input
stringlengths
30
54
output
stringlengths
69
4.21k
Describe the vulnerability CVE-2018-5454
CVE-2018-5454, State: PUBLISHED, Published: 2018-03-26T14:00:00Z, Updated: 2024-09-16T16:57:42.535Z, Description: Philips IntelliSpace Portal all versions of 8.0.x, and 7.0.x have a vulnerability where code debugging methods are enabled, which could allow an attacker to remotely execute arbitrary code during runtime., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-0955
CVE-2020-0955 in Windows. Has primary impact with T1005 : Data from Local System.
Techniques related with vulnerability CVE-2010-0232
CVE-2010-0232 in kernel in Microsoft Windows NT 3.1 through Windows 7. Is related with T1608 : Stage Capabilities.
Techniques related with vulnerability CVE-2009-3459
CVE-2009-3459 in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File.
Describe the vulnerability CVE-2015-2546
CVE-2015-2546, State: PUBLISHED, Published: 2015-09-09T00:00:00, Updated: 2024-08-06T05:17:27.275Z, Description: The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows local users to gain privileges via a crafted application, aka "Win32k Memory Corruption Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-2511, CVE-2015-2517, and CVE-2015-2518., No CVSS metrics available, Exploit Info: No exploit information available
Describe MITRE technique T1409
MITRE T1409 : Stored Application Data from mobile Adversaries may try to access and collect application data resident on the device. Adversaries often target popular applications, such as Facebook, WeChat, and Gmail.(Citation: SWB Exodus March 2019) Due to mobile OS sandboxing, this technique is only possible in three scenarios: * An application stores files in unprotected external storage * An application stores files in its internal storage directory with insecure permissions (e.g. 777) * The adversary gains root permissions on the device
Techniques related with vulnerability CVE-2012-1557
CVE-2012-1557 in Parallels Plesk Panel. Is related with T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2020-3240
CVE-2020-3240, State: PUBLISHED, Published: 2020-04-15T20:10:34.963219Z, Updated: 2024-11-15T17:30:58.742Z, Description: Multiple vulnerabilities in the REST API of Cisco UCS Director and Cisco UCS Director Express for Big Data may allow a remote attacker to bypass authentication or conduct directory traversal attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 9.8, Base Severity: CRITICAL, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.
Techniques related with vulnerability CVE-2011-0096
CVE-2011-0096 in MHTML protocol handler in Microsoft Windows. Is related with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2020-5283
CVE-2020-5283 in viewvc. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1185 : Man in the Browser.
Techniques related with vulnerability CVE-2018-15782
CVE-2018-15782 in RSA Authentication Manager. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1566 : Phishing. Has an exploitation technique T1204.002 : Malicious File.
Techniques related with vulnerability CVE-2019-1703
CVE-2019-1703 in Cisco Firepower Threat Defense Software. Has primary impact with T1499.002 : Service Exhaustion Flood.
Describe the vulnerability CVE-2019-1021
CVE-2019-1021, State: PUBLISHED, Published: 2019-06-12T13:49:39, Updated: 2024-08-04T18:06:31.300Z, Description: An elevation of privilege exists in Windows Audio Service, aka 'Windows Audio Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1007, CVE-2019-1022, CVE-2019-1026, CVE-2019-1027, CVE-2019-1028., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-5366
CVE-2020-5366 in Integrated Dell Remote Access Controller (iDRAC). Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2017-14487
CVE-2017-14487 in OhMiBod Remote app for Android and iOS. Is related with T1552 : Unsecured Credentials. Is related with T1566 : Phishing. Is related with T1204 : User Execution. Is related with T0880 : Loss of Safety.
Describe the vulnerability CVE-2010-3333
CVE-2010-3333, State: PUBLISHED, Published: 2010-11-10T01:00:00, Updated: 2024-08-07T03:03:18.995Z, Description: Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via crafted RTF data, aka "RTF Stack Buffer Overflow Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2016-0099
CVE-2016-0099 in Microsoft Windows. Is related with T1055 : Process Injection.
Techniques related with vulnerability CVE-2020-15140
CVE-2020-15140 in Red-DiscordBot. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1133 : External Remote Services.
