input
stringlengths
30
54
output
stringlengths
69
4.21k
Techniques related with vulnerability CVE-2017-0022
CVE-2017-0022 in XML Core Services. Is related with T1189 : Drive-by Compromise. Is related with T1518.001 : Security Software Discovery.
Describe MITRE technique T1200
MITRE T1200 : Hardware Additions from enterprise Adversaries may introduce computer accessories, networking hardware, or other computing devices into a system or network that can be used as a vector to gain access. Rather than just connecting and distributing payloads via removable storage (i.e. [Replication Through Re...
Techniques related with vulnerability CVE-2018-11059
CVE-2018-11059 in RSA Archer. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1185 : Man in the Browser. Has an exploitation technique T1189 : Drive-by Compromise.
Techniques related with vulnerability CVE-2019-11869
CVE-2019-11869 in Yuzo Related Posts plugin 5.12.94 for WordPress. Is related with T1499.004 : Application or System Exploitation.
Techniques related with vulnerability CVE-2018-18956
CVE-2018-18956 in Suricata 4.x before 4.0.6. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2019-18581
CVE-2019-18581, State: PUBLISHED, Published: 2020-03-18T18:20:15.481791Z, Updated: 2024-09-16T23:01:47.466Z, Description: Dell EMC Data Protection Advisor versions 6.3, 6.4, 6.5, 18.2 versions prior to patch 83, and 19.1 versions prior to patch 71 contain a server missing authorization vulnerability in the REST API. A ...
Describe the vulnerability CVE-2019-1703
CVE-2019-1703, State: PUBLISHED, Published: 2019-05-03T16:00:26.411998Z, Updated: 2024-11-19T19:09:06.294Z, Description: A vulnerability in the internal packet-processing functionality of Cisco Firepower Threat Defense (FTD) Software for the Cisco Firepower 2100 Series could allow an unauthenticated, remote attacker to...
Describe the vulnerability CVE-2020-5290
CVE-2020-5290, State: PUBLISHED, Published: 2020-04-01T19:25:15, Updated: 2024-08-04T08:22:09.090Z, Description: In RedpwnCTF before version 2.3, there is a session fixation vulnerability in exploitable through the `#token=$ssid` hash when making a request to the `/verify` endpoint. An attacker team could potentially s...
Techniques related with vulnerability CVE-2018-7520
CVE-2018-7520 in IP Cameras Access Control Vulnerability. Has primary impact with T1552.001 : Credentials In Files.
Techniques related with vulnerability CVE-2013-6282
CVE-2013-6282 in Linux kernel before 3.5.5. Is related with T1608 : Stage Capabilities.
Describe the vulnerability CVE-2018-15761
CVE-2018-15761, State: PUBLISHED, Published: 2018-11-19T14:00:00Z, Updated: 2024-09-17T00:46:20.654Z, Description: Cloud Foundry UAA release, versions prior to v64.0, and UAA, versions prior to 4.23.0, contains a validation error which allows for privilege escalation. A remote authenticated user may modify the url and ...
Techniques related with vulnerability CVE-2019-1423
CVE-2019-1423 in Windows 10 Version 1903 for 32-bit Systems. Has primary impact with T1565 : Data Manipulation. Has secondary impact with T1068 : Exploitation for Privilege Escalation.
Techniques related with vulnerability CVE-2015-2387
CVE-2015-2387 in CISA's Known Exploited Vulnerabilities Catalog. Is related with T1068 : Exploitation for Privilege Escalation.
Techniques related with vulnerability CVE-2010-1165
CVE-2010-1165 in Atlassian JIRA 3.12 through 4.1. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
Techniques related with vulnerability CVE-2010-3916
CVE-2010-3916 in Ichitaro. Is related with T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2019-1812
CVE-2019-1812, State: PUBLISHED, Published: 2019-05-15T22:20:26.162102Z, Updated: 2024-11-20T17:19:07.317Z, Description: A vulnerability in the Image Signature Verification feature of Cisco NX-OS Software could allow an authenticated, local attacker with administrator-level credentials to install a malicious software i...
