input stringlengths 30 54 | output stringlengths 69 4.21k |
|---|---|
Describe the vulnerability CVE-2014-4123 | CVE-2014-4123, State: PUBLISHED, Published: 2014-10-15T10:00:00, Updated: 2024-08-06T11:04:28.638Z, Description: Microsoft Internet Explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability," as exploited in the wild in October 2... |
Describe the vulnerability CVE-2020-6993 | CVE-2020-6993, State: PUBLISHED, Published: 2020-03-24T19:19:09, Updated: 2024-08-04T09:18:02.970Z, Description: In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, an attacker can gain access to sensitive information from the web service without authorization., No ... |
Describe MITRE technique T1608 | MITRE T1608 : Stage Capabilities from enterprise Adversaries may upload, install, or otherwise set up capabilities that can be used during targeting. To support their operations, an adversary may need to take capabilities they developed ([Develop Capabilities](T1587)) or obtained ([Obtain Capabilities](T1588)) and stag... |
Describe MITRE technique T1202 | MITRE T1202 : Indirect Command Execution from enterprise Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters. Various Windows utilities may be used to execute commands, possibly without invoking [cmd](S0106). For example, [Forf... |
Techniques related with vulnerability CVE-2009-1807 | CVE-2009-1807 in Baofeng products 3.09.04.17 and earlier. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2013-3906 | CVE-2013-3906, State: PUBLISHED, Published: 2013-11-06T11:00:00, Updated: 2024-08-06T16:22:01.367Z, Description: GDI+ in Microsoft Windows Vista SP2 and Server 2008 SP2; Office 2003 SP3, 2007 SP3, and 2010 SP1 and SP2; Office Compatibility Pack SP3; and Lync 2010, 2010 Attendee, 2013, and Basic 2013 allows remote attac... |
Describe the vulnerability CVE-2012-0158 | CVE-2012-0158, State: PUBLISHED, Published: 2012-04-10T21:00:00, Updated: 2024-08-06T18:16:19.081Z, Description: The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX controls in MSCOMCTL.OCX in the Common Controls in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Office 2003 Web... |
Describe the vulnerability CVE-2019-0576 | CVE-2019-0576, State: PUBLISHED, Published: 2019-01-08T21:00:00, Updated: 2024-08-04T17:51:26.875Z, Description: A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka "Jet Database Engine Remote Code Execution Vulnerability." This affects Windows 7, ... |
Describe the vulnerability CVE-2018-7496 | CVE-2018-7496, State: PUBLISHED, Published: 2018-03-14T18:00:00, Updated: 2024-08-05T06:31:03.761Z, Description: An Information Exposure issue was discovered in OSIsoft PI Vision versions 2017 and prior. The server response header and referrer-policy response header each provide unintended information disclosure., No C... |
Techniques related with vulnerability CVE-2018-10299 | CVE-2018-10299 in batchTransfer function of a smart contract implementation for Beauty Ecosystem Coin. Is related with T1565.003 : Runtime Data Manipulation. |
Techniques related with vulnerability CVE-2020-5369 | CVE-2020-5369 in Isilon OneFS. Has primary impact with T1068 : Exploitation for Privilege Escalation. |
Techniques related with vulnerability CVE-2013-7246 | CVE-2013-7246 in DaumGame ActiveX plugin 1.1.0.4 and 1.1.0.5. Is related with T1548 : Abuse Elevation Control Mechanism. Is related with T1211 : Exploitation for Defense Evasion. |
Describe the vulnerability CVE-2013-3336 | CVE-2013-3336, State: PUBLISHED, Published: 2013-05-09T10:00:00, Updated: 2024-08-06T16:07:37.553Z, Description: Unspecified vulnerability in Adobe ColdFusion 9.0, 9.0.1, 9.0.2, and 10 allows remote attackers to read arbitrary files via unknown vectors., No CVSS metrics available, Exploit Info: No exploit information a... |
Techniques related with vulnerability CVE-2018-10636 | CVE-2018-10636 in CNCSoft with ScreenEditor. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has secondary impact with T1068 : Exploitation for Privilege Escalation. |
Techniques related with vulnerability CVE-2018-10589 | CVE-2018-10589 in WebAccess. Has primary impact with T1202 : Indirect Command Execution. |
