input
stringlengths 30
54
| output
stringlengths 69
4.21k
|
|---|---|
Techniques related with vulnerability CVE-2020-1111
|
CVE-2020-1111 in Windows. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation. Has secondary impact with T1485 : Data Destruction. Has secondary impact with T1136 : Create Account.
|
Techniques related with vulnerability CVE-2018-15774
|
CVE-2018-15774 in iDRAC. Has primary impact with T1068 : Exploitation for Privilege Escalation.
|
Describe the vulnerability CVE-2020-12038
|
CVE-2020-12038, State: PUBLISHED, Published: 2020-05-19T21:36:54, Updated: 2024-08-04T11:48:58.157Z, Description: Products that use EDS Subsystem: Version 28.0.1 and prior (FactoryTalk Linx software (Previously called RSLinx Enterprise): Versions 6.00, 6.10, and 6.11, RSLinx Classic: Version 4.11.00 and prior, RSNetWorx software: Version 28.00.00 and prior, Studio 5000 Logix Designer software: Version 32 and prior) is vulnerable. A memory corruption vulnerability exists in the algorithm that matches square brackets in the EDS subsystem. This may allow an attacker to craft specialized EDS files to crash the EDSParser COM object, leading to denial-of-service conditions., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-6986
|
CVE-2020-6986 in Omron PLC CJ Series. Has primary impact with T0814 : Denial of Service. Has primary impact with T1499 : Endpoint Denial of Service.
|
Techniques related with vulnerability CVE-2019-6538
|
CVE-2019-6538 in Medtronic Conexus Radio Frequency Telemetry Protocol. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has primary impact with T1005 : Data from Local System. Has primary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T0860 : Wireless Compromise. Has an exploitation technique T1477 : Exploit via Radio Interfaces.
|
Describe the vulnerability CVE-2019-16768
|
CVE-2019-16768, State: PUBLISHED, Published: 2019-12-05T20:00:21, Updated: 2024-08-05T01:24:47.238Z, Description: In affected versions of Sylius, exception messages from internal exceptions (like database exception) are wrapped by \Symfony\Component\Security\Core\Exception\AuthenticationServiceException and propagated through the system to UI. Therefore, some internal system information may leak and be visible to the customer. A validation message with the exception details will be presented to the user when one will try to log into the shop. This has been patched in versions 1.3.14, 1.4.10, 1.5.7, and 1.6.3., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 3.5, Base Severity: LOW, Confidentiality Impact: LOW, Integrity Impact: NONE, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-5283
|
CVE-2020-5283, State: PUBLISHED, Published: 2020-04-03T00:10:13, Updated: 2024-08-04T08:22:09.095Z, Description: ViewVC before versions 1.1.28 and 1.2.1 has a XSS vulnerability in CVS show_subdir_lastmod support. The impact of this vulnerability is mitigated by the need for an attacker to have commit privileges to a CVS repository exposed by an otherwise trusted ViewVC instance that also has the `show_subdir_lastmod` feature enabled. The attack vector involves files with unsafe names (names that, when embedded into an HTML stream, would cause the browser to run unwanted code), which themselves can be challenging to create. This vulnerability is patched in versions 1.2.1 and 1.1.28., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 3.1, Base Severity: LOW, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2011-1331
|
CVE-2011-1331 in Ichitaro. Is related with T1190 : Exploit Public-Facing Application. Is related with T1068 : Exploitation for Privilege Escalation.
|
Techniques related with vulnerability CVE-2014-6324
|
CVE-2014-6324 in Kerberos Key Distribution Center. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1558.001 : Golden Ticket.
|
Describe the vulnerability CVE-2020-15162
|
CVE-2020-15162, State: PUBLISHED, Published: 2020-09-24T22:15:14, Updated: 2024-08-04T13:08:22.436Z, Description: In PrestaShop from version 1.5.0.0 and before version 1.7.6.8, users are allowed to send compromised files. These attachments allowed people to input malicious JavaScript which triggered an XSS payload. The problem is fixed in version 1.7.6.8., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 5.4, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: NONE, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2013-2423
|
CVE-2013-2423, State: PUBLISHED, Published: 2013-04-17T15:00:00, Updated: 2024-08-06T15:36:46.423Z, Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via unknown vectors related to HotSpot. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from the original researcher that this vulnerability allows remote attackers to bypass permission checks by the MethodHandles method and modify arbitrary public final fields using reflection and type confusion, as demonstrated using integer and double fields to disable the security manager., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2010-0028
|
CVE-2010-0028, State: PUBLISHED, Published: 2010-02-10T18:00:00, Updated: 2024-08-07T00:37:53.005Z, Description: Integer overflow in Microsoft Paint in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 allows remote attackers to execute arbitrary code via a crafted JPEG (.JPG) file, aka "MS Paint Integer Overflow Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2008-4250
|
CVE-2008-4250, State: PUBLISHED, Published: 2008-10-23T21:00:00, Updated: 2024-08-07T10:08:34.970Z, Description: The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, and 7 Pre-Beta allows remote attackers to execute arbitrary code via a crafted RPC request that triggers the overflow during path canonicalization, as exploited in the wild by Gimmiv.A in October 2008, aka "Server Service Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-10189
|
CVE-2020-10189 in Zoho ManageEngine Desktop Central before 10.0.474. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059 : Command and Scripting Interpreter.