Describe MITRE technique T1480
MITRE T1480 : Execution Guardrails from enterprise Adversaries may use execution guardrails to constrain execution or actions based on adversary supplied and environment specific conditions that are expected to be present on the target. Guardrails ensure that a payload only executes against an intended target and reduc...
Techniques related with vulnerability CVE-2016-6367
CVE-2016-6367 in Cisco Adaptive Security Appliance Software before 8.4(1). Is related with T1133 : External Remote Services. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1480 : Execution Guardrails.
Techniques related with vulnerability CVE-2018-18665
CVE-2018-18665 in mintToken function of Nexxus. Is related with T0828 : Loss of Productivity and Revenue.
Describe the vulnerability CVE-2016-3088
CVE-2016-3088, State: PUBLISHED, Published: 2016-06-01T20:00:00, Updated: 2024-08-05T23:40:15.630Z, Description: The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request., No CVSS metrics available,...
Techniques related with vulnerability CVE-2018-19207
CVE-2018-19207 in Van Ons WP GDPR Compliance plugin before 1.4.3 for WordPress. Is related with T1190 : Exploit Public-Facing Application. Is related with T1499.004 : Application or System Exploitation.
Techniques related with vulnerability CVE-2016-0165
CVE-2016-0165 in Windows kernel. Is related with T1608 : Stage Capabilities.
Techniques related with vulnerability CVE-2020-3126
CVE-2020-3126 in Cisco Webex Meetings Multimedia Viewer. Has primary impact with T1080 : Taint Shared Content. Has primary impact with T1204.002 : Malicious File. Has an exploitation technique T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2019-11886
CVE-2019-11886 in WaspThemes Visual CSS Style Editor plugin before 7.2.1 for WordPress. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2019-1768
CVE-2019-1768, State: PUBLISHED, Published: 2019-05-16T01:25:21.627879Z, Updated: 2024-11-20T17:18:02.308Z, Description: A vulnerability in the implementation of a specific CLI command for Cisco NX-OS Software could allow an authenticated, local attacker with administrator credentials to cause a buffer overflow conditi...
Describe the vulnerability CVE-2018-18641
CVE-2018-18641, State: PUBLISHED, Published: 2018-12-04T23:00:00, Updated: 2024-08-05T11:15:59.991Z, Description: An issue was discovered in GitLab Community and Enterprise Edition before 11.2.7, 11.3.x before 11.3.8, and 11.4.x before 11.4.3. It has Cleartext Storage of Sensitive Information., No CVSS metrics availabl...
Describe the vulnerability CVE-2020-3126
CVE-2020-3126, State: PUBLISHED, Published: 2020-04-13T16:40:12.767786Z, Updated: 2024-11-15T17:32:29.187Z, Description: vulnerability within the Multimedia Viewer feature of Cisco Webex Meetings could allow an authenticated, remote attacker to bypass security protections. The vulnerability is due to missing security w...
Describe the vulnerability CVE-2020-11035
CVE-2020-11035, State: PUBLISHED, Published: 2020-05-05T21:30:12, Updated: 2024-08-04T11:21:14.511Z, Description: In GLPI after version 0.83.3 and before version 9.4.6, the CSRF tokens are generated using an insecure algorithm. The implementation uses rand and uniqid and MD5 which does not provide secure values. This i...
Techniques related with vulnerability CVE-2013-3336
CVE-2013-3336 in Adobe ColdFusion. Is related with T1055 : Process Injection.
Describe the vulnerability CVE-2019-1402
CVE-2019-1402, State: PUBLISHED, Published: 2019-11-12T18:53:00, Updated: 2024-08-04T18:20:26.947Z, Description: An information disclosure vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory, aka 'Microsoft Office Information Disclosure Vulnerability'., No CVSS...
Describe the vulnerability CVE-2017-14323
CVE-2017-14323, State: PUBLISHED, Published: 2018-04-10T15:00:00, Updated: 2024-08-05T19:20:41.517Z, Description: SSRF (Server Side Request Forgery) in getRemoteImage.php in Ueditor in Onethink V1.0 and V1.1 allows remote attackers to obtain sensitive information, attack intranet hosts, or possibly trigger remote comma...
Techniques related with vulnerability CVE-2018-14679
CVE-2018-14679 in libmspack before 0.7alpha. Is related with T1499.004 : Application or System Exploitation.
Describe the vulnerability CVE-2018-10633
CVE-2018-10633, State: PUBLISHED, Published: 2018-07-11T17:00:00Z, Updated: 2024-09-17T01:00:45.449Z, Description: Universal Robots Robot Controllers Version CB 3.1, SW Version 3.4.5-100 utilizes hard-coded credentials that may allow an attacker to reset passwords for the controller., No CVSS metrics available, Exploit...
Describe the vulnerability CVE-2018-15454
CVE-2018-15454, State: PUBLISHED, Published: 2018-11-01T13:00:00Z, Updated: 2024-09-16T23:16:30.396Z, Description: A vulnerability in the Session Initiation Protocol (SIP) inspection engine of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticat...
Techniques related with vulnerability CVE-2020-15393
CVE-2020-15393 in Linux kernel 4.4 through 5.7.6. Is related with T1091 : Replication Through Removable Media. Is related with T1499.001 : OS Exhaustion Flood.
Techniques related with vulnerability CVE-2012-0874
CVE-2012-0874 in JBoss Enterprise Application Platform. Is related with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2016-5195
CVE-2016-5195 in Linux kernel 2.x through 4.x before 4.8.3. Is related with T1068 : Exploitation for Privilege Escalation.
Describe MITRE technique T1552.001
MITRE T1552.001 : Credentials In Files from enterprise Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials. These can be files created by users to store their own credentials, shared credential stores for a group of individuals, configuration files contain...
Describe the vulnerability CVE-2016-9299
CVE-2016-9299, State: PUBLISHED, Published: 2017-01-12T23:00:00, Updated: 2024-08-06T02:50:36.759Z, Description: The remoting module in Jenkins before 2.32 and LTS before 2.19.3 allows remote attackers to execute arbitrary code via a crafted serialized Java object, which triggers an LDAP query to a third-party server.,...
Describe the vulnerability CVE-2009-1151
CVE-2009-1151, State: PUBLISHED, Published: 2009-03-26T14:00:00, Updated: 2024-08-07T05:04:48.303Z, Description: Static code injection vulnerability in setup.php in phpMyAdmin 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 allows remote attackers to inject arbitrary PHP code into a configuration file via the save action...
Describe the vulnerability CVE-2018-18956
CVE-2018-18956, State: PUBLISHED, Published: 2018-11-05T21:00:00, Updated: 2024-08-05T11:23:08.491Z, Description: The ProcessMimeEntity function in util-decode-mime.c in Suricata 4.x before 4.0.6 allows remote attackers to cause a denial of service (segfault and daemon crash) via crafted input to the SMTP parser, as ex...
Describe the vulnerability CVE-2013-3644
CVE-2013-3644, State: PUBLISHED, Published: 2013-06-18T18:45:00Z, Updated: 2024-09-17T01:46:11.964Z, Description: Unspecified vulnerability in JustSystems Ichitaro 2006 through 2013; Ichitaro Pro through 2; Ichitaro Government 6, 7, and 2006 through 2010; Ichitaro Portable with oreplug; Ichitaro Viewer; and Ichitaro JU...
Techniques related with vulnerability CVE-2019-17026
CVE-2019-17026 in Firefox ESR. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2020-10189
CVE-2020-10189, State: PUBLISHED, Published: 2020-03-06T16:05:22, Updated: 2024-08-04T10:58:39.095Z, Description: Zoho ManageEngine Desktop Central before 10.0.474 allows remote code execution because of deserialization of untrusted data in getChartImage in the FileStorage class. This is related to the CewolfServlet an...
Describe the vulnerability CVE-2010-2152
CVE-2010-2152, State: PUBLISHED, Published: 2010-06-03T16:00:00, Updated: 2024-08-07T02:25:07.018Z, Description: Unspecified vulnerability in JustSystems Ichitaro 2004 through 2009, Ichitaro Government 2006 through 2009, and Just School 2008 and 2009 allows remote attackers to execute arbitrary code via unknown vectors...
Describe MITRE technique T1499.004
MITRE T1499.004 : Application or System Exploitation from enterprise Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users. (Citation: Sucuri BIND9 August 2015) Some systems may automatically restart critical applications and services when crash...
Techniques related with vulnerability CVE-2019-1052
CVE-2019-1052 in Microsoft Edge. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1189 : Drive-by Compromise. Has an exploitation technique T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2011-3056
CVE-2011-3056, State: PUBLISHED, Published: 2012-03-22T16:00:00, Updated: 2024-08-06T23:22:27.379Z, Description: Google Chrome before 17.0.963.83 allows remote attackers to bypass the Same Origin Policy via vectors involving a "magic iframe.", No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2012-1723
CVE-2012-1723, State: PUBLISHED, Published: 2012-06-16T21:00:00, Updated: 2024-08-06T19:08:37.635Z, Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote at...
Describe the vulnerability CVE-2020-6819
CVE-2020-6819, State: PUBLISHED, Published: 2020-04-24T15:56:56, Updated: 2024-08-04T09:11:05.160Z, Description: Under certain conditions, when running the nsDocShell destructor, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Thund...
Describe the vulnerability CVE-2018-11060
CVE-2018-11060, State: PUBLISHED, Published: 2018-07-24T19:00:00Z, Updated: 2024-09-16T16:58:13.454Z, Description: RSA Archer, versions prior to 6.4.0.1, contain an authorization bypass vulnerability in the REST API. A remote authenticated malicious Archer user could potentially exploit this vulnerability to elevate th...
Techniques related with vulnerability CVE-2012-1795
CVE-2012-1795 in Webglimpse before 2.20.0. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059.004 : Unix Shell.
Describe the vulnerability CVE-2013-2465
CVE-2013-2465, State: PUBLISHED, Published: 2013-06-18T22:00:00, Updated: 2024-08-06T15:36:46.609Z, Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attac...
Describe the vulnerability CVE-2015-6175
CVE-2015-6175, State: PUBLISHED, Published: 2015-12-09T11:00:00, Updated: 2024-08-06T07:15:13.282Z, Description: The kernel in Microsoft Windows 10 Gold allows local users to gain privileges via a crafted application, aka "Windows Kernel Memory Elevation of Privilege Vulnerability.", No CVSS metrics available, Exploit ...
Techniques related with vulnerability CVE-2020-5336
CVE-2020-5336 in RSA Archer. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link.
Techniques related with vulnerability CVE-2018-7600
CVE-2018-7600 in Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1. Is related with T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2013-7246
CVE-2013-7246, State: PUBLISHED, Published: 2014-01-30T18:00:00, Updated: 2024-08-06T18:01:19.613Z, Description: Buffer overflow in the IconCreate method in an ActiveX control in the DaumGame ActiveX plugin 1.1.0.4 and 1.1.0.5 allows remote attackers to execute arbitrary code via a long string, as exploited in the wild...
Techniques related with vulnerability CVE-2017-1001000
CVE-2017-1001000 in REST API in WordPress 4.7.x before 4.7.2. Is related with T1190 : Exploit Public-Facing Application. Is related with T1491.002 : External Defacement.
