input
stringlengths
30
54
output
stringlengths
69
4.21k
Techniques related with vulnerability CVE-2010-2772
CVE-2010-2772 in Siemens Simatic WinCC and PCS 7 SCADA. Is related with T1133 : External Remote Services. Is related with T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2020-11073
CVE-2020-11073, State: PUBLISHED, Published: 2020-05-13T18:55:14, Updated: 2024-08-04T11:21:14.525Z, Description: In Autoswitch Python Virtualenv before version 0.16.0, a user who enters a directory with a malicious `.venv` file could run arbitrary code without any user interaction. This is fixed in version: 1.16.0, CVSS v3.1 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: NONE, Base Score: 7.9, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2014-4114
CVE-2014-4114 in Microsoft Windows Vista, Windows Server 2008, Windows 7, Windows 8, Windows 8.1, Windows Server 2012 y Windows RT. Is related with T1059 : Command and Scripting Interpreter. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1211 : Exploitation for Defense Evasion.
Describe the vulnerability CVE-2018-15772
CVE-2018-15772, State: PUBLISHED, Published: 2018-11-13T14:00:00Z, Updated: 2024-09-17T01:10:33.151Z, Description: Dell EMC RecoverPoint versions prior to 5.1.2.1 and RecoverPoint for VMs versions prior to 5.2.0.2 contain an uncontrolled resource consumption vulnerability. A malicious boxmgmt user may potentially be able to consume large amount of CPU bandwidth to make the system slow or to determine the existence of any system file via Boxmgmt CLI., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2018-8355
CVE-2018-8355 in ChakraCore. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation. Has secondary impact with T1485 : Data Destruction. Has secondary impact with T1136 : Create Account. Has an exploitation technique T1189 : Drive-by Compromise. Has an exploitation technique T1204.002 : Malicious File.
Techniques related with vulnerability CVE-2019-18234
CVE-2019-18234 in Equinox Control Expert. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1505.003 : Web Shell. Has secondary impact with T1136 : Create Account. Has secondary impact with T1190 : Exploit Public-Facing Application. Has secondary impact with T1565.001 : Stored Data Manipulation. Has an exploitation technique T1133 : External Remote Services.
Describe the vulnerability CVE-2019-15998
CVE-2019-15998, State: PUBLISHED, Published: 2019-11-26T03:41:32.678014Z, Updated: 2024-11-19T18:51:44.429Z, Description: A vulnerability in the access-control logic of the NETCONF over Secure Shell (SSH) of Cisco IOS XR Software may allow connections despite an access control list (ACL) that is configured to deny access to the NETCONF over SSH of an affected device. The vulnerability is due to a missing check in the NETCONF over SSH access control list (ACL). An attacker could exploit this vulnerability by connecting to an affected device using NETCONF over SSH. A successful exploit could allow the attacker to connect to the device on the NETCONF port. Valid credentials are required to access the device. This vulnerability does not affect connections to the default SSH process on the device., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 5.3, Base Severity: MEDIUM, Confidentiality Impact: NONE, Integrity Impact: LOW, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Techniques related with vulnerability CVE-2019-5910
CVE-2019-5910 in HOUSE GATE App for iOS. Is related with T1190 : Exploit Public-Facing Application. Is related with T1005 : Data from Local System.
Describe the vulnerability CVE-2015-0071
CVE-2015-0071, State: PUBLISHED, Published: 2015-02-11T02:00:00, Updated: 2024-08-06T03:55:27.982Z, Description: Microsoft Internet Explorer 9 through 11 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Internet Explorer ASLR Bypass Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-4408
CVE-2020-4408 in Qradar Advisor. Is related with T1552 : Unsecured Credentials.
Techniques related with vulnerability CVE-2019-16759
CVE-2019-16759 in vBulletin 5.x through 5.5.4. Is related with T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2016-3714
CVE-2016-3714, State: PUBLISHED, Published: 2016-05-05T18:00:00, Updated: 2024-09-09T16:20:23.386Z, Description: The (1) EPHEMERAL, (2) HTTPS, (3) MVG, (4) MSL, (5) TEXT, (6) SHOW, (7) WIN, and (8) PLT coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to execute arbitrary code via shell metacharacters in a crafted image, aka "ImageTragick.", No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-3379
CVE-2020-3379 in Cisco SD-WAN Solution. Has primary impact with T1608 : Stage Capabilities. Has an exploitation technique T1078 : Valid Accounts.
