input stringlengths 30 54 | output stringlengths 69 4.21k |
|---|---|
Describe the vulnerability CVE-2011-2005 | CVE-2011-2005, State: PUBLISHED, Published: 2011-10-12T01:00:00, Updated: 2024-08-06T22:46:00.910Z, Description: afd.sys in the Ancillary Function Driver in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly validate user-mode input passed to kernel mode, which allows local users to gain privileges ... |
Techniques related with vulnerability CVE-2014-0322 | CVE-2014-0322 in Internet Explorer 9 and 10. Is related with T1068 : Exploitation for Privilege Escalation. |
Describe the vulnerability CVE-2019-7287 | CVE-2019-7287, State: PUBLISHED, Published: 2019-12-18T17:33:15, Updated: 2024-08-04T20:46:46.080Z, Description: A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 12.1.4. An application may be able to execute arbitrary code with kernel privileges., No CVSS metrics availa... |
Techniques related with vulnerability CVE-2018-7602 | CVE-2018-7602 in core. Is related with T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2020-5378 | CVE-2020-5378, State: PUBLISHED, Published: 2020-09-02T20:55:18.598478Z, Updated: 2024-09-17T01:51:46.170Z, Description: Dell G7 17 7790 BIOS versions prior to 1.13.2 contain a UEFI BIOS Boot Services overwrite vulnerability. A local attacker with access to system memory may exploit this vulnerability by overwriting th... |
Describe MITRE technique T1505 | MITRE T1505 : Server Software Component from enterprise Adversaries may abuse legitimate extensible development features of servers to establish persistent access to systems. Enterprise server applications may include features that allow developers to write and install software or scripts to extend the functionality of... |
Techniques related with vulnerability CVE-2012-1723 | CVE-2012-1723 in Oracle Java SE 7. Is related with T1190 : Exploit Public-Facing Application. |
Describe MITRE technique T1550 | MITRE T1550 : Use Alternate Authentication Material from enterprise Adversaries may use alternate authentication material, such as password hashes, Kerberos tickets, and application access tokens, in order to move laterally within an environment and bypass normal system access controls.
Authentication processes gener... |
Techniques related with vulnerability CVE-2019-1665 | CVE-2019-1665 in Cisco HyperFlex HX-Series. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link. |
Describe the vulnerability CVE-2019-19735 | CVE-2019-19735, State: PUBLISHED, Published: 2019-12-30T17:00:02, Updated: 2024-08-05T02:25:12.656Z, Description: class.userpeer.php in MFScripts YetiShare 3.5.2 through 4.5.3 uses an insecure method of creating password reset hashes (based only on microtime), which allows an attacker to guess the hash and set the pass... |
Techniques related with vulnerability CVE-2019-3728 | CVE-2019-3728 in RSA BSAFE Crypto-C Micro Edition. Has primary impact with T1489 : Service Stop. |
Techniques related with vulnerability CVE-2019-11510 | CVE-2019-11510 in Pulse Secure Pulse Connect Secure. Is related with T1133 : External Remote Services. Is related with T1212 : Exploitation for Credential Access. Is related with T1083 : File and Directory Discovery. |
Describe the vulnerability CVE-2010-4398 | CVE-2010-4398, State: PUBLISHED, Published: 2010-12-03T20:00:00, Updated: 2024-08-07T03:43:14.659Z, Description: Stack-based buffer overflow in the RtlQueryRegistryValues function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2... |
Describe the vulnerability CVE-2019-12660 | CVE-2019-12660, State: PUBLISHED, Published: 2019-09-25T20:16:01.614965Z, Updated: 2024-09-17T01:10:54.326Z, Description: A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker to write values to the underlying memory of an affected device. The vulnerability is due to improper ... |
Techniques related with vulnerability CVE-2020-0636 | CVE-2020-0636 in Windows 10 Version 1903 for 32-bit Systems. Has primary impact with T1068 : Exploitation for Privilege Escalation. |
Describe the vulnerability CVE-2018-8835 | CVE-2018-8835, State: PUBLISHED, Published: 2018-04-25T23:00:00Z, Updated: 2024-09-17T00:52:16.770Z, Description: Double free vulnerabilities in Advantech WebAccess HMI Designer 2.1.7.32 and prior caused by processing specially crafted .pm3 files may allow remote code execution., No CVSS metrics available, Exploit Info... |
Describe the vulnerability CVE-2018-11059 | CVE-2018-11059, State: PUBLISHED, Published: 2018-07-24T19:00:00Z, Updated: 2024-09-16T19:14:28.788Z, Description: RSA Archer, versions prior to 6.4.0.1, contain a stored cross-site scripting vulnerability. A remote authenticated malicious Archer user could potentially exploit this vulnerability to store malicious HTML... |
Describe the vulnerability CVE-2020-16200 | CVE-2020-16200, State: PUBLISHED, Published: 2020-09-18T17:53:23, Updated: 2024-08-04T13:37:54.144Z, Description: Philips Clinical Collaboration Platform, Versions 12.2.1 and prior. The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an attacker to influence the... |
Techniques related with vulnerability CVE-2020-15188 | CVE-2020-15188 in soycms. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1133 : External Remote Services. |
Techniques related with vulnerability CVE-2019-15963 | CVE-2019-15963 in Cisco Unity Connection. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1078 : Valid Accounts. |
Describe the vulnerability CVE-2010-1885 | CVE-2010-1885, State: PUBLISHED, Published: 2010-06-14T18:00:00, Updated: 2024-08-07T01:35:53.750Z, Description: The MPC::HexToNum function in helpctr.exe in Microsoft Windows Help and Support Center in Windows XP and Windows Server 2003 does not properly handle malformed escape sequences, which allows remote attackers... |
Describe the vulnerability CVE-2020-5264 | CVE-2020-5264, State: PUBLISHED, Published: 2020-04-20T16:40:19, Updated: 2024-08-04T08:22:09.088Z, Description: In PrestaShop before version 1.7.6.5, there is a reflected XSS while running the security compromised page. It allows anyone to execute arbitrary action. The problem is patched in the 1.7.6.5., CVSS v3.1 - A... |
Techniques related with vulnerability CVE-2018-17911 | CVE-2018-17911 in LAquis SCADA. Has primary impact with T1575 : Native Code. |
Techniques related with vulnerability CVE-2018-15801 | CVE-2018-15801 in Spring Security. Has secondary impact with T1550.001 : Application Access Token. |
Techniques related with vulnerability CVE-2016-2208 | CVE-2016-2208 in Symantec Anti-Virus Engine (AVE) 20151.1 before 20151.1.1.4. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2010-2568 | CVE-2010-2568 in Windows Shell in Microsoft Window. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2020-3322 | CVE-2020-3322, State: PUBLISHED, Published: 2020-06-03T17:00:18.648979Z, Updated: 2024-11-15T17:20:07.893Z, Description: A vulnerability in Cisco Webex Network Recording Player and Cisco Webex Player for Microsoft Windows could allow an attacker to cause a process crash resulting in a Denial of service (DoS) condition ... |
Techniques related with vulnerability CVE-2020-5358 | CVE-2020-5358 in Dell Encryption Enterprise. Has primary impact with T1068 : Exploitation for Privilege Escalation. |
Describe the vulnerability CVE-2019-15107 | CVE-2019-15107, State: PUBLISHED, Published: 2019-08-16T02:44:04, Updated: 2024-08-05T00:34:53.279Z, Description: An issue was discovered in Webmin <=1.920. The parameter old in password_change.cgi contains a command injection vulnerability., No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2011-2900 | CVE-2011-2900, State: PUBLISHED, Published: 2011-08-05T21:00:00, Updated: 2024-08-06T23:15:31.716Z, Description: Stack-based buffer overflow in the (1) put_dir function in mongoose.c in Mongoose 3.0, (2) put_dir function in yasslEWS.c in yaSSL Embedded Web Server (yasslEWS) 0.2, and (3) _shttpd_put_dir function in io_d... |
Describe the vulnerability CVE-2020-3292 | CVE-2020-3292, State: PUBLISHED, Published: 2020-06-18T02:16:04.053598Z, Updated: 2024-11-15T17:08:02.787Z, Description: Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authentic... |
Techniques related with vulnerability CVE-2018-8607 | CVE-2018-8607 in Microsoft Dynamics 365. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation. Has secondary impact with T1485 : Data Destruction. Has secondary impact with T1478 : Install Insecur... |
Techniques related with vulnerability CVE-2019-1836 | CVE-2019-1836 in Cisco NX-OS Software for Nexus 9000 Series Fabric Switches ACI Mode. Has primary impact with T1565.001 : Stored Data Manipulation. Has an exploitation technique T1133 : External Remote Services. |
Techniques related with vulnerability CVE-2018-5463 | CVE-2018-5463 in LCDS LTDA ME LAquis SCADA. Is related with T1068 : Exploitation for Privilege Escalation. |
Describe the vulnerability CVE-2018-17908 | CVE-2018-17908, State: PUBLISHED, Published: 2018-10-29T18:00:00, Updated: 2024-08-05T11:01:14.890Z, Description: WebAccess Versions 8.3.2 and prior. During installation, the application installer disables user access control and does not re-enable it after the installation is complete. This could allow an attacker to ... |
Describe the vulnerability CVE-2019-10990 | CVE-2019-10990, State: PUBLISHED, Published: 2019-09-23T15:46:43, Updated: 2024-08-04T22:40:15.501Z, Description: Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, uses a hard-coded password to encrypt protected files in transit and at rest, which may allow an attacker to access... |
Techniques related with vulnerability CVE-2015-0016 | CVE-2015-0016 in TS WebProxycomponent in Microsoft Windows before Windows 8.1. Is related with T1068 : Exploitation for Privilege Escalation. |
Techniques related with vulnerability CVE-2014-1761 | CVE-2014-1761 in Microsoft Word. Is related with T1190 : Exploit Public-Facing Application. Is related with T1569 : System Services. |
Techniques related with vulnerability CVE-2020-8835 | CVE-2020-8835 in Linux kernel. Is related with T1068 : Exploitation for Privilege Escalation. |
Describe the vulnerability CVE-2018-17900 | CVE-2018-17900, State: PUBLISHED, Published: 2018-10-12T14:00:00Z, Updated: 2024-09-16T19:37:05.913Z, Description: Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The web application improperly protects credentials which could allow an attacker to obtain credentials for remote... |
Describe the vulnerability CVE-2013-1331 | CVE-2013-1331, State: PUBLISHED, Published: 2013-06-12T01:00:00, Updated: 2024-08-06T14:57:05.114Z, Description: Buffer overflow in Microsoft Office 2003 SP3 and Office 2011 for Mac allows remote attackers to execute arbitrary code via crafted PNG data in an Office document, leading to improper memory allocation, aka "... |
Describe MITRE technique T1133 | MITRE T1133 : External Remote Services from enterprise Adversaries may leverage external-facing remote services to initially access and/or persist within a network. Remote services such as VPNs, Citrix, and other access mechanisms allow users to connect to internal enterprise network resources from external locations. ... |
Describe MITRE technique T1185 | MITRE T1185 : Browser Session Hijacking from enterprise Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.(Citation: Wikipedia Man in the Br... |
Techniques related with vulnerability CVE-2009-1862 | CVE-2009-1862 in Adobe Reader and Acrobat 9.x through 9.1.2, and Adobe Flash Player 9.x through 9.0.159.0 and 10.x through 10.0.22.87. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2012-0181 | CVE-2012-0181 in win32k.sys in the kernel-mode drivers in Microsoft Windows. Is related with T1068 : Exploitation for Privilege Escalation. |
Techniques related with vulnerability CVE-2008-3431 | CVE-2008-3431 in Sun xVM VirtualBox before 1.6.4. Is related with T1608 : Stage Capabilities. |
Describe the vulnerability CVE-2015-1539 | CVE-2015-1539, State: PUBLISHED, Published: 2015-10-01T00:00:00, Updated: 2024-08-06T04:47:16.218Z, Description: Multiple integer underflows in the ESDS::parseESDescriptor function in ESDS.cpp in libstagefright in Android before 5.1.1 LMY48I allow remote attackers to execute arbitrary code via crafted ESDS atoms, aka i... |
Describe the vulnerability CVE-2020-5373 | CVE-2020-5373, State: PUBLISHED, Published: 2020-07-14T19:30:14.797364Z, Updated: 2024-09-17T03:02:58.871Z, Description: Dell EMC OpenManage Integration for Microsoft System Center (OMIMSSC) for SCCM and SCVMM versions prior to 7.2.1 contain an improper authentication vulnerability. A remote unauthenticated attacker ma... |
Techniques related with vulnerability CVE-2020-12014 | CVE-2020-12014 in Advantech WebAccess Node. Has primary impact with T1059 : Command and Scripting Interpreter. |
Techniques related with vulnerability CVE-2015-7925 | CVE-2015-7925 in CSRF on eWON devices. Is related with T1204.001 : Malicious Link. Is related with T1529 : System Shutdown/Reboot. Is related with T1542.001 : System Firmware. Is related with T1565.001 : Stored Data Manipulation. |
Describe the vulnerability CVE-2014-4148 | CVE-2014-4148, State: PUBLISHED, Published: 2014-10-15T10:00:00, Updated: 2024-08-06T11:04:28.672Z, Description: win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and ... |
Describe the vulnerability CVE-2010-3916 | CVE-2010-3916, State: PUBLISHED, Published: 2010-11-05T22:00:00, Updated: 2024-08-07T03:26:12.263Z, Description: Unspecified vulnerability in JustSystems Ichitaro and Ichitaro Government allows remote attackers to execute arbitrary code via a crafted document, a different vulnerability than CVE-2010-3915., No CVSS metr... |
Techniques related with vulnerability CVE-2016-0167 | CVE-2016-0167 in Windows kernel. Is related with T1608 : Stage Capabilities. |
Techniques related with vulnerability CVE-2020-6960 | CVE-2020-6960 in Honeywell Maxpro VMS & NVR. Has primary impact with T1059 : Command and Scripting Interpreter. |
Describe the vulnerability CVE-2019-3790 | CVE-2019-3790, State: PUBLISHED, Published: 2019-06-06T19:16:16.854483Z, Updated: 2024-09-16T22:20:48.221Z, Description: The Pivotal Ops Manager, 2.2.x versions prior to 2.2.23, 2.3.x versions prior to 2.3.16, 2.4.x versions prior to 2.4.11, and 2.5.x versions prior to 2.5.3, contain configuration that circumvents refr... |
Describe the vulnerability CVE-2020-3416 | CVE-2020-3416, State: PUBLISHED, Published: 2020-09-24T18:01:46.479066Z, Updated: 2024-11-13T17:55:48.060Z, Description: Multiple vulnerabilities in the initialization routines that are executed during bootup of Cisco IOS XE Software for Cisco ASR 900 Series Aggregation Services Routers with a Route Switch Processor 3 ... |
Describe the vulnerability CVE-2009-1308 | CVE-2009-1308, State: PUBLISHED, Published: 2009-04-22T18:00:00, Updated: 2024-08-07T05:04:49.602Z, Description: Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey allows remote attackers to inject arbitrary web script or HTML via vectors involving XBL JavaScript bindin... |
Techniques related with vulnerability CVE-2012-2319 | CVE-2012-2319 in Linux kernel before 3.3.5. Is related with T1608 : Stage Capabilities. |
Describe the vulnerability CVE-2017-7533 | CVE-2017-7533, State: PUBLISHED, Published: 2017-08-05T16:00:00, Updated: 2024-08-05T16:04:11.899Z, Description: Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverage... |
Describe the vulnerability CVE-2010-2862 | CVE-2010-2862, State: PUBLISHED, Published: 2010-08-05T18:00:00, Updated: 2024-08-07T02:46:48.634Z, Description: Integer overflow in CoolType.dll in Adobe Reader 8.2.3 and 9.3.3, and Acrobat 9.3.3, allows remote attackers to execute arbitrary code via a TrueType font with a large maxCompositePoints value in a Maximum P... |
Describe the vulnerability CVE-2020-12008 | CVE-2020-12008, State: PUBLISHED, Published: 2020-06-29T13:53:25, Updated: 2024-08-04T11:48:57.121Z, Description: Baxter ExactaMix EM 2400 Versions 1.10, 1.11 and ExactaMix EM1200 Versions 1.1, 1.2 systems use cleartext messages to communicate order information with an order entry system. This could allow an attacker w... |
Techniques related with vulnerability CVE-2020-1020 | CVE-2020-1020 in Windows. Is related with T1566 : Phishing. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2009-1671 | CVE-2009-1671 in Deployment Toolkit ActiveX control. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2009-1800 | CVE-2009-1800, State: PUBLISHED, Published: 2009-05-28T14:00:00Z, Updated: 2024-09-16T17:19:18.270Z, Description: Stack-based buffer overflow in the Chinagames CGAgent ActiveX control 1.x in CGAgent.dll, as distributed in Chinagames iGame 2009, allows remote attackers to execute arbitrary code via a long argument to th... |
Describe the vulnerability CVE-2019-1118 | CVE-2019-1118, State: PUBLISHED, Published: 2019-07-29T14:11:14, Updated: 2024-08-04T18:06:31.914Z, Description: A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory, aka 'DirectWrite Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1117, CVE-2019-1... |
Techniques related with vulnerability CVE-2010-3915 | CVE-2010-3915 in Ichitaro. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2018-8611 | CVE-2018-8611, State: PUBLISHED, Published: 2018-12-12T00:00:00, Updated: 2024-08-05T07:02:26.027Z, Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka "Windows Kernel Elevation of Privilege Vulnerability." This affects Windows 7, Windows S... |
Techniques related with vulnerability CVE-2020-5250 | CVE-2020-5250 in PrestaShop. Has primary impact with T1036 : Masquerading. Has secondary impact with T1478 : Install Insecure or Malicious Configuration. |
Describe the vulnerability CVE-2020-5371 | CVE-2020-5371, State: PUBLISHED, Published: 2020-07-06T17:45:18.792486Z, Updated: 2024-09-16T19:52:24.613Z, Description: Dell EMC Isilon OneFS versions 8.2.2 and earlier and Dell EMC PowerScale version 9.0.0 contain a file permissions vulnerability. An attacker, with network or local file access, could take advantage o... |
Techniques related with vulnerability CVE-2019-15998 | CVE-2019-15998 in Cisco IOS XR Software. Has primary impact with T1133 : External Remote Services. Has an exploitation technique T1078 : Valid Accounts. |
Describe the vulnerability CVE-2016-6366 | CVE-2016-6366, State: PUBLISHED, Published: 2016-08-18T18:00:00, Updated: 2024-11-15T18:02:26.862Z, Description: Buffer overflow in Cisco Adaptive Security Appliance (ASA) Software through 9.4.2.3 on ASA 5500, ASA 5500-X, ASA Services Module, ASA 1000V, ASAv, Firepower 9300 ASA Security Module, PIX, and FWSM devices al... |
Describe the vulnerability CVE-2019-1724 | CVE-2019-1724, State: PUBLISHED, Published: 2019-05-03T16:20:23.207337Z, Updated: 2024-11-20T17:23:28.176Z, Description: A vulnerability in the session management functionality of the web-based interface for Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacke... |
Techniques related with vulnerability CVE-2019-1458 | CVE-2019-1458 in Windows. Is related with T1059 : Command and Scripting Interpreter. Is related with T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2010-5290 | CVE-2010-5290 in Adobe ColdFusion before 10. Is related with T1550.002 : Pass the Hash. Is related with T1552.001 : Credentials In Files. |
Techniques related with vulnerability CVE-2018-11048 | CVE-2018-11048 in Data Protection Advisor. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1133 : External Remote Services. |
Techniques related with vulnerability CVE-2020-15137 | CVE-2020-15137 in HoRNDIS. Has primary impact with T1005 : Data from Local System. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2009-3129 | CVE-2009-3129 in Microsoft Office Excel. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution. |
Describe MITRE technique T1190 | MITRE T1190 : Exploit Public-Facing Application from enterprise Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network. The weakness in the system can be a software bug, a temporary glitch, or a misconfiguration.
Exploited applications are often websites/web se... |
Describe the vulnerability CVE-2020-1347 | CVE-2020-1347, State: PUBLISHED, Published: 2020-07-14T22:54:05, Updated: 2024-08-04T06:32:01.237Z, Description: An elevation of privilege vulnerability exists when the Windows Storage Services improperly handle file operations, aka 'Windows Storage Services Elevation of Privilege Vulnerability'., No CVSS metrics avail... |
Techniques related with vulnerability CVE-2014-7186 | CVE-2014-7186 in GNU Bash through 4.3 bash43-026. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059.004 : Unix Shell. |
Describe the vulnerability CVE-2020-11019 | CVE-2020-11019, State: PUBLISHED, Published: 2020-05-29T00:00:00, Updated: 2024-08-04T11:21:14.328Z, Description: In FreeRDP less than or equal to 2.0.0, when running with logger set to "WLOG_TRACE", a possible crash of application could occur due to a read of an invalid array index. Data could be printed as string to ... |
Describe the vulnerability CVE-2013-0422 | CVE-2013-0422, State: PUBLISHED, Published: 2013-01-10T21:23:00, Updated: 2024-08-06T14:25:10.233Z, Description: Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attackers to execute arbitrary code by (1) using the public getMBeanInstantiator method in the JmxMBeanServer class to obtain a referen... |
Techniques related with vulnerability CVE-2020-11957 | CVE-2020-11957 in Bluetooth Low Energy implementation in Cypress PSoC Creator BLE 4.2 component versions before 3.64a. Is related with T1110 : Brute Force. |
Describe the vulnerability CVE-2020-6986 | CVE-2020-6986, State: PUBLISHED, Published: 2020-03-05T20:05:05, Updated: 2024-08-04T09:18:02.467Z, Description: In all versions of Omron PLC CJ Series, an attacker can send a series of specific data packets within a short period, causing a service error on the PLC Ethernet module, which in turn causes a PLC service de... |
Describe the vulnerability CVE-2020-1206 | CVE-2020-1206, State: PUBLISHED, Published: 2020-06-09T19:43:23, Updated: 2024-08-04T06:31:58.165Z, Description: An information disclosure vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Information Disclosure Vuln... |
Describe the vulnerability CVE-2009-0927 | CVE-2009-0927, State: PUBLISHED, Published: 2009-03-19T10:00:00, Updated: 2024-08-07T04:57:16.395Z, Description: Stack-based buffer overflow in Adobe Reader and Adobe Acrobat 9 before 9.1, 8 before 8.1.3 , and 7 before 7.1.1 allows remote attackers to execute arbitrary code via a crafted argument to the getIcon method ... |
Describe the vulnerability CVE-2019-1838 | CVE-2019-1838, State: PUBLISHED, Published: 2019-05-03T16:35:32.825299Z, Updated: 2024-09-17T04:25:12.618Z, Description: A vulnerability in the web-based management interface of Cisco Application Policy Infrastructure Controller (APIC) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS... |
Describe the vulnerability CVE-2020-3375 | CVE-2020-3375, State: PUBLISHED, Published: 2020-07-31T00:00:54.582569Z, Updated: 2024-11-13T18:17:15.547Z, Description: A vulnerability in Cisco SD-WAN Solution Software could allow an unauthenticated, remote attacker to cause a buffer overflow on an affected device. The vulnerability is due to insufficient input vali... |
Techniques related with vulnerability CVE-2020-3322 | CVE-2020-3322 in Cisco Webex Network Recording Player. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1566 : Phishing. Has an exploitation technique T1204.002 : Malicious File. |
Techniques related with vulnerability CVE-2013-3897 | CVE-2013-3897 in Internet Explorer 6 through 11. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2017-11368 | CVE-2017-11368, State: PUBLISHED, Published: 2017-08-09T18:00:00, Updated: 2024-08-05T18:05:30.590Z, Description: In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker can cause a KDC assertion failure by sending invalid S4U2Self or S4U2Proxy requests., No CVSS metrics available, Exploit Info: No exploi... |
Describe the vulnerability CVE-2020-10751 | CVE-2020-10751, State: PUBLISHED, Published: 2020-05-26T14:54:32, Updated: 2024-08-04T11:14:15.560Z, Description: A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly onl... |
Describe the vulnerability CVE-2018-15444 | CVE-2018-15444, State: PUBLISHED, Published: 2018-11-08T18:00:00Z, Updated: 2024-09-16T17:48:00.875Z, Description: A vulnerability in the web-based user interface of Cisco Energy Management Suite Software could allow an authenticated, remote attacker to gain read and write access to information that is stored on an aff... |
Describe the vulnerability CVE-2019-3767 | CVE-2019-3767, State: PUBLISHED, Published: 2019-10-14T17:10:38.958778Z, Updated: 2024-09-17T01:21:08.167Z, Description: Dell ImageAssist versions prior to 8.7.15 contain an information disclosure vulnerability. Dell ImageAssist stores some sensitive encrypted information in the images it creates. A privileged user of ... |
Techniques related with vulnerability CVE-2010-0842 | CVE-2010-0842 in Sound component in Oracle Java SE and Java for Business 6. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2016-7193 | CVE-2016-7193, State: PUBLISHED, Published: 2016-10-14T01:00:00, Updated: 2024-08-06T01:50:47.546Z, Description: Microsoft Word 2007 SP2, Office 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint ... |
Describe the vulnerability CVE-2018-7500 | CVE-2018-7500, State: PUBLISHED, Published: 2018-03-14T18:00:00, Updated: 2024-08-05T06:31:04.282Z, Description: A Permissions, Privileges, and Access Controls issue was discovered in OSIsoft PI Web API versions 2017 R2 and prior. Privileges may be escalated, giving attackers access to the PI System via the service acc... |
Describe the vulnerability CVE-2020-15211 | CVE-2020-15211, State: PUBLISHED, Published: 2020-09-25T18:45:24, Updated: 2024-08-04T13:08:22.936Z, Description: In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in the flatbuffer format use a double indexing scheme: a model has a set of subgraphs, each subgraph has a set of opera... |
Techniques related with vulnerability CVE-2019-3732 | CVE-2019-3732 in RSA BSAFE Crypto-C Micro Edition. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2012-6498 | CVE-2012-6498, State: PUBLISHED, Published: 2013-01-08T15:00:00Z, Updated: 2024-09-16T21:03:49.568Z, Description: Unrestricted file upload vulnerability in index.php in Atomymaxsite 2.5 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.