload-lncthumb.php, and (3) media-upload-sq_button.php in lib/admin/ in the OptimizePress theme before 1.61 for WordPress... |
Techniques related with vulnerability CVE-2019-3788 | CVE-2019-3788 in UAA Release (OSS). Has secondary impact with T1036 : Masquerading. Has an exploitation technique T1566.002 : Spearphishing Link. |
Techniques related with vulnerability CVE-2014-4076 | CVE-2014-4076 in Microsoft Windows Server 2003 SP2. Is related with T1608 : Stage Capabilities. |
Techniques related with vulnerability CVE-2020-3306 | CVE-2020-3306 in Cisco Adaptive Security Appliance (ASA) Software. Has primary impact with T1499 : Endpoint Denial of Service. Has an exploitation technique T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2017-6922 | CVE-2017-6922 in Drupal Core. Is related with T1083 : File and Directory Discovery. Is related with T1211 : Exploitation for Defense Evasion. |
Techniques related with vulnerability CVE-2019-7286 | CVE-2019-7286 in iOS. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2019-1035 | CVE-2019-1035 in Microsoft Office. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1204.002 : Malicious File. Has an exploitation technique T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2020-16211 | CVE-2020-16211 in Advantech WebAccess HMI Designer. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1204.002 : Malicious File. |
Describe MITRE technique T1211 | MITRE T1211 : Exploitation for Defense Evasion from enterprise Adversaries may exploit a system or application vulnerability to bypass security features. Exploitation of a vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kern... |
Describe the vulnerability CVE-2020-3349 | CVE-2020-3349, State: PUBLISHED, Published: 2020-07-16T17:21:14.446014Z, Updated: 2024-11-15T16:54:36.634Z, Description: Multiple vulnerabilities in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack... |
Techniques related with vulnerability CVE-2013-0422 | CVE-2013-0422 in Java 7 before Update 11. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2018-8353 | CVE-2018-8353, State: PUBLISHED, Published: 2018-08-15T17:00:00, Updated: 2024-08-05T06:54:35.849Z, Description: A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet... |
Describe the vulnerability CVE-2019-1943 | CVE-2019-1943, State: PUBLISHED, Published: 2019-07-17T20:30:16.400115Z, Updated: 2024-09-16T19:31:31.727Z, Description: A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Switches software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The... |
Describe the vulnerability CVE-2017-11774 | CVE-2017-11774, State: PUBLISHED, Published: 2017-10-13T13:00:00Z, Updated: 2024-09-16T20:28:05.185Z, Description: Microsoft Outlook 2010 SP2, Outlook 2013 SP1 and RT SP1, and Outlook 2016 allow an attacker to execute arbitrary commands, due to how Microsoft Office handles objects in memory, aka "Microsoft Outlook Secu... |
Describe the vulnerability CVE-2018-15401 | CVE-2018-15401, State: PUBLISHED, Published: 2018-10-05T14:00:00Z, Updated: 2024-09-16T19:56:06.944Z, Description: A vulnerability in the web-based management interface of Cisco Hosted Collaboration Mediation Fulfillment could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) atta... |
Techniques related with vulnerability CVE-2018-7259 | CVE-2018-7259 in Flight Sim Labs A320-X. Is related with T1552 : Unsecured Credentials. Is related with T1040 : Network Sniffing. |
Techniques related with vulnerability CVE-2017-10271 | CVE-2017-10271 in WebLogic Server. Is related with T1190 : Exploit Public-Facing Application. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2019-1609 | CVE-2019-1609, State: PUBLISHED, Published: 2019-03-08T20:00:00Z, Updated: 2024-09-16T18:39:44.091Z, Description: A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is d... |
Describe the vulnerability CVE-2011-4862 | CVE-2011-4862, State: PUBLISHED, Published: 2011-12-25T01:00:00, Updated: 2024-08-07T00:16:35.035Z, Description: Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, Heimdal 1.5.1 and earlier, GNU inetutils, and possibly oth... |
Techniques related with vulnerability CVE-2009-1136 | CVE-2009-1136 in Microsoft Office Web Components Spreadsheet ActiveX control. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise. |
Describe the vulnerability CVE-2020-6808 | CVE-2020-6808, State: PUBLISHED, Published: 2020-03-25T21:13:32, Updated: 2024-08-04T09:11:05.026Z, Description: When a JavaScript URL (javascript:) is evaluated and the result is a string, this string is parsed to create an HTML document, which is then presented. Previously, this document's URL (as reported by the doc... |
Techniques related with vulnerability CVE-2018-9488 | CVE-2018-9488 in Android. Is related with T1068 : Exploitation for Privilege Escalation. |
Describe the vulnerability CVE-2019-13527 | CVE-2019-13527, State: PUBLISHED, Published: 2019-09-24T21:16:22, Updated: 2024-08-04T23:57:38.957Z, Description: In Rockwell Automation Arena Simulation Software Cat. 9502-Ax, Versions 16.00.00 and earlier, a maliciously crafted Arena file opened by an unsuspecting user may result in the use of a pointer that has not ... |