Techniques related with vulnerability CVE-2017-0199
CVE-2017-0199 in Office/WordPad. Is related with T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2016-0167
CVE-2016-0167, State: PUBLISHED, Published: 2016-04-12T23:00:00, Updated: 2024-08-05T22:08:13.336Z, Description: The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0143 and CVE-2016-0165., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-6974
CVE-2020-6974, State: PUBLISHED, Published: 2020-04-07T17:06:02, Updated: 2024-08-04T09:18:02.542Z, Description: Honeywell Notifier Web Server (NWS) Version 3.50 is vulnerable to a path traversal attack, which allows an attacker to bypass access to restricted directories. Honeywell has released a firmware update to address the problem., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-5365
CVE-2020-5365 in Isilon OneFS. Has primary impact with T1078.001 : Default Accounts. Has an exploitation technique T1110 : Brute Force.
Techniques related with vulnerability CVE-2017-11847
CVE-2017-11847 in Windows kernel. Is related with T1566 : Phishing. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2019-3706
CVE-2019-3706, State: PUBLISHED, Published: 2019-04-26T18:22:09.012297Z, Updated: 2024-09-17T00:26:34.078Z, Description: Dell EMC iDRAC9 versions prior to 3.24.24.24, 3.21.26.22, 3.22.22.22 and 3.21.25.22 contain an authentication bypass vulnerability. A remote attacker may potentially exploit this vulnerability to bypass authentication and gain access to the system by sending specially crafted data to the iDRAC web interface., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.6, Base Severity: HIGH, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe the vulnerability CVE-2015-3864
CVE-2015-3864, State: PUBLISHED, Published: 2015-10-01T00:00:00, Updated: 2024-08-06T05:56:15.946Z, Description: Integer underflow in the MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in mediaserver in Android before 5.1.1 LMY48M allows remote attackers to execute arbitrary code via crafted MPEG-4 data, aka internal bug 23034759. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-3824., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-0671
CVE-2020-0671 in Windows. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation. Has secondary impact with T1485 : Data Destruction. Has secondary impact with T1136 : Create Account.
Describe the vulnerability CVE-2018-13379
CVE-2018-13379, State: PUBLISHED, Published: 2019-06-04T20:18:08, Updated: 2024-10-23T13:32:35.204Z, Description: An Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal") in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 9.1, Base Severity: CRITICAL, Confidentiality Impact: HIGH, Integrity Impact: NONE, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2018-20250
CVE-2018-20250 in WinRAR. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File.
Describe MITRE technique T1574
MITRE T1574 : Hijack Execution Flow from enterprise Adversaries may execute their own malicious payloads by hijacking the way operating systems run programs. Hijacking execution flow can be for the purposes of persistence, since this hijacked execution may reoccur over time. Adversaries may also use these mechanisms to elevate privileges or evade defenses, such as application control or other restrictions on execution. There are many ways an adversary may hijack the flow of execution, including by manipulating how the operating system locates programs to be executed. How the operating system locates libraries to be used by a program can also be intercepted. Locations where the operating system looks for programs/resources, such as file directories and in the case of Windows the Registry, could also be poisoned to include malicious payloads.
Describe the vulnerability CVE-2019-1790
CVE-2019-1790, State: PUBLISHED, Published: 2019-05-15T20:05:14.522885Z, Updated: 2024-11-20T17:20:35.731Z, Description: A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker with valid administrator credentials to execute arbitrary commands on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of arguments passed to certain CLI commands. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with elevated privileges. An attacker would need valid administrator credentials to exploit this vulnerability., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: HIGH, Base Score: 6.7, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Techniques related with vulnerability CVE-2020-15170
CVE-2020-15170 in apollo. Has primary impact with T1190 : Exploit Public-Facing Application. Has primary impact with T1478 : Install Insecure or Malicious Configuration.
Describe the vulnerability CVE-2018-1000861
CVE-2018-1000861, State: PUBLISHED, Published: 2018-12-10T14:00:00, Updated: 2024-08-05T12:47:57.431Z, Description: A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java that allows attackers to invoke some methods on Java objects by accessing crafted URLs that were not intended to be invoked this way., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-1163
CVE-2020-1163 in Microsoft Forefront Endpoint Protection. Has primary impact with T1485 : Data Destruction.
Describe the vulnerability CVE-2015-6585
CVE-2015-6585, State: PUBLISHED, Published: 2017-07-25T18:00:00, Updated: 2024-08-06T07:22:22.418Z, Description: hwpapp.dll in Hangul Word Processor allows remote attackers to execute arbitrary code via a crafted heap spray, and by leveraging a "type confusion" via an HWPX file containing a crafted para text tag., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-15797
CVE-2018-15797, State: PUBLISHED, Published: 2018-12-05T18:00:00Z, Updated: 2024-09-16T18:24:31.452Z, Description: Cloud Foundry NFS volume release, 1.2.x prior to 1.2.5, 1.5.x prior to 1.5.4, 1.7.x prior to 1.7.3, logs the cf admin username and password when running the nfsbrokerpush BOSH deploy errand. A remote authenticated user with access to BOSH can obtain the admin credentials for the Cloud Foundry Platform through the logs of the NFS volume deploy errand., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: ADJACENT_NETWORK, Availability Impact: HIGH, Base Score: 8.4, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-1689
CVE-2019-1689, State: PUBLISHED, Published: 2019-02-25T18:00:00Z, Updated: 2024-09-17T02:00:54.371Z, Description: A vulnerability in the client application for iOS of Cisco Webex Teams could allow an authenticated, remote attacker to upload arbitrary files within the scope of the iOS application. The vulnerability is due to improper input validation in the client application. An attacker could exploit this vulnerability by sending a malicious file to a targeted user and persuading the user to manually open it. An exploit could allow the attacker to overwrite sensitive application files and eventually cause a denial of service (DoS) condition by foreclosing future access to the system to the targeted user. This vulnerability is fixed in version 3.13.26920., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 7.3, Base Severity: HIGH, Confidentiality Impact: NONE, Integrity Impact: HIGH, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Describe MITRE technique T1059
MITRE T1059 : Command and Scripting Interpreter from enterprise Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries. These interfaces and languages provide ways of interacting with computer systems and are a common feature across many different platforms. Most systems come with some built-in command-line interface and scripting capabilities, for example, macOS and Linux distributions include some flavor of [Unix Shell](T1059.004) while Windows installations include the [Windows Command Shell](T1059.003) and [PowerShell](T1059.001). There are also cross-platform interpreters such as [Python](T1059.006), as well as those commonly associated with client applications such as [JavaScript](T1059.007) and [Visual Basic](T1059.005). Adversaries may abuse these technologies in various ways as a means of executing arbitrary commands. Commands and scripts can be embedded in [Initial Access](TA0001) payloads delivered to victims as lure documents or as secondary payloads downloaded from an existing C2. Adversaries may also execute commands through interactive terminals/shells, as well as utilize various [Remote Services](T1021) in order to achieve remote Execution.(Citation: Powershell Remote Commands)(Citation: Cisco IOS Software Integrity Assurance - Command History)(Citation: Remote Shell Execution in Python)
Describe the vulnerability CVE-2019-9081
CVE-2019-9081, State: REJECTED, Published: 2019-02-24T17:00:00, Updated: 2022-08-19T23:15:37, Description: No description available, No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2010-3888
CVE-2010-3888 in Windows 32-bit Systems. Is related with T1059 : Command and Scripting Interpreter. Is related with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2019-0880
CVE-2019-0880 in Windows Server. Is related with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2018-10620
CVE-2018-10620 in InduSoft Web Studio. Has primary impact with T1574 : Hijack Execution Flow.
Describe the vulnerability CVE-2014-1761
CVE-2014-1761, State: PUBLISHED, Published: 2014-03-24T19:00:00, Updated: 2024-08-06T09:50:11.185Z, Description: Microsoft Word 2003 SP3, 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Word Viewer; Office Compatibility Pack SP3; Office for Mac 2011; Word Automation Services on SharePoint Server 2010 SP1 and SP2 and 2013; Office Web Apps 2010 SP1 and SP2; and Office Web Apps Server 2013 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted RTF data, as exploited in the wild in March 2014., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-3253
CVE-2020-3253 in Cisco Firepower Threat Defense Software. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1078 : Valid Accounts.
Techniques related with vulnerability CVE-2019-5954
CVE-2019-5954 in JR East Japan train operation information push notification App for Android. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1565.001 : Stored Data Manipulation.
Techniques related with vulnerability CVE-2019-10990
CVE-2019-10990 in Red Lion Controls Crimson (Windows configuration software). Has primary impact with T1078.001 : Default Accounts.