Techniques related with vulnerability CVE-2020-15132 | CVE-2020-15132 in sulu. Has primary impact with T1589 : Gather Victim Identity Information. |
Techniques related with vulnerability CVE-2019-3735 | CVE-2019-3735 in Dell SupportAssist for Business PCs. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1078 : Valid Accounts. |
Describe the vulnerability CVE-2020-3460 | CVE-2020-3460, State: PUBLISHED, Published: 2020-07-31T00:00:16.991185Z, Updated: 2024-11-13T18:18:29.278Z, Description: A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack agains... |
Describe the vulnerability CVE-2020-5231 | CVE-2020-5231, State: PUBLISHED, Published: 2020-01-30T21:15:16, Updated: 2024-08-04T08:22:08.962Z, Description: In Opencast before 7.6 and 8.1, users with the role ROLE_COURSE_ADMIN can use the user-utils endpoint to create new users not including the role ROLE_ADMIN. ROLE_COURSE_ADMIN is a non-standard role in Openca... |
Describe the vulnerability CVE-2020-5300 | CVE-2020-5300, State: PUBLISHED, Published: 2020-04-06T16:30:14, Updated: 2024-08-04T08:22:09.093Z, Description: In Hydra (an OAuth2 Server and OpenID Certified™ OpenID Connect Provider written in Go), before version 1.4.0+oryOS.17, when using client authentication method 'private_key_jwt' [1], OpenId specification say... |
Techniques related with vulnerability CVE-2020-11044 | CVE-2020-11044 in FreeRDP. Has primary impact with T1499.004 : Application or System Exploitation. |
Techniques related with vulnerability CVE-2018-7499 | CVE-2018-7499 in WebAccess. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. |
Describe the vulnerability CVE-2016-5062 | CVE-2016-5062, State: PUBLISHED, Published: 2016-09-29T10:00:00, Updated: 2024-08-06T00:46:40.256Z, Description: The web server in Aternity before 9.0.1 does not require authentication for getMBeansFromURL loading of Java MBeans, which allows remote attackers to execute arbitrary Java code by registering MBeans., No CV... |
Techniques related with vulnerability CVE-2018-5451 | CVE-2018-5451 in Philips Alice 6 System. Has primary impact with T1036 : Masquerading. |
Techniques related with vulnerability CVE-2013-2471 | CVE-2013-2471 in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2020-11897 | CVE-2020-11897, State: PUBLISHED, Published: 2020-06-17T10:23:22, Updated: 2024-08-04T11:42:00.687Z, Description: The Treck TCP/IP stack before 5.0.1.35 has an Out-of-Bounds Write via multiple malformed IPv6 packets., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2020-5539 | CVE-2020-5539 in GRANDIT. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1565.001 : Stored Data Manipulation. Is related with T1005 : Data from Local System. |
Describe the vulnerability CVE-2019-3727 | CVE-2019-3727, State: PUBLISHED, Published: 2019-05-15T15:45:11.817065Z, Updated: 2024-09-17T03:42:56.299Z, Description: Dell EMC RecoverPoint versions prior to 5.1.3 and RecoverPoint for VMs versions prior to 5.2.0.2 contain an OS command injection vulnerability in the installation feature of Boxmgmt CLI. A malicious ... |
Describe the vulnerability CVE-2018-11067 | CVE-2018-11067, State: PUBLISHED, Published: 2018-11-26T20:00:00Z, Updated: 2024-09-17T00:11:44.344Z, Description: Dell EMC Avamar Client Manager in Dell EMC Avamar Server versions 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.4.0, 7.4.1, 7.5.0, 7.5.1, 18.1 and Dell EMC Integrated Data Protection Appliance (IDPA) versions 2.0, 2.1 and... |
Techniques related with vulnerability CVE-2019-13511 | CVE-2019-13511 in Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1204.001 : Malicious Link. |
Techniques related with vulnerability CVE-2020-15095 | CVE-2020-15095 in cli. Has primary impact with T1552 : Unsecured Credentials. |
Techniques related with vulnerability CVE-2018-14847 | CVE-2018-14847 in MikroTik RouterOS through 6.42 allows arbitrary access. Is related with T0812 : Default Credentials. Is related with T1078 : Valid Accounts. |
Describe the vulnerability CVE-2010-3971 | CVE-2010-3971, State: PUBLISHED, Published: 2010-12-22T20:00:00, Updated: 2024-08-07T03:26:12.333Z, Description: Use-after-free vulnerability in the CSharedStyleSheet::Notify function in the Cascading Style Sheets (CSS) parser in mshtml.dll, as used in Microsoft Internet Explorer 6 through 8 and other products, allows ... |
Describe the vulnerability CVE-2020-9459 | CVE-2020-9459, State: PUBLISHED, Published: 2020-02-28T20:51:53, Updated: 2024-08-04T10:26:16.249Z, Description: Multiple Stored Cross-site scripting (XSS) vulnerabilities in the Webnus Modern Events Calendar Lite plugin through 5.1.6 for WordPress allows remote authenticated users (with minimal permissions) to inject ... |
Describe the vulnerability CVE-2018-15758 | CVE-2018-15758, State: PUBLISHED, Published: 2018-10-18T22:00:00Z, Updated: 2024-09-17T01:16:40.202Z, Description: Spring Security OAuth, versions 2.3 prior to 2.3.4, and 2.2 prior to 2.2.3, and 2.1 prior to 2.1.3, and 2.0 prior to 2.0.16, and older unsupported versions could be susceptible to a privilege escalation un... |
Techniques related with vulnerability CVE-2010-2862 | CVE-2010-2862 in Adobe Reader 8.2.3 and 9.3.3, and Acrobat 9.3.3. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2014-0751 | CVE-2014-0751, State: PUBLISHED, Published: 2014-01-25T22:00:00, Updated: 2024-08-06T09:27:19.517Z, Description: Directory traversal vulnerability in CimWebServer.exe (aka the WebView component) in GE Intelligent Platforms Proficy HMI/SCADA - CIMPLICITY before 8.2 SIM 24, and Proficy Process Systems with CIMPLICITY, al... |
Techniques related with vulnerability CVE-2019-1013 | CVE-2019-1013 in Windows. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1204.002 : Malicious File. Has an exploitation technique T1566 : Phishing. |
Describe the vulnerability CVE-2020-12652 | CVE-2020-12652, State: PUBLISHED, Published: 2020-05-05T04:23:59, Updated: 2024-08-04T12:04:22.748Z, Description: The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a... |
Techniques related with vulnerability CVE-2020-15162 | CVE-2020-15162 in PrestaShop. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1185 : Man in the Browser. |
Techniques related with vulnerability CVE-2010-3338 | CVE-2010-3338 in Windows Task Scheduler. Is related with T1608 : Stage Capabilities. Is related with T1053.005 : Scheduled Task. |
Techniques related with vulnerability CVE-2013-5065 | CVE-2013-5065 in kernel in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2. Is related with T1548.002 : Bypass User Account Control. Is related with T1068 : Exploitation for Privilege Escalation. |
Describe the vulnerability CVE-2018-7600 | CVE-2018-7600, State: PUBLISHED, Published: 2018-03-29T07:00:00, Updated: 2024-08-05T06:31:04.955Z, Description: Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common mod... |
Techniques related with vulnerability CVE-2014-0810 | CVE-2014-0810 in Sanshiro. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2020-15100 | CVE-2020-15100, State: PUBLISHED, Published: 2020-07-14T19:15:16, Updated: 2024-08-04T13:08:21.992Z, Description: In freewvs before 0.1.1, a user could create a large file that freewvs will try to read, which will terminate a scan process. This has been patched in 0.1.1., CVSS v3.1 - Attack Complexity: LOW, Attack Vect... |
Describe the vulnerability CVE-2020-5539 | CVE-2020-5539, State: PUBLISHED, Published: 2020-03-02T07:00:24, Updated: 2024-08-04T08:30:24.499Z, Description: GRANDIT Ver.1.6, Ver.2.0, Ver.2.1, Ver.2.2, Ver.2.3, and Ver.3.0 do not properly manage sessions, which allows remote attackers to impersonate an arbitrary user and then alter or disclose the information via... |
Describe the vulnerability CVE-2013-3897 | CVE-2013-3897, State: PUBLISHED, Published: 2013-10-09T14:44:00, Updated: 2024-08-06T16:22:01.567Z, Description: Use-after-free vulnerability in the CDisplayPointer class in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corr... |
Techniques related with vulnerability CVE-2019-3727 | CVE-2019-3727 in RecoverPoint. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1068 : Exploitation for Privilege Escalation. |
Describe the vulnerability CVE-2018-7520 | CVE-2018-7520, State: PUBLISHED, Published: 2018-03-22T18:00:00Z, Updated: 2024-09-17T03:27:26.443Z, Description: An improper access control vulnerability has been identified in Geutebruck G-Cam/EFD-2250 Version 1.12.0.4 and Topline TopFD-2125 Version 3.15.1 IP cameras, which could allow a full configuration download, ... |
Techniques related with vulnerability CVE-2019-13533 | CVE-2019-13533 in Omron PLC CJ and CS Series. Is related with T0855 : Unauthorized Command Message. Is related with T0842 : Network Sniffing. |
Techniques related with vulnerability CVE-2018-8835 | CVE-2018-8835 in Advantech WebAccess HMI Designer. Has primary impact with T1574 : Hijack Execution Flow. Has an exploitation technique T1204.002 : Malicious File. |
Describe the vulnerability CVE-2020-1569 | CVE-2020-1569, State: PUBLISHED, Published: 2020-08-17T19:13:46, Updated: 2024-08-04T06:39:10.640Z, Description: No description available, CVSS v3.1 - Attack Complexity: N/A, Attack Vector: N/A, Availability Impact: N/A, Base Score: 7.8, Base Severity: HIGH, Confidentiality Impact: N/A, Integrity Impact: N/A, Privilege... |
Techniques related with vulnerability CVE-2008-2992 | CVE-2008-2992 in Adobe Acrobat and Reader. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2012-1854 | CVE-2012-1854 in Microsoft Office. Is related with T1574.008 : Path Interception by Search Order Hijacking. |
Techniques related with vulnerability CVE-2009-2055 | CVE-2009-2055 in Cisco IOS XR 3.4.0 through 3.8.1. Is related with T1499 : Endpoint Denial of Service. |
Techniques related with vulnerability CVE-2018-8110 | CVE-2018-8110 in Microsoft Edge. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation. Has secondary impact with T1485 : Data Destructio... |
Techniques related with vulnerability CVE-2014-5279 | CVE-2014-5279 in Docker daemon. Is related with T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2016-7256 | CVE-2016-7256 in Windows font library. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. Is related with T1134.001 : Token Impersonation/Theft. |
Describe the vulnerability CVE-2017-13289 | CVE-2017-13289, State: PUBLISHED, Published: 2018-04-04T16:00:00Z, Updated: 2024-09-16T22:45:22.814Z, Description: In writeToParcel and createFromParcel of RttManager.java, there is a permission bypass due to a write size mismatch. This could lead to a local escalation of privileges where the user can start an activity... |
Describe the vulnerability CVE-2020-5210 | CVE-2020-5210, State: PUBLISHED, Published: 2020-01-28T17:50:14, Updated: 2024-08-04T08:22:08.904Z, Description: In NetHack before 3.6.5, an invalid argument to the -w command line option can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems t... |
Techniques related with vulnerability CVE-2018-8174 | CVE-2018-8174 in Windows 7. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2018-0802 | CVE-2018-0802, State: PUBLISHED, Published: 2018-01-10T01:00:00Z, Updated: 2024-09-16T23:30:27.680Z, Description: Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way objects are handled in memory, ak... |
Describe the vulnerability CVE-2019-3758 | CVE-2019-3758, State: PUBLISHED, Published: 2019-09-18T22:23:10.217159Z, Updated: 2024-09-16T17:08:48.274Z, Description: RSA Archer, versions prior to 6.6 P2 (6.6.0.2), contain an improper authentication vulnerability. The vulnerability allows sysadmins to create user accounts with insufficient credentials. Unauthentic... |
Describe the vulnerability CVE-2018-14781 | CVE-2018-14781, State: PUBLISHED, Published: 2018-08-13T22:00:00Z, Updated: 2024-09-17T03:43:42.929Z, Description: Medtronic MMT 508 MiniMed insulin pump, 522 / MMT - 722 Paradigm REAL-TIME, 523 / MMT - 723 Paradigm Revel, 523K / MMT - 723K Paradigm Revel, and 551 / MMT - 751 MiniMed 530G The models identified above, w... |
Techniques related with vulnerability CVE-2018-5445 | CVE-2018-5445 in Advantech WebAccess/SCADA. Has primary impact with T1005 : Data from Local System. |
Techniques related with vulnerability CVE-2019-8540 | CVE-2019-8540 in iOS. Is related with T1190 : Exploit Public-Facing Application. Is related with T1499.004 : Application or System Exploitation. |
Techniques related with vulnerability CVE-2020-0981 | CVE-2020-0981 in Windows 10 Version 1909 for 32-bit Systems. Has primary impact with T1134 : Access Token Manipulation. Has secondary impact with T1068 : Exploitation for Privilege Escalation. Has secondary impact with T1497 : Virtualization/Sandbox Evasion. |
Describe MITRE technique T1078.001 | MITRE T1078.001 : Default Accounts from enterprise Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Default accounts are those that are built-into an OS, such as the Guest or Administrator accounts on Windows s... |
Techniques related with vulnerability CVE-2019-5786 | CVE-2019-5786 in Chrome. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1211 : Exploitation for Defense Evasion. |
Describe the vulnerability CVE-2019-0859 | CVE-2019-0859, State: PUBLISHED, Published: 2019-04-09T20:19:48, Updated: 2024-08-04T17:58:59.594Z, Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from C... |
Techniques related with vulnerability CVE-2018-0101 | CVE-2018-0101 in Cisco Adaptive Security Appliance. Is related with T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2020-11013 | CVE-2020-11013 in Helm. Has primary impact with T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2012-6685 | CVE-2012-6685 in Nokogiri. Is related with T1046 : Network Service Scanning. |
Describe the vulnerability CVE-2014-0322 | CVE-2014-0322, State: PUBLISHED, Published: 2014-02-14T16:00:00, Updated: 2024-08-06T09:13:10.315Z, Description: Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via vectors involving crafted JavaScript code, CMarkup, and the onpropertychange attribu... |
Describe the vulnerability CVE-2018-10636 | CVE-2018-10636, State: PUBLISHED, Published: 2018-08-13T22:00:00Z, Updated: 2024-09-16T18:13:08.613Z, Description: CNCSoft Version 1.00.83 and prior with ScreenEditor Version 1.00.54 has multiple stack-based buffer overflow vulnerabilities that could cause the software to crash due to lacking user input validation befo... |
Techniques related with vulnerability CVE-2018-15758 | CVE-2018-15758 in Spring Security OAuth. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2019-11708 | CVE-2019-11708, State: PUBLISHED, Published: 2019-07-23T13:20:03, Updated: 2024-08-04T23:03:32.629Z, Description: Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child... |
Techniques related with vulnerability CVE-2014-0295 | CVE-2014-0295 in Microsoft .NET Framework 2.0 SP2 and 3.5.1. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059.001 : PowerShell. |
Describe MITRE technique T1542.001 | MITRE T1542.001 : System Firmware from enterprise Adversaries may modify system firmware to persist on systems.The BIOS (Basic Input/Output System) and The Unified Extensible Firmware Interface (UEFI) or Extensible Firmware Interface (EFI) are examples of system firmware that operate as the software interface between t... |
Techniques related with vulnerability CVE-2020-11054 | CVE-2020-11054 in qutebrowser. Has primary impact with T1190 : Exploit Public-Facing Application. Has an exploitation technique T1189 : Drive-by Compromise. |
Techniques related with vulnerability CVE-2020-3240 | CVE-2020-3240 in Cisco UCS Director. Has primary impact with T1005 : Data from Local System. Has primary impact with T1505.003 : Web Shell. Has secondary impact with T1003.008 : /etc/passwd and /etc/shadow. Has secondary impact with T1552.001 : Credentials In Files. Has secondary impact with T1059 : Command and Scripti... |
Describe the vulnerability CVE-2020-12653 | CVE-2020-12653, State: PUBLISHED, Published: 2020-05-05T04:47:35, Updated: 2024-08-04T12:04:22.557Z, Description: An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service ... |
Techniques related with vulnerability CVE-2020-5376 | CVE-2020-5376 in CPG BIOS. Has primary impact with T1542.001 : System Firmware. |
Techniques related with vulnerability CVE-2011-1249 | CVE-2011-1249 in Ancillary Function Driver (afd.sys) in Microsoft Windows. Is related with T1608 : Stage Capabilities. |
Describe the vulnerability CVE-2015-1642 | CVE-2015-1642, State: PUBLISHED, Published: 2015-08-15T00:00:00, Updated: 2024-08-06T04:47:17.628Z, Description: Microsoft Office 2007 SP3, 2010 SP2, and 2013 SP1 allows remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability.", No CVSS metrics available,... |
Describe the vulnerability CVE-2018-10299 | CVE-2018-10299, State: PUBLISHED, Published: 2018-04-23T04:00:00, Updated: 2024-08-05T07:39:06.257Z, Description: An integer overflow in the batchTransfer function of a smart contract implementation for Beauty Ecosystem Coin (BEC), the Ethereum ERC20 token used in the Beauty Chain economic system, allows attackers to a... |
Techniques related with vulnerability CVE-2020-15233 | CVE-2020-15233 in fosite. Has secondary impact with T1036 : Masquerading. Has an exploitation technique T1566.002 : Spearphishing Link. |
Describe the vulnerability CVE-2019-3708 | CVE-2019-3708, State: PUBLISHED, Published: 2019-04-17T13:32:35.525018Z, Updated: 2024-09-17T00:36:59.730Z, Description: IsilonSD Management Server 1.1.0 contains a cross-site scripting vulnerability while uploading an OVA file. A remote attacker can trick an admin user to potentially exploit this vulnerability to exec... |
Describe the vulnerability CVE-2020-0938 | CVE-2020-0938, State: PUBLISHED, Published: 2020-04-15T15:12:55, Updated: 2024-08-04T06:18:03.610Z, Description: A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font - Adobe Type 1 PostScript format.For all... |
Techniques related with vulnerability CVE-2018-19831 | CVE-2018-19831 in ToOwner function from Ethereum ERC20 token. Is related with T0828 : Loss of Productivity and Revenue. Is related with T1565 : Data Manipulation. Is related with T1068 : Exploitation for Privilege Escalation. |
Describe the vulnerability CVE-2010-1297 | CVE-2010-1297, State: PUBLISHED, Published: 2010-06-08T18:00:00, Updated: 2024-08-07T01:21:18.210Z, Description: Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64; Adobe AIR before 2.0.2.12610; and Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow remote attacke... |
Techniques related with vulnerability CVE-2020-5902 | CVE-2020-5902 in BIG-IP. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2020-15105 | CVE-2020-15105, State: PUBLISHED, Published: 2020-07-10T20:55:13, Updated: 2024-08-04T13:08:21.577Z, Description: Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and pa... |
Techniques related with vulnerability CVE-2018-10610 | CVE-2018-10610 in LeviStudioU. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has primary impact with T1005 : Data from Local System. Has primary impact with T1557 : Man-in-the-Middle. |
Describe the vulnerability CVE-2017-3881 | CVE-2017-3881, State: PUBLISHED, Published: 2017-03-17T22:00:00, Updated: 2024-11-15T18:00:24.703Z, Description: A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device o... |
Describe the vulnerability CVE-2019-3787 | CVE-2019-3787, State: PUBLISHED, Published: 2019-06-19T22:28:07.316424Z, Updated: 2024-09-16T21:57:57.203Z, Description: Cloud Foundry UAA, versions prior to 73.0.0, falls back to appending “unknown.org” to a user's email address when one is not provided and the user name does not contain an @ character. This domain is... |
Techniques related with vulnerability CVE-2010-1424 | CVE-2010-1424 in JustSystems Ichitaro and Ichitaro Government. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File. |
Describe the vulnerability CVE-2016-0165 | CVE-2016-0165, State: PUBLISHED, Published: 2016-04-12T23:00:00, Updated: 2024-08-05T22:08:13.324Z, Description: The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows loc... |
Describe the vulnerability CVE-2018-14847 | CVE-2018-14847, State: PUBLISHED, Published: 2018-08-02T07:00:00, Updated: 2024-08-05T09:38:13.936Z, Description: MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the W... |
Describe the vulnerability CVE-2018-10590 | CVE-2018-10590, State: PUBLISHED, Published: 2018-05-15T22:00:00Z, Updated: 2024-09-16T22:45:05.267Z, Description: In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NM... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.