input
stringlengths
30
54
output
stringlengths
69
4.21k
Describe the vulnerability CVE-2014-4123
CVE-2014-4123, State: PUBLISHED, Published: 2014-10-15T10:00:00, Updated: 2024-08-06T11:04:28.638Z, Description: Microsoft Internet Explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability," as exploited in the wild in October 2...
Describe the vulnerability CVE-2020-6993
CVE-2020-6993, State: PUBLISHED, Published: 2020-03-24T19:19:09, Updated: 2024-08-04T09:18:02.970Z, Description: In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, an attacker can gain access to sensitive information from the web service without authorization., No ...
Describe MITRE technique T1608
MITRE T1608 : Stage Capabilities from enterprise Adversaries may upload, install, or otherwise set up capabilities that can be used during targeting. To support their operations, an adversary may need to take capabilities they developed ([Develop Capabilities](T1587)) or obtained ([Obtain Capabilities](T1588)) and stag...
Describe MITRE technique T1202
MITRE T1202 : Indirect Command Execution from enterprise Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters. Various Windows utilities may be used to execute commands, possibly without invoking [cmd](S0106). For example, [Forf...
Techniques related with vulnerability CVE-2009-1807
CVE-2009-1807 in Baofeng products 3.09.04.17 and earlier. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2013-3906
CVE-2013-3906, State: PUBLISHED, Published: 2013-11-06T11:00:00, Updated: 2024-08-06T16:22:01.367Z, Description: GDI+ in Microsoft Windows Vista SP2 and Server 2008 SP2; Office 2003 SP3, 2007 SP3, and 2010 SP1 and SP2; Office Compatibility Pack SP3; and Lync 2010, 2010 Attendee, 2013, and Basic 2013 allows remote attac...
Describe the vulnerability CVE-2012-0158
CVE-2012-0158, State: PUBLISHED, Published: 2012-04-10T21:00:00, Updated: 2024-08-06T18:16:19.081Z, Description: The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX controls in MSCOMCTL.OCX in the Common Controls in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Office 2003 Web...
Describe the vulnerability CVE-2019-0576
CVE-2019-0576, State: PUBLISHED, Published: 2019-01-08T21:00:00, Updated: 2024-08-04T17:51:26.875Z, Description: A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka "Jet Database Engine Remote Code Execution Vulnerability." This affects Windows 7, ...
Describe the vulnerability CVE-2018-7496
CVE-2018-7496, State: PUBLISHED, Published: 2018-03-14T18:00:00, Updated: 2024-08-05T06:31:03.761Z, Description: An Information Exposure issue was discovered in OSIsoft PI Vision versions 2017 and prior. The server response header and referrer-policy response header each provide unintended information disclosure., No C...
Techniques related with vulnerability CVE-2018-10299
CVE-2018-10299 in batchTransfer function of a smart contract implementation for Beauty Ecosystem Coin. Is related with T1565.003 : Runtime Data Manipulation.
Techniques related with vulnerability CVE-2020-5369
CVE-2020-5369 in Isilon OneFS. Has primary impact with T1068 : Exploitation for Privilege Escalation.
Techniques related with vulnerability CVE-2013-7246
CVE-2013-7246 in DaumGame ActiveX plugin 1.1.0.4 and 1.1.0.5. Is related with T1548 : Abuse Elevation Control Mechanism. Is related with T1211 : Exploitation for Defense Evasion.
Describe the vulnerability CVE-2013-3336
CVE-2013-3336, State: PUBLISHED, Published: 2013-05-09T10:00:00, Updated: 2024-08-06T16:07:37.553Z, Description: Unspecified vulnerability in Adobe ColdFusion 9.0, 9.0.1, 9.0.2, and 10 allows remote attackers to read arbitrary files via unknown vectors., No CVSS metrics available, Exploit Info: No exploit information a...
Techniques related with vulnerability CVE-2018-10636
CVE-2018-10636 in CNCSoft with ScreenEditor. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has secondary impact with T1068 : Exploitation for Privilege Escalation.
Techniques related with vulnerability CVE-2018-10589
CVE-2018-10589 in WebAccess. Has primary impact with T1202 : Indirect Command Execution.
