input stringlengths 30 54 | output stringlengths 69 4.21k |
|---|---|
Describe the vulnerability CVE-2019-1817 | CVE-2019-1817, State: PUBLISHED, Published: 2019-05-03T16:30:23.214365Z, Updated: 2024-11-19T19:08:01.759Z, Description: A vulnerability in the web proxy functionality of Cisco AsyncOS Software for Cisco Web Security Appliance could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition ... |
Describe the vulnerability CVE-2020-13126 | CVE-2020-13126, State: PUBLISHED, Published: 2020-05-17T00:38:37, Updated: 2024-08-04T12:11:19.166Z, Description: An issue was discovered in the Elementor Pro plugin before 2.9.4 for WordPress, as exploited in the wild in May 2020 in conjunction with CVE-2020-13125. An attacker with the Subscriber role can upload arbit... |
Describe the vulnerability CVE-2009-0238 | CVE-2009-0238, State: PUBLISHED, Published: 2009-02-25T16:00:00, Updated: 2024-08-07T04:24:18.463Z, Description: Microsoft Office Excel 2000 SP3, 2002 SP3, 2003 SP3, and 2007 SP1; Excel Viewer 2003 Gold and SP3; Excel Viewer; Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1; and Excel in Microso... |
Describe the vulnerability CVE-2019-13510 | CVE-2019-13510, State: PUBLISHED, Published: 2019-08-15T18:15:24, Updated: 2024-08-04T23:57:39.494Z, Description: Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier contain a USE AFTER FREE CWE-416. A maliciously crafted Arena file opened by an unsuspecting user may result in the application cr... |
Describe the vulnerability CVE-2018-9862 | CVE-2018-9862, State: PUBLISHED, Published: 2018-04-09T16:00:00, Updated: 2024-08-05T07:24:56.341Z, Description: util.c in runV 1.0.0 for Docker mishandles a numeric username, which allows attackers to obtain root access by leveraging the presence of an initial numeric value on an /etc/passwd line, and then issuing a "... |
Techniques related with vulnerability CVE-2018-13379 | CVE-2018-13379 in Fortinet FortiOS, FortiProxy. Is related with T1212 : Exploitation for Credential Access. |
Describe the vulnerability CVE-2020-1025 | CVE-2020-1025, State: PUBLISHED, Published: 2020-07-14T22:53:56, Updated: 2024-08-04T06:24:59.514Z, Description: No description available, No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2019-1035 | CVE-2019-1035, State: PUBLISHED, Published: 2019-06-12T13:49:40, Updated: 2024-08-04T18:06:31.735Z, Description: A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique fro... |
Describe the vulnerability CVE-2016-6367 | CVE-2016-6367, State: PUBLISHED, Published: 2016-08-18T18:00:00, Updated: 2024-11-15T18:02:12.143Z, Description: Cisco Adaptive Security Appliance (ASA) Software before 8.4(1) on ASA 5500, ASA 5500-X, PIX, and FWSM devices allows local users to gain privileges via invalid CLI commands, aka Bug ID CSCtu74257 or EPICBANA... |
Techniques related with vulnerability CVE-2020-1025 | CVE-2020-1025 in Skype for Business Server 2019 CU2. Has primary impact with T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2018-0101 | CVE-2018-0101, State: PUBLISHED, Published: 2018-01-29T20:00:00, Updated: 2024-08-05T03:14:16.591Z, Description: A vulnerability in the Secure Sockets Layer (SSL) VPN functionality of the Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause a reload of the affected s... |
Describe the vulnerability CVE-2019-1794 | CVE-2019-1794, State: PUBLISHED, Published: 2019-04-18T00:35:18.813610Z, Updated: 2024-09-16T16:23:48.538Z, Description: A vulnerability in the search path processing of Cisco Directory Connector could allow an authenticated, local attacker to load a binary of their choosing. The vulnerability is due to uncontrolled se... |
Techniques related with vulnerability CVE-2018-15797 | CVE-2018-15797 in NFS Volume Release. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1552 : Unsecured Credentials. |
Techniques related with vulnerability CVE-2017-15919 | CVE-2017-15919 in The ultimate-form-builder-lite plugin before 1.3.7 for WordPress. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise. |
