input
stringlengths
30
54
output
stringlengths
69
4.21k
Techniques related with vulnerability CVE-2020-1068
CVE-2020-1068 in Windows. Has primary impact with T1565 : Data Manipulation.
Techniques related with vulnerability CVE-2017-14934
CVE-2017-14934 in GNU Binutils 2.29. Is related with T1499 : Endpoint Denial of Service.
Techniques related with vulnerability CVE-2011-3192
CVE-2011-3192 in Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19. Is related with T1203 : Exploitation for Client Execution.
Describe MITRE technique T1542.004
MITRE T1542.004 : ROMMONkit from enterprise Adversaries may abuse the ROM Monitor (ROMMON) by loading an unauthorized firmware with adversary code to provide persistent access and manipulate device behavior that is difficult to detect. (Citation: Cisco Synful Knock Evolution)(Citation: Cisco Blog Legacy Device Attacks) ROMMON is a Cisco network device firmware that functions as a boot loader, boot image, or boot helper to initialize hardware and software when the platform is powered on or reset. Similar to [TFTP Boot](T1542.005), an adversary may upgrade the ROMMON image locally or remotely (for example, through TFTP) with adversary code and restart the device in order to overwrite the existing ROMMON image. This provides adversaries with the means to update the ROMMON to gain persistence on a system in a way that may be difficult to detect.
Describe the vulnerability CVE-2018-8599
CVE-2018-8599, State: PUBLISHED, Published: 2018-12-12T00:00:00, Updated: 2024-08-05T07:02:25.956Z, Description: An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector Service improperly impersonates certain file operations, aka "Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability." This affects Microsoft Visual Studio, Windows Server 2019, Windows Server 2016, Windows 10, Windows 10 Servers., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2017-8291
CVE-2017-8291, State: PUBLISHED, Published: 2017-04-27T01:41:00, Updated: 2024-08-05T16:34:21.679Z, Description: Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2016-7255
CVE-2016-7255 in Windows. Is related with T1608 : Stage Capabilities.
Techniques related with vulnerability CVE-2019-3767
CVE-2019-3767 in ImageAssist. Has primary impact with T1005 : Data from Local System.
Techniques related with vulnerability CVE-2013-3644
CVE-2013-3644 in Ichitaro. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2009-1612
CVE-2009-1612, State: PUBLISHED, Published: 2009-05-11T20:00:00, Updated: 2024-08-07T05:20:33.807Z, Description: Stack-based buffer overflow in the MPS.StormPlayer.1 ActiveX control in mps.dll 3.9.4.27 in Baofeng Storm allows remote attackers to execute arbitrary code via a long argument to the OnBeforeVideoDownload method, as exploited in the wild in April and May 2009. NOTE: some of these details are obtained from third party information. NOTE: it was later reported that 3.09.04.17 and earlier are also affected., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2019-13922
CVE-2019-13922 in SINEMA Remote Connect Server. Is related with T1552 : Unsecured Credentials.
Techniques related with vulnerability CVE-2014-7187
CVE-2014-7187 in GNU Bash through 4.3 bash43-026. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File. Is related with T1499.004 : Application or System Exploitation.
Techniques related with vulnerability CVE-2018-10633
CVE-2018-10633 in Universal Robots Robot Controller version CB 3.1, SW Version 3.4.5-100. Has primary impact with T1078.001 : Default Accounts.
Describe the vulnerability CVE-2014-0810
CVE-2014-0810, State: PUBLISHED, Published: 2014-01-29T02:00:00, Updated: 2024-08-06T09:27:20.235Z, Description: Unspecified vulnerability in JustSystems Sanshiro 2007 before update 3, 2008 before update 5, 2009 before update 6, and 2010 before update 6, and Sanshiro Viewer before 2.0.2.0, allows remote attackers to execute arbitrary code via a crafted document., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-19831
CVE-2018-19831, State: PUBLISHED, Published: 2019-12-31T15:06:41, Updated: 2024-08-05T11:44:20.604Z, Description: The ToOwner() function of a smart contract implementation for Cryptbond Network (CBN), an tradable Ethereum ERC20 token, allows attackers to change the owner of the contract, because the function does not check the caller's identity., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-5364
CVE-2020-5364, State: PUBLISHED, Published: 2020-05-20T20:45:18.127497Z, Updated: 2024-09-16T19:10:16.543Z, Description: Dell EMC Isilon OneFS versions 8.2.2 and earlier contain an SNMPv2 vulnerability. The SNMPv2 services is enabled, by default, with a pre-configured community string. This community string allows read-only access to many aspects of the Isilon cluster, some of which are considered sensitive and can foster additional access., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: LOW, Base Score: 5.3, Base Severity: MEDIUM, Confidentiality Impact: NONE, Integrity Impact: NONE, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe the vulnerability CVE-2017-12824
CVE-2017-12824, State: PUBLISHED, Published: 2017-11-08T14:00:00Z, Updated: 2024-09-16T16:39:14.631Z, Description: Special crafted InPage document leads to arbitrary code execution in InPage reader., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-11059
CVE-2020-11059 in AEgir. Has primary impact with T1005 : Data from Local System.