Describe the vulnerability CVE-2020-9380
CVE-2020-9380, State: PUBLISHED, Published: 2020-03-05T12:44:52, Updated: 2024-08-04T10:26:16.174Z, Description: IPTV Smarters WEB TV PLAYER through 2020-02-22 allows attackers to execute OS commands by uploading a script., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-5350
CVE-2020-5350, State: PUBLISHED, Published: 2020-04-15T18:00:18.727517Z, Updated: 2024-09-16T17:54:54.783Z, Description: Dell EMC Integrated Data Protection Appliance versions 2.0, 2.1, 2.2, 2.3, 2.4 contain a command injection vulnerability in the ACM component. A remote authenticated malicious user with root privileges could inject parameters in the ACM component APIs that could lead to manipulation of passwords and execution of malicious commands on ACM component., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 7.9, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: LOW, Privileges Required: HIGH, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe MITRE technique T1548.003
MITRE T1548.003 : Sudo and Sudo Caching from enterprise Adversaries may perform sudo caching and/or use the sudoers file to elevate privileges. Adversaries may do this to execute commands as other users or spawn processes with higher privileges. Within Linux and MacOS systems, sudo (sometimes referred to as "superuser do") allows users to perform commands from terminals with elevated privileges and to control who can perform these commands on the system. The `sudo` command "allows a system administrator to delegate authority to give certain users (or groups of users) the ability to run some (or all) commands as root or another user while providing an audit trail of the commands and their arguments."(Citation: sudo man page 2018) Since sudo was made for the system administrator, it has some useful configuration features such as a `timestamp_timeout`, which is the amount of time in minutes between instances of `sudo` before it will re-prompt for a password. This is because `sudo` has the ability to cache credentials for a period of time. Sudo creates (or touches) a file at `/var/db/sudo` with a timestamp of when sudo was last run to determine this timeout. Additionally, there is a `tty_tickets` variable that treats each new tty (terminal session) in isolation. This means that, for example, the sudo timeout of one tty will not affect another tty (you will have to type the password again). The sudoers file, `/etc/sudoers`, describes which users can run which commands and from which terminals. This also describes which commands users can run as other users or groups. This provides the principle of least privilege such that users are running in their lowest possible permissions for most of the time and only elevate to other users or permissions as needed, typically by prompting for a password. However, the sudoers file can also specify when to not prompt users for passwords with a line like `user1 ALL=(ALL) NOPASSWD: ALL`.(Citation: OSX.Dok Malware) Elevated privileges are required to edit this file though. Adversaries can also abuse poor configurations of these mechanisms to escalate privileges without needing the user's password. For example, `/var/db/sudo`'s timestamp can be monitored to see if it falls within the `timestamp_timeout` range. If it does, then malware can execute sudo commands without needing to supply the user's password. Additional, if `tty_tickets` is disabled, adversaries can do this from any tty for that user. In the wild, malware has disabled `tty_tickets` to potentially make scripting easier by issuing `echo \'Defaults !tty_tickets\' >> /etc/sudoers`.(Citation: cybereason osx proton) In order for this change to be reflected, the malware also issued `killall Terminal`. As of macOS Sierra, the sudoers file has `tty_tickets` enabled by default.
Describe the vulnerability CVE-2020-5266
CVE-2020-5266, State: PUBLISHED, Published: 2020-04-16T21:15:21, Updated: 2024-08-04T08:22:09.107Z, Description: In the ps_link module for PrestaShop before version 3.1.0, there is a stored XSS when you create or edit a link list block with the title field. The problem is fixed in 3.1.0, CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 4.4, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: LOW, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-3513
CVE-2020-3513, State: PUBLISHED, Published: 2020-09-24T17:51:31.108442Z, Updated: 2024-11-13T18:00:59.732Z, Description: Multiple vulnerabilities in the initialization routines that are executed during bootup of Cisco IOS XE Software for Cisco ASR 900 Series Aggregation Services Routers with a Route Switch Processor 3 (RSP3) installed could allow an authenticated, local attacker with high privileges to execute persistent code at bootup and break the chain of trust. These vulnerabilities are due to incorrect validations by boot scripts when specific ROM monitor (ROMMON) variables are set. An attacker could exploit these vulnerabilities by copying a specific file to the local file system of an affected device and defining specific ROMMON variables. A successful exploit could allow the attacker to run arbitrary code on the underlying operating system (OS) with root privileges. To exploit these vulnerabilities, an attacker would need to have access to the root shell on the device or have physical access to the device., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: HIGH, Base Score: 6.7, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.
Techniques related with vulnerability CVE-2018-10376
CVE-2018-10376 in smart contract implementation for SmartMesh (aka SMT), an Ethereum ERC20 token. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2019-6549
CVE-2019-6549, State: PUBLISHED, Published: 2019-02-12T18:00:00Z, Updated: 2024-09-16T22:30:41.714Z, Description: An attacker could retrieve plain-text credentials stored in a XML file on PR100088 Modbus gateway versions prior to Release R02 (or Software Version 1.1.13166) through FTP., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2017-14487
CVE-2017-14487, State: PUBLISHED, Published: 2017-12-01T17:00:00, Updated: 2024-08-05T19:27:40.779Z, Description: The OhMiBod Remote app for Android and iOS allows remote attackers to impersonate users by sniffing network traffic for search responses from the OhMiBod API server and then editing the username, user_id, and token fields in data/data/com.ohmibod.remote2/shared_prefs/OMB.xml., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-11078
CVE-2020-11078 in httplib2. Has primary impact with T1190 : Exploit Public-Facing Application.
