input
stringlengths 30
54
| output
stringlengths 69
4.21k
|
|---|---|
Techniques related with vulnerability CVE-2012-5958
|
CVE-2012-5958 in portable SDK for UPnP Devices before 1.6.18. Is related with T1133 : External Remote Services. Is related with T1203 : Exploitation for Client Execution.
|
Techniques related with vulnerability CVE-2018-2893
|
CVE-2018-2893 in WebLogic Server. Is related with T1190 : Exploit Public-Facing Application.
|
Describe MITRE technique T1133
|
MITRE T1133 : External Remote Services from enterprise Adversaries may leverage external-facing remote services to initially access and/or persist within a network. Remote services such as VPNs, Citrix, and other access mechanisms allow users to connect to internal enterprise network resources from external locations. There are often remote service gateways that manage connections and credential authentication for these services. Services such as [Windows Remote Management](T1021.006) and [VNC](T1021.005) can also be used externally.(Citation: MacOS VNC software for Remote Desktop)
Access to [Valid Accounts](T1078) to use the service is often a requirement, which could be obtained through credential pharming or by obtaining the credentials from users after compromising the enterprise network.(Citation: Volexity Virtual Private Keylogging) Access to remote services may be used as a redundant or persistent access mechanism during an operation.
Access may also be gained through an exposed service that doesn’t require authentication. In containerized environments, this may include an exposed Docker API, Kubernetes API server, kubelet, or web application such as the Kubernetes dashboard.(Citation: Trend Micro Exposed Docker Server)(Citation: Unit 42 Hildegard Malware)
|
Describe the vulnerability CVE-2009-3459
|
CVE-2009-3459, State: PUBLISHED, Published: 2009-10-13T10:00:00, Updated: 2024-08-07T06:31:10.547Z, Description: Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some of these details are obtained from third party information., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-11051
|
CVE-2018-11051 in Certificate Manager Path Traversal Vulnerability. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1190 : Exploit Public-Facing Application.
|
Techniques related with vulnerability CVE-2017-8291
|
CVE-2017-8291 in Artifex Ghostscript through 2017-04-26. Is related with T1190 : Exploit Public-Facing Application.
|
Describe the vulnerability CVE-2020-11087
|
CVE-2020-11087, State: PUBLISHED, Published: 2020-05-29T00:00:00, Updated: 2024-08-04T11:21:14.621Z, Description: In FreeRDP less than or equal to 2.0.0, there is an out-of-bound read in ntlm_read_AuthenticateMessage. This has been fixed in 2.1.0., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 3.1, Base Severity: LOW, Confidentiality Impact: LOW, Integrity Impact: NONE, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-11886
|
CVE-2019-11886, State: PUBLISHED, Published: 2019-05-13T04:03:16, Updated: 2024-08-04T23:10:29.209Z, Description: The WaspThemes Visual CSS Style Editor (aka yellow-pencil-visual-theme-customizer) plugin before 7.2.1 for WordPress allows yp_option_update CSRF, as demonstrated by use of yp_remote_get to obtain admin access., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2019-1790
|
CVE-2019-1790 in Cisco NX-OS Software. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1078 : Valid Accounts.
|
Techniques related with vulnerability CVE-2020-11668
|
CVE-2020-11668 in Linux kernel before 5.6.1. Is related with T1499.004 : Application or System Exploitation.
|
Techniques related with vulnerability CVE-2020-1347
|
CVE-2020-1347 in Windows 10 Version 2004 for 32-bit Systems. Has primary impact with T1068 : Exploitation for Privilege Escalation.
|
Techniques related with vulnerability CVE-2020-15109
|
CVE-2020-15109 in solidus. Has primary impact with T1190 : Exploit Public-Facing Application. Has secondary impact with T1565 : Data Manipulation. Has an exploitation technique T1133 : External Remote Services.
|
Describe the vulnerability CVE-2019-1106
|
CVE-2019-1106, State: PUBLISHED, Published: 2019-07-29T14:08:07, Updated: 2024-08-04T18:06:31.740Z, Description: A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1092, CVE-2019-1103, CVE-2019-1107., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2015-7755
|
CVE-2015-7755, State: PUBLISHED, Published: 2015-12-19T11:00:00, Updated: 2024-08-06T07:58:59.950Z, Description: Juniper ScreenOS 6.2.0r15 through 6.2.0r18, 6.3.0r12 before 6.3.0r12b, 6.3.0r13 before 6.3.0r13b, 6.3.0r14 before 6.3.0r14b, 6.3.0r15 before 6.3.0r15b, 6.3.0r16 before 6.3.0r16b, 6.3.0r17 before 6.3.0r17b, 6.3.0r18 before 6.3.0r18b, 6.3.0r19 before 6.3.0r19b, and 6.3.0r20 before 6.3.0r21 allows remote attackers to obtain administrative access by entering an unspecified password during a (1) SSH or (2) TELNET session., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2015-7935
|
CVE-2015-7935 in Motorola Solutions MOSCAD IP Gateway. Is related with T1133 : External Remote Services. Is related with T1005 : Data from Local System.
