input
stringlengths
30
54
output
stringlengths
69
4.21k
Describe the vulnerability CVE-2013-6282
CVE-2013-6282, State: PUBLISHED, Published: 2013-11-19T15:00:00, Updated: 2024-08-06T17:38:59.708Z, Description: The (1) get_user and (2) put_user API functions in the Linux kernel before 3.5.5 on the v6k and v7 ARM platforms do not validate certain addresses, which allows attackers to read or modify the contents of ar...
Describe the vulnerability CVE-2018-11069
CVE-2018-11069, State: PUBLISHED, Published: 2018-09-11T19:00:00Z, Updated: 2024-09-16T19:35:24.862Z, Description: RSA BSAFE SSL-J versions prior to 6.2.4 contain a Covert Timing Channel vulnerability during RSA decryption, also known as a Bleichenbacher attack on RSA decryption. A remote attacker may be able to recove...
Describe the vulnerability CVE-2020-15170
CVE-2020-15170, State: PUBLISHED, Published: 2020-09-10T18:40:14, Updated: 2024-08-04T13:08:22.406Z, Description: apollo-adminservice before version 1.7.1 does not implement access controls. If users expose apollo-adminservice to internet(which is not recommended), there are potential security issues since apollo-admin...
Describe the vulnerability CVE-2018-11084
CVE-2018-11084, State: PUBLISHED, Published: 2018-09-18T21:00:00Z, Updated: 2024-09-16T16:49:02.611Z, Description: Cloud Foundry Garden-runC release, versions prior to 1.16.1, prevents deletion of some app environments based on file attributes. A remote authenticated malicious user may create and delete apps with craft...
Techniques related with vulnerability CVE-2013-3906
CVE-2013-3906 in GDI+ in Microsoft Windows. Is related with T1566 : Phishing. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2015-7910
CVE-2015-7910, State: PUBLISHED, Published: 2015-11-19T11:00:00, Updated: 2024-08-06T08:06:31.379Z, Description: Exemys Telemetry Web Server relies on an HTTP Location header to indicate that a client is unauthorized, which allows remote attackers to bypass intended access restrictions by disregarding this header and p...
Describe the vulnerability CVE-2020-11010
CVE-2020-11010, State: PUBLISHED, Published: 2020-04-20T21:50:13, Updated: 2024-08-04T11:21:14.257Z, Description: In Tortoise ORM before versions 0.15.23 and 0.16.6, various forms of SQL injection have been found for MySQL and when filtering or doing mass-updates on char/text fields. SQLite & PostgreSQL are only affect...
Techniques related with vulnerability CVE-2015-1805
CVE-2015-1805 in Linux kernel before 3.16. Is related with T1404 : Exploit OS Vulnerability. Is related with T1068 : Exploitation for Privilege Escalation.
Techniques related with vulnerability CVE-2018-15795
CVE-2018-15795 in CredHub Service Broker. Has primary impact with T1078 : Valid Accounts. Has an exploitation technique T1110 : Brute Force.
Techniques related with vulnerability CVE-2018-18990
CVE-2018-18990 in LCDS Laquis SCADA. Has primary impact with T1005 : Data from Local System.
Describe the vulnerability CVE-2020-3233
CVE-2020-3233, State: PUBLISHED, Published: 2020-06-03T17:55:33.850335Z, Updated: 2024-11-15T17:12:07.926Z, Description: A vulnerability in the web-based Local Manager interface of the Cisco IOx Application Framework could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack aga...
Techniques related with vulnerability CVE-2014-7247
CVE-2014-7247 in JustSystems Ichitaro. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File.
Techniques related with vulnerability CVE-2019-3750
CVE-2019-3750 in Dell Command Update (DCU). Has primary impact with T1485 : Data Destruction.
Techniques related with vulnerability CVE-2019-1812
CVE-2019-1812 in Cisco NX-OS Software. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1548 : Abuse Elevation Control Mechanism. Has an exploitation technique T1078 : Valid Accounts.
Describe the vulnerability CVE-2014-0593
CVE-2014-0593, State: PUBLISHED, Published: 2018-06-08T17:00:00Z, Updated: 2024-09-16T16:33:31.630Z, Description: The set_version script as shipped with obs-service-set_version is a source validator for the Open Build Service (OBS). In versions prior to 0.5.3-1.1 this script did not properly sanitize the input provided...