Describe MITRE technique T1036
MITRE T1036 : Masquerading from enterprise Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the name or location of an object, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. This may include manipulating file metadata, tricking users into misidentifying the file type, and giving legitimate task or service names. Renaming abusable system utilities to evade security monitoring is also a form of [Masquerading](T1036).(Citation: LOLBAS Main Site)
Describe the vulnerability CVE-2020-1425
CVE-2020-1425, State: PUBLISHED, Published: 2020-07-27T18:50:12, Updated: 2024-08-04T06:39:10.299Z, Description: A remoted code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory, aka 'Microsoft Windows Codecs Library Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1457., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2019-6563
CVE-2019-6563 in Moxa IKS, EDS. Has primary impact with T1539 : Steal Web Session Cookie. Has secondary impact with T1078 : Valid Accounts. Has an exploitation technique T1110 : Brute Force.
Techniques related with vulnerability CVE-2013-1331
CVE-2013-1331 in Microsoft Office. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File.
Techniques related with vulnerability CVE-2019-15287
CVE-2019-15287 in Cisco WebEx WRF Player. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1204.002 : Malicious File.
Techniques related with vulnerability CVE-2017-14486
CVE-2017-14486 in Vibease Wireless Remote Vibrator app for Android and the Vibease Chat app for iOS. Is related with T1548 : Abuse Elevation Control Mechanism. Is related with T1499.004 : Application or System Exploitation.
Describe the vulnerability CVE-2018-20753
CVE-2018-20753, State: PUBLISHED, Published: 2019-02-05T05:00:00, Updated: 2024-08-05T12:12:28.564Z, Description: Kaseya VSA RMM before R9.3 9.3.0.35, R9.4 before 9.4.0.36, and R9.5 before 9.5.0.5 allows unprivileged remote attackers to execute PowerShell payloads on all managed devices. In January 2018, attackers actively exploited this vulnerability in the wild., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-6522
CVE-2019-6522, State: PUBLISHED, Published: 2019-03-05T21:00:00Z, Updated: 2024-09-17T02:32:19.762Z, Description: Moxa IKS and EDS fails to properly check array bounds which may allow an attacker to read device memory on arbitrary addresses, and may allow an attacker to retrieve sensitive data or cause device reboot., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-1764
CVE-2019-1764, State: PUBLISHED, Published: 2019-03-22T20:05:29.129200Z, Updated: 2024-09-17T03:37:54.641Z, Description: A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack. The vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on a targeted device via a web browser and with the privileges of the user. This vulnerability affects Cisco IP Phone 8800 Series products running a SIP Software release prior to 11.0(5) for Wireless IP Phone 8821 and 8821-EX; and 12.5(1)SR1 for the IP Conference Phone 8832 and the rest of the IP Phone 8800 Series. Cisco IP Conference Phone 8831 is not affected., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.1, Base Severity: HIGH, Confidentiality Impact: NONE, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Describe the vulnerability CVE-2019-3782
CVE-2019-3782, State: PUBLISHED, Published: 2019-02-13T16:00:00Z, Updated: 2024-09-16T23:36:58.237Z, Description: Cloud Foundry CredHub CLI, versions prior to 2.2.1, inadvertently writes authentication credentials provided via environment variables to its persistent config file. A local authenticated malicious user with access to the CredHub CLI config file can use these credentials to retrieve and modify credentials stored in CredHub that are authorized to the targeted user., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: LOW, Base Score: 6.3, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: LOW, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2014-0307
CVE-2014-0307 in Internet Explorer 9. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2012-1557
CVE-2012-1557, State: PUBLISHED, Published: 2012-03-12T19:00:00, Updated: 2024-08-06T19:01:02.567Z, Description: SQL injection vulnerability in admin/plib/api-rpc/Agent.php in Parallels Plesk Panel 7.x and 8.x before 8.6 MU#2, 9.x before 9.5 MU#11, 10.0.x before MU#13, 10.1.x before MU#22, 10.2.x before MU#16, and 10.3.x before MU#5 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, as exploited in the wild in March 2012., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2008-0655
CVE-2008-0655 in Adobe Reader and Acrobat before 8.1.2. Is related with T1548.002 : Bypass User Account Control. Is related with T1068 : Exploitation for Privilege Escalation.
Techniques related with vulnerability CVE-2010-4398
CVE-2010-4398 in win32k.sys in Microsoft Windows. Is related with T1203 : Exploitation for Client Execution.
Techniques related with vulnerability CVE-2020-1141
CVE-2020-1141 in Windows. Has primary impact with T1005 : Data from Local System. Has secondary impact with T1211 : Exploitation for Defense Evasion.
Describe the vulnerability CVE-2018-8248
CVE-2018-8248, State: PUBLISHED, Published: 2018-06-14T12:00:00, Updated: 2024-08-05T06:46:13.856Z, Description: A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka "Microsoft Excel Remote Code Execution Vulnerability." This affects Microsoft Office., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2017-0005
CVE-2017-0005 in Windows GDI. Is related with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2019-0708
CVE-2019-0708 in Windows. Is related with T1574 : Hijack Execution Flow. Is related with T1068 : Exploitation for Privilege Escalation.
Describe the vulnerability CVE-2018-8852
CVE-2018-8852, State: PUBLISHED, Published: 2018-09-26T19:00:00Z, Updated: 2024-09-16T23:22:08.056Z, Description: Philips e-Alert Unit (non-medical device), Version R2.1 and prior. When authenticating a user or otherwise establishing a new user session, the software gives an attacker the opportunity to steal authenticated sessions without invalidating any existing session identifier., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-18578
CVE-2019-18578, State: PUBLISHED, Published: 2020-03-13T20:30:21.567499Z, Updated: 2024-09-16T23:41:09.666Z, Description: Dell EMC XtremIO XMS versions prior to 6.3.0 contain a stored cross-site scripting vulnerability. A low-privileged malicious remote user of XtremIO may exploit this vulnerability to store malicious HTML or JavaScript code in application fields. When victim users access the injected page through their browsers, the malicious code may be executed by the web browser in the context of the vulnerable web application., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 9, Base Severity: CRITICAL, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
Describe MITRE technique T0828
MITRE T0828 : Loss of Productivity and Revenue from ics Adversaries may cause loss of productivity and revenue through disruption and even damage to the availability and integrity of control system operations, devices, and related processes. This technique may manifest as a direct effect of an ICS-targeting attack or tangentially, due to an IT-targeting attack against non-segregated environments. In cases where these operations or services are brought to a halt, the loss of productivity may eventually present an impact for the end-users or consumers of products and services. The disrupted supply-chain may result in supply shortages and increased prices, among other consequences. A ransomware attack on an Australian beverage company resulted in the shutdown of some manufacturing sites, including precautionary halts to protect key systems. (Citation: Paganini, Pierluigi June 2020) The company announced the potential for temporary shortages of their products following the attack. (Citation: Paganini, Pierluigi June 2020) (Citation: Lion Corporation June 2020) In the 2021 Colonial Pipeline ransomware incident, the pipeline was unable to transport approximately 2.5 million barrels of fuel per day to the East Coast. (Citation: Colonial Pipeline Company May 2021)
Describe the vulnerability CVE-2019-1753
CVE-2019-1753, State: PUBLISHED, Published: 2019-03-28T00:10:13.846196Z, Updated: 2024-11-20T17:25:06.350Z, Description: A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated but unprivileged (level 1), remote attacker to run privileged Cisco IOS commands by using the web UI. The vulnerability is due to a failure to validate and sanitize input in Web Services Management Agent (WSMA) functions. An attacker could exploit this vulnerability by submitting a malicious payload to the affected device's web UI. A successful exploit could allow the lower-privileged attacker to execute arbitrary commands with higher privileges on the affected device., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.8, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Describe MITRE technique T1499
MITRE T1499 : Endpoint Denial of Service from enterprise Adversaries may perform Endpoint Denial of Service (DoS) attacks to degrade or block the availability of services to users. Endpoint DoS can be performed by exhausting the system resources those services are hosted on or exploiting the system to cause a persistent crash condition. Example services include websites, email services, DNS, and web-based applications. Adversaries have been observed conducting DoS attacks for political purposes(Citation: FireEye OpPoisonedHandover February 2016) and to support other malicious activities, including distraction(Citation: FSISAC FraudNetDoS September 2012), hacktivism, and extortion.(Citation: Symantec DDoS October 2014) An Endpoint DoS denies the availability of a service without saturating the network used to provide access to the service. Adversaries can target various layers of the application stack that is hosted on the system used to provide the service. These layers include the Operating Systems (OS), server applications such as web servers, DNS servers, databases, and the (typically web-based) applications that sit on top of them. Attacking each layer requires different techniques that take advantage of bottlenecks that are unique to the respective components. A DoS attack may be generated by a single system or multiple systems spread across the internet, which is commonly referred to as a distributed DoS (DDoS). To perform DoS attacks against endpoint resources, several aspects apply to multiple methods, including IP address spoofing and botnets. Adversaries may use the original IP address of an attacking system, or spoof the source IP address to make the attack traffic more difficult to trace back to the attacking system or to enable reflection. This can increase the difficulty defenders have in defending against the attack by reducing or eliminating the effectiveness of filtering by the source address on network defense devices. Botnets are commonly used to conduct DDoS attacks against networks and services. Large botnets can generate a significant amount of traffic from systems spread across the global internet. Adversaries may have the resources to build out and control their own botnet infrastructure or may rent time on an existing botnet to conduct an attack. In some of the worst cases for DDoS, so many systems are used to generate requests that each one only needs to send out a small amount of traffic to produce enough volume to exhaust the target's resources. In such circumstances, distinguishing DDoS traffic from legitimate clients becomes exceedingly difficult. Botnets have been used in some of the most high-profile DDoS attacks, such as the 2012 series of incidents that targeted major US banks.(Citation: USNYAG IranianBotnet March 2016) In cases where traffic manipulation is used, there may be points in the global network (such as high traffic gateway routers) where packets can be altered and cause legitimate clients to execute code that directs network packets toward a target in high volume. This type of capability was previously used for the purposes of web censorship where client HTTP traffic was modified to include a reference to JavaScript that generated the DDoS code to overwhelm target web servers.(Citation: ArsTechnica Great Firewall of China) For attacks attempting to saturate the providing network, see [Network Denial of Service](T1498).
Describe MITRE technique T1461
MITRE T1461 : Lockscreen Bypass from mobile An adversary with physical access to a mobile device may seek to bypass the device’s lockscreen. Several methods exist to accomplish this, including: * Biometric spoofing: If biometric authentication is used, an adversary could attempt to spoof a mobile device’s biometric authentication mechanism. Both iOS and Android partly mitigate this attack by requiring the device’s passcode rather than biometrics to unlock the device after every device restart, and after a set or random amount of time.(Citation: SRLabs-Fingerprint)(Citation: TheSun-FaceID) * Unlock code bypass: An adversary could attempt to brute-force or otherwise guess the lockscreen passcode (typically a PIN or password), including physically observing (“shoulder surfing”) the device owner’s use of the lockscreen passcode. Mobile OS vendors partly mitigate this by implementing incremental backoff timers after a set number of failed unlock attempts, as well as a configurable full device wipe after several failed unlock attempts. * Vulnerability exploit: Techniques have been periodically demonstrated that exploit mobile devices to bypass the lockscreen. The vulnerabilities are generally patched by the device or OS vendor once disclosed.(Citation: Wired-AndroidBypass)(Citation: Kaspersky-iOSBypass)
Techniques related with vulnerability CVE-2019-3799
CVE-2019-3799 in Spring Cloud Config. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2016-1409
CVE-2016-1409, State: PUBLISHED, Published: 2016-05-29T22:00:00, Updated: 2024-08-05T22:55:14.367Z, Description: The Neighbor Discovery (ND) protocol implementation in the IPv6 stack in Cisco IOS XE 2.1 through 3.17S, IOS XR 2.0.0 through 5.3.2, and NX-OS allows remote attackers to cause a denial of service (packet-processing outage) via crafted ND messages, aka Bug ID CSCuz66542, as exploited in the wild in May 2016., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-5270
CVE-2020-5270 in PrestaShop. Has secondary impact with T1036 : Masquerading. Has secondary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has secondary impact with T1005 : Data from Local System. Has an exploitation technique T1566.002 : Spearphishing Link.
Techniques related with vulnerability CVE-2010-3765
CVE-2010-3765 in Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10. Is related with T1190 : Exploit Public-Facing Application. Is related with T1548 : Abuse Elevation Control Mechanism.
Techniques related with vulnerability CVE-2020-16200
CVE-2020-16200 in Philips Clinical Collaboration Platform. Has primary impact with T1496 : Resource Hijacking. Has secondary impact with T0826 : Loss of Availability.
Techniques related with vulnerability CVE-2014-6271
CVE-2014-6271 in GNU Bash through 4.3. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059.004 : Unix Shell.
Techniques related with vulnerability CVE-2016-9299
CVE-2016-9299 in Jenkins before 2.32 and LTS before 2.19.3. Is related with T1203 : Exploitation for Client Execution.
Techniques related with vulnerability CVE-2020-5266
CVE-2020-5266 in ps_linklist. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1189 : Drive-by Compromise.