|
Techniques related with vulnerability CVE-2013-3918
|
CVE-2013-3918 in ActiveX control in icardie.dll in Microsoft Windows. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise. Is related with T1499 : Endpoint Denial of Service.
|
Describe the vulnerability CVE-2019-0604
|
CVE-2019-0604, State: PUBLISHED, Published: 2019-03-06T00:00:00, Updated: 2024-08-04T17:51:27.261Z, Description: A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0594., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-2894
|
CVE-2018-2894 in WebLogic Server. Is related with T1190 : Exploit Public-Facing Application. Is related with T1505.003 : Web Shell.
|
Describe the vulnerability CVE-2009-4324
|
CVE-2009-4324, State: PUBLISHED, Published: 2009-12-15T02:00:00, Updated: 2024-08-07T07:01:20.249Z, Description: Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-10973
|
CVE-2019-10973, State: PUBLISHED, Published: 2019-07-08T17:25:30, Updated: 2024-08-04T22:40:15.634Z, Description: Quest KACE, all versions prior to version 8.0.x, 8.1.x, and 9.0.x, allows unintentional access to the appliance leveraging functions of the troubleshooting tools located in the administrator user interface., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-2725
|
CVE-2019-2725, State: PUBLISHED, Published: 2019-04-26T18:21:08, Updated: 2024-10-01T16:24:23.512Z, Description: Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0 and 12.1.3.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 7.5, Base Severity: HIGH, Confidentiality Impact: NONE, Integrity Impact: NONE, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-3780
|
CVE-2019-3780, State: PUBLISHED, Published: 2019-03-08T16:00:00Z, Updated: 2024-09-16T22:45:16.571Z, Description: Cloud Foundry Container Runtime, versions prior to 0.28.0, deploys K8s worker nodes that contains a configuration file with IAAS credentials. A malicious user with access to the k8s nodes can obtain IAAS credentials allowing the user to escalate privileges to gain access to the IAAS account., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 9.1, Base Severity: CRITICAL, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-1495
|
CVE-2020-1495, State: PUBLISHED, Published: 2020-08-17T19:13:14, Updated: 2024-08-04T06:39:10.513Z, Description: No description available, No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-3477
|
CVE-2020-3477 in Cisco IOS. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1078 : Valid Accounts.
|
Techniques related with vulnerability CVE-2018-8337
|
CVE-2018-8337 in Windows 10. Is related with T1211 : Exploitation for Defense Evasion. Is related with T1565 : Data Manipulation. Is related with T1485 : Data Destruction.
|
Describe the vulnerability CVE-2020-1141
|
CVE-2020-1141, State: PUBLISHED, Published: 2020-05-21T22:53:22, Updated: 2024-08-04T06:25:01.306Z, Description: An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, allowing an attacker to retrieve information from a targeted system, aka 'Windows GDI Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-0963, CVE-2020-1145, CVE-2020-1179., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2019-3717
|
CVE-2019-3717 in Dell Client Commercial and Consumer platforms. Has primary impact with T1548 : Abuse Elevation Control Mechanism. Has an exploitation technique T1200 : Hardware Additions.
|
Describe the vulnerability CVE-2010-0840
|
CVE-2010-0840, State: PUBLISHED, Published: 2010-04-01T16:00:00, Updated: 2024-08-07T00:59:39.358Z, Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to improper checks when executing privileged methods in the Java Runtime Environment (JRE), which allows attackers to execute arbitrary code via (1) an untrusted object that extends the trusted class but has not modified a certain method, or (2) "a similar trust issue with interfaces," aka "Trusted Methods Chaining Remote Code Execution Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2019-6340
|
CVE-2019-6340 in Drupal Core. Is related with T1566.001 : Spearphishing Attachment. Is related with T1203 : Exploitation for Client Execution.
|
Techniques related with vulnerability CVE-2016-3393
|
CVE-2016-3393 in Graphics Device Interface (aka GDI or GDI+) in Microsoft Windows. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise.
|
Describe the vulnerability CVE-2016-0034
|
CVE-2016-0034, State: PUBLISHED, Published: 2016-01-13T02:00:00, Updated: 2024-08-05T22:08:12.993Z, Description: Microsoft Silverlight 5 before 5.1.41212.0 mishandles negative offsets during decoding, which allows remote attackers to execute arbitrary code or cause a denial of service (object-header corruption) via a crafted web site, aka "Silverlight Runtime Remote Code Execution Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-15093
|
CVE-2020-15093 in tough. Has primary impact with T1078 : Valid Accounts. Has primary impact with T1557 : Man-in-the-Middle. Has primary impact with T1040 : Network Sniffing. Has an exploitation technique T1110 : Brute Force.
|
Describe MITRE technique T1565.003
|
MITRE T1565.003 : Runtime Data Manipulation from enterprise Adversaries may modify systems in order to manipulate the data as it is accessed and displayed to an end user, thus threatening the integrity of the data.(Citation: FireEye APT38 Oct 2018)(Citation: DOJ Lazarus Sony 2018) By manipulating runtime data, adversaries may attempt to affect a business process, organizational understanding, and decision making.
