input
stringlengths 30
54
| output
stringlengths 69
4.21k
|
|---|---|
Describe the vulnerability CVE-2011-2005
|
CVE-2011-2005, State: PUBLISHED, Published: 2011-10-12T01:00:00, Updated: 2024-08-06T22:46:00.910Z, Description: afd.sys in the Ancillary Function Driver in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly validate user-mode input passed to kernel mode, which allows local users to gain privileges via a crafted application, aka "Ancillary Function Driver Elevation of Privilege Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2014-0322
|
CVE-2014-0322 in Internet Explorer 9 and 10. Is related with T1068 : Exploitation for Privilege Escalation.
|
Describe the vulnerability CVE-2019-7287
|
CVE-2019-7287, State: PUBLISHED, Published: 2019-12-18T17:33:15, Updated: 2024-08-04T20:46:46.080Z, Description: A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 12.1.4. An application may be able to execute arbitrary code with kernel privileges., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-7602
|
CVE-2018-7602 in core. Is related with T1190 : Exploit Public-Facing Application.
|
Describe the vulnerability CVE-2020-5378
|
CVE-2020-5378, State: PUBLISHED, Published: 2020-09-02T20:55:18.598478Z, Updated: 2024-09-17T01:51:46.170Z, Description: Dell G7 17 7790 BIOS versions prior to 1.13.2 contain a UEFI BIOS Boot Services overwrite vulnerability. A local attacker with access to system memory may exploit this vulnerability by overwriting the EFI_BOOT_SERVICES structure to execute arbitrary code in System Management Mode (SMM)., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: PHYSICAL, Availability Impact: HIGH, Base Score: 6.8, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe MITRE technique T1505
|
MITRE T1505 : Server Software Component from enterprise Adversaries may abuse legitimate extensible development features of servers to establish persistent access to systems. Enterprise server applications may include features that allow developers to write and install software or scripts to extend the functionality of the main application. Adversaries may install malicious components to extend and abuse server applications.(Citation: volexity_0day_sophos_FW)
|
Techniques related with vulnerability CVE-2012-1723
|
CVE-2012-1723 in Oracle Java SE 7. Is related with T1190 : Exploit Public-Facing Application.
|
Describe MITRE technique T1550
|
MITRE T1550 : Use Alternate Authentication Material from enterprise Adversaries may use alternate authentication material, such as password hashes, Kerberos tickets, and application access tokens, in order to move laterally within an environment and bypass normal system access controls.
Authentication processes generally require a valid identity (e.g., username) along with one or more authentication factors (e.g., password, pin, physical smart card, token generator, etc.). Alternate authentication material is legitimately generated by systems after a user or application successfully authenticates by providing a valid identity and the required authentication factor(s). Alternate authentication material may also be generated during the identity creation process.(Citation: NIST Authentication)(Citation: NIST MFA)
Caching alternate authentication material allows the system to verify an identity has successfully authenticated without asking the user to reenter authentication factor(s). Because the alternate authentication must be maintained by the system—either in memory or on disk—it may be at risk of being stolen through [Credential Access](TA0006) techniques. By stealing alternate authentication material, adversaries are able to bypass system access controls and authenticate to systems without knowing the plaintext password or any additional authentication factors.
|
Techniques related with vulnerability CVE-2019-1665
|
CVE-2019-1665 in Cisco HyperFlex HX-Series. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link.
|
Describe the vulnerability CVE-2019-19735
|
CVE-2019-19735, State: PUBLISHED, Published: 2019-12-30T17:00:02, Updated: 2024-08-05T02:25:12.656Z, Description: class.userpeer.php in MFScripts YetiShare 3.5.2 through 4.5.3 uses an insecure method of creating password reset hashes (based only on microtime), which allows an attacker to guess the hash and set the password within a few hours by bruteforcing., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2019-3728
|
CVE-2019-3728 in RSA BSAFE Crypto-C Micro Edition. Has primary impact with T1489 : Service Stop.
|
Techniques related with vulnerability CVE-2019-11510
|
CVE-2019-11510 in Pulse Secure Pulse Connect Secure. Is related with T1133 : External Remote Services. Is related with T1212 : Exploitation for Credential Access. Is related with T1083 : File and Directory Discovery.