Techniques related with vulnerability CVE-2020-15132
CVE-2020-15132 in sulu. Has primary impact with T1589 : Gather Victim Identity Information.
Techniques related with vulnerability CVE-2019-3735
CVE-2019-3735 in Dell SupportAssist for Business PCs. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1078 : Valid Accounts.
Describe the vulnerability CVE-2020-3460
CVE-2020-3460, State: PUBLISHED, Published: 2020-07-31T00:00:16.991185Z, Updated: 2024-11-13T18:18:29.278Z, Description: A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack agains...
Describe the vulnerability CVE-2020-5231
CVE-2020-5231, State: PUBLISHED, Published: 2020-01-30T21:15:16, Updated: 2024-08-04T08:22:08.962Z, Description: In Opencast before 7.6 and 8.1, users with the role ROLE_COURSE_ADMIN can use the user-utils endpoint to create new users not including the role ROLE_ADMIN. ROLE_COURSE_ADMIN is a non-standard role in Openca...
Describe the vulnerability CVE-2020-5300
CVE-2020-5300, State: PUBLISHED, Published: 2020-04-06T16:30:14, Updated: 2024-08-04T08:22:09.093Z, Description: In Hydra (an OAuth2 Server and OpenID Certified™ OpenID Connect Provider written in Go), before version 1.4.0+oryOS.17, when using client authentication method 'private_key_jwt' [1], OpenId specification say...
Techniques related with vulnerability CVE-2020-11044
CVE-2020-11044 in FreeRDP. Has primary impact with T1499.004 : Application or System Exploitation.
Techniques related with vulnerability CVE-2018-7499
CVE-2018-7499 in WebAccess. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation.
Describe the vulnerability CVE-2016-5062
CVE-2016-5062, State: PUBLISHED, Published: 2016-09-29T10:00:00, Updated: 2024-08-06T00:46:40.256Z, Description: The web server in Aternity before 9.0.1 does not require authentication for getMBeansFromURL loading of Java MBeans, which allows remote attackers to execute arbitrary Java code by registering MBeans., No CV...
Techniques related with vulnerability CVE-2018-5451
CVE-2018-5451 in Philips Alice 6 System. Has primary impact with T1036 : Masquerading.
Techniques related with vulnerability CVE-2013-2471
CVE-2013-2471 in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2020-11897
CVE-2020-11897, State: PUBLISHED, Published: 2020-06-17T10:23:22, Updated: 2024-08-04T11:42:00.687Z, Description: The Treck TCP/IP stack before 5.0.1.35 has an Out-of-Bounds Write via multiple malformed IPv6 packets., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-5539
CVE-2020-5539 in GRANDIT. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1565.001 : Stored Data Manipulation. Is related with T1005 : Data from Local System.
Describe the vulnerability CVE-2019-3727
CVE-2019-3727, State: PUBLISHED, Published: 2019-05-15T15:45:11.817065Z, Updated: 2024-09-17T03:42:56.299Z, Description: Dell EMC RecoverPoint versions prior to 5.1.3 and RecoverPoint for VMs versions prior to 5.2.0.2 contain an OS command injection vulnerability in the installation feature of Boxmgmt CLI. A malicious ...
Describe the vulnerability CVE-2018-11067
CVE-2018-11067, State: PUBLISHED, Published: 2018-11-26T20:00:00Z, Updated: 2024-09-17T00:11:44.344Z, Description: Dell EMC Avamar Client Manager in Dell EMC Avamar Server versions 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.4.0, 7.4.1, 7.5.0, 7.5.1, 18.1 and Dell EMC Integrated Data Protection Appliance (IDPA) versions 2.0, 2.1 and...
Techniques related with vulnerability CVE-2019-13511
CVE-2019-13511 in Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1204.001 : Malicious Link.
Techniques related with vulnerability CVE-2020-15095
CVE-2020-15095 in cli. Has primary impact with T1552 : Unsecured Credentials.
Techniques related with vulnerability CVE-2018-14847
CVE-2018-14847 in MikroTik RouterOS through 6.42 allows arbitrary access. Is related with T0812 : Default Credentials. Is related with T1078 : Valid Accounts.
Describe the vulnerability CVE-2010-3971
CVE-2010-3971, State: PUBLISHED, Published: 2010-12-22T20:00:00, Updated: 2024-08-07T03:26:12.333Z, Description: Use-after-free vulnerability in the CSharedStyleSheet::Notify function in the Cascading Style Sheets (CSS) parser in mshtml.dll, as used in Microsoft Internet Explorer 6 through 8 and other products, allows ...
Describe the vulnerability CVE-2020-9459
CVE-2020-9459, State: PUBLISHED, Published: 2020-02-28T20:51:53, Updated: 2024-08-04T10:26:16.249Z, Description: Multiple Stored Cross-site scripting (XSS) vulnerabilities in the Webnus Modern Events Calendar Lite plugin through 5.1.6 for WordPress allows remote authenticated users (with minimal permissions) to inject ...
Describe the vulnerability CVE-2018-15758
CVE-2018-15758, State: PUBLISHED, Published: 2018-10-18T22:00:00Z, Updated: 2024-09-17T01:16:40.202Z, Description: Spring Security OAuth, versions 2.3 prior to 2.3.4, and 2.2 prior to 2.2.3, and 2.1 prior to 2.1.3, and 2.0 prior to 2.0.16, and older unsupported versions could be susceptible to a privilege escalation un...
Techniques related with vulnerability CVE-2010-2862
CVE-2010-2862 in Adobe Reader 8.2.3 and 9.3.3, and Acrobat 9.3.3. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2014-0751
CVE-2014-0751, State: PUBLISHED, Published: 2014-01-25T22:00:00, Updated: 2024-08-06T09:27:19.517Z, Description: Directory traversal vulnerability in CimWebServer.exe (aka the WebView component) in GE Intelligent Platforms Proficy HMI/SCADA - CIMPLICITY before 8.2 SIM 24, and Proficy Process Systems with CIMPLICITY, al...
Techniques related with vulnerability CVE-2019-1013
CVE-2019-1013 in Windows. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1204.002 : Malicious File. Has an exploitation technique T1566 : Phishing.
Describe the vulnerability CVE-2020-12652
CVE-2020-12652, State: PUBLISHED, Published: 2020-05-05T04:23:59, Updated: 2024-08-04T12:04:22.748Z, Description: The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a...
Techniques related with vulnerability CVE-2020-15162
CVE-2020-15162 in PrestaShop. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1185 : Man in the Browser.
Techniques related with vulnerability CVE-2010-3338
CVE-2010-3338 in Windows Task Scheduler. Is related with T1608 : Stage Capabilities. Is related with T1053.005 : Scheduled Task.
Techniques related with vulnerability CVE-2013-5065
CVE-2013-5065 in kernel in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2. Is related with T1548.002 : Bypass User Account Control. Is related with T1068 : Exploitation for Privilege Escalation.
Describe the vulnerability CVE-2018-7600
CVE-2018-7600, State: PUBLISHED, Published: 2018-03-29T07:00:00, Updated: 2024-08-05T06:31:04.955Z, Description: Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common mod...
Techniques related with vulnerability CVE-2014-0810
CVE-2014-0810 in Sanshiro. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2020-15100
CVE-2020-15100, State: PUBLISHED, Published: 2020-07-14T19:15:16, Updated: 2024-08-04T13:08:21.992Z, Description: In freewvs before 0.1.1, a user could create a large file that freewvs will try to read, which will terminate a scan process. This has been patched in 0.1.1., CVSS v3.1 - Attack Complexity: LOW, Attack Vect...
Describe the vulnerability CVE-2020-5539
CVE-2020-5539, State: PUBLISHED, Published: 2020-03-02T07:00:24, Updated: 2024-08-04T08:30:24.499Z, Description: GRANDIT Ver.1.6, Ver.2.0, Ver.2.1, Ver.2.2, Ver.2.3, and Ver.3.0 do not properly manage sessions, which allows remote attackers to impersonate an arbitrary user and then alter or disclose the information via...
Describe the vulnerability CVE-2013-3897
CVE-2013-3897, State: PUBLISHED, Published: 2013-10-09T14:44:00, Updated: 2024-08-06T16:22:01.567Z, Description: Use-after-free vulnerability in the CDisplayPointer class in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corr...
Techniques related with vulnerability CVE-2019-3727
CVE-2019-3727 in RecoverPoint. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1068 : Exploitation for Privilege Escalation.
Describe the vulnerability CVE-2018-7520
CVE-2018-7520, State: PUBLISHED, Published: 2018-03-22T18:00:00Z, Updated: 2024-09-17T03:27:26.443Z, Description: An improper access control vulnerability has been identified in Geutebruck G-Cam/EFD-2250 Version 1.12.0.4 and Topline TopFD-2125 Version 3.15.1 IP cameras, which could allow a full configuration download, ...
Techniques related with vulnerability CVE-2019-13533
CVE-2019-13533 in Omron PLC CJ and CS Series. Is related with T0855 : Unauthorized Command Message. Is related with T0842 : Network Sniffing.
Techniques related with vulnerability CVE-2018-8835
CVE-2018-8835 in Advantech WebAccess HMI Designer. Has primary impact with T1574 : Hijack Execution Flow. Has an exploitation technique T1204.002 : Malicious File.
Describe the vulnerability CVE-2020-1569
CVE-2020-1569, State: PUBLISHED, Published: 2020-08-17T19:13:46, Updated: 2024-08-04T06:39:10.640Z, Description: No description available, CVSS v3.1 - Attack Complexity: N/A, Attack Vector: N/A, Availability Impact: N/A, Base Score: 7.8, Base Severity: HIGH, Confidentiality Impact: N/A, Integrity Impact: N/A, Privilege...
Techniques related with vulnerability CVE-2008-2992
CVE-2008-2992 in Adobe Acrobat and Reader. Is related with T1203 : Exploitation for Client Execution.
Techniques related with vulnerability CVE-2012-1854
CVE-2012-1854 in Microsoft Office. Is related with T1574.008 : Path Interception by Search Order Hijacking.
Techniques related with vulnerability CVE-2009-2055
CVE-2009-2055 in Cisco IOS XR 3.4.0 through 3.8.1. Is related with T1499 : Endpoint Denial of Service.
Techniques related with vulnerability CVE-2018-8110
CVE-2018-8110 in Microsoft Edge. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation. Has secondary impact with T1485 : Data Destructio...
Techniques related with vulnerability CVE-2014-5279
CVE-2014-5279 in Docker daemon. Is related with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2016-7256
CVE-2016-7256 in Windows font library. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. Is related with T1134.001 : Token Impersonation/Theft.
Describe the vulnerability CVE-2017-13289
CVE-2017-13289, State: PUBLISHED, Published: 2018-04-04T16:00:00Z, Updated: 2024-09-16T22:45:22.814Z, Description: In writeToParcel and createFromParcel of RttManager.java, there is a permission bypass due to a write size mismatch. This could lead to a local escalation of privileges where the user can start an activity...
Describe the vulnerability CVE-2020-5210
CVE-2020-5210, State: PUBLISHED, Published: 2020-01-28T17:50:14, Updated: 2024-08-04T08:22:08.904Z, Description: In NetHack before 3.6.5, an invalid argument to the -w command line option can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems t...
Techniques related with vulnerability CVE-2018-8174
CVE-2018-8174 in Windows 7. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2018-0802
CVE-2018-0802, State: PUBLISHED, Published: 2018-01-10T01:00:00Z, Updated: 2024-09-16T23:30:27.680Z, Description: Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way objects are handled in memory, ak...
Describe the vulnerability CVE-2019-3758
CVE-2019-3758, State: PUBLISHED, Published: 2019-09-18T22:23:10.217159Z, Updated: 2024-09-16T17:08:48.274Z, Description: RSA Archer, versions prior to 6.6 P2 (6.6.0.2), contain an improper authentication vulnerability. The vulnerability allows sysadmins to create user accounts with insufficient credentials. Unauthentic...
Describe the vulnerability CVE-2018-14781
CVE-2018-14781, State: PUBLISHED, Published: 2018-08-13T22:00:00Z, Updated: 2024-09-17T03:43:42.929Z, Description: Medtronic MMT 508 MiniMed insulin pump, 522 / MMT - 722 Paradigm REAL-TIME, 523 / MMT - 723 Paradigm Revel, 523K / MMT - 723K Paradigm Revel, and 551 / MMT - 751 MiniMed 530G The models identified above, w...
Techniques related with vulnerability CVE-2018-5445
CVE-2018-5445 in Advantech WebAccess/SCADA. Has primary impact with T1005 : Data from Local System.
Techniques related with vulnerability CVE-2019-8540
CVE-2019-8540 in iOS. Is related with T1190 : Exploit Public-Facing Application. Is related with T1499.004 : Application or System Exploitation.
Techniques related with vulnerability CVE-2020-0981
CVE-2020-0981 in Windows 10 Version 1909 for 32-bit Systems. Has primary impact with T1134 : Access Token Manipulation. Has secondary impact with T1068 : Exploitation for Privilege Escalation. Has secondary impact with T1497 : Virtualization/Sandbox Evasion.
Describe MITRE technique T1078.001
MITRE T1078.001 : Default Accounts from enterprise Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Default accounts are those that are built-into an OS, such as the Guest or Administrator accounts on Windows s...
Techniques related with vulnerability CVE-2019-5786
CVE-2019-5786 in Chrome. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1211 : Exploitation for Defense Evasion.
Describe the vulnerability CVE-2019-0859
CVE-2019-0859, State: PUBLISHED, Published: 2019-04-09T20:19:48, Updated: 2024-08-04T17:58:59.594Z, Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from C...
Techniques related with vulnerability CVE-2018-0101
CVE-2018-0101 in Cisco Adaptive Security Appliance. Is related with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2020-11013
CVE-2020-11013 in Helm. Has primary impact with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2012-6685
CVE-2012-6685 in Nokogiri. Is related with T1046 : Network Service Scanning.
Describe the vulnerability CVE-2014-0322
CVE-2014-0322, State: PUBLISHED, Published: 2014-02-14T16:00:00, Updated: 2024-08-06T09:13:10.315Z, Description: Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via vectors involving crafted JavaScript code, CMarkup, and the onpropertychange attribu...
Describe the vulnerability CVE-2018-10636
CVE-2018-10636, State: PUBLISHED, Published: 2018-08-13T22:00:00Z, Updated: 2024-09-16T18:13:08.613Z, Description: CNCSoft Version 1.00.83 and prior with ScreenEditor Version 1.00.54 has multiple stack-based buffer overflow vulnerabilities that could cause the software to crash due to lacking user input validation befo...
Techniques related with vulnerability CVE-2018-15758
CVE-2018-15758 in Spring Security OAuth. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2019-11708
CVE-2019-11708, State: PUBLISHED, Published: 2019-07-23T13:20:03, Updated: 2024-08-04T23:03:32.629Z, Description: Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child...
Techniques related with vulnerability CVE-2014-0295
CVE-2014-0295 in Microsoft .NET Framework 2.0 SP2 and 3.5.1. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059.001 : PowerShell.
Describe MITRE technique T1542.001
MITRE T1542.001 : System Firmware from enterprise Adversaries may modify system firmware to persist on systems.The BIOS (Basic Input/Output System) and The Unified Extensible Firmware Interface (UEFI) or Extensible Firmware Interface (EFI) are examples of system firmware that operate as the software interface between t...
Techniques related with vulnerability CVE-2020-11054
CVE-2020-11054 in qutebrowser. Has primary impact with T1190 : Exploit Public-Facing Application. Has an exploitation technique T1189 : Drive-by Compromise.
Techniques related with vulnerability CVE-2020-3240
CVE-2020-3240 in Cisco UCS Director. Has primary impact with T1005 : Data from Local System. Has primary impact with T1505.003 : Web Shell. Has secondary impact with T1003.008 : /etc/passwd and /etc/shadow. Has secondary impact with T1552.001 : Credentials In Files. Has secondary impact with T1059 : Command and Scripti...
Describe the vulnerability CVE-2020-12653
CVE-2020-12653, State: PUBLISHED, Published: 2020-05-05T04:47:35, Updated: 2024-08-04T12:04:22.557Z, Description: An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service ...
Techniques related with vulnerability CVE-2020-5376
CVE-2020-5376 in CPG BIOS. Has primary impact with T1542.001 : System Firmware.
