input stringlengths 30 54 | output stringlengths 69 4.21k |
|---|---|
Describe the vulnerability CVE-2018-5454 | CVE-2018-5454, State: PUBLISHED, Published: 2018-03-26T14:00:00Z, Updated: 2024-09-16T16:57:42.535Z, Description: Philips IntelliSpace Portal all versions of 8.0.x, and 7.0.x have a vulnerability where code debugging methods are enabled, which could allow an attacker to remotely execute arbitrary code during runtime., ... |
Techniques related with vulnerability CVE-2020-0955 | CVE-2020-0955 in Windows. Has primary impact with T1005 : Data from Local System. |
Techniques related with vulnerability CVE-2010-0232 | CVE-2010-0232 in kernel in Microsoft Windows NT 3.1 through Windows 7. Is related with T1608 : Stage Capabilities. |
Techniques related with vulnerability CVE-2009-3459 | CVE-2009-3459 in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File. |
Describe the vulnerability CVE-2015-2546 | CVE-2015-2546, State: PUBLISHED, Published: 2015-09-09T00:00:00, Updated: 2024-08-06T05:17:27.275Z, Description: The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allo... |
Describe MITRE technique T1409 | MITRE T1409 : Stored Application Data from mobile Adversaries may try to access and collect application data resident on the device. Adversaries often target popular applications, such as Facebook, WeChat, and Gmail.(Citation: SWB Exodus March 2019)
Due to mobile OS sandboxing, this technique is only possible in ... |
Techniques related with vulnerability CVE-2012-1557 | CVE-2012-1557 in Parallels Plesk Panel. Is related with T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2020-3240 | CVE-2020-3240, State: PUBLISHED, Published: 2020-04-15T20:10:34.963219Z, Updated: 2024-11-15T17:30:58.742Z, Description: Multiple vulnerabilities in the REST API of Cisco UCS Director and Cisco UCS Director Express for Big Data may allow a remote attacker to bypass authentication or conduct directory traversal attacks ... |
Techniques related with vulnerability CVE-2011-0096 | CVE-2011-0096 in MHTML protocol handler in Microsoft Windows. Is related with T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2020-5283 | CVE-2020-5283 in viewvc. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1185 : Man in the Browser. |
Techniques related with vulnerability CVE-2018-15782 | CVE-2018-15782 in RSA Authentication Manager. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1566 : Phishing. Has an exploitation technique T1204.002 : Malicious File. |
Techniques related with vulnerability CVE-2019-1703 | CVE-2019-1703 in Cisco Firepower Threat Defense Software. Has primary impact with T1499.002 : Service Exhaustion Flood. |
Describe the vulnerability CVE-2019-1021 | CVE-2019-1021, State: PUBLISHED, Published: 2019-06-12T13:49:39, Updated: 2024-08-04T18:06:31.300Z, Description: An elevation of privilege exists in Windows Audio Service, aka 'Windows Audio Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1007, CVE-2019-1022, CVE-2019-1026, CVE-2019-1... |
Techniques related with vulnerability CVE-2020-5366 | CVE-2020-5366 in Integrated Dell Remote Access Controller (iDRAC). Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2017-14487 | CVE-2017-14487 in OhMiBod Remote app for Android and iOS. Is related with T1552 : Unsecured Credentials. Is related with T1566 : Phishing. Is related with T1204 : User Execution. Is related with T0880 : Loss of Safety. |
Describe the vulnerability CVE-2010-3333 | CVE-2010-3333, State: PUBLISHED, Published: 2010-11-10T01:00:00, Updated: 2024-08-07T03:03:18.995Z, Description: Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allows rem... |
Techniques related with vulnerability CVE-2016-0099 | CVE-2016-0099 in Microsoft Windows. Is related with T1055 : Process Injection. |
Techniques related with vulnerability CVE-2020-15140 | CVE-2020-15140 in Red-DiscordBot. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1133 : External Remote Services. |
Describe the vulnerability CVE-2020-9380 | CVE-2020-9380, State: PUBLISHED, Published: 2020-03-05T12:44:52, Updated: 2024-08-04T10:26:16.174Z, Description: IPTV Smarters WEB TV PLAYER through 2020-02-22 allows attackers to execute OS commands by uploading a script., No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2020-5350 | CVE-2020-5350, State: PUBLISHED, Published: 2020-04-15T18:00:18.727517Z, Updated: 2024-09-16T17:54:54.783Z, Description: Dell EMC Integrated Data Protection Appliance versions 2.0, 2.1, 2.2, 2.3, 2.4 contain a command injection vulnerability in the ACM component. A remote authenticated malicious user with root privileg... |
Describe MITRE technique T1548.003 | MITRE T1548.003 : Sudo and Sudo Caching from enterprise Adversaries may perform sudo caching and/or use the sudoers file to elevate privileges. Adversaries may do this to execute commands as other users or spawn processes with higher privileges.