Describe the vulnerability CVE-2014-9938
CVE-2014-9938, State: PUBLISHED, Published: 2017-03-20T00:00:00, Updated: 2024-08-06T14:02:37.321Z, Description: contrib/completion/git-prompt.sh in Git before 1.9.3 does not sanitize branch names in the PS1 variable, allowing a malicious repository to cause code execution., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-16179
CVE-2018-16179, State: PUBLISHED, Published: 2019-01-09T22:00:00, Updated: 2024-08-05T10:17:38.293Z, Description: The Mizuho Direct App for Android version 3.13.0 and earlier does not verify server certificates, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2010-3653
CVE-2010-3653, State: PUBLISHED, Published: 2010-10-26T17:00:00, Updated: 2024-08-07T03:18:53.097Z, Description: The Director module (dirapi.dll) in Adobe Shockwave Player before 11.5.9.615 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted rcsL chunk containing a field whose value is used as a pointer offset, as exploited in the wild in October 2010. NOTE: some of these details are obtained from third party information., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-11023
CVE-2020-11023 in jQuery. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link.
Describe the vulnerability CVE-2017-9841
CVE-2017-9841, State: PUBLISHED, Published: 2017-06-27T17:00:00, Updated: 2024-08-05T17:18:02.203Z, Description: Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2019-1753
CVE-2019-1753 in Cisco IOS XE Software. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has secondary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1190 : Exploit Public-Facing Application. Has an exploitation technique T1078 : Valid Accounts.
Describe the vulnerability CVE-2019-1876
CVE-2019-1876, State: PUBLISHED, Published: 2019-06-20T03:00:20.264751Z, Updated: 2024-09-17T01:16:11.123Z, Description: A vulnerability in the HTTPS proxy feature of Cisco Wide Area Application Services (WAAS) Software could allow an unauthenticated, remote attacker to use the Central Manager as an HTTPS proxy. The vulnerability is due to insufficient authentication of proxy connection requests. An attacker could exploit this vulnerability by sending a malicious HTTPS CONNECT message to the Central Manager. A successful exploit could allow the attacker to access public internet resources that would normally be blocked by corporate policies., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 4, Base Severity: MEDIUM, Confidentiality Impact: NONE, Integrity Impact: LOW, Privileges Required: NONE, Scope: CHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Describe the vulnerability CVE-2019-15276
CVE-2019-15276, State: PUBLISHED, Published: 2019-11-26T03:12:16.438732Z, Updated: 2024-09-16T22:57:08.029Z, Description: A vulnerability in the web interface of Cisco Wireless LAN Controller Software could allow a low-privileged, authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability exists due to a failure of the HTTP parsing engine to handle specially crafted URLs. An attacker could exploit this vulnerability by authenticating with low privileges to an affected controller and submitting the crafted URL to the web interface of the affected device. Conversely, an unauthenticated attacker could exploit this vulnerability by persuading a user of the web interface to click the crafted URL. A successful exploit could allow the attacker to cause an unexpected restart of the device, resulting in a DoS condition., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 7.7, Base Severity: HIGH, Confidentiality Impact: NONE, Integrity Impact: NONE, Privileges Required: LOW, Scope: CHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Techniques related with vulnerability CVE-2018-11088
CVE-2018-11088 in Application Service. Has primary impact with T1552 : Unsecured Credentials. Has secondary impact with T1068 : Exploitation for Privilege Escalation.
Describe the vulnerability CVE-2018-11049
CVE-2018-11049, State: PUBLISHED, Published: 2018-07-11T20:00:00Z, Updated: 2024-09-17T04:20:09.305Z, Description: RSA Identity Governance and Lifecycle, RSA Via Lifecycle and Governance, and RSA IMG releases have an uncontrolled search vulnerability. The installation scripts set an environment variable in an unintended manner. A local authenticated malicious user could trick the root user to run malicious code on the targeted system., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-5326
CVE-2020-5326, State: PUBLISHED, Published: 2020-02-21T14:50:14.182576Z, Updated: 2024-09-17T01:56:45.382Z, Description: Affected Dell Client platforms contain a BIOS Setup configuration authentication bypass vulnerability in the pre-boot Intel Rapid Storage Response Technology (iRST) Manager menu. An attacker with physical access to the system could perform unauthorized changes to the BIOS Setup configuration settings without requiring the BIOS Admin password by selecting the Optimized Defaults option in the pre-boot iRST Manager., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: PHYSICAL, Availability Impact: HIGH, Base Score: 6.1, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: NONE, Privileges Required: NONE, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2019-16760
CVE-2019-16760 in cargo. Has primary impact with T1190 : Exploit Public-Facing Application. Has secondary impact with T1478 : Install Insecure or Malicious Configuration.
Techniques related with vulnerability CVE-2020-13125
CVE-2020-13125 in Ultimate Addons for Elementor plugin before 1.24.2 for WordPress. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File. Is related with T1499.004 : Application or System Exploitation.
Techniques related with vulnerability CVE-2020-5290
CVE-2020-5290 in rctf. Has primary impact with T1563 : Remote Service Session Hijacking. Has an exploitation technique T1189 : Drive-by Compromise.
Describe the vulnerability CVE-2019-10980
CVE-2019-10980, State: PUBLISHED, Published: 2019-08-05T18:39:38, Updated: 2024-08-04T22:40:15.478Z, Description: A type confusion vulnerability may be exploited when LAquis SCADA 4.3.1.71 processes a specially crafted project file. This may allow an attacker to execute remote code. The attacker must have local access to the system. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2019-3758
CVE-2019-3758 in RSA Archer. Has primary impact with T1190 : Exploit Public-Facing Application. Has secondary impact with T1136 : Create Account.
Describe the vulnerability CVE-2014-1776
CVE-2014-1776, State: PUBLISHED, Published: 2014-04-27T10:00:00, Updated: 2024-08-06T09:50:11.190Z, Description: Use-after-free vulnerability in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the CMarkup::IsConnectedToPrimaryMarkup function, as exploited in the wild in April 2014. NOTE: this issue originally emphasized VGX.DLL, but Microsoft clarified that "VGX.DLL does not contain the vulnerable code leveraged in this exploit. Disabling VGX.DLL is an exploit-specific workaround that provides an immediate, effective workaround to help block known attacks.", No CVSS metrics available, Exploit Info: No exploit information available
Describe MITRE technique T1114.001
MITRE T1114.001 : Local Email Collection from enterprise Adversaries may target user email on local systems to collect sensitive information. Files containing email data can be acquired from a user’s local system, such as Outlook storage or cache files. Outlook stores data locally in offline data files with an extension of .ost. Outlook 2010 and later supports .ost file sizes up to 50GB, while earlier versions of Outlook support up to 20GB.(Citation: Outlook File Sizes) IMAP accounts in Outlook 2013 (and earlier) and POP accounts use Outlook Data Files (.pst) as opposed to .ost, whereas IMAP accounts in Outlook 2016 (and later) use .ost files. Both types of Outlook data files are typically stored in `C:\Users\<username>\Documents\Outlook Files` or `C:\Users\<username>\AppData\Local\Microsoft\Outlook`.(Citation: Microsoft Outlook Files)
Techniques related with vulnerability CVE-2018-10611
CVE-2018-10611 in MDS PulseNET and MDS PulseNET Enterprise. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059 : Command and Scripting Interpreter.
Describe the vulnerability CVE-2017-9142
CVE-2017-9142, State: PUBLISHED, Published: 2017-05-22T14:00:00, Updated: 2024-08-05T16:55:22.392Z, Description: In ImageMagick 7.0.5-7 Q16, a crafted file could trigger an assertion failure in the WriteBlob function in MagickCore/blob.c because of missing checks in the ReadOneJNGImage function in coders/png.c., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2018-15462
CVE-2018-15462 in Cisco Firepower Threat Defense Software. Has primary impact with T1499 : Endpoint Denial of Service. Has an exploitation technique T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2009-1612
CVE-2009-1612 in Baofeng Storm. Is related with T1068 : Exploitation for Privilege Escalation.
Techniques related with vulnerability CVE-2019-15276
CVE-2019-15276 in Cisco Wireless LAN Controller (WLC). Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1189 : Drive-by Compromise. Has an exploitation technique T1190 : Exploit Public-Facing Application. Has an exploitation technique T1566 : Phishing.
Techniques related with vulnerability CVE-2018-10590
CVE-2018-10590 in WebAccess. Has primary impact with T1083 : File and Directory Discovery. Has an exploitation technique T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2015-2590
CVE-2015-2590, State: PUBLISHED, Published: 2015-07-16T10:00:00, Updated: 2024-08-06T05:17:27.542Z, Description: Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-4732., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-15100
CVE-2020-15100 in freewvs. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1078 : Valid Accounts.