Describe the vulnerability CVE-2013-6129
CVE-2013-6129, State: PUBLISHED, Published: 2013-10-19T10:00:00Z, Updated: 2024-09-16T18:17:47.221Z, Description: The install/upgrade.php scripts in vBulletin 4.1 and 5 allow remote attackers to create administrative accounts via the customerid, htmldata[password], htmldata[confirmpassword], and htmldata[email] paramet...
Techniques related with vulnerability CVE-2019-1132
CVE-2019-1132 in Windows. Is related with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2020-8467
CVE-2020-8467 in Trend Micro OfficeScan, Trend Micro Apex One. Is related with T1068 : Exploitation for Privilege Escalation.
Techniques related with vulnerability CVE-2019-13541
CVE-2019-13541 in Horner Automation Cscape. Has primary impact with T1575 : Native Code. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2019-16759
CVE-2019-16759, State: PUBLISHED, Published: 2019-09-24T21:01:49, Updated: 2024-08-05T01:24:47.948Z, Description: vBulletin 5.x through 5.5.4 allows remote command execution via the widgetConfig[code] parameter in an ajax/render/widget_php routestring request., No CVSS metrics available, Exploit Info: No exploit inform...
Techniques related with vulnerability CVE-2016-9079
CVE-2016-9079 in Firefox. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise.
Describe the vulnerability CVE-2020-9804
CVE-2020-9804, State: PUBLISHED, Published: 2020-06-09T16:05:13, Updated: 2024-08-04T10:43:04.830Z, Description: A logic issue was addressed with improved restrictions. This issue is fixed in macOS Catalina 10.15.5. Inserting a USB device that sends invalid messages may cause a kernel panic., No CVSS metrics available,...
Techniques related with vulnerability CVE-2018-1956
CVE-2018-1956 in Security Identity Manager. Is related with T1110 : Brute Force.
Describe the vulnerability CVE-2012-2319
CVE-2012-2319, State: PUBLISHED, Published: 2012-05-17T10:00:00, Updated: 2024-08-06T19:26:08.998Z, Description: Multiple buffer overflows in the hfsplus filesystem implementation in the Linux kernel before 3.3.5 allow local users to gain privileges via a crafted HFS plus filesystem, a related issue to CVE-2009-4020., ...
Describe the vulnerability CVE-2015-4051
CVE-2015-4051, State: PUBLISHED, Published: 2015-06-08T14:00:00, Updated: 2024-08-06T06:04:02.663Z, Description: Beckhoff IPC Diagnostics before 1.8 does not properly restrict access to functions in /config, which allows remote attackers to cause a denial of service (reboot or shutdown), create arbitrary users, or poss...
Describe the vulnerability CVE-2019-3723
CVE-2019-3723, State: PUBLISHED, Published: 2019-06-06T19:14:38.463575Z, Updated: 2024-09-16T19:05:23.583Z, Description: Dell EMC OpenManage Server Administrator (OMSA) versions prior to 9.1.0.3 and prior to 9.2.0.4 contain a web parameter tampering vulnerability. A remote unauthenticated attacker could potentially man...
Describe the vulnerability CVE-2018-17910
CVE-2018-17910, State: PUBLISHED, Published: 2018-10-29T18:00:00, Updated: 2024-08-05T11:01:14.512Z, Description: WebAccess Versions 8.3.2 and prior. The application fails to properly validate the length of user-supplied data, causing a buffer overflow condition that allows for arbitrary remote code execution., No CVSS...
Describe the vulnerability CVE-2014-6278
CVE-2014-6278, State: PUBLISHED, Published: 2014-09-30T10:00:00, Updated: 2024-08-06T12:10:13.322Z, Description: GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as ...
Techniques related with vulnerability CVE-2018-15776
CVE-2018-15776 in iDRAC. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2019-1270
CVE-2019-1270, State: PUBLISHED, Published: 2019-09-11T21:25:00, Updated: 2024-08-04T18:13:30.337Z, Description: An elevation of privilege vulnerability exists in Windows store installer where WindowsApps directory is vulnerable to symbolic link attack, aka 'Microsoft Windows Store Installer Elevation of Privilege Vuln...
Techniques related with vulnerability CVE-2017-0493
CVE-2017-0493 in Android. Is related with T1461 : Lockscreen Bypass. Is related with T1533 : Data from Local System.
Describe the vulnerability CVE-2015-7912
CVE-2015-7912, State: PUBLISHED, Published: 2015-11-21T11:00:00, Updated: 2024-08-06T08:06:31.201Z, Description: The Ice Faces servlet in ag_server_service.exe in the AggreGate Server Service in Tibbo AggreGate before 5.30.06 allows remote attackers to upload and execute arbitrary Java code via a crafted XML document.,...