Describe the vulnerability CVE-2020-5297 | CVE-2020-5297, State: PUBLISHED, Published: 2020-06-03T21:55:18, Updated: 2024-08-04T08:22:09.103Z, Description: In OctoberCMS (october/october composer package) versions from 1.0.319 and before 1.0.466, an attacker can exploit this vulnerability to upload jpg, jpeg, bmp, png, webp, gif, ico, css, js, woff, woff2, svg,... |
Describe the vulnerability CVE-2017-11847 | CVE-2017-11847, State: PUBLISHED, Published: 2017-11-15T03:00:00Z, Updated: 2024-09-16T23:01:41.212Z, Description: Windows kernel in Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and RT1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016, and Windows Server, v... |
Describe the vulnerability CVE-2013-5054 | CVE-2013-5054, State: PUBLISHED, Published: 2013-12-11T00:00:00, Updated: 2024-08-06T16:59:41.281Z, Description: Microsoft Office 2013 and 2013 RT allows remote attackers to discover authentication tokens via a crafted response to a file-open request for an Office file on a web site, as exploited in the wild in 2013, a... |
Describe MITRE technique T1059.006 | MITRE T1059.006 : Python from enterprise Adversaries may abuse Python commands and scripts for execution. Python is a very popular scripting/programming language, with capabilities to perform many functions. Python can be executed interactively from the command-line (via the `python.exe` interpreter) or via scripts (.p... |
Describe MITRE technique T1036 | MITRE T1036 : Masquerading from enterprise Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the name or location of an object, legitimate or malicious, is manipulated or abused for the sake of evading defe... |
Techniques related with vulnerability CVE-2020-3356 | CVE-2020-3356 in Cisco Data Center Network Manager. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link. |
Techniques related with vulnerability CVE-2018-19833 | CVE-2018-19833 in Ethereum ERC20 token. Is related with T0828 : Loss of Productivity and Revenue. Is related with T1565.001 : Stored Data Manipulation. |
Techniques related with vulnerability CVE-2015-6475 | CVE-2015-6475 in IBC Solar ServeMaster TLP+ and Danfoss TLX Pro+. Is related with T1059.007 : JavaScript. Is related with T1185 : Man in the Browser. |
Techniques related with vulnerability CVE-2014-7169 | CVE-2014-7169 in GNU Bash through 4.3 bash43-025. Is related with T1203 : Exploitation for Client Execution. |
Describe MITRE technique T1565 | MITRE T1565 : Data Manipulation from enterprise Adversaries may insert, delete, or manipulate data in order to influence external outcomes or hide activity, thus threatening the integrity of the data.(Citation: Sygnia Elephant Beetle Jan 2022) By manipulating data, adversaries may attempt to affect a business process, ... |
Describe the vulnerability CVE-2019-12696 | CVE-2019-12696, State: PUBLISHED, Published: 2019-10-02T19:06:47.817589Z, Updated: 2024-11-19T18:54:19.560Z, Description: Multiple vulnerabilities in the Cisco Firepower System Software Detection Engine could allow an unauthenticated, remote attacker to bypass configured Malware and File Policies for RTF and RAR file t... |
Techniques related with vulnerability CVE-2019-1711 | CVE-2019-1711 in Cisco IOS XR Software. Has primary impact with T1489 : Service Stop. |
Describe the vulnerability CVE-2019-3717 | CVE-2019-3717, State: PUBLISHED, Published: 2019-08-05T16:38:20.346820Z, Updated: 2024-09-16T16:43:43.212Z, Description: Select Dell Client Commercial and Consumer platforms contain an Improper Access Vulnerability. An unauthenticated attacker with physical access to the system could potentially bypass intended Secure ... |
Techniques related with vulnerability CVE-2020-5373 | CVE-2020-5373 in OMIMSSC (OpenManage Integration for Microsoft System Center). Has primary impact with T1190 : Exploit Public-Facing Application. Has secondary impact with T1005 : Data from Local System. |
Techniques related with vulnerability CVE-2020-6820 | CVE-2020-6820 in Thunderbird. Is related with T1055 : Process Injection. Is related with T1189 : Drive-by Compromise. |
Describe the vulnerability CVE-2020-1350 | CVE-2020-1350, State: PUBLISHED, Published: 2020-07-14T22:54:06, Updated: 2024-08-04T06:32:01.039Z, Description: A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests, aka 'Windows DNS Server Remote Code Execution Vulnerability'., No CVSS metrics a... |
Describe the vulnerability CVE-2013-5211 | CVE-2013-5211, State: PUBLISHED, Published: 2014-01-02T11:00:00, Updated: 2024-08-06T17:06:52.374Z, Description: The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 reques... |
Describe the vulnerability CVE-2019-7286 | CVE-2019-7286, State: PUBLISHED, Published: 2019-12-18T17:33:16, Updated: 2024-08-04T20:46:45.872Z, Description: A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 12.1.4, macOS Mojave 10.14.3 Supplemental Update. An application may be able to gain elevated privileges., N... |
Describe MITRE technique T1083 | MITRE T1083 : File and Directory Discovery from enterprise Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system. Adversaries may use the information from [File and Directory Discovery](T1083) during automated discover... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.