Describe the vulnerability CVE-2010-3765
CVE-2010-3765, State: PUBLISHED, Published: 2010-10-27T22:00:00, Updated: 2024-08-07T03:18:53.216Z, Description: Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption, as exploited in the wild in October 2010 by the Belmoo malware., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-1471
CVE-2020-1471, State: PUBLISHED, Published: 2020-09-11T17:09:18, Updated: 2024-08-04T06:39:10.366Z, Description: No description available, CVSS v3.1 - Attack Complexity: N/A, Attack Vector: N/A, Availability Impact: N/A, Base Score: 7.3, Base Severity: HIGH, Confidentiality Impact: N/A, Integrity Impact: N/A, Privileges Required: N/A, Scope: N/A, User Interaction: N/A, Exploit Info: No exploit information available
Describe the vulnerability CVE-2015-0016
CVE-2015-0016, State: PUBLISHED, Published: 2015-01-13T22:00:00, Updated: 2024-08-06T03:55:27.760Z, Description: Directory traversal vulnerability in the TS WebProxy (aka TSWbPrxy) component in Microsoft Windows Vista SP2, Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to gain privileges via a crafted pathname in an executable file, as demonstrated by a transition from Low Integrity to Medium Integrity, aka "Directory Traversal Elevation of Privilege Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2008-4250
CVE-2008-4250 in Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, and 7 Pre-Beta. Is related with T1210 : Exploitation of Remote Services.
Techniques related with vulnerability CVE-2019-9670
CVE-2019-9670 in Synacor Zimbra Collaboration Suite. Is related with T1005 : Data from Local System. Is related with T1552.001 : Credentials In Files.
Describe the vulnerability CVE-2018-17877
CVE-2018-17877, State: PUBLISHED, Published: 2018-10-23T21:00:00, Updated: 2024-08-05T11:01:14.502Z, Description: A lottery smart contract implementation for Greedy 599, an Ethereum gambling game, generates a random value that is predictable via an external contract call. The developer used the extcodesize() function to prevent a malicious contract from being called, but the attacker can bypass it by writing the core code in the constructor of their exploit code. Therefore, it allows attackers to always win and get rewards., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2016-3298
CVE-2016-3298 in Internet Explorer. Is related with T1083 : File and Directory Discovery. Is related with T1189 : Drive-by Compromise.
Describe MITRE technique T1134.001
MITRE T1134.001 : Token Impersonation/Theft from enterprise Adversaries may duplicate then impersonate another user's existing token to escalate privileges and bypass access controls. For example, an adversary can duplicate an existing token using `DuplicateToken` or `DuplicateTokenEx`.(Citation: DuplicateToken function) The token can then be used with `ImpersonateLoggedOnUser` to allow the calling thread to impersonate a logged on user's security context, or with `SetThreadToken` to assign the impersonated token to a thread. An adversary may perform [Token Impersonation/Theft](T1134.001) when they have a specific, existing process they want to assign the duplicated token to. For example, this may be useful for when the target user has a non-network logon session on the system. When an adversary would instead use a duplicated token to create a new process rather than attaching to an existing process, they can additionally [Create Process with Token](T1134.002) using `CreateProcessWithTokenW` or `CreateProcessAsUserW`. [Token Impersonation/Theft](T1134.001) is also distinct from [Make and Impersonate Token](T1134.003) in that it refers to duplicating an existing token, rather than creating a new one.
Techniques related with vulnerability CVE-2020-5362
CVE-2020-5362 in Dell Client Consumer and Commercial platforms. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has secondary impact with T1098 : Account Manipulation.
Techniques related with vulnerability CVE-2010-1297
CVE-2010-1297 in Adobe. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2010-2884
CVE-2010-2884, State: PUBLISHED, Published: 2010-09-15T17:26:00, Updated: 2024-08-07T02:46:48.635Z, Description: Adobe Flash Player 10.1.82.76 and earlier on Windows, Mac OS X, Linux, and Solaris and 10.1.92.10 on Android; authplay.dll in Adobe Reader and Acrobat 9.x before 9.4; and authplay.dll in Adobe Reader and Acrobat 8.x before 8.2.5 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in September 2010., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-15208
CVE-2020-15208 in tensorflow. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation.