Adversaries may alter application binaries used to display data in order to cause runtime manipulations. Adversaries may also conduct [Change Default File Association](T1546.001) and [Masquerading](T1036) to cause a similar effect. The type of modification and the impact it will have depends on the target application and process as well as the goals and objectives of the adversary. For complex systems, an adversary would likely need special expertise and possibly access to specialized software related to the system that would typically be gained through a prolonged information gathering campaign in order to have the desired impact.
|
Describe the vulnerability CVE-2019-9978
|
CVE-2019-9978, State: PUBLISHED, Published: 2019-03-24T14:47:26, Updated: 2024-08-04T22:10:08.719Z, Description: The social-warfare plugin before 3.5.3 for WordPress has stored XSS via the wp-admin/admin-post.php?swp_debug=load_options swp_url parameter, as exploited in the wild in March 2019. This affects Social Warfare and Social Warfare Pro., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-17924
|
CVE-2018-17924, State: PUBLISHED, Published: 2018-12-07T14:00:00, Updated: 2024-08-05T11:01:14.626Z, Description: Rockwell Automation MicroLogix 1400 Controllers and 1756 ControlLogix Communications Modules An unauthenticated, remote threat actor could send a CIP connection request to an affected device, and upon successful connection, send a new IP configuration to the affected device even if the controller in the system is set to Hard RUN mode. When the affected device accepts this new IP configuration, a loss of communication occurs between the device and the rest of the system as the system traffic is still attempting to communicate with the device via the overwritten IP address., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2013-3163
|
CVE-2013-3163, State: PUBLISHED, Published: 2013-07-10T01:00:00, Updated: 2024-08-06T16:00:10.059Z, Description: Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3151., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-15784
|
CVE-2018-15784 in Dell Networking OS10. Has primary impact with T1557 : Man-in-the-Middle.
|
Describe the vulnerability CVE-2017-12637
|
CVE-2017-12637, State: PUBLISHED, Published: 2017-08-07T20:00:00, Updated: 2024-08-05T18:43:56.407Z, Description: Directory traversal vulnerability in scheduler/ui/js/ffffffffbca41eb4/UIUtilJavaScriptJS in SAP NetWeaver Application Server Java 7.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the query string, as exploited in the wild in August 2017, aka SAP Security Note 2486657., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-17910
|
CVE-2018-17910 in WebAccess Versions 8.3.2 and prior.. Has primary impact with T1574 : Hijack Execution Flow.
|
Describe MITRE technique T1080
|
MITRE T1080 : Taint Shared Content from enterprise
Adversaries may deliver payloads to remote systems by adding content to shared storage locations, such as network drives or internal code repositories. Content stored on network drives or in other shared locations may be tainted by adding malicious programs, scripts, or exploit code to otherwise valid files. Once a user opens the shared tainted content, the malicious portion can be executed to run the adversary's code on a remote system. Adversaries may use tainted shared content to move laterally.
A directory share pivot is a variation on this technique that uses several other techniques to propagate malware when users access a shared network directory. It uses [Shortcut Modification](T1547.009) of directory .LNK files that use [Masquerading](T1036) to look like the real directories, which are hidden through [Hidden Files and Directories](T1564.001). The malicious .LNK-based directories have an embedded command that executes the hidden malware file in the directory and then opens the real intended directory so that the user's expected action still occurs. When used with frequently used network directories, the technique may result in frequent reinfections and broad access to systems and potentially to new and higher privileged accounts. (Citation: Retwin Directory Share Pivot)
Adversaries may also compromise shared network directories through binary infections by appending or prepending its code to the healthy binary on the shared network directory. The malware may modify the original entry point (OEP) of the healthy binary to ensure that it is executed before the legitimate code. The infection could continue to spread via the newly infected file when it is executed by a remote system. These infections may target both binary and non-binary formats that end with extensions including, but not limited to, .EXE, .DLL, .SCR, .BAT, and/or .VBS.
