input
stringlengths 30
54
| output
stringlengths 69
4.21k
|
|---|---|
Describe the vulnerability CVE-2019-1817
|
CVE-2019-1817, State: PUBLISHED, Published: 2019-05-03T16:30:23.214365Z, Updated: 2024-11-19T19:08:01.759Z, Description: A vulnerability in the web proxy functionality of Cisco AsyncOS Software for Cisco Web Security Appliance could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of HTTP and HTTPS requests. An attacker could exploit this vulnerability by sending a malformed HTTP or HTTPS request to an affected device. An exploit could allow the attacker to cause a restart of the web proxy process, resulting in a temporary DoS condition., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.6, Base Severity: HIGH, Confidentiality Impact: NONE, Integrity Impact: NONE, Privileges Required: NONE, Scope: CHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Describe the vulnerability CVE-2020-13126
|
CVE-2020-13126, State: PUBLISHED, Published: 2020-05-17T00:38:37, Updated: 2024-08-04T12:11:19.166Z, Description: An issue was discovered in the Elementor Pro plugin before 2.9.4 for WordPress, as exploited in the wild in May 2020 in conjunction with CVE-2020-13125. An attacker with the Subscriber role can upload arbitrary executable files to achieve remote code execution. NOTE: the free Elementor plugin is unaffected., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 9.9, Base Severity: CRITICAL, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2009-0238
|
CVE-2009-0238, State: PUBLISHED, Published: 2009-02-25T16:00:00, Updated: 2024-08-07T04:24:18.463Z, Description: Microsoft Office Excel 2000 SP3, 2002 SP3, 2003 SP3, and 2007 SP1; Excel Viewer 2003 Gold and SP3; Excel Viewer; Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1; and Excel in Microsoft Office 2004 and 2008 for Mac allow remote attackers to execute arbitrary code via a crafted Excel document that triggers an access attempt on an invalid object, as exploited in the wild in February 2009 by Trojan.Mdropper.AC., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-13510
|
CVE-2019-13510, State: PUBLISHED, Published: 2019-08-15T18:15:24, Updated: 2024-08-04T23:57:39.494Z, Description: Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier contain a USE AFTER FREE CWE-416. A maliciously crafted Arena file opened by an unsuspecting user may result in the application crashing or the execution of arbitrary code., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-9862
|
CVE-2018-9862, State: PUBLISHED, Published: 2018-04-09T16:00:00, Updated: 2024-08-05T07:24:56.341Z, Description: util.c in runV 1.0.0 for Docker mishandles a numeric username, which allows attackers to obtain root access by leveraging the presence of an initial numeric value on an /etc/passwd line, and then issuing a "docker exec" command with that value in the -u argument, a similar issue to CVE-2016-3697., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-13379
|
CVE-2018-13379 in Fortinet FortiOS, FortiProxy. Is related with T1212 : Exploitation for Credential Access.
|
Describe the vulnerability CVE-2020-1025
|
CVE-2020-1025, State: PUBLISHED, Published: 2020-07-14T22:53:56, Updated: 2024-08-04T06:24:59.514Z, Description: No description available, No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-1035
|
CVE-2019-1035, State: PUBLISHED, Published: 2019-06-12T13:49:40, Updated: 2024-08-04T18:06:31.735Z, Description: A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1034., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2016-6367
|
CVE-2016-6367, State: PUBLISHED, Published: 2016-08-18T18:00:00, Updated: 2024-11-15T18:02:12.143Z, Description: Cisco Adaptive Security Appliance (ASA) Software before 8.4(1) on ASA 5500, ASA 5500-X, PIX, and FWSM devices allows local users to gain privileges via invalid CLI commands, aka Bug ID CSCtu74257 or EPICBANANA., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-1025
|
CVE-2020-1025 in Skype for Business Server 2019 CU2. Has primary impact with T1190 : Exploit Public-Facing Application.
