input
stringlengths 30
54
| output
stringlengths 69
4.21k
|
|---|---|
Describe the vulnerability CVE-2015-1805
|
CVE-2015-1805, State: PUBLISHED, Published: 2015-08-08T10:00:00, Updated: 2024-08-06T04:54:16.310Z, Description: The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun.", No CVSS metrics available, Exploit Info: No exploit information available
|
Describe MITRE technique T1212
|
MITRE T1212 : Exploitation for Credential Access from enterprise Adversaries may exploit software vulnerabilities in an attempt to collect credentials. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code.
Credentialing and authentication mechanisms may be targeted for exploitation by adversaries as a means to gain access to useful credentials or circumvent the process to gain authenticated access to systems. One example of this is `MS14-068`, which targets Kerberos and can be used to forge Kerberos tickets using domain user permissions.(Citation: Technet MS14-068)(Citation: ADSecurity Detecting Forged Tickets) Another example of this is replay attacks, in which the adversary intercepts data packets sent between parties and then later replays these packets. If services don't properly validate authentication requests, these replayed packets may allow an adversary to impersonate one of the parties and gain unauthorized access or privileges.(Citation: Bugcrowd Replay Attack)(Citation: Comparitech Replay Attack)(Citation: Microsoft Midnight Blizzard Replay Attack)
Such exploitation has been demonstrated in cloud environments as well. For example, adversaries have exploited vulnerabilities in public cloud infrastructure that allowed for unintended authentication token creation and renewal.(Citation: Storm-0558 techniques for unauthorized email access)
Exploitation for credential access may also result in Privilege Escalation depending on the process targeted or credentials obtained.
|
Describe the vulnerability CVE-2008-3431
|
CVE-2008-3431, State: PUBLISHED, Published: 2008-08-05T19:20:00, Updated: 2024-08-07T09:37:26.905Z, Description: The VBoxDrvNtDeviceControl function in VBoxDrv.sys in Sun xVM VirtualBox before 1.6.4 uses the METHOD_NEITHER communication method for IOCTLs and does not properly validate a buffer associated with the Irp object, which allows local users to gain privileges by opening the \\.\VBoxDrv device and calling DeviceIoControl to send a crafted kernel address., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-11050
|
CVE-2020-11050, State: PUBLISHED, Published: 2020-05-07T20:15:12, Updated: 2024-08-04T11:21:14.437Z, Description: In Java-WebSocket less than or equal to 1.4.1, there is an Improper Validation of Certificate with Host Mismatch where WebSocketClient does not perform SSL hostname validation. This has been patched in 1.5.0., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 9, Base Severity: CRITICAL, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-15094
|
CVE-2020-15094, State: PUBLISHED, Published: 2020-09-02T17:35:15, Updated: 2024-08-04T13:08:22.072Z, Description: In Symfony before versions 4.4.13 and 5.1.5, the CachingHttpClient class from the HttpClient Symfony component relies on the HttpCache class to handle requests. HttpCache uses internal headers like X-Body-Eval and X-Body-File to control the restoration of cached responses. The class was initially written with surrogate caching and ESI support in mind (all HTTP calls come from a trusted backend in that scenario). But when used by CachingHttpClient and if an attacker can control the response for a request being made by the CachingHttpClient, remote code execution is possible. This has been fixed in versions 4.4.13 and 5.1.5., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-14819
|
CVE-2018-14819, State: PUBLISHED, Published: 2018-09-26T20:00:00Z, Updated: 2024-09-16T16:47:54.538Z, Description: Fuji Electric V-Server 4.0.3.0 and prior, An out-of-bounds read vulnerability has been identified, which may allow remote code execution., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-5379
|
CVE-2020-5379 in CPG BIOS. Has primary impact with T1542.001 : System Firmware.
|
Techniques related with vulnerability CVE-2010-5326
|
CVE-2010-5326 in SAP NetWeaver Application Server Java platforms, possibly before 7.3. Is related with T1190 : Exploit Public-Facing Application. Is related with T1203 : Exploitation for Client Execution.
|
Describe the vulnerability CVE-2020-0601
|
CVE-2020-0601, State: PUBLISHED, Published: 2020-01-14T23:11:20, Updated: 2024-08-04T06:11:04.613Z, Description: A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka 'Windows CryptoAPI Spoofing Vulnerability'., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2017-15211
|
CVE-2017-15211 in Kanboard before 1.0.47. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1566 : Phishing.
|
Techniques related with vulnerability CVE-2019-12660
|
CVE-2019-12660 in Cisco IOS XE Software 3.2.11aSG. Has primary impact with T1574 : Hijack Execution Flow. Has secondary impact with T1562 : Impair Defenses. Has an exploitation technique T1078 : Valid Accounts.
|
Describe the vulnerability CVE-2014-6293
|
CVE-2014-6293, State: PUBLISHED, Published: 2014-10-03T14:00:00, Updated: 2024-08-06T12:10:13.348Z, Description: SQL injection vulnerability in the Statistics (ke_stats) extension before 1.1.2 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, as exploited in the wild in February 2014., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2014-0751
|
CVE-2014-0751 in GE Intelligent Platforms Proficy HMI/SCADA. Is related with T1210 : Exploitation of Remote Services. Is related with T1190 : Exploit Public-Facing Application. Is related with T1211 : Exploitation for Defense Evasion. Is related with T1005 : Data from Local System. Is related with T1212 : Exploitation for Credential Access. Is related with T1552 : Unsecured Credentials. Is related with T1133 : External Remote Services.