Techniques related with vulnerability CVE-2011-1249
CVE-2011-1249 in Ancillary Function Driver (afd.sys) in Microsoft Windows. Is related with T1608 : Stage Capabilities.
Describe the vulnerability CVE-2015-1642
CVE-2015-1642, State: PUBLISHED, Published: 2015-08-15T00:00:00, Updated: 2024-08-06T04:47:17.628Z, Description: Microsoft Office 2007 SP3, 2010 SP2, and 2013 SP1 allows remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability.", No CVSS metrics available,...
Describe the vulnerability CVE-2018-10299
CVE-2018-10299, State: PUBLISHED, Published: 2018-04-23T04:00:00, Updated: 2024-08-05T07:39:06.257Z, Description: An integer overflow in the batchTransfer function of a smart contract implementation for Beauty Ecosystem Coin (BEC), the Ethereum ERC20 token used in the Beauty Chain economic system, allows attackers to a...
Techniques related with vulnerability CVE-2020-15233
CVE-2020-15233 in fosite. Has secondary impact with T1036 : Masquerading. Has an exploitation technique T1566.002 : Spearphishing Link.
Describe the vulnerability CVE-2019-3708
CVE-2019-3708, State: PUBLISHED, Published: 2019-04-17T13:32:35.525018Z, Updated: 2024-09-17T00:36:59.730Z, Description: IsilonSD Management Server 1.1.0 contains a cross-site scripting vulnerability while uploading an OVA file. A remote attacker can trick an admin user to potentially exploit this vulnerability to exec...
Describe the vulnerability CVE-2020-0938
CVE-2020-0938, State: PUBLISHED, Published: 2020-04-15T15:12:55, Updated: 2024-08-04T06:18:03.610Z, Description: A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font - Adobe Type 1 PostScript format.For all...
Techniques related with vulnerability CVE-2018-19831
CVE-2018-19831 in ToOwner function from Ethereum ERC20 token. Is related with T0828 : Loss of Productivity and Revenue. Is related with T1565 : Data Manipulation. Is related with T1068 : Exploitation for Privilege Escalation.
Describe the vulnerability CVE-2010-1297
CVE-2010-1297, State: PUBLISHED, Published: 2010-06-08T18:00:00, Updated: 2024-08-07T01:21:18.210Z, Description: Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64; Adobe AIR before 2.0.2.12610; and Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow remote attacke...
Techniques related with vulnerability CVE-2020-5902
CVE-2020-5902 in BIG-IP. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2020-15105
CVE-2020-15105, State: PUBLISHED, Published: 2020-07-10T20:55:13, Updated: 2024-08-04T13:08:21.577Z, Description: Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and pa...
Techniques related with vulnerability CVE-2018-10610
CVE-2018-10610 in LeviStudioU. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has primary impact with T1005 : Data from Local System. Has primary impact with T1557 : Man-in-the-Middle.
Describe the vulnerability CVE-2017-3881
CVE-2017-3881, State: PUBLISHED, Published: 2017-03-17T22:00:00, Updated: 2024-11-15T18:00:24.703Z, Description: A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device o...
Describe the vulnerability CVE-2019-3787
CVE-2019-3787, State: PUBLISHED, Published: 2019-06-19T22:28:07.316424Z, Updated: 2024-09-16T21:57:57.203Z, Description: Cloud Foundry UAA, versions prior to 73.0.0, falls back to appending “unknown.org” to a user's email address when one is not provided and the user name does not contain an @ character. This domain is...
Techniques related with vulnerability CVE-2010-1424
CVE-2010-1424 in JustSystems Ichitaro and Ichitaro Government. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File.
Describe the vulnerability CVE-2016-0165
CVE-2016-0165, State: PUBLISHED, Published: 2016-04-12T23:00:00, Updated: 2024-08-05T22:08:13.324Z, Description: The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows loc...
Describe the vulnerability CVE-2018-14847
CVE-2018-14847, State: PUBLISHED, Published: 2018-08-02T07:00:00, Updated: 2024-08-05T09:38:13.936Z, Description: MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the W...
Describe the vulnerability CVE-2018-10590
CVE-2018-10590, State: PUBLISHED, Published: 2018-05-15T22:00:00Z, Updated: 2024-09-16T22:45:05.267Z, Description: In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NM...