input stringlengths 30 54 | output stringlengths 69 4.21k |
|---|---|
Describe the vulnerability CVE-2018-11051 | CVE-2018-11051, State: PUBLISHED, Published: 2018-07-03T17:00:00Z, Updated: 2024-09-16T21:08:18.669Z, Description: RSA Certificate Manager Versions 6.9 build 560 through 6.9 build 564 contain a path traversal vulnerability in the RSA CMP Enroll Server and the RSA REST Enroll Server. A remote unauthenticated attacker co... |
Techniques related with vulnerability CVE-2018-20062 | CVE-2018-20062 in ThinkPHP web framework. Is related with T1203 : Exploitation for Client Execution. Is related with T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2018-15462 | CVE-2018-15462, State: PUBLISHED, Published: 2019-05-03T14:45:32.295663Z, Updated: 2024-11-19T19:10:03.042Z, Description: A vulnerability in the TCP ingress handler for the data interfaces that are configured with management access to Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote ... |
Techniques related with vulnerability CVE-2018-19007 | CVE-2018-19007 in DDNS configuration in Geutebrueck GmbH E2 Camera Series. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1133 : External Remote Services. |
Techniques related with vulnerability CVE-2017-7533 | CVE-2017-7533 in Linux kernel through 4.12.4. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1499 : Endpoint Denial of Service. |
Techniques related with vulnerability CVE-2016-5180 | CVE-2016-5180 in c-ares 1.x before 1.12.0. Is related with T1133 : External Remote Services. Is related with T1203 : Exploitation for Client Execution. Is related with T1499.004 : Application or System Exploitation. |
Techniques related with vulnerability CVE-2020-7456 | CVE-2020-7456 in FreeBSD. Is related with T1091 : Replication Through Removable Media. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2020-11090 | CVE-2020-11090, State: PUBLISHED, Published: 2020-06-11T00:05:14, Updated: 2024-08-04T11:21:14.678Z, Description: In Indy Node 1.12.2, there is an Uncontrolled Resource Consumption vulnerability. Indy Node has a bug in TAA handling code. The current primary can be crashed with a malformed transaction from a client, whi... |
Describe the vulnerability CVE-2010-0480 | CVE-2010-0480, State: PUBLISHED, Published: 2010-04-14T15:44:00, Updated: 2024-08-07T00:52:19.320Z, Description: Multiple stack-based buffer overflows in the MPEG Layer-3 audio codecs in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allow remote atta... |
Describe the vulnerability CVE-2020-5252 | CVE-2020-5252, State: PUBLISHED, Published: 2020-03-23T23:05:16, Updated: 2024-08-04T08:22:09.086Z, Description: The command-line "safety" package for Python has a potential security issue. There are two Python characteristics that allow malicious code to “poison-pill” command-line Safety package detection routines by ... |
Techniques related with vulnerability CVE-2014-8551 | CVE-2014-8551 in WinCC server in Siemens SIMATIC. Is related with T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2012-3213 | CVE-2012-3213, State: PUBLISHED, Published: 2013-02-02T00:00:00, Updated: 2024-08-06T19:57:50.304Z, Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and avail... |
Describe the vulnerability CVE-2020-15393 | CVE-2020-15393, State: PUBLISHED, Published: 2020-06-29T21:58:55, Updated: 2024-08-04T13:15:20.679Z, Description: In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770., No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2015-7935 | CVE-2015-7935, State: PUBLISHED, Published: 2015-12-23T02:00:00, Updated: 2024-08-06T08:06:31.269Z, Description: Motorola Solutions MOSCAD IP Gateway allows remote attackers to read arbitrary files via unspecified vectors., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2019-0604 | CVE-2019-0604 in Microsoft SharePoint Server. Is related with T1190 : Exploit Public-Facing Application. Is related with T1499.004 : Application or System Exploitation. |
Describe MITRE technique T1554 | MITRE T1554 : Compromise Host Software Binary from enterprise Adversaries may modify host software binaries to establish persistent access to systems. Software binaries/executables provide a wide range of system commands or services, programs, and libraries. Common software binaries are SSH clients, FTP clients, email ... |
