input
stringlengths
30
54
output
stringlengths
69
4.21k
Describe the vulnerability CVE-2018-11051
CVE-2018-11051, State: PUBLISHED, Published: 2018-07-03T17:00:00Z, Updated: 2024-09-16T21:08:18.669Z, Description: RSA Certificate Manager Versions 6.9 build 560 through 6.9 build 564 contain a path traversal vulnerability in the RSA CMP Enroll Server and the RSA REST Enroll Server. A remote unauthenticated attacker could potentially exploit this vulnerability by manipulating input parameters of the application to gain unauthorized read access to the files stored on the server filesystem, with the privileges of the running web application., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 7.5, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: NONE, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2018-20062
CVE-2018-20062 in ThinkPHP web framework. Is related with T1203 : Exploitation for Client Execution. Is related with T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2018-15462
CVE-2018-15462, State: PUBLISHED, Published: 2019-05-03T14:45:32.295663Z, Updated: 2024-11-19T19:10:03.042Z, Description: A vulnerability in the TCP ingress handler for the data interfaces that are configured with management access to Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an increase in CPU and memory usage, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient ingress TCP rate limiting for TCP ports 22 (SSH) and 443 (HTTPS). An attacker could exploit this vulnerability by sending a crafted, steady stream of TCP traffic to port 22 or 443 on the data interfaces that are configured with management access to the affected device., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.6, Base Severity: HIGH, Confidentiality Impact: NONE, Integrity Impact: NONE, Privileges Required: NONE, Scope: CHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Techniques related with vulnerability CVE-2018-19007
CVE-2018-19007 in DDNS configuration in Geutebrueck GmbH E2 Camera Series. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1133 : External Remote Services.
Techniques related with vulnerability CVE-2017-7533
CVE-2017-7533 in Linux kernel through 4.12.4. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1499 : Endpoint Denial of Service.
Techniques related with vulnerability CVE-2016-5180
CVE-2016-5180 in c-ares 1.x before 1.12.0. Is related with T1133 : External Remote Services. Is related with T1203 : Exploitation for Client Execution. Is related with T1499.004 : Application or System Exploitation.
Techniques related with vulnerability CVE-2020-7456
CVE-2020-7456 in FreeBSD. Is related with T1091 : Replication Through Removable Media. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2020-11090
CVE-2020-11090, State: PUBLISHED, Published: 2020-06-11T00:05:14, Updated: 2024-08-04T11:21:14.678Z, Description: In Indy Node 1.12.2, there is an Uncontrolled Resource Consumption vulnerability. Indy Node has a bug in TAA handling code. The current primary can be crashed with a malformed transaction from a client, which leads to a view change. Repeated rapid view changes have the potential of bringing down the network. This is fixed in version 1.12.3., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 7.5, Base Severity: HIGH, Confidentiality Impact: NONE, Integrity Impact: NONE, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe the vulnerability CVE-2010-0480
CVE-2010-0480, State: PUBLISHED, Published: 2010-04-14T15:44:00, Updated: 2024-08-07T00:52:19.320Z, Description: Multiple stack-based buffer overflows in the MPEG Layer-3 audio codecs in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allow remote attackers to execute arbitrary code via a crafted AVI file, aka "MPEG Layer-3 Audio Decoder Stack Overflow Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-5252
CVE-2020-5252, State: PUBLISHED, Published: 2020-03-23T23:05:16, Updated: 2024-08-04T08:22:09.086Z, Description: The command-line "safety" package for Python has a potential security issue. There are two Python characteristics that allow malicious code to “poison-pill” command-line Safety package detection routines by disguising, or obfuscating, other malicious or non-secure packages. This vulnerability is considered to be of low severity because the attack makes use of an existing Python condition, not the Safety tool itself. This can happen if: You are running Safety in a Python environment that you don’t trust. You are running Safety from the same Python environment where you have your dependencies installed. Dependency packages are being installed arbitrarily or without proper verification. Users can mitigate this issue by doing any of the following: Perform a static analysis by installing Docker and running the Safety Docker image: $ docker run --rm -it pyupio/safety check -r requirements.txt Run Safety against a static dependencies list, such as the requirements.txt file, in a separate, clean Python environment. Run Safety from a Continuous Integration pipeline. Use PyUp.io, which runs Safety in a controlled environment and checks Python for dependencies without any need to install them. Use PyUp's Online Requirements Checker., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: LOCAL, Availability Impact: NONE, Base Score: 5, Base Severity: MEDIUM, Confidentiality Impact: NONE, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2014-8551
CVE-2014-8551 in WinCC server in Siemens SIMATIC. Is related with T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2012-3213
CVE-2012-3213, State: PUBLISHED, Published: 2013-02-02T00:00:00, Updated: 2024-08-06T19:57:50.304Z, Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Scripting., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-15393
CVE-2020-15393, State: PUBLISHED, Published: 2020-06-29T21:58:55, Updated: 2024-08-04T13:15:20.679Z, Description: In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2015-7935
CVE-2015-7935, State: PUBLISHED, Published: 2015-12-23T02:00:00, Updated: 2024-08-06T08:06:31.269Z, Description: Motorola Solutions MOSCAD IP Gateway allows remote attackers to read arbitrary files via unspecified vectors., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2019-0604
CVE-2019-0604 in Microsoft SharePoint Server. Is related with T1190 : Exploit Public-Facing Application. Is related with T1499.004 : Application or System Exploitation.
