input
stringlengths
30
54
output
stringlengths
69
4.21k
Describe the vulnerability CVE-2014-4123
CVE-2014-4123, State: PUBLISHED, Published: 2014-10-15T10:00:00, Updated: 2024-08-06T11:04:28.638Z, Description: Microsoft Internet Explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability," as exploited in the wild in October 2014, a different vulnerability than CVE-2014-4124., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-6993
CVE-2020-6993, State: PUBLISHED, Published: 2020-03-24T19:19:09, Updated: 2024-08-04T09:18:02.970Z, Description: In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, an attacker can gain access to sensitive information from the web service without authorization., No CVSS metrics available, Exploit Info: No exploit information available
Describe MITRE technique T1608
MITRE T1608 : Stage Capabilities from enterprise Adversaries may upload, install, or otherwise set up capabilities that can be used during targeting. To support their operations, an adversary may need to take capabilities they developed ([Develop Capabilities](T1587)) or obtained ([Obtain Capabilities](T1588)) and stage them on infrastructure under their control. These capabilities may be staged on infrastructure that was previously purchased/rented by the adversary ([Acquire Infrastructure](T1583)) or was otherwise compromised by them ([Compromise Infrastructure](T1584)). Capabilities may also be staged on web services, such as GitHub or Pastebin, or on Platform-as-a-Service (PaaS) offerings that enable users to easily provision applications.(Citation: Volexity Ocean Lotus November 2020)(Citation: Dragos Heroku Watering Hole)(Citation: Malwarebytes Heroku Skimmers)(Citation: Netskope GCP Redirection)(Citation: Netskope Cloud Phishing) Staging of capabilities can aid the adversary in a number of initial access and post-compromise behaviors, including (but not limited to): * Staging web resources necessary to conduct [Drive-by Compromise](T1189) when a user browses to a site.(Citation: FireEye CFR Watering Hole 2012)(Citation: Gallagher 2015)(Citation: ATT ScanBox) * Staging web resources for a link target to be used with spearphishing.(Citation: Malwarebytes Silent Librarian October 2020)(Citation: Proofpoint TA407 September 2019) * Uploading malware or tools to a location accessible to a victim network to enable [Ingress Tool Transfer](T1105).(Citation: Volexity Ocean Lotus November 2020) * Installing a previously acquired SSL/TLS certificate to use to encrypt command and control traffic (ex: [Asymmetric Cryptography](T1573.002) with [Web Protocols](T1071.001)).(Citation: DigiCert Install SSL Cert)
Describe MITRE technique T1202
MITRE T1202 : Indirect Command Execution from enterprise Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters. Various Windows utilities may be used to execute commands, possibly without invoking [cmd](S0106). For example, [Forfiles](S0193), the Program Compatibility Assistant (pcalua.exe), components of the Windows Subsystem for Linux (WSL), as well as other utilities may invoke the execution of programs and commands from a [Command and Scripting Interpreter](T1059), Run window, or via scripts. (Citation: VectorSec ForFiles Aug 2017) (Citation: Evi1cg Forfiles Nov 2017) Adversaries may abuse these features for [Defense Evasion](TA0005), specifically to perform arbitrary execution while subverting detections and/or mitigation controls (such as Group Policy) that limit/prevent the usage of [cmd](S0106) or file extensions more commonly associated with malicious payloads.
Techniques related with vulnerability CVE-2009-1807
CVE-2009-1807 in Baofeng products 3.09.04.17 and earlier. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2013-3906
CVE-2013-3906, State: PUBLISHED, Published: 2013-11-06T11:00:00, Updated: 2024-08-06T16:22:01.367Z, Description: GDI+ in Microsoft Windows Vista SP2 and Server 2008 SP2; Office 2003 SP3, 2007 SP3, and 2010 SP1 and SP2; Office Compatibility Pack SP3; and Lync 2010, 2010 Attendee, 2013, and Basic 2013 allows remote attackers to execute arbitrary code via a crafted TIFF image, as demonstrated by an image in a Word document, and exploited in the wild in October and November 2013., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2012-0158
CVE-2012-0158, State: PUBLISHED, Published: 2012-04-10T21:00:00, Updated: 2024-08-06T18:16:19.081Z, Description: The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX controls in MSCOMCTL.OCX in the Common Controls in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Office 2003 Web Components SP3; SQL Server 2000 SP4, 2005 SP4, and 2008 SP2, SP3, and R2; BizTalk Server 2002 SP1; Commerce Server 2002 SP4, 2007 SP2, and 2009 Gold and R2; Visual FoxPro 8.0 SP1 and 9.0 SP2; and Visual Basic 6.0 Runtime allow remote attackers to execute arbitrary code via a crafted (a) web site, (b) Office document, or (c) .rtf file that triggers "system state" corruption, as exploited in the wild in April 2012, aka "MSCOMCTL.OCX RCE Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-0576
CVE-2019-0576, State: PUBLISHED, Published: 2019-01-08T21:00:00, Updated: 2024-08-04T17:51:26.875Z, Description: A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka "Jet Database Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0538, CVE-2019-0575, CVE-2019-0577, CVE-2019-0578, CVE-2019-0579, CVE-2019-0580, CVE-2019-0581, CVE-2019-0582, CVE-2019-0583, CVE-2019-0584., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-7496
CVE-2018-7496, State: PUBLISHED, Published: 2018-03-14T18:00:00, Updated: 2024-08-05T06:31:03.761Z, Description: An Information Exposure issue was discovered in OSIsoft PI Vision versions 2017 and prior. The server response header and referrer-policy response header each provide unintended information disclosure., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2018-10299
CVE-2018-10299 in batchTransfer function of a smart contract implementation for Beauty Ecosystem Coin. Is related with T1565.003 : Runtime Data Manipulation.
Techniques related with vulnerability CVE-2020-5369
CVE-2020-5369 in Isilon OneFS. Has primary impact with T1068 : Exploitation for Privilege Escalation.
Techniques related with vulnerability CVE-2013-7246
CVE-2013-7246 in DaumGame ActiveX plugin 1.1.0.4 and 1.1.0.5. Is related with T1548 : Abuse Elevation Control Mechanism. Is related with T1211 : Exploitation for Defense Evasion.
Describe the vulnerability CVE-2013-3336
CVE-2013-3336, State: PUBLISHED, Published: 2013-05-09T10:00:00, Updated: 2024-08-06T16:07:37.553Z, Description: Unspecified vulnerability in Adobe ColdFusion 9.0, 9.0.1, 9.0.2, and 10 allows remote attackers to read arbitrary files via unknown vectors., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2018-10636
CVE-2018-10636 in CNCSoft with ScreenEditor. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has secondary impact with T1068 : Exploitation for Privilege Escalation.
Techniques related with vulnerability CVE-2018-10589
CVE-2018-10589 in WebAccess. Has primary impact with T1202 : Indirect Command Execution.
Techniques related with vulnerability CVE-2020-15132
CVE-2020-15132 in sulu. Has primary impact with T1589 : Gather Victim Identity Information.
Techniques related with vulnerability CVE-2019-3735
CVE-2019-3735 in Dell SupportAssist for Business PCs. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1078 : Valid Accounts.
Describe the vulnerability CVE-2020-3460
CVE-2020-3460, State: PUBLISHED, Published: 2020-07-31T00:00:16.991185Z, Updated: 2024-11-13T18:18:29.278Z, Description: A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by intercepting a request from a user and injecting malicious data into an HTTP header. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 4.7, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: NONE, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Describe the vulnerability CVE-2020-5231
CVE-2020-5231, State: PUBLISHED, Published: 2020-01-30T21:15:16, Updated: 2024-08-04T08:22:08.962Z, Description: In Opencast before 7.6 and 8.1, users with the role ROLE_COURSE_ADMIN can use the user-utils endpoint to create new users not including the role ROLE_ADMIN. ROLE_COURSE_ADMIN is a non-standard role in Opencast which is referenced neither in the documentation nor in any code (except for tests) but only in the security configuration. From the name – implying an admin for a specific course – users would never expect that this role allows user creation. This issue is fixed in 7.6 and 8.1 which both ship a new default security configuration., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 4.8, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: HIGH, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-5300
CVE-2020-5300, State: PUBLISHED, Published: 2020-04-06T16:30:14, Updated: 2024-08-04T08:22:09.093Z, Description: In Hydra (an OAuth2 Server and OpenID Certified™ OpenID Connect Provider written in Go), before version 1.4.0+oryOS.17, when using client authentication method 'private_key_jwt' [1], OpenId specification says the following about assertion `jti`: "A unique identifier for the token, which can be used to prevent reuse of the token. These tokens MUST only be used once, unless conditions for reuse were negotiated between the parties". Hydra does not check the uniqueness of this `jti` value. Exploiting this vulnerability is somewhat difficult because: - TLS protects against MITM which makes it difficult to intercept valid tokens for replay attacks - The expiry time of the JWT gives only a short window of opportunity where it could be replayed This has been patched in version v1.4.0+oryOS.17, CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 5.8, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: NONE, Privileges Required: LOW, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-11044
CVE-2020-11044 in FreeRDP. Has primary impact with T1499.004 : Application or System Exploitation.