Techniques related with vulnerability CVE-2020-3292 | CVE-2020-3292 in Cisco Small Business RV Series Router Firmware. Has primary impact with T1499.004 : Application or System Exploitation. Has secondary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1190 : Exploit Public-Facing Application. Has an exploitation technique T1078 : Val... |
Describe the vulnerability CVE-2017-10910 | CVE-2017-10910, State: PUBLISHED, Published: 2017-12-27T18:00:00, Updated: 2024-08-05T17:50:12.585Z, Description: MQTT.js 2.x.x prior to 2.15.0 issue in handling PUBLISH tickets may lead to an attacker causing a denial-of-service condition., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2019-0609 | CVE-2019-0609 in Internet Explorer 11. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation. Has secondary impact with T1485 : Data Dest... |
Describe the vulnerability CVE-2011-4106 | CVE-2011-4106, State: PUBLISHED, Published: 2013-10-26T16:00:00Z, Updated: 2024-09-16T22:09:33.905Z, Description: TimThumb (timthumb.php) before 2.0 does not validate the entire source with the domain white list, which allows remote attackers to upload and execute arbitrary code via a URL containing a white-listed doma... |
Techniques related with vulnerability CVE-2015-2509 | CVE-2015-2509 in Windows Media Center. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2019-6703 | CVE-2019-6703, State: PUBLISHED, Published: 2019-01-27T02:00:00, Updated: 2024-08-04T20:31:04.133Z, Description: Incorrect access control in migla_ajax_functions.php in the Calmar Webmedia Total Donations plugin through 2.0.5 for WordPress allows unauthenticated attackers to update arbitrary WordPress option values, le... |
Techniques related with vulnerability CVE-2020-11090 | CVE-2020-11090 in Indy Node. Has primary impact with T1499.004 : Application or System Exploitation. |
Techniques related with vulnerability CVE-2019-3706 | CVE-2019-3706 in iDRAC. Has primary impact with T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2015-2425 | CVE-2015-2425, State: PUBLISHED, Published: 2015-07-14T21:00:00, Updated: 2024-08-06T05:17:26.135Z, Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerabilit... |
Techniques related with vulnerability CVE-2020-5371 | CVE-2020-5371 in Isilon OneFS. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has secondary impact with T1005 : Data from Local System. |
Describe the vulnerability CVE-2020-11652 | CVE-2020-11652, State: PUBLISHED, Published: 2020-04-30T17:00:03, Updated: 2024-08-04T11:35:13.485Z, Description: An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow a... |
Techniques related with vulnerability CVE-2019-6549 | CVE-2019-6549 in PR100088 Modbus gateway. Has primary impact with T1552 : Unsecured Credentials. Has secondary impact with T1078 : Valid Accounts. |
Techniques related with vulnerability CVE-2020-8648 | CVE-2020-8648 in Linux kernel through 5.5.2. Is related with T1499.004 : Application or System Exploitation. |
Describe the vulnerability CVE-2019-3719 | CVE-2019-3719, State: PUBLISHED, Published: 2019-04-18T19:58:22.916438Z, Updated: 2024-09-16T18:40:02.152Z, Description: Dell SupportAssist Client versions prior to 3.2.0.90 contain a remote code execution vulnerability. An unauthenticated attacker, sharing the network access layer with the vulnerable system, can compr... |
Describe the vulnerability CVE-2019-15972 | CVE-2019-15972, State: PUBLISHED, Published: 2019-11-26T03:42:26.244377Z, Updated: 2024-09-16T18:28:39.685Z, Description: A vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. Th... |
Techniques related with vulnerability CVE-2020-3244 | CVE-2020-3244 in Cisco ASR 5000 Series Software. Has primary impact with T1211 : Exploitation for Defense Evasion. Has an exploitation technique T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2020-11957 | CVE-2020-11957, State: PUBLISHED, Published: 2020-06-09T18:26:54, Updated: 2024-08-04T11:42:00.828Z, Description: The Bluetooth Low Energy implementation in Cypress PSoC Creator BLE 4.2 component versions before 3.64 generates a random number (Pairing Random) with significantly less entropy than the specified 128 bits ... |
Techniques related with vulnerability CVE-2012-2520 | CVE-2012-2520 in Microsoft InfoPath, Communicator, Lync and Attendee, Office Web Apps and SharePoint (Server, Services and Foundation). Is related with T1190 : Exploit Public-Facing Application. |
Describe MITRE technique T1552 | MITRE T1552 : Unsecured Credentials from enterprise Adversaries may search compromised systems to find and obtain insecurely stored credentials. These credentials can be stored and/or misplaced in many locations on a system, including plaintext files (e.g. [Bash History](T1552.003)), operating system or application-spe... |
Techniques related with vulnerability CVE-2017-0213 | CVE-2017-0213 in Windows COM. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1211 : Exploitation for Defense Evasion. |
Techniques related with vulnerability CVE-2016-3351 | CVE-2016-3351 in Internet Explorer 9 through 11. Is related with T1518 : Software Discovery. |
Describe the vulnerability CVE-2017-0149 | CVE-2017-0149, State: PUBLISHED, Published: 2017-03-17T00:00:00, Updated: 2024-08-05T12:55:18.610Z, Description: Microsoft Internet Explorer 9 through 11 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vul... |
Describe the vulnerability CVE-2019-15974 | CVE-2019-15974, State: PUBLISHED, Published: 2020-09-23T00:27:08.661193Z, Updated: 2024-11-13T18:03:26.814Z, Description: A vulnerability in the web interface of Cisco Managed Services Accelerator (MSX) could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due ... |
Techniques related with vulnerability CVE-2015-2360 | CVE-2015-2360 in Microsoft Windows up to Vista. Is related with T1068 : Exploitation for Privilege Escalation. |
Describe the vulnerability CVE-2014-6352 | CVE-2014-6352, State: PUBLISHED, Published: 2014-10-22T14:00:00, Updated: 2024-08-06T12:10:13.396Z, Description: Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrar... |
Describe the vulnerability CVE-2020-3137 | CVE-2020-3137, State: PUBLISHED, Published: 2020-09-23T00:25:25.993278Z, Updated: 2024-11-13T18:06:49.148Z, Description: A vulnerability in the web-based management interface of Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a ... |
Techniques related with vulnerability CVE-2018-15401 | CVE-2018-15401 in Cisco Hosted Collaboration Mediation Fulfillment. Has primary impact with T1608 : Stage Capabilities. Has an exploitation technique T1204.001 : Malicious Link. |
Techniques related with vulnerability CVE-2017-0263 | CVE-2017-0263 in Microsoft Windows. Is related with T1068 : Exploitation for Privilege Escalation. |
Describe the vulnerability CVE-2019-0880 | CVE-2019-0880, State: PUBLISHED, Published: 2019-07-15T18:56:19, Updated: 2024-08-04T17:58:59.909Z, Description: A local elevation of privilege vulnerability exists in how splwow64.exe handles certain calls, aka 'Microsoft splwow64 Elevation of Privilege Vulnerability'., No CVSS metrics available, Exploit Info: No expl... |
Techniques related with vulnerability CVE-2018-2628 | CVE-2018-2628 in WebLogic Server. Is related with T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2019-10149 | CVE-2019-10149 in exim. Is related with T1203 : Exploitation for Client Execution. Is related with T1190 : Exploit Public-Facing Application. |
Describe MITRE technique T1110 | MITRE T1110 : Brute Force from enterprise Adversaries may use brute force techniques to gain access to accounts when passwords are unknown or when password hashes are obtained.(Citation: TrendMicro Pawn Storm Dec 2020) Without knowledge of the password for an account or set of accounts, an adversary may systematically ... |
Describe the vulnerability CVE-2013-2471 | CVE-2013-2471, State: PUBLISHED, Published: 2013-06-18T22:00:00, Updated: 2024-08-06T15:36:46.547Z, Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attac... |
Techniques related with vulnerability CVE-2015-6585 | CVE-2015-6585 in Hangul Word Processor. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File. |
Describe MITRE technique T1055 | MITRE T1055 : Process Injection from enterprise Adversaries may inject code into processes in order to evade process-based defenses as well as possibly elevate privileges. Process injection is a method of executing arbitrary code in the address space of a separate live process. Running code in the context of another pr... |
Techniques related with vulnerability CVE-2020-15183 | CVE-2020-15183 in soycms. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1185 : Man in the Browser. |