Techniques related with vulnerability CVE-2019-0911
CVE-2019-0911 in Internet Explorer 11. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1189 : Drive-by Compromise. Has an exploitation technique T1204.002 : Malicious File.
Techniques related with vulnerability CVE-2019-0859
CVE-2019-0859 in Windows. Is related with T1068 : Exploitation for Privilege Escalation.
Techniques related with vulnerability CVE-2016-9192
CVE-2016-9192 in Cisco AnyConnect Secure Mobility Client. Is related with T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2019-3728
CVE-2019-3728, State: PUBLISHED, Published: 2019-09-30T21:48:40.164927Z, Updated: 2024-09-17T03:03:11.526Z, Description: RSA BSAFE Crypto-C Micro Edition versions prior to 4.0.5.4 (in 4.0.x) and 4.1.4 (in 4.1.x) and RSA BSAFE Micro Edition Suite versions prior to 4.0.13 (in 4.0.x) and prior to 4.4 (in 4.1.x, 4.2.x, 4.3...
Describe the vulnerability CVE-2020-12655
CVE-2020-12655, State: PUBLISHED, Published: 2020-05-05T05:16:02, Updated: 2024-08-04T12:04:22.557Z, Description: An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka C...
Describe the vulnerability CVE-2009-3129
CVE-2009-3129, State: PUBLISHED, Published: 2009-11-11T19:00:00, Updated: 2024-08-07T06:14:56.278Z, Description: Microsoft Office Excel 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Excel Viewer 2003 SP3; Office Excel Viewer SP1 and SP2; and Offic...
Describe the vulnerability CVE-2019-1423
CVE-2019-1423, State: PUBLISHED, Published: 2019-11-12T18:53:07, Updated: 2024-08-04T18:20:27.492Z, Description: An elevation of privilege vulnerability exists in the way that the StartTileData.dll handles file creation in protected locations, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique fr...
Techniques related with vulnerability CVE-2020-5332
CVE-2020-5332 in RSA Archer. Has primary impact with T1059 : Command and Scripting Interpreter.
Describe the vulnerability CVE-2014-3566
CVE-2014-3566, State: PUBLISHED, Published: 2014-10-15T00:00:00, Updated: 2024-08-06T10:50:17.863Z, Description: The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-ora...
Techniques related with vulnerability CVE-2014-6293
CVE-2014-6293 in Statistics (ke_stats) extension before 1.1.2 for TYPO3. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059 : Command and Scripting Interpreter.
Techniques related with vulnerability CVE-2020-11010
CVE-2020-11010 in tortoise-orm. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1505.003 : Web Shell. Has secondary impact with T1136 : Create Account. Has secondary impact with T1190 : Exploit Public-Facing Applica...
Describe MITRE technique T1546
MITRE T1546 : Event Triggered Execution from enterprise Adversaries may establish persistence and/or elevate privileges using system mechanisms that trigger execution based on specific events. Various operating systems have means to monitor and subscribe to events such as logons or other user activity such as running s...
Describe the vulnerability CVE-2019-15288
CVE-2019-15288, State: PUBLISHED, Published: 2019-11-26T03:11:49.444527Z, Updated: 2024-11-20T17:04:36.448Z, Description: A vulnerability in the CLI of Cisco TelePresence Collaboration Endpoint (CE), Cisco TelePresence Codec (TC), and Cisco RoomOS Software could allow an authenticated, remote attacker to escalate privi...
Techniques related with vulnerability CVE-2020-3198
CVE-2020-3198 in Cisco IOS 12.2(60)EZ16. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1189 : Drive-by Compromise. Has an exploitation technique T1190 : Exploit Public-Facing Application. Has an exploitation ...
Describe the vulnerability CVE-2020-3216
CVE-2020-3216, State: PUBLISHED, Published: 2020-06-03T17:41:22.604437Z, Updated: 2024-11-15T17:16:51.616Z, Description: A vulnerability in Cisco IOS XE SD-WAN Software could allow an unauthenticated, physical attacker to bypass authentication and gain unrestricted access to the root shell of an affected device. The vu...
Describe the vulnerability CVE-2018-0622
CVE-2018-0622, State: PUBLISHED, Published: 2018-07-26T17:00:00, Updated: 2024-08-05T03:28:11.369Z, Description: The DHC Online Shop App for Android version 3.2.0 and earlier does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information v...
Describe the vulnerability CVE-2014-6120
CVE-2014-6120, State: PUBLISHED, Published: 2018-04-12T21:00:00, Updated: 2024-08-06T12:10:11.761Z, Description: IBM Rational AppScan Source 8.0 through 8.0.0.2 and 8.5 through 8.5.0.1 and Security AppScan Source 8.6 through 8.6.0.2, 8.7 through 8.7.0.1, 8.8, 9.0 through 9.0.0.1, and 9.0.1 allow remote attackers to exe...
Techniques related with vulnerability CVE-2020-12769
CVE-2020-12769 in Linux kernel before 5.4.17. Is related with T1499.004 : Application or System Exploitation.
Describe the vulnerability CVE-2019-15958
CVE-2019-15958, State: PUBLISHED, Published: 2019-11-26T03:11:37.063933Z, Updated: 2024-11-20T17:04:51.777Z, Description: A vulnerability in the REST API of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network Manager (EPNM) could allow an unauthenticated remote attacker to execute arbitrary code with...
Describe the vulnerability CVE-2018-15393
CVE-2018-15393, State: PUBLISHED, Published: 2018-11-08T17:00:00Z, Updated: 2024-09-17T02:05:54.667Z, Description: A vulnerability in the web-based management interface of Cisco Content Security Management Appliance (SMA) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) a...
Describe the vulnerability CVE-2015-2426
CVE-2015-2426, State: PUBLISHED, Published: 2015-07-20T18:00:00, Updated: 2024-08-06T05:17:26.168Z, Description: Buffer underflow in atmfd.dll in the Windows Adobe Type Manager Library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and...
Describe the vulnerability CVE-2018-18667
CVE-2018-18667, State: PUBLISHED, Published: 2018-12-28T17:00:00, Updated: 2024-08-05T11:16:00.265Z, Description: The mintToken function of Pylon (PYLNT) aka PylonToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value, a related issue...
Describe the vulnerability CVE-2019-8540
CVE-2019-8540, State: PUBLISHED, Published: 2019-12-18T17:33:17, Updated: 2024-08-04T21:24:27.843Z, Description: A memory initialization issue was addressed with improved memory handling. This issue is fixed in iOS 12.2, macOS Mojave 10.14.4, tvOS 12.2, watchOS 5.2. A malicious application may be able to determine kern...
Describe the vulnerability CVE-2019-3732
CVE-2019-3732, State: PUBLISHED, Published: 2019-09-30T21:48:40.337065Z, Updated: 2024-09-16T16:37:45.300Z, Description: RSA BSAFE Crypto-C Micro Edition, versions prior to 4.0.5.3 (in 4.0.x) and versions prior to 4.1.3.3 (in 4.1.x), and RSA Micro Edition Suite, versions prior to 4.0.11 (in 4.0.x) versions prior to 4.1...
Techniques related with vulnerability CVE-2016-5062
CVE-2016-5062 in web server in Aternity before 9.0.1. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059 : Command and Scripting Interpreter.
Describe the vulnerability CVE-2011-0096
CVE-2011-0096, State: PUBLISHED, Published: 2011-01-31T19:00:00, Updated: 2024-08-06T21:43:14.219Z, Description: The MHTML protocol handler in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly...
Techniques related with vulnerability CVE-2013-3660
CVE-2013-3660 in win32k.sys in the kernel-mode drivers in Microsoft Windows. Is related with T1608 : Stage Capabilities.
Describe the vulnerability CVE-2018-15392
CVE-2018-15392, State: PUBLISHED, Published: 2018-10-05T14:00:00Z, Updated: 2024-09-17T01:31:09.993Z, Description: A vulnerability in the DHCP service of Cisco Industrial Network Director could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper...
Techniques related with vulnerability CVE-2020-1350
CVE-2020-1350 in Windows Server. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2013-5057
CVE-2013-5057, State: PUBLISHED, Published: 2013-12-11T00:00:00, Updated: 2024-08-06T16:59:41.315Z, Description: hxds.dll in Microsoft Office 2007 SP3 and 2010 SP1 and SP2 does not implement the ASLR protection mechanism, which makes it easier for remote attackers to execute arbitrary code via a crafted COM component o...
Describe the vulnerability CVE-2020-5386
CVE-2020-5386, State: PUBLISHED, Published: 2020-09-02T20:55:19.410906Z, Updated: 2024-09-16T20:58:12.206Z, Description: Dell EMC ECS, versions prior to 3.5, contains an Exposure of Resource vulnerability. A remote unauthenticated attacker can access the list of DT (Directory Table) objects of all internally running se...
Describe the vulnerability CVE-2011-3172
CVE-2011-3172, State: PUBLISHED, Published: 2018-06-08T13:00:00Z, Updated: 2024-09-17T04:28:45.768Z, Description: A vulnerability in pam_modules of SUSE Linux Enterprise allows attackers to log into accounts that should have been disabled. Affected releases are SUSE Linux Enterprise: versions prior to 12., CVSS v3.0 - ...
Describe the vulnerability CVE-2018-8120
CVE-2018-8120, State: PUBLISHED, Published: 2018-05-09T19:00:00, Updated: 2024-08-05T06:46:13.353Z, Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows Server ...
Techniques related with vulnerability CVE-2016-7193
CVE-2016-7193 in Microsoft Word. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2020-11045
CVE-2020-11045, State: PUBLISHED, Published: 2020-05-07T00:00:00, Updated: 2024-08-04T11:21:14.543Z, Description: In FreeRDP after 1.0 and before 2.0.0, there is an out-of-bound read in in update_read_bitmap_data that allows client memory to be read to an image buffer. The result displayed on screen as colour., CVSS v3...
Describe the vulnerability CVE-2020-16198
CVE-2020-16198, State: PUBLISHED, Published: 2020-09-18T17:50:08, Updated: 2024-08-04T13:37:53.917Z, Description: Philips Clinical Collaboration Platform, Versions 12.2.1 and prior. When an attacker claims to have a given identity, the software does not prove or insufficiently proves the claim is correct., No CVSS metr...
Techniques related with vulnerability CVE-2017-9841
CVE-2017-9841 in PHPUnit before 4.8.28 and 5.x before 5.6.3. Is related with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2014-9938
CVE-2014-9938 in Git before 1.9.3. Is related with T1133 : External Remote Services. Is related with T1059.004 : Unix Shell.
Describe the vulnerability CVE-2018-12520
CVE-2018-12520, State: PUBLISHED, Published: 2018-07-05T20:00:00, Updated: 2024-08-05T08:38:05.943Z, Description: An issue was discovered in ntopng 3.4 before 3.4.180617. The PRNG involved in the generation of session IDs is not seeded at program startup. This results in deterministic session IDs being allocated for ac...
Techniques related with vulnerability CVE-2017-9142
CVE-2017-9142 in ImageMagick 7.0.5-7 Q16. Is related with T1499.004 : Application or System Exploitation.
Techniques related with vulnerability CVE-2017-12817
CVE-2017-12817 in Kaspersky Lab Kaspersky Internet Security for Android 11.12.4.1622. Is related with T1409 : Access Stored Application Data.
Techniques related with vulnerability CVE-2009-1308
CVE-2009-1308 in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey. Is related with T1190 : Exploit Public-Facing Application.