|
Describe the vulnerability CVE-2020-5269
|
CVE-2020-5269, State: PUBLISHED, Published: 2020-04-20T16:45:20, Updated: 2024-08-04T08:22:09.082Z, Description: In PrestaShop between versions 1.7.6.1 and 1.7.6.5, there is a reflected XSS on AdminFeatures page by using the `id_feature` parameter. The problem is fixed in 1.7.6.5, CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 4.1, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: NONE, Privileges Required: LOW, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2014-0324
|
CVE-2014-0324, State: PUBLISHED, Published: 2014-03-12T01:00:00, Updated: 2024-08-06T09:13:09.733Z, Description: Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-0297, CVE-2014-0308, and CVE-2014-0312., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2014-1809
|
CVE-2014-1809, State: PUBLISHED, Published: 2014-05-14T10:00:00, Updated: 2024-08-06T09:50:11.352Z, Description: The MSCOMCTL library in Microsoft Office 2007 SP3, 2010 SP1 and SP2, and 2013 Gold, SP1, RT, and RT SP1 makes it easier for remote attackers to bypass the ASLR protection mechanism via a crafted web site, as exploited in the wild in May 2014, aka "MSCOMCTL ASLR Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2017-14323
|
CVE-2017-14323 in Onethink V1.0 and V1.1. Is related with T1210 : Exploitation of Remote Services. Is related with T1046 : Network Service Scanning. Is related with T1059 : Command and Scripting Interpreter.
|
Describe MITRE technique T1203
|
MITRE T1203 : Exploitation for Client Execution from enterprise Adversaries may exploit software vulnerabilities in client applications to execute code. Vulnerabilities can exist in software due to unsecure coding practices that can lead to unanticipated behavior. Adversaries can take advantage of certain vulnerabilities through targeted exploitation for the purpose of arbitrary code execution. Oftentimes the most valuable exploits to an offensive toolkit are those that can be used to obtain code execution on a remote system because they can be used to gain access to that system. Users will expect to see files related to the applications they commonly used to do work, so they are a useful target for exploit research and development because of their high utility.
Several types exist:
# Browser-based Exploitation #
Web browsers are a common target through [Drive-by Compromise](T1189) and [Spearphishing Link](T1566.002). Endpoint systems may be compromised through normal web browsing or from certain users being targeted by links in spearphishing emails to adversary controlled sites used to exploit the web browser. These often do not require an action by the user for the exploit to be executed.
# Office Applications #
Common office and productivity applications such as Microsoft Office are also targeted through [Phishing](T1566). Malicious files will be transmitted directly as attachments or through links to download them. These require the user to open the document or file for the exploit to run.
# Common Third-party Applications #
Other applications that are commonly seen or are part of the software deployed in a target network may also be used for exploitation. Applications such as Adobe Reader and Flash, which are common in enterprise environments, have been routinely targeted by adversaries attempting to gain access to systems. Depending on the software and nature of the vulnerability, some may be exploited in the browser or require the user to open a file. For instance, some Flash exploits have been delivered as objects within Microsoft Office documents.
|
Describe the vulnerability CVE-2020-15179
|
CVE-2020-15179, State: PUBLISHED, Published: 2020-09-15T18:10:13, Updated: 2024-08-04T13:08:22.438Z, Description: The ScratchSig extension for MediaWiki before version 1.0.1 allows stored Cross-Site Scripting. Using <script> tag inside <scratchsig> tag, attackers with edit permission can execute scripts on visitors' browser. With MediaWiki JavaScript API, this can potentially lead to privilege escalation and/or account takeover. This has been patched in release 1.0.1. This has already been deployed to all Scratch Wikis. No workarounds exist other than disabling the extension completely., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2014-1807
|
CVE-2014-1807 in Windows Shell. Is related with T1068 : Exploitation for Privilege Escalation.
|
Describe the vulnerability CVE-2009-1807
|
CVE-2009-1807, State: PUBLISHED, Published: 2009-05-28T20:14:00, Updated: 2024-08-07T05:27:54.345Z, Description: Unspecified vulnerability in Config.dll in Baofeng products 3.09.04.17 and earlier allows remote attackers to execute arbitrary code by calling the SetAttributeValue method, as exploited in the wild in April and May 2009., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2010-1592
|
CVE-2010-1592 in Sandra Device Driver in SiSoftware Sandra 16.10.2010.1 and earlier. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1574.002 : DLL Side-Loading.
|
Techniques related with vulnerability CVE-2020-1631
|
CVE-2020-1631 in Junos OS. Is related with T1203 : Exploitation for Client Execution.
|
Techniques related with vulnerability CVE-2020-3309
|
CVE-2020-3309 in Cisco Firepower Threat Defense Software. Has primary impact with T1574 : Hijack Execution Flow. Has secondary impact with T1565.001 : Stored Data Manipulation. Has an exploitation technique T1190 : Exploit Public-Facing Application. Has an exploitation technique T1133 : External Remote Services.
|
Describe MITRE technique T1456
|
MITRE T1456 : Drive-By Compromise from mobile Adversaries may gain access to a system through a user visiting a website over the normal course of browsing. With this technique, the user's web browser is typically targeted for exploitation, but adversaries may also use compromised websites for non-exploitation behavior such as acquiring an [Application Access Token](T1550.001).