Techniques related with vulnerability CVE-2018-7499
CVE-2018-7499 in WebAccess. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation.
Describe the vulnerability CVE-2016-5062
CVE-2016-5062, State: PUBLISHED, Published: 2016-09-29T10:00:00, Updated: 2024-08-06T00:46:40.256Z, Description: The web server in Aternity before 9.0.1 does not require authentication for getMBeansFromURL loading of Java MBeans, which allows remote attackers to execute arbitrary Java code by registering MBeans., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2018-5451
CVE-2018-5451 in Philips Alice 6 System. Has primary impact with T1036 : Masquerading.
Techniques related with vulnerability CVE-2013-2471
CVE-2013-2471 in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2020-11897
CVE-2020-11897, State: PUBLISHED, Published: 2020-06-17T10:23:22, Updated: 2024-08-04T11:42:00.687Z, Description: The Treck TCP/IP stack before 5.0.1.35 has an Out-of-Bounds Write via multiple malformed IPv6 packets., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-5539
CVE-2020-5539 in GRANDIT. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1565.001 : Stored Data Manipulation. Is related with T1005 : Data from Local System.
Describe the vulnerability CVE-2019-3727
CVE-2019-3727, State: PUBLISHED, Published: 2019-05-15T15:45:11.817065Z, Updated: 2024-09-17T03:42:56.299Z, Description: Dell EMC RecoverPoint versions prior to 5.1.3 and RecoverPoint for VMs versions prior to 5.2.0.2 contain an OS command injection vulnerability in the installation feature of Boxmgmt CLI. A malicious boxmgmt user may potentially be able to execute arbitrary commands as root., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: LOCAL, Availability Impact: HIGH, Base Score: 6.4, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-11067
CVE-2018-11067, State: PUBLISHED, Published: 2018-11-26T20:00:00Z, Updated: 2024-09-17T00:11:44.344Z, Description: Dell EMC Avamar Client Manager in Dell EMC Avamar Server versions 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.4.0, 7.4.1, 7.5.0, 7.5.1, 18.1 and Dell EMC Integrated Data Protection Appliance (IDPA) versions 2.0, 2.1 and 2.2 contain an open redirection vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to redirect application users to arbitrary web URLs by tricking the victim users to click on maliciously crafted links. The vulnerability could be used to conduct phishing attacks that cause users to unknowingly visit malicious sites., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2019-13511
CVE-2019-13511 in Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1204.001 : Malicious Link.
Techniques related with vulnerability CVE-2020-15095
CVE-2020-15095 in cli. Has primary impact with T1552 : Unsecured Credentials.
Techniques related with vulnerability CVE-2018-14847
CVE-2018-14847 in MikroTik RouterOS through 6.42 allows arbitrary access. Is related with T0812 : Default Credentials. Is related with T1078 : Valid Accounts.
Describe the vulnerability CVE-2010-3971
CVE-2010-3971, State: PUBLISHED, Published: 2010-12-22T20:00:00, Updated: 2024-08-07T03:26:12.333Z, Description: Use-after-free vulnerability in the CSharedStyleSheet::Notify function in the Cascading Style Sheets (CSS) parser in mshtml.dll, as used in Microsoft Internet Explorer 6 through 8 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a self-referential @import rule in a stylesheet, aka "CSS Memory Corruption Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-9459
CVE-2020-9459, State: PUBLISHED, Published: 2020-02-28T20:51:53, Updated: 2024-08-04T10:26:16.249Z, Description: Multiple Stored Cross-site scripting (XSS) vulnerabilities in the Webnus Modern Events Calendar Lite plugin through 5.1.6 for WordPress allows remote authenticated users (with minimal permissions) to inject arbitrary JavaScript, HTML, or CSS via Ajax actions. This affects mec_save_notifications and import_settings., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-15758
CVE-2018-15758, State: PUBLISHED, Published: 2018-10-18T22:00:00Z, Updated: 2024-09-17T01:16:40.202Z, Description: Spring Security OAuth, versions 2.3 prior to 2.3.4, and 2.2 prior to 2.2.3, and 2.1 prior to 2.1.3, and 2.0 prior to 2.0.16, and older unsupported versions could be susceptible to a privilege escalation under certain conditions. A malicious user or attacker can craft a request to the approval endpoint that can modify the previously saved authorization request and lead to a privilege escalation on the subsequent approval. This scenario can happen if the application is configured to use a custom approval endpoint that declares AuthorizationRequest as a controller method argument. This vulnerability exposes applications that meet all of the following requirements: Act in the role of an Authorization Server (e.g. @EnableAuthorizationServer) and use a custom Approval Endpoint that declares AuthorizationRequest as a controller method argument. This vulnerability does not expose applications that: Act in the role of an Authorization Server and use the default Approval Endpoint, act in the role of a Resource Server only (e.g. @EnableResourceServer), act in the role of a Client only (e.g. @EnableOAuthClient)., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 9.6, Base Severity: CRITICAL, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2010-2862
CVE-2010-2862 in Adobe Reader 8.2.3 and 9.3.3, and Acrobat 9.3.3. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2014-0751
CVE-2014-0751, State: PUBLISHED, Published: 2014-01-25T22:00:00, Updated: 2024-08-06T09:27:19.517Z, Description: Directory traversal vulnerability in CimWebServer.exe (aka the WebView component) in GE Intelligent Platforms Proficy HMI/SCADA - CIMPLICITY before 8.2 SIM 24, and Proficy Process Systems with CIMPLICITY, allows remote attackers to execute arbitrary code via a crafted message to TCP port 10212, aka ZDI-CAN-1623., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2019-1013
CVE-2019-1013 in Windows. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1204.002 : Malicious File. Has an exploitation technique T1566 : Phishing.
Describe the vulnerability CVE-2020-12652
CVE-2020-12652, State: PUBLISHED, Published: 2020-05-05T04:23:59, Updated: 2024-08-04T12:04:22.748Z, Description: The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a "double fetch" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states "The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.", No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-15162
CVE-2020-15162 in PrestaShop. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1185 : Man in the Browser.
Techniques related with vulnerability CVE-2010-3338
CVE-2010-3338 in Windows Task Scheduler. Is related with T1608 : Stage Capabilities. Is related with T1053.005 : Scheduled Task.
Techniques related with vulnerability CVE-2013-5065
CVE-2013-5065 in kernel in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2. Is related with T1548.002 : Bypass User Account Control. Is related with T1068 : Exploitation for Privilege Escalation.
Describe the vulnerability CVE-2018-7600
CVE-2018-7600, State: PUBLISHED, Published: 2018-03-29T07:00:00, Updated: 2024-08-05T06:31:04.955Z, Description: Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2014-0810
CVE-2014-0810 in Sanshiro. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2020-15100
CVE-2020-15100, State: PUBLISHED, Published: 2020-07-14T19:15:16, Updated: 2024-08-04T13:08:21.992Z, Description: In freewvs before 0.1.1, a user could create a large file that freewvs will try to read, which will terminate a scan process. This has been patched in 0.1.1., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: LOW, Base Score: 2.8, Base Severity: LOW, Confidentiality Impact: NONE, Integrity Impact: NONE, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-5539
CVE-2020-5539, State: PUBLISHED, Published: 2020-03-02T07:00:24, Updated: 2024-08-04T08:30:24.499Z, Description: GRANDIT Ver.1.6, Ver.2.0, Ver.2.1, Ver.2.2, Ver.2.3, and Ver.3.0 do not properly manage sessions, which allows remote attackers to impersonate an arbitrary user and then alter or disclose the information via unspecified vectors., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2013-3897
CVE-2013-3897, State: PUBLISHED, Published: 2013-10-09T14:44:00, Updated: 2024-08-06T16:22:01.567Z, Description: Use-after-free vulnerability in the CDisplayPointer class in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted JavaScript code that uses the onpropertychange event handler, as exploited in the wild in September and October 2013, aka "Internet Explorer Memory Corruption Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2019-3727
CVE-2019-3727 in RecoverPoint. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1068 : Exploitation for Privilege Escalation.
Describe the vulnerability CVE-2018-7520
CVE-2018-7520, State: PUBLISHED, Published: 2018-03-22T18:00:00Z, Updated: 2024-09-17T03:27:26.443Z, Description: An improper access control vulnerability has been identified in Geutebruck G-Cam/EFD-2250 Version 1.12.0.4 and Topline TopFD-2125 Version 3.15.1 IP cameras, which could allow a full configuration download, including passwords., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2019-13533
CVE-2019-13533 in Omron PLC CJ and CS Series. Is related with T0855 : Unauthorized Command Message. Is related with T0842 : Network Sniffing.
Techniques related with vulnerability CVE-2018-8835
CVE-2018-8835 in Advantech WebAccess HMI Designer. Has primary impact with T1574 : Hijack Execution Flow. Has an exploitation technique T1204.002 : Malicious File.
Describe the vulnerability CVE-2020-1569
CVE-2020-1569, State: PUBLISHED, Published: 2020-08-17T19:13:46, Updated: 2024-08-04T06:39:10.640Z, Description: No description available, CVSS v3.1 - Attack Complexity: N/A, Attack Vector: N/A, Availability Impact: N/A, Base Score: 7.8, Base Severity: HIGH, Confidentiality Impact: N/A, Integrity Impact: N/A, Privileges Required: N/A, Scope: N/A, User Interaction: N/A, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2008-2992
CVE-2008-2992 in Adobe Acrobat and Reader. Is related with T1203 : Exploitation for Client Execution.
Techniques related with vulnerability CVE-2012-1854
CVE-2012-1854 in Microsoft Office. Is related with T1574.008 : Path Interception by Search Order Hijacking.
Techniques related with vulnerability CVE-2009-2055
CVE-2009-2055 in Cisco IOS XR 3.4.0 through 3.8.1. Is related with T1499 : Endpoint Denial of Service.
Techniques related with vulnerability CVE-2018-8110
CVE-2018-8110 in Microsoft Edge. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation. Has secondary impact with T1485 : Data Destruction. Has secondary impact with T1136 : Create Account. Has an exploitation technique T1204.002 : Malicious File. Has an exploitation technique T1566 : Phishing.
Techniques related with vulnerability CVE-2014-5279
CVE-2014-5279 in Docker daemon. Is related with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2016-7256
CVE-2016-7256 in Windows font library. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. Is related with T1134.001 : Token Impersonation/Theft.