Techniques related with vulnerability CVE-2020-10603
CVE-2020-10603 in WebAccess/NMS. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1133 : External Remote Services.
Techniques related with vulnerability CVE-2020-5284
CVE-2020-5284 in next.js. Has primary impact with T1005 : Data from Local System.
Techniques related with vulnerability CVE-2009-4324
CVE-2009-4324 in Adobe Reader and Acrobat. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File.
Techniques related with vulnerability CVE-2020-9818
CVE-2020-9818 in iOS. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2015-4902
CVE-2015-4902, State: PUBLISHED, Published: 2015-10-21T23:00:00, Updated: 2024-08-06T06:25:22.024Z, Description: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60 allows remote attackers to affect integrity via unknown vectors related to Deployment., No CVSS metrics available, Exploit Info: No exploit i...
Techniques related with vulnerability CVE-2020-0688
CVE-2020-0688 in Microsoft Exchange Server 2013. Is related with T1574 : Hijack Execution Flow. Is related with T1068 : Exploitation for Privilege Escalation.
Techniques related with vulnerability CVE-2018-19830
CVE-2018-19830 in UBSexToken function from Ethereum ERC20 token. Is related with T0828 : Loss of Productivity and Revenue. Is related with T1565 : Data Manipulation. Is related with T1068 : Exploitation for Privilege Escalation.
Describe the vulnerability CVE-2020-15118
CVE-2020-15118, State: PUBLISHED, Published: 2020-07-20T17:50:16, Updated: 2024-08-04T13:08:21.683Z, Description: In Wagtail before versions 2.7.4 and 2.9.3, when a form page type is made available to Wagtail editors through the `wagtail.contrib.forms` app, and the page template is built using Django's standard form re...
Techniques related with vulnerability CVE-2019-1794
CVE-2019-1794 in Cisco Directory Connector. Has primary impact with T1574.008 : Path Interception by Search Order Hijacking. Has an exploitation technique T1078 : Valid Accounts.
Techniques related with vulnerability CVE-2020-5374
CVE-2020-5374 in OMIMSSC (OpenManage Integration for Microsoft System Center). Has primary impact with T1078.001 : Default Accounts.
Techniques related with vulnerability CVE-2015-7755
CVE-2015-7755 in Juniper ScreenOS 6. Is related with T1211 : Exploitation for Defense Evasion.
Techniques related with vulnerability CVE-2020-3407
CVE-2020-3407 in Cisco IOS XE Software. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2018-15767
CVE-2018-15767 in OpenManage Network Manager. Has primary impact with T1548.003 : Sudo and Sudo Caching.
Techniques related with vulnerability CVE-2019-1889
CVE-2019-1889 in Cisco Application Policy Infrastructure Controller (APIC). Has primary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1078 : Valid Accounts.
Describe the vulnerability CVE-2020-3356
CVE-2020-3356, State: PUBLISHED, Published: 2020-06-18T02:16:59.063030Z, Updated: 2024-11-15T17:05:48.390Z, Description: A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack agains...
Describe MITRE technique T0826
MITRE T0826 : Loss of Availability from ics Adversaries may attempt to disrupt essential components or systems to prevent owner and operator from delivering products or services. (Citation: Corero) (Citation: Michael J. Assante and Robert M. Lee) (Citation: Tyson Macaulay) Adversaries may leverage malware to delete...
Describe the vulnerability CVE-2013-1904
CVE-2013-1904, State: PUBLISHED, Published: 2014-02-08T00:00:00, Updated: 2024-08-06T15:20:37.192Z, Description: Absolute path traversal vulnerability in steps/mail/sendmail.inc in Roundcube Webmail before 0.7.3 and 0.8.x before 0.8.6 allows remote attackers to read arbitrary files via a full pathname in the _value par...
Describe the vulnerability CVE-2018-20838
CVE-2018-20838, State: PUBLISHED, Published: 2019-05-13T04:04:18, Updated: 2024-08-05T12:12:28.338Z, Description: ampforwp_save_steps_data in the AMP for WP plugin before 0.9.97.21 for WordPress allows stored XSS., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2013-4854
CVE-2013-4854, State: PUBLISHED, Published: 2013-07-26T23:00:00, Updated: 2024-08-06T16:59:39.290Z, Description: The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attac...
Describe MITRE technique T1529
MITRE T1529 : System Shutdown/Reboot from enterprise Adversaries may shutdown/reboot systems to interrupt access to, or aid in the destruction of, those systems. Operating systems may contain commands to initiate a shutdown/reboot of a machine or network device. In some cases, these commands may also be used to initiat...
Techniques related with vulnerability CVE-2010-0028
CVE-2010-0028 in Microsoft Paint in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution.
Techniques related with vulnerability CVE-2019-11708
CVE-2019-11708 in Firefox ESR. Is related with T1190 : Exploit Public-Facing Application. Is related with T1133 : External Remote Services. Is related with T1211 : Exploitation for Defense Evasion.
Techniques related with vulnerability CVE-2018-18995
CVE-2018-18995 in ABB GATE-E1 and GATE-E2. Has secondary impact with T0816 : Device Restart/Shutdown. Has secondary impact with T1529 : System Shutdown/Reboot. Has secondary impact with T0855 : Unauthorized Command Message. Has secondary impact with T0836 : Modify Parameter. Has secondary impact with T1213 : Data from ...
Techniques related with vulnerability CVE-2009-0238
CVE-2009-0238 in Microsoft Office Excel. Is related with T1574.001 : DLL Search Order Hijacking.
Describe the vulnerability CVE-2019-1781
CVE-2019-1781, State: PUBLISHED, Published: 2019-05-15T19:45:27.562921Z, Updated: 2024-11-20T17:20:46.849Z, Description: A vulnerability in the CLI of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected...
Describe the vulnerability CVE-2020-0758
CVE-2020-0758, State: PUBLISHED, Published: 2020-03-12T15:48:05, Updated: 2024-08-04T06:11:05.566Z, Description: An elevation of privilege vulnerability exists when Azure DevOps Server and Team Foundation Services improperly handle pipeline job tokens, aka 'Azure DevOps Server and Team Foundation Services Elevation of ...
Describe the vulnerability CVE-2012-1795
CVE-2012-1795, State: PUBLISHED, Published: 2012-03-20T18:00:00, Updated: 2024-08-06T19:08:38.627Z, Description: webglimpse.cgi in Webglimpse before 2.20.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the query parameter, as exploited in the wild in March 2012., No CVSS metrics avai...
Techniques related with vulnerability CVE-2012-1856
CVE-2012-1856 in Microsoft Office. Is related with T1203 : Exploitation for Client Execution.
Techniques related with vulnerability CVE-2018-11749
CVE-2018-11749 in Puppet Enterprise. Is related with T1040 : Network Sniffing. Is related with T1552 : Unsecured Credentials.
Describe the vulnerability CVE-2020-10603
CVE-2020-10603, State: PUBLISHED, Published: 2020-04-09T13:10:53, Updated: 2024-08-04T11:06:10.057Z, Description: WebAccess/NMS (versions prior to 3.0.2) does not properly sanitize user input and may allow an attacker to inject system commands remotely., No CVSS metrics available, Exploit Info: No exploit information a...
Describe MITRE technique T1213
MITRE T1213 : Data from Information Repositories from enterprise Adversaries may leverage information repositories to mine valuable information. Information repositories are tools that allow for storage of information, typically to facilitate collaboration or information sharing between users, and can store a wide vari...
Techniques related with vulnerability CVE-2009-2265
CVE-2009-2265 in FCKeditor before 2.6.4.1. Is related with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2019-1402
CVE-2019-1402 in Microsoft Office. Has primary impact with T1068 : Exploitation for Privilege Escalation.
Techniques related with vulnerability CVE-2020-0884
CVE-2020-0884 in Microsoft Visual Studio 2017 version 15.9 (includes 15.1 - 15.8). Has primary impact with T1528 : Steal Application Access Token. Has an exploitation technique T1040 : Network Sniffing.
Techniques related with vulnerability CVE-2020-15147
CVE-2020-15147 in Red-DiscordBot. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1133 : External Remote Services.
Describe the vulnerability CVE-2020-15109
CVE-2020-15109, State: PUBLISHED, Published: 2020-08-04T23:00:16, Updated: 2024-08-04T13:08:21.891Z, Description: In solidus before versions 2.8.6, 2.9.6, and 2.10.2, there is an bility to change order address without triggering address validations. This vulnerability allows a malicious customer to craft request data w...
Describe the vulnerability CVE-2020-12659
CVE-2020-12659, State: PUBLISHED, Published: 2020-05-05T06:13:15, Updated: 2024-08-04T12:04:22.566Z, Description: An issue was discovered in the Linux kernel before 5.6.7. xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) because of a lack of headroom validation...