|
Describe the vulnerability CVE-2017-16651
|
CVE-2017-16651, State: PUBLISHED, Published: 2017-11-09T14:00:00, Updated: 2024-08-05T20:27:04.304Z, Description: Roundcube Webmail before 1.1.10, 1.2.x before 1.2.7, and 1.3.x before 1.3.3 allows unauthorized access to arbitrary files on the host's filesystem, including configuration files, as exploited in the wild in November 2017. The attacker must be able to authenticate at the target system with a valid username/password as the attack requires an active session. The issue is related to file-based attachment plugins and _task=settings&_action=upload-display&_from=timezone requests., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2010-1885
|
CVE-2010-1885 in Microsoft Windows Help and Support Center. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File.
|
Describe MITRE technique T1563
|
MITRE T1563 : Remote Service Session Hijacking from enterprise Adversaries may take control of preexisting sessions with remote services to move laterally in an environment. Users may use valid credentials to log into a service specifically designed to accept remote connections, such as telnet, SSH, and RDP. When a user logs into a service, a session will be established that will allow them to maintain a continuous interaction with that service.
Adversaries may commandeer these sessions to carry out actions on remote systems. [Remote Service Session Hijacking](T1563) differs from use of [Remote Services](T1021) because it hijacks an existing session rather than creating a new session using [Valid Accounts](T1078).(Citation: RDP Hijacking Medium)(Citation: Breach Post-mortem SSH Hijack)
|
Techniques related with vulnerability CVE-2013-2423
|
CVE-2013-2423 in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 7. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise.
|
Describe MITRE technique T0855
|
MITRE T0855 : Unauthorized Command Message from ics Adversaries may send unauthorized command messages to instruct control system assets to perform actions outside of their intended functionality, or without the logical preconditions to trigger their expected function. Command messages are used in ICS networks to give direct instructions to control systems devices. If an adversary can send an unauthorized command message to a control system, then it can instruct the control systems device to perform an action outside the normal bounds of the device's actions. An adversary could potentially instruct a control systems device to perform an action that will cause an [Impact](TA0105). (Citation: Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011)
In the Dallas Siren incident, adversaries were able to send command messages to activate tornado alarm systems across the city without an impending tornado or other disaster. (Citation: Zack Whittaker April 2017) (Citation: Benjamin Freed March 2019)
|
Describe MITRE technique T1003
|
MITRE T1003 : OS Credential Dumping from enterprise Adversaries may attempt to dump credentials to obtain account login and credential material, normally in the form of a hash or a clear text password. Credentials can be obtained from OS caches, memory, or structures.(Citation: Brining MimiKatz to Unix) Credentials can then be used to perform [Lateral Movement](TA0008) and access restricted information.
Several of the tools mentioned in associated sub-techniques may be used by both adversaries and professional security testers. Additional custom tools likely exist as well.
|
Describe the vulnerability CVE-2019-10971
|
CVE-2019-10971, State: PUBLISHED, Published: 2019-06-12T15:03:59, Updated: 2024-08-04T22:40:15.456Z, Description: The application (Network Configurator for DeviceNet Safety 3.41 and prior) searches for resources by means of an untrusted search path that could execute a malicious .dll file not under the application's direct control and outside the intended directories., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2019-1915
|
CVE-2019-1915 in Cisco Unified Communications Manager. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has secondary impact with T1098 : Account Manipulation. Has an exploitation technique T1189 : Drive-by Compromise. Has an exploitation technique T1190 : Exploit Public-Facing Application. Has an exploitation technique T1566 : Phishing. Has an exploitation technique T1204.002 : Malicious File.
|
Techniques related with vulnerability CVE-2019-1214
|
CVE-2019-1214 in Windows. Is related with T1068 : Exploitation for Privilege Escalation.
|
Describe MITRE technique T1588.004
|
MITRE T1588.004 : Digital Certificates from enterprise Adversaries may buy and/or steal SSL/TLS certificates that can be used during targeting. SSL/TLS certificates are designed to instill trust. They include information about the key, information about its owner's identity, and the digital signature of an entity that has verified the certificate's contents are correct. If the signature is valid, and the person examining the certificate trusts the signer, then they know they can use that key to communicate with its owner.
Adversaries may purchase or steal SSL/TLS certificates to further their operations, such as encrypting C2 traffic (ex: [Asymmetric Cryptography](T1573.002) with [Web Protocols](T1071.001)) or even enabling [Adversary-in-the-Middle](T1557) if the certificate is trusted or otherwise added to the root of trust (i.e. [Install Root Certificate](T1553.004)). The purchase of digital certificates may be done using a front organization or using information stolen from a previously compromised entity that allows the adversary to validate to a certificate provider as that entity. Adversaries may also steal certificate materials directly from a compromised third-party, including from certificate authorities.(Citation: DiginotarCompromise) Adversaries may register or hijack domains that they will later purchase an SSL/TLS certificate for.