|
Techniques related with vulnerability CVE-2020-11608
|
CVE-2020-11608 in Linux kernel before 5.6.1. Is related with T1499.004 : Application or System Exploitation. Is related with T1068 : Exploitation for Privilege Escalation.
|
Describe the vulnerability CVE-2015-7925
|
CVE-2015-7925, State: PUBLISHED, Published: 2015-12-23T11:00:00, Updated: 2024-08-06T08:06:31.138Z, Description: Cross-site request forgery (CSRF) vulnerability on eWON devices with firmware through 10.1s0 allows remote attackers to hijack the authentication of administrators for requests that trigger firmware upload, removal of configuration data, or a reboot., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-17889
|
CVE-2018-17889, State: PUBLISHED, Published: 2018-10-08T13:00:00Z, Updated: 2024-09-17T00:15:34.493Z, Description: In WECON Technology Co., Ltd. PI Studio HMI versions 4.1.9 and prior and PI Studio versions 4.2.34 and prior when parsing project files, the XMLParser that ships with Wecon PIStudio is vulnerable to a XML external entity injection attack, which may allow sensitive information disclosure., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe MITRE technique T1553.002
|
MITRE T1553.002 : Code Signing from enterprise Adversaries may create, acquire, or steal code signing materials to sign their malware or tools. Code signing provides a level of authenticity on a binary from the developer and a guarantee that the binary has not been tampered with. (Citation: Wikipedia Code Signing) The certificates used during an operation may be created, acquired, or stolen by the adversary. (Citation: Securelist Digital Certificates) (Citation: Symantec Digital Certificates) Unlike [Invalid Code Signature](T1036.001), this activity will result in a valid signature.
Code signing to verify software on first run can be used on modern Windows and macOS systems. It is not used on Linux due to the decentralized nature of the platform. (Citation: Wikipedia Code Signing)(Citation: EclecticLightChecksonEXECodeSigning)
Code signing certificates may be used to bypass security policies that require signed code to execute on a system.
|
Techniques related with vulnerability CVE-2019-15959
|
CVE-2019-15959 in Cisco SPA525G2 5-line IP Phone. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1091 : Replication Through Removable Media.
|
Techniques related with vulnerability CVE-2020-9380
|
CVE-2020-9380 in IPTV Smarters WEB TV PLAYER through 2020-02-22. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059 : Command and Scripting Interpreter.
|
Techniques related with vulnerability CVE-2020-11652
|
CVE-2020-11652 in SaltStack Salt. Is related with T1005 : Data from Local System. Is related with T1190 : Exploit Public-Facing Application.
|
Describe the vulnerability CVE-2010-0232
|
CVE-2010-0232, State: PUBLISHED, Published: 2010-01-21T19:00:00, Updated: 2024-08-07T00:45:11.043Z, Description: The kernel in Microsoft Windows NT 3.1 through Windows 7, including Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, and Windows Server 2008 Gold and SP2, when access to 16-bit applications is enabled on a 32-bit x86 platform, does not properly validate certain BIOS calls, which allows local users to gain privileges by crafting a VDM_TIB data structure in the Thread Environment Block (TEB), and then calling the NtVdmControl function to start the Windows Virtual DOS Machine (aka NTVDM) subsystem, leading to improperly handled exceptions involving the #GP trap handler (nt!KiTrap0D), aka "Windows Kernel Exception Handler Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-5220
|
CVE-2020-5220 in SyliusResourceBundle. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1190 : Exploit Public-Facing Application.