|
Describe the vulnerability CVE-2018-0101
|
CVE-2018-0101, State: PUBLISHED, Published: 2018-01-29T20:00:00, Updated: 2024-08-05T03:14:16.591Z, Description: A vulnerability in the Secure Sockets Layer (SSL) VPN functionality of the Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code. The vulnerability is due to an attempt to double free a region of memory when the webvpn feature is enabled on the Cisco ASA device. An attacker could exploit this vulnerability by sending multiple, crafted XML packets to a webvpn-configured interface on the affected system. An exploit could allow the attacker to execute arbitrary code and obtain full control of the system, or cause a reload of the affected device. This vulnerability affects Cisco ASA Software that is running on the following Cisco products: 3000 Series Industrial Security Appliance (ISA), ASA 5500 Series Adaptive Security Appliances, ASA 5500-X Series Next-Generation Firewalls, ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, ASA 1000V Cloud Firewall, Adaptive Security Virtual Appliance (ASAv), Firepower 2100 Series Security Appliance, Firepower 4110 Security Appliance, Firepower 9300 ASA Security Module, Firepower Threat Defense Software (FTD). Cisco Bug IDs: CSCvg35618., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-1794
|
CVE-2019-1794, State: PUBLISHED, Published: 2019-04-18T00:35:18.813610Z, Updated: 2024-09-16T16:23:48.538Z, Description: A vulnerability in the search path processing of Cisco Directory Connector could allow an authenticated, local attacker to load a binary of their choosing. The vulnerability is due to uncontrolled search path elements. An attacker could exploit this vulnerability by placing a binary of their choosing earlier in the search path utilized by Cisco Directory Connector to locate and load required resources., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: NONE, Base Score: 5.1, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Techniques related with vulnerability CVE-2018-15797
|
CVE-2018-15797 in NFS Volume Release. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1552 : Unsecured Credentials.
|
Techniques related with vulnerability CVE-2017-15919
|
CVE-2017-15919 in The ultimate-form-builder-lite plugin before 1.3.7 for WordPress. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise.
|
Describe the vulnerability CVE-2018-0560
|
CVE-2018-0560, State: PUBLISHED, Published: 2018-04-16T13:00:00, Updated: 2024-08-05T03:28:11.121Z, Description: Hatena Bookmark App for iOS Version 3.0 to 3.70 allows remote attackers to spoof the address bar via vectors related to URL display., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-5254
|
CVE-2020-5254 in NetHack. Has primary impact with T1574 : Hijack Execution Flow. Has an exploitation technique T1190 : Exploit Public-Facing Application.
|
Techniques related with vulnerability CVE-2018-8111
|
CVE-2018-8111 in Microsoft Edge. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation. Has secondary impact with T1485 : Data Destruction. Has secondary impact with T1136 : Create Account. Has an exploitation technique T1204.002 : Malicious File. Has an exploitation technique T1566 : Phishing.
|
Describe the vulnerability CVE-2019-3784
|
CVE-2019-3784, State: PUBLISHED, Published: 2019-03-07T19:00:00Z, Updated: 2024-09-16T18:56:08.918Z, Description: Cloud Foundry Stratos, versions prior to 2.3.0, contains an insecure session that can be spoofed. When deployed on cloud foundry with multiple instances using the default embedded SQLite database, a remote authenticated malicious user can switch sessions to another user with the same session id., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 8.2, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-8160
|
CVE-2018-8160, State: PUBLISHED, Published: 2018-05-09T19:00:00, Updated: 2024-08-05T06:46:13.512Z, Description: An information disclosure vulnerability exists in Outlook when a message is opened, aka "Microsoft Outlook Information Disclosure Vulnerability." This affects Word, Microsoft Office., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2017-10910
|
CVE-2017-10910 in MQTT.js. Is related with T1499.004 : Application or System Exploitation.
|
Describe MITRE technique T1059.007
|
MITRE T1059.007 : JavaScript from enterprise Adversaries may abuse various implementations of JavaScript for execution. JavaScript (JS) is a platform-independent scripting language (compiled just-in-time at runtime) commonly associated with scripts in webpages, though JS can be executed in runtime environments outside the browser.(Citation: NodeJS)
JScript is the Microsoft implementation of the same scripting standard. JScript is interpreted via the Windows Script engine and thus integrated with many components of Windows such as the [Component Object Model](T1559.001) and Internet Explorer HTML Application (HTA) pages.(Citation: JScrip May 2018)(Citation: Microsoft JScript 2007)(Citation: Microsoft Windows Scripts)
JavaScript for Automation (JXA) is a macOS scripting language based on JavaScript, included as part of Apple’s Open Scripting Architecture (OSA), that was introduced in OSX 10.10. Apple’s OSA provides scripting capabilities to control applications, interface with the operating system, and bridge access into the rest of Apple’s internal APIs. As of OSX 10.10, OSA only supports two languages, JXA and [AppleScript](T1059.002). Scripts can be executed via the command line utility `osascript`, they can be compiled into applications or script files via `osacompile`, and they can be compiled and executed in memory of other programs by leveraging the OSAKit Framework.(Citation: Apple About Mac Scripting 2016)(Citation: SpecterOps JXA 2020)(Citation: SentinelOne macOS Red Team)(Citation: Red Canary Silver Sparrow Feb2021)(Citation: MDSec macOS JXA and VSCode)
Adversaries may abuse various implementations of JavaScript to execute various behaviors. Common uses include hosting malicious scripts on websites as part of a [Drive-by Compromise](T1189) or downloading and executing these script files as secondary payloads. Since these payloads are text-based, it is also very common for adversaries to obfuscate their content as part of [Obfuscated Files or Information](T1027).