Describe the vulnerability CVE-2017-10810
CVE-2017-10810, State: PUBLISHED, Published: 2017-07-04T20:00:00, Updated: 2024-08-05T17:50:12.121Z, Description: Memory leak in the virtio_gpu_object_create function in drivers/gpu/drm/virtio/virtgpu_object.c in the Linux kernel through 4.11.8 allows attackers to cause a denial of service (memory consumption) by trigg...
Techniques related with vulnerability CVE-2018-9862
CVE-2018-9862 in runV for Docker. Is related with T1068 : Exploitation for Privilege Escalation.
Techniques related with vulnerability CVE-2010-1423
CVE-2010-1423 in Java NPAPI plugin and Java Deployment Toolkit in Java 6 Update 10, 19, and other versions. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2011-3402
CVE-2011-3402, State: PUBLISHED, Published: 2011-11-04T21:00:00, Updated: 2024-08-06T23:29:56.897Z, Description: Unspecified vulnerability in the TrueType font parsing engine in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2...
Techniques related with vulnerability CVE-2013-7102
CVE-2013-7102 in OptimizePress theme before 1.61 for WordPress. Is related with T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2020-3253
CVE-2020-3253, State: PUBLISHED, Published: 2020-05-06T16:41:35.509287Z, Updated: 2024-11-15T17:24:42.704Z, Description: A vulnerability in the support tunnel feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to access the shell of an affected device even though exper...
Describe the vulnerability CVE-2019-18582
CVE-2019-18582, State: PUBLISHED, Published: 2020-03-18T18:20:15.872339Z, Updated: 2024-09-17T03:58:36.117Z, Description: Dell EMC Data Protection Advisor versions 6.3, 6.4, 6.5, 18.2 versions prior to patch 83, and 19.1 versions prior to patch 71 contain a server-side template injection vulnerability in the REST API. ...
Describe MITRE technique T1189
MITRE T1189 : Drive-by Compromise from enterprise Adversaries may gain access to a system through a user visiting a website over the normal course of browsing. With this technique, the user's web browser is typically targeted for exploitation, but adversaries may also use compromised websites for non-exploitation behav...
Techniques related with vulnerability CVE-2017-12824
CVE-2017-12824 in InPage reader. Is related with T1203 : Exploitation for Client Execution.
Describe MITRE technique T1558.001
MITRE T1558.001 : Golden Ticket from enterprise Adversaries who have the KRBTGT account password hash may forge Kerberos ticket-granting tickets (TGT), also known as a golden ticket.(Citation: AdSecurity Kerberos GT Aug 2015) Golden tickets enable adversaries to generate authentication material for any account in Activ...
Techniques related with vulnerability CVE-2018-11075
CVE-2018-11075 in Authentication Manager. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1185 : Man in the Browser. Has an exploitation technique T1204.002 : Malicious File.
Techniques related with vulnerability CVE-2020-1456
CVE-2020-1456 in Microsoft SharePoint Enterprise Server. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation. Has secondary impact with T1485 : Data Destruction. Has secondary impact with T1478 :...
Describe the vulnerability CVE-2017-0262
CVE-2017-0262, State: PUBLISHED, Published: 2017-05-12T14:00:00, Updated: 2024-08-05T12:55:19.336Z, Description: Microsoft Office 2010 SP2, Office 2013 SP1, and Office 2016 allow a remote code execution vulnerability when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnera...
Techniques related with vulnerability CVE-2020-7004
CVE-2020-7004 in VBASE Editor. Has primary impact with T1068 : Exploitation for Privilege Escalation.
Describe the vulnerability CVE-2020-3409
CVE-2020-3409, State: PUBLISHED, Published: 2020-09-24T18:01:55.301281Z, Updated: 2024-11-13T17:55:30.656Z, Description: A vulnerability in the PROFINET feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause an affected device to crash and reload, resulting in...
Describe the vulnerability CVE-2014-8551
CVE-2014-8551, State: PUBLISHED, Published: 2014-11-26T11:00:00, Updated: 2024-08-06T13:18:48.431Z, Description: The WinCC server in Siemens SIMATIC WinCC 7.0 through SP3, 7.2 before Update 9, and 7.3 before Update 2; SIMATIC PCS 7 7.1 through SP4, 8.0 through SP2, and 8.1; and TIA Portal 13 before Update 6 allows remo...
