input
stringlengths
30
54
output
stringlengths
69
4.21k
Describe the vulnerability CVE-2015-1805
CVE-2015-1805, State: PUBLISHED, Published: 2015-08-08T10:00:00, Updated: 2024-08-06T04:54:16.310Z, Description: The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic cal...
Describe MITRE technique T1212
MITRE T1212 : Exploitation for Credential Access from enterprise Adversaries may exploit software vulnerabilities in an attempt to collect credentials. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software ...
Describe the vulnerability CVE-2008-3431
CVE-2008-3431, State: PUBLISHED, Published: 2008-08-05T19:20:00, Updated: 2024-08-07T09:37:26.905Z, Description: The VBoxDrvNtDeviceControl function in VBoxDrv.sys in Sun xVM VirtualBox before 1.6.4 uses the METHOD_NEITHER communication method for IOCTLs and does not properly validate a buffer associated with the Irp o...
Describe the vulnerability CVE-2020-11050
CVE-2020-11050, State: PUBLISHED, Published: 2020-05-07T20:15:12, Updated: 2024-08-04T11:21:14.437Z, Description: In Java-WebSocket less than or equal to 1.4.1, there is an Improper Validation of Certificate with Host Mismatch where WebSocketClient does not perform SSL hostname validation. This has been patched in 1.5....
Describe the vulnerability CVE-2020-15094
CVE-2020-15094, State: PUBLISHED, Published: 2020-09-02T17:35:15, Updated: 2024-08-04T13:08:22.072Z, Description: In Symfony before versions 4.4.13 and 5.1.5, the CachingHttpClient class from the HttpClient Symfony component relies on the HttpCache class to handle requests. HttpCache uses internal headers like X-Body-E...
Describe the vulnerability CVE-2018-14819
CVE-2018-14819, State: PUBLISHED, Published: 2018-09-26T20:00:00Z, Updated: 2024-09-16T16:47:54.538Z, Description: Fuji Electric V-Server 4.0.3.0 and prior, An out-of-bounds read vulnerability has been identified, which may allow remote code execution., No CVSS metrics available, Exploit Info: No exploit information av...
Techniques related with vulnerability CVE-2020-5379
CVE-2020-5379 in CPG BIOS. Has primary impact with T1542.001 : System Firmware.
Techniques related with vulnerability CVE-2010-5326
CVE-2010-5326 in SAP NetWeaver Application Server Java platforms, possibly before 7.3. Is related with T1190 : Exploit Public-Facing Application. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2020-0601
CVE-2020-0601, State: PUBLISHED, Published: 2020-01-14T23:11:20, Updated: 2024-08-04T06:11:04.613Z, Description: A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing...
Techniques related with vulnerability CVE-2017-15211
CVE-2017-15211 in Kanboard before 1.0.47. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1566 : Phishing.
Techniques related with vulnerability CVE-2019-12660
CVE-2019-12660 in Cisco IOS XE Software 3.2.11aSG. Has primary impact with T1574 : Hijack Execution Flow. Has secondary impact with T1562 : Impair Defenses. Has an exploitation technique T1078 : Valid Accounts.
Describe the vulnerability CVE-2014-6293
CVE-2014-6293, State: PUBLISHED, Published: 2014-10-03T14:00:00, Updated: 2024-08-06T12:10:13.348Z, Description: SQL injection vulnerability in the Statistics (ke_stats) extension before 1.1.2 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, as exploited in the wild in Februa...
Techniques related with vulnerability CVE-2014-0751
CVE-2014-0751 in GE Intelligent Platforms Proficy HMI/SCADA. Is related with T1210 : Exploitation of Remote Services. Is related with T1190 : Exploit Public-Facing Application. Is related with T1211 : Exploitation for Defense Evasion. Is related with T1005 : Data from Local System. Is related with T1212 : Exploitation ...