Describe the vulnerability CVE-2017-13289
CVE-2017-13289, State: PUBLISHED, Published: 2018-04-04T16:00:00Z, Updated: 2024-09-16T22:45:22.814Z, Description: In writeToParcel and createFromParcel of RttManager.java, there is a permission bypass due to a write size mismatch. This could lead to a local escalation of privileges where the user can start an activity with system privileges, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-70398564., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-5210
CVE-2020-5210, State: PUBLISHED, Published: 2020-01-28T17:50:14, Updated: 2024-08-04T08:22:08.904Z, Description: In NetHack before 3.6.5, an invalid argument to the -w command line option can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to influence command line options. Users should upgrade to NetHack 3.6.5., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: LOCAL, Availability Impact: LOW, Base Score: 5, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: LOW, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2018-8174
CVE-2018-8174 in Windows 7. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2018-0802
CVE-2018-0802, State: PUBLISHED, Published: 2018-01-10T01:00:00Z, Updated: 2024-09-16T23:30:27.680Z, Description: Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE is unique from CVE-2018-0797 and CVE-2018-0812., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-3758
CVE-2019-3758, State: PUBLISHED, Published: 2019-09-18T22:23:10.217159Z, Updated: 2024-09-16T17:08:48.274Z, Description: RSA Archer, versions prior to 6.6 P2 (6.6.0.2), contain an improper authentication vulnerability. The vulnerability allows sysadmins to create user accounts with insufficient credentials. Unauthenticated attackers could gain unauthorized access to the system using those accounts., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.1, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-14781
CVE-2018-14781, State: PUBLISHED, Published: 2018-08-13T22:00:00Z, Updated: 2024-09-17T03:43:42.929Z, Description: Medtronic MMT 508 MiniMed insulin pump, 522 / MMT - 722 Paradigm REAL-TIME, 523 / MMT - 723 Paradigm Revel, 523K / MMT - 723K Paradigm Revel, and 551 / MMT - 751 MiniMed 530G The models identified above, when paired with a remote controller and having the "easy bolus" and "remote bolus" options enabled (non-default), are vulnerable to a capture-replay attack. An attacker can capture the wireless transmissions between the remote controller and the pump and replay them to cause an insulin (bolus) delivery., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2018-5445
CVE-2018-5445 in Advantech WebAccess/SCADA. Has primary impact with T1005 : Data from Local System.
Techniques related with vulnerability CVE-2019-8540
CVE-2019-8540 in iOS. Is related with T1190 : Exploit Public-Facing Application. Is related with T1499.004 : Application or System Exploitation.
Techniques related with vulnerability CVE-2020-0981
CVE-2020-0981 in Windows 10 Version 1909 for 32-bit Systems. Has primary impact with T1134 : Access Token Manipulation. Has secondary impact with T1068 : Exploitation for Privilege Escalation. Has secondary impact with T1497 : Virtualization/Sandbox Evasion.
Describe MITRE technique T1078.001
MITRE T1078.001 : Default Accounts from enterprise Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Default accounts are those that are built-into an OS, such as the Guest or Administrator accounts on Windows systems. Default accounts also include default factory/provider set accounts on other types of systems, software, or devices, including the root user account in AWS and the default service account in Kubernetes.(Citation: Microsoft Local Accounts Feb 2019)(Citation: AWS Root User)(Citation: Threat Matrix for Kubernetes) Default accounts are not limited to client machines, rather also include accounts that are preset for equipment such as network devices and computer applications whether they are internal, open source, or commercial. Appliances that come preset with a username and password combination pose a serious threat to organizations that do not change it post installation, as they are easy targets for an adversary. Similarly, adversaries may also utilize publicly disclosed or stolen [Private Keys](T1552.004) or credential materials to legitimately connect to remote environments via [Remote Services](T1021).(Citation: Metasploit SSH Module)
Techniques related with vulnerability CVE-2019-5786
CVE-2019-5786 in Chrome. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1211 : Exploitation for Defense Evasion.
Describe the vulnerability CVE-2019-0859
CVE-2019-0859, State: PUBLISHED, Published: 2019-04-09T20:19:48, Updated: 2024-08-04T17:58:59.594Z, Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0685, CVE-2019-0803., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2018-0101
CVE-2018-0101 in Cisco Adaptive Security Appliance. Is related with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2020-11013
CVE-2020-11013 in Helm. Has primary impact with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2012-6685
CVE-2012-6685 in Nokogiri. Is related with T1046 : Network Service Scanning.
