input
stringlengths
30
54
output
stringlengths
69
4.21k
Techniques related with vulnerability CVE-2017-0022
CVE-2017-0022 in XML Core Services. Is related with T1189 : Drive-by Compromise. Is related with T1518.001 : Security Software Discovery.
Describe MITRE technique T1200
MITRE T1200 : Hardware Additions from enterprise Adversaries may introduce computer accessories, networking hardware, or other computing devices into a system or network that can be used as a vector to gain access. Rather than just connecting and distributing payloads via removable storage (i.e. [Replication Through Removable Media](T1091)), more robust hardware additions can be used to introduce new functionalities and/or features into a system that can then be abused. While public references of usage by threat actors are scarce, many red teams/penetration testers leverage hardware additions for initial access. Commercial and open source products can be leveraged with capabilities such as passive network tapping, network traffic modification (i.e. [Adversary-in-the-Middle](T1557)), keystroke injection, kernel memory reading via DMA, addition of new wireless access to an existing network, and others.(Citation: Ossmann Star Feb 2011)(Citation: Aleks Weapons Nov 2015)(Citation: Frisk DMA August 2016)(Citation: McMillan Pwn March 2012)
Techniques related with vulnerability CVE-2018-11059
CVE-2018-11059 in RSA Archer. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1185 : Man in the Browser. Has an exploitation technique T1189 : Drive-by Compromise.
Techniques related with vulnerability CVE-2019-11869
CVE-2019-11869 in Yuzo Related Posts plugin 5.12.94 for WordPress. Is related with T1499.004 : Application or System Exploitation.
Techniques related with vulnerability CVE-2018-18956
CVE-2018-18956 in Suricata 4.x before 4.0.6. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2019-18581
CVE-2019-18581, State: PUBLISHED, Published: 2020-03-18T18:20:15.481791Z, Updated: 2024-09-16T23:01:47.466Z, Description: Dell EMC Data Protection Advisor versions 6.3, 6.4, 6.5, 18.2 versions prior to patch 83, and 19.1 versions prior to patch 71 contain a server missing authorization vulnerability in the REST API. A remote authenticated malicious user with administrative privileges may potentially exploit this vulnerability to alter the application’s allowable list of OS commands. This may lead to arbitrary OS command execution as the regular user runs the DPA service on the affected system., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 9.1, Base Severity: CRITICAL, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-1703
CVE-2019-1703, State: PUBLISHED, Published: 2019-05-03T16:00:26.411998Z, Updated: 2024-11-19T19:09:06.294Z, Description: A vulnerability in the internal packet-processing functionality of Cisco Firepower Threat Defense (FTD) Software for the Cisco Firepower 2100 Series could allow an unauthenticated, remote attacker to cause an affected device to stop processing traffic, resulting in a denial of service (DoS) condition. The vulnerability is due to a logic error, which may prevent ingress buffers from being replenished under specific traffic conditions. An attacker could exploit this vulnerability by sending a series of crafted packets to an affected device. A successful exploit could allow the attacker to consume all input buffers, which are shared between all interfaces, leading to a queue wedge condition in all active interfaces. This situation would cause an affected device to stop processing any incoming traffic and result in a DoS condition until the device is reloaded manually., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.6, Base Severity: HIGH, Confidentiality Impact: NONE, Integrity Impact: NONE, Privileges Required: NONE, Scope: CHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Describe the vulnerability CVE-2020-5290
CVE-2020-5290, State: PUBLISHED, Published: 2020-04-01T19:25:15, Updated: 2024-08-04T08:22:09.090Z, Description: In RedpwnCTF before version 2.3, there is a session fixation vulnerability in exploitable through the `#token=$ssid` hash when making a request to the `/verify` endpoint. An attacker team could potentially steal flags by, for example, exploiting a stored XSS payload in a CTF challenge so that victim teams who solve the challenge are unknowingly (and against their will) signed into the attacker team's account. Then, the attacker can gain points / value off the backs of the victims. This is patched in version 2.3., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 6.5, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: HIGH, Privileges Required: LOW, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2018-7520
CVE-2018-7520 in IP Cameras Access Control Vulnerability. Has primary impact with T1552.001 : Credentials In Files.
Techniques related with vulnerability CVE-2013-6282
CVE-2013-6282 in Linux kernel before 3.5.5. Is related with T1608 : Stage Capabilities.
Describe the vulnerability CVE-2018-15761
CVE-2018-15761, State: PUBLISHED, Published: 2018-11-19T14:00:00Z, Updated: 2024-09-17T00:46:20.654Z, Description: Cloud Foundry UAA release, versions prior to v64.0, and UAA, versions prior to 4.23.0, contains a validation error which allows for privilege escalation. A remote authenticated user may modify the url and content of a consent page to gain a token with arbitrary scopes that escalates their privileges., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 9.9, Base Severity: CRITICAL, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2019-1423
CVE-2019-1423 in Windows 10 Version 1903 for 32-bit Systems. Has primary impact with T1565 : Data Manipulation. Has secondary impact with T1068 : Exploitation for Privilege Escalation.
Techniques related with vulnerability CVE-2015-2387
CVE-2015-2387 in CISA's Known Exploited Vulnerabilities Catalog. Is related with T1068 : Exploitation for Privilege Escalation.
Techniques related with vulnerability CVE-2010-1165
CVE-2010-1165 in Atlassian JIRA 3.12 through 4.1. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
Techniques related with vulnerability CVE-2010-3916
CVE-2010-3916 in Ichitaro. Is related with T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2019-1812
CVE-2019-1812, State: PUBLISHED, Published: 2019-05-15T22:20:26.162102Z, Updated: 2024-11-20T17:19:07.317Z, Description: A vulnerability in the Image Signature Verification feature of Cisco NX-OS Software could allow an authenticated, local attacker with administrator-level credentials to install a malicious software image on an affected device. The vulnerability exists because software digital signatures are not properly verified during CLI command execution. An attacker could exploit this vulnerability to install an unsigned software image on an affected device., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: HIGH, Base Score: 6.7, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.
Describe MITRE technique T1480
MITRE T1480 : Execution Guardrails from enterprise Adversaries may use execution guardrails to constrain execution or actions based on adversary supplied and environment specific conditions that are expected to be present on the target. Guardrails ensure that a payload only executes against an intended target and reduces collateral damage from an adversary’s campaign.(Citation: FireEye Kevin Mandia Guardrails) Values an adversary can provide about a target system or environment to use as guardrails may include specific network share names, attached physical devices, files, joined Active Directory (AD) domains, and local/external IP addresses.(Citation: FireEye Outlook Dec 2019) Guardrails can be used to prevent exposure of capabilities in environments that are not intended to be compromised or operated within. This use of guardrails is distinct from typical [Virtualization/Sandbox Evasion](T1497). While use of [Virtualization/Sandbox Evasion](T1497) may involve checking for known sandbox values and continuing with execution only if there is no match, the use of guardrails will involve checking for an expected target-specific value and only continuing with execution if there is such a match.
Techniques related with vulnerability CVE-2016-6367
CVE-2016-6367 in Cisco Adaptive Security Appliance Software before 8.4(1). Is related with T1133 : External Remote Services. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1480 : Execution Guardrails.
Techniques related with vulnerability CVE-2018-18665
CVE-2018-18665 in mintToken function of Nexxus. Is related with T0828 : Loss of Productivity and Revenue.
Describe the vulnerability CVE-2016-3088
CVE-2016-3088, State: PUBLISHED, Published: 2016-06-01T20:00:00, Updated: 2024-08-05T23:40:15.630Z, Description: The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2018-19207
CVE-2018-19207 in Van Ons WP GDPR Compliance plugin before 1.4.3 for WordPress. Is related with T1190 : Exploit Public-Facing Application. Is related with T1499.004 : Application or System Exploitation.
Techniques related with vulnerability CVE-2016-0165
CVE-2016-0165 in Windows kernel. Is related with T1608 : Stage Capabilities.
Techniques related with vulnerability CVE-2020-3126
CVE-2020-3126 in Cisco Webex Meetings Multimedia Viewer. Has primary impact with T1080 : Taint Shared Content. Has primary impact with T1204.002 : Malicious File. Has an exploitation technique T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2019-11886
CVE-2019-11886 in WaspThemes Visual CSS Style Editor plugin before 7.2.1 for WordPress. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2019-1768
CVE-2019-1768, State: PUBLISHED, Published: 2019-05-16T01:25:21.627879Z, Updated: 2024-11-20T17:18:02.308Z, Description: A vulnerability in the implementation of a specific CLI command for Cisco NX-OS Software could allow an authenticated, local attacker with administrator credentials to cause a buffer overflow condition or perform command injection. This could allow the attacker to execute arbitrary commands with elevated privileges on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to a certain CLI command. An attacker could exploit this vulnerability by including malicious input as the argument of the affected CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. An attacker would need valid administrator credentials to exploit these vulnerabilities., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: HIGH, Base Score: 6.7, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.