Describe the vulnerability CVE-2019-1889
CVE-2019-1889, State: PUBLISHED, Published: 2019-07-04T19:55:11.106733Z, Updated: 2024-11-20T17:16:04.848Z, Description: A vulnerability in the REST API for software device management in Cisco Application Policy Infrastructure Controller (APIC) Software could allow an authenticated, remote attacker to escalate privileges to root on an affected device. The vulnerability is due to incomplete validation and error checking for the file path when specific software is uploaded. An attacker could exploit this vulnerability by uploading malicious software using the REST API. A successful exploit could allow an attacker to escalate their privilege level to root. The attacker would need to have the administrator role on the device., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 7.2, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Techniques related with vulnerability CVE-2018-7494
CVE-2018-7494 in Delta Electronics WPLSoft. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation.
Describe the vulnerability CVE-2019-9791
CVE-2019-9791, State: PUBLISHED, Published: 2019-04-26T16:13:22, Updated: 2024-08-04T22:01:54.733Z, Description: The type inference system allows the compilation of functions that can cause type confusions between arbitrary objects when compiled through the IonMonkey just-in-time (JIT) compiler and when the constructor function is entered through on-stack replacement (OSR). This allows for possible arbitrary reading and writing of objects during an exploitable crash. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2017-3881
CVE-2017-3881 in Cisco IOS and IOS XE Software. Is related with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2009-0824
CVE-2009-0824 in Elaborate Bytes ElbyCDIO.sys 6.0.2.0 and earlier. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2016-2208
CVE-2016-2208, State: PUBLISHED, Published: 2016-05-19T10:00:00, Updated: 2024-08-05T23:24:48.515Z, Description: The kernel component in Symantec Anti-Virus Engine (AVE) 20151.1 before 20151.1.1.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory access violation and system crash) via a malformed PE header file., No CVSS metrics available, Exploit Info: No exploit information available
Describe MITRE technique T0859
MITRE T0859 : Valid Accounts from ics Adversaries may steal the credentials of a specific user or service account using credential access techniques. In some cases, default credentials for control system devices may be publicly available. Compromised credentials may be used to bypass access controls placed on various resources on hosts and within the network, and may even be used for persistent access to remote systems. Compromised and default credentials may also grant an adversary increased privilege to specific systems and devices or access to restricted areas of the network. Adversaries may choose not to use malware or tools, in conjunction with the legitimate access those credentials provide, to make it harder to detect their presence or to control devices and send legitimate commands in an unintended way. Adversaries may also create accounts, sometimes using predefined account names and passwords, to provide a means of backup access for persistence. (Citation: Booz Allen Hamilton) The overlap of credentials and permissions across a network of systems is of concern because the adversary may be able to pivot across accounts and systems to reach a high level of access (i.e., domain or enterprise administrator) and possibly between the enterprise and operational technology environments. Adversaries may be able to leverage valid credentials from one system to gain access to another system.
Describe the vulnerability CVE-2009-0556
CVE-2009-0556, State: PUBLISHED, Published: 2009-04-03T18:00:00, Updated: 2024-08-07T04:40:05.099Z, Description: Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3, and PowerPoint in Microsoft Office 2004 for Mac, allows remote attackers to execute arbitrary code via a PowerPoint file with an OutlineTextRefAtom containing an an invalid index value that triggers memory corruption, as exploited in the wild in April 2009 by Exploit:Win32/Apptom.gen, aka "Memory Corruption Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-11884
CVE-2020-11884, State: PUBLISHED, Published: 2020-04-29T12:07:37, Updated: 2024-08-04T11:42:00.533Z, Description: In the Linux kernel 4.19 through 5.6.7 on the s390 platform, code execution may occur because of a race condition, as demonstrated by code in enable_sacf_uaccess in arch/s390/lib/uaccess.c that fails to protect against a concurrent page table upgrade, aka CID-3f777e19d171. A crash could also occur., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-9488
CVE-2018-9488, State: PUBLISHED, Published: 2018-11-06T17:00:00Z, Updated: 2024-09-17T01:50:46.089Z, Description: In the SELinux permissions of crash_dump.te, there is a permissions bypass due to a missing restriction. This could lead to a local escalation of privilege, with System privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.0 Android-8.1 Android-9.0 Android ID: A-110107376., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-11062
CVE-2018-11062, State: PUBLISHED, Published: 2018-11-02T22:00:00Z, Updated: 2024-09-16T18:04:27.800Z, Description: Integrated Data Protection Appliance versions 2.0, 2.1, and 2.2 contain undocumented accounts named 'support' and 'admin' that are protected with default passwords. These accounts have limited privileges and can access certain system files only. A malicious user with the knowledge of the default passwords may potentially log in to the system and gain read and write access to certain system files., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-0981
CVE-2020-0981, State: PUBLISHED, Published: 2020-04-15T15:13:13, Updated: 2024-08-04T06:18:03.662Z, Description: A security feature bypass vulnerability exists when Windows fails to properly handle token relationships.An attacker who successfully exploited the vulnerability could allow an application with a certain integrity level to execute code at a different integrity level, leading to a sandbox escape.The update addresses the vulnerability by correcting how Windows handles token relationships, aka 'Windows Token Security Feature Bypass Vulnerability'., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-15199
CVE-2020-15199, State: PUBLISHED, Published: 2020-09-25T18:40:20, Updated: 2024-08-04T13:08:22.934Z, Description: In Tensorflow before version 2.3.1, the `RaggedCountSparseOutput` does not validate that the input arguments form a valid ragged tensor. In particular, there is no validation that the `splits` tensor has the minimum required number of elements. Code uses this quantity to initialize a different data structure. Since `BatchedMap` is equivalent to a vector, it needs to have at least one element to not be `nullptr`. If user passes a `splits` tensor that is empty or has exactly one element, we get a `SIGABRT` signal raised by the operating system. The issue is patched in commit 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and is released in TensorFlow version 2.3.1., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 5.9, Base Severity: MEDIUM, Confidentiality Impact: NONE, Integrity Impact: NONE, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2019-11707
CVE-2019-11707 in Firefox ESR. Is related with T1499 : Endpoint Denial of Service.
Techniques related with vulnerability CVE-2019-1942
CVE-2019-1942 in Cisco Identity Services Engine Software. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565.001 : Stored Data Manipulation. Has an exploitation technique T1133 : External Remote Services. Has an exploitation technique T1078 : Valid Accounts.
Describe the vulnerability CVE-2020-1068
CVE-2020-1068, State: PUBLISHED, Published: 2020-05-21T22:52:56, Updated: 2024-08-04T06:25:00.670Z, Description: An elevation of privilege vulnerability exists in Windows Media Service that allows file creation in arbitrary locations.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Microsoft Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1010, CVE-2020-1079., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-7499
CVE-2018-7499, State: PUBLISHED, Published: 2018-05-15T22:00:00Z, Updated: 2024-09-16T20:58:20.098Z, Description: In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, several stack-based buffer overflow vulnerabilities have been identified, which may allow an attacker to execute arbitrary code., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2019-3780
CVE-2019-3780 in Cloud Foundry Container Runtime (CFCR). Has primary impact with T1552.001 : Credentials In Files. Has secondary impact with T1068 : Exploitation for Privilege Escalation.
Techniques related with vulnerability CVE-2018-17934
CVE-2018-17934 in NUUO CMS. Has secondary impact with T1036 : Masquerading. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1203 : Exploitation for Client Execution. Has an exploitation technique T1202 : Indirect Command Execution.
Techniques related with vulnerability CVE-2014-0324
CVE-2014-0324 in Internet Explorer 8. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
Techniques related with vulnerability CVE-2015-2502
CVE-2015-2502 in Internet Explorer 7 through 11. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise.
Techniques related with vulnerability CVE-2020-5295
CVE-2020-5295 in october. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1133 : External Remote Services.
Describe the vulnerability CVE-2017-15919
CVE-2017-15919, State: PUBLISHED, Published: 2017-10-26T18:00:00, Updated: 2024-08-05T20:04:50.491Z, Description: The ultimate-form-builder-lite plugin before 1.3.7 for WordPress has SQL Injection, with resultant PHP Object Injection, via wp-admin/admin-ajax.php., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-11088
CVE-2018-11088, State: PUBLISHED, Published: 2018-09-17T16:00:00Z, Updated: 2024-09-17T03:14:36.305Z, Description: Pivotal Applications Manager in Pivotal Application Service, versions 2.0 prior to 2.0.21 and 2.1 prior to 2.1.13 and 2.2 prior to 2.2.5, contains a bug which may allow escalation of privileges. A space developer with access to the system org may be able to access an artifact which contains the CF admin credential, allowing them to escalate to an admin role., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2014-1807
CVE-2014-1807, State: PUBLISHED, Published: 2014-05-14T10:00:00, Updated: 2024-08-06T09:50:11.304Z, Description: The ShellExecute API in Windows Shell in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly implement file associations, which allows local users to gain privileges via a crafted application, as exploited in the wild in May 2014, aka "Windows Shell File Association Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2019-10980
CVE-2019-10980 in LCDS LAquis SCADA. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Is related with T0873 : Project File Infection. Is related with T1203 : Exploitation for Client Execution.
Techniques related with vulnerability CVE-2019-15288
CVE-2019-15288 in Cisco TelePresence TC Software. Has primary impact with T1608 : Stage Capabilities. Has an exploitation technique T1133 : External Remote Services. Has an exploitation technique T1078 : Valid Accounts.
Techniques related with vulnerability CVE-2019-3762
CVE-2019-3762 in Data Protection Central. Has primary impact with T1553 : Subvert Trust Controls. Has an exploitation technique T1588.004 : Digital Certificates.
Describe the vulnerability CVE-2019-1052
CVE-2019-1052, State: PUBLISHED, Published: 2019-06-12T13:49:41, Updated: 2024-08-04T18:06:31.587Z, Description: A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-11082
CVE-2020-11082 in Kaminari. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link.
Describe the vulnerability CVE-2014-6271
CVE-2014-6271, State: PUBLISHED, Published: 2014-09-24T18:00:00, Updated: 2024-08-06T12:10:13.276Z, Description: GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2010-1592
CVE-2010-1592, State: PUBLISHED, Published: 2010-04-28T23:00:00Z, Updated: 2024-09-17T03:23:14.131Z, Description: sandra.sys 15.18.1.1 and earlier in the Sandra Device Driver in SiSoftware Sandra 16.10.2010.1 and earlier allows local users to gain privileges or cause a denial of service (system crash) via unspecified vectors involving "Model-Specific Registers.", No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2014-2817
CVE-2014-2817, State: PUBLISHED, Published: 2014-08-12T21:00:00, Updated: 2024-08-06T10:28:44.927Z, Description: Microsoft Internet Explorer 6 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2010-1424
CVE-2010-1424, State: PUBLISHED, Published: 2010-04-15T21:12:00Z, Updated: 2024-09-16T18:54:19.892Z, Description: Unspecified vulnerability in JustSystems Ichitaro and Ichitaro Government 2006 through 2010 allows user-assisted remote attackers to execute arbitrary code via a crafted font file., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-15774
CVE-2018-15774, State: PUBLISHED, Published: 2018-12-13T22:00:00Z, Updated: 2024-09-17T01:36:18.120Z, Description: Dell EMC iDRAC7/iDRAC8 versions prior to 2.61.60.60 and iDRAC9 versions prior to 3.20.21.20, 3.21.24.22, 3.21.26.22, and 3.23.23.23 contain a privilege escalation vulnerability. An authenticated malicious iDRAC user with operator privileges could potentially exploit a permissions check flaw in the Redfish interface to gain administrator access., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 3.8, Base Severity: LOW, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-5463
CVE-2018-5463, State: PUBLISHED, Published: 2018-04-09T21:00:00Z, Updated: 2024-09-16T20:26:49.223Z, Description: A structured exception handler overflow vulnerability in Leao Consultoria e Desenvolvimento de Sistemas (LCDS) LTDA ME LAquis SCADA 4.1.0.3391 and earlier may allow code execution., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2016-6909
CVE-2016-6909, State: PUBLISHED, Published: 2016-08-24T16:00:00, Updated: 2024-08-06T01:43:38.599Z, Description: Buffer overflow in the Cookie parser in Fortinet FortiOS 4.x before 4.1.11, 4.2.x before 4.2.13, and 4.3.x before 4.3.9 and FortiSwitch before 3.4.3 allows remote attackers to execute arbitrary code via a crafted HTTP request, aka EGREGIOUSBLUNDER., No CVSS metrics available, Exploit Info: No exploit information available
Describe MITRE technique T1036.005
MITRE T1036.005 : Match Legitimate Name or Location from enterprise Adversaries may match or approximate the name or location of legitimate files or resources when naming/placing them. This is done for the sake of evading defenses and observation. This may be done by placing an executable in a commonly trusted directory (ex: under System32) or giving it the name of a legitimate, trusted program (ex: svchost.exe). In containerized environments, this may also be done by creating a resource in a namespace that matches the naming convention of a container pod or cluster. Alternatively, a file or container image name given may be a close approximation to legitimate programs/images or something innocuous. Adversaries may also use the same icon of the file they are trying to mimic.
Describe the vulnerability CVE-2014-0295
CVE-2014-0295, State: PUBLISHED, Published: 2014-02-12T02:00:00, Updated: 2024-08-06T09:13:09.502Z, Description: VsaVb7rt.dll in Microsoft .NET Framework 2.0 SP2 and 3.5.1 does not implement the ASLR protection mechanism, which makes it easier for remote attackers to execute arbitrary code via a crafted web site, as exploited in the wild in February 2014, aka "VSAVB7RT ASLR Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2019-1736
CVE-2019-1736 in Cisco Identity Services Engine Software. Has primary impact with T1542.001 : System Firmware.
Describe the vulnerability CVE-2020-10257
CVE-2020-10257, State: PUBLISHED, Published: 2020-03-09T23:41:34, Updated: 2024-08-04T10:58:40.181Z, Description: The ThemeREX Addons plugin before 2020-03-09 for WordPress lacks access control on the /trx_addons/v2/get/sc_layout REST API endpoint, allowing for PHP functions to be executed by any users, because includes/plugin.rest-api.php calls trx_addons_rest_get_sc_layout with an unsafe sc parameter., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 9.8, Base Severity: CRITICAL, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-5267
CVE-2020-5267, State: PUBLISHED, Published: 2020-03-19T17:30:16, Updated: 2024-08-04T08:22:09.079Z, Description: In ActionView before versions 6.0.2.2 and 5.2.4.2, there is a possible XSS vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be susceptible to XSS attacks. The issue is fixed in versions 6.0.2.2 and 5.2.4.2., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 4, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: HIGH, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-21091
CVE-2018-21091, State: PUBLISHED, Published: 2020-04-08T13:21:01, Updated: 2024-08-05T12:19:27.644Z, Description: An issue was discovered on Samsung mobile devices with M(6.x) and N(7.x) software. Telecom has a System Crash via abnormal exception handling. The Samsung ID is SVE-2017-10906 (January 2018)., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-8355
CVE-2018-8355, State: PUBLISHED, Published: 2018-08-15T17:00:00, Updated: 2024-08-05T06:54:35.502Z, Description: A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge. This CVE ID is unique from CVE-2018-8353, CVE-2018-8359, CVE-2018-8371, CVE-2018-8372, CVE-2018-8373, CVE-2018-8385, CVE-2018-8389, CVE-2018-8390., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2019-0797
CVE-2019-0797 in Windows Server. Is related with T1608 : Stage Capabilities.
Describe MITRE technique T1098
MITRE T1098 : Account Manipulation from enterprise Adversaries may manipulate accounts to maintain and/or elevate access to victim systems. Account manipulation may consist of any action that preserves or modifies adversary access to a compromised account, such as modifying credentials or permission groups.(Citation: FireEye SMOKEDHAM June 2021) These actions could also include account activity designed to subvert security policies, such as performing iterative password updates to bypass password duration policies and preserve the life of compromised credentials. In order to create or manipulate accounts, the adversary must already have sufficient permissions on systems or the domain. However, account manipulation may also lead to privilege escalation where modifications grant access to additional roles, permissions, or higher-privileged [Valid Accounts](T1078).
Techniques related with vulnerability CVE-2014-4148
CVE-2014-4148 in win32k.sys in the kernel-mode drivers in Microsoft Windows. Is related with T1505 : Server Software Component. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1136 : Create Account. Is related with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2017-0149
CVE-2017-0149 in Internet Explorer. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise.
Describe the vulnerability CVE-2019-6340
CVE-2019-6340, State: PUBLISHED, Published: 2019-02-21T21:00:00, Updated: 2024-08-04T20:16:24.806Z, Description: Some field types do not properly sanitize data from non-form sources in Drupal 8.5.x before 8.5.11 and Drupal 8.6.x before 8.6.10. This can lead to arbitrary PHP code execution in some cases. A site is only affected by this if one of the following conditions is met: The site has the Drupal 8 core RESTful Web Services (rest) module enabled and allows PATCH or POST requests, or the site has another web services module enabled, like JSON:API in Drupal 8, or Services or RESTful Web Services in Drupal 7. (Note: The Drupal 7 Services module itself does not require an update at this time, but you should apply other contributed updates associated with this advisory if Services is in use.), No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2018-8431
CVE-2018-8431 in Microsoft SharePoint Server. Has primary impact with T1190 : Exploit Public-Facing Application. Has secondary impact with T1565 : Data Manipulation.
Describe the vulnerability CVE-2015-1494
CVE-2015-1494, State: PUBLISHED, Published: 2015-02-17T15:00:00, Updated: 2024-08-06T04:47:16.217Z, Description: The FancyBox for WordPress plugin before 3.0.3 for WordPress does not properly restrict access, which allows remote attackers to conduct cross-site scripting (XSS) attacks via an mfbfw[*] parameter in an update action to wp-admin/admin-post.php, as demonstrated by the mfbfw[padding] parameter and exploited in the wild in February 2015., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2018-21091
CVE-2018-21091 in Samsung mobile devices with M(6.x) and N(7.x) software. Is related with T1499.004 : Application or System Exploitation.
Describe the vulnerability CVE-2020-3476
CVE-2020-3476, State: PUBLISHED, Published: 2020-09-24T17:52:53.009720Z, Updated: 2024-11-13T17:57:51.685Z, Description: A vulnerability in the CLI implementation of a specific command of Cisco IOS XE Software could allow an authenticated, local attacker to overwrite arbitrary files in the underlying host file system. The vulnerability is due to insufficient validation of the parameters of a specific CLI command. An attacker could exploit this vulnerability by issuing that command with specific parameters. A successful exploit could allow the attacker to overwrite the content of any arbitrary file that resides on the underlying host file system., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: NONE, Base Score: 4.4, Base Severity: MEDIUM, Confidentiality Impact: NONE, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Techniques related with vulnerability CVE-2019-1612
CVE-2019-1612 in Nexus 3000 Series Switches. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1078 : Valid Accounts. Has an exploitation technique T1133 : External Remote Services.
Techniques related with vulnerability CVE-2020-0898
CVE-2020-0898 in Windows. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation.
Describe the vulnerability CVE-2020-8467
CVE-2020-8467, State: PUBLISHED, Published: 2020-03-18T00:30:43, Updated: 2024-08-04T10:03:44.669Z, Description: A migration tool component of Trend Micro Apex One (2019) and OfficeScan XG contains a vulnerability which could allow remote attackers to execute arbitrary code on affected installations (RCE). An attempted attack requires user authentication., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-5241
CVE-2020-5241 in matestack-ui-core. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1185 : Man in the Browser.
Techniques related with vulnerability CVE-2020-1495
CVE-2020-1495 in Microsoft SharePoint Server 2010 Service Pack 2. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation. Has secondary impact with T1485 : Data Destruction. Has secondary impact with T1136 : Create Account. Has an exploitation technique T1204.002 : Malicious File. Has an exploitation technique T1566 : Phishing.
Techniques related with vulnerability CVE-2018-17908
CVE-2018-17908 in WebAccess Versions 8.3.2 and prior.. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1562 : Impair Defenses.
Techniques related with vulnerability CVE-2018-7500
CVE-2018-7500 in OSIsoft PI Web API. Has primary impact with T1068 : Exploitation for Privilege Escalation.
Describe the vulnerability CVE-2019-1941
CVE-2019-1941, State: PUBLISHED, Published: 2019-07-17T20:25:21.284984Z, Updated: 2024-09-16T22:50:34.239Z, Description: A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. At the time of publication, this vulnerability affected Cisco ISE running software releases prior to 2.4.0 Patch 9 and 2.6.0., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 6.1, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: NONE, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Describe MITRE technique T1575
MITRE T1575 : Native API from mobile Adversaries may use Android’s Native Development Kit (NDK) to write native functions that can achieve execution of binaries or functions. Like system calls on a traditional desktop operating system, native code achieves execution on a lower level than normal Android SDK calls. The NDK allows developers to write native code in C or C++ that is compiled directly to machine code, avoiding all intermediate languages and steps in compilation that higher level languages, like Java, typically have. The Java Native Interface (JNI) is the component that allows Java functions in the Android app to call functions in a native library.(Citation: Google NDK Getting Started) Adversaries may also choose to use native functions to execute malicious code since native actions are typically much more difficult to analyze than standard, non-native behaviors.(Citation: MITRE App Vetting Effectiveness)
Describe the vulnerability CVE-2017-11826
CVE-2017-11826, State: PUBLISHED, Published: 2017-10-13T13:00:00Z, Updated: 2024-09-16T16:32:32.176Z, Description: Microsoft Office 2010, SharePoint Enterprise Server 2010, SharePoint Server 2010, Web Applications, Office Web Apps Server 2010 and 2013, Word Viewer, Word 2007, 2010, 2013 and 2016, Word Automation Services, and Office Online Server allow remote code execution when the software fails to properly handle objects in memory., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2009-0556
CVE-2009-0556 in Microsoft Office PowerPoint. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File.
Techniques related with vulnerability CVE-2020-3513
CVE-2020-3513 in Cisco IOS XE Software. Has primary impact with T1542.004 : ROMMONkit. Has an exploitation technique T1078 : Valid Accounts.
Describe the vulnerability CVE-2019-1942
CVE-2019-1942, State: PUBLISHED, Published: 2019-07-17T20:25:14.603542Z, Updated: 2024-09-17T03:49:07.951Z, Description: A vulnerability in the sponsor portal web interface for Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to impact the integrity of an affected system by executing arbitrary SQL queries. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted input that includes SQL statements to an affected system. A successful exploit could allow the attacker to modify entries in some database tables, affecting the integrity of the data. At the time of publication, this vulnerability affected Cisco ISE running software releases 2.6.0 and prior., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 4.3, Base Severity: MEDIUM, Confidentiality Impact: NONE, Integrity Impact: LOW, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Techniques related with vulnerability CVE-2020-10257
CVE-2020-10257 in ThemeREX Addons plugin before 2020-03-09 for WordPress. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise.
Techniques related with vulnerability CVE-2018-8611
CVE-2018-8611 in Windows 7. Is related with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2019-3719
CVE-2019-3719 in SupportAssist Client. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1204.002 : Malicious File.
Describe the vulnerability CVE-2012-6081
CVE-2012-6081, State: PUBLISHED, Published: 2013-01-03T01:00:00, Updated: 2024-08-06T21:21:28.522Z, Description: Multiple unrestricted file upload vulnerabilities in the (1) twikidraw (action/twikidraw.py) and (2) anywikidraw (action/anywikidraw.py) actions in MoinMoin before 1.9.6 allow remote authenticated users with write permissions to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory, as exploited in the wild in July 2012., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-12000
CVE-2020-12000, State: PUBLISHED, Published: 2020-06-09T17:54:03, Updated: 2024-08-04T11:48:57.852Z, Description: The affected product is vulnerable to the handling of serialized data. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data on the Ignition 8 Gateway (versions prior to 8.0.10) and Ignition 7 Gateway (versions prior to 7.9.14), allowing an attacker to obtain sensitive information., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-3775
CVE-2019-3775, State: PUBLISHED, Published: 2019-03-07T19:00:00Z, Updated: 2024-09-16T22:31:19.423Z, Description: Cloud Foundry UAA, versions prior to v70.0, allows a user to update their own email address. A remote authenticated user can impersonate a different user by changing their email address to that of a different user., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 7.1, Base Severity: HIGH, Confidentiality Impact: LOW, Integrity Impact: HIGH, Privileges Required: LOW, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-11048
CVE-2018-11048, State: PUBLISHED, Published: 2018-08-10T20:00:00Z, Updated: 2024-09-17T01:56:30.207Z, Description: Dell EMC Data Protection Advisor, versions 6.2, 6,3, 6.4, 6.5 and Dell EMC Integrated Data Protection Appliance (IDPA) versions 2.0, 2.1 contain a XML External Entity (XXE) Injection vulnerability in the REST API. An authenticated remote malicious user could potentially exploit this vulnerability to read certain system files in the server or cause denial of service by supplying specially crafted Document Type Definitions (DTDs) in an XML request., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-3778
CVE-2019-3778, State: PUBLISHED, Published: 2019-03-07T19:00:00Z, Updated: 2024-09-16T20:57:23.699Z, Description: Spring Security OAuth, versions 2.3 prior to 2.3.5, and 2.2 prior to 2.2.4, and 2.1 prior to 2.1.4, and 2.0 prior to 2.0.17, and older unsupported versions could be susceptible to an open redirector attack that can leak an authorization code. A malicious user or attacker can craft a request to the authorization endpoint using the authorization code grant type, and specify a manipulated redirection URI via the "redirect_uri" parameter. This can cause the authorization server to redirect the resource owner user-agent to a URI under the control of the attacker with the leaked authorization code. This vulnerability exposes applications that meet all of the following requirements: Act in the role of an Authorization Server (e.g. @EnableAuthorizationServer) and uses the DefaultRedirectResolver in the AuthorizationEndpoint. This vulnerability does not expose applications that: Act in the role of an Authorization Server and uses a different RedirectResolver implementation other than DefaultRedirectResolver, act in the role of a Resource Server only (e.g. @EnableResourceServer), act in the role of a Client only (e.g. @EnableOAuthClient)., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-5231
CVE-2020-5231 in opencast. Has primary impact with T1078.001 : Default Accounts. Has secondary impact with T1136 : Create Account.
Describe the vulnerability CVE-2011-3192
CVE-2011-3192, State: PUBLISHED, Published: 2011-08-29T15:00:00, Updated: 2024-08-06T23:29:55.461Z, Description: The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-1579
CVE-2019-1579, State: PUBLISHED, Published: 2019-07-19T21:12:19, Updated: 2024-08-04T18:20:28.309Z, Description: Remote Code Execution in PAN-OS 7.1.18 and earlier, PAN-OS 8.0.11-h1 and earlier, and PAN-OS 8.1.2 and earlier with GlobalProtect Portal or GlobalProtect Gateway Interface enabled may allow an unauthenticated remote attacker to execute arbitrary code., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2016-0728
CVE-2016-0728 in Linux kernel before 4.4.1. Is related with T1608 : Stage Capabilities.
Describe the vulnerability CVE-2020-9819
CVE-2020-9819, State: PUBLISHED, Published: 2020-06-09T16:12:28, Updated: 2024-08-04T10:43:05.138Z, Description: A memory consumption issue was addressed with improved memory handling. This issue is fixed in iOS 13.5 and iPadOS 13.5, iOS 12.4.7, watchOS 6.2.5, watchOS 5.3.7. Processing a maliciously crafted mail message may lead to heap corruption., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-15466
CVE-2018-15466, State: PUBLISHED, Published: 2019-01-11T15:00:00Z, Updated: 2024-11-19T19:17:55.725Z, Description: A vulnerability in the Graphite web interface of the Policy and Charging Rules Function (PCRF) of Cisco Policy Suite (CPS) could allow an unauthenticated, remote attacker to access the Graphite web interface. The attacker would need to have access to the internal VLAN where CPS is deployed. The vulnerability is due to lack of authentication. An attacker could exploit this vulnerability by directly connecting to the Graphite web interface. An exploit could allow the attacker to access various statistics and Key Performance Indicators (KPIs) regarding the Cisco Policy Suite environment., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 5.3, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: NONE, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Techniques related with vulnerability CVE-2020-12652
CVE-2020-12652 in Linux kernel before 5.4.14. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1499.004 : Application or System Exploitation.
Techniques related with vulnerability CVE-2019-3708
CVE-2019-3708 in Dell EMC IsilonSD Management Server. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1185 : Man in the Browser. Has an exploitation technique T1204.001 : Malicious Link.