|
Describe the vulnerability CVE-2020-11901
|
CVE-2020-11901, State: PUBLISHED, Published: 2020-06-17T10:34:01, Updated: 2024-08-04T11:42:00.815Z, Description: The Treck TCP/IP stack before 6.0.1.66 allows Remote Code execution via a single invalid DNS response., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-0601
|
CVE-2020-0601 in Windows. Is related with T1203 : Exploitation for Client Execution. Is related with T1190 : Exploit Public-Facing Application.
|
Techniques related with vulnerability CVE-2020-5267
|
CVE-2020-5267 in actionview. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1185 : Man in the Browser.
|
Techniques related with vulnerability CVE-2018-8120
|
CVE-2018-8120 in Windows Server 2008. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
|
Describe MITRE technique T1059.004
|
MITRE T1059.004 : Unix Shell from enterprise Adversaries may abuse Unix shell commands and scripts for execution. Unix shells are the primary command prompt on Linux and macOS systems, though many variations of the Unix shell exist (e.g. sh, bash, zsh, etc.) depending on the specific OS or distribution.(Citation: DieNet Bash)(Citation: Apple ZShell) Unix shells can control every aspect of a system, with certain commands requiring elevated privileges.
Unix shells also support scripts that enable sequential execution of commands as well as other typical programming operations such as conditionals and loops. Common uses of shell scripts include long or repetitive tasks, or the need to run the same set of commands on multiple systems.
Adversaries may abuse Unix shells to execute various commands or payloads. Interactive shells may be accessed through command and control channels or during lateral movement such as with [SSH](T1021.004). Adversaries may also leverage shell scripts to deliver and execute multiple commands on victims or as part of payloads used for persistence.
|
Techniques related with vulnerability CVE-2015-2945
|
CVE-2015-2945 in Hajime Fujimoto mt-phpincgi. Is related with T1059 : Command and Scripting Interpreter. Is related with T1068 : Exploitation for Privilege Escalation.
|
Describe the vulnerability CVE-2010-3888
|
CVE-2010-3888, State: PUBLISHED, Published: 2010-10-08T21:00:00Z, Updated: 2024-09-17T02:42:19.477Z, Description: Unspecified vulnerability in Microsoft Windows on 32-bit platforms allows local users to gain privileges via unknown vectors, as exploited in the wild in July 2010 by the Stuxnet worm, and identified by Kaspersky Lab researchers and other researchers., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-1190
|
CVE-2020-1190, State: PUBLISHED, Published: 2020-05-21T22:53:36, Updated: 2024-08-04T06:25:01.178Z, Description: An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory, aka 'Windows State Repository Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1124, CVE-2020-1131, CVE-2020-1134, CVE-2020-1144, CVE-2020-1184, CVE-2020-1185, CVE-2020-1186, CVE-2020-1187, CVE-2020-1188, CVE-2020-1189, CVE-2020-1191., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-15821
|
CVE-2019-15821, State: PUBLISHED, Published: 2019-08-30T12:41:07, Updated: 2024-08-05T00:56:22.463Z, Description: The bold-page-builder plugin before 2.3.2 for WordPress has no protection against modifying settings and importing data., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-5217
|
CVE-2020-5217 in secure_headers. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1185 : Man in the Browser.
|
Techniques related with vulnerability CVE-2019-3787
|
CVE-2019-3787 in UAA Release (OSS). Has primary impact with T1552 : Unsecured Credentials. Has secondary impact with T1078 : Valid Accounts. Has secondary impact with T1098 : Account Manipulation.
|
Techniques related with vulnerability CVE-2013-7372
|
CVE-2013-7372 in Apache Harmony through 6.0M3. Is related with T1190 : Exploit Public-Facing Application.
|
Techniques related with vulnerability CVE-2019-1087
|
CVE-2019-1087 in Windows. Has primary impact with T1068 : Exploitation for Privilege Escalation.
|
Describe the vulnerability CVE-2016-0099
|
CVE-2016-0099, State: PUBLISHED, Published: 2016-03-09T11:00:00, Updated: 2024-08-05T22:08:13.103Z, Description: The Secondary Logon Service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 does not properly process request handles, which allows local users to gain privileges via a crafted application, aka "Secondary Logon Elevation of Privilege Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-12888
|
CVE-2020-12888 in Linux kernel through 5.6.13. Is related with T1499.004 : Application or System Exploitation.
|
Describe the vulnerability CVE-2011-3544
|
CVE-2011-3544, State: PUBLISHED, Published: 2011-10-19T21:00:00, Updated: 2024-08-06T23:37:48.020Z, Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-6808
|
CVE-2020-6808 in Firefox. Is related with T1036.005 : Match Legitimate Name or Location.