Within Linux and MacOS systems, sudo (sometimes referred to as "superuser... |
Describe the vulnerability CVE-2020-5266 | CVE-2020-5266, State: PUBLISHED, Published: 2020-04-16T21:15:21, Updated: 2024-08-04T08:22:09.107Z, Description: In the ps_link module for PrestaShop before version 3.1.0, there is a stored XSS when you create or edit a link list block with the title field. The problem is fixed in 3.1.0, CVSS v3.1 - Attack Complexity: ... |
Describe the vulnerability CVE-2020-3513 | CVE-2020-3513, State: PUBLISHED, Published: 2020-09-24T17:51:31.108442Z, Updated: 2024-11-13T18:00:59.732Z, Description: Multiple vulnerabilities in the initialization routines that are executed during bootup of Cisco IOS XE Software for Cisco ASR 900 Series Aggregation Services Routers with a Route Switch Processor 3 ... |
Techniques related with vulnerability CVE-2018-10376 | CVE-2018-10376 in smart contract implementation for SmartMesh (aka SMT), an Ethereum ERC20 token. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2019-6549 | CVE-2019-6549, State: PUBLISHED, Published: 2019-02-12T18:00:00Z, Updated: 2024-09-16T22:30:41.714Z, Description: An attacker could retrieve plain-text credentials stored in a XML file on PR100088 Modbus gateway versions prior to Release R02 (or Software Version 1.1.13166) through FTP., No CVSS metrics available, Explo... |
Describe the vulnerability CVE-2017-14487 | CVE-2017-14487, State: PUBLISHED, Published: 2017-12-01T17:00:00, Updated: 2024-08-05T19:27:40.779Z, Description: The OhMiBod Remote app for Android and iOS allows remote attackers to impersonate users by sniffing network traffic for search responses from the OhMiBod API server and then editing the username, user_id, a... |
Techniques related with vulnerability CVE-2020-11078 | CVE-2020-11078 in httplib2. Has primary impact with T1190 : Exploit Public-Facing Application. |
Describe MITRE technique T1036 | MITRE T1036 : Masquerading from enterprise Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the name or location of an object, legitimate or malicious, is manipulated or abused for the sake of evading defe... |
Describe the vulnerability CVE-2020-1425 | CVE-2020-1425, State: PUBLISHED, Published: 2020-07-27T18:50:12, Updated: 2024-08-04T06:39:10.299Z, Description: A remoted code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory, aka 'Microsoft Windows Codecs Library Remote Code Execution Vulnerability'. This CVE ... |
Techniques related with vulnerability CVE-2019-6563 | CVE-2019-6563 in Moxa IKS, EDS. Has primary impact with T1539 : Steal Web Session Cookie. Has secondary impact with T1078 : Valid Accounts. Has an exploitation technique T1110 : Brute Force. |
Techniques related with vulnerability CVE-2013-1331 | CVE-2013-1331 in Microsoft Office. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File. |
Techniques related with vulnerability CVE-2019-15287 | CVE-2019-15287 in Cisco WebEx WRF Player. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1204.002 : Malicious File. |
Techniques related with vulnerability CVE-2017-14486 | CVE-2017-14486 in Vibease Wireless Remote Vibrator app for Android and the Vibease Chat app for iOS. Is related with T1548 : Abuse Elevation Control Mechanism. Is related with T1499.004 : Application or System Exploitation. |
Describe the vulnerability CVE-2018-20753 | CVE-2018-20753, State: PUBLISHED, Published: 2019-02-05T05:00:00, Updated: 2024-08-05T12:12:28.564Z, Description: Kaseya VSA RMM before R9.3 9.3.0.35, R9.4 before 9.4.0.36, and R9.5 before 9.5.0.5 allows unprivileged remote attackers to execute PowerShell payloads on all managed devices. In January 2018, attackers acti... |
Describe the vulnerability CVE-2019-6522 | CVE-2019-6522, State: PUBLISHED, Published: 2019-03-05T21:00:00Z, Updated: 2024-09-17T02:32:19.762Z, Description: Moxa IKS and EDS fails to properly check array bounds which may allow an attacker to read device memory on arbitrary addresses, and may allow an attacker to retrieve sensitive data or cause device reboot., ... |
Describe the vulnerability CVE-2019-1764 | CVE-2019-1764, State: PUBLISHED, Published: 2019-03-22T20:05:29.129200Z, Updated: 2024-09-17T03:37:54.641Z, Description: A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to conduct a cross-s... |