Multiple ways of delivering exploit code to a browser exist, including:
* A legitimate website is compromised where adversaries have injected some form of malicious code such as JavaScript, iFrames, and cross-site scripting.
* Malicious ads are paid for and served through legitimate ad providers.
* Built-in web application interfaces are leveraged for the insertion of any other kind of object that can be used to display web content or contain a script that executes on the visiting client (e.g. forum posts, comments, and other user controllable web content).
Often the website used by an adversary is one visited by a specific community, such as government, a particular industry, or region, where the goal is to compromise a specific user or set of users based on a shared interest. This kind of targeted attack is referred to a strategic web compromise or watering hole attack. There are several known examples of this occurring.(Citation: Lookout-StealthMango)
Typical drive-by compromise process:
1. A user visits a website that is used to host the adversary controlled content.
2. Scripts automatically execute, typically searching versions of the browser and plugins for a potentially vulnerable version.
* The user may be required to assist in this process by enabling scripting or active website components and ignoring warning dialog boxes.
3. Upon finding a vulnerable version, exploit code is delivered to the browser.
4. If exploitation is successful, then it will give the adversary code execution on the user's system unless other protections are in place.
* In some cases a second visit to the website after the initial scan is required before exploit code is delivered.
|
Techniques related with vulnerability CVE-2019-1764
|
CVE-2019-1764 in Cisco Wireless IP Phone 8821 and 8821-EX. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1204.001 : Malicious Link.
|
Techniques related with vulnerability CVE-2019-3707
|
CVE-2019-3707 in iDRAC. Has primary impact with T1190 : Exploit Public-Facing Application.
|
Describe the vulnerability CVE-2018-15776
|
CVE-2018-15776, State: PUBLISHED, Published: 2018-12-13T22:00:00Z, Updated: 2024-09-16T22:56:03.854Z, Description: Dell EMC iDRAC7/iDRAC8 versions prior to 2.61.60.60 contain an improper error handling vulnerability. An unauthenticated attacker with physical access to the system could potentially exploit this vulnerability to get access to the u-boot shell., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: PHYSICAL, Availability Impact: HIGH, Base Score: 6.4, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-15959
|
CVE-2019-15959, State: PUBLISHED, Published: 2020-09-23T00:27:21.957568Z, Updated: 2024-11-13T18:02:58.052Z, Description: A vulnerability in Cisco Small Business SPA500 Series IP Phones could allow a physically proximate attacker to execute arbitrary commands on the device. The vulnerability is due to the presence of development testing and verification scripts that remained on the device. An attacker could exploit this vulnerability by accessing the physical interface of a device and inserting a USB storage device. A successful exploit could allow the attacker to execute scripts on the device in an elevated security context., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: PHYSICAL, Availability Impact: HIGH, Base Score: 6.6, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Describe the vulnerability CVE-2012-6685
|
CVE-2012-6685, State: PUBLISHED, Published: 2020-02-19T14:41:27, Updated: 2024-08-06T21:36:01.934Z, Description: Nokogiri before 1.5.4 is vulnerable to XXE attacks, No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-1746
|
CVE-2019-1746, State: PUBLISHED, Published: 2019-03-27T23:45:13.618675Z, Updated: 2024-09-16T16:37:43.942Z, Description: A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: ADJACENT_NETWORK, Availability Impact: HIGH, Base Score: 7.4, Base Severity: HIGH, Confidentiality Impact: NONE, Integrity Impact: NONE, Privileges Required: NONE, Scope: CHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Techniques related with vulnerability CVE-2019-15280
|
CVE-2019-15280 in Cisco Firepower Management Center. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1189 : Drive-by Compromise.
|
Techniques related with vulnerability CVE-2019-13555
|
CVE-2019-13555 in Mitsubishi Electric MELSEC-Q Series. Has primary impact with T1499 : Endpoint Denial of Service. Has secondary impact with T0826 : Loss of Availability.
|
Techniques related with vulnerability CVE-2019-18872
|
CVE-2019-18872 in Blaauw Remote Kiln Control through v3.00r4. Is related with T1110.001 : Password Guessing.
|
Describe the vulnerability CVE-2018-20062
|
CVE-2018-20062, State: PUBLISHED, Published: 2018-12-11T18:00:00, Updated: 2024-08-05T11:51:18.951Z, Description: An issue was discovered in NoneCms V1.3. thinkphp/library/think/App.php allows remote attackers to execute arbitrary PHP code via crafted use of the filter parameter, as demonstrated by the s=index/\think\Request/input&filter=phpinfo&data=1 query string., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe MITRE technique T1497
|
MITRE T1497 : Virtualization/Sandbox Evasion from enterprise Adversaries may employ various means to detect and avoid virtualization and analysis environments. This may include changing behaviors based on the results of checks for the presence of artifacts indicative of a virtual machine environment (VME) or sandbox. If the adversary detects a VME, they may alter their malware to disengage from the victim or conceal the core functions of the implant. They may also search for VME artifacts before dropping secondary or additional payloads. Adversaries may use the information learned from [Virtualization/Sandbox Evasion](T1497) during automated discovery to shape follow-on behaviors.(Citation: Deloitte Environment Awareness)
Adversaries may use several methods to accomplish [Virtualization/Sandbox Evasion](T1497) such as checking for security monitoring tools (e.g., Sysinternals, Wireshark, etc.) or other system artifacts associated with analysis or virtualization. Adversaries may also check for legitimate user activity to help determine if it is in an analysis environment. Additional methods include use of sleep timers or loops within malware code to avoid operating within a temporary sandbox.(Citation: Unit 42 Pirpi July 2015)
|
Techniques related with vulnerability CVE-2020-3121
|
CVE-2020-3121 in Cisco 550X Series Stackable Managed Switches. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link.
|
Describe the vulnerability CVE-2020-5340
|
CVE-2020-5340, State: PUBLISHED, Published: 2020-03-25T21:05:15.109747Z, Updated: 2024-09-17T03:43:40.798Z, Description: RSA Authentication Manager versions prior to 8.4 P10 contain a stored cross-site scripting vulnerability in the Security Console. A malicious RSA Authentication Manager Security Console administrator with advanced privileges could exploit this vulnerability to store arbitrary HTML or JavaScript code through the Security Console web interface. When other Security Console administrators attempt to change the default security domain mapping, the injected scripts could potentially be executed in their browser., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 4.8, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: HIGH, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-11045
|
CVE-2018-11045, State: PUBLISHED, Published: 2018-07-11T20:00:00Z, Updated: 2024-09-16T22:56:33.333Z, Description: Pivotal Operations Manager, versions 2.1 prior to 2.1.6 and 2.0 prior to 2.0.15 and 1.12 prior to 1.12.22, contains a static Linux Random Number Generator (LRNG) seed file embedded in the appliance image. An attacker with knowledge of the exact version and IaaS of a running OpsManager could get the contents of the corresponding seed from the published image and therefore infer the initial state of the LRNG., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2019-1768
|
CVE-2019-1768 in Cisco NX-OS Software. Has primary impact with T1608 : Stage Capabilities. Has secondary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1078 : Valid Accounts.
|
Techniques related with vulnerability CVE-2018-7506
|
CVE-2018-7506 in Moxa MXview. Is related with T1133 : External Remote Services. Is related with T1552.004 : Private Keys.
|
Describe MITRE technique T1136
|
MITRE T1136 : Create Account from enterprise Adversaries may create an account to maintain access to victim systems.(Citation: Symantec WastedLocker June 2020) With a sufficient level of access, creating such accounts may be used to establish secondary credentialed access that do not require persistent remote access tools to be deployed on the system.
Accounts may be created on the local system or within a domain or cloud tenant. In cloud environments, adversaries may create accounts that only have access to specific services, which can reduce the chance of detection.
|
Techniques related with vulnerability CVE-2013-0640
|
CVE-2013-0640 in Acrobat 9.x before 9.5.4, 10.x before 10.1.6, and 11.x before 11.0.02. Is related with T1190 : Exploit Public-Facing Application. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1078 : Valid Accounts.
|
Describe the vulnerability CVE-2020-15132
|
CVE-2020-15132, State: PUBLISHED, Published: 2020-08-05T20:30:13, Updated: 2024-08-04T13:08:22.435Z, Description: In Sulu before versions 1.6.35, 2.0.10, and 2.1.1, when the "Forget password" feature on the login screen is used, Sulu asks the user for a username or email address. If the given string is not found, a response with a `400` error code is returned, along with a error message saying that this user name does not exist. This enables attackers to retrieve valid usernames. Also, the response of the "Forgot Password" request returns the email address to which the email was sent, if the operation was successful. This information should not be exposed, as it can be used to gather email addresses. This problem was fixed in versions 1.6.35, 2.0.10 and 2.1.1., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 5.3, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: NONE, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2019-15976
|
CVE-2019-15976 in Cisco Data Center Network Manager. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has secondary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1190 : Exploit Public-Facing Application.
|
Describe the vulnerability CVE-2018-10620
|
CVE-2018-10620, State: PUBLISHED, Published: 2018-07-19T19:00:00Z, Updated: 2024-09-16T19:40:31.800Z, Description: AVEVA InduSoft Web Studio v8.1 and v8.1SP1, and InTouch Machine Edition v2017 8.1 and v2017 8.1 SP1 a remote user could send a carefully crafted packet to exploit a stack-based buffer overflow vulnerability during tag, alarm, or event related actions such as read and write, with potential for code to be executed., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-11073
|
CVE-2018-11073, State: PUBLISHED, Published: 2018-09-28T18:00:00Z, Updated: 2024-09-17T01:20:47.843Z, Description: RSA Authentication Manager versions prior to 8.3 P3 contain a stored cross-site scripting vulnerability in the Operations Console. A malicious Operations Console administrator could exploit this vulnerability to store arbitrary HTML or JavaScript code through the web interface. When other Operations Console administrators open the affected page, the injected scripts could potentially be executed in their browser., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: LOW, Base Score: 6.5, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: LOW, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2016-3088
|
CVE-2016-3088 in Apache ActiveMQ 5.x before 5.14.0. Is related with T1505.003 : Web Shell. Is related with T1190 : Exploit Public-Facing Application.
|
Techniques related with vulnerability CVE-2020-15182
|
CVE-2020-15182 in soycms. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1204.001 : Malicious Link.
|
Describe the vulnerability CVE-2018-19320
|
CVE-2018-19320, State: PUBLISHED, Published: 2018-12-21T23:00:00, Updated: 2024-08-05T11:30:04.066Z, Description: The GDrv low-level driver in GIGABYTE APP Center v1.05.21 and earlier, AORUS GRAPHICS ENGINE before 1.57, XTREME GAMING ENGINE before 1.26, and OC GURU II v2.08 exposes ring0 memcpy-like functionality that could allow a local attacker to take complete control of the affected system., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-11045
|
CVE-2018-11045 in Pivotal Operations Manager. Has primary impact with T1078 : Valid Accounts. Has an exploitation technique T1110 : Brute Force.
|
Techniques related with vulnerability CVE-2020-4068
|
CVE-2020-4068 in APNSwift. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1189 : Drive-by Compromise. Has an exploitation technique T1190 : Exploit Public-Facing Application. Has an exploitation technique T1133 : External Remote Services. Has an exploitation technique T1566 : Phishing. Has an exploitation technique T1204.002 : Malicious File. Has an exploitation technique T1091 : Replication Through Removable Media.
|
Describe the vulnerability CVE-2020-3387
|
CVE-2020-3387, State: PUBLISHED, Published: 2020-07-16T17:22:09.474783Z, Updated: 2024-11-13T18:20:00.634Z, Description: A vulnerability in Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to execute code with root privileges on an affected system. The vulnerability is due to insufficient input sanitization during user authentication processing. An attacker could exploit this vulnerability by sending a crafted response to the Cisco SD-WAN vManage Software. A successful exploit could allow the attacker to access the software and execute commands they should not be authorized to execute., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 7.5, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Techniques related with vulnerability CVE-2017-5613
|
CVE-2017-5613 in cgiemail and cgiecho. Is related with T1203 : Exploitation for Client Execution.
|
Describe the vulnerability CVE-2018-11075
|
CVE-2018-11075, State: PUBLISHED, Published: 2018-09-28T18:00:00Z, Updated: 2024-09-17T00:30:53.695Z, Description: RSA Authentication Manager versions prior to 8.3 P3 contain a reflected cross-site scripting vulnerability in a Security Console page. A remote, unauthenticated malicious user, with the knowledge of a target user's anti-CSRF token, could potentially exploit this vulnerability by tricking a victim Security Console user to supply malicious HTML or JavaScript code to the vulnerable web application, which code is then executed by the victim's web browser in the context of the vulnerable web application., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: LOW, Base Score: 5.8, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: NONE, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2018-15800
|
CVE-2018-15800 in Bits Service Release. Has primary impact with T1078 : Valid Accounts. Has an exploitation technique T1110 : Brute Force.
|
Techniques related with vulnerability CVE-2019-1270
|
CVE-2019-1270 in Windows. Has primary impact with T1565 : Data Manipulation. Has primary impact with T1485 : Data Destruction. Has an exploitation technique T1202 : Indirect Command Execution.
|
Techniques related with vulnerability CVE-2018-7513
|
CVE-2018-7513 in Omron CX-Supervisor. Is related with T1203 : Exploitation for Client Execution.
|
Describe the vulnerability CVE-2020-1163
|
CVE-2020-1163, State: PUBLISHED, Published: 2020-06-09T19:43:17, Updated: 2024-08-04T06:25:01.257Z, Description: An elevation of privilege vulnerability exists in Windows Defender that leads arbitrary file deletion on the system.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Microsoft Windows Defender Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1170., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-15800
|
CVE-2018-15800, State: PUBLISHED, Published: 2018-12-10T19:00:00Z, Updated: 2024-09-17T03:34:23.465Z, Description: Cloud Foundry Bits Service, versions prior to 2.18.0, includes an information disclosure vulnerability. A remote malicious user may execute a timing attack to brute-force the signing key, allowing them complete read and write access to the the Bits Service storage., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 8.1, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2017-3066
|
CVE-2017-3066, State: PUBLISHED, Published: 2017-04-27T14:00:00, Updated: 2024-08-05T14:16:27.674Z, Description: Adobe ColdFusion 2016 Update 3 and earlier, ColdFusion 11 update 11 and earlier, ColdFusion 10 Update 22 and earlier have a Java deserialization vulnerability in the Apache BlazeDS library. Successful exploitation could lead to arbitrary code execution., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-15961
|
CVE-2018-15961, State: PUBLISHED, Published: 2018-09-25T13:00:00, Updated: 2024-08-05T10:10:05.600Z, Description: Adobe ColdFusion versions July 12 release (2018.0.0.310739), Update 6 and earlier, and Update 14 and earlier have an unrestricted file upload vulnerability. Successful exploitation could lead to arbitrary code execution., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-1665
|
CVE-2019-1665, State: PUBLISHED, Published: 2019-02-21T19:00:00Z, Updated: 2024-09-16T22:41:18.626Z, Description: A vulnerability in the web-based management interface of Cisco HyperFlex software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a maliciously crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Versions prior to 3.5(1a) are affected., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 4.7, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: NONE, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Describe the vulnerability CVE-2018-8337
|
CVE-2018-8337, State: PUBLISHED, Published: 2018-09-13T00:00:00, Updated: 2024-08-05T06:54:35.921Z, Description: A security feature bypass vulnerability exists when Windows Subsystem for Linux improperly handles case sensitivity, aka "Windows Subsystem for Linux Security Feature Bypass Vulnerability." This affects Windows 10, Windows 10 Servers., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-10602
|
CVE-2020-10602, State: PUBLISHED, Published: 2020-07-24T22:58:44, Updated: 2024-08-04T11:06:10.172Z, Description: In OSIsoft PI System multiple products and versions, an authenticated remote attacker could crash PI Network Manager due to a race condition. This can result in blocking connections and queries to PI Data Archive., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-1956
|
CVE-2018-1956, State: PUBLISHED, Published: 2019-01-14T14:00:00Z, Updated: 2024-09-16T22:30:16.492Z, Description: IBM Security Identity Manager 6.0.0 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 153628., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 5.9, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: NONE, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-8453
|
CVE-2018-8453, State: PUBLISHED, Published: 2018-10-10T13:00:00, Updated: 2024-08-05T06:54:36.664Z, Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-7506
|
CVE-2018-7506, State: PUBLISHED, Published: 2018-04-06T14:00:00Z, Updated: 2024-09-17T02:07:03.368Z, Description: The private key of the web server in Moxa MXview versions 2.8 and prior is able to be read and accessed via an HTTP GET request, which may allow a remote attacker to decrypt encrypted information., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-1631
|
CVE-2020-1631, State: PUBLISHED, Published: 2020-05-04T09:25:12.322775Z, Updated: 2024-09-17T01:45:57.099Z, Description: A vulnerability in the HTTP/HTTPS service used by J-Web, Web Authentication, Dynamic-VPN (DVPN), Firewall Authentication Pass-Through with Web-Redirect, and Zero Touch Provisioning (ZTP) allows an unauthenticated attacker to perform local file inclusion (LFI) or path traversal. Using this vulnerability, an attacker may be able to inject commands into the httpd.log, read files with 'world' readable permission file or obtain J-Web session tokens. In the case of command injection, as the HTTP service runs as user 'nobody', the impact of this command injection is limited. (CVSS score 5.3, vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) In the case of reading files with 'world' readable permission, in Junos OS 19.3R1 and above, the unauthenticated attacker would be able to read the configuration file. (CVSS score 5.9, vector CVSS:3.1/ AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) If J-Web is enabled, the attacker could gain the same level of access of anyone actively logged into J-Web. If an administrator is logged in, the attacker could gain administrator access to J-Web. (CVSS score 8.8, vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) This issue only affects Juniper Networks Junos OS devices with HTTP/HTTPS services enabled. Junos OS devices with HTTP/HTTPS services disabled are not affected. If HTTP/HTTPS services are enabled, the following command will show the httpd processes: user@device> show system processes | match http 5260 - S 0:00.13 /usr/sbin/httpd-gk -N 5797 - I 0:00.10 /usr/sbin/httpd --config /jail/var/etc/httpd.conf To summarize: If HTTP/HTTPS services are disabled, there is no impact from this vulnerability. If HTTP/HTTPS services are enabled and J-Web is not in use, this vulnerability has a CVSS score of 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N). If J-Web is enabled, this vulnerability has a CVSS score of 8.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). Juniper SIRT has received a single report of this vulnerability being exploited in the wild. Out of an abundance of caution, we are notifying customers so they can take appropriate actions. Indicators of Compromise: The /var/log/httpd.log may have indicators that commands have injected or files being accessed. The device administrator can look for these indicators by searching for the string patterns "=*;*&" or "*%3b*&" in /var/log/httpd.log, using the following command: user@device> show log httpd.log | match "=*;*&|=*%3b*&" If this command returns any output, it might be an indication of malicious attempts or simply scanning activities. Rotated logs should also be reviewed, using the following command: user@device> show log httpd.log.0.gz | match "=*;*&|=*%3b*&" user@device> show log httpd.log.1.gz | match "=*;*&|=*%3b*&" Note that a skilled attacker would likely remove these entries from the local log file, thus effectively eliminating any reliable signature that the device had been attacked. This issue affects Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S16; 12.3X48 versions prior to 12.3X48-D101, 12.3X48-D105; 14.1X53 versions prior to 14.1X53-D54; 15.1 versions prior to 15.1R7-S7; 15.1X49 versions prior to 15.1X49-D211, 15.1X49-D220; 16.1 versions prior to 16.1R7-S8; 17.2 versions prior to 17.2R3-S4; 17.3 versions prior to 17.3R3-S8; 17.4 versions prior to 17.4R2-S11, 17.4R3-S2; 18.1 versions prior to 18.1R3-S10; 18.2 versions prior to 18.2R2-S7, 18.2R3-S4; 18.3 versions prior to 18.3R2-S4, 18.3R3-S2; 18.4 versions prior to 18.4R1-S7, 18.4R3-S2 ; 18.4 version 18.4R2 and later versions; 19.1 versions prior to 19.1R1-S5, 19.1R3-S1; 19.1 version 19.1R2 and later versions; 19.2 versions prior to 19.2R2; 19.3 versions prior to 19.3R2-S3, 19.3R3; 19.4 versions prior to 19.4R1-S2, 19.4R2; 20.1 versions prior to 20.1R1-S1, 20.1R2., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.8, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2018-8174
|
CVE-2018-8174, State: PUBLISHED, Published: 2018-05-09T19:00:00, Updated: 2024-08-05T06:46:13.555Z, Description: A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka "Windows VBScript Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2020-3306
|
CVE-2020-3306, State: PUBLISHED, Published: 2020-05-06T16:42:30.062823Z, Updated: 2024-11-15T17:22:34.105Z, Description: A vulnerability in the DHCP module of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device. The vulnerability is due to incorrect processing of certain DHCP packets. An attacker could exploit this vulnerability by sending a crafted DHCP packet to the affected device. A successful exploit could allow the attacker to cause a DoS condition on the affected device., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 6.8, Base Severity: MEDIUM, Confidentiality Impact: NONE, Integrity Impact: NONE, Privileges Required: NONE, Scope: CHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Describe the vulnerability CVE-2013-3660
|
CVE-2013-3660, State: PUBLISHED, Published: 2013-05-24T20:00:00, Updated: 2024-08-06T16:14:56.681Z, Description: The EPATHOBJ::pprFlattenRec function in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, and Windows Server 2012 does not properly initialize a pointer for the next object in a certain list, which allows local users to obtain write access to the PATHRECORD chain, and consequently gain privileges, by triggering excessive consumption of paged memory and then making many FlattenPath function calls, aka "Win32k Read AV Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2010-2729
|
CVE-2010-2729 in Print Spooler service in Microsoft Windows. Is related with T1210 : Exploitation of Remote Services.
|
Describe the vulnerability CVE-2020-3440
|
CVE-2020-3440, State: PUBLISHED, Published: 2020-08-26T16:16:29.673288Z, Updated: 2024-11-13T18:11:22.481Z, Description: A vulnerability in Cisco Webex Meetings Desktop App for Windows could allow an unauthenticated, remote attacker to overwrite arbitrary files on an end-user system. The vulnerability is due to improper validation of URL parameters that are sent from a website to the affected application. An attacker could exploit this vulnerability by persuading a user to follow a URL to a website that is designed to submit crafted input to the affected application. A successful exploit could allow the attacker to overwrite arbitrary files on the affected system, possibly corrupting or deleting critical system files., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 6.5, Base Severity: MEDIUM, Confidentiality Impact: NONE, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Describe the vulnerability CVE-2019-1704
|
CVE-2019-1704, State: PUBLISHED, Published: 2019-05-03T16:00:18.730907Z, Updated: 2024-11-19T19:09:18.873Z, Description: Multiple vulnerabilities in the Server Message Block (SMB) Protocol preprocessor detection engine for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, adjacent or remote attacker to cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 7.5, Base Severity: HIGH, Confidentiality Impact: NONE, Integrity Impact: NONE, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.
|
Techniques related with vulnerability CVE-2020-3120
|
CVE-2020-3120 in Cisco IOS XR Software. Has primary impact with T1499 : Endpoint Denial of Service.
|
Techniques related with vulnerability CVE-2014-4077
|
CVE-2014-4077 in Microsoft Windows Server. Is related with T1553 : Subvert Trust Controls. Is related with T1557 : Man-in-the-Middle. Is related with T1553.002 : Code Signing.
|
Describe the vulnerability CVE-2017-8570
|
CVE-2017-8570, State: PUBLISHED, Published: 2017-07-11T21:00:00Z, Updated: 2024-09-16T22:31:02.359Z, Description: Microsoft Office allows a remote code execution vulnerability due to the way that it handles objects in memory, aka "Microsoft Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0243., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2020-15189
|
CVE-2020-15189 in soycms. Has primary impact with T1505.003 : Web Shell. Has secondary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1133 : External Remote Services.
|
Describe the vulnerability CVE-2018-17911
|
CVE-2018-17911, State: PUBLISHED, Published: 2018-10-17T02:00:00Z, Updated: 2024-09-16T18:34:43.642Z, Description: LAquis SCADA Versions 4.1.0.3870 and prior has several stack-based buffer overflow vulnerabilities, which may allow remote code execution., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2013-1904
|
CVE-2013-1904 in Roundcube Webmail before 0.7.3 and 0.8.x before 0.8.6. Is related with T1190 : Exploit Public-Facing Application. Is related with T1083 : File and Directory Discovery.
|
Techniques related with vulnerability CVE-2018-15376
|
CVE-2018-15376 in Cisco IOS Software. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1566 : Phishing. Has an exploitation technique T1091 : Replication Through Removable Media. Has an exploitation technique T1204.002 : Malicious File.
|
Describe the vulnerability CVE-2010-5326
|
CVE-2010-5326, State: PUBLISHED, Published: 2016-05-13T10:00:00, Updated: 2024-08-07T04:17:10.293Z, Description: The Invoker Servlet on SAP NetWeaver Application Server Java platforms, possibly before 7.3, does not require authentication, which allows remote attackers to execute arbitrary code via an HTTP or HTTPS request, as exploited in the wild in 2013 through 2016, aka a "Detour" attack., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe MITRE technique T0803
|
MITRE T0803 : Block Command Message from ics Adversaries may block a command message from reaching its intended target to prevent command execution. In OT networks, command messages are sent to provide instructions to control system devices. A blocked command message can inhibit response functions from correcting a disruption or unsafe condition. (Citation: Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011) (Citation: Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems March 2016)
|
Describe the vulnerability CVE-2018-8589
|
CVE-2018-8589, State: PUBLISHED, Published: 2018-11-14T01:00:00, Updated: 2024-08-05T07:02:25.739Z, Description: An elevation of privilege vulnerability exists when Windows improperly handles calls to Win32k.sys, aka "Windows Win32k Elevation of Privilege Vulnerability." This affects Windows Server 2008, Windows 7, Windows Server 2008 R2., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2019-1106
|
CVE-2019-1106 in Microsoft Edge. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1189 : Drive-by Compromise. Has an exploitation technique T1203 : Exploitation for Client Execution.
|
Techniques related with vulnerability CVE-2020-4100
|
CVE-2020-4100 in HCL Verse for Android. Is related with T1574 : Hijack Execution Flow.
|
Techniques related with vulnerability CVE-2015-0071
|
CVE-2015-0071 in Internet Explorer 9 through 11. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.001 : Malicious Link.
|
Techniques related with vulnerability CVE-2020-11055
|
CVE-2020-11055 in BookStack. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1185 : Man in the Browser.
|
Techniques related with vulnerability CVE-2008-4996
|
CVE-2008-4996 in init in initramfs-tools 0.92f. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1565.001 : Stored Data Manipulation.
|
Techniques related with vulnerability CVE-2019-1879
|
CVE-2019-1879 in Cisco Unified Computing System (Management Software). Has primary impact with T1068 : Exploitation for Privilege Escalation. Has secondary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1078 : Valid Accounts.
|
Describe the vulnerability CVE-2015-6475
|
CVE-2015-6475, State: PUBLISHED, Published: 2015-09-25T01:00:00, Updated: 2024-08-06T07:22:21.678Z, Description: Multiple cross-site scripting (XSS) vulnerabilities in IBC Solar ServeMaster TLP+ and Danfoss TLX Pro+ allow remote attackers to inject arbitrary web script or HTML via unspecified vectors., No CVSS metrics available, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2017-16115
|
CVE-2017-16115 in timespan node module. Is related with T1499.003 : Application Exhaustion Flood.
|
Techniques related with vulnerability CVE-2020-5264
|
CVE-2020-5264 in PrestaShop. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link.
|
Techniques related with vulnerability CVE-2019-18573
|
CVE-2019-18573 in RSA Identity Governance & Lifecycle. Has primary impact with T1563 : Remote Service Session Hijacking.
|
Techniques related with vulnerability CVE-2019-1886
|
CVE-2019-1886 in Cisco Web Security Appliance (WSA). Has primary impact with T1489 : Service Stop.
|
Describe the vulnerability CVE-2019-1915
|
CVE-2019-1915, State: PUBLISHED, Published: 2019-10-02T19:06:56.094776Z, Updated: 2024-09-16T22:40:27.611Z, Description: A vulnerability in the web-based interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition (SME), Cisco Unified Communications Manager IM and Presence (Unified CM IM&P) Service, and Cisco Unity Connection could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections by the affected software. An attacker could exploit this vulnerability by persuading a targeted user to click a malicious link. A successful exploit could allow the attacker to send arbitrary requests that could change the password of a targeted user. An attacker could then take unauthorized actions on behalf of the targeted user., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 6.5, Base Severity: MEDIUM, Confidentiality Impact: NONE, Integrity Impact: HIGH, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
|
Describe the vulnerability CVE-2017-0213
|
CVE-2017-0213, State: PUBLISHED, Published: 2017-05-12T14:00:00, Updated: 2024-08-05T12:55:19.290Z, Description: Windows COM Aggregate Marshaler in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation privilege vulnerability when an attacker runs a specially crafted application, aka "Windows COM Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-0214., No CVSS metrics available, Exploit Info: No exploit information available
|
Describe the vulnerability CVE-2019-16760
|
CVE-2019-16760, State: PUBLISHED, Published: 2019-09-30T21:39:38, Updated: 2024-08-05T01:24:48.330Z, Description: Cargo prior to Rust 1.26.0 may download the wrong dependency if your package.toml file uses the `package` configuration key. Usage of the `package` key to rename dependencies in `Cargo.toml` is ignored in Rust 1.25.0 and prior. When Rust 1.25.0 and prior is used Cargo may download the wrong dependency, which could be squatted on crates.io to be a malicious package. This not only affects manifests that you write locally yourself, but also manifests published to crates.io. Rust 1.0.0 through Rust 1.25.0 is affected by this advisory because Cargo will ignore the `package` key in manifests. Rust 1.26.0 through Rust 1.30.0 are not affected and typically will emit an error because the `package` key is unstable. Rust 1.31.0 and after are not affected because Cargo understands the `package` key. Users of the affected versions are strongly encouraged to update their compiler to the latest available one. Preventing this issue from happening requires updating your compiler to be either Rust 1.26.0 or newer. There will be no point release for Rust versions prior to 1.26.0. Users of Rust 1.19.0 to Rust 1.25.0 can instead apply linked patches to mitigate the issue., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: LOW, Base Score: 4.6, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available
|
Techniques related with vulnerability CVE-2012-2311
|
CVE-2012-2311 in PHP before 5.3.13 and 5.4.x before 5.4.3. Is related with T1203 : Exploitation for Client Execution.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.