Describe the vulnerability CVE-2019-1886
CVE-2019-1886, State: PUBLISHED, Published: 2019-07-04T19:50:10.367933Z, Updated: 2024-11-19T19:03:49.939Z, Description: A vulnerability in the HTTPS decryption feature of Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to insufficient validation of Secure Sockets Layer (SSL) server certificates. An attacker could exploit this vulnerability by installing a malformed certificate in a web server and sending a request to it through the Cisco WSA. A successful exploit could allow the attacker to cause an unexpected restart of the proxy process on an affected device., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.6, Base Severity: HIGH, Confidentiality Impact: NONE, Integrity Impact: NONE, Privileges Required: NONE, Scope: CHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Techniques related with vulnerability CVE-2019-16302
CVE-2019-16302 in Open Network Operating System (ONOS) 1.14. Is related with T1499.004 : Application or System Exploitation.
Describe the vulnerability CVE-2019-3568
CVE-2019-3568, State: PUBLISHED, Published: 2019-05-14T19:52:40, Updated: 2024-08-04T19:12:09.468Z, Description: A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of RTCP packets sent to a target phone number. The issue affects WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android prior to v2.19.44, WhatsApp for iOS prior to v2.19.51, WhatsApp Business for iOS prior to v2.19.51, WhatsApp for Windows Phone prior to v2.18.348, and WhatsApp for Tizen prior to v2.18.15., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-2883
CVE-2020-2883, State: PUBLISHED, Published: 2020-04-15T13:29:50, Updated: 2024-09-27T18:54:53.656Z, Description: Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 9.8, Base Severity: CRITICAL, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2016-1409
CVE-2016-1409 in Cisco IOS XE 2.1 through 3.17S, IOS XR 2.0.0 through 5.3.2, and NX-OS. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2015-1701
CVE-2015-1701, State: PUBLISHED, Published: 2015-04-21T10:00:00, Updated: 2024-08-06T04:47:17.780Z, Description: Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka "Win32k Elevation of Privilege Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2009-1151
CVE-2009-1151 in phpMyAdmin 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
Techniques related with vulnerability CVE-2019-0926
CVE-2019-0926 in Microsoft Edge. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1189 : Drive-by Compromise. Has an exploitation technique T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2018-8833
CVE-2018-8833, State: PUBLISHED, Published: 2018-04-25T23:00:00Z, Updated: 2024-09-17T00:52:16.210Z, Description: Heap-based buffer overflow vulnerabilities in Advantech WebAccess HMI Designer 2.1.7.32 and prior caused by processing specially crafted .pm3 files may allow remote code execution., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2017-0261
CVE-2017-0261, State: PUBLISHED, Published: 2017-05-12T14:00:00, Updated: 2024-08-05T12:55:19.147Z, Description: Microsoft Office 2010 SP2, Office 2013 SP1, and Office 2016 allow a remote code execution vulnerability when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0262 and CVE-2017-0281., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-15767
CVE-2018-15767, State: PUBLISHED, Published: 2018-11-30T17:00:00Z, Updated: 2024-09-17T03:53:45.259Z, Description: The Dell OpenManage Network Manager virtual appliance versions prior to 6.5.3 contain an improper authorization vulnerability caused by a misconfiguration in the /etc/sudoers file., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-6538
CVE-2019-6538, State: PUBLISHED, Published: 2019-03-25T21:26:03, Updated: 2024-08-04T20:23:21.992Z, Description: The Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 24950 and 24952, CareLink Monitor version 2490C, CareLink 2090 Programmer, Amplia CRT-D, Claria CRT-D, Compia CRT-D, Concerto CRT-D, Concerto II CRT-D, Consulta CRT-D, Evera ICD, Maximo II CRT-D and ICD, Mirro ICD, Nayamed ND ICD, Primo ICD, Protecta ICD and CRT-D, Secura ICD, Virtuoso ICD, Virtuoso II ICD, Visia AF ICD, and Viva CRT-D does not implement authentication or authorization. An attacker with adjacent short-range access to an affected product, in situations where the product’s radio is turned on, can inject, replay, modify, and/or intercept data within the telemetry communication. This communication protocol provides the ability to read and write memory values to affected implanted cardiac devices; therefore, an attacker could exploit this communication protocol to change memory in the implanted cardiac device., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-15179
CVE-2020-15179 in wiki-scratchsig. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1185 : Man in the Browser.
Describe the vulnerability CVE-2020-11896
CVE-2020-11896, State: PUBLISHED, Published: 2020-06-17T10:21:31, Updated: 2024-08-04T11:42:00.799Z, Description: The Treck TCP/IP stack before 6.0.1.66 allows Remote Code Execution, related to IPv4 tunneling., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-12029
CVE-2020-12029 in FactoryTalk View SE. Has primary impact with T1505.003 : Web Shell. Has secondary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1133 : External Remote Services.
Techniques related with vulnerability CVE-2018-8575
CVE-2018-8575 in Microsoft Project. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation. Has secondary impact with T1485 : Data Destruction. Has secondary impact with T1136 : Create Account. Has an exploitation technique T1204.002 : Malicious File. Has an exploitation technique T1566 : Phishing.
Describe the vulnerability CVE-2016-9684
CVE-2016-9684, State: PUBLISHED, Published: 2017-02-22T05:00:00, Updated: 2024-08-06T02:59:03.230Z, Description: The SonicWall Secure Remote Access server (version 8.1.0.2-14sv) is vulnerable to a Remote Command Injection vulnerability in its web administrative interface. This vulnerability occurs in the 'viewcert' CGI (/cgi-bin/viewcert) component responsible for processing SSL certificate information. The CGI application doesn't properly escape the information it's passed in the 'CERT' variable before a call to system() is performed - allowing for remote command injection. Exploitation of this vulnerability yields shell access to the remote machine under the nobody user account., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2012-3015
CVE-2012-3015, State: PUBLISHED, Published: 2012-07-26T10:00:00Z, Updated: 2024-09-16T19:31:37.262Z, Description: Untrusted search path vulnerability in Siemens SIMATIC STEP7 before 5.5 SP1, as used in SIMATIC PCS7 7.1 SP3 and earlier and other products, allows local users to gain privileges via a Trojan horse DLL in a STEP7 project folder., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-5451
CVE-2018-5451, State: PUBLISHED, Published: 2018-03-28T17:00:00Z, Updated: 2024-09-17T04:00:25.428Z, Description: In Philips Alice 6 System version R8.0.2 or prior, when an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct. This weakness can lead to the exposure of resources or functionality to unintended actors, possibly providing attackers with sensitive information or the ability to execute arbitrary code., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2014-4076
CVE-2014-4076, State: PUBLISHED, Published: 2014-11-11T22:00:00, Updated: 2024-08-06T11:04:28.336Z, Description: Microsoft Windows Server 2003 SP2 allows local users to gain privileges via a crafted IOCTL call to (1) tcpip.sys or (2) tcpip6.sys, aka "TCP/IP Elevation of Privilege Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-15795
CVE-2018-15795, State: PUBLISHED, Published: 2018-11-13T14:00:00Z, Updated: 2024-09-16T16:47:36.058Z, Description: Pivotal CredHub Service Broker, versions prior to 1.1.0, uses a guessable form of random number generation in creating service broker's UAA client. A remote malicious user may guess the client secret and obtain or modify credentials for users of the CredHub Service., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: ADJACENT_NETWORK, Availability Impact: NONE, Base Score: 8.1, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-5269
CVE-2020-5269 in PrestaShop. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link.
Techniques related with vulnerability CVE-2019-10973
CVE-2019-10973 in Quest KACE. Is related with T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2016-5180
CVE-2016-5180, State: PUBLISHED, Published: 2016-10-03T15:00:00, Updated: 2024-08-06T00:53:48.437Z, Description: Heap-based buffer overflow in the ares_create_query function in c-ares 1.x before 1.12.0 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly execute arbitrary code via a hostname with an escaped trailing dot., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2014-3413
CVE-2014-3413, State: PUBLISHED, Published: 2018-04-05T17:00:00, Updated: 2024-08-06T10:43:05.519Z, Description: The MySQL server in Juniper Networks Junos Space before 13.3R1.8 has an unspecified account with a hardcoded password, which allows remote attackers to obtain sensitive information and consequently obtain administrative control by leveraging database access., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-1594
CVE-2019-1594, State: PUBLISHED, Published: 2019-03-06T22:00:00Z, Updated: 2024-09-16T23:41:55.492Z, Description: A vulnerability in the 802.1X implementation for Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incomplete input validation of Extensible Authentication Protocol over LAN (EAPOL) frames. An attacker could exploit this vulnerability by sending a crafted EAPOL frame to an interface on the targeted device. A successful exploit could allow the attacker to cause the Layer 2 (L2) forwarding process to restart multiple times, leading to a system-level restart of the device and a DoS condition. Note: This vulnerability affects only NX-OS devices configured with 802.1X functionality. Cisco Nexus 1000V Switch for VMware vSphere devices are affected in versions prior to 5.2(1)SV3(1.4b). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I7(4). Nexus 3500 Platform Switches are affected in versions prior to 7.0(3)I7(4). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected in versions prior to 7.3(5)N1(1) and 7.1(5)N1(1b). Nexus 7000 and 7700 Series Switches are affected in versions prior to 8.2(3). Nexus 9000 Series Fabric Switches in ACI Mode are affected in versions prior to 13.2(1l). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected in versions prior to 7.0(3)I7(4)., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: ADJACENT_NETWORK, Availability Impact: HIGH, Base Score: 7.4, Base Severity: HIGH, Confidentiality Impact: NONE, Integrity Impact: NONE, Privileges Required: NONE, Scope: CHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Describe the vulnerability CVE-2014-4114
CVE-2014-4114, State: PUBLISHED, Published: 2014-10-15T10:00:00, Updated: 2024-08-06T11:04:28.644Z, Description: Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted OLE object in an Office document, as exploited in the wild with a "Sandworm" attack in June through October 2014, aka "Windows OLE Remote Code Execution Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2017-0493
CVE-2017-0493, State: PUBLISHED, Published: 2017-05-12T15:00:00, Updated: 2024-08-05T13:11:05.686Z, Description: An information disclosure vulnerability in File-Based Encryption could enable a local malicious attacker to bypass operating system protections for the lock screen. This issue is rated as Moderate due to the possibility of bypassing the lock screen. Product: Android. Versions: 7.0, 7.1.1. Android ID: A-32793550., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-11021
CVE-2020-11021, State: PUBLISHED, Published: 2020-04-29T18:00:20, Updated: 2024-08-04T11:21:14.534Z, Description: Actions Http-Client (NPM @actions/http-client) before version 1.0.8 can disclose Authorization headers to incorrect domain in certain redirect scenarios. The conditions in which this happens are if consumers of the http-client: 1. make an http request with an authorization header 2. that request leads to a redirect (302) and 3. the redirect url redirects to another domain or hostname Then the authorization header will get passed to the other domain. The problem is fixed in version 1.0.8., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 6.3, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: NONE, Privileges Required: LOW, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2019-3798
CVE-2019-3798 in CAPI-release. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1136 : Create Account.
Techniques related with vulnerability CVE-2019-3782
CVE-2019-3782 in CredHub CLI. Has primary impact with T1552.001 : Credentials In Files. Has secondary impact with T1098 : Account Manipulation.
Describe the vulnerability CVE-2008-0655
CVE-2008-0655, State: PUBLISHED, Published: 2008-02-07T20:00:00, Updated: 2024-08-07T07:54:23.254Z, Description: Multiple unspecified vulnerabilities in Adobe Reader and Acrobat before 8.1.2 have unknown impact and attack vectors., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2015-7931
CVE-2015-7931 in Java client in Adcon Telemetry A840 Telemetry Gateway Base Station. Is related with T1557 : Man-in-the-Middle.
Describe the vulnerability CVE-2020-1020
CVE-2020-1020, State: PUBLISHED, Published: 2020-04-15T15:13:27, Updated: 2024-08-04T06:25:00.677Z, Description: A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font - Adobe Type 1 PostScript format.For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely, aka 'Adobe Font Manager Library Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0938., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-3477
CVE-2020-3477, State: PUBLISHED, Published: 2020-09-24T17:52:48.475365Z, Updated: 2024-11-13T17:58:01.086Z, Description: A vulnerability in the CLI parser of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, local attacker to access files from the flash: filesystem. The vulnerability is due to insufficient application of restrictions during the execution of a specific command. An attacker could exploit this vulnerability by using a specific command at the command line. A successful exploit could allow the attacker to obtain read-only access to files that are located on the flash: filesystem that otherwise might not have been accessible., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: NONE, Base Score: 5.5, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: NONE, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Techniques related with vulnerability CVE-2017-0222
CVE-2017-0222 in Internet Explorer. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise.
Techniques related with vulnerability CVE-2015-4902
CVE-2015-4902 in Oracle Java SE 6u101, 7u85, and 8u60. Is related with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2020-11884
CVE-2020-11884 in Linux kernel 4.19 through 5.6.7 on the s390 platform. Is related with T1499.004 : Application or System Exploitation.
Techniques related with vulnerability CVE-2020-3375
CVE-2020-3375 in Cisco SD-WAN vManage. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2015-2945
CVE-2015-2945, State: PUBLISHED, Published: 2015-05-25T17:00:00, Updated: 2024-08-06T05:32:20.593Z, Description: mt-phpincgi.php in Hajime Fujimoto mt-phpincgi before 2015-05-15 does not properly restrict URLs, which allows remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted request, as exploited in the wild in May 2015., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2009-0824
CVE-2009-0824, State: PUBLISHED, Published: 2009-03-14T18:00:00, Updated: 2024-08-07T04:48:52.378Z, Description: Elaborate Bytes ElbyCDIO.sys 6.0.2.0 and earlier, as distributed in SlySoft AnyDVD before 6.5.2.6, Virtual CloneDrive 5.4.2.3 and earlier, CloneDVD 2.9.2.0 and earlier, and CloneCD 5.3.1.3 and earlier, uses the METHOD_NEITHER communication method for IOCTLs and does not properly validate a buffer associated with the Irp object, which allows local users to cause a denial of service (system crash) via a crafted IOCTL call., No CVSS metrics available, Exploit Info: No exploit information available