Describe the vulnerability CVE-2020-5269
CVE-2020-5269, State: PUBLISHED, Published: 2020-04-20T16:45:20, Updated: 2024-08-04T08:22:09.082Z, Description: In PrestaShop between versions 1.7.6.1 and 1.7.6.5, there is a reflected XSS on AdminFeatures page by using the `id_feature` parameter. The problem is fixed in 1.7.6.5, CVSS v3.1 - Attack Complexity: LOW, At...
Describe the vulnerability CVE-2014-0324
CVE-2014-0324, State: PUBLISHED, Published: 2014-03-12T01:00:00, Updated: 2024-08-06T09:13:09.733Z, Description: Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vu...
Describe the vulnerability CVE-2014-1809
CVE-2014-1809, State: PUBLISHED, Published: 2014-05-14T10:00:00, Updated: 2024-08-06T09:50:11.352Z, Description: The MSCOMCTL library in Microsoft Office 2007 SP3, 2010 SP1 and SP2, and 2013 Gold, SP1, RT, and RT SP1 makes it easier for remote attackers to bypass the ASLR protection mechanism via a crafted web site, as...
Techniques related with vulnerability CVE-2017-14323
CVE-2017-14323 in Onethink V1.0 and V1.1. Is related with T1210 : Exploitation of Remote Services. Is related with T1046 : Network Service Scanning. Is related with T1059 : Command and Scripting Interpreter.
Describe MITRE technique T1203
MITRE T1203 : Exploitation for Client Execution from enterprise Adversaries may exploit software vulnerabilities in client applications to execute code. Vulnerabilities can exist in software due to unsecure coding practices that can lead to unanticipated behavior. Adversaries can take advantage of certain vulnerabiliti...
Describe the vulnerability CVE-2020-15179
CVE-2020-15179, State: PUBLISHED, Published: 2020-09-15T18:10:13, Updated: 2024-08-04T13:08:22.438Z, Description: The ScratchSig extension for MediaWiki before version 1.0.1 allows stored Cross-Site Scripting. Using <script> tag inside <scratchsig> tag, attackers with edit permission can execute scripts on visitors' br...
Techniques related with vulnerability CVE-2014-1807
CVE-2014-1807 in Windows Shell. Is related with T1068 : Exploitation for Privilege Escalation.
Describe the vulnerability CVE-2009-1807
CVE-2009-1807, State: PUBLISHED, Published: 2009-05-28T20:14:00, Updated: 2024-08-07T05:27:54.345Z, Description: Unspecified vulnerability in Config.dll in Baofeng products 3.09.04.17 and earlier allows remote attackers to execute arbitrary code by calling the SetAttributeValue method, as exploited in the wild in April...
Techniques related with vulnerability CVE-2010-1592
CVE-2010-1592 in Sandra Device Driver in SiSoftware Sandra 16.10.2010.1 and earlier. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1574.002 : DLL Side-Loading.
Techniques related with vulnerability CVE-2020-1631
CVE-2020-1631 in Junos OS. Is related with T1203 : Exploitation for Client Execution.
Techniques related with vulnerability CVE-2020-3309
CVE-2020-3309 in Cisco Firepower Threat Defense Software. Has primary impact with T1574 : Hijack Execution Flow. Has secondary impact with T1565.001 : Stored Data Manipulation. Has an exploitation technique T1190 : Exploit Public-Facing Application. Has an exploitation technique T1133 : External Remote Services.
Describe MITRE technique T1456
MITRE T1456 : Drive-By Compromise from mobile Adversaries may gain access to a system through a user visiting a website over the normal course of browsing. With this technique, the user's web browser is typically targeted for exploitation, but adversaries may also use compromised websites for non-exploitation behavior...
Techniques related with vulnerability CVE-2019-1764
CVE-2019-1764 in Cisco Wireless IP Phone 8821 and 8821-EX. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1204.001 : Malicious Link.
Techniques related with vulnerability CVE-2019-3707
CVE-2019-3707 in iDRAC. Has primary impact with T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2018-15776
CVE-2018-15776, State: PUBLISHED, Published: 2018-12-13T22:00:00Z, Updated: 2024-09-16T22:56:03.854Z, Description: Dell EMC iDRAC7/iDRAC8 versions prior to 2.61.60.60 contain an improper error handling vulnerability. An unauthenticated attacker with physical access to the system could potentially exploit this vulnerabi...
Describe the vulnerability CVE-2019-15959
CVE-2019-15959, State: PUBLISHED, Published: 2020-09-23T00:27:21.957568Z, Updated: 2024-11-13T18:02:58.052Z, Description: A vulnerability in Cisco Small Business SPA500 Series IP Phones could allow a physically proximate attacker to execute arbitrary commands on the device. The vulnerability is due to the presence of d...
Describe the vulnerability CVE-2012-6685
CVE-2012-6685, State: PUBLISHED, Published: 2020-02-19T14:41:27, Updated: 2024-08-06T21:36:01.934Z, Description: Nokogiri before 1.5.4 is vulnerable to XXE attacks, No CVSS metrics available, Exploit Info: No exploit information available
Describe the vulnerability CVE-2019-1746
CVE-2019-1746, State: PUBLISHED, Published: 2019-03-27T23:45:13.618675Z, Updated: 2024-09-16T16:37:43.942Z, Description: A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of servi...
Techniques related with vulnerability CVE-2019-15280
CVE-2019-15280 in Cisco Firepower Management Center. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1189 : Drive-by Compromise.
Techniques related with vulnerability CVE-2019-13555
CVE-2019-13555 in Mitsubishi Electric MELSEC-Q Series. Has primary impact with T1499 : Endpoint Denial of Service. Has secondary impact with T0826 : Loss of Availability.
Techniques related with vulnerability CVE-2019-18872
CVE-2019-18872 in Blaauw Remote Kiln Control through v3.00r4. Is related with T1110.001 : Password Guessing.
Describe the vulnerability CVE-2018-20062
CVE-2018-20062, State: PUBLISHED, Published: 2018-12-11T18:00:00, Updated: 2024-08-05T11:51:18.951Z, Description: An issue was discovered in NoneCms V1.3. thinkphp/library/think/App.php allows remote attackers to execute arbitrary PHP code via crafted use of the filter parameter, as demonstrated by the s=index/\think\R...
Describe MITRE technique T1497
MITRE T1497 : Virtualization/Sandbox Evasion from enterprise Adversaries may employ various means to detect and avoid virtualization and analysis environments. This may include changing behaviors based on the results of checks for the presence of artifacts indicative of a virtual machine environment (VME) or sandbox. I...
Techniques related with vulnerability CVE-2020-3121
CVE-2020-3121 in Cisco 550X Series Stackable Managed Switches. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link.
Describe the vulnerability CVE-2020-5340
CVE-2020-5340, State: PUBLISHED, Published: 2020-03-25T21:05:15.109747Z, Updated: 2024-09-17T03:43:40.798Z, Description: RSA Authentication Manager versions prior to 8.4 P10 contain a stored cross-site scripting vulnerability in the Security Console. A malicious RSA Authentication Manager Security Console administrator...
Describe the vulnerability CVE-2018-11045
CVE-2018-11045, State: PUBLISHED, Published: 2018-07-11T20:00:00Z, Updated: 2024-09-16T22:56:33.333Z, Description: Pivotal Operations Manager, versions 2.1 prior to 2.1.6 and 2.0 prior to 2.0.15 and 1.12 prior to 1.12.22, contains a static Linux Random Number Generator (LRNG) seed file embedded in the appliance image. ...
Techniques related with vulnerability CVE-2019-1768
CVE-2019-1768 in Cisco NX-OS Software. Has primary impact with T1608 : Stage Capabilities. Has secondary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1078 : Valid Accounts.
Techniques related with vulnerability CVE-2018-7506
CVE-2018-7506 in Moxa MXview. Is related with T1133 : External Remote Services. Is related with T1552.004 : Private Keys.
Describe MITRE technique T1136
MITRE T1136 : Create Account from enterprise Adversaries may create an account to maintain access to victim systems.(Citation: Symantec WastedLocker June 2020) With a sufficient level of access, creating such accounts may be used to establish secondary credentialed access that do not require persistent remote access to...
Techniques related with vulnerability CVE-2013-0640
CVE-2013-0640 in Acrobat 9.x before 9.5.4, 10.x before 10.1.6, and 11.x before 11.0.02. Is related with T1190 : Exploit Public-Facing Application. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1078 : Valid Accounts.
Describe the vulnerability CVE-2020-15132
CVE-2020-15132, State: PUBLISHED, Published: 2020-08-05T20:30:13, Updated: 2024-08-04T13:08:22.435Z, Description: In Sulu before versions 1.6.35, 2.0.10, and 2.1.1, when the "Forget password" feature on the login screen is used, Sulu asks the user for a username or email address. If the given string is not found, a res...
Techniques related with vulnerability CVE-2019-15976
CVE-2019-15976 in Cisco Data Center Network Manager. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has secondary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2018-10620
CVE-2018-10620, State: PUBLISHED, Published: 2018-07-19T19:00:00Z, Updated: 2024-09-16T19:40:31.800Z, Description: AVEVA InduSoft Web Studio v8.1 and v8.1SP1, and InTouch Machine Edition v2017 8.1 and v2017 8.1 SP1 a remote user could send a carefully crafted packet to exploit a stack-based buffer overflow vulnerabilit...
Describe the vulnerability CVE-2018-11073
CVE-2018-11073, State: PUBLISHED, Published: 2018-09-28T18:00:00Z, Updated: 2024-09-17T01:20:47.843Z, Description: RSA Authentication Manager versions prior to 8.3 P3 contain a stored cross-site scripting vulnerability in the Operations Console. A malicious Operations Console administrator could exploit this vulnerabil...
Techniques related with vulnerability CVE-2016-3088
CVE-2016-3088 in Apache ActiveMQ 5.x before 5.14.0. Is related with T1505.003 : Web Shell. Is related with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2020-15182
CVE-2020-15182 in soycms. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1204.001 : Malicious Link.
Describe the vulnerability CVE-2018-19320
CVE-2018-19320, State: PUBLISHED, Published: 2018-12-21T23:00:00, Updated: 2024-08-05T11:30:04.066Z, Description: The GDrv low-level driver in GIGABYTE APP Center v1.05.21 and earlier, AORUS GRAPHICS ENGINE before 1.57, XTREME GAMING ENGINE before 1.26, and OC GURU II v2.08 exposes ring0 memcpy-like functionality that ...
Techniques related with vulnerability CVE-2018-11045
CVE-2018-11045 in Pivotal Operations Manager. Has primary impact with T1078 : Valid Accounts. Has an exploitation technique T1110 : Brute Force.
Techniques related with vulnerability CVE-2020-4068
CVE-2020-4068 in APNSwift. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1189 : Drive-by Compromise. Has an exploitation technique T1190 : Exploit Public-Facing Application. Has an exploitation technique T113...
Describe the vulnerability CVE-2020-3387
CVE-2020-3387, State: PUBLISHED, Published: 2020-07-16T17:22:09.474783Z, Updated: 2024-11-13T18:20:00.634Z, Description: A vulnerability in Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to execute code with root privileges on an affected system. The vulnerability is due to insufficient inp...
Techniques related with vulnerability CVE-2017-5613
CVE-2017-5613 in cgiemail and cgiecho. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2018-11075
CVE-2018-11075, State: PUBLISHED, Published: 2018-09-28T18:00:00Z, Updated: 2024-09-17T00:30:53.695Z, Description: RSA Authentication Manager versions prior to 8.3 P3 contain a reflected cross-site scripting vulnerability in a Security Console page. A remote, unauthenticated malicious user, with the knowledge of a targ...
Techniques related with vulnerability CVE-2018-15800
CVE-2018-15800 in Bits Service Release. Has primary impact with T1078 : Valid Accounts. Has an exploitation technique T1110 : Brute Force.
Techniques related with vulnerability CVE-2019-1270
CVE-2019-1270 in Windows. Has primary impact with T1565 : Data Manipulation. Has primary impact with T1485 : Data Destruction. Has an exploitation technique T1202 : Indirect Command Execution.
Techniques related with vulnerability CVE-2018-7513
CVE-2018-7513 in Omron CX-Supervisor. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2020-1163
CVE-2020-1163, State: PUBLISHED, Published: 2020-06-09T19:43:17, Updated: 2024-08-04T06:25:01.257Z, Description: An elevation of privilege vulnerability exists in Windows Defender that leads arbitrary file deletion on the system.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Mi...
Describe the vulnerability CVE-2018-15800
CVE-2018-15800, State: PUBLISHED, Published: 2018-12-10T19:00:00Z, Updated: 2024-09-17T03:34:23.465Z, Description: Cloud Foundry Bits Service, versions prior to 2.18.0, includes an information disclosure vulnerability. A remote malicious user may execute a timing attack to brute-force the signing key, allowing them com...
Describe the vulnerability CVE-2017-3066
CVE-2017-3066, State: PUBLISHED, Published: 2017-04-27T14:00:00, Updated: 2024-08-05T14:16:27.674Z, Description: Adobe ColdFusion 2016 Update 3 and earlier, ColdFusion 11 update 11 and earlier, ColdFusion 10 Update 22 and earlier have a Java deserialization vulnerability in the Apache BlazeDS library. Successful exploi...
Describe the vulnerability CVE-2018-15961
CVE-2018-15961, State: PUBLISHED, Published: 2018-09-25T13:00:00, Updated: 2024-08-05T10:10:05.600Z, Description: Adobe ColdFusion versions July 12 release (2018.0.0.310739), Update 6 and earlier, and Update 14 and earlier have an unrestricted file upload vulnerability. Successful exploitation could lead to arbitrary c...
Describe the vulnerability CVE-2019-1665
CVE-2019-1665, State: PUBLISHED, Published: 2019-02-21T19:00:00Z, Updated: 2024-09-16T22:41:18.626Z, Description: A vulnerability in the web-based management interface of Cisco HyperFlex software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-bas...
Describe the vulnerability CVE-2018-8337
CVE-2018-8337, State: PUBLISHED, Published: 2018-09-13T00:00:00, Updated: 2024-08-05T06:54:35.921Z, Description: A security feature bypass vulnerability exists when Windows Subsystem for Linux improperly handles case sensitivity, aka "Windows Subsystem for Linux Security Feature Bypass Vulnerability." This affects Wind...
Describe the vulnerability CVE-2020-10602
CVE-2020-10602, State: PUBLISHED, Published: 2020-07-24T22:58:44, Updated: 2024-08-04T11:06:10.172Z, Description: In OSIsoft PI System multiple products and versions, an authenticated remote attacker could crash PI Network Manager due to a race condition. This can result in blocking connections and queries to PI Data A...
Describe the vulnerability CVE-2018-1956
CVE-2018-1956, State: PUBLISHED, Published: 2019-01-14T14:00:00Z, Updated: 2024-09-16T22:30:16.492Z, Description: IBM Security Identity Manager 6.0.0 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 153628., CVSS v3.0 -...
Describe the vulnerability CVE-2018-8453
CVE-2018-8453, State: PUBLISHED, Published: 2018-10-10T13:00:00, Updated: 2024-08-05T06:54:36.664Z, Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 7, Wind...
Describe the vulnerability CVE-2018-7506
CVE-2018-7506, State: PUBLISHED, Published: 2018-04-06T14:00:00Z, Updated: 2024-09-17T02:07:03.368Z, Description: The private key of the web server in Moxa MXview versions 2.8 and prior is able to be read and accessed via an HTTP GET request, which may allow a remote attacker to decrypt encrypted information., No CVSS ...
Describe the vulnerability CVE-2020-1631
CVE-2020-1631, State: PUBLISHED, Published: 2020-05-04T09:25:12.322775Z, Updated: 2024-09-17T01:45:57.099Z, Description: A vulnerability in the HTTP/HTTPS service used by J-Web, Web Authentication, Dynamic-VPN (DVPN), Firewall Authentication Pass-Through with Web-Redirect, and Zero Touch Provisioning (ZTP) allows an un...
Describe the vulnerability CVE-2018-8174
CVE-2018-8174, State: PUBLISHED, Published: 2018-05-09T19:00:00, Updated: 2024-08-05T06:46:13.555Z, Description: A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka "Windows VBScript Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows ...
Describe the vulnerability CVE-2020-3306
CVE-2020-3306, State: PUBLISHED, Published: 2020-05-06T16:42:30.062823Z, Updated: 2024-11-15T17:22:34.105Z, Description: A vulnerability in the DHCP module of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a den...
Describe the vulnerability CVE-2013-3660
CVE-2013-3660, State: PUBLISHED, Published: 2013-05-24T20:00:00, Updated: 2024-08-06T16:14:56.681Z, Description: The EPATHOBJ::pprFlattenRec function in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP...
Techniques related with vulnerability CVE-2010-2729
CVE-2010-2729 in Print Spooler service in Microsoft Windows. Is related with T1210 : Exploitation of Remote Services.
Describe the vulnerability CVE-2020-3440
CVE-2020-3440, State: PUBLISHED, Published: 2020-08-26T16:16:29.673288Z, Updated: 2024-11-13T18:11:22.481Z, Description: A vulnerability in Cisco Webex Meetings Desktop App for Windows could allow an unauthenticated, remote attacker to overwrite arbitrary files on an end-user system. The vulnerability is due to imprope...
Describe the vulnerability CVE-2019-1704
CVE-2019-1704, State: PUBLISHED, Published: 2019-05-03T16:00:18.730907Z, Updated: 2024-11-19T19:09:18.873Z, Description: Multiple vulnerabilities in the Server Message Block (SMB) Protocol preprocessor detection engine for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, adjacent or remote ...
Techniques related with vulnerability CVE-2020-3120
CVE-2020-3120 in Cisco IOS XR Software. Has primary impact with T1499 : Endpoint Denial of Service.
Techniques related with vulnerability CVE-2014-4077
CVE-2014-4077 in Microsoft Windows Server. Is related with T1553 : Subvert Trust Controls. Is related with T1557 : Man-in-the-Middle. Is related with T1553.002 : Code Signing.
Describe the vulnerability CVE-2017-8570
CVE-2017-8570, State: PUBLISHED, Published: 2017-07-11T21:00:00Z, Updated: 2024-09-16T22:31:02.359Z, Description: Microsoft Office allows a remote code execution vulnerability due to the way that it handles objects in memory, aka "Microsoft Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-201...
Techniques related with vulnerability CVE-2020-15189
CVE-2020-15189 in soycms. Has primary impact with T1505.003 : Web Shell. Has secondary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1133 : External Remote Services.
Describe the vulnerability CVE-2018-17911
CVE-2018-17911, State: PUBLISHED, Published: 2018-10-17T02:00:00Z, Updated: 2024-09-16T18:34:43.642Z, Description: LAquis SCADA Versions 4.1.0.3870 and prior has several stack-based buffer overflow vulnerabilities, which may allow remote code execution., No CVSS metrics available, Exploit Info: No exploit information a...
Techniques related with vulnerability CVE-2013-1904
CVE-2013-1904 in Roundcube Webmail before 0.7.3 and 0.8.x before 0.8.6. Is related with T1190 : Exploit Public-Facing Application. Is related with T1083 : File and Directory Discovery.
Techniques related with vulnerability CVE-2018-15376
CVE-2018-15376 in Cisco IOS Software. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1566 : Phishing. Has an exploitation technique T1091 : Replication Through Removable Media. Has an exploitation technique T1...
Describe the vulnerability CVE-2010-5326
CVE-2010-5326, State: PUBLISHED, Published: 2016-05-13T10:00:00, Updated: 2024-08-07T04:17:10.293Z, Description: The Invoker Servlet on SAP NetWeaver Application Server Java platforms, possibly before 7.3, does not require authentication, which allows remote attackers to execute arbitrary code via an HTTP or HTTPS requ...
Describe MITRE technique T0803
MITRE T0803 : Block Command Message from ics Adversaries may block a command message from reaching its intended target to prevent command execution. In OT networks, command messages are sent to provide instructions to control system devices. A blocked command message can inhibit response functions from correcting a d...
Describe the vulnerability CVE-2018-8589
CVE-2018-8589, State: PUBLISHED, Published: 2018-11-14T01:00:00, Updated: 2024-08-05T07:02:25.739Z, Description: An elevation of privilege vulnerability exists when Windows improperly handles calls to Win32k.sys, aka "Windows Win32k Elevation of Privilege Vulnerability." This affects Windows Server 2008, Windows 7, Win...
Techniques related with vulnerability CVE-2019-1106
CVE-2019-1106 in Microsoft Edge. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1189 : Drive-by Compromise. Has an exploitation technique T1203 : Exploitation for Client Execution.
Techniques related with vulnerability CVE-2020-4100
CVE-2020-4100 in HCL Verse for Android. Is related with T1574 : Hijack Execution Flow.
Techniques related with vulnerability CVE-2015-0071
CVE-2015-0071 in Internet Explorer 9 through 11. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.001 : Malicious Link.
Techniques related with vulnerability CVE-2020-11055
CVE-2020-11055 in BookStack. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1185 : Man in the Browser.
Techniques related with vulnerability CVE-2008-4996
CVE-2008-4996 in init in initramfs-tools 0.92f. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1565.001 : Stored Data Manipulation.
Techniques related with vulnerability CVE-2019-1879
CVE-2019-1879 in Cisco Unified Computing System (Management Software). Has primary impact with T1068 : Exploitation for Privilege Escalation. Has secondary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1078 : Valid Accounts.
Describe the vulnerability CVE-2015-6475
CVE-2015-6475, State: PUBLISHED, Published: 2015-09-25T01:00:00, Updated: 2024-08-06T07:22:21.678Z, Description: Multiple cross-site scripting (XSS) vulnerabilities in IBC Solar ServeMaster TLP+ and Danfoss TLX Pro+ allow remote attackers to inject arbitrary web script or HTML via unspecified vectors., No CVSS metrics ...
Techniques related with vulnerability CVE-2017-16115
CVE-2017-16115 in timespan node module. Is related with T1499.003 : Application Exhaustion Flood.
Techniques related with vulnerability CVE-2020-5264
CVE-2020-5264 in PrestaShop. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link.
Techniques related with vulnerability CVE-2019-18573
CVE-2019-18573 in RSA Identity Governance & Lifecycle. Has primary impact with T1563 : Remote Service Session Hijacking.
Techniques related with vulnerability CVE-2019-1886
CVE-2019-1886 in Cisco Web Security Appliance (WSA). Has primary impact with T1489 : Service Stop.
Describe the vulnerability CVE-2019-1915
CVE-2019-1915, State: PUBLISHED, Published: 2019-10-02T19:06:56.094776Z, Updated: 2024-09-16T22:40:27.611Z, Description: A vulnerability in the web-based interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition (SME), Cisco Unified Communications Manager IM and ...
Describe the vulnerability CVE-2017-0213
CVE-2017-0213, State: PUBLISHED, Published: 2017-05-12T14:00:00, Updated: 2024-08-05T12:55:19.290Z, Description: Windows COM Aggregate Marshaler in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Window...
Describe the vulnerability CVE-2019-16760
CVE-2019-16760, State: PUBLISHED, Published: 2019-09-30T21:39:38, Updated: 2024-08-05T01:24:48.330Z, Description: Cargo prior to Rust 1.26.0 may download the wrong dependency if your package.toml file uses the `package` configuration key. Usage of the `package` key to rename dependencies in `Cargo.toml` is ignored in R...
Techniques related with vulnerability CVE-2012-2311
CVE-2012-2311 in PHP before 5.3.13 and 5.4.x before 5.4.3. Is related with T1203 : Exploitation for Client Execution.