Describe the vulnerability CVE-2014-0322
CVE-2014-0322, State: PUBLISHED, Published: 2014-02-14T16:00:00, Updated: 2024-08-06T09:13:10.315Z, Description: Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via vectors involving crafted JavaScript code, CMarkup, and the onpropertychange attribute of a script element, as exploited in the wild in January and February 2014., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-10636
CVE-2018-10636, State: PUBLISHED, Published: 2018-08-13T22:00:00Z, Updated: 2024-09-16T18:13:08.613Z, Description: CNCSoft Version 1.00.83 and prior with ScreenEditor Version 1.00.54 has multiple stack-based buffer overflow vulnerabilities that could cause the software to crash due to lacking user input validation before copying data from project files onto the stack. Which may allow an attacker to gain remote code execution with administrator privileges if exploited., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2018-15758
CVE-2018-15758 in Spring Security OAuth. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2019-11708
CVE-2019-11708, State: PUBLISHED, Published: 2019-07-23T13:20:03, Updated: 2024-08-04T23:03:32.629Z, Description: Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. This vulnerability affects Firefox ESR < 60.7.2, Firefox < 67.0.4, and Thunderbird < 60.7.2., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2014-0295
CVE-2014-0295 in Microsoft .NET Framework 2.0 SP2 and 3.5.1. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059.001 : PowerShell.
Describe MITRE technique T1542.001
MITRE T1542.001 : System Firmware from enterprise Adversaries may modify system firmware to persist on systems.The BIOS (Basic Input/Output System) and The Unified Extensible Firmware Interface (UEFI) or Extensible Firmware Interface (EFI) are examples of system firmware that operate as the software interface between the operating system and hardware of a computer.(Citation: Wikipedia BIOS)(Citation: Wikipedia UEFI)(Citation: About UEFI) System firmware like BIOS and (U)EFI underly the functionality of a computer and may be modified by an adversary to perform or assist in malicious activity. Capabilities exist to overwrite the system firmware, which may give sophisticated adversaries a means to install malicious firmware updates as a means of persistence on a system that may be difficult to detect.
Techniques related with vulnerability CVE-2020-11054
CVE-2020-11054 in qutebrowser. Has primary impact with T1190 : Exploit Public-Facing Application. Has an exploitation technique T1189 : Drive-by Compromise.
Techniques related with vulnerability CVE-2020-3240
CVE-2020-3240 in Cisco UCS Director. Has primary impact with T1005 : Data from Local System. Has primary impact with T1505.003 : Web Shell. Has secondary impact with T1003.008 : /etc/passwd and /etc/shadow. Has secondary impact with T1552.001 : Credentials In Files. Has secondary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1133 : External Remote Services.
Describe the vulnerability CVE-2020-12653
CVE-2020-12653, State: PUBLISHED, Published: 2020-05-05T04:47:35, Updated: 2024-08-04T12:04:22.557Z, Description: An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-5376
CVE-2020-5376 in CPG BIOS. Has primary impact with T1542.001 : System Firmware.
Techniques related with vulnerability CVE-2011-1249
CVE-2011-1249 in Ancillary Function Driver (afd.sys) in Microsoft Windows. Is related with T1608 : Stage Capabilities.
Describe the vulnerability CVE-2015-1642
CVE-2015-1642, State: PUBLISHED, Published: 2015-08-15T00:00:00, Updated: 2024-08-06T04:47:17.628Z, Description: Microsoft Office 2007 SP3, 2010 SP2, and 2013 SP1 allows remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-10299
CVE-2018-10299, State: PUBLISHED, Published: 2018-04-23T04:00:00, Updated: 2024-08-05T07:39:06.257Z, Description: An integer overflow in the batchTransfer function of a smart contract implementation for Beauty Ecosystem Coin (BEC), the Ethereum ERC20 token used in the Beauty Chain economic system, allows attackers to accomplish an unauthorized increase of digital assets by providing two _receivers arguments in conjunction with a large _value argument, as exploited in the wild in April 2018, aka the "batchOverflow" issue., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-15233
CVE-2020-15233 in fosite. Has secondary impact with T1036 : Masquerading. Has an exploitation technique T1566.002 : Spearphishing Link.