|
Describe the vulnerability CVE-2015-1769
|
CVE-2015-1769, State: PUBLISHED, Published: 2015-08-15T00:00:00, Updated: 2024-08-06T04:54:15.454Z, Description: Mount Manager in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 mishandles symlinks, which allows physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Mount Manager Elevation of Privilege Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-14802
|
CVE-2018-14802, State: PUBLISHED, Published: 2018-10-01T13:00:00Z, Updated: 2024-09-16T19:47:13.278Z, Description: Fuji Electric FRENIC LOADER v3.3 v7.3.4.1a of FRENIC-Mini (C1), FRENIC-Mini (C2), FRENIC-Eco, FRENIC-Multi, FRENIC-MEGA, FRENIC-Ace. The program does not properly check user-supplied comments which may allow for arbitrary remote code execution., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-19320
|
CVE-2018-19320 in GDrv low-level driver in GIGABYTE. Is related with T1608 : Stage Capabilities.
|
Describe MITRE technique T1003.008
|
MITRE T1003.008 : /etc/passwd and /etc/shadow from enterprise Adversaries may attempt to dump the contents of `/etc/passwd` and `/etc/shadow` to enable offline password cracking. Most modern Linux operating systems use a combination of `/etc/passwd` and `/etc/shadow` to store user account information including password hashes in `/etc/shadow`. By default, `/etc/shadow` is only readable by the root user.(Citation: Linux Password and Shadow File Formats)
The Linux utility, unshadow, can be used to combine the two files in a format suited for password cracking utilities such as John the Ripper:(Citation: nixCraft - John the Ripper) `# /usr/bin/unshadow /etc/passwd /etc/shadow > /tmp/crack.password.db`
|
Describe the vulnerability CVE-2018-5445
|
CVE-2018-5445, State: PUBLISHED, Published: 2018-01-25T03:00:00, Updated: 2024-08-05T05:33:44.377Z, Description: A Path Traversal issue was discovered in Advantech WebAccess/SCADA versions prior to V8.2_20170817. An attacker has read access to files within the directory structure of the target device., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2010-0817
|
CVE-2010-0817 in Microsoft SharePoint Server and Services. Is related with T1190 : Exploit Public-Facing Application.
|
Describe MITRE technique T1533
|
MITRE T1533 : Data from Local System from mobile Adversaries may search local system sources, such as file systems or local databases, to find files of interest and sensitive data prior to exfiltration.
Access to local system data, which includes information stored by the operating system, often requires escalated privileges. Examples of local system data include authentication tokens, the device keyboard cache, Wi-Fi passwords, and photos. On Android, adversaries may also attempt to access files from external storage which may require additional storage-related permissions.
|
Describe MITRE technique T1499.001
|
MITRE T1499.001 : OS Exhaustion Flood from enterprise Adversaries may launch a denial of service (DoS) attack targeting an endpoint's operating system (OS). A system's OS is responsible for managing the finite resources as well as preventing the entire system from being overwhelmed by excessive demands on its capacity. These attacks do not need to exhaust the actual resources on a system; the attacks may simply exhaust the limits and available resources that an OS self-imposes.
Different ways to achieve this exist, including TCP state-exhaustion attacks such as SYN floods and ACK floods.(Citation: Arbor AnnualDoSreport Jan 2018) With SYN floods, excessive amounts of SYN packets are sent, but the 3-way TCP handshake is never completed. Because each OS has a maximum number of concurrent TCP connections that it will allow, this can quickly exhaust the ability of the system to receive new requests for TCP connections, thus preventing access to any TCP service provided by the server.(Citation: Cloudflare SynFlood)
ACK floods leverage the stateful nature of the TCP protocol. A flood of ACK packets are sent to the target. This forces the OS to search its state table for a related TCP connection that has already been established. Because the ACK packets are for connections that do not exist, the OS will have to search the entire state table to confirm that no match exists. When it is necessary to do this for a large flood of packets, the computational requirements can cause the server to become sluggish and/or unresponsive, due to the work it must do to eliminate the rogue ACK packets. This greatly reduces the resources available for providing the targeted service.(Citation: Corero SYN-ACKflood)
|
Describe the vulnerability CVE-2020-11059
|
CVE-2020-11059, State: PUBLISHED, Published: 2020-05-27T20:55:10, Updated: 2024-08-04T11:21:14.488Z, Description: In AEgir greater than or equal to 21.7.0 and less than 21.10.1, aegir publish and aegir build may leak secrets from environment variables in the browser bundle published to npm. This has been fixed in 21.10.1., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 9.6, Base Severity: CRITICAL, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-1087
|
CVE-2019-1087, State: PUBLISHED, Published: 2019-07-15T18:56:21, Updated: 2024-08-04T18:06:31.685Z, Description: An elevation of privilege exists in Windows Audio Service, aka 'Windows Audio Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1086, CVE-2019-1088., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-5364
|
CVE-2020-5364 in Isilon OneFS. Has primary impact with T1078.001 : Default Accounts. Has secondary impact with T1005 : Data from Local System.