Certificate authorities exist that allow adversaries to acquire SSL/TLS certificates, such as domain validation certificates, for free.(Citation: Let's Encrypt FAQ)
After obtaining a digital certificate, an adversary may then install that certificate (see [Install Digital Certificate](T1608.003)) on infrastructure under their control.
|
Describe MITRE technique T1569
|
MITRE T1569 : System Services from enterprise Adversaries may abuse system services or daemons to execute commands or programs. Adversaries can execute malicious content by interacting with or creating services either locally or remotely. Many services are set to run at boot, which can aid in achieving persistence ([Create or Modify System Process](T1543)), but adversaries can also abuse services for one-time or temporary execution.
|
Describe the vulnerability CVE-2020-3244
|
CVE-2020-3244, State: PUBLISHED, Published: 2020-06-18T02:21:23.181506Z, Updated: 2024-11-15T16:59:30.320Z, Description: A vulnerability in the Enhanced Charging Service (ECS) functionality of Cisco ASR 5000 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to bypass the traffic classification rules on an affected device. The vulnerability is due to insufficient input validation of user traffic going through an affected device. An attacker could exploit this vulnerability by sending a malformed HTTP request to an affected device. A successful exploit could allow the attacker to bypass the traffic classification rules and potentially avoid being charged for traffic consumption., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 5.3, Base Severity: MEDIUM, Confidentiality Impact: NONE, Integrity Impact: LOW, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Techniques related with vulnerability CVE-2017-8464
|
CVE-2017-8464 in Windows Shell. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File.
|
Describe the vulnerability CVE-2016-3351
|
CVE-2016-3351, State: PUBLISHED, Published: 2016-09-14T10:00:00, Updated: 2024-08-05T23:56:12.967Z, Description: Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to obtain sensitive information via a crafted web site, aka "Microsoft Browser Information Disclosure Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Describe MITRE technique T1566
|
MITRE T1566 : Phishing from enterprise Adversaries may send phishing messages to gain access to victim systems. All forms of phishing are electronically delivered social engineering. Phishing can be targeted, known as spearphishing. In spearphishing, a specific individual, company, or industry will be targeted by the adversary. More generally, adversaries can conduct non-targeted phishing, such as in mass malware spam campaigns.
Adversaries may send victims emails containing malicious attachments or links, typically to execute malicious code on victim systems. Phishing may also be conducted via third-party services, like social media platforms. Phishing may also involve social engineering techniques, such as posing as a trusted source, as well as evasive techniques such as removing or manipulating emails or metadata/headers from compromised accounts being abused to send messages (e.g., [Email Hiding Rules](T1564.008)).(Citation: Microsoft OAuth Spam 2022)(Citation: Palo Alto Unit 42 VBA Infostealer 2014) Another way to accomplish this is by forging or spoofing(Citation: Proofpoint-spoof) the identity of the sender which can be used to fool both the human recipient as well as automated security tools.(Citation: cyberproof-double-bounce)
Victims may also receive phishing messages that instruct them to call a phone number where they are directed to visit a malicious URL, download malware,(Citation: sygnia Luna Month)(Citation: CISA Remote Monitoring and Management Software) or install adversary-accessible remote management tools onto their computer (i.e., [User Execution](T1204)).(Citation: Unit42 Luna Moth)
|
Describe the vulnerability CVE-2020-1027
|
CVE-2020-1027, State: PUBLISHED, Published: 2020-04-15T15:13:29, Updated: 2024-08-04T06:25:00.878Z, Description: An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0913, CVE-2020-1000, CVE-2020-1003., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-11019
|
CVE-2020-11019 in FreeRDP. Has primary impact with T1005 : Data from Local System. Has primary impact with T1499.004 : Application or System Exploitation. Has secondary impact with T1211 : Exploitation for Defense Evasion.
|
Describe the vulnerability CVE-2018-11087
|
CVE-2018-11087, State: PUBLISHED, Published: 2018-09-14T20:00:00Z, Updated: 2024-09-17T03:58:41.663Z, Description: Pivotal Spring AMQP, 1.x versions prior to 1.7.10 and 2.x versions prior to 2.0.6, expose a man-in-the-middle vulnerability due to lack of hostname validation. A malicious user that has the ability to intercept traffic would be able to view data in transit., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2013-7102
|
CVE-2013-7102, State: PUBLISHED, Published: 2013-12-23T23:00:00, Updated: 2024-08-06T17:53:45.880Z, Description: Multiple unrestricted file upload vulnerabilities in (1) media-upload.php, (2) media-upload-lncthumb.php, and (3) media-upload-sq_button.php in lib/admin/ in the OptimizePress theme before 1.61 for WordPress allow remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in images_comingsoon, images_lncthumbs, or images_optbuttons in wp-content/uploads/optpress/, as exploited in the wild in November 2013., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2019-3788
|
CVE-2019-3788 in UAA Release (OSS). Has secondary impact with T1036 : Masquerading. Has an exploitation technique T1566.002 : Spearphishing Link.
|
Techniques related with vulnerability CVE-2014-4076
|
CVE-2014-4076 in Microsoft Windows Server 2003 SP2. Is related with T1608 : Stage Capabilities.
|
Techniques related with vulnerability CVE-2020-3306
|
CVE-2020-3306 in Cisco Adaptive Security Appliance (ASA) Software. Has primary impact with T1499 : Endpoint Denial of Service. Has an exploitation technique T1190 : Exploit Public-Facing Application.
|
Techniques related with vulnerability CVE-2017-6922
|
CVE-2017-6922 in Drupal Core. Is related with T1083 : File and Directory Discovery. Is related with T1211 : Exploitation for Defense Evasion.
|
Techniques related with vulnerability CVE-2019-7286
|
CVE-2019-7286 in iOS. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
|
Techniques related with vulnerability CVE-2019-1035
|
CVE-2019-1035 in Microsoft Office. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1204.002 : Malicious File. Has an exploitation technique T1203 : Exploitation for Client Execution.
|
Techniques related with vulnerability CVE-2020-16211
|
CVE-2020-16211 in Advantech WebAccess HMI Designer. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1204.002 : Malicious File.
|
Describe MITRE technique T1211
|
MITRE T1211 : Exploitation for Defense Evasion from enterprise Adversaries may exploit a system or application vulnerability to bypass security features. Exploitation of a vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. Vulnerabilities may exist in defensive security software that can be used to disable or circumvent them.
Adversaries may have prior knowledge through reconnaissance that security software exists within an environment or they may perform checks during or shortly after the system is compromised for [Security Software Discovery](T1518.001). The security software will likely be targeted directly for exploitation. There are examples of antivirus software being targeted by persistent threat groups to avoid detection.
There have also been examples of vulnerabilities in public cloud infrastructure of SaaS applications that may bypass defense boundaries (Citation: Salesforce zero-day in facebook phishing attack), evade security logs (Citation: Bypassing CloudTrail in AWS Service Catalog), or deploy hidden infrastructure.(Citation: GhostToken GCP flaw)
|
Describe the vulnerability CVE-2020-3349
|
CVE-2020-3349, State: PUBLISHED, Published: 2020-07-16T17:21:14.446014Z, Updated: 2024-11-15T16:54:36.634Z, Description: Multiple vulnerabilities in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface on an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a customized link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive browser-based information., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 4.8, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: HIGH, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.
|
Techniques related with vulnerability CVE-2013-0422
|
CVE-2013-0422 in Java 7 before Update 11. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
|
Describe the vulnerability CVE-2018-8353
|
CVE-2018-8353, State: PUBLISHED, Published: 2018-08-15T17:00:00, Updated: 2024-08-05T06:54:35.849Z, Description: A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-8355, CVE-2018-8359, CVE-2018-8371, CVE-2018-8372, CVE-2018-8373, CVE-2018-8385, CVE-2018-8389, CVE-2018-8390., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-1943
|
CVE-2019-1943, State: PUBLISHED, Published: 2019-07-17T20:30:16.400115Z, Updated: 2024-09-16T19:31:31.727Z, Description: A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Switches software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by intercepting a user's HTTP request and modifying it into a request that causes the web interface to redirect the user to a specific malicious URL. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 4.7, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: NONE, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Describe the vulnerability CVE-2017-11774
|
CVE-2017-11774, State: PUBLISHED, Published: 2017-10-13T13:00:00Z, Updated: 2024-09-16T20:28:05.185Z, Description: Microsoft Outlook 2010 SP2, Outlook 2013 SP1 and RT SP1, and Outlook 2016 allow an attacker to execute arbitrary commands, due to how Microsoft Office handles objects in memory, aka "Microsoft Outlook Security Feature Bypass Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-15401
|
CVE-2018-15401, State: PUBLISHED, Published: 2018-10-05T14:00:00Z, Updated: 2024-09-16T19:56:06.944Z, Description: A vulnerability in the web-based management interface of Cisco Hosted Collaboration Mediation Fulfillment could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions on an affected system via a web browser and with the privileges of the user., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-7259
|
CVE-2018-7259 in Flight Sim Labs A320-X. Is related with T1552 : Unsecured Credentials. Is related with T1040 : Network Sniffing.
|
Techniques related with vulnerability CVE-2017-10271
|
CVE-2017-10271 in WebLogic Server. Is related with T1190 : Exploit Public-Facing Application. Is related with T1203 : Exploitation for Client Execution.
