input
stringlengths 30
54
| output
stringlengths 69
4.21k
|
|---|---|
Describe the vulnerability CVE-2013-6282
|
CVE-2013-6282, State: PUBLISHED, Published: 2013-11-19T15:00:00, Updated: 2024-08-06T17:38:59.708Z, Description: The (1) get_user and (2) put_user API functions in the Linux kernel before 3.5.5 on the v6k and v7 ARM platforms do not validate certain addresses, which allows attackers to read or modify the contents of arbitrary kernel memory locations via a crafted application, as exploited in the wild against Android devices in October and November 2013., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-11069
|
CVE-2018-11069, State: PUBLISHED, Published: 2018-09-11T19:00:00Z, Updated: 2024-09-16T19:35:24.862Z, Description: RSA BSAFE SSL-J versions prior to 6.2.4 contain a Covert Timing Channel vulnerability during RSA decryption, also known as a Bleichenbacher attack on RSA decryption. A remote attacker may be able to recover a RSA key., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 5.9, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: NONE, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-15170
|
CVE-2020-15170, State: PUBLISHED, Published: 2020-09-10T18:40:14, Updated: 2024-08-04T13:08:22.406Z, Description: apollo-adminservice before version 1.7.1 does not implement access controls. If users expose apollo-adminservice to internet(which is not recommended), there are potential security issues since apollo-adminservice is designed to work in intranet and it doesn't have access control built-in. Malicious hackers may access apollo-adminservice apis directly to access/edit the application's configurations. To fix the potential issue without upgrading, simply follow the advice that do not expose apollo-adminservice to internet., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: LOW, Base Score: 7, Base Severity: HIGH, Confidentiality Impact: LOW, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-11084
|
CVE-2018-11084, State: PUBLISHED, Published: 2018-09-18T21:00:00Z, Updated: 2024-09-16T16:49:02.611Z, Description: Cloud Foundry Garden-runC release, versions prior to 1.16.1, prevents deletion of some app environments based on file attributes. A remote authenticated malicious user may create and delete apps with crafted file attributes to cause a denial of service for new app instances or scaling up of existing apps., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 6.8, Base Severity: MEDIUM, Confidentiality Impact: NONE, Integrity Impact: NONE, Privileges Required: LOW, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2013-3906
|
CVE-2013-3906 in GDI+ in Microsoft Windows. Is related with T1566 : Phishing. Is related with T1203 : Exploitation for Client Execution.
|
Describe the vulnerability CVE-2015-7910
|
CVE-2015-7910, State: PUBLISHED, Published: 2015-11-19T11:00:00, Updated: 2024-08-06T08:06:31.379Z, Description: Exemys Telemetry Web Server relies on an HTTP Location header to indicate that a client is unauthorized, which allows remote attackers to bypass intended access restrictions by disregarding this header and processing the response body., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-11010
|
CVE-2020-11010, State: PUBLISHED, Published: 2020-04-20T21:50:13, Updated: 2024-08-04T11:21:14.257Z, Description: In Tortoise ORM before versions 0.15.23 and 0.16.6, various forms of SQL injection have been found for MySQL and when filtering or doing mass-updates on char/text fields. SQLite & PostgreSQL are only affected when filtering with contains, starts_with, or ends_with filters (and their case-insensitive counterparts)., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: LOW, Base Score: 6.3, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2015-1805
|
CVE-2015-1805 in Linux kernel before 3.16. Is related with T1404 : Exploit OS Vulnerability. Is related with T1068 : Exploitation for Privilege Escalation.
|
Techniques related with vulnerability CVE-2018-15795
|
CVE-2018-15795 in CredHub Service Broker. Has primary impact with T1078 : Valid Accounts. Has an exploitation technique T1110 : Brute Force.
|
Techniques related with vulnerability CVE-2018-18990
|
CVE-2018-18990 in LCDS Laquis SCADA. Has primary impact with T1005 : Data from Local System.
|
Describe the vulnerability CVE-2020-3233
|
CVE-2020-3233, State: PUBLISHED, Published: 2020-06-03T17:55:33.850335Z, Updated: 2024-11-15T17:12:07.926Z, Description: A vulnerability in the web-based Local Manager interface of the Cisco IOx Application Framework could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web-based Local Manager interface of an affected device. The attacker must have valid Local Manager credentials. The vulnerability is due to insufficient validation of user-supplied input by the web-based Local Manager interface of the affected software. An attacker could exploit this vulnerability by injecting malicious code into a system settings tab. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 6.4, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: LOW, Scope: CHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Techniques related with vulnerability CVE-2014-7247
|
CVE-2014-7247 in JustSystems Ichitaro. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File.
|
Techniques related with vulnerability CVE-2019-3750
|
CVE-2019-3750 in Dell Command Update (DCU). Has primary impact with T1485 : Data Destruction.
|
Techniques related with vulnerability CVE-2019-1812
|
CVE-2019-1812 in Cisco NX-OS Software. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1548 : Abuse Elevation Control Mechanism. Has an exploitation technique T1078 : Valid Accounts.
|
Describe the vulnerability CVE-2014-0593
|
CVE-2014-0593, State: PUBLISHED, Published: 2018-06-08T17:00:00Z, Updated: 2024-09-16T16:33:31.630Z, Description: The set_version script as shipped with obs-service-set_version is a source validator for the Open Build Service (OBS). In versions prior to 0.5.3-1.1 this script did not properly sanitize the input provided by the user, allowing for code execution on the executing server., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: HIGH, Base Score: 7.8, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2013-6129
|
CVE-2013-6129, State: PUBLISHED, Published: 2013-10-19T10:00:00Z, Updated: 2024-09-16T18:17:47.221Z, Description: The install/upgrade.php scripts in vBulletin 4.1 and 5 allow remote attackers to create administrative accounts via the customerid, htmldata[password], htmldata[confirmpassword], and htmldata[email] parameters, as exploited in the wild in October 2013., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2019-1132
|
CVE-2019-1132 in Windows. Is related with T1190 : Exploit Public-Facing Application.
|
Techniques related with vulnerability CVE-2020-8467
|
CVE-2020-8467 in Trend Micro OfficeScan, Trend Micro Apex One. Is related with T1068 : Exploitation for Privilege Escalation.
|
Techniques related with vulnerability CVE-2019-13541
|
CVE-2019-13541 in Horner Automation Cscape. Has primary impact with T1575 : Native Code. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution.
|
Describe the vulnerability CVE-2019-16759
|
CVE-2019-16759, State: PUBLISHED, Published: 2019-09-24T21:01:49, Updated: 2024-08-05T01:24:47.948Z, Description: vBulletin 5.x through 5.5.4 allows remote command execution via the widgetConfig[code] parameter in an ajax/render/widget_php routestring request., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2016-9079
|
CVE-2016-9079 in Firefox. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise.
|
Describe the vulnerability CVE-2020-9804
|
CVE-2020-9804, State: PUBLISHED, Published: 2020-06-09T16:05:13, Updated: 2024-08-04T10:43:04.830Z, Description: A logic issue was addressed with improved restrictions. This issue is fixed in macOS Catalina 10.15.5. Inserting a USB device that sends invalid messages may cause a kernel panic., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-1956
|
CVE-2018-1956 in Security Identity Manager. Is related with T1110 : Brute Force.
|
Describe the vulnerability CVE-2012-2319
|
CVE-2012-2319, State: PUBLISHED, Published: 2012-05-17T10:00:00, Updated: 2024-08-06T19:26:08.998Z, Description: Multiple buffer overflows in the hfsplus filesystem implementation in the Linux kernel before 3.3.5 allow local users to gain privileges via a crafted HFS plus filesystem, a related issue to CVE-2009-4020., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2015-4051
|
CVE-2015-4051, State: PUBLISHED, Published: 2015-06-08T14:00:00, Updated: 2024-08-06T06:04:02.663Z, Description: Beckhoff IPC Diagnostics before 1.8 does not properly restrict access to functions in /config, which allows remote attackers to cause a denial of service (reboot or shutdown), create arbitrary users, or possibly have unspecified other impact via a crafted request, as demonstrated by a beckhoff.com:service:cxconfig:1#Write SOAP action to /upnpisapi., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-3723
|
CVE-2019-3723, State: PUBLISHED, Published: 2019-06-06T19:14:38.463575Z, Updated: 2024-09-16T19:05:23.583Z, Description: Dell EMC OpenManage Server Administrator (OMSA) versions prior to 9.1.0.3 and prior to 9.2.0.4 contain a web parameter tampering vulnerability. A remote unauthenticated attacker could potentially manipulate parameters of web requests to OMSA to create arbitrary files with empty content or delete the contents of any existing file, due to improper input parameter validation, CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 9.1, Base Severity: CRITICAL, Confidentiality Impact: NONE, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-17910
|
CVE-2018-17910, State: PUBLISHED, Published: 2018-10-29T18:00:00, Updated: 2024-08-05T11:01:14.512Z, Description: WebAccess Versions 8.3.2 and prior. The application fails to properly validate the length of user-supplied data, causing a buffer overflow condition that allows for arbitrary remote code execution., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2014-6278
|
CVE-2014-6278, State: PUBLISHED, Published: 2014-09-30T10:00:00, Updated: 2024-08-06T12:10:13.322Z, Description: GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-15776
|
CVE-2018-15776 in iDRAC. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1190 : Exploit Public-Facing Application.
|
Describe the vulnerability CVE-2019-1270
|
CVE-2019-1270, State: PUBLISHED, Published: 2019-09-11T21:25:00, Updated: 2024-08-04T18:13:30.337Z, Description: An elevation of privilege vulnerability exists in Windows store installer where WindowsApps directory is vulnerable to symbolic link attack, aka 'Microsoft Windows Store Installer Elevation of Privilege Vulnerability'., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2017-0493
|
CVE-2017-0493 in Android. Is related with T1461 : Lockscreen Bypass. Is related with T1533 : Data from Local System.
|
Describe the vulnerability CVE-2015-7912
|
CVE-2015-7912, State: PUBLISHED, Published: 2015-11-21T11:00:00, Updated: 2024-08-06T08:06:31.201Z, Description: The Ice Faces servlet in ag_server_service.exe in the AggreGate Server Service in Tibbo AggreGate before 5.30.06 allows remote attackers to upload and execute arbitrary Java code via a crafted XML document., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-10603
|
CVE-2020-10603 in WebAccess/NMS. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1133 : External Remote Services.
|
Techniques related with vulnerability CVE-2020-5284
|
CVE-2020-5284 in next.js. Has primary impact with T1005 : Data from Local System.
|
Techniques related with vulnerability CVE-2009-4324
|
CVE-2009-4324 in Adobe Reader and Acrobat. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File.
|
Techniques related with vulnerability CVE-2020-9818
|
CVE-2020-9818 in iOS. Is related with T1203 : Exploitation for Client Execution.
|
Describe the vulnerability CVE-2015-4902
|
CVE-2015-4902, State: PUBLISHED, Published: 2015-10-21T23:00:00, Updated: 2024-08-06T06:25:22.024Z, Description: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60 allows remote attackers to affect integrity via unknown vectors related to Deployment., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-0688
|
CVE-2020-0688 in Microsoft Exchange Server 2013. Is related with T1574 : Hijack Execution Flow. Is related with T1068 : Exploitation for Privilege Escalation.
|
Techniques related with vulnerability CVE-2018-19830
|
CVE-2018-19830 in UBSexToken function from Ethereum ERC20 token. Is related with T0828 : Loss of Productivity and Revenue. Is related with T1565 : Data Manipulation. Is related with T1068 : Exploitation for Privilege Escalation.
|
Describe the vulnerability CVE-2020-15118
|
CVE-2020-15118, State: PUBLISHED, Published: 2020-07-20T17:50:16, Updated: 2024-08-04T13:08:21.683Z, Description: In Wagtail before versions 2.7.4 and 2.9.3, when a form page type is made available to Wagtail editors through the `wagtail.contrib.forms` app, and the page template is built using Django's standard form rendering helpers such as form.as_p, any HTML tags used within a form field's help text will be rendered unescaped in the page. Allowing HTML within help text is an intentional design decision by Django; however, as a matter of policy Wagtail does not allow editors to insert arbitrary HTML by default, as this could potentially be used to carry out cross-site scripting attacks, including privilege escalation. This functionality should therefore not have been made available to editor-level users. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. Patched versions have been released as Wagtail 2.7.4 (for the LTS 2.7 branch) and Wagtail 2.9.3 (for the current 2.9 branch). In these versions, help text will be escaped to prevent the inclusion of HTML tags. Site owners who wish to re-enable the use of HTML within help text (and are willing to accept the risk of this being exploited by editors) may set WAGTAILFORMS_HELP_TEXT_ALLOW_HTML = True in their configuration settings. Site owners who are unable to upgrade to the new versions can secure their form page templates by rendering forms field-by-field as per Django's documentation, but omitting the |safe filter when outputting the help text., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 5.7, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2019-1794
|
CVE-2019-1794 in Cisco Directory Connector. Has primary impact with T1574.008 : Path Interception by Search Order Hijacking. Has an exploitation technique T1078 : Valid Accounts.
|
Techniques related with vulnerability CVE-2020-5374
|
CVE-2020-5374 in OMIMSSC (OpenManage Integration for Microsoft System Center). Has primary impact with T1078.001 : Default Accounts.
|
Techniques related with vulnerability CVE-2015-7755
|
CVE-2015-7755 in Juniper ScreenOS 6. Is related with T1211 : Exploitation for Defense Evasion.
|
Techniques related with vulnerability CVE-2020-3407
|
CVE-2020-3407 in Cisco IOS XE Software. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1190 : Exploit Public-Facing Application.
|
Techniques related with vulnerability CVE-2018-15767
|
CVE-2018-15767 in OpenManage Network Manager. Has primary impact with T1548.003 : Sudo and Sudo Caching.
|
Techniques related with vulnerability CVE-2019-1889
|
CVE-2019-1889 in Cisco Application Policy Infrastructure Controller (APIC). Has primary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1078 : Valid Accounts.
|
Describe the vulnerability CVE-2020-3356
|
CVE-2020-3356, State: PUBLISHED, Published: 2020-06-18T02:16:59.063030Z, Updated: 2024-11-15T17:05:48.390Z, Description: A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by interacting with the interface in a way that injects malicious content in a log file. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 6.1, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: NONE, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Describe MITRE technique T0826
|
MITRE T0826 : Loss of Availability from ics Adversaries may attempt to disrupt essential components or systems to prevent owner and operator from delivering products or services. (Citation: Corero) (Citation: Michael J. Assante and Robert M. Lee) (Citation: Tyson Macaulay)
Adversaries may leverage malware to delete or encrypt critical data on HMIs, workstations, or databases.
In the 2021 Colonial Pipeline ransomware incident, pipeline operations were temporally halted on May 7th and were not fully restarted until May 12th. (Citation: Colonial Pipeline Company May 2021)
|
Describe the vulnerability CVE-2013-1904
|
CVE-2013-1904, State: PUBLISHED, Published: 2014-02-08T00:00:00, Updated: 2024-08-06T15:20:37.192Z, Description: Absolute path traversal vulnerability in steps/mail/sendmail.inc in Roundcube Webmail before 0.7.3 and 0.8.x before 0.8.6 allows remote attackers to read arbitrary files via a full pathname in the _value parameter for the generic_message_footer setting in a save-perf action to index.php, as exploited in the wild in March 2013., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-20838
|
CVE-2018-20838, State: PUBLISHED, Published: 2019-05-13T04:04:18, Updated: 2024-08-05T12:12:28.338Z, Description: ampforwp_save_steps_data in the AMP for WP plugin before 0.9.97.21 for WordPress allows stored XSS., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2013-4854
|
CVE-2013-4854, State: PUBLISHED, Published: 2013-07-26T23:00:00, Updated: 2024-08-06T16:59:39.290Z, Description: The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe MITRE technique T1529
|
MITRE T1529 : System Shutdown/Reboot from enterprise Adversaries may shutdown/reboot systems to interrupt access to, or aid in the destruction of, those systems. Operating systems may contain commands to initiate a shutdown/reboot of a machine or network device. In some cases, these commands may also be used to initiate a shutdown/reboot of a remote computer or network device via [Network Device CLI](T1059.008) (e.g. `reload`).(Citation: Microsoft Shutdown Oct 2017)(Citation: alert_TA18_106A)
Shutting down or rebooting systems may disrupt access to computer resources for legitimate users while also impeding incident response/recovery.
Adversaries may attempt to shutdown/reboot a system after impacting it in other ways, such as [Disk Structure Wipe](T1561.002) or [Inhibit System Recovery](T1490), to hasten the intended effects on system availability.(Citation: Talos Nyetya June 2017)(Citation: Talos Olympic Destroyer 2018)
|
Techniques related with vulnerability CVE-2010-0028
|
CVE-2010-0028 in Microsoft Paint in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution.
|
Techniques related with vulnerability CVE-2019-11708
|
CVE-2019-11708 in Firefox ESR. Is related with T1190 : Exploit Public-Facing Application. Is related with T1133 : External Remote Services. Is related with T1211 : Exploitation for Defense Evasion.
|
Techniques related with vulnerability CVE-2018-18995
|
CVE-2018-18995 in ABB GATE-E1 and GATE-E2. Has secondary impact with T0816 : Device Restart/Shutdown. Has secondary impact with T1529 : System Shutdown/Reboot. Has secondary impact with T0855 : Unauthorized Command Message. Has secondary impact with T0836 : Modify Parameter. Has secondary impact with T1213 : Data from Information Repositories.
|
Techniques related with vulnerability CVE-2009-0238
|
CVE-2009-0238 in Microsoft Office Excel. Is related with T1574.001 : DLL Search Order Hijacking.
|
Describe the vulnerability CVE-2019-1781
|
CVE-2019-1781, State: PUBLISHED, Published: 2019-05-15T19:45:27.562921Z, Updated: 2024-11-20T17:20:46.849Z, Description: A vulnerability in the CLI of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need administrator credentials to exploit this vulnerability., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: HIGH, Base Score: 6.7, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.
|
Describe the vulnerability CVE-2020-0758
|
CVE-2020-0758, State: PUBLISHED, Published: 2020-03-12T15:48:05, Updated: 2024-08-04T06:11:05.566Z, Description: An elevation of privilege vulnerability exists when Azure DevOps Server and Team Foundation Services improperly handle pipeline job tokens, aka 'Azure DevOps Server and Team Foundation Services Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0815., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2012-1795
|
CVE-2012-1795, State: PUBLISHED, Published: 2012-03-20T18:00:00, Updated: 2024-08-06T19:08:38.627Z, Description: webglimpse.cgi in Webglimpse before 2.20.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the query parameter, as exploited in the wild in March 2012., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2012-1856
|
CVE-2012-1856 in Microsoft Office. Is related with T1203 : Exploitation for Client Execution.
|
Techniques related with vulnerability CVE-2018-11749
|
CVE-2018-11749 in Puppet Enterprise. Is related with T1040 : Network Sniffing. Is related with T1552 : Unsecured Credentials.
|
Describe the vulnerability CVE-2020-10603
|
CVE-2020-10603, State: PUBLISHED, Published: 2020-04-09T13:10:53, Updated: 2024-08-04T11:06:10.057Z, Description: WebAccess/NMS (versions prior to 3.0.2) does not properly sanitize user input and may allow an attacker to inject system commands remotely., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe MITRE technique T1213
|
MITRE T1213 : Data from Information Repositories from enterprise Adversaries may leverage information repositories to mine valuable information. Information repositories are tools that allow for storage of information, typically to facilitate collaboration or information sharing between users, and can store a wide variety of data that may aid adversaries in further objectives, or direct access to the target information. Adversaries may also abuse external sharing features to share sensitive documents with recipients outside of the organization.
The following is a brief list of example information that may hold potential value to an adversary and may also be found on an information repository:
* Policies, procedures, and standards
* Physical / logical network diagrams
* System architecture diagrams
* Technical system documentation
* Testing / development credentials
* Work / project schedules
* Source code snippets
* Links to network shares and other internal resources
Information stored in a repository may vary based on the specific instance or environment. Specific common information repositories include web-based platforms such as [Sharepoint](T1213.002) and [Confluence](T1213.001), specific services such as Code Repositories, IaaS databases, enterprise databases, and other storage infrastructure such as SQL Server.
|
Techniques related with vulnerability CVE-2009-2265
|
CVE-2009-2265 in FCKeditor before 2.6.4.1. Is related with T1190 : Exploit Public-Facing Application.
|
Techniques related with vulnerability CVE-2019-1402
|
CVE-2019-1402 in Microsoft Office. Has primary impact with T1068 : Exploitation for Privilege Escalation.
|
Techniques related with vulnerability CVE-2020-0884
|
CVE-2020-0884 in Microsoft Visual Studio 2017 version 15.9 (includes 15.1 - 15.8). Has primary impact with T1528 : Steal Application Access Token. Has an exploitation technique T1040 : Network Sniffing.
|
Techniques related with vulnerability CVE-2020-15147
|
CVE-2020-15147 in Red-DiscordBot. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1133 : External Remote Services.
|
Describe the vulnerability CVE-2020-15109
|
CVE-2020-15109, State: PUBLISHED, Published: 2020-08-04T23:00:16, Updated: 2024-08-04T13:08:21.891Z, Description: In solidus before versions 2.8.6, 2.9.6, and 2.10.2, there is an bility to change order address without triggering address validations. This vulnerability allows a malicious customer to craft request data with parameters that allow changing the address of the current order without changing the shipment costs associated with the new shipment. All stores with at least two shipping zones and different costs of shipment per zone are impacted. This problem comes from how checkout permitted attributes are structured. We have a single list of attributes that are permitted across the whole checkout, no matter the step that is being submitted. See the linked reference for more information. As a workaround, if it is not possible to upgrade to a supported patched version, please use this gist in the references section., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 5.3, Base Severity: MEDIUM, Confidentiality Impact: NONE, Integrity Impact: LOW, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-12659
|
CVE-2020-12659, State: PUBLISHED, Published: 2020-05-05T06:13:15, Updated: 2024-08-04T12:04:22.566Z, Description: An issue was discovered in the Linux kernel before 5.6.7. xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) because of a lack of headroom validation., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2017-10810
|
CVE-2017-10810, State: PUBLISHED, Published: 2017-07-04T20:00:00, Updated: 2024-08-05T17:50:12.121Z, Description: Memory leak in the virtio_gpu_object_create function in drivers/gpu/drm/virtio/virtgpu_object.c in the Linux kernel through 4.11.8 allows attackers to cause a denial of service (memory consumption) by triggering object-initialization failures., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-9862
|
CVE-2018-9862 in runV for Docker. Is related with T1068 : Exploitation for Privilege Escalation.
|
Techniques related with vulnerability CVE-2010-1423
|
CVE-2010-1423 in Java NPAPI plugin and Java Deployment Toolkit in Java 6 Update 10, 19, and other versions. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
|
Describe the vulnerability CVE-2011-3402
|
CVE-2011-3402, State: PUBLISHED, Published: 2011-11-04T21:00:00, Updated: 2024-08-06T23:29:56.897Z, Description: Unspecified vulnerability in the TrueType font parsing engine in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via crafted font data in a Word document or web page, as exploited in the wild in November 2011 by Duqu, aka "TrueType Font Parsing Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2013-7102
|
CVE-2013-7102 in OptimizePress theme before 1.61 for WordPress. Is related with T1190 : Exploit Public-Facing Application.
|
Describe the vulnerability CVE-2020-3253
|
CVE-2020-3253, State: PUBLISHED, Published: 2020-05-06T16:41:35.509287Z, Updated: 2024-11-15T17:24:42.704Z, Description: A vulnerability in the support tunnel feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to access the shell of an affected device even though expert mode is disabled. The vulnerability is due to improper configuration of the support tunnel feature. An attacker could exploit this vulnerability by enabling the support tunnel, setting a key, and deriving the tunnel password. A successful exploit could allow the attacker to run any system command with root access on an affected device., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: HIGH, Base Score: 6.7, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Describe the vulnerability CVE-2019-18582
|
CVE-2019-18582, State: PUBLISHED, Published: 2020-03-18T18:20:15.872339Z, Updated: 2024-09-17T03:58:36.117Z, Description: Dell EMC Data Protection Advisor versions 6.3, 6.4, 6.5, 18.2 versions prior to patch 83, and 19.1 versions prior to patch 71 contain a server-side template injection vulnerability in the REST API. A remote authenticated malicious user with administrative privileges may potentially exploit this vulnerability to inject malicious report generation scripts in the server. This may lead to OS command execution as the regular user runs the DPA service on the affected system., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 9.1, Base Severity: CRITICAL, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe MITRE technique T1189
|
MITRE T1189 : Drive-by Compromise from enterprise Adversaries may gain access to a system through a user visiting a website over the normal course of browsing. With this technique, the user's web browser is typically targeted for exploitation, but adversaries may also use compromised websites for non-exploitation behavior such as acquiring [Application Access Token](T1550.001).
Multiple ways of delivering exploit code to a browser exist (i.e., [Drive-by Target](T1608.004)), including:
* A legitimate website is compromised where adversaries have injected some form of malicious code such as JavaScript, iFrames, and cross-site scripting
* Script files served to a legitimate website from a publicly writeable cloud storage bucket are modified by an adversary
* Malicious ads are paid for and served through legitimate ad providers (i.e., [Malvertising](T1583.008))
* Built-in web application interfaces are leveraged for the insertion of any other kind of object that can be used to display web content or contain a script that executes on the visiting client (e.g. forum posts, comments, and other user controllable web content).
Often the website used by an adversary is one visited by a specific community, such as government, a particular industry, or region, where the goal is to compromise a specific user or set of users based on a shared interest. This kind of targeted campaign is often referred to a strategic web compromise or watering hole attack. There are several known examples of this occurring.(Citation: Shadowserver Strategic Web Compromise)
Typical drive-by compromise process:
1. A user visits a website that is used to host the adversary controlled content.
2. Scripts automatically execute, typically searching versions of the browser and plugins for a potentially vulnerable version.
* The user may be required to assist in this process by enabling scripting or active website components and ignoring warning dialog boxes.
3. Upon finding a vulnerable version, exploit code is delivered to the browser.
4. If exploitation is successful, then it will give the adversary code execution on the user's system unless other protections are in place.
* In some cases a second visit to the website after the initial scan is required before exploit code is delivered.
Unlike [Exploit Public-Facing Application](T1190), the focus of this technique is to exploit software on a client endpoint upon visiting a website. This will commonly give an adversary access to systems on the internal network instead of external systems that may be in a DMZ.
Adversaries may also use compromised websites to deliver a user to a malicious application designed to [Steal Application Access Token](T1528)s, like OAuth tokens, to gain access to protected applications and information. These malicious applications have been delivered through popups on legitimate websites.(Citation: Volexity OceanLotus Nov 2017)
|
Techniques related with vulnerability CVE-2017-12824
|
CVE-2017-12824 in InPage reader. Is related with T1203 : Exploitation for Client Execution.
|
Describe MITRE technique T1558.001
|
MITRE T1558.001 : Golden Ticket from enterprise Adversaries who have the KRBTGT account password hash may forge Kerberos ticket-granting tickets (TGT), also known as a golden ticket.(Citation: AdSecurity Kerberos GT Aug 2015) Golden tickets enable adversaries to generate authentication material for any account in Active Directory.(Citation: CERT-EU Golden Ticket Protection)
Using a golden ticket, adversaries are then able to request ticket granting service (TGS) tickets, which enable access to specific resources. Golden tickets require adversaries to interact with the Key Distribution Center (KDC) in order to obtain TGS.(Citation: ADSecurity Detecting Forged Tickets)
The KDC service runs all on domain controllers that are part of an Active Directory domain. KRBTGT is the Kerberos Key Distribution Center (KDC) service account and is responsible for encrypting and signing all Kerberos tickets.(Citation: ADSecurity Kerberos and KRBTGT) The KRBTGT password hash may be obtained using [OS Credential Dumping](T1003) and privileged access to a domain controller.
|
Techniques related with vulnerability CVE-2018-11075
|
CVE-2018-11075 in Authentication Manager. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1185 : Man in the Browser. Has an exploitation technique T1204.002 : Malicious File.
|
Techniques related with vulnerability CVE-2020-1456
|
CVE-2020-1456 in Microsoft SharePoint Enterprise Server. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation. Has secondary impact with T1485 : Data Destruction. Has secondary impact with T1478 : Install Insecure or Malicious Configuration. Has secondary impact with T1036 : Masquerading.
|
Describe the vulnerability CVE-2017-0262
|
CVE-2017-0262, State: PUBLISHED, Published: 2017-05-12T14:00:00, Updated: 2024-08-05T12:55:19.336Z, Description: Microsoft Office 2010 SP2, Office 2013 SP1, and Office 2016 allow a remote code execution vulnerability when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0261 and CVE-2017-0281., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-7004
|
CVE-2020-7004 in VBASE Editor. Has primary impact with T1068 : Exploitation for Privilege Escalation.
|
Describe the vulnerability CVE-2020-3409
|
CVE-2020-3409, State: PUBLISHED, Published: 2020-09-24T18:01:55.301281Z, Updated: 2024-11-13T17:55:30.656Z, Description: A vulnerability in the PROFINET feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause an affected device to crash and reload, resulting in a denial of service (DoS) condition on the device. The vulnerability is due to insufficient processing logic for crafted PROFINET packets that are sent to an affected device. An attacker could exploit this vulnerability by sending crafted PROFINET packets to an affected device for processing. A successful exploit could allow the attacker to cause the device to crash and reload, resulting in a DoS condition on the device., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: ADJACENT_NETWORK, Availability Impact: HIGH, Base Score: 7.4, Base Severity: HIGH, Confidentiality Impact: NONE, Integrity Impact: NONE, Privileges Required: NONE, Scope: CHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Describe the vulnerability CVE-2014-8551
|
CVE-2014-8551, State: PUBLISHED, Published: 2014-11-26T11:00:00, Updated: 2024-08-06T13:18:48.431Z, Description: The WinCC server in Siemens SIMATIC WinCC 7.0 through SP3, 7.2 before Update 9, and 7.3 before Update 2; SIMATIC PCS 7 7.1 through SP4, 8.0 through SP2, and 8.1; and TIA Portal 13 before Update 6 allows remote attackers to execute arbitrary code via crafted packets., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2010-3915
|
CVE-2010-3915, State: PUBLISHED, Published: 2010-11-05T22:00:00, Updated: 2024-08-07T03:26:12.332Z, Description: Unspecified vulnerability in JustSystems Ichitaro and Ichitaro Government allows remote attackers to execute arbitrary code via a crafted document, a different vulnerability than CVE-2010-3916., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-3216
|
CVE-2020-3216 in Cisco IOS XE SD-WAN Software. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has secondary impact with T1059 : Command and Scripting Interpreter.
|
Techniques related with vulnerability CVE-2020-5326
|
CVE-2020-5326 in Dell Client Consumer and Commercial Platforms. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has secondary impact with T1542.001 : System Firmware.
|
Describe the vulnerability CVE-2010-2772
|
CVE-2010-2772, State: PUBLISHED, Published: 2010-07-22T10:00:00, Updated: 2024-08-07T02:46:48.161Z, Description: Siemens Simatic WinCC and PCS 7 SCADA system uses a hard-coded password, which allows local users to access a back-end database and gain privileges, as demonstrated in the wild in July 2010 by the Stuxnet worm, a different vulnerability than CVE-2010-2568., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2012-6467
|
CVE-2012-6467, State: PUBLISHED, Published: 2013-01-02T11:00:00, Updated: 2024-08-06T21:28:39.996Z, Description: Opera before 12.10 follows Internet shortcuts that are referenced by a (1) IMG element or (2) other inline element, which makes it easier for remote attackers to conduct phishing attacks via a crafted web site, as exploited in the wild in November 2012., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2016-7255
|
CVE-2016-7255, State: PUBLISHED, Published: 2016-11-10T06:16:00, Updated: 2024-08-06T01:57:46.856Z, Description: The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-15454
|
CVE-2018-15454 in Cisco Adaptive Security Appliance (ASA) Software. Is related with T1499.004 : Application or System Exploitation.
|
Describe the vulnerability CVE-2020-8835
|
CVE-2020-8835, State: PUBLISHED, Published: 2020-04-02T18:00:23.885957Z, Updated: 2024-09-17T02:15:48.820Z, Description: In the Linux kernel 5.5.0 and newer, the bpf verifier (kernel/bpf/verifier.c) did not properly restrict the register bounds for 32-bit operations, leading to out-of-bounds reads and writes in kernel memory. The vulnerability also affects the Linux 5.4 stable series, starting with v5.4.7, as the introducing commit was backported to that branch. This vulnerability was fixed in 5.6.1, 5.5.14, and 5.4.29. (issue is aka ZDI-CAN-10780), CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: LOCAL, Availability Impact: HIGH, Base Score: 7.8, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-3786
|
CVE-2019-3786, State: PUBLISHED, Published: 2019-04-24T15:21:10.353984Z, Updated: 2024-09-17T02:15:38.765Z, Description: Cloud Foundry BOSH Backup and Restore CLI, all versions prior to 1.5.0, does not check the authenticity of backup scripts in BOSH. A remote authenticated malicious user can modify the metadata file of a Bosh Backup and Restore job to request extra backup files from different jobs upon restore. The exploited hooks in this metadata script were only maintained in the cfcr-etcd-release, so clusters deployed with the BBR job for etcd in this release are vulnerable., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 7.7, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: NONE, Privileges Required: LOW, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-15280
|
CVE-2019-15280, State: PUBLISHED, Published: 2019-10-16T18:36:45.621198Z, Updated: 2024-09-16T16:32:26.078Z, Description: A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web-based management interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting malicious code in certain sections of the interface that are visible to other users. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. An attacker would need valid administrator credentials to exploit this vulnerability., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 4.8, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: HIGH, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Describe the vulnerability CVE-2015-6480
|
CVE-2015-6480, State: PUBLISHED, Published: 2015-12-21T11:00:00, Updated: 2024-08-06T07:22:21.932Z, Description: The MessageBrokerServlet servlet in Moxa OnCell Central Manager before 2.2 does not require authentication, which allows remote attackers to obtain administrative access via a command, as demonstrated by the addUserAndGroup action., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-5459
|
CVE-2018-5459 in WAGO PFC200 Series. Has primary impact with T0855 : Unauthorized Command Message. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1485 : Data Destruction. Has secondary impact with T1565.001 : Stored Data Manipulation.
|
Techniques related with vulnerability CVE-2015-5123
|
CVE-2015-5123 in ActionScript 3 (AS3) implementation in Adobe Flash Player. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise.
|
Describe the vulnerability CVE-2020-11083
|
CVE-2020-11083, State: PUBLISHED, Published: 2020-07-14T20:55:14, Updated: 2024-08-04T11:21:14.610Z, Description: In October from version 1.0.319 and before version 1.0.466, a user with access to a markdown FormWidget that stores data persistently could create a stored XSS attack against themselves and any other users with access to the generated HTML from the field. This has been fixed in 1.0.466. For users of the RainLab.Blog plugin, this has also been fixed in 1.4.1., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 3.5, Base Severity: LOW, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-11608
|
CVE-2020-11608, State: PUBLISHED, Published: 2020-04-07T13:55:08, Updated: 2024-08-04T11:35:13.670Z, Description: An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d., No CVSS metrics available, Exploit Info: No exploit information available
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.