|
Describe the vulnerability CVE-2018-10611
|
CVE-2018-10611, State: PUBLISHED, Published: 2018-06-04T14:00:00Z, Updated: 2024-09-16T18:33:38.782Z, Description: Java remote method invocation (RMI) input port in GE MDS PulseNET and MDS PulseNET Enterprise version 3.2.1 and prior may be exploited to allow unauthenticated users to launch applications and support remote code execution through web services., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2013-0625
|
CVE-2013-0625, State: PUBLISHED, Published: 2013-01-09T01:00:00, Updated: 2024-08-06T14:33:05.288Z, Description: Adobe ColdFusion 9.0, 9.0.1, and 9.0.2, when a password is not configured, allows remote attackers to bypass authentication and possibly execute arbitrary code via unspecified vectors, as exploited in the wild in January 2013., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2019-0808
|
CVE-2019-0808 in Windows. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1497 : Virtualization/Sandbox Evasion.
|
Techniques related with vulnerability CVE-2018-5454
|
CVE-2018-5454 in Philips IntelliSpace Portal. Has primary impact with T1203 : Exploitation for Client Execution.
|
Describe MITRE technique T1057
|
MITRE T1057 : Process Discovery from enterprise Adversaries may attempt to get information about running processes on a system. Information obtained could be used to gain an understanding of common software/applications running on systems within the network. Administrator or otherwise elevated access may provide better process details. Adversaries may use the information from [Process Discovery](T1057) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.
In Windows environments, adversaries could obtain details on running processes using the [Tasklist](S0057) utility via [cmd](S0106) or `Get-Process` via [PowerShell](T1059.001). Information about processes can also be extracted from the output of [Native API](T1106) calls such as `CreateToolhelp32Snapshot`. In Mac and Linux, this is accomplished with the `ps` command. Adversaries may also opt to enumerate processes via `/proc`.
On network devices, [Network Device CLI](T1059.008) commands such as `show processes` can be used to display current running processes.(Citation: US-CERT-TA18-106A)(Citation: show_processes_cisco_cmd)
|
Describe MITRE technique T1552
|
MITRE T1552 : Unsecured Credentials from enterprise Adversaries may search compromised systems to find and obtain insecurely stored credentials. These credentials can be stored and/or misplaced in many locations on a system, including plaintext files (e.g. [Bash History](T1552.003)), operating system or application-specific repositories (e.g. [Credentials in Registry](T1552.002)), or other specialized files/artifacts (e.g. [Private Keys](T1552.004)).(Citation: Brining MimiKatz to Unix)
|
Techniques related with vulnerability CVE-2019-1857
|
CVE-2019-1857 in Cisco HyperFlex HX-Series. Has primary impact with T1608 : Stage Capabilities. Has an exploitation technique T1204.001 : Malicious Link.
|
Techniques related with vulnerability CVE-2013-5054
|
CVE-2013-5054 in Microsoft Office 2013 and 2013 RT. Is related with T1528 : Steal Application Access Token. Is related with T1212 : Exploitation for Credential Access.
|
Techniques related with vulnerability CVE-2016-5645
|
CVE-2016-5645 in Rockwell Automation MicroLogix. Is related with T1078 : Valid Accounts. Is related with T1542.001 : System Firmware.
|
Techniques related with vulnerability CVE-2019-3704
|
CVE-2019-3704 in VNX Control Station in Dell EMC VNX2 OE for File. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1078 : Valid Accounts.
|
Techniques related with vulnerability CVE-2013-0629
|
CVE-2013-0629 in Adobe ColdFusion 9.0, 9.0.1, 9.0.2, and 10. Is related with T1083 : File and Directory Discovery. Is related with T1078 : Valid Accounts.
|
Techniques related with vulnerability CVE-2020-5261
|
CVE-2020-5261 in Saml2. Has primary impact with T1190 : Exploit Public-Facing Application. Has an exploitation technique T1040 : Network Sniffing.