|
Describe the vulnerability CVE-2019-1609
|
CVE-2019-1609, State: PUBLISHED, Published: 2019-03-08T20:00:00Z, Updated: 2024-09-16T18:39:44.091Z, Description: A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. MDS 9000 Series Multilayer Switches are affected in versions prior to 6.2(27), 8.1(1b), and 8.3(2). Nexus 3500 Platform Switches are affected in versions prior to 7.0(3)I7(6). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I4(9) and 7.0(3)I7(6). Nexus 3600 Platform Switches are affected in versions prior to 7.0(3)F3(5). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(22), 7.3(3)D1(1), 8.2(3), and 8.3(2). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected in versions prior to 7.0(3)I4(9) and7.0(3)I7(6). Nexus 9500 R-Series Line Cards and Fabric Modules are affected in versions prior to 7.0(3)F3(5)., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: LOW, Base Score: 4.2, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Describe the vulnerability CVE-2011-4862
|
CVE-2011-4862, State: PUBLISHED, Published: 2011-12-25T01:00:00, Updated: 2024-08-07T00:16:35.035Z, Description: Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, Heimdal 1.5.1 and earlier, GNU inetutils, and possibly other products allows remote attackers to execute arbitrary code via a long encryption key, as exploited in the wild in December 2011., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2009-1136
|
CVE-2009-1136 in Microsoft Office Web Components Spreadsheet ActiveX control. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise.
|
Describe the vulnerability CVE-2020-6808
|
CVE-2020-6808, State: PUBLISHED, Published: 2020-03-25T21:13:32, Updated: 2024-08-04T09:11:05.026Z, Description: When a JavaScript URL (javascript:) is evaluated and the result is a string, this string is parsed to create an HTML document, which is then presented. Previously, this document's URL (as reported by the document.location property, for example) was the originating javascript: URL which could lead to spoofing attacks; it is now correctly the URL of the originating document. This vulnerability affects Firefox < 74., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-9488
|
CVE-2018-9488 in Android. Is related with T1068 : Exploitation for Privilege Escalation.
|
Describe the vulnerability CVE-2019-13527
|
CVE-2019-13527, State: PUBLISHED, Published: 2019-09-24T21:16:22, Updated: 2024-08-04T23:57:38.957Z, Description: In Rockwell Automation Arena Simulation Software Cat. 9502-Ax, Versions 16.00.00 and earlier, a maliciously crafted Arena file opened by an unsuspecting user may result in the use of a pointer that has not been initialized., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-5297
|
CVE-2020-5297, State: PUBLISHED, Published: 2020-06-03T21:55:18, Updated: 2024-08-04T08:22:09.103Z, Description: In OctoberCMS (october/october composer package) versions from 1.0.319 and before 1.0.466, an attacker can exploit this vulnerability to upload jpg, jpeg, bmp, png, webp, gif, ico, css, js, woff, woff2, svg, ttf, eot, json, md, less, sass, scss, xml files to any directory of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the `cms.manage_assets` permission. Issue has been patched in Build 466 (v1.0.466)., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 3.4, Base Severity: LOW, Confidentiality Impact: NONE, Integrity Impact: LOW, Privileges Required: HIGH, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2017-11847
|
CVE-2017-11847, State: PUBLISHED, Published: 2017-11-15T03:00:00Z, Updated: 2024-09-16T23:01:41.212Z, Description: Windows kernel in Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and RT1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016, and Windows Server, version 1709 allows an attacker to run arbitrary code in kernel mode, install programs, view, change or delete data, and create new accounts with full user rights due to improperly handing objects in memory, aka "Windows Kernel Elevation of Privilege Vulnerability"., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2013-5054
|
CVE-2013-5054, State: PUBLISHED, Published: 2013-12-11T00:00:00, Updated: 2024-08-06T16:59:41.281Z, Description: Microsoft Office 2013 and 2013 RT allows remote attackers to discover authentication tokens via a crafted response to a file-open request for an Office file on a web site, as exploited in the wild in 2013, aka "Token Hijacking Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Describe MITRE technique T1059.006
|
MITRE T1059.006 : Python from enterprise Adversaries may abuse Python commands and scripts for execution. Python is a very popular scripting/programming language, with capabilities to perform many functions. Python can be executed interactively from the command-line (via the `python.exe` interpreter) or via scripts (.py) that can be written and distributed to different systems. Python code can also be compiled into binary executables.(Citation: Zscaler APT31 Covid-19 October 2020)
Python comes with many built-in packages to interact with the underlying system, such as file operations and device I/O. Adversaries can use these libraries to download and execute commands or other scripts as well as perform various malicious behaviors.
|
Describe MITRE technique T1036
|
MITRE T1036 : Masquerading from enterprise Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the name or location of an object, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. This may include manipulating file metadata, tricking users into misidentifying the file type, and giving legitimate task or service names.