|
Describe the vulnerability CVE-2010-4398
|
CVE-2010-4398, State: PUBLISHED, Published: 2010-12-03T20:00:00, Updated: 2024-08-07T03:43:14.659Z, Description: Stack-based buffer overflow in the RtlQueryRegistryValues function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows local users to gain privileges, and bypass the User Account Control (UAC) feature, via a crafted REG_BINARY value for a SystemDefaultEUDCFont registry key, aka "Driver Improper Interaction with Windows Kernel Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-12660
|
CVE-2019-12660, State: PUBLISHED, Published: 2019-09-25T20:16:01.614965Z, Updated: 2024-09-17T01:10:54.326Z, Description: A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker to write values to the underlying memory of an affected device. The vulnerability is due to improper input validation and authorization of specific commands that a user can execute within the CLI. An attacker could exploit this vulnerability by authenticating to an affected device and issuing a specific set of commands. A successful exploit could allow the attacker to modify the configuration of the device to cause it to be non-secure and abnormally functioning., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: NONE, Base Score: 5.5, Base Severity: MEDIUM, Confidentiality Impact: NONE, Integrity Impact: HIGH, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Techniques related with vulnerability CVE-2020-0636
|
CVE-2020-0636 in Windows 10 Version 1903 for 32-bit Systems. Has primary impact with T1068 : Exploitation for Privilege Escalation.
|
Describe the vulnerability CVE-2018-8835
|
CVE-2018-8835, State: PUBLISHED, Published: 2018-04-25T23:00:00Z, Updated: 2024-09-17T00:52:16.770Z, Description: Double free vulnerabilities in Advantech WebAccess HMI Designer 2.1.7.32 and prior caused by processing specially crafted .pm3 files may allow remote code execution., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-11059
|
CVE-2018-11059, State: PUBLISHED, Published: 2018-07-24T19:00:00Z, Updated: 2024-09-16T19:14:28.788Z, Description: RSA Archer, versions prior to 6.4.0.1, contain a stored cross-site scripting vulnerability. A remote authenticated malicious Archer user could potentially exploit this vulnerability to store malicious HTML or JavaScript code in a trusted application data store. When application users access the corrupted data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: LOW, Base Score: 8.2, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: LOW, Privileges Required: LOW, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-16200
|
CVE-2020-16200, State: PUBLISHED, Published: 2020-09-18T17:53:23, Updated: 2024-08-04T13:37:54.144Z, Description: Philips Clinical Collaboration Platform, Versions 12.2.1 and prior. The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an attacker to influence the amount of resources consumed, eventually leading to the exhaustion of available resources., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-15188
|
CVE-2020-15188 in soycms. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1133 : External Remote Services.
|
Techniques related with vulnerability CVE-2019-15963
|
CVE-2019-15963 in Cisco Unity Connection. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1078 : Valid Accounts.
|
Describe the vulnerability CVE-2010-1885
|
CVE-2010-1885, State: PUBLISHED, Published: 2010-06-14T18:00:00, Updated: 2024-08-07T01:35:53.750Z, Description: The MPC::HexToNum function in helpctr.exe in Microsoft Windows Help and Support Center in Windows XP and Windows Server 2003 does not properly handle malformed escape sequences, which allows remote attackers to bypass the trusted documents whitelist (fromHCP option) and execute arbitrary commands via a crafted hcp:// URL, aka "Help Center URL Validation Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-5264
|
CVE-2020-5264, State: PUBLISHED, Published: 2020-04-20T16:40:19, Updated: 2024-08-04T08:22:09.088Z, Description: In PrestaShop before version 1.7.6.5, there is a reflected XSS while running the security compromised page. It allows anyone to execute arbitrary action. The problem is patched in the 1.7.6.5., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 4.4, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: LOW, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-17911
|
CVE-2018-17911 in LAquis SCADA. Has primary impact with T1575 : Native Code.
|
Techniques related with vulnerability CVE-2018-15801
|
CVE-2018-15801 in Spring Security. Has secondary impact with T1550.001 : Application Access Token.
|
Techniques related with vulnerability CVE-2016-2208
|
CVE-2016-2208 in Symantec Anti-Virus Engine (AVE) 20151.1 before 20151.1.1.4. Is related with T1203 : Exploitation for Client Execution.
|
Techniques related with vulnerability CVE-2010-2568
|
CVE-2010-2568 in Windows Shell in Microsoft Window. Is related with T1203 : Exploitation for Client Execution.
|
Describe the vulnerability CVE-2020-3322
|
CVE-2020-3322, State: PUBLISHED, Published: 2020-06-03T17:00:18.648979Z, Updated: 2024-11-15T17:20:07.893Z, Description: A vulnerability in Cisco Webex Network Recording Player and Cisco Webex Player for Microsoft Windows could allow an attacker to cause a process crash resulting in a Denial of service (DoS) condition for the player application on an affected system. The vulnerability exists due to insufficient validation of certain elements with a Webex recording stored in either the Advanced Recording Format (ARF) or the Webex Recording Format (WRF). An attacker could exploit this vulnerability by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to cause the Webex player application to crash when trying to view the malicious file., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: LOW, Base Score: 3.3, Base Severity: LOW, Confidentiality Impact: NONE, Integrity Impact: NONE, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-5358
|
CVE-2020-5358 in Dell Encryption Enterprise. Has primary impact with T1068 : Exploitation for Privilege Escalation.
|
Describe the vulnerability CVE-2019-15107
|
CVE-2019-15107, State: PUBLISHED, Published: 2019-08-16T02:44:04, Updated: 2024-08-05T00:34:53.279Z, Description: An issue was discovered in Webmin <=1.920. The parameter old in password_change.cgi contains a command injection vulnerability., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2011-2900
|
CVE-2011-2900, State: PUBLISHED, Published: 2011-08-05T21:00:00, Updated: 2024-08-06T23:15:31.716Z, Description: Stack-based buffer overflow in the (1) put_dir function in mongoose.c in Mongoose 3.0, (2) put_dir function in yasslEWS.c in yaSSL Embedded Web Server (yasslEWS) 0.2, and (3) _shttpd_put_dir function in io_dir.c in Simple HTTPD (shttpd) 1.42 allows remote attackers to execute arbitrary code via an HTTP PUT request, as exploited in the wild in 2011., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-3292
|
CVE-2020-3292, State: PUBLISHED, Published: 2020-06-18T02:16:04.053598Z, Updated: 2024-11-15T17:08:02.787Z, Description: Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code on an affected device. The vulnerabilities are due to insufficient boundary restrictions on user-supplied input to scripts in the web-based management interface. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending crafted requests that contain overly large values to an affected device, causing a stack overflow. A successful exploit could allow the attacker to cause the device to crash or allow the attacker to execute arbitrary code with root privileges on the underlying operating system., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 7.2, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory.
|
Techniques related with vulnerability CVE-2018-8607
|
CVE-2018-8607 in Microsoft Dynamics 365. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation. Has secondary impact with T1485 : Data Destruction. Has secondary impact with T1478 : Install Insecure or Malicious Configuration. Has secondary impact with T1036 : Masquerading.
|
Techniques related with vulnerability CVE-2019-1836
|
CVE-2019-1836 in Cisco NX-OS Software for Nexus 9000 Series Fabric Switches ACI Mode. Has primary impact with T1565.001 : Stored Data Manipulation. Has an exploitation technique T1133 : External Remote Services.
|
Techniques related with vulnerability CVE-2018-5463
|
CVE-2018-5463 in LCDS LTDA ME LAquis SCADA. Is related with T1068 : Exploitation for Privilege Escalation.
|
Describe the vulnerability CVE-2018-17908
|
CVE-2018-17908, State: PUBLISHED, Published: 2018-10-29T18:00:00, Updated: 2024-08-05T11:01:14.890Z, Description: WebAccess Versions 8.3.2 and prior. During installation, the application installer disables user access control and does not re-enable it after the installation is complete. This could allow an attacker to run elevated arbitrary code., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-10990
|
CVE-2019-10990, State: PUBLISHED, Published: 2019-09-23T15:46:43, Updated: 2024-08-04T22:40:15.501Z, Description: Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, uses a hard-coded password to encrypt protected files in transit and at rest, which may allow an attacker to access configuration files., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2015-0016
|
CVE-2015-0016 in TS WebProxycomponent in Microsoft Windows before Windows 8.1. Is related with T1068 : Exploitation for Privilege Escalation.
|
Techniques related with vulnerability CVE-2014-1761
|
CVE-2014-1761 in Microsoft Word. Is related with T1190 : Exploit Public-Facing Application. Is related with T1569 : System Services.
|
Techniques related with vulnerability CVE-2020-8835
|
CVE-2020-8835 in Linux kernel. Is related with T1068 : Exploitation for Privilege Escalation.
|
Describe the vulnerability CVE-2018-17900
|
CVE-2018-17900, State: PUBLISHED, Published: 2018-10-12T14:00:00Z, Updated: 2024-09-16T19:37:05.913Z, Description: Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The web application improperly protects credentials which could allow an attacker to obtain credentials for remote access to controllers., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2013-1331
|
CVE-2013-1331, State: PUBLISHED, Published: 2013-06-12T01:00:00, Updated: 2024-08-06T14:57:05.114Z, Description: Buffer overflow in Microsoft Office 2003 SP3 and Office 2011 for Mac allows remote attackers to execute arbitrary code via crafted PNG data in an Office document, leading to improper memory allocation, aka "Office Buffer Overflow Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Describe MITRE technique T1133
|
MITRE T1133 : External Remote Services from enterprise Adversaries may leverage external-facing remote services to initially access and/or persist within a network. Remote services such as VPNs, Citrix, and other access mechanisms allow users to connect to internal enterprise network resources from external locations. There are often remote service gateways that manage connections and credential authentication for these services. Services such as [Windows Remote Management](T1021.006) and [VNC](T1021.005) can also be used externally.(Citation: MacOS VNC software for Remote Desktop)
Access to [Valid Accounts](T1078) to use the service is often a requirement, which could be obtained through credential pharming or by obtaining the credentials from users after compromising the enterprise network.(Citation: Volexity Virtual Private Keylogging) Access to remote services may be used as a redundant or persistent access mechanism during an operation.
Access may also be gained through an exposed service that doesn’t require authentication. In containerized environments, this may include an exposed Docker API, Kubernetes API server, kubelet, or web application such as the Kubernetes dashboard.(Citation: Trend Micro Exposed Docker Server)(Citation: Unit 42 Hildegard Malware)
|
Describe MITRE technique T1185
|
MITRE T1185 : Browser Session Hijacking from enterprise Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.(Citation: Wikipedia Man in the Browser)
A specific example is when an adversary injects software into a browser that allows them to inherit cookies, HTTP sessions, and SSL client certificates of a user then use the browser as a way to pivot into an authenticated intranet.(Citation: Cobalt Strike Browser Pivot)(Citation: ICEBRG Chrome Extensions) Executing browser-based behaviors such as pivoting may require specific process permissions, such as `SeDebugPrivilege` and/or high-integrity/administrator rights.
Another example involves pivoting browser traffic from the adversary's browser through the user's browser by setting up a proxy which will redirect web traffic. This does not alter the user's traffic in any way, and the proxy connection can be severed as soon as the browser is closed. The adversary assumes the security context of whichever browser process the proxy is injected into. Browsers typically create a new process for each tab that is opened and permissions and certificates are separated accordingly. With these permissions, an adversary could potentially browse to any resource on an intranet, such as [Sharepoint](T1213.002) or webmail, that is accessible through the browser and which the browser has sufficient permissions. Browser pivoting may also bypass security provided by 2-factor authentication.(Citation: cobaltstrike manual)
|
Techniques related with vulnerability CVE-2009-1862
|
CVE-2009-1862 in Adobe Reader and Acrobat 9.x through 9.1.2, and Adobe Flash Player 9.x through 9.0.159.0 and 10.x through 10.0.22.87. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
|
Techniques related with vulnerability CVE-2012-0181
|
CVE-2012-0181 in win32k.sys in the kernel-mode drivers in Microsoft Windows. Is related with T1068 : Exploitation for Privilege Escalation.
|
Techniques related with vulnerability CVE-2008-3431
|
CVE-2008-3431 in Sun xVM VirtualBox before 1.6.4. Is related with T1608 : Stage Capabilities.
|
Describe the vulnerability CVE-2015-1539
|
CVE-2015-1539, State: PUBLISHED, Published: 2015-10-01T00:00:00, Updated: 2024-08-06T04:47:16.218Z, Description: Multiple integer underflows in the ESDS::parseESDescriptor function in ESDS.cpp in libstagefright in Android before 5.1.1 LMY48I allow remote attackers to execute arbitrary code via crafted ESDS atoms, aka internal bug 20139950, a related issue to CVE-2015-4493., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-5373
|
CVE-2020-5373, State: PUBLISHED, Published: 2020-07-14T19:30:14.797364Z, Updated: 2024-09-17T03:02:58.871Z, Description: Dell EMC OpenManage Integration for Microsoft System Center (OMIMSSC) for SCCM and SCVMM versions prior to 7.2.1 contain an improper authentication vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability to retrieve the system inventory data of the managed device., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 6.5, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: NONE, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-12014
|
CVE-2020-12014 in Advantech WebAccess Node. Has primary impact with T1059 : Command and Scripting Interpreter.
|
Techniques related with vulnerability CVE-2015-7925
|
CVE-2015-7925 in CSRF on eWON devices. Is related with T1204.001 : Malicious Link. Is related with T1529 : System Shutdown/Reboot. Is related with T1542.001 : System Firmware. Is related with T1565.001 : Stored Data Manipulation.
|
Describe the vulnerability CVE-2014-4148
|
CVE-2014-4148, State: PUBLISHED, Published: 2014-10-15T10:00:00, Updated: 2024-08-06T11:04:28.672Z, Description: win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted TrueType font, as exploited in the wild in October 2014, aka "TrueType Font Parsing Remote Code Execution Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2010-3916
|
CVE-2010-3916, State: PUBLISHED, Published: 2010-11-05T22:00:00, Updated: 2024-08-07T03:26:12.263Z, Description: Unspecified vulnerability in JustSystems Ichitaro and Ichitaro Government allows remote attackers to execute arbitrary code via a crafted document, a different vulnerability than CVE-2010-3915., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2016-0167
|
CVE-2016-0167 in Windows kernel. Is related with T1608 : Stage Capabilities.
|
Techniques related with vulnerability CVE-2020-6960
|
CVE-2020-6960 in Honeywell Maxpro VMS & NVR. Has primary impact with T1059 : Command and Scripting Interpreter.
|
Describe the vulnerability CVE-2019-3790
|
CVE-2019-3790, State: PUBLISHED, Published: 2019-06-06T19:16:16.854483Z, Updated: 2024-09-16T22:20:48.221Z, Description: The Pivotal Ops Manager, 2.2.x versions prior to 2.2.23, 2.3.x versions prior to 2.3.16, 2.4.x versions prior to 2.4.11, and 2.5.x versions prior to 2.5.3, contain configuration that circumvents refresh token expiration. A remote authenticated user can gain access to a browser session that was supposed to have expired, and access Ops Manager resources., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 6.1, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-3416
|
CVE-2020-3416, State: PUBLISHED, Published: 2020-09-24T18:01:46.479066Z, Updated: 2024-11-13T17:55:48.060Z, Description: Multiple vulnerabilities in the initialization routines that are executed during bootup of Cisco IOS XE Software for Cisco ASR 900 Series Aggregation Services Routers with a Route Switch Processor 3 (RSP3) installed could allow an authenticated, local attacker with high privileges to execute persistent code at bootup and break the chain of trust. These vulnerabilities are due to incorrect validations by boot scripts when specific ROM monitor (ROMMON) variables are set. An attacker could exploit these vulnerabilities by copying a specific file to the local file system of an affected device and defining specific ROMMON variables. A successful exploit could allow the attacker to run arbitrary code on the underlying operating system (OS) with root privileges. To exploit these vulnerabilities, an attacker would need to have access to the root shell on the device or have physical access to the device., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: HIGH, Base Score: 6.7, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.
|
Describe the vulnerability CVE-2009-1308
|
CVE-2009-1308, State: PUBLISHED, Published: 2009-04-22T18:00:00, Updated: 2024-08-07T05:04:49.602Z, Description: Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey allows remote attackers to inject arbitrary web script or HTML via vectors involving XBL JavaScript bindings and remote stylesheets, as exploited in the wild by a March 2009 eBay listing., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2012-2319
|
CVE-2012-2319 in Linux kernel before 3.3.5. Is related with T1608 : Stage Capabilities.
|
Describe the vulnerability CVE-2017-7533
|
CVE-2017-7533, State: PUBLISHED, Published: 2017-08-05T16:00:00, Updated: 2024-08-05T16:04:11.899Z, Description: Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2010-2862
|
CVE-2010-2862, State: PUBLISHED, Published: 2010-08-05T18:00:00, Updated: 2024-08-07T02:46:48.634Z, Description: Integer overflow in CoolType.dll in Adobe Reader 8.2.3 and 9.3.3, and Acrobat 9.3.3, allows remote attackers to execute arbitrary code via a TrueType font with a large maxCompositePoints value in a Maximum Profile (maxp) table., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-12008
|
CVE-2020-12008, State: PUBLISHED, Published: 2020-06-29T13:53:25, Updated: 2024-08-04T11:48:57.121Z, Description: Baxter ExactaMix EM 2400 Versions 1.10, 1.11 and ExactaMix EM1200 Versions 1.1, 1.2 systems use cleartext messages to communicate order information with an order entry system. This could allow an attacker with network access to view sensitive data including PHI., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-1020
|
CVE-2020-1020 in Windows. Is related with T1566 : Phishing. Is related with T1203 : Exploitation for Client Execution.
|
Techniques related with vulnerability CVE-2009-1671
|
CVE-2009-1671 in Deployment Toolkit ActiveX control. Is related with T1203 : Exploitation for Client Execution.
|
Describe the vulnerability CVE-2009-1800
|
CVE-2009-1800, State: PUBLISHED, Published: 2009-05-28T14:00:00Z, Updated: 2024-09-16T17:19:18.270Z, Description: Stack-based buffer overflow in the Chinagames CGAgent ActiveX control 1.x in CGAgent.dll, as distributed in Chinagames iGame 2009, allows remote attackers to execute arbitrary code via a long argument to the CreateChinagames method, as exploited in the wild in April and May 2009. NOTE: some of these details are obtained from third party information., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-1118
|
CVE-2019-1118, State: PUBLISHED, Published: 2019-07-29T14:11:14, Updated: 2024-08-04T18:06:31.914Z, Description: A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory, aka 'DirectWrite Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1117, CVE-2019-1119, CVE-2019-1120, CVE-2019-1121, CVE-2019-1122, CVE-2019-1123, CVE-2019-1124, CVE-2019-1127, CVE-2019-1128., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2010-3915
|
CVE-2010-3915 in Ichitaro. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution.
|
Describe the vulnerability CVE-2018-8611
|
CVE-2018-8611, State: PUBLISHED, Published: 2018-12-12T00:00:00, Updated: 2024-08-05T07:02:26.027Z, Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka "Windows Kernel Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-5250
|
CVE-2020-5250 in PrestaShop. Has primary impact with T1036 : Masquerading. Has secondary impact with T1478 : Install Insecure or Malicious Configuration.
|
Describe the vulnerability CVE-2020-5371
|
CVE-2020-5371, State: PUBLISHED, Published: 2020-07-06T17:45:18.792486Z, Updated: 2024-09-16T19:52:24.613Z, Description: Dell EMC Isilon OneFS versions 8.2.2 and earlier and Dell EMC PowerScale version 9.0.0 contain a file permissions vulnerability. An attacker, with network or local file access, could take advantage of insufficiently applied file permissions or gain unauthorized access to files., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2019-15998
|
CVE-2019-15998 in Cisco IOS XR Software. Has primary impact with T1133 : External Remote Services. Has an exploitation technique T1078 : Valid Accounts.
|
Describe the vulnerability CVE-2016-6366
|
CVE-2016-6366, State: PUBLISHED, Published: 2016-08-18T18:00:00, Updated: 2024-11-15T18:02:26.862Z, Description: Buffer overflow in Cisco Adaptive Security Appliance (ASA) Software through 9.4.2.3 on ASA 5500, ASA 5500-X, ASA Services Module, ASA 1000V, ASAv, Firepower 9300 ASA Security Module, PIX, and FWSM devices allows remote authenticated users to execute arbitrary code via crafted IPv4 SNMP packets, aka Bug ID CSCva92151 or EXTRABACON., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-1724
|
CVE-2019-1724, State: PUBLISHED, Published: 2019-05-03T16:20:23.207337Z, Updated: 2024-11-20T17:23:28.176Z, Description: A vulnerability in the session management functionality of the web-based interface for Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to hijack a valid user session on an affected system. An attacker could use this impersonated session to create a new user account or otherwise control the device with the privileges of the hijacked session. The vulnerability is due to a lack of proper session management controls. An attacker could exploit this vulnerability by sending a crafted HTTP request to a targeted device. A successful exploit could allow the attacker to take control of an existing user session on the device. Exploitation of the vulnerability requires that an authorized user session is active and that the attacker can craft an HTTP request to impersonate that session., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.8, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Techniques related with vulnerability CVE-2019-1458
|
CVE-2019-1458 in Windows. Is related with T1059 : Command and Scripting Interpreter. Is related with T1190 : Exploit Public-Facing Application.
|
Techniques related with vulnerability CVE-2010-5290
|
CVE-2010-5290 in Adobe ColdFusion before 10. Is related with T1550.002 : Pass the Hash. Is related with T1552.001 : Credentials In Files.
|
Techniques related with vulnerability CVE-2018-11048
|
CVE-2018-11048 in Data Protection Advisor. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1133 : External Remote Services.
|
Techniques related with vulnerability CVE-2020-15137
|
CVE-2020-15137 in HoRNDIS. Has primary impact with T1005 : Data from Local System. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1190 : Exploit Public-Facing Application.
|
Techniques related with vulnerability CVE-2009-3129
|
CVE-2009-3129 in Microsoft Office Excel. Is related with T1204.002 : Malicious File. Is related with T1203 : Exploitation for Client Execution.
|
Describe MITRE technique T1190
|
MITRE T1190 : Exploit Public-Facing Application from enterprise Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network. The weakness in the system can be a software bug, a temporary glitch, or a misconfiguration.
Exploited applications are often websites/web servers, but can also include databases (like SQL), standard services (like SMB or SSH), network device administration and management protocols (like SNMP and Smart Install), and any other system with Internet accessible open sockets.(Citation: NVD CVE-2016-6662)(Citation: CIS Multiple SMB Vulnerabilities)(Citation: US-CERT TA18-106A Network Infrastructure Devices 2018)(Citation: Cisco Blog Legacy Device Attacks)(Citation: NVD CVE-2014-7169) Depending on the flaw being exploited this may also involve [Exploitation for Defense Evasion](T1211) or [Exploitation for Client Execution](T1203).
If an application is hosted on cloud-based infrastructure and/or is containerized, then exploiting it may lead to compromise of the underlying instance or container. This can allow an adversary a path to access the cloud or container APIs, exploit container host access via [Escape to Host](T1611), or take advantage of weak identity and access management policies.
Adversaries may also exploit edge network infrastructure and related appliances, specifically targeting devices that do not support robust host-based defenses.(Citation: Mandiant Fortinet Zero Day)(Citation: Wired Russia Cyberwar)
For websites and databases, the OWASP top 10 and CWE top 25 highlight the most common web-based vulnerabilities.(Citation: OWASP Top 10)(Citation: CWE top 25)
|
Describe the vulnerability CVE-2020-1347
|
CVE-2020-1347, State: PUBLISHED, Published: 2020-07-14T22:54:05, Updated: 2024-08-04T06:32:01.237Z, Description: An elevation of privilege vulnerability exists when the Windows Storage Services improperly handle file operations, aka 'Windows Storage Services Elevation of Privilege Vulnerability'., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2014-7186
|
CVE-2014-7186 in GNU Bash through 4.3 bash43-026. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059.004 : Unix Shell.
|
Describe the vulnerability CVE-2020-11019
|
CVE-2020-11019, State: PUBLISHED, Published: 2020-05-29T00:00:00, Updated: 2024-08-04T11:21:14.328Z, Description: In FreeRDP less than or equal to 2.0.0, when running with logger set to "WLOG_TRACE", a possible crash of application could occur due to a read of an invalid array index. Data could be printed as string to local terminal. This has been fixed in 2.1.0., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: LOW, Base Score: 4.3, Base Severity: MEDIUM, Confidentiality Impact: NONE, Integrity Impact: NONE, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2013-0422
|
CVE-2013-0422, State: PUBLISHED, Published: 2013-01-10T21:23:00, Updated: 2024-08-06T14:25:10.233Z, Description: Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attackers to execute arbitrary code by (1) using the public getMBeanInstantiator method in the JmxMBeanServer class to obtain a reference to a private MBeanInstantiator object, then retrieving arbitrary Class references using the findClass method, and (2) using the Reflection API with recursion in a way that bypasses a security check by the java.lang.invoke.MethodHandles.Lookup.checkSecurityManager method due to the inability of the sun.reflect.Reflection.getCallerClass method to skip frames related to the new reflection API, as exploited in the wild in January 2013, as demonstrated by Blackhole and Nuclear Pack, and a different vulnerability than CVE-2012-4681 and CVE-2012-3174. NOTE: some parties have mapped the recursive Reflection API issue to CVE-2012-3174, but CVE-2012-3174 is for a different vulnerability whose details are not public as of 20130114. CVE-2013-0422 covers both the JMX/MBean and Reflection API issues. NOTE: it was originally reported that Java 6 was also vulnerable, but the reporter has retracted this claim, stating that Java 6 is not exploitable because the relevant code is called in a way that does not bypass security checks. NOTE: as of 20130114, a reliable third party has claimed that the findClass/MBeanInstantiator vector was not fixed in Oracle Java 7 Update 11. If there is still a vulnerable condition, then a separate CVE identifier might be created for the unfixed issue., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-11957
|
CVE-2020-11957 in Bluetooth Low Energy implementation in Cypress PSoC Creator BLE 4.2 component versions before 3.64a. Is related with T1110 : Brute Force.
|
Describe the vulnerability CVE-2020-6986
|
CVE-2020-6986, State: PUBLISHED, Published: 2020-03-05T20:05:05, Updated: 2024-08-04T09:18:02.467Z, Description: In all versions of Omron PLC CJ Series, an attacker can send a series of specific data packets within a short period, causing a service error on the PLC Ethernet module, which in turn causes a PLC service denied result., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-1206
|
CVE-2020-1206, State: PUBLISHED, Published: 2020-06-09T19:43:23, Updated: 2024-08-04T06:31:58.165Z, Description: An information disclosure vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Information Disclosure Vulnerability'., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2009-0927
|
CVE-2009-0927, State: PUBLISHED, Published: 2009-03-19T10:00:00, Updated: 2024-08-07T04:57:16.395Z, Description: Stack-based buffer overflow in Adobe Reader and Adobe Acrobat 9 before 9.1, 8 before 8.1.3 , and 7 before 7.1.1 allows remote attackers to execute arbitrary code via a crafted argument to the getIcon method of a Collab object, a different vulnerability than CVE-2009-0658., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-1838
|
CVE-2019-1838, State: PUBLISHED, Published: 2019-05-03T16:35:32.825299Z, Updated: 2024-09-17T04:25:12.618Z, Description: A vulnerability in the web-based management interface of Cisco Application Policy Infrastructure Controller (APIC) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. This vulnerability has been fixed in software version 14.1(1i)., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 5.4, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: LOW, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Describe the vulnerability CVE-2020-3375
|
CVE-2020-3375, State: PUBLISHED, Published: 2020-07-31T00:00:54.582569Z, Updated: 2024-11-13T18:17:15.547Z, Description: A vulnerability in Cisco SD-WAN Solution Software could allow an unauthenticated, remote attacker to cause a buffer overflow on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to gain access to information that they are not authorized to access, make changes to the system that they are not authorized to make, and execute commands on an affected system with privileges of the root user., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 9.8, Base Severity: CRITICAL, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Techniques related with vulnerability CVE-2020-3322
|
CVE-2020-3322 in Cisco Webex Network Recording Player. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1566 : Phishing. Has an exploitation technique T1204.002 : Malicious File.
|
Techniques related with vulnerability CVE-2013-3897
|
CVE-2013-3897 in Internet Explorer 6 through 11. Is related with T1203 : Exploitation for Client Execution.
|
Describe the vulnerability CVE-2017-11368
|
CVE-2017-11368, State: PUBLISHED, Published: 2017-08-09T18:00:00, Updated: 2024-08-05T18:05:30.590Z, Description: In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker can cause a KDC assertion failure by sending invalid S4U2Self or S4U2Proxy requests., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-10751
|
CVE-2020-10751, State: PUBLISHED, Published: 2020-05-26T14:54:32, Updated: 2024-08-04T11:14:15.560Z, Description: A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: NONE, Base Score: 6.1, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: LOW, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-15444
|
CVE-2018-15444, State: PUBLISHED, Published: 2018-11-08T18:00:00Z, Updated: 2024-09-16T17:48:00.875Z, Description: A vulnerability in the web-based user interface of Cisco Energy Management Suite Software could allow an authenticated, remote attacker to gain read and write access to information that is stored on an affected system. The vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing certain XML files. An attacker could exploit this vulnerability by convincing a user of an affected system to import a crafted XML file with malicious entries, which could allow the attacker to read and write files within the affected application., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 6.3, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: LOW, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Describe the vulnerability CVE-2019-3767
|
CVE-2019-3767, State: PUBLISHED, Published: 2019-10-14T17:10:38.958778Z, Updated: 2024-09-17T01:21:08.167Z, Description: Dell ImageAssist versions prior to 8.7.15 contain an information disclosure vulnerability. Dell ImageAssist stores some sensitive encrypted information in the images it creates. A privileged user of a system running an operating system that was deployed with Dell ImageAssist could potentially retrieve this sensitive information to then compromise the system and related systems., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: LOCAL, Availability Impact: HIGH, Base Score: 7.5, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2010-0842
|
CVE-2010-0842 in Sound component in Oracle Java SE and Java for Business 6. Is related with T1203 : Exploitation for Client Execution.
|
Describe the vulnerability CVE-2016-7193
|
CVE-2016-7193, State: PUBLISHED, Published: 2016-10-14T01:00:00, Updated: 2024-08-06T01:50:47.546Z, Description: Microsoft Word 2007 SP2, Office 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 SP1, Office Web Apps 2010 SP2, Office Web Apps Server 2013 SP1, and Office Online Server allow remote attackers to execute arbitrary code via a crafted RTF document, aka "Microsoft Office Memory Corruption Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-7500
|
CVE-2018-7500, State: PUBLISHED, Published: 2018-03-14T18:00:00, Updated: 2024-08-05T06:31:04.282Z, Description: A Permissions, Privileges, and Access Controls issue was discovered in OSIsoft PI Web API versions 2017 R2 and prior. Privileges may be escalated, giving attackers access to the PI System via the service account., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-15211
|
CVE-2020-15211, State: PUBLISHED, Published: 2020-09-25T18:45:24, Updated: 2024-08-04T13:08:22.936Z, Description: In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in the flatbuffer format use a double indexing scheme: a model has a set of subgraphs, each subgraph has a set of operators and each operator has a set of input/output tensors. The flatbuffer format uses indices for the tensors, indexing into an array of tensors that is owned by the subgraph. This results in a pattern of double array indexing when trying to get the data of each tensor. However, some operators can have some tensors be optional. To handle this scenario, the flatbuffer model uses a negative `-1` value as index for these tensors. This results in special casing during validation at model loading time. Unfortunately, this means that the `-1` index is a valid tensor index for any operator, including those that don't expect optional inputs and including for output tensors. Thus, this allows writing and reading from outside the bounds of heap allocated arrays, although only at a specific offset from the start of these arrays. This results in both read and write gadgets, albeit very limited in scope. The issue is patched in several commits (46d5b0852, 00302787b7, e11f5558, cd31fd0ce, 1970c21, and fff2c83), and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. A potential workaround would be to add a custom `Verifier` to the model loading code to ensure that only operators which accept optional inputs use the `-1` special value and only for the tensors that they expect to be optional. Since this allow-list type approach is erro-prone, we advise upgrading to the patched code., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 4.8, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2019-3732
|
CVE-2019-3732 in RSA BSAFE Crypto-C Micro Edition. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1190 : Exploit Public-Facing Application.
|
Describe the vulnerability CVE-2012-6498
|
CVE-2012-6498, State: PUBLISHED, Published: 2013-01-08T15:00:00Z, Updated: 2024-09-16T21:03:49.568Z, Description: Unrestricted file upload vulnerability in index.php in Atomymaxsite 2.5 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file, as exploited in the wild in October 2012., No CVSS metrics available, Exploit Info: No exploit information available
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.