|
Techniques related with vulnerability CVE-2014-0593
|
CVE-2014-0593 in obs-service-set_version. Is related with T1203 : Exploitation for Client Execution.
|
Techniques related with vulnerability CVE-2018-15392
|
CVE-2018-15392 in Cisco Industrial Network Director. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1190 : Exploit Public-Facing Application.
|
Techniques related with vulnerability CVE-2019-1715
|
CVE-2019-1715 in Cisco Adaptive Security Appliance (ASA) Software. Has primary impact with T1078 : Valid Accounts. Has primary impact with T1557 : Man-in-the-Middle. Has primary impact with T1040 : Network Sniffing. Has an exploitation technique T1110 : Brute Force.
|
Describe MITRE technique T0860
|
MITRE T0860 : Wireless Compromise from ics Adversaries may perform wireless compromise as a method of gaining communications and unauthorized access to a wireless network. Access to a wireless network may be gained through the compromise of a wireless device. (Citation: Alexander Bolshev, Gleb Cherbov July 2014) (Citation: Alexander Bolshev March 2014) Adversaries may also utilize radios and other wireless communication devices on the same frequency as the wireless network. Wireless compromise can be done as an initial access vector from a remote distance.
A Polish student used a modified TV remote controller to gain access to and control over the Lodz city tram system in Poland. (Citation: John Bill May 2017) (Citation: Shelley Smith February 2008) The remote controller device allowed the student to interface with the trams network to modify track settings and override operator control. The adversary may have accomplished this by aligning the controller to the frequency and amplitude of IR control protocol signals. (Citation: Bruce Schneier January 2008) The controller then enabled initial access to the network, allowing the capture and replay of tram signals. (Citation: John Bill May 2017)
|
Describe MITRE technique T1565.002
|
MITRE T1565.002 : Transmitted Data Manipulation from enterprise Adversaries may alter data en route to storage or other systems in order to manipulate external outcomes or hide activity, thus threatening the integrity of the data.(Citation: FireEye APT38 Oct 2018)(Citation: DOJ Lazarus Sony 2018) By manipulating transmitted data, adversaries may attempt to affect a business process, organizational understanding, and decision making.
Manipulation may be possible over a network connection or between system processes where there is an opportunity deploy a tool that will intercept and change information. The type of modification and the impact it will have depends on the target transmission mechanism as well as the goals and objectives of the adversary. For complex systems, an adversary would likely need special expertise and possibly access to specialized software related to the system that would typically be gained through a prolonged information gathering campaign in order to have the desired impact.
|
Techniques related with vulnerability CVE-2018-11062
|
CVE-2018-11062 in Integrated Data Protection Appliance. Has primary impact with T1078.001 : Default Accounts.
|
Describe the vulnerability CVE-2018-6112
|
CVE-2018-6112, State: PUBLISHED, Published: 2019-01-09T19:00:00, Updated: 2024-08-05T05:54:52.953Z, Description: Making URLs clickable and allowing them to be styled in DevTools in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-3476
|
CVE-2020-3476 in Cisco IOS XE Software. Has primary impact with T1565.001 : Stored Data Manipulation. Has an exploitation technique T1078 : Valid Accounts.
|
Describe MITRE technique T1059
|
MITRE T1059 : Command and Scripting Interpreter from enterprise Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries. These interfaces and languages provide ways of interacting with computer systems and are a common feature across many different platforms. Most systems come with some built-in command-line interface and scripting capabilities, for example, macOS and Linux distributions include some flavor of [Unix Shell](T1059.004) while Windows installations include the [Windows Command Shell](T1059.003) and [PowerShell](T1059.001).
There are also cross-platform interpreters such as [Python](T1059.006), as well as those commonly associated with client applications such as [JavaScript](T1059.007) and [Visual Basic](T1059.005).
Adversaries may abuse these technologies in various ways as a means of executing arbitrary commands. Commands and scripts can be embedded in [Initial Access](TA0001) payloads delivered to victims as lure documents or as secondary payloads downloaded from an existing C2. Adversaries may also execute commands through interactive terminals/shells, as well as utilize various [Remote Services](T1021) in order to achieve remote Execution.(Citation: Powershell Remote Commands)(Citation: Cisco IOS Software Integrity Assurance - Command History)(Citation: Remote Shell Execution in Python)
|
Describe the vulnerability CVE-2020-4100
|
CVE-2020-4100, State: PUBLISHED, Published: 2020-07-15T12:31:11, Updated: 2024-08-04T07:52:20.938Z, Description: "HCL Verse for Android was found to employ dynamic code loading. This mechanism allows a developer to specify which components of the application should not be loaded by default when the application is started. Typically, core components and additional dependencies are loaded natively at runtime; however, dynamically loaded components are only loaded as they are specifically requested. While this can have a positive impact on performance, or grant additional functionality (for example, a non-invasive update feature), it can also open the application to loading unintended code if not implemented properly.", No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2019-1838
|
CVE-2019-1838 in Cisco Application Policy Infrastructure Controller (APIC). Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link.
|
Describe the vulnerability CVE-2020-1456
|
CVE-2020-1456, State: PUBLISHED, Published: 2020-07-14T22:54:50, Updated: 2024-08-04T06:39:10.434Z, Description: A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'. This CVE ID is unique from CVE-2020-1450, CVE-2020-1451., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-7513
|
CVE-2018-7513, State: PUBLISHED, Published: 2018-03-21T20:00:00Z, Updated: 2024-09-17T02:42:59.350Z, Description: In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a stack-based buffer overflow., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2014-4113
|
CVE-2014-4113 in win32k.sys in the kernel-mode drivers in Microsoft Windows. Is related with T1068 : Exploitation for Privilege Escalation.
|
Techniques related with vulnerability CVE-2015-1701
|
CVE-2015-1701 in win32k.sys in the kernel-mode drivers in Microsoft Windows. Is related with T1134.001 : Token Impersonation/Theft. Is related with T1068 : Exploitation for Privilege Escalation.
|
Describe MITRE technique T1204.002
|
MITRE T1204.002 : Malicious File from enterprise An adversary may rely upon a user opening a malicious file in order to gain execution. Users may be subjected to social engineering to get them to open a file that will lead to code execution. This user action will typically be observed as follow-on behavior from [Spearphishing Attachment](T1566.001). Adversaries may use several types of files that require a user to execute them, including .doc, .pdf, .xls, .rtf, .scr, .exe, .lnk, .pif, and .cpl.
Adversaries may employ various forms of [Masquerading](T1036) and [Obfuscated Files or Information](T1027) to increase the likelihood that a user will open and successfully execute a malicious file. These methods may include using a familiar naming convention and/or password protecting the file and supplying instructions to a user on how to open it.(Citation: Password Protected Word Docs)
While [Malicious File](T1204.002) frequently occurs shortly after Initial Access it may occur at other phases of an intrusion, such as when an adversary places a file in a shared directory or on a user's desktop hoping that a user will click on it. This activity may also be seen shortly after [Internal Spearphishing](T1534).
|
Describe the vulnerability CVE-2017-0005
|
CVE-2017-0005, State: PUBLISHED, Published: 2017-03-17T00:00:00, Updated: 2024-08-05T12:47:57.485Z, Description: The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows local users to gain privileges via a crafted application, aka "Windows GDI Elevation of Privilege Vulnerability." This vulnerability is different from those described in CVE-2017-0001, CVE-2017-0025, and CVE-2017-0047., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2009-1862
|
CVE-2009-1862, State: PUBLISHED, Published: 2009-07-23T20:00:00, Updated: 2024-08-07T05:27:54.654Z, Description: Unspecified vulnerability in Adobe Reader and Acrobat 9.x through 9.1.2, and Adobe Flash Player 9.x through 9.0.159.0 and 10.x through 10.0.22.87, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via (1) a crafted Flash application in a .pdf file or (2) a crafted .swf file, related to authplay.dll, as exploited in the wild in July 2009., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2011-4862
|
CVE-2011-4862 in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications 1.0.2 and earlier, Heimdal 1.5.1 and earlier, GNU inetutils, and possibly other products. Is related with T1190 : Exploit Public-Facing Application. Is related with T1499.004 : Application or System Exploitation.
|
Describe the vulnerability CVE-2017-14934
|
CVE-2017-14934, State: PUBLISHED, Published: 2017-09-29T08:00:00, Updated: 2024-08-05T19:42:22.147Z, Description: process_debug_info in dwarf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (infinite loop) via a crafted ELF file that contains a negative size value in a CU structure., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2017-13289
|
CVE-2017-13289 in Android. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1078 : Valid Accounts.
|
Describe the vulnerability CVE-2019-0926
|
CVE-2019-0926, State: PUBLISHED, Published: 2019-05-16T18:17:02, Updated: 2024-08-04T17:58:59.647Z, Description: A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory, aka 'Microsoft Edge Memory Corruption Vulnerability'., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-10987
|
CVE-2019-10987, State: PUBLISHED, Published: 2019-06-28T20:49:28, Updated: 2024-08-04T22:40:15.688Z, Description: In WebAccess/SCADA Versions 8.3.5 and prior, multiple out-of-bounds write vulnerabilities are caused by a lack of proper validation of the length of user-supplied data. Exploitation of these vulnerabilities may allow remote code execution., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2017-0263
|
CVE-2017-0263, State: PUBLISHED, Published: 2017-05-12T14:00:00, Updated: 2024-08-05T12:55:19.236Z, Description: The kernel-mode drivers in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2013-0632
|
CVE-2013-0632 in Adobe ColdFusion 9.0, 9.0.1, 9.0.2, and 10. Is related with T1190 : Exploit Public-Facing Application.
|
Describe the vulnerability CVE-2019-13922
|
CVE-2019-13922, State: PUBLISHED, Published: 2019-09-13T16:38:32, Updated: 2024-08-05T00:05:43.995Z, Description: A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V2.0 SP1). An attacker with administrative privileges can obtain the hash of a connected device's password. The security vulnerability could be exploited by an attacker with network access to the SINEMA Remote Connect Server and administrative privileges. At the time of advisory publication no public exploitation of this security vulnerability was known., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-11072
|
CVE-2018-11072 in Dell Digital Delivery. Has primary impact with T1055.001 : Dynamic-link Library Injection.
|
Describe the vulnerability CVE-2019-13720
|
CVE-2019-13720, State: PUBLISHED, Published: 2019-11-25T14:22:55, Updated: 2024-08-05T00:05:43.745Z, Description: Use after free in WebAudio in Google Chrome prior to 78.0.3904.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-15096
|
CVE-2020-15096, State: PUBLISHED, Published: 2020-07-07T00:10:13, Updated: 2024-08-04T13:08:22.273Z, Description: In Electron before versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21, there is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. Apps using "contextIsolation" are affected. There are no app-side workarounds, you must update your Electron version to be protected. This is fixed in versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 6.8, Base Severity: MEDIUM, Confidentiality Impact: NONE, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-6418
|
CVE-2020-6418 in Chrome. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
|
Describe the vulnerability CVE-2018-8110
|
CVE-2018-8110, State: PUBLISHED, Published: 2018-06-14T12:00:00, Updated: 2024-08-05T06:46:13.404Z, Description: A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8111, CVE-2018-8236., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-1879
|
CVE-2019-1879, State: PUBLISHED, Published: 2019-06-20T03:05:28.120814Z, Updated: 2024-11-20T17:16:41.511Z, Description: A vulnerability in the CLI of Cisco Integrated Management Controller (IMC) could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient validation of user-supplied input at the CLI. An attacker could exploit this vulnerability by authenticating with the administrator password via the CLI of an affected device and submitting crafted input to the affected commands. A successful exploit could allow the attacker to execute arbitrary commands on the device with root privileges., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: LOCAL, Availability Impact: HIGH, Base Score: 6.4, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Techniques related with vulnerability CVE-2019-2215
|
CVE-2019-2215 in Android. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1404 : Exploit OS Vulnerability.
|
Techniques related with vulnerability CVE-2020-13126
|
CVE-2020-13126 in Elementor Pro plugin before 2.9.4 for WordPress. Is related with T1190 : Exploit Public-Facing Application. Is related with T1203 : Exploitation for Client Execution.
|
Techniques related with vulnerability CVE-2019-13522
|
CVE-2019-13522 in EZ PLC Editor. Has primary impact with T1574 : Hijack Execution Flow. Has an exploitation technique T1204.002 : Malicious File.
|
Techniques related with vulnerability CVE-2019-9791
|
CVE-2019-9791 in Thunderbird. Is related with T1203 : Exploitation for Client Execution.
|
Describe the vulnerability CVE-2012-1675
|
CVE-2012-1675, State: PUBLISHED, Published: 2012-05-08T22:00:00, Updated: 2024-08-06T19:08:36.975Z, Description: The TNS Listener, as used in Oracle Database 11g 11.1.0.7, 11.2.0.2, and 11.2.0.3, and 10g 10.2.0.3, 10.2.0.4, and 10.2.0.5, as used in Oracle Fusion Middleware, Enterprise Manager, E-Business Suite, and possibly other products, allows remote attackers to execute arbitrary database commands by performing a remote registration of a database (1) instance or (2) service name that already exists, then conducting a man-in-the-middle (MITM) attack to hijack database connections, aka "TNS Poison.", No CVSS metrics available, Exploit Info: No exploit information available
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.