Describe the vulnerability CVE-2018-0560 | CVE-2018-0560, State: PUBLISHED, Published: 2018-04-16T13:00:00, Updated: 2024-08-05T03:28:11.121Z, Description: Hatena Bookmark App for iOS Version 3.0 to 3.70 allows remote attackers to spoof the address bar via vectors related to URL display., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2020-5254 | CVE-2020-5254 in NetHack. Has primary impact with T1574 : Hijack Execution Flow. Has an exploitation technique T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2018-8111 | CVE-2018-8111 in Microsoft Edge. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation. Has secondary impact with T1485 : Data Destructio... |
Describe the vulnerability CVE-2019-3784 | CVE-2019-3784, State: PUBLISHED, Published: 2019-03-07T19:00:00Z, Updated: 2024-09-16T18:56:08.918Z, Description: Cloud Foundry Stratos, versions prior to 2.3.0, contains an insecure session that can be spoofed. When deployed on cloud foundry with multiple instances using the default embedded SQLite database, a remote ... |
Describe the vulnerability CVE-2018-8160 | CVE-2018-8160, State: PUBLISHED, Published: 2018-05-09T19:00:00, Updated: 2024-08-05T06:46:13.512Z, Description: An information disclosure vulnerability exists in Outlook when a message is opened, aka "Microsoft Outlook Information Disclosure Vulnerability." This affects Word, Microsoft Office., No CVSS metrics availab... |
Techniques related with vulnerability CVE-2017-10910 | CVE-2017-10910 in MQTT.js. Is related with T1499.004 : Application or System Exploitation. |
Describe MITRE technique T1059.007 | MITRE T1059.007 : JavaScript from enterprise Adversaries may abuse various implementations of JavaScript for execution. JavaScript (JS) is a platform-independent scripting language (compiled just-in-time at runtime) commonly associated with scripts in webpages, though JS can be executed in runtime environments outside ... |
Describe the vulnerability CVE-2013-1493 | CVE-2013-1493, State: PUBLISHED, Published: 2013-03-04T16:00:00, Updated: 2024-08-06T15:04:48.820Z, Description: The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary cod... |
Describe the vulnerability CVE-2020-7004 | CVE-2020-7004, State: PUBLISHED, Published: 2020-04-03T17:44:24, Updated: 2024-08-04T09:18:02.819Z, Description: VISAM VBASE Editor version 11.5.0.2 and VBASE Web-Remote Module may allow weak or insecure permissions on the VBASE directory resulting in elevation of privileges or malicious effects on the system the next ... |
Describe the vulnerability CVE-2018-15784 | CVE-2018-15784, State: PUBLISHED, Published: 2019-01-18T22:00:00Z, Updated: 2024-09-16T22:51:06.674Z, Description: Dell Networking OS10 versions prior to 10.4.3.0 contain a vulnerability in the Phone Home feature which does not properly validate the server's certificate authority during TLS handshake. Use of an invalid... |
Describe the vulnerability CVE-2014-5279 | CVE-2014-5279, State: PUBLISHED, Published: 2018-02-06T16:00:00, Updated: 2024-08-06T11:41:47.762Z, Description: The Docker daemon managed by boot2docker 1.2 and earlier improperly enables unauthenticated TCP connections by default, which makes it easier for remote attackers to gain privileges or execute arbitrary code... |
Techniques related with vulnerability CVE-2020-3133 | CVE-2020-3133 in Cisco Email Security Appliance (ESA). Has primary impact with T1190 : Exploit Public-Facing Application. Has an exploitation technique T1566.001 : Spearphishing Attachment. |
Describe the vulnerability CVE-2019-12258 | CVE-2019-12258, State: PUBLISHED, Published: 2019-08-09T20:00:44, Updated: 2024-08-04T23:17:38.957Z, Description: Wind River VxWorks 6.6 through vx7 has Session Fixation in the TCP component. This is a IPNET security vulnerability: DoS of TCP connection via malformed TCP options., No CVSS metrics available, Exploit Inf... |
Techniques related with vulnerability CVE-2020-3137 | CVE-2020-3137 in Cisco Email Security Appliance (ESA). Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link. |
Describe the vulnerability CVE-2014-4077 | CVE-2014-4077, State: PUBLISHED, Published: 2014-11-11T22:00:00, Updated: 2024-08-06T11:04:28.398Z, Description: Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, and Office 2007 SP3, when IMJPDCT.EXE (aka IME for Japanese) is installed, allow remote attackers to b... |
Techniques related with vulnerability CVE-2014-6120 | CVE-2014-6120 in IBM Rational AppScan Source. Is related with T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2014-0307 | CVE-2014-0307, State: PUBLISHED, Published: 2014-03-12T01:00:00, Updated: 2024-08-06T09:13:10.215Z, Description: Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a certain sequence of manipulations of a T... |
Techniques related with vulnerability CVE-2019-3396 | CVE-2019-3396 in Confluence Server. Is related with T1203 : Exploitation for Client Execution. Is related with T1190 : Exploit Public-Facing Application. Is related with T1083 : File and Directory Discovery. |
Describe the vulnerability CVE-2019-11707 | CVE-2019-11707, State: PUBLISHED, Published: 2019-07-23T13:20:17, Updated: 2024-08-04T23:03:32.447Z, Description: A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this f... |
Describe MITRE technique T1055.001 | MITRE T1055.001 : Dynamic-link Library Injection from enterprise Adversaries may inject dynamic-link libraries (DLLs) into processes in order to evade process-based defenses as well as possibly elevate privileges. DLL injection is a method of executing arbitrary code in the address space of a separate live process.
... |
Describe the vulnerability CVE-2020-15147 | CVE-2020-15147, State: PUBLISHED, Published: 2020-08-21T17:15:16, Updated: 2024-08-04T13:08:21.944Z, Description: Red Discord Bot before versions 3.3.12 and 3.4 has a Remote Code Execution vulnerability in the Streams module. This exploit allows Discord users with specifically crafted "going live" messages to inject co... |
Techniques related with vulnerability CVE-2015-1539 | CVE-2015-1539 in Android before 5.1.1. Is related with T1190 : Exploit Public-Facing Application. Is related with T1548 : Abuse Elevation Control Mechanism. |
Techniques related with vulnerability CVE-2017-8759 | CVE-2017-8759 in Microsoft .NET Framework. Is related with T1566 : Phishing. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2009-3041 | CVE-2009-3041, State: PUBLISHED, Published: 2009-09-01T18:04:00, Updated: 2024-08-07T06:14:56.453Z, Description: SPIP 1.9 before 1.9.2i and 2.0.x through 2.0.8 does not use proper access control for (1) ecrire/exec/install.php and (2) ecrire/index.php, which allows remote attackers to conduct unauthorized activities re... |
Describe the vulnerability CVE-2018-19830 | CVE-2018-19830, State: PUBLISHED, Published: 2019-12-31T15:06:32, Updated: 2024-08-05T11:44:20.602Z, Description: The UBSexToken() function of a smart contract implementation for Business Alliance Financial Circle (BAFC), an tradable Ethereum ERC20 token, allows attackers to change the owner of the contract, because th... |
Techniques related with vulnerability CVE-2018-16179 | CVE-2018-16179 in Mizuho Direct App for Android. Is related with T1557 : Man-in-the-Middle. Is related with T1211 : Exploitation for Defense Evasion. |
Describe the vulnerability CVE-2015-8562 | CVE-2015-8562, State: PUBLISHED, Published: 2015-12-16T21:00:00, Updated: 2024-08-06T08:20:43.177Z, Description: Joomla! 1.5.x, 2.x, and 3.x before 3.4.6 allow remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the HTTP User-Agent header, as exploited in the wild in December 201... |
Describe the vulnerability CVE-2020-6820 | CVE-2020-6820, State: PUBLISHED, Published: 2020-04-24T15:56:04, Updated: 2024-08-04T09:11:05.035Z, Description: Under certain conditions, when handling a ReadableStream, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Thunderbird <... |
Describe the vulnerability CVE-2020-15183 | CVE-2020-15183, State: PUBLISHED, Published: 2020-09-17T20:10:13, Updated: 2024-08-04T13:08:22.471Z, Description: SoyCMS 3.0.2 and earlier is affected by Reflected Cross-Site Scripting (XSS) which leads to Remote Code Execution (RCE) from a known vulnerability. This allows remote attackers to force the administrator to... |
Describe the vulnerability CVE-2020-5332 | CVE-2020-5332, State: PUBLISHED, Published: 2020-05-04T18:50:19.554043Z, Updated: 2024-09-16T22:41:16.968Z, Description: RSA Archer, versions prior to 6.7 P3 (6.7.0.3), contain a command injection vulnerability. AN authenticated malicious user with administrator privileges could potentially exploit this vulnerability t... |
Techniques related with vulnerability CVE-2019-1863 | CVE-2019-1863 in Cisco Unified Computing System E-Series Software (UCSE). Has primary impact with T1068 : Exploitation for Privilege Escalation. Has secondary impact with T1565.001 : Stored Data Manipulation. Has an exploitation technique T1190 : Exploit Public-Facing Application. Has an exploitation technique T1078 : ... |
Techniques related with vulnerability CVE-2013-6129 | CVE-2013-6129 in vBulletin 4.1 and 5. Is related with T1136 : Create Account. Is related with T1087 : Account Discovery. Is related with T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2019-13720 | CVE-2019-13720 in Chrome. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2020-5378 | CVE-2020-5378 in CPG BIOS. Has primary impact with T1542.001 : System Firmware. |
Describe the vulnerability CVE-2020-11039 | CVE-2020-11039, State: PUBLISHED, Published: 2020-05-29T00:00:00, Updated: 2024-08-04T11:21:14.426Z, Description: In FreeRDP less than or equal to 2.0.0, when using a manipulated server with USB redirection enabled (nearly) arbitrary memory can be read and written due to integer overflows in length checks. This has bee... |
Techniques related with vulnerability CVE-2020-10817 | CVE-2020-10817 in custom-searchable-data-entry-system plugin through 1.7.1 for WordPress. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1211 : Exploitation for Defense Evasion. |
Techniques related with vulnerability CVE-2018-15869 | CVE-2018-15869 in Amazon Web Service. Is related with T1036 : Masquerading. Is related with T1525 : Implant Internal Image. |
Describe the vulnerability CVE-2018-19010 | CVE-2018-19010, State: PUBLISHED, Published: 2019-01-28T22:00:00Z, Updated: 2024-09-16T17:32:40.689Z, Description: Drager Infinity Delta, Infinity Delta, all versions, Delta XL, all versions, Kappa, all version, and Infinity Explorer C700, all versions. A malformed network packet may cause the monitor to reboot. By rep... |
Techniques related with vulnerability CVE-2019-9978 | CVE-2019-9978 in WordPress. Is related with T1055 : Process Injection. Is related with T1189 : Drive-by Compromise. |
Techniques related with vulnerability CVE-2010-2743 | CVE-2010-2743 in win32k.sys in the kernel-mode drivers in Microsoft Windows. Is related with T1068 : Exploitation for Privilege Escalation. |
Describe the vulnerability CVE-2020-1111 | CVE-2020-1111, State: PUBLISHED, Published: 2020-05-21T22:53:11, Updated: 2024-08-04T06:25:00.991Z, Description: An elevation of privilege vulnerability exists when Windows improperly handles calls to Clipboard Service, aka 'Windows Clipboard Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE... |
Techniques related with vulnerability CVE-2019-3723 | CVE-2019-3723 in OpenManage Server Administrator. Has primary impact with T1485 : Data Destruction. Has secondary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1574 : Hijack Execution Flow. Has an exploitation technique T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2014-5334 | CVE-2014-5334, State: PUBLISHED, Published: 2018-01-08T19:00:00, Updated: 2024-08-06T11:41:48.599Z, Description: FreeNAS before 9.3-M3 has a blank admin password, which allows remote attackers to gain root privileges by leveraging a WebGui login., No CVSS metrics available, Exploit Info: No exploit information availabl... |
Techniques related with vulnerability CVE-2020-11738 | CVE-2020-11738 in Snap Creek Duplicator plugin before 1.3.28 for WordPress. Is related with T1190 : Exploit Public-Facing Application. Is related with T1055 : Process Injection. |
Techniques related with vulnerability CVE-2020-16874 | CVE-2020-16874 in Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6). Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation... |
Techniques related with vulnerability CVE-2019-12258 | CVE-2019-12258 in Wind River VxWorks 6.6 through vx7. Is related with T1563 : Remote Service Session Hijacking. |
Techniques related with vulnerability CVE-2018-8440 | CVE-2018-8440 in Windows 7. Is related with T1608 : Stage Capabilities. |
Describe the vulnerability CVE-2020-0688 | CVE-2020-0688, State: PUBLISHED, Published: 2020-02-11T21:22:59, Updated: 2024-08-04T06:11:05.469Z, Description: A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka 'Microsoft Exchange Memory Corruption Vulnerability'., No CVSS me... |
Techniques related with vulnerability CVE-2019-1031 | CVE-2019-1031 in Microsoft SharePoint Foundation. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation. Has secondary impact with T1485 : Data Destruction. Has secondary impact with T1478 : Instal... |
Techniques related with vulnerability CVE-2017-8570 | CVE-2017-8570 in Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, and Microsoft Office 2016.. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2014-1812 | CVE-2014-1812, State: PUBLISHED, Published: 2014-05-14T10:00:00, Updated: 2024-08-06T09:50:11.202Z, Description: The Group Policy implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not properly handle distrib... |
Techniques related with vulnerability CVE-2020-11035 | CVE-2020-11035 in GLPI. Has primary impact with T1078 : Valid Accounts. Has primary impact with T1557 : Man-in-the-Middle. Has primary impact with T1040 : Network Sniffing. Has an exploitation technique T1110 : Brute Force. |
Describe the vulnerability CVE-2015-2424 | CVE-2015-2424, State: PUBLISHED, Published: 2015-07-14T21:00:00, Updated: 2024-08-06T05:17:26.128Z, Description: Microsoft PowerPoint 2007 SP3, Word 2007 SP3, PowerPoint 2010 SP2, Word 2010 SP2, PowerPoint 2013 SP1, Word 2013 SP1, and PowerPoint 2013 RT SP1 allow remote attackers to execute arbitrary code or cause a de... |
Describe MITRE technique T1550.001 | MITRE T1550.001 : Application Access Token from enterprise Adversaries may use stolen application access tokens to bypass the typical authentication process and access restricted accounts, information, or services on remote systems. These tokens are typically stolen from users or services and used in lieu of login cred... |
Describe the vulnerability CVE-2019-11510 | CVE-2019-11510, State: PUBLISHED, Published: 2019-05-08T16:18:28, Updated: 2024-08-04T22:55:40.694Z, Description: In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an unauthenticated remote attacker can send a specially crafted URI to perform an arbitrary file r... |
Describe the vulnerability CVE-2013-5065 | CVE-2013-5065, State: PUBLISHED, Published: 2013-11-27T23:00:00, Updated: 2024-08-06T16:59:41.346Z, Description: NDProxy.sys in the kernel in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in November 2013., No CVSS metrics ... |
Describe the vulnerability CVE-2020-15137 | CVE-2020-15137, State: PUBLISHED, Published: 2020-08-12T16:15:13, Updated: 2024-08-04T13:08:21.951Z, Description: All versions of HoRNDIS are affected by an integer overflow in the RNDIS packet parsing routines. A malicious USB device can trigger disclosure of unrelated kernel memory to userspace applications on the ho... |
Describe the vulnerability CVE-2020-3121 | CVE-2020-3121, State: PUBLISHED, Published: 2020-01-26T04:31:22.955259Z, Updated: 2024-11-15T17:45:38.991Z, Description: A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack... |
Techniques related with vulnerability CVE-2013-5576 | CVE-2013-5576 in Joomla! 2.5.x before 2.5.14 and 3.x before 3.1.5. Is related with T1505.003 : Web Shell. Is related with T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2019-3798 | CVE-2019-3798, State: PUBLISHED, Published: 2019-04-17T13:32:35.609682Z, Updated: 2024-09-17T04:09:11.026Z, Description: Cloud Foundry Cloud Controller API Release, versions prior to 1.79.0, contains improper authentication when validating user permissions. A remote authenticated malicious user with the ability to crea... |
Describe the vulnerability CVE-2019-5786 | CVE-2019-5786, State: PUBLISHED, Published: 2019-06-27T16:13:43, Updated: 2024-08-04T20:01:52.243Z, Description: Object lifetime issue in Blink in Google Chrome prior to 72.0.3626.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page., No CVSS metrics available, Exploi... |
Techniques related with vulnerability CVE-2020-3134 | CVE-2020-3134 in Cisco Email Security Appliance (ESA). Has primary impact with T1489 : Service Stop. |
Describe the vulnerability CVE-2020-3237 | CVE-2020-3237, State: PUBLISHED, Published: 2020-06-03T17:55:59.024823Z, Updated: 2024-11-15T17:11:36.744Z, Description: A vulnerability in the Cisco Application Framework component of the Cisco IOx application environment could allow an authenticated, local attacker to overwrite arbitrary files in the virtual instance... |
Techniques related with vulnerability CVE-2018-10657 | CVE-2018-10657 in Matrix Synapse before 0.28.1. Is related with T1574.001 : DLL Search Order Hijacking. |
Describe the vulnerability CVE-2019-1863 | CVE-2019-1863, State: PUBLISHED, Published: 2019-08-21T18:15:28.776867Z, Updated: 2024-09-17T02:31:57.790Z, Description: A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an authenticated, remote attacker to make unauthorized changes to the system... |
Describe the vulnerability CVE-2019-1611 | CVE-2019-1611, State: PUBLISHED, Published: 2019-03-11T22:00:00Z, Updated: 2024-09-17T01:11:59.122Z, Description: A vulnerability in the CLI of Cisco NX-OS Software and Cisco FXOS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device... |
Describe the vulnerability CVE-2019-13538 | CVE-2019-13538, State: PUBLISHED, Published: 2019-09-17T19:04:54, Updated: 2024-08-04T23:57:39.147Z, Description: 3S-Smart Software Solutions GmbH CODESYS V3 Library Manager, all versions prior to 3.5.16.0, allows the system to display active library content without checking its validity, which may allow the contents o... |
Describe the vulnerability CVE-2009-2055 | CVE-2009-2055, State: PUBLISHED, Published: 2009-08-19T17:00:00Z, Updated: 2024-11-15T18:03:07.837Z, Description: Cisco IOS XR 3.4.0 through 3.8.1 allows remote attackers to cause a denial of service (session reset) via a BGP UPDATE message with an invalid attribute, as demonstrated in the wild on 17 August 2009., No C... |
Techniques related with vulnerability CVE-2011-3056 | CVE-2011-3056 in Google Chrome before 17.0.963.83. Is related with T1185 : Man in the Browser. |
Techniques related with vulnerability CVE-2014-6332 | CVE-2014-6332 in OleAut32.dll in OLE in Microsoft Windows. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise. |
Describe the vulnerability CVE-2020-5241 | CVE-2020-5241, State: PUBLISHED, Published: 2020-02-12T23:40:11, Updated: 2024-08-04T08:22:09.024Z, Description: matestack-ui-core (RubyGem) before 0.7.4 is vulnerable to XSS/Script injection. This vulnerability is patched in version 0.7.4., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impa... |
Techniques related with vulnerability CVE-2018-17877 | CVE-2018-17877 in lottery smart contract implementation for Greedy 599. Is related with T0828 : Loss of Productivity and Revenue. Is related with T1565 : Data Manipulation. |
Techniques related with vulnerability CVE-2020-15211 | CVE-2020-15211 in tensorflow. Has primary impact with T1574 : Hijack Execution Flow. Has an exploitation technique T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2020-15208 | CVE-2020-15208, State: PUBLISHED, Published: 2020-09-25T18:45:40, Updated: 2024-08-04T13:08:22.832Z, Description: In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, when determining the common dimension size of two tensors, TFLite uses a `DCHECK` which is no-op outside of debug compilation modes.... |
Describe the vulnerability CVE-2018-14679 | CVE-2018-14679, State: PUBLISHED, Published: 2018-07-28T23:00:00, Updated: 2024-08-05T09:38:13.452Z, Description: An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the CHM PMGI/PMGL chunk number validity checks, which could lead to denial of service (uninitialized da... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.