Describe the vulnerability CVE-2019-3782 | CVE-2019-3782, State: PUBLISHED, Published: 2019-02-13T16:00:00Z, Updated: 2024-09-16T23:36:58.237Z, Description: Cloud Foundry CredHub CLI, versions prior to 2.2.1, inadvertently writes authentication credentials provided via environment variables to its persistent config file. A local authenticated malicious user wit... |
Techniques related with vulnerability CVE-2014-0307 | CVE-2014-0307 in Internet Explorer 9. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2012-1557 | CVE-2012-1557, State: PUBLISHED, Published: 2012-03-12T19:00:00, Updated: 2024-08-06T19:01:02.567Z, Description: SQL injection vulnerability in admin/plib/api-rpc/Agent.php in Parallels Plesk Panel 7.x and 8.x before 8.6 MU#2, 9.x before 9.5 MU#11, 10.0.x before MU#13, 10.1.x before MU#22, 10.2.x before MU#16, and 10.3... |
Techniques related with vulnerability CVE-2008-0655 | CVE-2008-0655 in Adobe Reader and Acrobat before 8.1.2. Is related with T1548.002 : Bypass User Account Control. Is related with T1068 : Exploitation for Privilege Escalation. |
Techniques related with vulnerability CVE-2010-4398 | CVE-2010-4398 in win32k.sys in Microsoft Windows. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2020-1141 | CVE-2020-1141 in Windows. Has primary impact with T1005 : Data from Local System. Has secondary impact with T1211 : Exploitation for Defense Evasion. |
Describe the vulnerability CVE-2018-8248 | CVE-2018-8248, State: PUBLISHED, Published: 2018-06-14T12:00:00, Updated: 2024-08-05T06:46:13.856Z, Description: A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka "Microsoft Excel Remote Code Execution Vulnerability." This affects ... |
Techniques related with vulnerability CVE-2017-0005 | CVE-2017-0005 in Windows GDI. Is related with T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2019-0708 | CVE-2019-0708 in Windows. Is related with T1574 : Hijack Execution Flow. Is related with T1068 : Exploitation for Privilege Escalation. |
Describe the vulnerability CVE-2018-8852 | CVE-2018-8852, State: PUBLISHED, Published: 2018-09-26T19:00:00Z, Updated: 2024-09-16T23:22:08.056Z, Description: Philips e-Alert Unit (non-medical device), Version R2.1 and prior. When authenticating a user or otherwise establishing a new user session, the software gives an attacker the opportunity to steal authentica... |
Describe the vulnerability CVE-2019-18578 | CVE-2019-18578, State: PUBLISHED, Published: 2020-03-13T20:30:21.567499Z, Updated: 2024-09-16T23:41:09.666Z, Description: Dell EMC XtremIO XMS versions prior to 6.3.0 contain a stored cross-site scripting vulnerability. A low-privileged malicious remote user of XtremIO may exploit this vulnerability to store malicious ... |
Describe MITRE technique T0828 | MITRE T0828 : Loss of Productivity and Revenue from ics Adversaries may cause loss of productivity and revenue through disruption and even damage to the availability and integrity of control system operations, devices, and related processes. This technique may manifest as a direct effect of an ICS-targeting attack or... |
Describe the vulnerability CVE-2019-1753 | CVE-2019-1753, State: PUBLISHED, Published: 2019-03-28T00:10:13.846196Z, Updated: 2024-11-20T17:25:06.350Z, Description: A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated but unprivileged (level 1), remote attacker to run privileged Cisco IOS commands by using the web UI. The vulnerabi... |
Describe MITRE technique T1499 | MITRE T1499 : Endpoint Denial of Service from enterprise Adversaries may perform Endpoint Denial of Service (DoS) attacks to degrade or block the availability of services to users. Endpoint DoS can be performed by exhausting the system resources those services are hosted on or exploiting the system to cause a persisten... |
Describe MITRE technique T1461 | MITRE T1461 : Lockscreen Bypass from mobile An adversary with physical access to a mobile device may seek to bypass the device’s lockscreen. Several methods exist to accomplish this, including:
* Biometric spoofing: If biometric authentication is used, an adversary could attempt to spoof a mobile device’s biometric a... |