|
Describe the vulnerability CVE-2013-1493
|
CVE-2013-1493, State: PUBLISHED, Published: 2013-03-04T16:00:00, Updated: 2024-08-06T15:04:48.820Z, Description: The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (crash) via an image with crafted raster parameters, which triggers (1) an out-of-bounds read or (2) memory corruption in the JVM, as exploited in the wild in February 2013., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-7004
|
CVE-2020-7004, State: PUBLISHED, Published: 2020-04-03T17:44:24, Updated: 2024-08-04T09:18:02.819Z, Description: VISAM VBASE Editor version 11.5.0.2 and VBASE Web-Remote Module may allow weak or insecure permissions on the VBASE directory resulting in elevation of privileges or malicious effects on the system the next time a privileged user runs the application., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-15784
|
CVE-2018-15784, State: PUBLISHED, Published: 2019-01-18T22:00:00Z, Updated: 2024-09-16T22:51:06.674Z, Description: Dell Networking OS10 versions prior to 10.4.3.0 contain a vulnerability in the Phone Home feature which does not properly validate the server's certificate authority during TLS handshake. Use of an invalid or malicious certificate could potentially allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 7.4, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2014-5279
|
CVE-2014-5279, State: PUBLISHED, Published: 2018-02-06T16:00:00, Updated: 2024-08-06T11:41:47.762Z, Description: The Docker daemon managed by boot2docker 1.2 and earlier improperly enables unauthenticated TCP connections by default, which makes it easier for remote attackers to gain privileges or execute arbitrary code from children containers., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-3133
|
CVE-2020-3133 in Cisco Email Security Appliance (ESA). Has primary impact with T1190 : Exploit Public-Facing Application. Has an exploitation technique T1566.001 : Spearphishing Attachment.
|
Describe the vulnerability CVE-2019-12258
|
CVE-2019-12258, State: PUBLISHED, Published: 2019-08-09T20:00:44, Updated: 2024-08-04T23:17:38.957Z, Description: Wind River VxWorks 6.6 through vx7 has Session Fixation in the TCP component. This is a IPNET security vulnerability: DoS of TCP connection via malformed TCP options., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-3137
|
CVE-2020-3137 in Cisco Email Security Appliance (ESA). Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link.
|
Describe the vulnerability CVE-2014-4077
|
CVE-2014-4077, State: PUBLISHED, Published: 2014-11-11T22:00:00, Updated: 2024-08-06T11:04:28.398Z, Description: Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, and Office 2007 SP3, when IMJPDCT.EXE (aka IME for Japanese) is installed, allow remote attackers to bypass a sandbox protection mechanism via a crafted PDF document, aka "Microsoft IME (Japanese) Elevation of Privilege Vulnerability," as exploited in the wild in 2014., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2014-6120
|
CVE-2014-6120 in IBM Rational AppScan Source. Is related with T1190 : Exploit Public-Facing Application.
|
Describe the vulnerability CVE-2014-0307
|
CVE-2014-0307, State: PUBLISHED, Published: 2014-03-12T01:00:00, Updated: 2024-08-06T09:13:10.215Z, Description: Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a certain sequence of manipulations of a TextRange element, aka "Internet Explorer Memory Corruption Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2019-3396
|
CVE-2019-3396 in Confluence Server. Is related with T1203 : Exploitation for Client Execution. Is related with T1190 : Exploit Public-Facing Application. Is related with T1083 : File and Directory Discovery.
|
Describe the vulnerability CVE-2019-11707
|
CVE-2019-11707, State: PUBLISHED, Published: 2019-07-23T13:20:17, Updated: 2024-08-04T23:03:32.447Z, Description: A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR < 60.7.1, Firefox < 67.0.3, and Thunderbird < 60.7.2., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe MITRE technique T1055.001
|
MITRE T1055.001 : Dynamic-link Library Injection from enterprise Adversaries may inject dynamic-link libraries (DLLs) into processes in order to evade process-based defenses as well as possibly elevate privileges. DLL injection is a method of executing arbitrary code in the address space of a separate live process.
DLL injection is commonly performed by writing the path to a DLL in the virtual address space of the target process before loading the DLL by invoking a new thread. The write can be performed with native Windows API calls such as `VirtualAllocEx` and `WriteProcessMemory`, then invoked with `CreateRemoteThread` (which calls the `LoadLibrary` API responsible for loading the DLL). (Citation: Elastic Process Injection July 2017)
Variations of this method such as reflective DLL injection (writing a self-mapping DLL into a process) and memory module (map DLL when writing into process) overcome the address relocation issue as well as the additional APIs to invoke execution (since these methods load and execute the files in memory by manually preforming the function of `LoadLibrary`).(Citation: Elastic HuntingNMemory June 2017)(Citation: Elastic Process Injection July 2017)
Another variation of this method, often referred to as Module Stomping/Overloading or DLL Hollowing, may be leveraged to conceal injected code within a process. This method involves loading a legitimate DLL into a remote process then manually overwriting the module's `AddressOfEntryPoint` before starting a new thread in the target process.(Citation: Module Stomping for Shellcode Injection) This variation allows attackers to hide malicious injected code by potentially backing its execution with a legitimate DLL file on disk.(Citation: Hiding Malicious Code with Module Stomping)
Running code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via DLL injection may also evade detection from security products since the execution is masked under a legitimate process.
|
Describe the vulnerability CVE-2020-15147
|
CVE-2020-15147, State: PUBLISHED, Published: 2020-08-21T17:15:16, Updated: 2024-08-04T13:08:21.944Z, Description: Red Discord Bot before versions 3.3.12 and 3.4 has a Remote Code Execution vulnerability in the Streams module. This exploit allows Discord users with specifically crafted "going live" messages to inject code into the Streams module's going live message. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information. As a workaround, unloading the Trivia module with `unload streams` can render this exploit not accessible. It is highly recommended updating to 3.3.12 or 3.4 to completely patch this issue., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.5, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2015-1539
|
CVE-2015-1539 in Android before 5.1.1. Is related with T1190 : Exploit Public-Facing Application. Is related with T1548 : Abuse Elevation Control Mechanism.
|
Techniques related with vulnerability CVE-2017-8759
|
CVE-2017-8759 in Microsoft .NET Framework. Is related with T1566 : Phishing. Is related with T1203 : Exploitation for Client Execution.
|
Describe the vulnerability CVE-2009-3041
|
CVE-2009-3041, State: PUBLISHED, Published: 2009-09-01T18:04:00, Updated: 2024-08-07T06:14:56.453Z, Description: SPIP 1.9 before 1.9.2i and 2.0.x through 2.0.8 does not use proper access control for (1) ecrire/exec/install.php and (2) ecrire/index.php, which allows remote attackers to conduct unauthorized activities related to installation and backups, as exploited in the wild in August 2009., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-19830
|
CVE-2018-19830, State: PUBLISHED, Published: 2019-12-31T15:06:32, Updated: 2024-08-05T11:44:20.602Z, Description: The UBSexToken() function of a smart contract implementation for Business Alliance Financial Circle (BAFC), an tradable Ethereum ERC20 token, allows attackers to change the owner of the contract, because the function is public (by default) and does not check the caller's identity., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-16179
|
CVE-2018-16179 in Mizuho Direct App for Android. Is related with T1557 : Man-in-the-Middle. Is related with T1211 : Exploitation for Defense Evasion.
|
Describe the vulnerability CVE-2015-8562
|
CVE-2015-8562, State: PUBLISHED, Published: 2015-12-16T21:00:00, Updated: 2024-08-06T08:20:43.177Z, Description: Joomla! 1.5.x, 2.x, and 3.x before 3.4.6 allow remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the HTTP User-Agent header, as exploited in the wild in December 2015., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-6820
|
CVE-2020-6820, State: PUBLISHED, Published: 2020-04-24T15:56:04, Updated: 2024-08-04T09:11:05.035Z, Description: Under certain conditions, when handling a ReadableStream, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Thunderbird < 68.7.0, Firefox < 74.0.1, and Firefox ESR < 68.6.1., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-15183
|
CVE-2020-15183, State: PUBLISHED, Published: 2020-09-17T20:10:13, Updated: 2024-08-04T13:08:22.471Z, Description: SoyCMS 3.0.2 and earlier is affected by Reflected Cross-Site Scripting (XSS) which leads to Remote Code Execution (RCE) from a known vulnerability. This allows remote attackers to force the administrator to edit files once the adminsitrator loads a specially crafted webpage., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.4, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-5332
|
CVE-2020-5332, State: PUBLISHED, Published: 2020-05-04T18:50:19.554043Z, Updated: 2024-09-16T22:41:16.968Z, Description: RSA Archer, versions prior to 6.7 P3 (6.7.0.3), contain a command injection vulnerability. AN authenticated malicious user with administrator privileges could potentially exploit this vulnerability to execute arbitrary commands on the system where the vulnerable application is deployed., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 7.2, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2019-1863
|
CVE-2019-1863 in Cisco Unified Computing System E-Series Software (UCSE). Has primary impact with T1068 : Exploitation for Privilege Escalation. Has secondary impact with T1565.001 : Stored Data Manipulation. Has an exploitation technique T1190 : Exploit Public-Facing Application. Has an exploitation technique T1078 : Valid Accounts.
|
Techniques related with vulnerability CVE-2013-6129
|
CVE-2013-6129 in vBulletin 4.1 and 5. Is related with T1136 : Create Account. Is related with T1087 : Account Discovery. Is related with T1190 : Exploit Public-Facing Application.
|
Techniques related with vulnerability CVE-2019-13720
|
CVE-2019-13720 in Chrome. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
|
Techniques related with vulnerability CVE-2020-5378
|
CVE-2020-5378 in CPG BIOS. Has primary impact with T1542.001 : System Firmware.
|
Describe the vulnerability CVE-2020-11039
|
CVE-2020-11039, State: PUBLISHED, Published: 2020-05-29T00:00:00, Updated: 2024-08-04T11:21:14.426Z, Description: In FreeRDP less than or equal to 2.0.0, when using a manipulated server with USB redirection enabled (nearly) arbitrary memory can be read and written due to integer overflows in length checks. This has been patched in 2.1.0., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 8, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-10817
|
CVE-2020-10817 in custom-searchable-data-entry-system plugin through 1.7.1 for WordPress. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1211 : Exploitation for Defense Evasion.
|
Techniques related with vulnerability CVE-2018-15869
|
CVE-2018-15869 in Amazon Web Service. Is related with T1036 : Masquerading. Is related with T1525 : Implant Internal Image.
|
Describe the vulnerability CVE-2018-19010
|
CVE-2018-19010, State: PUBLISHED, Published: 2019-01-28T22:00:00Z, Updated: 2024-09-16T17:32:40.689Z, Description: Drager Infinity Delta, Infinity Delta, all versions, Delta XL, all versions, Kappa, all version, and Infinity Explorer C700, all versions. A malformed network packet may cause the monitor to reboot. By repeatedly sending the malformed network packet, an attacker may be able to disrupt patient monitoring by causing the monitor to repeatedly reboot until it falls back to default configuration and loses network connectivity., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2019-9978
|
CVE-2019-9978 in WordPress. Is related with T1055 : Process Injection. Is related with T1189 : Drive-by Compromise.
|
Techniques related with vulnerability CVE-2010-2743
|
CVE-2010-2743 in win32k.sys in the kernel-mode drivers in Microsoft Windows. Is related with T1068 : Exploitation for Privilege Escalation.
|
Describe the vulnerability CVE-2020-1111
|
CVE-2020-1111, State: PUBLISHED, Published: 2020-05-21T22:53:11, Updated: 2024-08-04T06:25:00.991Z, Description: An elevation of privilege vulnerability exists when Windows improperly handles calls to Clipboard Service, aka 'Windows Clipboard Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1121, CVE-2020-1165, CVE-2020-1166., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2019-3723
|
CVE-2019-3723 in OpenManage Server Administrator. Has primary impact with T1485 : Data Destruction. Has secondary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1574 : Hijack Execution Flow. Has an exploitation technique T1190 : Exploit Public-Facing Application.
|
Describe the vulnerability CVE-2014-5334
|
CVE-2014-5334, State: PUBLISHED, Published: 2018-01-08T19:00:00, Updated: 2024-08-06T11:41:48.599Z, Description: FreeNAS before 9.3-M3 has a blank admin password, which allows remote attackers to gain root privileges by leveraging a WebGui login., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-11738
|
CVE-2020-11738 in Snap Creek Duplicator plugin before 1.3.28 for WordPress. Is related with T1190 : Exploit Public-Facing Application. Is related with T1055 : Process Injection.
|
Techniques related with vulnerability CVE-2020-16874
|
CVE-2020-16874 in Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6). Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation. Has secondary impact with T1485 : Data Destruction. Has secondary impact with T1136 : Create Account. Has an exploitation technique T1204.002 : Malicious File.
|
Techniques related with vulnerability CVE-2019-12258
|
CVE-2019-12258 in Wind River VxWorks 6.6 through vx7. Is related with T1563 : Remote Service Session Hijacking.
|
Techniques related with vulnerability CVE-2018-8440
|
CVE-2018-8440 in Windows 7. Is related with T1608 : Stage Capabilities.
|
Describe the vulnerability CVE-2020-0688
|
CVE-2020-0688, State: PUBLISHED, Published: 2020-02-11T21:22:59, Updated: 2024-08-04T06:11:05.469Z, Description: A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka 'Microsoft Exchange Memory Corruption Vulnerability'., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2019-1031
|
CVE-2019-1031 in Microsoft SharePoint Foundation. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation. Has secondary impact with T1485 : Data Destruction. Has secondary impact with T1478 : Install Insecure or Malicious Configuration. Has secondary impact with T1036 : Masquerading.
|
Techniques related with vulnerability CVE-2017-8570
|
CVE-2017-8570 in Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, and Microsoft Office 2016.. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution.
|
Describe the vulnerability CVE-2014-1812
|
CVE-2014-1812, State: PUBLISHED, Published: 2014-05-14T10:00:00, Updated: 2024-08-06T09:50:11.202Z, Description: The Group Policy implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not properly handle distribution of passwords, which allows remote authenticated users to obtain sensitive credential information and consequently gain privileges by leveraging access to the SYSVOL share, as exploited in the wild in May 2014, aka "Group Policy Preferences Password Elevation of Privilege Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-11035
|
CVE-2020-11035 in GLPI. Has primary impact with T1078 : Valid Accounts. Has primary impact with T1557 : Man-in-the-Middle. Has primary impact with T1040 : Network Sniffing. Has an exploitation technique T1110 : Brute Force.
|
Describe the vulnerability CVE-2015-2424
|
CVE-2015-2424, State: PUBLISHED, Published: 2015-07-14T21:00:00, Updated: 2024-08-06T05:17:26.128Z, Description: Microsoft PowerPoint 2007 SP3, Word 2007 SP3, PowerPoint 2010 SP2, Word 2010 SP2, PowerPoint 2013 SP1, Word 2013 SP1, and PowerPoint 2013 RT SP1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Describe MITRE technique T1550.001
|
MITRE T1550.001 : Application Access Token from enterprise Adversaries may use stolen application access tokens to bypass the typical authentication process and access restricted accounts, information, or services on remote systems. These tokens are typically stolen from users or services and used in lieu of login credentials.
Application access tokens are used to make authorized API requests on behalf of a user or service and are commonly used to access resources in cloud, container-based applications, and software-as-a-service (SaaS).(Citation: Auth0 - Why You Should Always Use Access Tokens to Secure APIs Sept 2019)
OAuth is one commonly implemented framework that issues tokens to users for access to systems. These frameworks are used collaboratively to verify the user and determine what actions the user is allowed to perform. Once identity is established, the token allows actions to be authorized, without passing the actual credentials of the user. Therefore, compromise of the token can grant the adversary access to resources of other sites through a malicious application.(Citation: okta)
For example, with a cloud-based email service, once an OAuth access token is granted to a malicious application, it can potentially gain long-term access to features of the user account if a "refresh" token enabling background access is awarded.(Citation: Microsoft Identity Platform Access 2019) With an OAuth access token an adversary can use the user-granted REST API to perform functions such as email searching and contact enumeration.(Citation: Staaldraad Phishing with OAuth 2017)
Compromised access tokens may be used as an initial step in compromising other services. For example, if a token grants access to a victim’s primary email, the adversary may be able to extend access to all other services which the target subscribes by triggering forgotten password routines. In AWS and GCP environments, adversaries can trigger a request for a short-lived access token with the privileges of another user account.(Citation: Google Cloud Service Account Credentials)(Citation: AWS Temporary Security Credentials) The adversary can then use this token to request data or perform actions the original account could not. If permissions for this feature are misconfigured – for example, by allowing all users to request a token for a particular account - an adversary may be able to gain initial access to a Cloud Account or escalate their privileges.(Citation: Rhino Security Labs Enumerating AWS Roles)
Direct API access through a token negates the effectiveness of a second authentication factor and may be immune to intuitive countermeasures like changing passwords. For example, in AWS environments, an adversary who compromises a user’s AWS API credentials may be able to use the `sts:GetFederationToken` API call to create a federated user session, which will have the same permissions as the original user but may persist even if the original user credentials are deactivated.(Citation: Crowdstrike AWS User Federation Persistence) Additionally, access abuse over an API channel can be difficult to detect even from the service provider end, as the access can still align well with a legitimate workflow.
|
Describe the vulnerability CVE-2019-11510
|
CVE-2019-11510, State: PUBLISHED, Published: 2019-05-08T16:18:28, Updated: 2024-08-04T22:55:40.694Z, Description: In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an unauthenticated remote attacker can send a specially crafted URI to perform an arbitrary file reading vulnerability ., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 9.9, Base Severity: CRITICAL, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2013-5065
|
CVE-2013-5065, State: PUBLISHED, Published: 2013-11-27T23:00:00, Updated: 2024-08-06T16:59:41.346Z, Description: NDProxy.sys in the kernel in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in November 2013., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-15137
|
CVE-2020-15137, State: PUBLISHED, Published: 2020-08-12T16:15:13, Updated: 2024-08-04T13:08:21.951Z, Description: All versions of HoRNDIS are affected by an integer overflow in the RNDIS packet parsing routines. A malicious USB device can trigger disclosure of unrelated kernel memory to userspace applications on the host, or can cause the kernel to crash. Kernel memory disclosure is especially likely on 32-bit kernels; 64-bit kernels are more likely to crash on attempted exploitation. It is not believed that kernel memory corruption is possible, or that unattended kernel memory disclosure without the collaboration of a userspace program running on the host is possible. The vulnerability is in `HoRNDIS::receivePacket`. `msg_len`, `data_ofs`, and `data_len` can be controlled by an attached USB device, and a negative value of `data_ofs` can bypass the check for `(data_ofs + data_len + 8) > msg_len`, and subsequently can cause a wild pointer copy in the `mbuf_copyback` call. The software is not maintained and no patches are planned. Users of multi-tenant systems with HoRNDIS installed should only connect trusted USB devices to their system., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: PHYSICAL, Availability Impact: HIGH, Base Score: 5.5, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: NONE, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-3121
|
CVE-2020-3121, State: PUBLISHED, Published: 2020-01-26T04:31:22.955259Z, Updated: 2024-11-15T17:45:38.991Z, Description: A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link and access a specific page. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 6.1, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: NONE, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Techniques related with vulnerability CVE-2013-5576
|
CVE-2013-5576 in Joomla! 2.5.x before 2.5.14 and 3.x before 3.1.5. Is related with T1505.003 : Web Shell. Is related with T1190 : Exploit Public-Facing Application.
|
Describe the vulnerability CVE-2019-3798
|
CVE-2019-3798, State: PUBLISHED, Published: 2019-04-17T13:32:35.609682Z, Updated: 2024-09-17T04:09:11.026Z, Description: Cloud Foundry Cloud Controller API Release, versions prior to 1.79.0, contains improper authentication when validating user permissions. A remote authenticated malicious user with the ability to create UAA clients and knowledge of the email of a victim in the foundation may escalate their privileges to that of the victim by creating a client with a name equal to the guid of their victim., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 6, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-5786
|
CVE-2019-5786, State: PUBLISHED, Published: 2019-06-27T16:13:43, Updated: 2024-08-04T20:01:52.243Z, Description: Object lifetime issue in Blink in Google Chrome prior to 72.0.3626.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-3134
|
CVE-2020-3134 in Cisco Email Security Appliance (ESA). Has primary impact with T1489 : Service Stop.
|
Describe the vulnerability CVE-2020-3237
|
CVE-2020-3237, State: PUBLISHED, Published: 2020-06-03T17:55:59.024823Z, Updated: 2024-11-15T17:11:36.744Z, Description: A vulnerability in the Cisco Application Framework component of the Cisco IOx application environment could allow an authenticated, local attacker to overwrite arbitrary files in the virtual instance that is running on the affected device. The vulnerability is due to insufficient path restriction enforcement. An attacker could exploit this vulnerability by including a crafted file in an application package. An exploit could allow the attacker to overwrite files., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: LOW, Base Score: 6.3, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Techniques related with vulnerability CVE-2018-10657
|
CVE-2018-10657 in Matrix Synapse before 0.28.1. Is related with T1574.001 : DLL Search Order Hijacking.
|
Describe the vulnerability CVE-2019-1863
|
CVE-2019-1863, State: PUBLISHED, Published: 2019-08-21T18:15:28.776867Z, Updated: 2024-09-17T02:31:57.790Z, Description: A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an authenticated, remote attacker to make unauthorized changes to the system configuration. The vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected software. A successful exploit could allow a user with read-only privileges to change critical system configurations using administrator privileges., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 6.5, Base Severity: MEDIUM, Confidentiality Impact: NONE, Integrity Impact: HIGH, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Describe the vulnerability CVE-2019-1611
|
CVE-2019-1611, State: PUBLISHED, Published: 2019-03-11T22:00:00Z, Updated: 2024-09-17T01:11:59.122Z, Description: A vulnerability in the CLI of Cisco NX-OS Software and Cisco FXOS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability. Firepower 4100 Series Next-Generation Firewalls are affected running software versions prior to 2.2.2.91, 2.3.1.110, and 2.4.1.222. Firepower 9300 Security Appliance are affected running software versions prior to 2.2.2.91, 2.3.1.110, and 2.4.1.222. MDS 9000 Series Multilayer Switches are affected running software versions prior to 6.2(25) and 8.3(1). Nexus 3000 Series Switches are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(5). Nexus 3500 Platform Switches are affected running software versions prior to 7.0(3)I7(5). Nexus 3600 Platform Switches are affected running software versions prior to 7.0(3)F3(5). Nexus 2000, 5500, 5600, and 6000 Series Switches are affected running software versions prior to 7.1(5)N1(1b) and 7.3(4)N1(1). Nexus 7000 and 7700 Series Switches are affected running software versions prior to 6.2(22), 7.3(3)D1(1), 8.2(3). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(5). Nexus 9500 R-Series Line Cards and Fabric Modules are affected running software versions prior to 7.0(3)F3(5)., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: LOW, Base Score: 4.2, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Describe the vulnerability CVE-2019-13538
|
CVE-2019-13538, State: PUBLISHED, Published: 2019-09-17T19:04:54, Updated: 2024-08-04T23:57:39.147Z, Description: 3S-Smart Software Solutions GmbH CODESYS V3 Library Manager, all versions prior to 3.5.16.0, allows the system to display active library content without checking its validity, which may allow the contents of manipulated libraries to be displayed or executed. The issue also exists for source libraries, but 3S-Smart Software Solutions GmbH strongly recommends distributing compiled libraries only., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2009-2055
|
CVE-2009-2055, State: PUBLISHED, Published: 2009-08-19T17:00:00Z, Updated: 2024-11-15T18:03:07.837Z, Description: Cisco IOS XR 3.4.0 through 3.8.1 allows remote attackers to cause a denial of service (session reset) via a BGP UPDATE message with an invalid attribute, as demonstrated in the wild on 17 August 2009., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2011-3056
|
CVE-2011-3056 in Google Chrome before 17.0.963.83. Is related with T1185 : Man in the Browser.
|
Techniques related with vulnerability CVE-2014-6332
|
CVE-2014-6332 in OleAut32.dll in OLE in Microsoft Windows. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise.
|
Describe the vulnerability CVE-2020-5241
|
CVE-2020-5241, State: PUBLISHED, Published: 2020-02-12T23:40:11, Updated: 2024-08-04T08:22:09.024Z, Description: matestack-ui-core (RubyGem) before 0.7.4 is vulnerable to XSS/Script injection. This vulnerability is patched in version 0.7.4., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 7.7, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-17877
|
CVE-2018-17877 in lottery smart contract implementation for Greedy 599. Is related with T0828 : Loss of Productivity and Revenue. Is related with T1565 : Data Manipulation.
|
Techniques related with vulnerability CVE-2020-15211
|
CVE-2020-15211 in tensorflow. Has primary impact with T1574 : Hijack Execution Flow. Has an exploitation technique T1190 : Exploit Public-Facing Application.
|
Describe the vulnerability CVE-2020-15208
|
CVE-2020-15208, State: PUBLISHED, Published: 2020-09-25T18:45:40, Updated: 2024-08-04T13:08:22.832Z, Description: In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, when determining the common dimension size of two tensors, TFLite uses a `DCHECK` which is no-op outside of debug compilation modes. Since the function always returns the dimension of the first tensor, malicious attackers can craft cases where this is larger than that of the second tensor. In turn, this would result in reads/writes outside of bounds since the interpreter will wrongly assume that there is enough data in both tensors. The issue is patched in commit 8ee24e7949a203d234489f9da2c5bf45a7d5157d, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 7.4, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-14679
|
CVE-2018-14679, State: PUBLISHED, Published: 2018-07-28T23:00:00, Updated: 2024-08-05T09:38:13.452Z, Description: An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the CHM PMGI/PMGL chunk number validity checks, which could lead to denial of service (uninitialized data dereference and application crash)., No CVSS metrics available, Exploit Info: No exploit information available
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.