input
stringlengths 30
54
| output
stringlengths 69
4.21k
|
|---|---|
Describe the vulnerability CVE-2014-4123
|
CVE-2014-4123, State: PUBLISHED, Published: 2014-10-15T10:00:00, Updated: 2024-08-06T11:04:28.638Z, Description: Microsoft Internet Explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability," as exploited in the wild in October 2014, a different vulnerability than CVE-2014-4124., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-6993
|
CVE-2020-6993, State: PUBLISHED, Published: 2020-03-24T19:19:09, Updated: 2024-08-04T09:18:02.970Z, Description: In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, an attacker can gain access to sensitive information from the web service without authorization., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe MITRE technique T1608
|
MITRE T1608 : Stage Capabilities from enterprise Adversaries may upload, install, or otherwise set up capabilities that can be used during targeting. To support their operations, an adversary may need to take capabilities they developed ([Develop Capabilities](T1587)) or obtained ([Obtain Capabilities](T1588)) and stage them on infrastructure under their control. These capabilities may be staged on infrastructure that was previously purchased/rented by the adversary ([Acquire Infrastructure](T1583)) or was otherwise compromised by them ([Compromise Infrastructure](T1584)). Capabilities may also be staged on web services, such as GitHub or Pastebin, or on Platform-as-a-Service (PaaS) offerings that enable users to easily provision applications.(Citation: Volexity Ocean Lotus November 2020)(Citation: Dragos Heroku Watering Hole)(Citation: Malwarebytes Heroku Skimmers)(Citation: Netskope GCP Redirection)(Citation: Netskope Cloud Phishing)
Staging of capabilities can aid the adversary in a number of initial access and post-compromise behaviors, including (but not limited to):
* Staging web resources necessary to conduct [Drive-by Compromise](T1189) when a user browses to a site.(Citation: FireEye CFR Watering Hole 2012)(Citation: Gallagher 2015)(Citation: ATT ScanBox)
* Staging web resources for a link target to be used with spearphishing.(Citation: Malwarebytes Silent Librarian October 2020)(Citation: Proofpoint TA407 September 2019)
* Uploading malware or tools to a location accessible to a victim network to enable [Ingress Tool Transfer](T1105).(Citation: Volexity Ocean Lotus November 2020)
* Installing a previously acquired SSL/TLS certificate to use to encrypt command and control traffic (ex: [Asymmetric Cryptography](T1573.002) with [Web Protocols](T1071.001)).(Citation: DigiCert Install SSL Cert)
|
Describe MITRE technique T1202
|
MITRE T1202 : Indirect Command Execution from enterprise Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters. Various Windows utilities may be used to execute commands, possibly without invoking [cmd](S0106). For example, [Forfiles](S0193), the Program Compatibility Assistant (pcalua.exe), components of the Windows Subsystem for Linux (WSL), as well as other utilities may invoke the execution of programs and commands from a [Command and Scripting Interpreter](T1059), Run window, or via scripts. (Citation: VectorSec ForFiles Aug 2017) (Citation: Evi1cg Forfiles Nov 2017)
Adversaries may abuse these features for [Defense Evasion](TA0005), specifically to perform arbitrary execution while subverting detections and/or mitigation controls (such as Group Policy) that limit/prevent the usage of [cmd](S0106) or file extensions more commonly associated with malicious payloads.
|
Techniques related with vulnerability CVE-2009-1807
|
CVE-2009-1807 in Baofeng products 3.09.04.17 and earlier. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
|
Describe the vulnerability CVE-2013-3906
|
CVE-2013-3906, State: PUBLISHED, Published: 2013-11-06T11:00:00, Updated: 2024-08-06T16:22:01.367Z, Description: GDI+ in Microsoft Windows Vista SP2 and Server 2008 SP2; Office 2003 SP3, 2007 SP3, and 2010 SP1 and SP2; Office Compatibility Pack SP3; and Lync 2010, 2010 Attendee, 2013, and Basic 2013 allows remote attackers to execute arbitrary code via a crafted TIFF image, as demonstrated by an image in a Word document, and exploited in the wild in October and November 2013., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2012-0158
|
CVE-2012-0158, State: PUBLISHED, Published: 2012-04-10T21:00:00, Updated: 2024-08-06T18:16:19.081Z, Description: The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX controls in MSCOMCTL.OCX in the Common Controls in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Office 2003 Web Components SP3; SQL Server 2000 SP4, 2005 SP4, and 2008 SP2, SP3, and R2; BizTalk Server 2002 SP1; Commerce Server 2002 SP4, 2007 SP2, and 2009 Gold and R2; Visual FoxPro 8.0 SP1 and 9.0 SP2; and Visual Basic 6.0 Runtime allow remote attackers to execute arbitrary code via a crafted (a) web site, (b) Office document, or (c) .rtf file that triggers "system state" corruption, as exploited in the wild in April 2012, aka "MSCOMCTL.OCX RCE Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-0576
|
CVE-2019-0576, State: PUBLISHED, Published: 2019-01-08T21:00:00, Updated: 2024-08-04T17:51:26.875Z, Description: A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka "Jet Database Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0538, CVE-2019-0575, CVE-2019-0577, CVE-2019-0578, CVE-2019-0579, CVE-2019-0580, CVE-2019-0581, CVE-2019-0582, CVE-2019-0583, CVE-2019-0584., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-7496
|
CVE-2018-7496, State: PUBLISHED, Published: 2018-03-14T18:00:00, Updated: 2024-08-05T06:31:03.761Z, Description: An Information Exposure issue was discovered in OSIsoft PI Vision versions 2017 and prior. The server response header and referrer-policy response header each provide unintended information disclosure., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-10299
|
CVE-2018-10299 in batchTransfer function of a smart contract implementation for Beauty Ecosystem Coin. Is related with T1565.003 : Runtime Data Manipulation.
|
Techniques related with vulnerability CVE-2020-5369
|
CVE-2020-5369 in Isilon OneFS. Has primary impact with T1068 : Exploitation for Privilege Escalation.
|
Techniques related with vulnerability CVE-2013-7246
|
CVE-2013-7246 in DaumGame ActiveX plugin 1.1.0.4 and 1.1.0.5. Is related with T1548 : Abuse Elevation Control Mechanism. Is related with T1211 : Exploitation for Defense Evasion.
|
Describe the vulnerability CVE-2013-3336
|
CVE-2013-3336, State: PUBLISHED, Published: 2013-05-09T10:00:00, Updated: 2024-08-06T16:07:37.553Z, Description: Unspecified vulnerability in Adobe ColdFusion 9.0, 9.0.1, 9.0.2, and 10 allows remote attackers to read arbitrary files via unknown vectors., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-10636
|
CVE-2018-10636 in CNCSoft with ScreenEditor. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has secondary impact with T1068 : Exploitation for Privilege Escalation.
|
Techniques related with vulnerability CVE-2018-10589
|
CVE-2018-10589 in WebAccess. Has primary impact with T1202 : Indirect Command Execution.
|
Techniques related with vulnerability CVE-2020-15132
|
CVE-2020-15132 in sulu. Has primary impact with T1589 : Gather Victim Identity Information.
|
Techniques related with vulnerability CVE-2019-3735
|
CVE-2019-3735 in Dell SupportAssist for Business PCs. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1078 : Valid Accounts.
|
Describe the vulnerability CVE-2020-3460
|
CVE-2020-3460, State: PUBLISHED, Published: 2020-07-31T00:00:16.991185Z, Updated: 2024-11-13T18:18:29.278Z, Description: A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by intercepting a request from a user and injecting malicious data into an HTTP header. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 4.7, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: NONE, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Describe the vulnerability CVE-2020-5231
|
CVE-2020-5231, State: PUBLISHED, Published: 2020-01-30T21:15:16, Updated: 2024-08-04T08:22:08.962Z, Description: In Opencast before 7.6 and 8.1, users with the role ROLE_COURSE_ADMIN can use the user-utils endpoint to create new users not including the role ROLE_ADMIN. ROLE_COURSE_ADMIN is a non-standard role in Opencast which is referenced neither in the documentation nor in any code (except for tests) but only in the security configuration. From the name – implying an admin for a specific course – users would never expect that this role allows user creation. This issue is fixed in 7.6 and 8.1 which both ship a new default security configuration., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 4.8, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: HIGH, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-5300
|
CVE-2020-5300, State: PUBLISHED, Published: 2020-04-06T16:30:14, Updated: 2024-08-04T08:22:09.093Z, Description: In Hydra (an OAuth2 Server and OpenID Certified™ OpenID Connect Provider written in Go), before version 1.4.0+oryOS.17, when using client authentication method 'private_key_jwt' [1], OpenId specification says the following about assertion `jti`: "A unique identifier for the token, which can be used to prevent reuse of the token. These tokens MUST only be used once, unless conditions for reuse were negotiated between the parties". Hydra does not check the uniqueness of this `jti` value. Exploiting this vulnerability is somewhat difficult because: - TLS protects against MITM which makes it difficult to intercept valid tokens for replay attacks - The expiry time of the JWT gives only a short window of opportunity where it could be replayed This has been patched in version v1.4.0+oryOS.17, CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 5.8, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: NONE, Privileges Required: LOW, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-11044
|
CVE-2020-11044 in FreeRDP. Has primary impact with T1499.004 : Application or System Exploitation.
|
Techniques related with vulnerability CVE-2018-7499
|
CVE-2018-7499 in WebAccess. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation.
|
Describe the vulnerability CVE-2016-5062
|
CVE-2016-5062, State: PUBLISHED, Published: 2016-09-29T10:00:00, Updated: 2024-08-06T00:46:40.256Z, Description: The web server in Aternity before 9.0.1 does not require authentication for getMBeansFromURL loading of Java MBeans, which allows remote attackers to execute arbitrary Java code by registering MBeans., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-5451
|
CVE-2018-5451 in Philips Alice 6 System. Has primary impact with T1036 : Masquerading.
|
Techniques related with vulnerability CVE-2013-2471
|
CVE-2013-2471 in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
|
Describe the vulnerability CVE-2020-11897
|
CVE-2020-11897, State: PUBLISHED, Published: 2020-06-17T10:23:22, Updated: 2024-08-04T11:42:00.687Z, Description: The Treck TCP/IP stack before 5.0.1.35 has an Out-of-Bounds Write via multiple malformed IPv6 packets., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-5539
|
CVE-2020-5539 in GRANDIT. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1565.001 : Stored Data Manipulation. Is related with T1005 : Data from Local System.
|
Describe the vulnerability CVE-2019-3727
|
CVE-2019-3727, State: PUBLISHED, Published: 2019-05-15T15:45:11.817065Z, Updated: 2024-09-17T03:42:56.299Z, Description: Dell EMC RecoverPoint versions prior to 5.1.3 and RecoverPoint for VMs versions prior to 5.2.0.2 contain an OS command injection vulnerability in the installation feature of Boxmgmt CLI. A malicious boxmgmt user may potentially be able to execute arbitrary commands as root., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: LOCAL, Availability Impact: HIGH, Base Score: 6.4, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-11067
|
CVE-2018-11067, State: PUBLISHED, Published: 2018-11-26T20:00:00Z, Updated: 2024-09-17T00:11:44.344Z, Description: Dell EMC Avamar Client Manager in Dell EMC Avamar Server versions 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.4.0, 7.4.1, 7.5.0, 7.5.1, 18.1 and Dell EMC Integrated Data Protection Appliance (IDPA) versions 2.0, 2.1 and 2.2 contain an open redirection vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to redirect application users to arbitrary web URLs by tricking the victim users to click on maliciously crafted links. The vulnerability could be used to conduct phishing attacks that cause users to unknowingly visit malicious sites., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2019-13511
|
CVE-2019-13511 in Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1204.001 : Malicious Link.
|
Techniques related with vulnerability CVE-2020-15095
|
CVE-2020-15095 in cli. Has primary impact with T1552 : Unsecured Credentials.
|
Techniques related with vulnerability CVE-2018-14847
|
CVE-2018-14847 in MikroTik RouterOS through 6.42 allows arbitrary access. Is related with T0812 : Default Credentials. Is related with T1078 : Valid Accounts.
|
Describe the vulnerability CVE-2010-3971
|
CVE-2010-3971, State: PUBLISHED, Published: 2010-12-22T20:00:00, Updated: 2024-08-07T03:26:12.333Z, Description: Use-after-free vulnerability in the CSharedStyleSheet::Notify function in the Cascading Style Sheets (CSS) parser in mshtml.dll, as used in Microsoft Internet Explorer 6 through 8 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a self-referential @import rule in a stylesheet, aka "CSS Memory Corruption Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-9459
|
CVE-2020-9459, State: PUBLISHED, Published: 2020-02-28T20:51:53, Updated: 2024-08-04T10:26:16.249Z, Description: Multiple Stored Cross-site scripting (XSS) vulnerabilities in the Webnus Modern Events Calendar Lite plugin through 5.1.6 for WordPress allows remote authenticated users (with minimal permissions) to inject arbitrary JavaScript, HTML, or CSS via Ajax actions. This affects mec_save_notifications and import_settings., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-15758
|
CVE-2018-15758, State: PUBLISHED, Published: 2018-10-18T22:00:00Z, Updated: 2024-09-17T01:16:40.202Z, Description: Spring Security OAuth, versions 2.3 prior to 2.3.4, and 2.2 prior to 2.2.3, and 2.1 prior to 2.1.3, and 2.0 prior to 2.0.16, and older unsupported versions could be susceptible to a privilege escalation under certain conditions. A malicious user or attacker can craft a request to the approval endpoint that can modify the previously saved authorization request and lead to a privilege escalation on the subsequent approval. This scenario can happen if the application is configured to use a custom approval endpoint that declares AuthorizationRequest as a controller method argument. This vulnerability exposes applications that meet all of the following requirements: Act in the role of an Authorization Server (e.g. @EnableAuthorizationServer) and use a custom Approval Endpoint that declares AuthorizationRequest as a controller method argument. This vulnerability does not expose applications that: Act in the role of an Authorization Server and use the default Approval Endpoint, act in the role of a Resource Server only (e.g. @EnableResourceServer), act in the role of a Client only (e.g. @EnableOAuthClient)., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 9.6, Base Severity: CRITICAL, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2010-2862
|
CVE-2010-2862 in Adobe Reader 8.2.3 and 9.3.3, and Acrobat 9.3.3. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution.
|
Describe the vulnerability CVE-2014-0751
|
CVE-2014-0751, State: PUBLISHED, Published: 2014-01-25T22:00:00, Updated: 2024-08-06T09:27:19.517Z, Description: Directory traversal vulnerability in CimWebServer.exe (aka the WebView component) in GE Intelligent Platforms Proficy HMI/SCADA - CIMPLICITY before 8.2 SIM 24, and Proficy Process Systems with CIMPLICITY, allows remote attackers to execute arbitrary code via a crafted message to TCP port 10212, aka ZDI-CAN-1623., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2019-1013
|
CVE-2019-1013 in Windows. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1204.002 : Malicious File. Has an exploitation technique T1566 : Phishing.
|
Describe the vulnerability CVE-2020-12652
|
CVE-2020-12652, State: PUBLISHED, Published: 2020-05-05T04:23:59, Updated: 2024-08-04T12:04:22.748Z, Description: The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a "double fetch" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states "The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.", No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-15162
|
CVE-2020-15162 in PrestaShop. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1185 : Man in the Browser.
|
Techniques related with vulnerability CVE-2010-3338
|
CVE-2010-3338 in Windows Task Scheduler. Is related with T1608 : Stage Capabilities. Is related with T1053.005 : Scheduled Task.
|
Techniques related with vulnerability CVE-2013-5065
|
CVE-2013-5065 in kernel in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2. Is related with T1548.002 : Bypass User Account Control. Is related with T1068 : Exploitation for Privilege Escalation.
|
Describe the vulnerability CVE-2018-7600
|
CVE-2018-7600, State: PUBLISHED, Published: 2018-03-29T07:00:00, Updated: 2024-08-05T06:31:04.955Z, Description: Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2014-0810
|
CVE-2014-0810 in Sanshiro. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution.
|
Describe the vulnerability CVE-2020-15100
|
CVE-2020-15100, State: PUBLISHED, Published: 2020-07-14T19:15:16, Updated: 2024-08-04T13:08:21.992Z, Description: In freewvs before 0.1.1, a user could create a large file that freewvs will try to read, which will terminate a scan process. This has been patched in 0.1.1., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: LOW, Base Score: 2.8, Base Severity: LOW, Confidentiality Impact: NONE, Integrity Impact: NONE, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-5539
|
CVE-2020-5539, State: PUBLISHED, Published: 2020-03-02T07:00:24, Updated: 2024-08-04T08:30:24.499Z, Description: GRANDIT Ver.1.6, Ver.2.0, Ver.2.1, Ver.2.2, Ver.2.3, and Ver.3.0 do not properly manage sessions, which allows remote attackers to impersonate an arbitrary user and then alter or disclose the information via unspecified vectors., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2013-3897
|
CVE-2013-3897, State: PUBLISHED, Published: 2013-10-09T14:44:00, Updated: 2024-08-06T16:22:01.567Z, Description: Use-after-free vulnerability in the CDisplayPointer class in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted JavaScript code that uses the onpropertychange event handler, as exploited in the wild in September and October 2013, aka "Internet Explorer Memory Corruption Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2019-3727
|
CVE-2019-3727 in RecoverPoint. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1068 : Exploitation for Privilege Escalation.
|
Describe the vulnerability CVE-2018-7520
|
CVE-2018-7520, State: PUBLISHED, Published: 2018-03-22T18:00:00Z, Updated: 2024-09-17T03:27:26.443Z, Description: An improper access control vulnerability has been identified in Geutebruck G-Cam/EFD-2250 Version 1.12.0.4 and Topline TopFD-2125 Version 3.15.1 IP cameras, which could allow a full configuration download, including passwords., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2019-13533
|
CVE-2019-13533 in Omron PLC CJ and CS Series. Is related with T0855 : Unauthorized Command Message. Is related with T0842 : Network Sniffing.
|
Techniques related with vulnerability CVE-2018-8835
|
CVE-2018-8835 in Advantech WebAccess HMI Designer. Has primary impact with T1574 : Hijack Execution Flow. Has an exploitation technique T1204.002 : Malicious File.
|
Describe the vulnerability CVE-2020-1569
|
CVE-2020-1569, State: PUBLISHED, Published: 2020-08-17T19:13:46, Updated: 2024-08-04T06:39:10.640Z, Description: No description available, CVSS v3.1 - Attack Complexity: N/A, Attack Vector: N/A, Availability Impact: N/A, Base Score: 7.8, Base Severity: HIGH, Confidentiality Impact: N/A, Integrity Impact: N/A, Privileges Required: N/A, Scope: N/A, User Interaction: N/A, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2008-2992
|
CVE-2008-2992 in Adobe Acrobat and Reader. Is related with T1203 : Exploitation for Client Execution.
|
Techniques related with vulnerability CVE-2012-1854
|
CVE-2012-1854 in Microsoft Office. Is related with T1574.008 : Path Interception by Search Order Hijacking.
|
Techniques related with vulnerability CVE-2009-2055
|
CVE-2009-2055 in Cisco IOS XR 3.4.0 through 3.8.1. Is related with T1499 : Endpoint Denial of Service.
|
Techniques related with vulnerability CVE-2018-8110
|
CVE-2018-8110 in Microsoft Edge. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation. Has secondary impact with T1485 : Data Destruction. Has secondary impact with T1136 : Create Account. Has an exploitation technique T1204.002 : Malicious File. Has an exploitation technique T1566 : Phishing.
|
Techniques related with vulnerability CVE-2014-5279
|
CVE-2014-5279 in Docker daemon. Is related with T1190 : Exploit Public-Facing Application.
|
Techniques related with vulnerability CVE-2016-7256
|
CVE-2016-7256 in Windows font library. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. Is related with T1134.001 : Token Impersonation/Theft.
|
Describe the vulnerability CVE-2017-13289
|
CVE-2017-13289, State: PUBLISHED, Published: 2018-04-04T16:00:00Z, Updated: 2024-09-16T22:45:22.814Z, Description: In writeToParcel and createFromParcel of RttManager.java, there is a permission bypass due to a write size mismatch. This could lead to a local escalation of privileges where the user can start an activity with system privileges, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-70398564., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-5210
|
CVE-2020-5210, State: PUBLISHED, Published: 2020-01-28T17:50:14, Updated: 2024-08-04T08:22:08.904Z, Description: In NetHack before 3.6.5, an invalid argument to the -w command line option can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to influence command line options. Users should upgrade to NetHack 3.6.5., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: LOCAL, Availability Impact: LOW, Base Score: 5, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: LOW, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-8174
|
CVE-2018-8174 in Windows 7. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
|
Describe the vulnerability CVE-2018-0802
|
CVE-2018-0802, State: PUBLISHED, Published: 2018-01-10T01:00:00Z, Updated: 2024-09-16T23:30:27.680Z, Description: Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE is unique from CVE-2018-0797 and CVE-2018-0812., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-3758
|
CVE-2019-3758, State: PUBLISHED, Published: 2019-09-18T22:23:10.217159Z, Updated: 2024-09-16T17:08:48.274Z, Description: RSA Archer, versions prior to 6.6 P2 (6.6.0.2), contain an improper authentication vulnerability. The vulnerability allows sysadmins to create user accounts with insufficient credentials. Unauthenticated attackers could gain unauthorized access to the system using those accounts., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.1, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-14781
|
CVE-2018-14781, State: PUBLISHED, Published: 2018-08-13T22:00:00Z, Updated: 2024-09-17T03:43:42.929Z, Description: Medtronic MMT 508 MiniMed insulin pump, 522 / MMT - 722 Paradigm REAL-TIME, 523 / MMT - 723 Paradigm Revel, 523K / MMT - 723K Paradigm Revel, and 551 / MMT - 751 MiniMed 530G The models identified above, when paired with a remote controller and having the "easy bolus" and "remote bolus" options enabled (non-default), are vulnerable to a capture-replay attack. An attacker can capture the wireless transmissions between the remote controller and the pump and replay them to cause an insulin (bolus) delivery., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-5445
|
CVE-2018-5445 in Advantech WebAccess/SCADA. Has primary impact with T1005 : Data from Local System.
|
Techniques related with vulnerability CVE-2019-8540
|
CVE-2019-8540 in iOS. Is related with T1190 : Exploit Public-Facing Application. Is related with T1499.004 : Application or System Exploitation.
|
Techniques related with vulnerability CVE-2020-0981
|
CVE-2020-0981 in Windows 10 Version 1909 for 32-bit Systems. Has primary impact with T1134 : Access Token Manipulation. Has secondary impact with T1068 : Exploitation for Privilege Escalation. Has secondary impact with T1497 : Virtualization/Sandbox Evasion.
|
Describe MITRE technique T1078.001
|
MITRE T1078.001 : Default Accounts from enterprise Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Default accounts are those that are built-into an OS, such as the Guest or Administrator accounts on Windows systems. Default accounts also include default factory/provider set accounts on other types of systems, software, or devices, including the root user account in AWS and the default service account in Kubernetes.(Citation: Microsoft Local Accounts Feb 2019)(Citation: AWS Root User)(Citation: Threat Matrix for Kubernetes)
Default accounts are not limited to client machines, rather also include accounts that are preset for equipment such as network devices and computer applications whether they are internal, open source, or commercial. Appliances that come preset with a username and password combination pose a serious threat to organizations that do not change it post installation, as they are easy targets for an adversary. Similarly, adversaries may also utilize publicly disclosed or stolen [Private Keys](T1552.004) or credential materials to legitimately connect to remote environments via [Remote Services](T1021).(Citation: Metasploit SSH Module)
|
Techniques related with vulnerability CVE-2019-5786
|
CVE-2019-5786 in Chrome. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1211 : Exploitation for Defense Evasion.
|
Describe the vulnerability CVE-2019-0859
|
CVE-2019-0859, State: PUBLISHED, Published: 2019-04-09T20:19:48, Updated: 2024-08-04T17:58:59.594Z, Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0685, CVE-2019-0803., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-0101
|
CVE-2018-0101 in Cisco Adaptive Security Appliance. Is related with T1190 : Exploit Public-Facing Application.
|
Techniques related with vulnerability CVE-2020-11013
|
CVE-2020-11013 in Helm. Has primary impact with T1190 : Exploit Public-Facing Application.
|
Techniques related with vulnerability CVE-2012-6685
|
CVE-2012-6685 in Nokogiri. Is related with T1046 : Network Service Scanning.
|
Describe the vulnerability CVE-2014-0322
|
CVE-2014-0322, State: PUBLISHED, Published: 2014-02-14T16:00:00, Updated: 2024-08-06T09:13:10.315Z, Description: Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via vectors involving crafted JavaScript code, CMarkup, and the onpropertychange attribute of a script element, as exploited in the wild in January and February 2014., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-10636
|
CVE-2018-10636, State: PUBLISHED, Published: 2018-08-13T22:00:00Z, Updated: 2024-09-16T18:13:08.613Z, Description: CNCSoft Version 1.00.83 and prior with ScreenEditor Version 1.00.54 has multiple stack-based buffer overflow vulnerabilities that could cause the software to crash due to lacking user input validation before copying data from project files onto the stack. Which may allow an attacker to gain remote code execution with administrator privileges if exploited., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-15758
|
CVE-2018-15758 in Spring Security OAuth. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1190 : Exploit Public-Facing Application.
|
Describe the vulnerability CVE-2019-11708
|
CVE-2019-11708, State: PUBLISHED, Published: 2019-07-23T13:20:03, Updated: 2024-08-04T23:03:32.629Z, Description: Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. This vulnerability affects Firefox ESR < 60.7.2, Firefox < 67.0.4, and Thunderbird < 60.7.2., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2014-0295
|
CVE-2014-0295 in Microsoft .NET Framework 2.0 SP2 and 3.5.1. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059.001 : PowerShell.
|
Describe MITRE technique T1542.001
|
MITRE T1542.001 : System Firmware from enterprise Adversaries may modify system firmware to persist on systems.The BIOS (Basic Input/Output System) and The Unified Extensible Firmware Interface (UEFI) or Extensible Firmware Interface (EFI) are examples of system firmware that operate as the software interface between the operating system and hardware of a computer.(Citation: Wikipedia BIOS)(Citation: Wikipedia UEFI)(Citation: About UEFI)
System firmware like BIOS and (U)EFI underly the functionality of a computer and may be modified by an adversary to perform or assist in malicious activity. Capabilities exist to overwrite the system firmware, which may give sophisticated adversaries a means to install malicious firmware updates as a means of persistence on a system that may be difficult to detect.
|
Techniques related with vulnerability CVE-2020-11054
|
CVE-2020-11054 in qutebrowser. Has primary impact with T1190 : Exploit Public-Facing Application. Has an exploitation technique T1189 : Drive-by Compromise.
|
Techniques related with vulnerability CVE-2020-3240
|
CVE-2020-3240 in Cisco UCS Director. Has primary impact with T1005 : Data from Local System. Has primary impact with T1505.003 : Web Shell. Has secondary impact with T1003.008 : /etc/passwd and /etc/shadow. Has secondary impact with T1552.001 : Credentials In Files. Has secondary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1133 : External Remote Services.
|
Describe the vulnerability CVE-2020-12653
|
CVE-2020-12653, State: PUBLISHED, Published: 2020-05-05T04:47:35, Updated: 2024-08-04T12:04:22.557Z, Description: An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-5376
|
CVE-2020-5376 in CPG BIOS. Has primary impact with T1542.001 : System Firmware.
|
Techniques related with vulnerability CVE-2011-1249
|
CVE-2011-1249 in Ancillary Function Driver (afd.sys) in Microsoft Windows. Is related with T1608 : Stage Capabilities.
|
Describe the vulnerability CVE-2015-1642
|
CVE-2015-1642, State: PUBLISHED, Published: 2015-08-15T00:00:00, Updated: 2024-08-06T04:47:17.628Z, Description: Microsoft Office 2007 SP3, 2010 SP2, and 2013 SP1 allows remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-10299
|
CVE-2018-10299, State: PUBLISHED, Published: 2018-04-23T04:00:00, Updated: 2024-08-05T07:39:06.257Z, Description: An integer overflow in the batchTransfer function of a smart contract implementation for Beauty Ecosystem Coin (BEC), the Ethereum ERC20 token used in the Beauty Chain economic system, allows attackers to accomplish an unauthorized increase of digital assets by providing two _receivers arguments in conjunction with a large _value argument, as exploited in the wild in April 2018, aka the "batchOverflow" issue., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-15233
|
CVE-2020-15233 in fosite. Has secondary impact with T1036 : Masquerading. Has an exploitation technique T1566.002 : Spearphishing Link.
|
Describe the vulnerability CVE-2019-3708
|
CVE-2019-3708, State: PUBLISHED, Published: 2019-04-17T13:32:35.525018Z, Updated: 2024-09-17T00:36:59.730Z, Description: IsilonSD Management Server 1.1.0 contains a cross-site scripting vulnerability while uploading an OVA file. A remote attacker can trick an admin user to potentially exploit this vulnerability to execute malicious HTML or JavaScript code in the context of the admin user., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.3, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-0938
|
CVE-2020-0938, State: PUBLISHED, Published: 2020-04-15T15:12:55, Updated: 2024-08-04T06:18:03.610Z, Description: A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font - Adobe Type 1 PostScript format.For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely, aka 'Adobe Font Manager Library Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1020., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-19831
|
CVE-2018-19831 in ToOwner function from Ethereum ERC20 token. Is related with T0828 : Loss of Productivity and Revenue. Is related with T1565 : Data Manipulation. Is related with T1068 : Exploitation for Privilege Escalation.
|
Describe the vulnerability CVE-2010-1297
|
CVE-2010-1297, State: PUBLISHED, Published: 2010-06-08T18:00:00, Updated: 2024-08-07T01:21:18.210Z, Description: Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64; Adobe AIR before 2.0.2.12610; and Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted SWF content, related to authplay.dll and the ActionScript Virtual Machine 2 (AVM2) newfunction instruction, as exploited in the wild in June 2010., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-5902
|
CVE-2020-5902 in BIG-IP. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
|
Describe the vulnerability CVE-2020-15105
|
CVE-2020-15105, State: PUBLISHED, Published: 2020-07-10T20:55:13, Updated: 2024-08-04T13:08:21.577Z, Description: Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authentication code. This means that the password is stored in clear text in the session for an arbitrary amount of time, and potentially forever if the user begins the login process by entering their username and password and then leaves before entering their two-factor authentication code. The severity of this issue depends on which type of session storage you have configured: in the worst case, if you're using Django's default database session storage, then users' passwords are stored in clear text in your database. In the best case, if you're using Django's signed cookie session, then users' passwords are only stored in clear text within their browser's cookie store. In the common case of using Django's cache session store, the users' passwords are stored in clear text in whatever cache storage you have configured (typically Memcached or Redis). This has been fixed in 1.12. After upgrading, users should be sure to delete any clear text passwords that have been stored. For example, if you're using the database session backend, you'll likely want to delete any session record from the database and purge that data from any database backups or replicas. In addition, affected organizations who have suffered a database breach while using an affected version should inform their users that their clear text passwords have been compromised. All organizations should encourage users whose passwords were insecurely stored to change these passwords on any sites where they were used. As a workaround, wwitching Django's session storage to use signed cookies instead of the database or cache lessens the impact of this issue, but should not be done without a thorough understanding of the security tradeoffs of using signed cookies rather than a server-side session storage. There is no way to fully mitigate the issue without upgrading., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 5.4, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: LOW, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-10610
|
CVE-2018-10610 in LeviStudioU. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has primary impact with T1005 : Data from Local System. Has primary impact with T1557 : Man-in-the-Middle.
|
Describe the vulnerability CVE-2017-3881
|
CVE-2017-3881, State: PUBLISHED, Published: 2017-03-17T22:00:00, Updated: 2024-11-15T18:00:24.703Z, Description: A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-3787
|
CVE-2019-3787, State: PUBLISHED, Published: 2019-06-19T22:28:07.316424Z, Updated: 2024-09-16T21:57:57.203Z, Description: Cloud Foundry UAA, versions prior to 73.0.0, falls back to appending “unknown.org” to a user's email address when one is not provided and the user name does not contain an @ character. This domain is held by a private company, which leads to attack vectors including password recovery emails sent to a potentially fraudulent address. This would allow the attacker to gain complete control of the user's account., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.3, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2010-1424
|
CVE-2010-1424 in JustSystems Ichitaro and Ichitaro Government. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File.
|
Describe the vulnerability CVE-2016-0165
|
CVE-2016-0165, State: PUBLISHED, Published: 2016-04-12T23:00:00, Updated: 2024-08-05T22:08:13.324Z, Description: The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0143 and CVE-2016-0167., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-14847
|
CVE-2018-14847, State: PUBLISHED, Published: 2018-08-02T07:00:00, Updated: 2024-08-05T09:38:13.936Z, Description: MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-10590
|
CVE-2018-10590, State: PUBLISHED, Published: 2018-05-15T22:00:00Z, Updated: 2024-09-16T22:45:05.267Z, Description: In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, an information exposure vulnerability through directory listing has been identified, which may allow an attacker to find important files that are not normally visible., No CVSS metrics available, Exploit Info: No exploit information available
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.