Renaming abusable system utilities to evade security monitoring is also a form of [Masquerading](T1036).(Citation: LOLBAS Main Site)
|
Techniques related with vulnerability CVE-2020-3356
|
CVE-2020-3356 in Cisco Data Center Network Manager. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link.
|
Techniques related with vulnerability CVE-2018-19833
|
CVE-2018-19833 in Ethereum ERC20 token. Is related with T0828 : Loss of Productivity and Revenue. Is related with T1565.001 : Stored Data Manipulation.
|
Techniques related with vulnerability CVE-2015-6475
|
CVE-2015-6475 in IBC Solar ServeMaster TLP+ and Danfoss TLX Pro+. Is related with T1059.007 : JavaScript. Is related with T1185 : Man in the Browser.
|
Techniques related with vulnerability CVE-2014-7169
|
CVE-2014-7169 in GNU Bash through 4.3 bash43-025. Is related with T1203 : Exploitation for Client Execution.
|
Describe MITRE technique T1565
|
MITRE T1565 : Data Manipulation from enterprise Adversaries may insert, delete, or manipulate data in order to influence external outcomes or hide activity, thus threatening the integrity of the data.(Citation: Sygnia Elephant Beetle Jan 2022) By manipulating data, adversaries may attempt to affect a business process, organizational understanding, or decision making.
The type of modification and the impact it will have depends on the target application and process as well as the goals and objectives of the adversary. For complex systems, an adversary would likely need special expertise and possibly access to specialized software related to the system that would typically be gained through a prolonged information gathering campaign in order to have the desired impact.
|
Describe the vulnerability CVE-2019-12696
|
CVE-2019-12696, State: PUBLISHED, Published: 2019-10-02T19:06:47.817589Z, Updated: 2024-11-19T18:54:19.560Z, Description: Multiple vulnerabilities in the Cisco Firepower System Software Detection Engine could allow an unauthenticated, remote attacker to bypass configured Malware and File Policies for RTF and RAR file types. For more information about these vulnerabilities, see the Details section of this advisory., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 5.8, Base Severity: MEDIUM, Confidentiality Impact: NONE, Integrity Impact: LOW, Privileges Required: NONE, Scope: CHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Techniques related with vulnerability CVE-2019-1711
|
CVE-2019-1711 in Cisco IOS XR Software. Has primary impact with T1489 : Service Stop.
|
Describe the vulnerability CVE-2019-3717
|
CVE-2019-3717, State: PUBLISHED, Published: 2019-08-05T16:38:20.346820Z, Updated: 2024-09-16T16:43:43.212Z, Description: Select Dell Client Commercial and Consumer platforms contain an Improper Access Vulnerability. An unauthenticated attacker with physical access to the system could potentially bypass intended Secure Boot restrictions to run unsigned and untrusted code on expansion cards installed in the system during platform boot. Refer to https://www.dell.com/support/article/us/en/04/sln317683/dsa-2019-043-dell-client-improper-access-control-vulnerability?lang=en for versions affected by this vulnerability., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: PHYSICAL, Availability Impact: HIGH, Base Score: 7.1, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: LOW, Privileges Required: NONE, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-5373
|
CVE-2020-5373 in OMIMSSC (OpenManage Integration for Microsoft System Center). Has primary impact with T1190 : Exploit Public-Facing Application. Has secondary impact with T1005 : Data from Local System.
|
Techniques related with vulnerability CVE-2020-6820
|
CVE-2020-6820 in Thunderbird. Is related with T1055 : Process Injection. Is related with T1189 : Drive-by Compromise.
|
Describe the vulnerability CVE-2020-1350
|
CVE-2020-1350, State: PUBLISHED, Published: 2020-07-14T22:54:06, Updated: 2024-08-04T06:32:01.039Z, Description: A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests, aka 'Windows DNS Server Remote Code Execution Vulnerability'., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2013-5211
|
CVE-2013-5211, State: PUBLISHED, Published: 2014-01-02T11:00:00, Updated: 2024-08-06T17:06:52.374Z, Description: The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-7286
|
CVE-2019-7286, State: PUBLISHED, Published: 2019-12-18T17:33:16, Updated: 2024-08-04T20:46:45.872Z, Description: A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 12.1.4, macOS Mojave 10.14.3 Supplemental Update. An application may be able to gain elevated privileges., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe MITRE technique T1083
|
MITRE T1083 : File and Directory Discovery from enterprise Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system. Adversaries may use the information from [File and Directory Discovery](T1083) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.
Many command shell utilities can be used to obtain this information. Examples include `dir`, `tree`, `ls`, `find`, and `locate`.(Citation: Windows Commands JPCERT) Custom tools may also be used to gather file and directory information and interact with the [Native API](T1106). Adversaries may also leverage a [Network Device CLI](T1059.008) on network devices to gather file and directory information (e.g. `dir`, `show flash`, and/or `nvram`).(Citation: US-CERT-TA18-106A)
Some files and directories may require elevated or specific user permissions to access.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.