Techniques related with vulnerability CVE-2019-3799 | CVE-2019-3799 in Spring Cloud Config. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2016-1409 | CVE-2016-1409, State: PUBLISHED, Published: 2016-05-29T22:00:00, Updated: 2024-08-05T22:55:14.367Z, Description: The Neighbor Discovery (ND) protocol implementation in the IPv6 stack in Cisco IOS XE 2.1 through 3.17S, IOS XR 2.0.0 through 5.3.2, and NX-OS allows remote attackers to cause a denial of service (packet-pro... |
Techniques related with vulnerability CVE-2020-5270 | CVE-2020-5270 in PrestaShop. Has secondary impact with T1036 : Masquerading. Has secondary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has secondary impact with T1005 : Data from Local System. Has an exploitation technique T1566.002 : Spearphishing Link. |
Techniques related with vulnerability CVE-2010-3765 | CVE-2010-3765 in Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10. Is related with T1190 : Exploit Public-Facing Application. Is related with T1548 : Abuse Elevation Control Mechanism. |
Techniques related with vulnerability CVE-2020-16200 | CVE-2020-16200 in Philips Clinical Collaboration Platform. Has primary impact with T1496 : Resource Hijacking. Has secondary impact with T0826 : Loss of Availability. |
Techniques related with vulnerability CVE-2014-6271 | CVE-2014-6271 in GNU Bash through 4.3. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059.004 : Unix Shell. |
Techniques related with vulnerability CVE-2016-9299 | CVE-2016-9299 in Jenkins before 2.32 and LTS before 2.19.3. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2020-5266 | CVE-2020-5266 in ps_linklist. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1189 : Drive-by Compromise. |
Describe the vulnerability CVE-2019-1886 | CVE-2019-1886, State: PUBLISHED, Published: 2019-07-04T19:50:10.367933Z, Updated: 2024-11-19T19:03:49.939Z, Description: A vulnerability in the HTTPS decryption feature of Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability i... |
Techniques related with vulnerability CVE-2019-16302 | CVE-2019-16302 in Open Network Operating System (ONOS) 1.14. Is related with T1499.004 : Application or System Exploitation. |
Describe the vulnerability CVE-2019-3568 | CVE-2019-3568, State: PUBLISHED, Published: 2019-05-14T19:52:40, Updated: 2024-08-04T19:12:09.468Z, Description: A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of RTCP packets sent to a target phone number. The issue affects WhatsApp for Android prior t... |
Describe the vulnerability CVE-2020-2883 | CVE-2020-2883, State: PUBLISHED, Published: 2020-04-15T13:29:50, Updated: 2024-09-27T18:54:53.656Z, Description: Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitab... |
Techniques related with vulnerability CVE-2016-1409 | CVE-2016-1409 in Cisco IOS XE 2.1 through 3.17S, IOS XR 2.0.0 through 5.3.2, and NX-OS. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2015-1701 | CVE-2015-1701, State: PUBLISHED, Published: 2015-04-21T10:00:00, Updated: 2024-08-06T04:47:17.780Z, Description: Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2... |
Techniques related with vulnerability CVE-2009-1151 | CVE-2009-1151 in phpMyAdmin 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2019-0926 | CVE-2019-0926 in Microsoft Edge. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1189 : Drive-by Compromise. Has an exploitation technique T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2018-8833 | CVE-2018-8833, State: PUBLISHED, Published: 2018-04-25T23:00:00Z, Updated: 2024-09-17T00:52:16.210Z, Description: Heap-based buffer overflow vulnerabilities in Advantech WebAccess HMI Designer 2.1.7.32 and prior caused by processing specially crafted .pm3 files may allow remote code execution., No CVSS metrics availabl... |
Describe the vulnerability CVE-2017-0261 | CVE-2017-0261, State: PUBLISHED, Published: 2017-05-12T14:00:00, Updated: 2024-08-05T12:55:19.147Z, Description: Microsoft Office 2010 SP2, Office 2013 SP1, and Office 2016 allow a remote code execution vulnerability when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnera... |
Describe the vulnerability CVE-2018-15767 | CVE-2018-15767, State: PUBLISHED, Published: 2018-11-30T17:00:00Z, Updated: 2024-09-17T03:53:45.259Z, Description: The Dell OpenManage Network Manager virtual appliance versions prior to 6.5.3 contain an improper authorization vulnerability caused by a misconfiguration in the /etc/sudoers file., No CVSS metrics availab... |
Describe the vulnerability CVE-2019-6538 | CVE-2019-6538, State: PUBLISHED, Published: 2019-03-25T21:26:03, Updated: 2024-08-04T20:23:21.992Z, Description: The Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 24950 and 24952, CareLink Monitor version 2490C, CareLink 2090 Programmer, Amplia CRT-D, Claria CRT-D, Compia CRT-D, Conce... |
Techniques related with vulnerability CVE-2020-15179 | CVE-2020-15179 in wiki-scratchsig. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1185 : Man in the Browser. |
Describe the vulnerability CVE-2020-11896 | CVE-2020-11896, State: PUBLISHED, Published: 2020-06-17T10:21:31, Updated: 2024-08-04T11:42:00.799Z, Description: The Treck TCP/IP stack before 6.0.1.66 allows Remote Code Execution, related to IPv4 tunneling., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2020-12029 | CVE-2020-12029 in FactoryTalk View SE. Has primary impact with T1505.003 : Web Shell. Has secondary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1133 : External Remote Services. |
Techniques related with vulnerability CVE-2018-8575 | CVE-2018-8575 in Microsoft Project. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation. Has secondary impact with T1485 : Data Destruction. Has secondary impact with T1136 : Create Account. ... |
Describe the vulnerability CVE-2016-9684 | CVE-2016-9684, State: PUBLISHED, Published: 2017-02-22T05:00:00, Updated: 2024-08-06T02:59:03.230Z, Description: The SonicWall Secure Remote Access server (version 8.1.0.2-14sv) is vulnerable to a Remote Command Injection vulnerability in its web administrative interface. This vulnerability occurs in the 'viewcert' CGI... |
Describe the vulnerability CVE-2012-3015 | CVE-2012-3015, State: PUBLISHED, Published: 2012-07-26T10:00:00Z, Updated: 2024-09-16T19:31:37.262Z, Description: Untrusted search path vulnerability in Siemens SIMATIC STEP7 before 5.5 SP1, as used in SIMATIC PCS7 7.1 SP3 and earlier and other products, allows local users to gain privileges via a Trojan horse DLL in a... |
Describe the vulnerability CVE-2018-5451 | CVE-2018-5451, State: PUBLISHED, Published: 2018-03-28T17:00:00Z, Updated: 2024-09-17T04:00:25.428Z, Description: In Philips Alice 6 System version R8.0.2 or prior, when an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct. This weakness can lead to th... |
Describe the vulnerability CVE-2014-4076 | CVE-2014-4076, State: PUBLISHED, Published: 2014-11-11T22:00:00, Updated: 2024-08-06T11:04:28.336Z, Description: Microsoft Windows Server 2003 SP2 allows local users to gain privileges via a crafted IOCTL call to (1) tcpip.sys or (2) tcpip6.sys, aka "TCP/IP Elevation of Privilege Vulnerability.", No CVSS metrics availa... |
Describe the vulnerability CVE-2018-15795 | CVE-2018-15795, State: PUBLISHED, Published: 2018-11-13T14:00:00Z, Updated: 2024-09-16T16:47:36.058Z, Description: Pivotal CredHub Service Broker, versions prior to 1.1.0, uses a guessable form of random number generation in creating service broker's UAA client. A remote malicious user may guess the client secret and o... |
Techniques related with vulnerability CVE-2020-5269 | CVE-2020-5269 in PrestaShop. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link. |
Techniques related with vulnerability CVE-2019-10973 | CVE-2019-10973 in Quest KACE. Is related with T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2016-5180 | CVE-2016-5180, State: PUBLISHED, Published: 2016-10-03T15:00:00, Updated: 2024-08-06T00:53:48.437Z, Description: Heap-based buffer overflow in the ares_create_query function in c-ares 1.x before 1.12.0 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly execute arbitrary code via a ho... |
Describe the vulnerability CVE-2014-3413 | CVE-2014-3413, State: PUBLISHED, Published: 2018-04-05T17:00:00, Updated: 2024-08-06T10:43:05.519Z, Description: The MySQL server in Juniper Networks Junos Space before 13.3R1.8 has an unspecified account with a hardcoded password, which allows remote attackers to obtain sensitive information and consequently obtain ad... |
Describe the vulnerability CVE-2019-1594 | CVE-2019-1594, State: PUBLISHED, Published: 2019-03-06T22:00:00Z, Updated: 2024-09-16T23:41:55.492Z, Description: A vulnerability in the 802.1X implementation for Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability ... |
Describe the vulnerability CVE-2014-4114 | CVE-2014-4114, State: PUBLISHED, Published: 2014-10-15T10:00:00, Updated: 2024-08-06T11:04:28.644Z, Description: Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrar... |
Describe the vulnerability CVE-2017-0493 | CVE-2017-0493, State: PUBLISHED, Published: 2017-05-12T15:00:00, Updated: 2024-08-05T13:11:05.686Z, Description: An information disclosure vulnerability in File-Based Encryption could enable a local malicious attacker to bypass operating system protections for the lock screen. This issue is rated as Moderate due to the... |
Describe the vulnerability CVE-2020-11021 | CVE-2020-11021, State: PUBLISHED, Published: 2020-04-29T18:00:20, Updated: 2024-08-04T11:21:14.534Z, Description: Actions Http-Client (NPM @actions/http-client) before version 1.0.8 can disclose Authorization headers to incorrect domain in certain redirect scenarios. The conditions in which this happens are if consumer... |
Techniques related with vulnerability CVE-2019-3798 | CVE-2019-3798 in CAPI-release. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1136 : Create Account. |
Techniques related with vulnerability CVE-2019-3782 | CVE-2019-3782 in CredHub CLI. Has primary impact with T1552.001 : Credentials In Files. Has secondary impact with T1098 : Account Manipulation. |
Describe the vulnerability CVE-2008-0655 | CVE-2008-0655, State: PUBLISHED, Published: 2008-02-07T20:00:00, Updated: 2024-08-07T07:54:23.254Z, Description: Multiple unspecified vulnerabilities in Adobe Reader and Acrobat before 8.1.2 have unknown impact and attack vectors., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2015-7931 | CVE-2015-7931 in Java client in Adcon Telemetry A840 Telemetry Gateway Base Station. Is related with T1557 : Man-in-the-Middle. |
Describe the vulnerability CVE-2020-1020 | CVE-2020-1020, State: PUBLISHED, Published: 2020-04-15T15:13:27, Updated: 2024-08-04T06:25:00.677Z, Description: A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font - Adobe Type 1 PostScript format.For all... |
Describe the vulnerability CVE-2020-3477 | CVE-2020-3477, State: PUBLISHED, Published: 2020-09-24T17:52:48.475365Z, Updated: 2024-11-13T17:58:01.086Z, Description: A vulnerability in the CLI parser of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, local attacker to access files from the flash: filesystem. The vulnerability is due to ... |
Techniques related with vulnerability CVE-2017-0222 | CVE-2017-0222 in Internet Explorer. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise. |
Techniques related with vulnerability CVE-2015-4902 | CVE-2015-4902 in Oracle Java SE 6u101, 7u85, and 8u60. Is related with T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2020-11884 | CVE-2020-11884 in Linux kernel 4.19 through 5.6.7 on the s390 platform. Is related with T1499.004 : Application or System Exploitation. |
Techniques related with vulnerability CVE-2020-3375 | CVE-2020-3375 in Cisco SD-WAN vManage. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2015-2945 | CVE-2015-2945, State: PUBLISHED, Published: 2015-05-25T17:00:00, Updated: 2024-08-06T05:32:20.593Z, Description: mt-phpincgi.php in Hajime Fujimoto mt-phpincgi before 2015-05-15 does not properly restrict URLs, which allows remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via a cr... |
Describe the vulnerability CVE-2009-0824 | CVE-2009-0824, State: PUBLISHED, Published: 2009-03-14T18:00:00, Updated: 2024-08-07T04:48:52.378Z, Description: Elaborate Bytes ElbyCDIO.sys 6.0.2.0 and earlier, as distributed in SlySoft AnyDVD before 6.5.2.6, Virtual CloneDrive 5.4.2.3 and earlier, CloneDVD 2.9.2.0 and earlier, and CloneCD 5.3.1.3 and earlier, uses ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.