Describe the vulnerability CVE-2017-5638 | CVE-2017-5638, State: PUBLISHED, Published: 2017-03-11T02:11:00, Updated: 2024-08-05T15:04:15.370Z, Description: The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote at... |
Describe the vulnerability CVE-2020-15233 | CVE-2020-15233, State: PUBLISHED, Published: 2020-10-02T20:40:17, Updated: 2024-08-04T13:08:22.914Z, Description: ORY Fosite is a security first OAuth2 & OpenID Connect framework for Go. In Fosite from version 0.30.2 and before version 0.34.1, there is an issue in which an an attacker can override the registered redire... |
Describe the vulnerability CVE-2018-7602 | CVE-2018-7602, State: PUBLISHED, Published: 2018-07-19T17:00:00Z, Updated: 2024-09-17T01:56:23.121Z, Description: A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in th... |
Describe MITRE technique T1404 | MITRE T1404 : Exploitation for Privilege Escalation from mobile Adversaries may exploit software vulnerabilities in order to elevate privileges. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in an application, service, within the operating system software, or ... |
Techniques related with vulnerability CVE-2014-6278 | CVE-2014-6278 in GNU Bash through 4.3 bash43-026. Is related with T1190 : Exploit Public-Facing Application. Is related with T1203 : Exploitation for Client Execution. |
Describe MITRE technique T1105 | MITRE T1105 : Ingress Tool Transfer from enterprise Adversaries may transfer tools or other files from an external system into a compromised environment. Tools or files may be copied from an external adversary-controlled system to the victim network through the command and control channel or through alternate protocols... |
Techniques related with vulnerability CVE-2018-8248 | CVE-2018-8248 in Microsoft Office. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation. Has secondary impact with T1485 : Data Destruct... |
Techniques related with vulnerability CVE-2019-15972 | CVE-2019-15972 in Cisco Unified Communications Manager. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565.001 : Stored Data Manipulation. Has an exploitation technique T1133 : External Remote Services. Has an expl... |
Techniques related with vulnerability CVE-2020-1109 | CVE-2020-1109 in Windows. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation. Has secondary impact with T1485 : Data Destruction. Has ... |
Describe the vulnerability CVE-2020-13125 | CVE-2020-13125, State: PUBLISHED, Published: 2020-05-17T00:39:00, Updated: 2024-08-04T12:11:19.263Z, Description: An issue was discovered in the "Ultimate Addons for Elementor" plugin before 1.24.2 for WordPress, as exploited in the wild in May 2020 in conjunction with CVE-2020-13126. Unauthenticated attackers can crea... |
Describe the vulnerability CVE-2020-5270 | CVE-2020-5270, State: PUBLISHED, Published: 2020-04-20T16:45:15, Updated: 2024-08-04T08:22:09.085Z, Description: In PrestaShop between versions 1.7.6.0 and 1.7.6.5, there is an open redirection when using back parameter. The impacts can be many, and vary from the theft of information and credentials to the redirection ... |
Describe the vulnerability CVE-2018-19833 | CVE-2018-19833, State: PUBLISHED, Published: 2019-12-31T15:06:46, Updated: 2024-08-05T11:44:20.641Z, Description: The owned function of a smart contract implementation for DDQ, an tradable Ethereum ERC20 token, allows attackers to change the owner of the contract, because the function does not check the caller's identi... |
Describe the vulnerability CVE-2019-16784 | CVE-2019-16784, State: PUBLISHED, Published: 2020-01-14T20:10:12, Updated: 2024-08-05T01:24:48.332Z, Description: In PyInstaller before version 3.6, only on Windows, a local privilege escalation vulnerability is present in this particular case: If a software using PyInstaller in "onefile" mode is launched by a privileg... |
Techniques related with vulnerability CVE-2020-8468 | CVE-2020-8468 in Trend Micro OfficeScan, Trend Micro Apex One, Trend Micro Worry-Free Business Security (WFBS). Is related with T1211 : Exploitation for Defense Evasion. |
Describe the vulnerability CVE-2019-16782 | CVE-2019-16782, State: PUBLISHED, Published: 2019-12-18T19:05:14, Updated: 2024-08-05T01:24:48.031Z, Description: There's a possible information leak / session hijack vulnerability in Rack (RubyGem rack). This vulnerability is patched in versions 1.6.12 and 2.0.8. Attackers may be able to find and hijack sessions by us... |
Describe the vulnerability CVE-2019-1860 | CVE-2019-1860, State: PUBLISHED, Published: 2019-05-16T01:20:14.607283Z, Updated: 2024-09-16T17:07:57.505Z, Description: A vulnerability in the dashboard gadget rendering of Cisco Unified Intelligence Center could allow an unauthenticated, remote attacker to obtain or manipulate sensitive information between a user&rsq... |
Describe MITRE technique T1078.003 | MITRE T1078.003 : Local Accounts from enterprise Adversaries may obtain and abuse credentials of a local account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Local accounts are those configured by an organization for use by users, remote support, services, or for administ... |
Describe the vulnerability CVE-2014-0050 | CVE-2014-0050, State: PUBLISHED, Published: 2014-03-28T19:00:00, Updated: 2024-08-06T09:05:38.958Z, Description: MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumptio... |
Techniques related with vulnerability CVE-2017-0261 | CVE-2017-0261 in Microsoft Office. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File. |
Describe the vulnerability CVE-2015-2387 | CVE-2015-2387, State: PUBLISHED, Published: 2015-07-14T22:00:00, Updated: 2024-08-06T05:10:16.200Z, Description: ATMFD.DLL in the Adobe Type Manager Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold an... |
Describe MITRE technique T1499.002 | MITRE T1499.002 : Service Exhaustion Flood from enterprise Adversaries may target the different network services provided by systems to conduct a denial of service (DoS). Adversaries often target the availability of DNS and web services, however others have been targeted as well.(Citation: Arbor AnnualDoSreport Jan 201... |
Techniques related with vulnerability CVE-2017-11826 | CVE-2017-11826 in Microsoft Office. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File. |
Techniques related with vulnerability CVE-2019-1831 | CVE-2019-1831 in Cisco Email Security Appliance (ESA). Has primary impact with T1036 : Masquerading. Has secondary impact with T1566 : Phishing. |
Describe the vulnerability CVE-2012-1856 | CVE-2012-1856, State: PUBLISHED, Published: 2012-08-15T01:00:00, Updated: 2024-08-06T19:08:38.625Z, Description: The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office 2003 SP3, Office 2003 Web Components SP3, Office 2007 SP2 and SP3, Office 2010 SP1, SQL Server 2000 SP4, SQL Server 200... |
Describe the vulnerability CVE-2018-8414 | CVE-2018-8414, State: PUBLISHED, Published: 2018-08-15T17:00:00, Updated: 2024-08-05T06:54:36.389Z, Description: A remote code execution vulnerability exists when the Windows Shell does not properly validate file paths, aka "Windows Shell Remote Code Execution Vulnerability." This affects Windows 10 Servers, Windows 10... |
Techniques related with vulnerability CVE-2020-11030 | CVE-2020-11030 in WordPress. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link. |
Describe the vulnerability CVE-2020-5225 | CVE-2020-5225, State: PUBLISHED, Published: 2020-01-24T20:55:14, Updated: 2024-08-04T08:22:08.946Z, Description: Log injection in SimpleSAMLphp before version 1.18.4. The www/erroreport.php script, which receives error reports and sends them via email to the system administrator, did not properly sanitize the report id... |
Describe the vulnerability CVE-2018-2628 | CVE-2018-2628, State: PUBLISHED, Published: 2018-04-19T02:00:00, Updated: 2024-10-03T18:35:26.033Z, Description: Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easi... |
Techniques related with vulnerability CVE-2013-3900 | CVE-2013-3900 in Windows Authenticode signature verification for portable executable (PE) files. Is related with T1190 : Exploit Public-Facing Application. Is related with T1539 : Steal Web Session Cookie. |
Describe the vulnerability CVE-2013-4335 | CVE-2013-4335, State: PUBLISHED, Published: 2020-02-07T14:06:16, Updated: 2024-08-06T16:38:02.022Z, Description: opOpenSocialPlugin 0.8.2.1, > 0.9.9.2, 0.9.13, 1.2.6: Multiple XML External Entity Injection Vulnerabilities, No CVSS metrics available, Exploit Info: No exploit information available |
Describe MITRE technique T1562 | MITRE T1562 : Impair Defenses from enterprise Adversaries may maliciously modify components of a victim environment in order to hinder or disable defensive mechanisms. This not only involves impairing preventative defenses, such as firewalls and anti-virus, but also detection capabilities that defenders can use to audi... |