Describe the vulnerability CVE-2018-18641
CVE-2018-18641, State: PUBLISHED, Published: 2018-12-04T23:00:00, Updated: 2024-08-05T11:15:59.991Z, Description: An issue was discovered in GitLab Community and Enterprise Edition before 11.2.7, 11.3.x before 11.3.8, and 11.4.x before 11.4.3. It has Cleartext Storage of Sensitive Information., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-3126
CVE-2020-3126, State: PUBLISHED, Published: 2020-04-13T16:40:12.767786Z, Updated: 2024-11-15T17:32:29.187Z, Description: vulnerability within the Multimedia Viewer feature of Cisco Webex Meetings could allow an authenticated, remote attacker to bypass security protections. The vulnerability is due to missing security warning dialog boxes when a room host views shared multimedia files. An authenticated, remote attacker could exploit this vulnerability by using the host role to share files within the Multimedia sharing feature and convincing a former room host to view that file. A warning dialog normally appears cautioning users before the file is displayed; however, the former host would not see that warning dialog, and any shared multimedia would be rendered within the user's browser. The attacker could leverage this behavior to conduct additional attacks by including malicious files within a targeted room host's browser window., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 3, Base Severity: LOW, Confidentiality Impact: NONE, Integrity Impact: LOW, Privileges Required: LOW, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Describe the vulnerability CVE-2020-11035
CVE-2020-11035, State: PUBLISHED, Published: 2020-05-05T21:30:12, Updated: 2024-08-04T11:21:14.511Z, Description: In GLPI after version 0.83.3 and before version 9.4.6, the CSRF tokens are generated using an insecure algorithm. The implementation uses rand and uniqid and MD5 which does not provide secure values. This is fixed in version 9.4.6., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 7.5, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: LOW, Privileges Required: NONE, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2013-3336
CVE-2013-3336 in Adobe ColdFusion. Is related with T1055 : Process Injection.
Describe the vulnerability CVE-2019-1402
CVE-2019-1402, State: PUBLISHED, Published: 2019-11-12T18:53:00, Updated: 2024-08-04T18:20:26.947Z, Description: An information disclosure vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory, aka 'Microsoft Office Information Disclosure Vulnerability'., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2017-14323
CVE-2017-14323, State: PUBLISHED, Published: 2018-04-10T15:00:00, Updated: 2024-08-05T19:20:41.517Z, Description: SSRF (Server Side Request Forgery) in getRemoteImage.php in Ueditor in Onethink V1.0 and V1.1 allows remote attackers to obtain sensitive information, attack intranet hosts, or possibly trigger remote command execution via the upfile parameter., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2018-14679
CVE-2018-14679 in libmspack before 0.7alpha. Is related with T1499.004 : Application or System Exploitation.
Describe the vulnerability CVE-2018-10633
CVE-2018-10633, State: PUBLISHED, Published: 2018-07-11T17:00:00Z, Updated: 2024-09-17T01:00:45.449Z, Description: Universal Robots Robot Controllers Version CB 3.1, SW Version 3.4.5-100 utilizes hard-coded credentials that may allow an attacker to reset passwords for the controller., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-15454
CVE-2018-15454, State: PUBLISHED, Published: 2018-11-01T13:00:00Z, Updated: 2024-09-16T23:16:30.396Z, Description: A vulnerability in the Session Initiation Protocol (SIP) inspection engine of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload or trigger high CPU, resulting in a denial of service (DoS) condition. The vulnerability is due to improper handling of SIP traffic. An attacker could exploit this vulnerability by sending SIP requests designed to specifically trigger this issue at a high rate across an affected device. Software updates that address this vulnerability are not yet available., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.6, Base Severity: HIGH, Confidentiality Impact: NONE, Integrity Impact: NONE, Privileges Required: NONE, Scope: CHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) has become aware of active exploitation of the vulnerability that is described in this advisory.
Techniques related with vulnerability CVE-2020-15393
CVE-2020-15393 in Linux kernel 4.4 through 5.7.6. Is related with T1091 : Replication Through Removable Media. Is related with T1499.001 : OS Exhaustion Flood.
Techniques related with vulnerability CVE-2012-0874
CVE-2012-0874 in JBoss Enterprise Application Platform. Is related with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2016-5195
CVE-2016-5195 in Linux kernel 2.x through 4.x before 4.8.3. Is related with T1068 : Exploitation for Privilege Escalation.
Describe MITRE technique T1552.001
MITRE T1552.001 : Credentials In Files from enterprise Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials. These can be files created by users to store their own credentials, shared credential stores for a group of individuals, configuration files containing passwords for a system or service, or source code/binary files containing embedded passwords. It is possible to extract passwords from backups or saved virtual machines through [OS Credential Dumping](T1003).(Citation: CG 2014) Passwords may also be obtained from Group Policy Preferences stored on the Windows Domain Controller.(Citation: SRD GPP) In cloud and/or containerized environments, authenticated user and service account credentials are often stored in local configuration and credential files.(Citation: Unit 42 Hildegard Malware) They may also be found as parameters to deployment commands in container logs.(Citation: Unit 42 Unsecured Docker Daemons) In some cases, these files can be copied and reused on another machine or the contents can be read and then used to authenticate without needing to copy any files.(Citation: Specter Ops - Cloud Credential Storage)
Describe the vulnerability CVE-2016-9299
CVE-2016-9299, State: PUBLISHED, Published: 2017-01-12T23:00:00, Updated: 2024-08-06T02:50:36.759Z, Description: The remoting module in Jenkins before 2.32 and LTS before 2.19.3 allows remote attackers to execute arbitrary code via a crafted serialized Java object, which triggers an LDAP query to a third-party server., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2009-1151
CVE-2009-1151, State: PUBLISHED, Published: 2009-03-26T14:00:00, Updated: 2024-08-07T05:04:48.303Z, Description: Static code injection vulnerability in setup.php in phpMyAdmin 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 allows remote attackers to inject arbitrary PHP code into a configuration file via the save action., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-18956
CVE-2018-18956, State: PUBLISHED, Published: 2018-11-05T21:00:00, Updated: 2024-08-05T11:23:08.491Z, Description: The ProcessMimeEntity function in util-decode-mime.c in Suricata 4.x before 4.0.6 allows remote attackers to cause a denial of service (segfault and daemon crash) via crafted input to the SMTP parser, as exploited in the wild in November 2018., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2013-3644
CVE-2013-3644, State: PUBLISHED, Published: 2013-06-18T18:45:00Z, Updated: 2024-09-17T01:46:11.964Z, Description: Unspecified vulnerability in JustSystems Ichitaro 2006 through 2013; Ichitaro Pro through 2; Ichitaro Government 6, 7, and 2006 through 2010; Ichitaro Portable with oreplug; Ichitaro Viewer; and Ichitaro JUST School through 2010 allows remote attackers to execute arbitrary code via a crafted document., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2019-17026
CVE-2019-17026 in Firefox ESR. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2020-10189
CVE-2020-10189, State: PUBLISHED, Published: 2020-03-06T16:05:22, Updated: 2024-08-04T10:58:39.095Z, Description: Zoho ManageEngine Desktop Central before 10.0.474 allows remote code execution because of deserialization of untrusted data in getChartImage in the FileStorage class. This is related to the CewolfServlet and MDMLogUploaderServlet servlets., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 9.8, Base Severity: CRITICAL, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe the vulnerability CVE-2010-2152
CVE-2010-2152, State: PUBLISHED, Published: 2010-06-03T16:00:00, Updated: 2024-08-07T02:25:07.018Z, Description: Unspecified vulnerability in JustSystems Ichitaro 2004 through 2009, Ichitaro Government 2006 through 2009, and Just School 2008 and 2009 allows remote attackers to execute arbitrary code via unknown vectors related to "product character attribute processing" for a document., No CVSS metrics available, Exploit Info: No exploit information available
Describe MITRE technique T1499.004
MITRE T1499.004 : Application or System Exploitation from enterprise Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users. (Citation: Sucuri BIND9 August 2015) Some systems may automatically restart critical applications and services when crashes occur, but they can likely be re-exploited to cause a persistent denial of service (DoS) condition. Adversaries may exploit known or zero-day vulnerabilities to crash applications and/or systems, which may also lead to dependent applications and/or systems to be in a DoS condition. Crashed or restarted applications or systems may also have other effects such as [Data Destruction](T1485), [Firmware Corruption](T1495), [Service Stop](T1489) etc. which may further cause a DoS condition and deny availability to critical information, applications and/or systems.
Techniques related with vulnerability CVE-2019-1052
CVE-2019-1052 in Microsoft Edge. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1189 : Drive-by Compromise. Has an exploitation technique T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2011-3056
CVE-2011-3056, State: PUBLISHED, Published: 2012-03-22T16:00:00, Updated: 2024-08-06T23:22:27.379Z, Description: Google Chrome before 17.0.963.83 allows remote attackers to bypass the Same Origin Policy via vectors involving a "magic iframe.", No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2012-1723
CVE-2012-1723, State: PUBLISHED, Published: 2012-06-16T21:00:00, Updated: 2024-08-06T19:08:37.635Z, Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-6819
CVE-2020-6819, State: PUBLISHED, Published: 2020-04-24T15:56:56, Updated: 2024-08-04T09:11:05.160Z, Description: Under certain conditions, when running the nsDocShell destructor, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Thunderbird < 68.7.0, Firefox < 74.0.1, and Firefox ESR < 68.6.1., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-11060
CVE-2018-11060, State: PUBLISHED, Published: 2018-07-24T19:00:00Z, Updated: 2024-09-16T16:58:13.454Z, Description: RSA Archer, versions prior to 6.4.0.1, contain an authorization bypass vulnerability in the REST API. A remote authenticated malicious Archer user could potentially exploit this vulnerability to elevate their privileges., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.8, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2012-1795
CVE-2012-1795 in Webglimpse before 2.20.0. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059.004 : Unix Shell.
Describe the vulnerability CVE-2013-2465
CVE-2013-2465, State: PUBLISHED, Published: 2013-06-18T22:00:00, Updated: 2024-08-06T15:36:46.609Z, Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image channel verification" in 2D., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2015-6175
CVE-2015-6175, State: PUBLISHED, Published: 2015-12-09T11:00:00, Updated: 2024-08-06T07:15:13.282Z, Description: The kernel in Microsoft Windows 10 Gold allows local users to gain privileges via a crafted application, aka "Windows Kernel Memory Elevation of Privilege Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-5336
CVE-2020-5336 in RSA Archer. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link.
Techniques related with vulnerability CVE-2018-7600
CVE-2018-7600 in Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1. Is related with T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2013-7246
CVE-2013-7246, State: PUBLISHED, Published: 2014-01-30T18:00:00, Updated: 2024-08-06T18:01:19.613Z, Description: Buffer overflow in the IconCreate method in an ActiveX control in the DaumGame ActiveX plugin 1.1.0.4 and 1.1.0.5 allows remote attackers to execute arbitrary code via a long string, as exploited in the wild in January 2014., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2017-1001000
CVE-2017-1001000 in REST API in WordPress 4.7.x before 4.7.2. Is related with T1190 : Exploit Public-Facing Application. Is related with T1491.002 : External Defacement.
Techniques related with vulnerability CVE-2019-0911
CVE-2019-0911 in Internet Explorer 11. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1189 : Drive-by Compromise. Has an exploitation technique T1204.002 : Malicious File.
Techniques related with vulnerability CVE-2019-0859
CVE-2019-0859 in Windows. Is related with T1068 : Exploitation for Privilege Escalation.
Techniques related with vulnerability CVE-2016-9192
CVE-2016-9192 in Cisco AnyConnect Secure Mobility Client. Is related with T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2019-3728
CVE-2019-3728, State: PUBLISHED, Published: 2019-09-30T21:48:40.164927Z, Updated: 2024-09-17T03:03:11.526Z, Description: RSA BSAFE Crypto-C Micro Edition versions prior to 4.0.5.4 (in 4.0.x) and 4.1.4 (in 4.1.x) and RSA BSAFE Micro Edition Suite versions prior to 4.0.13 (in 4.0.x) and prior to 4.4 (in 4.1.x, 4.2.x, 4.3.x) are vulnerable to a Buffer Over-read vulnerability when processing DSA signature. A malicious remote user could potentially exploit this vulnerability to cause a crash in the library of the affected system., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 7.5, Base Severity: HIGH, Confidentiality Impact: NONE, Integrity Impact: NONE, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-12655
CVE-2020-12655, State: PUBLISHED, Published: 2020-05-05T05:16:02, Updated: 2024-08-04T12:04:22.557Z, Description: An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2009-3129
CVE-2009-3129, State: PUBLISHED, Published: 2009-11-11T19:00:00, Updated: 2024-08-07T06:14:56.278Z, Description: Microsoft Office Excel 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Excel Viewer 2003 SP3; Office Excel Viewer SP1 and SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allows remote attackers to execute arbitrary code via a spreadsheet with a FEATHEADER record containing an invalid cbHdrData size element that affects a pointer offset, aka "Excel Featheader Record Memory Corruption Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-1423
CVE-2019-1423, State: PUBLISHED, Published: 2019-11-12T18:53:07, Updated: 2024-08-04T18:20:27.492Z, Description: An elevation of privilege vulnerability exists in the way that the StartTileData.dll handles file creation in protected locations, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1420, CVE-2019-1422., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-5332
CVE-2020-5332 in RSA Archer. Has primary impact with T1059 : Command and Scripting Interpreter.
Describe the vulnerability CVE-2014-3566
CVE-2014-3566, State: PUBLISHED, Published: 2014-10-15T00:00:00, Updated: 2024-08-06T10:50:17.863Z, Description: The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2014-6293
CVE-2014-6293 in Statistics (ke_stats) extension before 1.1.2 for TYPO3. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059 : Command and Scripting Interpreter.
Techniques related with vulnerability CVE-2020-11010
CVE-2020-11010 in tortoise-orm. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1505.003 : Web Shell. Has secondary impact with T1136 : Create Account. Has secondary impact with T1190 : Exploit Public-Facing Application. Has secondary impact with T1565.001 : Stored Data Manipulation. Has an exploitation technique T1133 : External Remote Services.
Describe MITRE technique T1546
MITRE T1546 : Event Triggered Execution from enterprise Adversaries may establish persistence and/or elevate privileges using system mechanisms that trigger execution based on specific events. Various operating systems have means to monitor and subscribe to events such as logons or other user activity such as running specific applications/binaries. Cloud environments may also support various functions and services that monitor and can be invoked in response to specific cloud events.(Citation: Backdooring an AWS account)(Citation: Varonis Power Automate Data Exfiltration)(Citation: Microsoft DART Case Report 001) Adversaries may abuse these mechanisms as a means of maintaining persistent access to a victim via repeatedly executing malicious code. After gaining access to a victim system, adversaries may create/modify event triggers to point to malicious content that will be executed whenever the event trigger is invoked.(Citation: FireEye WMI 2015)(Citation: Malware Persistence on OS X)(Citation: amnesia malware) Since the execution can be proxied by an account with higher permissions, such as SYSTEM or service accounts, an adversary may be able to abuse these triggered execution mechanisms to escalate their privileges.
Describe the vulnerability CVE-2019-15288
CVE-2019-15288, State: PUBLISHED, Published: 2019-11-26T03:11:49.444527Z, Updated: 2024-11-20T17:04:36.448Z, Description: A vulnerability in the CLI of Cisco TelePresence Collaboration Endpoint (CE), Cisco TelePresence Codec (TC), and Cisco RoomOS Software could allow an authenticated, remote attacker to escalate privileges to an unrestricted user of the restricted shell. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by including specific arguments when opening an SSH connection to an affected device. A successful exploit could allow the attacker to gain unrestricted user access to the restricted shell of an affected device., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.8, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Techniques related with vulnerability CVE-2020-3198
CVE-2020-3198 in Cisco IOS 12.2(60)EZ16. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1189 : Drive-by Compromise. Has an exploitation technique T1190 : Exploit Public-Facing Application. Has an exploitation technique T1133 : External Remote Services. Has an exploitation technique T1566 : Phishing. Has an exploitation technique T1204.002 : Malicious File. Has an exploitation technique T1091 : Replication Through Removable Media.
Describe the vulnerability CVE-2020-3216
CVE-2020-3216, State: PUBLISHED, Published: 2020-06-03T17:41:22.604437Z, Updated: 2024-11-15T17:16:51.616Z, Description: A vulnerability in Cisco IOS XE SD-WAN Software could allow an unauthenticated, physical attacker to bypass authentication and gain unrestricted access to the root shell of an affected device. The vulnerability exists because the affected software has insufficient authentication mechanisms for certain commands. An attacker could exploit this vulnerability by stopping the boot initialization of an affected device. A successful exploit could allow the attacker to bypass authentication and gain unrestricted access to the root shell of the affected device., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: PHYSICAL, Availability Impact: HIGH, Base Score: 6.8, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Describe the vulnerability CVE-2018-0622
CVE-2018-0622, State: PUBLISHED, Published: 2018-07-26T17:00:00, Updated: 2024-08-05T03:28:11.369Z, Description: The DHC Online Shop App for Android version 3.2.0 and earlier does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2014-6120
CVE-2014-6120, State: PUBLISHED, Published: 2018-04-12T21:00:00, Updated: 2024-08-06T12:10:11.761Z, Description: IBM Rational AppScan Source 8.0 through 8.0.0.2 and 8.5 through 8.5.0.1 and Security AppScan Source 8.6 through 8.6.0.2, 8.7 through 8.7.0.1, 8.8, 9.0 through 9.0.0.1, and 9.0.1 allow remote attackers to execute arbitrary commands on the installation server via unspecified vectors. IBM X-Force ID: 96721., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-12769
CVE-2020-12769 in Linux kernel before 5.4.17. Is related with T1499.004 : Application or System Exploitation.
Describe the vulnerability CVE-2019-15958
CVE-2019-15958, State: PUBLISHED, Published: 2019-11-26T03:11:37.063933Z, Updated: 2024-11-20T17:04:51.777Z, Description: A vulnerability in the REST API of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network Manager (EPNM) could allow an unauthenticated remote attacker to execute arbitrary code with root privileges on the underlying operating system. The vulnerability is due to insufficient input validation during the initial High Availability (HA) configuration and registration process of an affected device. An attacker could exploit this vulnerability by uploading a malicious file during the HA registration period. A successful exploit could allow the attacker to execute arbitrary code with root-level privileges on the underlying operating system. Note: This vulnerability can only be exploited during the HA registration period. See the Details section for more information., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.1, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any malicious use of the vulnerability that is described in this advisory.
Describe the vulnerability CVE-2018-15393
CVE-2018-15393, State: PUBLISHED, Published: 2018-11-08T17:00:00Z, Updated: 2024-09-17T02:05:54.667Z, Description: A vulnerability in the web-based management interface of Cisco Content Security Management Appliance (SMA) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a maliciously crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 4.8, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: HIGH, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Describe the vulnerability CVE-2015-2426
CVE-2015-2426, State: PUBLISHED, Published: 2015-07-20T18:00:00, Updated: 2024-08-06T05:17:26.168Z, Description: Buffer underflow in atmfd.dll in the Windows Adobe Type Manager Library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted OpenType font, aka "OpenType Font Driver Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-18667
CVE-2018-18667, State: PUBLISHED, Published: 2018-12-28T17:00:00, Updated: 2024-08-05T11:16:00.265Z, Description: The mintToken function of Pylon (PYLNT) aka PylonToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value, a related issue to CVE-2018-11812., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-8540
CVE-2019-8540, State: PUBLISHED, Published: 2019-12-18T17:33:17, Updated: 2024-08-04T21:24:27.843Z, Description: A memory initialization issue was addressed with improved memory handling. This issue is fixed in iOS 12.2, macOS Mojave 10.14.4, tvOS 12.2, watchOS 5.2. A malicious application may be able to determine kernel memory layout., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-3732
CVE-2019-3732, State: PUBLISHED, Published: 2019-09-30T21:48:40.337065Z, Updated: 2024-09-16T16:37:45.300Z, Description: RSA BSAFE Crypto-C Micro Edition, versions prior to 4.0.5.3 (in 4.0.x) and versions prior to 4.1.3.3 (in 4.1.x), and RSA Micro Edition Suite, versions prior to 4.0.11 (in 4.0.x) versions prior to 4.1.6.1 (in 4.1.x) and versions prior to 4.3.3 (4.2.x and 4.3.x) are vulnerable to an Information Exposure Through Timing Discrepancy. A malicious remote user could potentially exploit this vulnerability to extract information leaving data at risk of exposure., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 5.9, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: NONE, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2016-5062
CVE-2016-5062 in web server in Aternity before 9.0.1. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059 : Command and Scripting Interpreter.
Describe the vulnerability CVE-2011-0096
CVE-2011-0096, State: PUBLISHED, Published: 2011-01-31T19:00:00, Updated: 2024-08-06T21:43:14.219Z, Description: The MHTML protocol handler in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle a MIME format in a request for content blocks in a document, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site that is visited in Internet Explorer, aka "MHTML Mime-Formatted Request Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2013-3660
CVE-2013-3660 in win32k.sys in the kernel-mode drivers in Microsoft Windows. Is related with T1608 : Stage Capabilities.
Describe the vulnerability CVE-2018-15392
CVE-2018-15392, State: PUBLISHED, Published: 2018-10-05T14:00:00Z, Updated: 2024-09-17T01:31:09.993Z, Description: A vulnerability in the DHCP service of Cisco Industrial Network Director could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper handling of DHCP lease requests. An attacker could exploit this vulnerability by sending malicious DHCP lease requests to an affected application. A successful exploit could allow the attacker to cause the DHCP service to terminate, resulting in a DoS condition., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-1350
CVE-2020-1350 in Windows Server. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2013-5057
CVE-2013-5057, State: PUBLISHED, Published: 2013-12-11T00:00:00, Updated: 2024-08-06T16:59:41.315Z, Description: hxds.dll in Microsoft Office 2007 SP3 and 2010 SP1 and SP2 does not implement the ASLR protection mechanism, which makes it easier for remote attackers to execute arbitrary code via a crafted COM component on a web site that is visited with Internet Explorer, as exploited in the wild in December 2013, aka "HXDS ASLR Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-5386
CVE-2020-5386, State: PUBLISHED, Published: 2020-09-02T20:55:19.410906Z, Updated: 2024-09-16T20:58:12.206Z, Description: Dell EMC ECS, versions prior to 3.5, contains an Exposure of Resource vulnerability. A remote unauthenticated attacker can access the list of DT (Directory Table) objects of all internally running services and gain knowledge of sensitive data of the system., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.1, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe the vulnerability CVE-2011-3172
CVE-2011-3172, State: PUBLISHED, Published: 2018-06-08T13:00:00Z, Updated: 2024-09-17T04:28:45.768Z, Description: A vulnerability in pam_modules of SUSE Linux Enterprise allows attackers to log into accounts that should have been disabled. Affected releases are SUSE Linux Enterprise: versions prior to 12., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 5.4, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-8120
CVE-2018-8120, State: PUBLISHED, Published: 2018-05-09T19:00:00, Updated: 2024-08-05T06:46:13.353Z, Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows Server 2008, Windows 7, Windows Server 2008 R2. This CVE ID is unique from CVE-2018-8124, CVE-2018-8164, CVE-2018-8166., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2016-7193
CVE-2016-7193 in Microsoft Word. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2020-11045
CVE-2020-11045, State: PUBLISHED, Published: 2020-05-07T00:00:00, Updated: 2024-08-04T11:21:14.543Z, Description: In FreeRDP after 1.0 and before 2.0.0, there is an out-of-bound read in in update_read_bitmap_data that allows client memory to be read to an image buffer. The result displayed on screen as colour., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: LOW, Base Score: 2.2, Base Severity: LOW, Confidentiality Impact: NONE, Integrity Impact: NONE, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-16198
CVE-2020-16198, State: PUBLISHED, Published: 2020-09-18T17:50:08, Updated: 2024-08-04T13:37:53.917Z, Description: Philips Clinical Collaboration Platform, Versions 12.2.1 and prior. When an attacker claims to have a given identity, the software does not prove or insufficiently proves the claim is correct., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2017-9841
CVE-2017-9841 in PHPUnit before 4.8.28 and 5.x before 5.6.3. Is related with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2014-9938
CVE-2014-9938 in Git before 1.9.3. Is related with T1133 : External Remote Services. Is related with T1059.004 : Unix Shell.
Describe the vulnerability CVE-2018-12520
CVE-2018-12520, State: PUBLISHED, Published: 2018-07-05T20:00:00, Updated: 2024-08-05T08:38:05.943Z, Description: An issue was discovered in ntopng 3.4 before 3.4.180617. The PRNG involved in the generation of session IDs is not seeded at program startup. This results in deterministic session IDs being allocated for active user sessions. An attacker with foreknowledge of the operating system and standard library in use by the host running the service and the username of the user whose session they're targeting can abuse the deterministic random number generation in order to hijack the user's session, thus escalating their access., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2017-9142
CVE-2017-9142 in ImageMagick 7.0.5-7 Q16. Is related with T1499.004 : Application or System Exploitation.
Techniques related with vulnerability CVE-2017-12817
CVE-2017-12817 in Kaspersky Lab Kaspersky Internet Security for Android 11.12.4.1622. Is related with T1409 : Access Stored Application Data.
Techniques related with vulnerability CVE-2009-1308
CVE-2009-1308 in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey. Is related with T1190 : Exploit Public-Facing Application.