Describe the vulnerability CVE-2019-3708
CVE-2019-3708, State: PUBLISHED, Published: 2019-04-17T13:32:35.525018Z, Updated: 2024-09-17T00:36:59.730Z, Description: IsilonSD Management Server 1.1.0 contains a cross-site scripting vulnerability while uploading an OVA file. A remote attacker can trick an admin user to potentially exploit this vulnerability to execute malicious HTML or JavaScript code in the context of the admin user., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.3, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-0938
CVE-2020-0938, State: PUBLISHED, Published: 2020-04-15T15:12:55, Updated: 2024-08-04T06:18:03.610Z, Description: A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font - Adobe Type 1 PostScript format.For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely, aka 'Adobe Font Manager Library Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1020., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2018-19831
CVE-2018-19831 in ToOwner function from Ethereum ERC20 token. Is related with T0828 : Loss of Productivity and Revenue. Is related with T1565 : Data Manipulation. Is related with T1068 : Exploitation for Privilege Escalation.
Describe the vulnerability CVE-2010-1297
CVE-2010-1297, State: PUBLISHED, Published: 2010-06-08T18:00:00, Updated: 2024-08-07T01:21:18.210Z, Description: Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64; Adobe AIR before 2.0.2.12610; and Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted SWF content, related to authplay.dll and the ActionScript Virtual Machine 2 (AVM2) newfunction instruction, as exploited in the wild in June 2010., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-5902
CVE-2020-5902 in BIG-IP. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2020-15105
CVE-2020-15105, State: PUBLISHED, Published: 2020-07-10T20:55:13, Updated: 2024-08-04T13:08:21.577Z, Description: Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authentication code. This means that the password is stored in clear text in the session for an arbitrary amount of time, and potentially forever if the user begins the login process by entering their username and password and then leaves before entering their two-factor authentication code. The severity of this issue depends on which type of session storage you have configured: in the worst case, if you're using Django's default database session storage, then users' passwords are stored in clear text in your database. In the best case, if you're using Django's signed cookie session, then users' passwords are only stored in clear text within their browser's cookie store. In the common case of using Django's cache session store, the users' passwords are stored in clear text in whatever cache storage you have configured (typically Memcached or Redis). This has been fixed in 1.12. After upgrading, users should be sure to delete any clear text passwords that have been stored. For example, if you're using the database session backend, you'll likely want to delete any session record from the database and purge that data from any database backups or replicas. In addition, affected organizations who have suffered a database breach while using an affected version should inform their users that their clear text passwords have been compromised. All organizations should encourage users whose passwords were insecurely stored to change these passwords on any sites where they were used. As a workaround, wwitching Django's session storage to use signed cookies instead of the database or cache lessens the impact of this issue, but should not be done without a thorough understanding of the security tradeoffs of using signed cookies rather than a server-side session storage. There is no way to fully mitigate the issue without upgrading., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 5.4, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: LOW, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2018-10610
CVE-2018-10610 in LeviStudioU. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has primary impact with T1005 : Data from Local System. Has primary impact with T1557 : Man-in-the-Middle.
Describe the vulnerability CVE-2017-3881
CVE-2017-3881, State: PUBLISHED, Published: 2017-03-17T22:00:00, Updated: 2024-11-15T18:00:24.703Z, Description: A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-3787
CVE-2019-3787, State: PUBLISHED, Published: 2019-06-19T22:28:07.316424Z, Updated: 2024-09-16T21:57:57.203Z, Description: Cloud Foundry UAA, versions prior to 73.0.0, falls back to appending “unknown.org” to a user's email address when one is not provided and the user name does not contain an @ character. This domain is held by a private company, which leads to attack vectors including password recovery emails sent to a potentially fraudulent address. This would allow the attacker to gain complete control of the user's account., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.3, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2010-1424
CVE-2010-1424 in JustSystems Ichitaro and Ichitaro Government. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File.
Describe the vulnerability CVE-2016-0165
CVE-2016-0165, State: PUBLISHED, Published: 2016-04-12T23:00:00, Updated: 2024-08-05T22:08:13.324Z, Description: The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0143 and CVE-2016-0167., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-14847
CVE-2018-14847, State: PUBLISHED, Published: 2018-08-02T07:00:00, Updated: 2024-08-05T09:38:13.936Z, Description: MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-10590
CVE-2018-10590, State: PUBLISHED, Published: 2018-05-15T22:00:00Z, Updated: 2024-09-16T22:45:05.267Z, Description: In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, an information exposure vulnerability through directory listing has been identified, which may allow an attacker to find important files that are not normally visible., No CVSS metrics available, Exploit Info: No exploit information available