Techniques related with vulnerability CVE-2020-9819
CVE-2020-9819 in iOS. Is related with T1114.001 : Local Email Collection. Is related with T1565.001 : Stored Data Manipulation. Is related with T1485 : Data Destruction.
Describe the vulnerability CVE-2020-3407
CVE-2020-3407, State: PUBLISHED, Published: 2020-09-24T18:02:04.555166Z, Updated: 2024-11-13T17:55:10.495Z, Description: A vulnerability in the RESTCONF and NETCONF-YANG access control list (ACL) function of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload. The vulnerability is due to incorrect processing of the ACL that is tied to the RESTCONF or NETCONF-YANG feature. An attacker could exploit this vulnerability by accessing the device using RESTCONF or NETCONF-YANG. A successful exploit could allow an attacker to cause the device to reload, resulting in a denial of service (DoS) condition., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.6, Base Severity: HIGH, Confidentiality Impact: NONE, Integrity Impact: NONE, Privileges Required: NONE, Scope: CHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Techniques related with vulnerability CVE-2014-0266
CVE-2014-0266 in XML Core Services 3.0 in Microsoft Windows. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File.
Techniques related with vulnerability CVE-2017-11368
CVE-2017-11368 in MIT Kerberos 5. Is related with T1078 : Valid Accounts. Is related with T1212 : Exploitation for Credential Access.
Techniques related with vulnerability CVE-2020-3403
CVE-2020-3403 in Cisco IOS XE Software. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has secondary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1078 : Valid Accounts.
Techniques related with vulnerability CVE-2018-0560
CVE-2018-0560 in Hatena Bookmark App for iOS. Is related with T1211 : Exploitation for Defense Evasion. Is related with T1036 : Masquerading.
Describe the vulnerability CVE-2012-5958
CVE-2012-5958, State: PUBLISHED, Published: 2013-01-31T21:00:00, Updated: 2024-08-06T21:21:28.314Z, Description: Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a UDP packet with a crafted string that is not properly handled after a certain pointer subtraction., No CVSS metrics available, Exploit Info: No exploit information available
Describe MITRE technique T1055
MITRE T1055 : Process Injection from enterprise Adversaries may inject code into processes in order to evade process-based defenses as well as possibly elevate privileges. Process injection is a method of executing arbitrary code in the address space of a separate live process. Running code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via process injection may also evade detection from security products since the execution is masked under a legitimate process. There are many different ways to inject code into a process, many of which abuse legitimate functionalities. These implementations exist for every major OS but are typically platform specific. More sophisticated samples may perform multiple process injections to segment modules and further evade detection, utilizing named pipes or other inter-process communication (IPC) mechanisms as a communication channel.
Techniques related with vulnerability CVE-2020-3409
CVE-2020-3409 in Cisco IOS. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2018-15771
CVE-2018-15771, State: PUBLISHED, Published: 2018-11-13T14:00:00Z, Updated: 2024-09-17T03:58:36.708Z, Description: Dell EMC RecoverPoint versions prior to 5.1.2.1 and RecoverPoint for VMs versions prior to 5.2.0.2 contain an information disclosure vulnerability. A malicious boxmgmt user may potentially be able to determine the existence of any system file via Boxmgmt CLI., No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2020-5379
CVE-2020-5379, State: PUBLISHED, Published: 2020-09-02T20:55:19.005312Z, Updated: 2024-09-16T19:30:42.663Z, Description: Dell Inspiron 7352 BIOS versions prior to A12 contain a UEFI BIOS Boot Services overwrite vulnerability. A local attacker with access to system memory may exploit this vulnerability by overwriting the EFI_BOOT_SERVICES structure to execute arbitrary code in System Management Mode (SMM)., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: PHYSICAL, Availability Impact: HIGH, Base Score: 6.8, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2018-17900
CVE-2018-17900 in STARDOM Controllers FCJ,FCN-100,FCN-RTU, FCN-500. Has primary impact with T1552 : Unsecured Credentials. Has secondary impact with T1078 : Valid Accounts.
Techniques related with vulnerability CVE-2020-3349
CVE-2020-3349 in Cisco Data Center Network Manager. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link.
Describe the vulnerability CVE-2016-3298
CVE-2016-3298, State: PUBLISHED, Published: 2016-10-14T01:00:00, Updated: 2024-08-05T23:47:58.410Z, Description: Microsoft Internet Explorer 9 through 11 and the Internet Messaging API in Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allow remote attackers to determine the existence of arbitrary files via a crafted web site, aka "Internet Explorer Information Disclosure Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2018-7526
CVE-2018-7526, State: PUBLISHED, Published: 2018-05-24T20:00:00, Updated: 2024-08-05T06:31:03.728Z, Description: In TotalAlert Web Application in BeaconMedaes Scroll Medical Air Systems prior to v4107600010.23, by accessing a specific uniform resource locator (URL) on the webserver, a malicious user may be able to access information in the application without authenticating., No CVSS metrics available, Exploit Info: No exploit information available
Describe MITRE technique T1566.001
MITRE T1566.001 : Spearphishing Attachment from enterprise Adversaries may send spearphishing emails with a malicious attachment in an attempt to gain access to victim systems. Spearphishing attachment is a specific variant of spearphishing. Spearphishing attachment is different from other forms of spearphishing in that it employs the use of malware attached to an email. All forms of spearphishing are electronically delivered social engineering targeted at a specific individual, company, or industry. In this scenario, adversaries attach a file to the spearphishing email and usually rely upon [User Execution](T1204) to gain execution.(Citation: Unit 42 DarkHydrus July 2018) Spearphishing may also involve social engineering techniques, such as posing as a trusted source. There are many options for the attachment such as Microsoft Office documents, executables, PDFs, or archived files. Upon opening the attachment (and potentially clicking past protections), the adversary's payload exploits a vulnerability or directly executes on the user's system. The text of the spearphishing email usually tries to give a plausible reason why the file should be opened, and may explain how to bypass system protections in order to do so. The email may also contain instructions on how to decrypt an attachment, such as a zip file password, in order to evade email boundary defenses. Adversaries frequently manipulate file extensions and icons in order to make attached executables appear to be document files, or files exploiting one application appear to be a file for a different one.
Describe the vulnerability CVE-2020-3134
CVE-2020-3134, State: PUBLISHED, Published: 2020-01-26T04:31:37.081841Z, Updated: 2024-11-15T17:45:08.070Z, Description: A vulnerability in the zip decompression engine of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of zip files. An attacker could exploit this vulnerability by sending an email message with a crafted zip-compressed attachment. A successful exploit could trigger a restart of the content-scanning process, causing a temporary DoS condition. This vulnerability affects Cisco AsyncOS Software for Cisco ESA releases earlier than 13.0., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: LOW, Base Score: 6.5, Base Severity: MEDIUM, Confidentiality Impact: NONE, Integrity Impact: LOW, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2016-7189
CVE-2016-7189 in Chakra JavaScript engine in Microsoft Edge. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise.
Techniques related with vulnerability CVE-2015-1494
CVE-2015-1494 in FancyBox for WordPress plugin before 3.0.3. Is related with T1203 : Exploitation for Client Execution. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1211 : Exploitation for Defense Evasion. Is related with T1497 : Virtualization/Sandbox Evasion.
Describe the vulnerability CVE-2020-11036
CVE-2020-11036, State: PUBLISHED, Published: 2020-05-05T21:35:12, Updated: 2024-08-04T11:21:14.475Z, Description: In GLPI before version 9.4.6 there are multiple related stored XSS vulnerabilities. The package is vulnerable to Stored XSS in the comments of items in the Knowledge base. Adding a comment with content "<script>alert(1)</script>" reproduces the attack. This can be exploited by a user with administrator privileges in the User-Agent field. It can also be exploited by an outside party through the following steps: 1. Create a user with the surname `" onmouseover="alert(document.cookie)` and an empty first name. 2. With this user, create a ticket 3. As an administrator (or other privileged user) open the created ticket 4. On the "last update" field, put your mouse on the name of the user 5. The XSS fires This is fixed in version 9.4.6., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 7.6, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: LOW, Privileges Required: LOW, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-9670
CVE-2019-9670, State: PUBLISHED, Published: 2019-05-29T21:04:28, Updated: 2024-08-04T21:54:45.466Z, Description: mailboxd component in Synacor Zimbra Collaboration Suite 8.7.x before 8.7.11p10 has an XML External Entity injection (XXE) vulnerability, as demonstrated by Autodiscover/Autodiscover.xml., No CVSS metrics available, Exploit Info: No exploit information available
Techniques related with vulnerability CVE-2020-5252
CVE-2020-5252 in safety. Has primary impact with T1190 : Exploit Public-Facing Application.