Describe MITRE technique T1554
MITRE T1554 : Compromise Host Software Binary from enterprise Adversaries may modify host software binaries to establish persistent access to systems. Software binaries/executables provide a wide range of system commands or services, programs, and libraries. Common software binaries are SSH clients, FTP clients, email clients, web browsers, and many other user or server applications. Adversaries may establish persistence though modifications to host software binaries. For example, an adversary may replace or otherwise infect a legitimate application binary (or support files) with a backdoor. Since these binaries may be routinely executed by applications or the user, the adversary can leverage this for persistent access to the host. An adversary may also modify an existing binary by patching in malicious functionality (e.g., IAT Hooking/Entry point patching)(Citation: Unit42 Banking Trojans Hooking 2022) prior to the binary’s legitimate execution. For example, an adversary may modify the entry point of a binary to point to malicious code patched in by the adversary before resuming normal execution flow.(Citation: ESET FontOnLake Analysis 2021)
Techniques related with vulnerability CVE-2020-3292
CVE-2020-3292 in Cisco Small Business RV Series Router Firmware. Has primary impact with T1499.004 : Application or System Exploitation. Has secondary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1190 : Exploit Public-Facing Application. Has an exploitation technique T1078 : Valid Accounts.
Describe the vulnerability CVE-2017-10910
CVE-2017-10910, State: PUBLISHED, Published: 2017-12-27T18:00:00, Updated: 2024-08-05T17:50:12.585Z, Description: MQTT.js 2.x.x prior to 2.15.0 issue in handling PUBLISH tickets may lead to an attacker causing a denial-of-service condition., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2019-0609
CVE-2019-0609 in Internet Explorer 11. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation. Has secondary impact with T1485 : Data Destruction. Has secondary impact with T1136 : Create Account. Has an exploitation technique T1204.002 : Malicious File. Has an exploitation technique T1566 : Phishing.
Describe the vulnerability CVE-2011-4106
CVE-2011-4106, State: PUBLISHED, Published: 2013-10-26T16:00:00Z, Updated: 2024-09-16T22:09:33.905Z, Description: TimThumb (timthumb.php) before 2.0 does not validate the entire source with the domain white list, which allows remote attackers to upload and execute arbitrary code via a URL containing a white-listed domain in the src parameter, then accessing it via a direct request to the file in the cache directory, as exploited in the wild in August 2011., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2015-2509
CVE-2015-2509 in Windows Media Center. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2019-6703
CVE-2019-6703, State: PUBLISHED, Published: 2019-01-27T02:00:00, Updated: 2024-08-04T20:31:04.133Z, Description: Incorrect access control in migla_ajax_functions.php in the Calmar Webmedia Total Donations plugin through 2.0.5 for WordPress allows unauthenticated attackers to update arbitrary WordPress option values, leading to site takeover. These attackers can send requests to wp-admin/admin-ajax.php to call the miglaA_update_me action to change arbitrary options on affected sites. This can be used to enable new user registration and set the default role for new users to Administrator., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-11090
CVE-2020-11090 in Indy Node. Has primary impact with T1499.004 : Application or System Exploitation.
Techniques related with vulnerability CVE-2019-3706
CVE-2019-3706 in iDRAC. Has primary impact with T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2015-2425
CVE-2015-2425, State: PUBLISHED, Published: 2015-07-14T21:00:00, Updated: 2024-08-06T05:17:26.135Z, Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2383 and CVE-2015-2384., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-5371
CVE-2020-5371 in Isilon OneFS. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has secondary impact with T1005 : Data from Local System.
Describe the vulnerability CVE-2020-11652
CVE-2020-11652, State: PUBLISHED, Published: 2020-04-30T17:00:03, Updated: 2024-08-04T11:35:13.485Z, Description: An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated users., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2019-6549
CVE-2019-6549 in PR100088 Modbus gateway. Has primary impact with T1552 : Unsecured Credentials. Has secondary impact with T1078 : Valid Accounts.
Techniques related with vulnerability CVE-2020-8648
CVE-2020-8648 in Linux kernel through 5.5.2. Is related with T1499.004 : Application or System Exploitation.
Describe the vulnerability CVE-2019-3719
CVE-2019-3719, State: PUBLISHED, Published: 2019-04-18T19:58:22.916438Z, Updated: 2024-09-16T18:40:02.152Z, Description: Dell SupportAssist Client versions prior to 3.2.0.90 contain a remote code execution vulnerability. An unauthenticated attacker, sharing the network access layer with the vulnerable system, can compromise the vulnerable system by tricking a victim user into downloading and executing arbitrary executables via SupportAssist client from attacker hosted sites., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: ADJACENT_NETWORK, Availability Impact: HIGH, Base Score: 7.1, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-15972
CVE-2019-15972, State: PUBLISHED, Published: 2019-11-26T03:42:26.244377Z, Updated: 2024-09-16T18:28:39.685Z, Description: A vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. The vulnerability exists because the web-based management interface improperly validates SQL values. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to modify values on or return values from the underlying database., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 5.4, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Techniques related with vulnerability CVE-2020-3244
CVE-2020-3244 in Cisco ASR 5000 Series Software. Has primary impact with T1211 : Exploitation for Defense Evasion. Has an exploitation technique T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2020-11957
CVE-2020-11957, State: PUBLISHED, Published: 2020-06-09T18:26:54, Updated: 2024-08-04T11:42:00.828Z, Description: The Bluetooth Low Energy implementation in Cypress PSoC Creator BLE 4.2 component versions before 3.64 generates a random number (Pairing Random) with significantly less entropy than the specified 128 bits during BLE pairing. This is the case for both authenticated and unauthenticated pairing with both LE Secure Connections as well as LE Legacy Pairing. A predictable or brute-forceable random number allows an attacker (in radio range) to perform a MITM attack during BLE pairing., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2012-2520
CVE-2012-2520 in Microsoft InfoPath, Communicator, Lync and Attendee, Office Web Apps and SharePoint (Server, Services and Foundation). Is related with T1190 : Exploit Public-Facing Application.
Describe MITRE technique T1552
MITRE T1552 : Unsecured Credentials from enterprise Adversaries may search compromised systems to find and obtain insecurely stored credentials. These credentials can be stored and/or misplaced in many locations on a system, including plaintext files (e.g. [Bash History](T1552.003)), operating system or application-specific repositories (e.g. [Credentials in Registry](T1552.002)), or other specialized files/artifacts (e.g. [Private Keys](T1552.004)).(Citation: Brining MimiKatz to Unix)
Techniques related with vulnerability CVE-2017-0213
CVE-2017-0213 in Windows COM. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1211 : Exploitation for Defense Evasion.
Techniques related with vulnerability CVE-2016-3351
CVE-2016-3351 in Internet Explorer 9 through 11. Is related with T1518 : Software Discovery.
Describe the vulnerability CVE-2017-0149
CVE-2017-0149, State: PUBLISHED, Published: 2017-03-17T00:00:00, Updated: 2024-08-05T12:55:18.610Z, Description: Microsoft Internet Explorer 9 through 11 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." This vulnerability is different from those described in CVE-2017-0018 and CVE-2017-0037., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-15974
CVE-2019-15974, State: PUBLISHED, Published: 2020-09-23T00:27:08.661193Z, Updated: 2024-11-13T18:03:26.814Z, Description: A vulnerability in the web interface of Cisco Managed Services Accelerator (MSX) could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by intercepting a user's HTTP request and modifying it into a request that causes the web interface to redirect the user to a specific malicious URL. A successful exploit could allow the attacker to redirect a user to a malicious web page. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 4.7, Base Severity: MEDIUM, Confidentiality Impact: NONE, Integrity Impact: LOW, Privileges Required: NONE, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Techniques related with vulnerability CVE-2015-2360
CVE-2015-2360 in Microsoft Windows up to Vista. Is related with T1068 : Exploitation for Privilege Escalation.
Describe the vulnerability CVE-2014-6352
CVE-2014-6352, State: PUBLISHED, Published: 2014-10-22T14:00:00, Updated: 2024-08-06T12:10:13.396Z, Description: Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted OLE object, as exploited in the wild in October 2014 with a crafted PowerPoint document., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-3137
CVE-2020-3137, State: PUBLISHED, Published: 2020-09-23T00:25:25.993278Z, Updated: 2024-11-13T18:06:49.148Z, Description: A vulnerability in the web-based management interface of Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability exists because the web-based management interface of the affected device does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or to access sensitive, browser-based information., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 6.1, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: NONE, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Techniques related with vulnerability CVE-2018-15401
CVE-2018-15401 in Cisco Hosted Collaboration Mediation Fulfillment. Has primary impact with T1608 : Stage Capabilities. Has an exploitation technique T1204.001 : Malicious Link.
Techniques related with vulnerability CVE-2017-0263
CVE-2017-0263 in Microsoft Windows. Is related with T1068 : Exploitation for Privilege Escalation.
Describe the vulnerability CVE-2019-0880
CVE-2019-0880, State: PUBLISHED, Published: 2019-07-15T18:56:19, Updated: 2024-08-04T17:58:59.909Z, Description: A local elevation of privilege vulnerability exists in how splwow64.exe handles certain calls, aka 'Microsoft splwow64 Elevation of Privilege Vulnerability'., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2018-2628
CVE-2018-2628 in WebLogic Server. Is related with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2019-10149
CVE-2019-10149 in exim. Is related with T1203 : Exploitation for Client Execution. Is related with T1190 : Exploit Public-Facing Application.
Describe MITRE technique T1110
MITRE T1110 : Brute Force from enterprise Adversaries may use brute force techniques to gain access to accounts when passwords are unknown or when password hashes are obtained.(Citation: TrendMicro Pawn Storm Dec 2020) Without knowledge of the password for an account or set of accounts, an adversary may systematically guess the password using a repetitive or iterative mechanism.(Citation: Dragos Crashoverride 2018) Brute forcing passwords can take place via interaction with a service that will check the validity of those credentials or offline against previously acquired credential data, such as password hashes. Brute forcing credentials may take place at various points during a breach. For example, adversaries may attempt to brute force access to [Valid Accounts](T1078) within a victim environment leveraging knowledge gathered from other post-compromise behaviors such as [OS Credential Dumping](T1003), [Account Discovery](T1087), or [Password Policy Discovery](T1201). Adversaries may also combine brute forcing activity with behaviors such as [External Remote Services](T1133) as part of Initial Access.
Describe the vulnerability CVE-2013-2471
CVE-2013-2471, State: PUBLISHED, Published: 2013-06-18T22:00:00, Updated: 2024-08-06T15:36:46.547Z, Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect IntegerComponentRaster size checks.", No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2015-6585
CVE-2015-6585 in Hangul Word Processor. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File.
Describe MITRE technique T1055
MITRE T1055 : Process Injection from enterprise Adversaries may inject code into processes in order to evade process-based defenses as well as possibly elevate privileges. Process injection is a method of executing arbitrary code in the address space of a separate live process. Running code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via process injection may also evade detection from security products since the execution is masked under a legitimate process. There are many different ways to inject code into a process, many of which abuse legitimate functionalities. These implementations exist for every major OS but are typically platform specific. More sophisticated samples may perform multiple process injections to segment modules and further evade detection, utilizing named pipes or other inter-process communication (IPC) mechanisms as a communication channel.
Techniques related with vulnerability CVE-2020-15183
CVE-2020-15183 in soycms. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1185 : Man in the Browser.
Describe the vulnerability CVE-2017-5638
CVE-2017-5638, State: PUBLISHED, Published: 2017-03-11T02:11:00, Updated: 2024-08-05T15:04:15.370Z, Description: The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-15233
CVE-2020-15233, State: PUBLISHED, Published: 2020-10-02T20:40:17, Updated: 2024-08-04T13:08:22.914Z, Description: ORY Fosite is a security first OAuth2 & OpenID Connect framework for Go. In Fosite from version 0.30.2 and before version 0.34.1, there is an issue in which an an attacker can override the registered redirect URL by performing an OAuth flow and requesting a redirect URL that is to the loopback adapter. Attackers can provide both custom URL query parameters to their loopback redirect URL, as well as actually overriding the host of the registered redirect URL. These attacks are only applicable in scenarios where the attacker has access over the loopback interface. This vulnerability has been patched in ORY Fosite v0.34.1., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 6.1, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-7602
CVE-2018-7602, State: PUBLISHED, Published: 2018-07-19T17:00:00Z, Updated: 2024-09-17T01:56:23.121Z, Description: A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being compromised. This vulnerability is related to Drupal core - Highly critical - Remote Code Execution - SA-CORE-2018-002. Both SA-CORE-2018-002 and this vulnerability are being exploited in the wild., No CVSS metrics available, Exploit Info: No exploit information available
Describe MITRE technique T1404
MITRE T1404 : Exploitation for Privilege Escalation from mobile Adversaries may exploit software vulnerabilities in order to elevate privileges. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in an application, service, within the operating system software, or kernel itself to execute adversary-controlled code. Security constructions, such as permission levels, will often hinder access to information and use of certain techniques. Adversaries will likely need to perform privilege escalation to include use of software exploitation to circumvent those restrictions. When initially gaining access to a device, an adversary may be operating within a lower privileged process which will prevent them from accessing certain resources on the system. Vulnerabilities may exist, usually in operating system components and applications running at higher permissions, that can be exploited to gain higher levels of access on the system. This could enable someone to move from unprivileged or user- level permission to root permissions depending on the component that is vulnerable.
Techniques related with vulnerability CVE-2014-6278
CVE-2014-6278 in GNU Bash through 4.3 bash43-026. Is related with T1190 : Exploit Public-Facing Application. Is related with T1203 : Exploitation for Client Execution.
Describe MITRE technique T1105
MITRE T1105 : Ingress Tool Transfer from enterprise Adversaries may transfer tools or other files from an external system into a compromised environment. Tools or files may be copied from an external adversary-controlled system to the victim network through the command and control channel or through alternate protocols such as [ftp](S0095). Once present, adversaries may also transfer/spread tools between victim devices within a compromised environment (i.e. [Lateral Tool Transfer](T1570)). On Windows, adversaries may use various utilities to download tools, such as `copy`, `finger`, [certutil](S0160), and [PowerShell](T1059.001) commands such as `IEX(New-Object Net.WebClient).downloadString()` and `Invoke-WebRequest`. On Linux and macOS systems, a variety of utilities also exist, such as `curl`, `scp`, `sftp`, `tftp`, `rsync`, `finger`, and `wget`.(Citation: t1105_lolbas) Adversaries may also abuse installers and package managers, such as `yum` or `winget`, to download tools to victim hosts. Adversaries have also abused file application features, such as the Windows `search-ms` protocol handler, to deliver malicious files to victims through remote file searches invoked by [User Execution](T1204) (typically after interacting with [Phishing](T1566) lures).(Citation: T1105: Trellix_search-ms) Files can also be transferred using various [Web Service](T1102)s as well as native or otherwise present tools on the victim system.(Citation: PTSecurity Cobalt Dec 2016) In some cases, adversaries may be able to leverage services that sync between a web-based and an on-premises client, such as Dropbox or OneDrive, to transfer files onto victim systems. For example, by compromising a cloud account and logging into the service's web portal, an adversary may be able to trigger an automatic syncing process that transfers the file onto the victim's machine.(Citation: Dropbox Malware Sync)
Techniques related with vulnerability CVE-2018-8248
CVE-2018-8248 in Microsoft Office. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation. Has secondary impact with T1485 : Data Destruction. Has secondary impact with T1136 : Create Account. Has an exploitation technique T1189 : Drive-by Compromise. Has an exploitation technique T1204.002 : Malicious File.
Techniques related with vulnerability CVE-2019-15972
CVE-2019-15972 in Cisco Unified Communications Manager. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565.001 : Stored Data Manipulation. Has an exploitation technique T1133 : External Remote Services. Has an exploitation technique T1078 : Valid Accounts.
Techniques related with vulnerability CVE-2020-1109
CVE-2020-1109 in Windows. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation. Has secondary impact with T1485 : Data Destruction. Has secondary impact with T1136 : Create Account.
Describe the vulnerability CVE-2020-13125
CVE-2020-13125, State: PUBLISHED, Published: 2020-05-17T00:39:00, Updated: 2024-08-04T12:11:19.263Z, Description: An issue was discovered in the "Ultimate Addons for Elementor" plugin before 1.24.2 for WordPress, as exploited in the wild in May 2020 in conjunction with CVE-2020-13126. Unauthenticated attackers can create users with the Subscriber role even if registration is disabled., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 7.2, Base Severity: HIGH, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: NONE, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-5270
CVE-2020-5270, State: PUBLISHED, Published: 2020-04-20T16:45:15, Updated: 2024-08-04T08:22:09.085Z, Description: In PrestaShop between versions 1.7.6.0 and 1.7.6.5, there is an open redirection when using back parameter. The impacts can be many, and vary from the theft of information and credentials to the redirection to malicious websites containing attacker-controlled content, which in some cases even cause XSS attacks. So even though an open redirection might sound harmless at first, the impacts of it can be severe should it be exploitable. The problem is fixed in 1.7.6.5, CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 4.1, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: NONE, Privileges Required: LOW, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-19833
CVE-2018-19833, State: PUBLISHED, Published: 2019-12-31T15:06:46, Updated: 2024-08-05T11:44:20.641Z, Description: The owned function of a smart contract implementation for DDQ, an tradable Ethereum ERC20 token, allows attackers to change the owner of the contract, because the function does not check the caller's identity., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-16784
CVE-2019-16784, State: PUBLISHED, Published: 2020-01-14T20:10:12, Updated: 2024-08-05T01:24:48.332Z, Description: In PyInstaller before version 3.6, only on Windows, a local privilege escalation vulnerability is present in this particular case: If a software using PyInstaller in "onefile" mode is launched by a privileged user (at least more than the current one) which have his "TempPath" resolving to a world writable directory. This is the case for example if the software is launched as a service or as a scheduled task using a system account (TempPath will be C:\Windows\Temp). In order to be exploitable the software has to be (re)started after the attacker launch the exploit program, so for a service launched at startup, a service restart is needed (e.g. after a crash or an upgrade)., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: LOCAL, Availability Impact: HIGH, Base Score: 7, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-8468
CVE-2020-8468 in Trend Micro OfficeScan, Trend Micro Apex One, Trend Micro Worry-Free Business Security (WFBS). Is related with T1211 : Exploitation for Defense Evasion.
Describe the vulnerability CVE-2019-16782
CVE-2019-16782, State: PUBLISHED, Published: 2019-12-18T19:05:14, Updated: 2024-08-05T01:24:48.031Z, Description: There's a possible information leak / session hijack vulnerability in Rack (RubyGem rack). This vulnerability is patched in versions 1.6.12 and 2.0.8. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully measuring the amount of time it takes to look up a session, an attacker may be able to find a valid session id and hijack the session. The session id itself may be generated randomly, but the way the session is indexed by the backing store does not use a secure comparison., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 6.3, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: NONE, Privileges Required: LOW, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-1860
CVE-2019-1860, State: PUBLISHED, Published: 2019-05-16T01:20:14.607283Z, Updated: 2024-09-16T17:07:57.505Z, Description: A vulnerability in the dashboard gadget rendering of Cisco Unified Intelligence Center could allow an unauthenticated, remote attacker to obtain or manipulate sensitive information between a user’s browser and Cisco Unified Intelligence Center. The vulnerability is due to the lack of gadget validation. An attacker could exploit this vulnerability by forcing a user to load a malicious gadget. A successful exploit could allow the attacker to obtain sensitive information, such as current user credentials, or manipulate data between the user’s browser and Cisco Unified Intelligence Center in the context of the malicious gadget., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 5.9, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: LOW, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Describe MITRE technique T1078.003
MITRE T1078.003 : Local Accounts from enterprise Adversaries may obtain and abuse credentials of a local account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Local accounts are those configured by an organization for use by users, remote support, services, or for administration on a single system or service. Local Accounts may also be abused to elevate privileges and harvest credentials through [OS Credential Dumping](T1003). Password reuse may allow the abuse of local accounts across a set of machines on a network for the purposes of Privilege Escalation and Lateral Movement.
Describe the vulnerability CVE-2014-0050
CVE-2014-0050, State: PUBLISHED, Published: 2014-03-28T19:00:00, Updated: 2024-08-06T09:05:38.958Z, Description: MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2017-0261
CVE-2017-0261 in Microsoft Office. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File.
Describe the vulnerability CVE-2015-2387
CVE-2015-2387, State: PUBLISHED, Published: 2015-07-14T22:00:00, Updated: 2024-08-06T05:10:16.200Z, Description: ATMFD.DLL in the Adobe Type Manager Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "ATMFD.DLL Memory Corruption Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Describe MITRE technique T1499.002
MITRE T1499.002 : Service Exhaustion Flood from enterprise Adversaries may target the different network services provided by systems to conduct a denial of service (DoS). Adversaries often target the availability of DNS and web services, however others have been targeted as well.(Citation: Arbor AnnualDoSreport Jan 2018) Web server software can be attacked through a variety of means, some of which apply generally while others are specific to the software being used to provide the service. One example of this type of attack is known as a simple HTTP flood, where an adversary sends a large number of HTTP requests to a web server to overwhelm it and/or an application that runs on top of it. This flood relies on raw volume to accomplish the objective, exhausting any of the various resources required by the victim software to provide the service.(Citation: Cloudflare HTTPflood) Another variation, known as a SSL renegotiation attack, takes advantage of a protocol feature in SSL/TLS. The SSL/TLS protocol suite includes mechanisms for the client and server to agree on an encryption algorithm to use for subsequent secure connections. If SSL renegotiation is enabled, a request can be made for renegotiation of the crypto algorithm. In a renegotiation attack, the adversary establishes a SSL/TLS connection and then proceeds to make a series of renegotiation requests. Because the cryptographic renegotiation has a meaningful cost in computation cycles, this can cause an impact to the availability of the service when done in volume.(Citation: Arbor SSLDoS April 2012)
Techniques related with vulnerability CVE-2017-11826
CVE-2017-11826 in Microsoft Office. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File.
Techniques related with vulnerability CVE-2019-1831
CVE-2019-1831 in Cisco Email Security Appliance (ESA). Has primary impact with T1036 : Masquerading. Has secondary impact with T1566 : Phishing.
Describe the vulnerability CVE-2012-1856
CVE-2012-1856, State: PUBLISHED, Published: 2012-08-15T01:00:00, Updated: 2024-08-06T19:08:38.625Z, Description: The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office 2003 SP3, Office 2003 Web Components SP3, Office 2007 SP2 and SP3, Office 2010 SP1, SQL Server 2000 SP4, SQL Server 2005 SP4, SQL Server 2008 SP2, SP3, R2, R2 SP1, and R2 SP2, Commerce Server 2002 SP4, Commerce Server 2007 SP2, Commerce Server 2009 Gold and R2, Host Integration Server 2004 SP1, Visual FoxPro 8.0 SP1, Visual FoxPro 9.0 SP2, and Visual Basic 6.0 Runtime allows remote attackers to execute arbitrary code via a crafted (1) document or (2) web page that triggers system-state corruption, aka "MSCOMCTL.OCX RCE Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-8414
CVE-2018-8414, State: PUBLISHED, Published: 2018-08-15T17:00:00, Updated: 2024-08-05T06:54:36.389Z, Description: A remote code execution vulnerability exists when the Windows Shell does not properly validate file paths, aka "Windows Shell Remote Code Execution Vulnerability." This affects Windows 10 Servers, Windows 10., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-11030
CVE-2020-11030 in WordPress. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link.
Describe the vulnerability CVE-2020-5225
CVE-2020-5225, State: PUBLISHED, Published: 2020-01-24T20:55:14, Updated: 2024-08-04T08:22:08.946Z, Description: Log injection in SimpleSAMLphp before version 1.18.4. The www/erroreport.php script, which receives error reports and sends them via email to the system administrator, did not properly sanitize the report identifier obtained from the request. This allows an attacker, under specific circumstances, to inject new log lines by manually crafting this report ID. When configured to use the file logging handler, SimpleSAMLphp will output all its logs by appending each log line to a given file. Since the reportID parameter received in a request sent to www/errorreport.php was not properly sanitized, it was possible to inject newline characters into it, effectively allowing a malicious user to inject new log lines with arbitrary content., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 4.4, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: LOW, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-2628
CVE-2018-2628, State: PUBLISHED, Published: 2018-04-19T02:00:00, Updated: 2024-10-03T18:35:26.033Z, Description: Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2013-3900
CVE-2013-3900 in Windows Authenticode signature verification for portable executable (PE) files. Is related with T1190 : Exploit Public-Facing Application. Is related with T1539 : Steal Web Session Cookie.
Describe the vulnerability CVE-2013-4335
CVE-2013-4335, State: PUBLISHED, Published: 2020-02-07T14:06:16, Updated: 2024-08-06T16:38:02.022Z, Description: opOpenSocialPlugin 0.8.2.1, > 0.9.9.2, 0.9.13, 1.2.6: Multiple XML External Entity Injection Vulnerabilities, No CVSS metrics available, Exploit Info: No exploit information available
Describe MITRE technique T1562
MITRE T1562 : Impair Defenses from enterprise Adversaries may maliciously modify components of a victim environment in order to hinder or disable defensive mechanisms. This not only involves impairing preventative defenses, such as firewalls and anti-virus, but also detection capabilities that defenders can use to audit activity and identify malicious behavior. This may also span both native defenses as well as supplemental capabilities installed by users and administrators. Adversaries may also impair routine operations that contribute to defensive hygiene, such as blocking users from logging out of a computer or stopping it from being shut down. These restrictions can further enable malicious operations as well as the continued propagation of incidents.(Citation: Emotet shutdown) Adversaries could also target event aggregation and analysis mechanisms, or otherwise disrupt these procedures by altering other system components.
Techniques related with vulnerability CVE-2020-11083
CVE-2020-11083 in October. Has secondary impact with T1185 : Man in the Browser.
Techniques related with vulnerability CVE-2018-8833
CVE-2018-8833 in Advantech WebAccess HMI Designer. Is related with T1203 : Exploitation for Client Execution.
Techniques related with vulnerability CVE-2019-15958
CVE-2019-15958 in Cisco Prime Infrastructure. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2020-5297
CVE-2020-5297 in october. Has primary impact with T1505.003 : Web Shell. Has secondary impact with T1059 : Command and Scripting Interpreter.
Techniques related with vulnerability CVE-2014-1809
CVE-2014-1809 in Microsoft Office. Is related with T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2014-7235
CVE-2014-7235, State: PUBLISHED, Published: 2014-10-07T14:00:00, Updated: 2024-08-06T12:40:19.297Z, Description: htdocs_ari/includes/login.php in the ARI Framework module/Asterisk Recording Interface (ARI) in FreePBX before 2.9.0.9, 2.10.x, and 2.11 before 2.11.1.5 allows remote attackers to execute arbitrary code via the ari_auth cookie, related to the PHP unserialize function, as exploited in the wild in September 2014., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2013-7372
CVE-2013-7372, State: PUBLISHED, Published: 2014-04-29T20:00:00Z, Updated: 2024-09-17T02:33:10.764Z, Description: The engineNextBytes function in classlib/modules/security/src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1PRNG_SecureRandomImpl.java in the SecureRandom implementation in Apache Harmony through 6.0M3, as used in the Java Cryptography Architecture (JCA) in Android before 4.4 and other products, when no seed is provided by the user, uses an incorrect offset value, which makes it easier for attackers to defeat cryptographic protection mechanisms by leveraging the resulting PRNG predictability, as exploited in the wild against Bitcoin wallet applications in August 2013., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2018-14781
CVE-2018-14781 in Medtronic insulin pump. Has primary impact with T1190 : Exploit Public-Facing Application. Has an exploitation technique T1040 : Network Sniffing.
Techniques related with vulnerability CVE-2019-13527
CVE-2019-13527 in Rockwell Automation Arena Simulation Software Cat. 9502-Ax, Versions 16.00.00 and earlier. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2020-8649
CVE-2020-8649, State: PUBLISHED, Published: 2020-02-06T00:06:25, Updated: 2024-08-04T10:03:46.293Z, Description: There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-16302
CVE-2019-16302, State: PUBLISHED, Published: 2020-02-20T21:44:19, Updated: 2024-08-05T01:10:41.669Z, Description: An issue was discovered in Open Network Operating System (ONOS) 1.14. In the Ethernet VPN application (org.onosproject.evpnopenflow), the host event listener does not handle the following event types: HOST_MOVED, HOST_UPDATED. In combination with other applications, this could lead to the absence of intended code execution., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2018-11073
CVE-2018-11073 in Authentication Manager. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1185 : Man in the Browser. Has an exploitation technique T1189 : Drive-by Compromise.
Describe the vulnerability CVE-2013-0631
CVE-2013-0631, State: PUBLISHED, Published: 2013-01-09T01:00:00, Updated: 2024-08-06T14:33:05.333Z, Description: Adobe ColdFusion 9.0, 9.0.1, and 9.0.2 allows attackers to obtain sensitive information via unspecified vectors, as exploited in the wild in January 2013., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-1736
CVE-2019-1736, State: PUBLISHED, Published: 2020-09-23T00:26:09.923718Z, Updated: 2024-11-13T18:05:16.337Z, Description: A vulnerability in the firmware of the Cisco UCS C-Series Rack Servers could allow an authenticated, physical attacker to bypass Unified Extensible Firmware Interface (UEFI) Secure Boot validation checks and load a compromised software image on an affected device. The vulnerability is due to improper validation of the server firmware upgrade images. An attacker could exploit this vulnerability by installing a server firmware version that would allow the attacker to disable UEFI Secure Boot. A successful exploit could allow the attacker to bypass the signature validation checks that are done by UEFI Secure Boot technology and load a compromised software image on the affected device. A compromised software image is any software image that has not been digitally signed by Cisco., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: PHYSICAL, Availability Impact: HIGH, Base Score: 6.2, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Techniques related with vulnerability CVE-2020-5340
CVE-2020-5340 in RSA Authentication Manager. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1185 : Man in the Browser. Has an exploitation technique T1189 : Drive-by Compromise.
Describe the vulnerability CVE-2012-4681
CVE-2012-4681, State: PUBLISHED, Published: 2012-08-28T00:00:00, Updated: 2024-08-06T20:42:55.009Z, Description: Multiple vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allow remote attackers to execute arbitrary code via a crafted applet that bypasses SecurityManager restrictions by (1) using com.sun.beans.finder.ClassFinder.findClass and leveraging an exception with the forName method to access restricted classes from arbitrary packages such as sun.awt.SunToolkit, then (2) using "reflection with a trusted immediate caller" to leverage the getField method to access and modify private fields, as exploited in the wild in August 2012 using Gondzz.class and Gondvv.class., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2009-0927
CVE-2009-0927 in Adobe Reader and Adobe Acrobat 9 before 9.1, 8 before 8.1.3 , and 7 before 7.1.1. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution.