input
stringlengths
30
54
output
stringlengths
69
4.21k
Techniques related with vulnerability CVE-2020-1068
CVE-2020-1068 in Windows. Has primary impact with T1565 : Data Manipulation.
Techniques related with vulnerability CVE-2017-14934
CVE-2017-14934 in GNU Binutils 2.29. Is related with T1499 : Endpoint Denial of Service.
Techniques related with vulnerability CVE-2011-3192
CVE-2011-3192 in Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19. Is related with T1203 : Exploitation for Client Execution.
Describe MITRE technique T1542.004
MITRE T1542.004 : ROMMONkit from enterprise Adversaries may abuse the ROM Monitor (ROMMON) by loading an unauthorized firmware with adversary code to provide persistent access and manipulate device behavior that is difficult to detect. (Citation: Cisco Synful Knock Evolution)(Citation: Cisco Blog Legacy Device Attacks)...
Describe the vulnerability CVE-2018-8599
CVE-2018-8599, State: PUBLISHED, Published: 2018-12-12T00:00:00, Updated: 2024-08-05T07:02:25.956Z, Description: An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector Service improperly impersonates certain file operations, aka "Diagnostics Hub Standard Collector Service Elevation o...
Describe the vulnerability CVE-2017-8291
CVE-2017-8291, State: PUBLISHED, Published: 2017-04-27T01:41:00, Updated: 2024-08-05T16:34:21.679Z, Description: Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to t...
Techniques related with vulnerability CVE-2016-7255
CVE-2016-7255 in Windows. Is related with T1608 : Stage Capabilities.
Techniques related with vulnerability CVE-2019-3767
CVE-2019-3767 in ImageAssist. Has primary impact with T1005 : Data from Local System.
Techniques related with vulnerability CVE-2013-3644
CVE-2013-3644 in Ichitaro. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2009-1612
CVE-2009-1612, State: PUBLISHED, Published: 2009-05-11T20:00:00, Updated: 2024-08-07T05:20:33.807Z, Description: Stack-based buffer overflow in the MPS.StormPlayer.1 ActiveX control in mps.dll 3.9.4.27 in Baofeng Storm allows remote attackers to execute arbitrary code via a long argument to the OnBeforeVideoDownload me...
Techniques related with vulnerability CVE-2019-13922
CVE-2019-13922 in SINEMA Remote Connect Server. Is related with T1552 : Unsecured Credentials.
Techniques related with vulnerability CVE-2014-7187
CVE-2014-7187 in GNU Bash through 4.3 bash43-026. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File. Is related with T1499.004 : Application or System Exploitation.
Techniques related with vulnerability CVE-2018-10633
CVE-2018-10633 in Universal Robots Robot Controller version CB 3.1, SW Version 3.4.5-100. Has primary impact with T1078.001 : Default Accounts.
Describe the vulnerability CVE-2014-0810
CVE-2014-0810, State: PUBLISHED, Published: 2014-01-29T02:00:00, Updated: 2024-08-06T09:27:20.235Z, Description: Unspecified vulnerability in JustSystems Sanshiro 2007 before update 3, 2008 before update 5, 2009 before update 6, and 2010 before update 6, and Sanshiro Viewer before 2.0.2.0, allows remote attackers to ex...
Describe the vulnerability CVE-2018-19831
CVE-2018-19831, State: PUBLISHED, Published: 2019-12-31T15:06:41, Updated: 2024-08-05T11:44:20.604Z, Description: The ToOwner() function of a smart contract implementation for Cryptbond Network (CBN), an tradable Ethereum ERC20 token, allows attackers to change the owner of the contract, because the function does not c...
Describe the vulnerability CVE-2020-5364
CVE-2020-5364, State: PUBLISHED, Published: 2020-05-20T20:45:18.127497Z, Updated: 2024-09-16T19:10:16.543Z, Description: Dell EMC Isilon OneFS versions 8.2.2 and earlier contain an SNMPv2 vulnerability. The SNMPv2 services is enabled, by default, with a pre-configured community string. This community string allows read...
Describe the vulnerability CVE-2017-12824
CVE-2017-12824, State: PUBLISHED, Published: 2017-11-08T14:00:00Z, Updated: 2024-09-16T16:39:14.631Z, Description: Special crafted InPage document leads to arbitrary code execution in InPage reader., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-11059
CVE-2020-11059 in AEgir. Has primary impact with T1005 : Data from Local System.
Describe the vulnerability CVE-2019-1889
CVE-2019-1889, State: PUBLISHED, Published: 2019-07-04T19:55:11.106733Z, Updated: 2024-11-20T17:16:04.848Z, Description: A vulnerability in the REST API for software device management in Cisco Application Policy Infrastructure Controller (APIC) Software could allow an authenticated, remote attacker to escalate privileg...
Techniques related with vulnerability CVE-2018-7494
CVE-2018-7494 in Delta Electronics WPLSoft. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation.
Describe the vulnerability CVE-2019-9791
CVE-2019-9791, State: PUBLISHED, Published: 2019-04-26T16:13:22, Updated: 2024-08-04T22:01:54.733Z, Description: The type inference system allows the compilation of functions that can cause type confusions between arbitrary objects when compiled through the IonMonkey just-in-time (JIT) compiler and when the constructor...
Techniques related with vulnerability CVE-2017-3881
CVE-2017-3881 in Cisco IOS and IOS XE Software. Is related with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2009-0824
CVE-2009-0824 in Elaborate Bytes ElbyCDIO.sys 6.0.2.0 and earlier. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2016-2208
CVE-2016-2208, State: PUBLISHED, Published: 2016-05-19T10:00:00, Updated: 2024-08-05T23:24:48.515Z, Description: The kernel component in Symantec Anti-Virus Engine (AVE) 20151.1 before 20151.1.1.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory access violation and system crash) v...
Describe MITRE technique T0859
MITRE T0859 : Valid Accounts from ics Adversaries may steal the credentials of a specific user or service account using credential access techniques. In some cases, default credentials for control system devices may be publicly available. Compromised credentials may be used to bypass access controls placed on various...
Describe the vulnerability CVE-2009-0556
CVE-2009-0556, State: PUBLISHED, Published: 2009-04-03T18:00:00, Updated: 2024-08-07T04:40:05.099Z, Description: Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3, and PowerPoint in Microsoft Office 2004 for Mac, allows remote attackers to execute arbitrary code via a PowerPoint file with an OutlineTextRefAt...
Describe the vulnerability CVE-2020-11884
CVE-2020-11884, State: PUBLISHED, Published: 2020-04-29T12:07:37, Updated: 2024-08-04T11:42:00.533Z, Description: In the Linux kernel 4.19 through 5.6.7 on the s390 platform, code execution may occur because of a race condition, as demonstrated by code in enable_sacf_uaccess in arch/s390/lib/uaccess.c that fails to pro...
Describe the vulnerability CVE-2018-9488
CVE-2018-9488, State: PUBLISHED, Published: 2018-11-06T17:00:00Z, Updated: 2024-09-17T01:50:46.089Z, Description: In the SELinux permissions of crash_dump.te, there is a permissions bypass due to a missing restriction. This could lead to a local escalation of privilege, with System privileges needed. User interaction i...
Describe the vulnerability CVE-2018-11062
CVE-2018-11062, State: PUBLISHED, Published: 2018-11-02T22:00:00Z, Updated: 2024-09-16T18:04:27.800Z, Description: Integrated Data Protection Appliance versions 2.0, 2.1, and 2.2 contain undocumented accounts named 'support' and 'admin' that are protected with default passwords. These accounts have limited privileges a...
Describe the vulnerability CVE-2020-0981
CVE-2020-0981, State: PUBLISHED, Published: 2020-04-15T15:13:13, Updated: 2024-08-04T06:18:03.662Z, Description: A security feature bypass vulnerability exists when Windows fails to properly handle token relationships.An attacker who successfully exploited the vulnerability could allow an application with a certain int...
Describe the vulnerability CVE-2020-15199
CVE-2020-15199, State: PUBLISHED, Published: 2020-09-25T18:40:20, Updated: 2024-08-04T13:08:22.934Z, Description: In Tensorflow before version 2.3.1, the `RaggedCountSparseOutput` does not validate that the input arguments form a valid ragged tensor. In particular, there is no validation that the `splits` tensor has th...
Techniques related with vulnerability CVE-2019-11707
CVE-2019-11707 in Firefox ESR. Is related with T1499 : Endpoint Denial of Service.
Techniques related with vulnerability CVE-2019-1942
CVE-2019-1942 in Cisco Identity Services Engine Software. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565.001 : Stored Data Manipulation. Has an exploitation technique T1133 : External Remote Services. Has an ex...
Describe the vulnerability CVE-2020-1068
CVE-2020-1068, State: PUBLISHED, Published: 2020-05-21T22:52:56, Updated: 2024-08-04T06:25:00.670Z, Description: An elevation of privilege vulnerability exists in Windows Media Service that allows file creation in arbitrary locations.To exploit the vulnerability, an attacker would first have to log on to the system, ak...
Describe the vulnerability CVE-2018-7499
CVE-2018-7499, State: PUBLISHED, Published: 2018-05-15T22:00:00Z, Updated: 2024-09-16T20:58:20.098Z, Description: In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS...
Techniques related with vulnerability CVE-2019-3780
CVE-2019-3780 in Cloud Foundry Container Runtime (CFCR). Has primary impact with T1552.001 : Credentials In Files. Has secondary impact with T1068 : Exploitation for Privilege Escalation.
Techniques related with vulnerability CVE-2018-17934
CVE-2018-17934 in NUUO CMS. Has secondary impact with T1036 : Masquerading. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1203 : Exploitation for Client Execution. Has an exploitation technique T1202 : Indirect Command Execution.
Techniques related with vulnerability CVE-2014-0324
CVE-2014-0324 in Internet Explorer 8. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
Techniques related with vulnerability CVE-2015-2502
CVE-2015-2502 in Internet Explorer 7 through 11. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise.
Techniques related with vulnerability CVE-2020-5295
CVE-2020-5295 in october. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1133 : External Remote Services.
Describe the vulnerability CVE-2017-15919
CVE-2017-15919, State: PUBLISHED, Published: 2017-10-26T18:00:00, Updated: 2024-08-05T20:04:50.491Z, Description: The ultimate-form-builder-lite plugin before 1.3.7 for WordPress has SQL Injection, with resultant PHP Object Injection, via wp-admin/admin-ajax.php., No CVSS metrics available, Exploit Info: No exploit inf...
Describe the vulnerability CVE-2018-11088
CVE-2018-11088, State: PUBLISHED, Published: 2018-09-17T16:00:00Z, Updated: 2024-09-17T03:14:36.305Z, Description: Pivotal Applications Manager in Pivotal Application Service, versions 2.0 prior to 2.0.21 and 2.1 prior to 2.1.13 and 2.2 prior to 2.2.5, contains a bug which may allow escalation of privileges. A space de...
Describe the vulnerability CVE-2014-1807
CVE-2014-1807, State: PUBLISHED, Published: 2014-05-14T10:00:00, Updated: 2024-08-06T09:50:11.304Z, Description: The ShellExecute API in Windows Shell in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and ...
Techniques related with vulnerability CVE-2019-10980
CVE-2019-10980 in LCDS LAquis SCADA. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Is related with T0873 : Project File Infection. Is related with T1203 : Exploitation for Client Execution.
Techniques related with vulnerability CVE-2019-15288
CVE-2019-15288 in Cisco TelePresence TC Software. Has primary impact with T1608 : Stage Capabilities. Has an exploitation technique T1133 : External Remote Services. Has an exploitation technique T1078 : Valid Accounts.
Techniques related with vulnerability CVE-2019-3762
CVE-2019-3762 in Data Protection Central. Has primary impact with T1553 : Subvert Trust Controls. Has an exploitation technique T1588.004 : Digital Certificates.
Describe the vulnerability CVE-2019-1052
CVE-2019-1052, State: PUBLISHED, Published: 2019-06-12T13:49:41, Updated: 2024-08-04T18:06:31.587Z, Description: A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE I...
Techniques related with vulnerability CVE-2020-11082
CVE-2020-11082 in Kaminari. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link.
Describe the vulnerability CVE-2014-6271
CVE-2014-6271, State: PUBLISHED, Published: 2014-09-24T18:00:00, Updated: 2024-08-06T12:10:13.276Z, Description: GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demons...
Describe the vulnerability CVE-2010-1592
CVE-2010-1592, State: PUBLISHED, Published: 2010-04-28T23:00:00Z, Updated: 2024-09-17T03:23:14.131Z, Description: sandra.sys 15.18.1.1 and earlier in the Sandra Device Driver in SiSoftware Sandra 16.10.2010.1 and earlier allows local users to gain privileges or cause a denial of service (system crash) via unspecified v...
Describe the vulnerability CVE-2014-2817
CVE-2014-2817, State: PUBLISHED, Published: 2014-08-12T21:00:00, Updated: 2024-08-06T10:28:44.927Z, Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability.", No CVSS metrics available, Exploit I...
Describe the vulnerability CVE-2010-1424
CVE-2010-1424, State: PUBLISHED, Published: 2010-04-15T21:12:00Z, Updated: 2024-09-16T18:54:19.892Z, Description: Unspecified vulnerability in JustSystems Ichitaro and Ichitaro Government 2006 through 2010 allows user-assisted remote attackers to execute arbitrary code via a crafted font file., No CVSS metrics availabl...
Describe the vulnerability CVE-2018-15774
CVE-2018-15774, State: PUBLISHED, Published: 2018-12-13T22:00:00Z, Updated: 2024-09-17T01:36:18.120Z, Description: Dell EMC iDRAC7/iDRAC8 versions prior to 2.61.60.60 and iDRAC9 versions prior to 3.20.21.20, 3.21.24.22, 3.21.26.22, and 3.23.23.23 contain a privilege escalation vulnerability. An authenticated malicious ...
Describe the vulnerability CVE-2018-5463
CVE-2018-5463, State: PUBLISHED, Published: 2018-04-09T21:00:00Z, Updated: 2024-09-16T20:26:49.223Z, Description: A structured exception handler overflow vulnerability in Leao Consultoria e Desenvolvimento de Sistemas (LCDS) LTDA ME LAquis SCADA 4.1.0.3391 and earlier may allow code execution., No CVSS metrics availabl...
Describe the vulnerability CVE-2016-6909
CVE-2016-6909, State: PUBLISHED, Published: 2016-08-24T16:00:00, Updated: 2024-08-06T01:43:38.599Z, Description: Buffer overflow in the Cookie parser in Fortinet FortiOS 4.x before 4.1.11, 4.2.x before 4.2.13, and 4.3.x before 4.3.9 and FortiSwitch before 3.4.3 allows remote attackers to execute arbitrary code via a cr...
Describe MITRE technique T1036.005
MITRE T1036.005 : Match Legitimate Name or Location from enterprise Adversaries may match or approximate the name or location of legitimate files or resources when naming/placing them. This is done for the sake of evading defenses and observation. This may be done by placing an executable in a commonly trusted director...
Describe the vulnerability CVE-2014-0295
CVE-2014-0295, State: PUBLISHED, Published: 2014-02-12T02:00:00, Updated: 2024-08-06T09:13:09.502Z, Description: VsaVb7rt.dll in Microsoft .NET Framework 2.0 SP2 and 3.5.1 does not implement the ASLR protection mechanism, which makes it easier for remote attackers to execute arbitrary code via a crafted web site, as ex...
Techniques related with vulnerability CVE-2019-1736
CVE-2019-1736 in Cisco Identity Services Engine Software. Has primary impact with T1542.001 : System Firmware.
Describe the vulnerability CVE-2020-10257
CVE-2020-10257, State: PUBLISHED, Published: 2020-03-09T23:41:34, Updated: 2024-08-04T10:58:40.181Z, Description: The ThemeREX Addons plugin before 2020-03-09 for WordPress lacks access control on the /trx_addons/v2/get/sc_layout REST API endpoint, allowing for PHP functions to be executed by any users, because include...
Describe the vulnerability CVE-2020-5267
CVE-2020-5267, State: PUBLISHED, Published: 2020-03-19T17:30:16, Updated: 2024-08-04T08:22:09.079Z, Description: In ActionView before versions 6.0.2.2 and 5.2.4.2, there is a possible XSS vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be suscep...
Describe the vulnerability CVE-2018-21091
CVE-2018-21091, State: PUBLISHED, Published: 2020-04-08T13:21:01, Updated: 2024-08-05T12:19:27.644Z, Description: An issue was discovered on Samsung mobile devices with M(6.x) and N(7.x) software. Telecom has a System Crash via abnormal exception handling. The Samsung ID is SVE-2017-10906 (January 2018)., No CVSS metri...
Describe the vulnerability CVE-2018-8355
CVE-2018-8355, State: PUBLISHED, Published: 2018-08-15T17:00:00, Updated: 2024-08-05T06:54:35.502Z, Description: A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore, ...
Techniques related with vulnerability CVE-2019-0797
CVE-2019-0797 in Windows Server. Is related with T1608 : Stage Capabilities.
Describe MITRE technique T1098
MITRE T1098 : Account Manipulation from enterprise Adversaries may manipulate accounts to maintain and/or elevate access to victim systems. Account manipulation may consist of any action that preserves or modifies adversary access to a compromised account, such as modifying credentials or permission groups.(Citation: F...
Techniques related with vulnerability CVE-2014-4148
CVE-2014-4148 in win32k.sys in the kernel-mode drivers in Microsoft Windows. Is related with T1505 : Server Software Component. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1136 : Create Account. Is related with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2017-0149
CVE-2017-0149 in Internet Explorer. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise.
Describe the vulnerability CVE-2019-6340
CVE-2019-6340, State: PUBLISHED, Published: 2019-02-21T21:00:00, Updated: 2024-08-04T20:16:24.806Z, Description: Some field types do not properly sanitize data from non-form sources in Drupal 8.5.x before 8.5.11 and Drupal 8.6.x before 8.6.10. This can lead to arbitrary PHP code execution in some cases. A site is only ...
Techniques related with vulnerability CVE-2018-8431
CVE-2018-8431 in Microsoft SharePoint Server. Has primary impact with T1190 : Exploit Public-Facing Application. Has secondary impact with T1565 : Data Manipulation.
Describe the vulnerability CVE-2015-1494
CVE-2015-1494, State: PUBLISHED, Published: 2015-02-17T15:00:00, Updated: 2024-08-06T04:47:16.217Z, Description: The FancyBox for WordPress plugin before 3.0.3 for WordPress does not properly restrict access, which allows remote attackers to conduct cross-site scripting (XSS) attacks via an mfbfw[*] parameter in an upd...
Techniques related with vulnerability CVE-2018-21091
CVE-2018-21091 in Samsung mobile devices with M(6.x) and N(7.x) software. Is related with T1499.004 : Application or System Exploitation.
Describe the vulnerability CVE-2020-3476
CVE-2020-3476, State: PUBLISHED, Published: 2020-09-24T17:52:53.009720Z, Updated: 2024-11-13T17:57:51.685Z, Description: A vulnerability in the CLI implementation of a specific command of Cisco IOS XE Software could allow an authenticated, local attacker to overwrite arbitrary files in the underlying host file system. ...
Techniques related with vulnerability CVE-2019-1612
CVE-2019-1612 in Nexus 3000 Series Switches. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1078 : Valid Accounts. Has an exploitation technique T1133 : External Remote Services.
Techniques related with vulnerability CVE-2020-0898
CVE-2020-0898 in Windows. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation.
Describe the vulnerability CVE-2020-8467
CVE-2020-8467, State: PUBLISHED, Published: 2020-03-18T00:30:43, Updated: 2024-08-04T10:03:44.669Z, Description: A migration tool component of Trend Micro Apex One (2019) and OfficeScan XG contains a vulnerability which could allow remote attackers to execute arbitrary code on affected installations (RCE). An attempted...
Techniques related with vulnerability CVE-2020-5241
CVE-2020-5241 in matestack-ui-core. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1185 : Man in the Browser.
Techniques related with vulnerability CVE-2020-1495
CVE-2020-1495 in Microsoft SharePoint Server 2010 Service Pack 2. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation. Has secondary im...
Techniques related with vulnerability CVE-2018-17908
CVE-2018-17908 in WebAccess Versions 8.3.2 and prior.. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1562 : Impair Defenses.
Techniques related with vulnerability CVE-2018-7500
CVE-2018-7500 in OSIsoft PI Web API. Has primary impact with T1068 : Exploitation for Privilege Escalation.
Describe the vulnerability CVE-2019-1941
CVE-2019-1941, State: PUBLISHED, Published: 2019-07-17T20:25:21.284984Z, Updated: 2024-09-16T22:50:34.239Z, Description: A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a ...
Describe MITRE technique T1575
MITRE T1575 : Native API from mobile Adversaries may use Android’s Native Development Kit (NDK) to write native functions that can achieve execution of binaries or functions. Like system calls on a traditional desktop operating system, native code achieves execution on a lower level than normal Android SDK calls. The...
Describe the vulnerability CVE-2017-11826
CVE-2017-11826, State: PUBLISHED, Published: 2017-10-13T13:00:00Z, Updated: 2024-09-16T16:32:32.176Z, Description: Microsoft Office 2010, SharePoint Enterprise Server 2010, SharePoint Server 2010, Web Applications, Office Web Apps Server 2010 and 2013, Word Viewer, Word 2007, 2010, 2013 and 2016, Word Automation Servic...
Techniques related with vulnerability CVE-2009-0556
CVE-2009-0556 in Microsoft Office PowerPoint. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File.
Techniques related with vulnerability CVE-2020-3513
CVE-2020-3513 in Cisco IOS XE Software. Has primary impact with T1542.004 : ROMMONkit. Has an exploitation technique T1078 : Valid Accounts.
Describe the vulnerability CVE-2019-1942
CVE-2019-1942, State: PUBLISHED, Published: 2019-07-17T20:25:14.603542Z, Updated: 2024-09-17T03:49:07.951Z, Description: A vulnerability in the sponsor portal web interface for Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to impact the integrity of an affected system by executing a...
Techniques related with vulnerability CVE-2020-10257
CVE-2020-10257 in ThemeREX Addons plugin before 2020-03-09 for WordPress. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise.
Techniques related with vulnerability CVE-2018-8611
CVE-2018-8611 in Windows 7. Is related with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2019-3719
CVE-2019-3719 in SupportAssist Client. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1204.002 : Malicious File.
Describe the vulnerability CVE-2012-6081
CVE-2012-6081, State: PUBLISHED, Published: 2013-01-03T01:00:00, Updated: 2024-08-06T21:21:28.522Z, Description: Multiple unrestricted file upload vulnerabilities in the (1) twikidraw (action/twikidraw.py) and (2) anywikidraw (action/anywikidraw.py) actions in MoinMoin before 1.9.6 allow remote authenticated users with...
Describe the vulnerability CVE-2020-12000
CVE-2020-12000, State: PUBLISHED, Published: 2020-06-09T17:54:03, Updated: 2024-08-04T11:48:57.852Z, Description: The affected product is vulnerable to the handling of serialized data. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data on th...
Describe the vulnerability CVE-2019-3775
CVE-2019-3775, State: PUBLISHED, Published: 2019-03-07T19:00:00Z, Updated: 2024-09-16T22:31:19.423Z, Description: Cloud Foundry UAA, versions prior to v70.0, allows a user to update their own email address. A remote authenticated user can impersonate a different user by changing their email address to that of a differe...
Describe the vulnerability CVE-2018-11048
CVE-2018-11048, State: PUBLISHED, Published: 2018-08-10T20:00:00Z, Updated: 2024-09-17T01:56:30.207Z, Description: Dell EMC Data Protection Advisor, versions 6.2, 6,3, 6.4, 6.5 and Dell EMC Integrated Data Protection Appliance (IDPA) versions 2.0, 2.1 contain a XML External Entity (XXE) Injection vulnerability in the R...
Describe the vulnerability CVE-2019-3778
CVE-2019-3778, State: PUBLISHED, Published: 2019-03-07T19:00:00Z, Updated: 2024-09-16T20:57:23.699Z, Description: Spring Security OAuth, versions 2.3 prior to 2.3.5, and 2.2 prior to 2.2.4, and 2.1 prior to 2.1.4, and 2.0 prior to 2.0.17, and older unsupported versions could be susceptible to an open redirector attack ...
Techniques related with vulnerability CVE-2020-5231
CVE-2020-5231 in opencast. Has primary impact with T1078.001 : Default Accounts. Has secondary impact with T1136 : Create Account.
Describe the vulnerability CVE-2011-3192
CVE-2011-3192, State: PUBLISHED, Published: 2011-08-29T15:00:00, Updated: 2024-08-06T23:29:55.461Z, Description: The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that ...
Describe the vulnerability CVE-2019-1579
CVE-2019-1579, State: PUBLISHED, Published: 2019-07-19T21:12:19, Updated: 2024-08-04T18:20:28.309Z, Description: Remote Code Execution in PAN-OS 7.1.18 and earlier, PAN-OS 8.0.11-h1 and earlier, and PAN-OS 8.1.2 and earlier with GlobalProtect Portal or GlobalProtect Gateway Interface enabled may allow an unauthenticate...
Techniques related with vulnerability CVE-2016-0728
CVE-2016-0728 in Linux kernel before 4.4.1. Is related with T1608 : Stage Capabilities.
Describe the vulnerability CVE-2020-9819
CVE-2020-9819, State: PUBLISHED, Published: 2020-06-09T16:12:28, Updated: 2024-08-04T10:43:05.138Z, Description: A memory consumption issue was addressed with improved memory handling. This issue is fixed in iOS 13.5 and iPadOS 13.5, iOS 12.4.7, watchOS 6.2.5, watchOS 5.3.7. Processing a maliciously crafted mail messag...
Describe the vulnerability CVE-2018-15466
CVE-2018-15466, State: PUBLISHED, Published: 2019-01-11T15:00:00Z, Updated: 2024-11-19T19:17:55.725Z, Description: A vulnerability in the Graphite web interface of the Policy and Charging Rules Function (PCRF) of Cisco Policy Suite (CPS) could allow an unauthenticated, remote attacker to access the Graphite web interfa...
Techniques related with vulnerability CVE-2020-12652
CVE-2020-12652 in Linux kernel before 5.4.14. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1499.004 : Application or System Exploitation.
Techniques related with vulnerability CVE-2019-3708
CVE-2019-3708 in Dell EMC IsilonSD Management Server. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1185 : Man in the Browser. Has an exploitation technique T1204.001 : Malicious Link.