Techniques related with vulnerability CVE-2020-11083 | CVE-2020-11083 in October. Has secondary impact with T1185 : Man in the Browser. |
Techniques related with vulnerability CVE-2018-8833 | CVE-2018-8833 in Advantech WebAccess HMI Designer. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2019-15958 | CVE-2019-15958 in Cisco Prime Infrastructure. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2020-5297 | CVE-2020-5297 in october. Has primary impact with T1505.003 : Web Shell. Has secondary impact with T1059 : Command and Scripting Interpreter. |
Techniques related with vulnerability CVE-2014-1809 | CVE-2014-1809 in Microsoft Office. Is related with T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2014-7235 | CVE-2014-7235, State: PUBLISHED, Published: 2014-10-07T14:00:00, Updated: 2024-08-06T12:40:19.297Z, Description: htdocs_ari/includes/login.php in the ARI Framework module/Asterisk Recording Interface (ARI) in FreePBX before 2.9.0.9, 2.10.x, and 2.11 before 2.11.1.5 allows remote attackers to execute arbitrary code via ... |
Describe the vulnerability CVE-2013-7372 | CVE-2013-7372, State: PUBLISHED, Published: 2014-04-29T20:00:00Z, Updated: 2024-09-17T02:33:10.764Z, Description: The engineNextBytes function in classlib/modules/security/src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1PRNG_SecureRandomImpl.java in the SecureRandom implementation in Apache Harmony... |
Techniques related with vulnerability CVE-2018-14781 | CVE-2018-14781 in Medtronic insulin pump. Has primary impact with T1190 : Exploit Public-Facing Application. Has an exploitation technique T1040 : Network Sniffing. |
Techniques related with vulnerability CVE-2019-13527 | CVE-2019-13527 in Rockwell Automation Arena Simulation Software Cat. 9502-Ax, Versions 16.00.00 and earlier. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2020-8649 | CVE-2020-8649, State: PUBLISHED, Published: 2020-02-06T00:06:25, Updated: 2024-08-04T10:03:46.293Z, Description: There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c., No CVSS metrics available, Exploit Info: No exploit informat... |
Describe the vulnerability CVE-2019-16302 | CVE-2019-16302, State: PUBLISHED, Published: 2020-02-20T21:44:19, Updated: 2024-08-05T01:10:41.669Z, Description: An issue was discovered in Open Network Operating System (ONOS) 1.14. In the Ethernet VPN application (org.onosproject.evpnopenflow), the host event listener does not handle the following event types: HOST_... |
Techniques related with vulnerability CVE-2018-11073 | CVE-2018-11073 in Authentication Manager. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1185 : Man in the Browser. Has an exploitation technique T1189 : Drive-by Compromise. |
Describe the vulnerability CVE-2013-0631 | CVE-2013-0631, State: PUBLISHED, Published: 2013-01-09T01:00:00, Updated: 2024-08-06T14:33:05.333Z, Description: Adobe ColdFusion 9.0, 9.0.1, and 9.0.2 allows attackers to obtain sensitive information via unspecified vectors, as exploited in the wild in January 2013., No CVSS metrics available, Exploit Info: No exploit... |
Describe the vulnerability CVE-2019-1736 | CVE-2019-1736, State: PUBLISHED, Published: 2020-09-23T00:26:09.923718Z, Updated: 2024-11-13T18:05:16.337Z, Description: A vulnerability in the firmware of the Cisco UCS C-Series Rack Servers could allow an authenticated, physical attacker to bypass Unified Extensible Firmware Interface (UEFI) Secure Boot validation ch... |
Techniques related with vulnerability CVE-2020-5340 | CVE-2020-5340 in RSA Authentication Manager. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1185 : Man in the Browser. Has an exploitation technique T1189 : Drive-by Compromise. |
Describe the vulnerability CVE-2012-4681 | CVE-2012-4681, State: PUBLISHED, Published: 2012-08-28T00:00:00, Updated: 2024-08-06T20:42:55.009Z, Description: Multiple vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allow remote attackers to execute arbitrary code via a crafted applet that bypasses SecurityM... |
Techniques related with vulnerability CVE-2009-0927 | CVE-2009-0927 in Adobe Reader and Adobe Acrobat 9 before 9.1, 8 before 8.1.3 , and 7 before 7.1.1. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.