Describe the vulnerability CVE-2010-3915
CVE-2010-3915, State: PUBLISHED, Published: 2010-11-05T22:00:00, Updated: 2024-08-07T03:26:12.332Z, Description: Unspecified vulnerability in JustSystems Ichitaro and Ichitaro Government allows remote attackers to execute arbitrary code via a crafted document, a different vulnerability than CVE-2010-3916., No CVSS metr...
Techniques related with vulnerability CVE-2020-3216
CVE-2020-3216 in Cisco IOS XE SD-WAN Software. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has secondary impact with T1059 : Command and Scripting Interpreter.
Techniques related with vulnerability CVE-2020-5326
CVE-2020-5326 in Dell Client Consumer and Commercial Platforms. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has secondary impact with T1542.001 : System Firmware.
Describe the vulnerability CVE-2010-2772
CVE-2010-2772, State: PUBLISHED, Published: 2010-07-22T10:00:00, Updated: 2024-08-07T02:46:48.161Z, Description: Siemens Simatic WinCC and PCS 7 SCADA system uses a hard-coded password, which allows local users to access a back-end database and gain privileges, as demonstrated in the wild in July 2010 by the Stuxnet wo...
Describe the vulnerability CVE-2012-6467
CVE-2012-6467, State: PUBLISHED, Published: 2013-01-02T11:00:00, Updated: 2024-08-06T21:28:39.996Z, Description: Opera before 12.10 follows Internet shortcuts that are referenced by a (1) IMG element or (2) other inline element, which makes it easier for remote attackers to conduct phishing attacks via a crafted web si...
Describe the vulnerability CVE-2016-7255
CVE-2016-7255, State: PUBLISHED, Published: 2016-11-10T06:16:00, Updated: 2024-08-06T01:57:46.856Z, Description: The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and W...
Techniques related with vulnerability CVE-2018-15454
CVE-2018-15454 in Cisco Adaptive Security Appliance (ASA) Software. Is related with T1499.004 : Application or System Exploitation.
Describe the vulnerability CVE-2020-8835
CVE-2020-8835, State: PUBLISHED, Published: 2020-04-02T18:00:23.885957Z, Updated: 2024-09-17T02:15:48.820Z, Description: In the Linux kernel 5.5.0 and newer, the bpf verifier (kernel/bpf/verifier.c) did not properly restrict the register bounds for 32-bit operations, leading to out-of-bounds reads and writes in kernel ...
Describe the vulnerability CVE-2019-3786
CVE-2019-3786, State: PUBLISHED, Published: 2019-04-24T15:21:10.353984Z, Updated: 2024-09-17T02:15:38.765Z, Description: Cloud Foundry BOSH Backup and Restore CLI, all versions prior to 1.5.0, does not check the authenticity of backup scripts in BOSH. A remote authenticated malicious user can modify the metadata file o...
Describe the vulnerability CVE-2019-15280
CVE-2019-15280, State: PUBLISHED, Published: 2019-10-16T18:36:45.621198Z, Updated: 2024-09-16T16:32:26.078Z, Description: A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS)...
Describe the vulnerability CVE-2015-6480
CVE-2015-6480, State: PUBLISHED, Published: 2015-12-21T11:00:00, Updated: 2024-08-06T07:22:21.932Z, Description: The MessageBrokerServlet servlet in Moxa OnCell Central Manager before 2.2 does not require authentication, which allows remote attackers to obtain administrative access via a command, as demonstrated by the...
Techniques related with vulnerability CVE-2018-5459
CVE-2018-5459 in WAGO PFC200 Series. Has primary impact with T0855 : Unauthorized Command Message. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1485 : Data Destruction. Has secondary impact with T1565.001 : Stored Data Manipulation.
Techniques related with vulnerability CVE-2015-5123
CVE-2015-5123 in ActionScript 3 (AS3) implementation in Adobe Flash Player. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise.
Describe the vulnerability CVE-2020-11083
CVE-2020-11083, State: PUBLISHED, Published: 2020-07-14T20:55:14, Updated: 2024-08-04T11:21:14.610Z, Description: In October from version 1.0.319 and before version 1.0.466, a user with access to a markdown FormWidget that stores data persistently could create a stored XSS attack against themselves and any other users ...
Describe the vulnerability CVE-2020-11608
CVE-2020-11608, State: PUBLISHED, Published: 2020-04-07T13:55:08, Updated: 2024-08-04T11:35:13.670Z, Description: An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka...