input
stringlengths 30
54
| output
stringlengths 69
4.21k
|
---|---|
Describe the vulnerability CVE-2009-1671 | CVE-2009-1671, State: PUBLISHED, Published: 2009-05-18T18:00:00, Updated: 2024-08-07T05:20:35.056Z, Description: Multiple buffer overflows in the Deployment Toolkit ActiveX control in deploytk.dll 6.0.130.3 in Sun Java SE Runtime Environment (aka JRE) 6 Update 13 allow remote attackers to execute arbitrary code via a long string argument to the (1) setInstallerType, (2) setAdditionalPackages, (3) compareVersion, (4) getStaticCLSID, or (5) launch method., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2009-3041 | CVE-2009-3041 in SPIP 1.9 before 1.9.2i and 2.0.x through 2.0.8. Is related with T1190 : Exploit Public-Facing Application. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2017-5613 | CVE-2017-5613, State: PUBLISHED, Published: 2017-03-03T15:00:00, Updated: 2024-08-05T15:04:15.489Z, Description: Format string vulnerability in cgiemail and cgiecho allows remote attackers to execute arbitrary code via format string specifiers in a template file., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2013-4335 | CVE-2013-4335 in opOpenSocialPlugin. Is related with T1190 : Exploit Public-Facing Application. Is related with T1005 : Data from Local System. Is related with T1565 : Data Manipulation. Is related with T1499.004 : Application or System Exploitation. |
Describe MITRE technique T0816 | MITRE T0816 : Device Restart/Shutdown from ics Adversaries may forcibly restart or shutdown a device in an ICS environment to disrupt and potentially negatively impact physical processes. Methods of device restart and shutdown exist in some devices as built-in, standard functionalities. These functionalities can be executed using interactive device web interfaces, CLIs, and network protocol commands.
Unexpected restart or shutdown of control system devices may prevent expected response functions happening during critical states.
A device restart can also be a sign of malicious device modifications, as many updates require a shutdown in order to take effect. |
Techniques related with vulnerability CVE-2014-1815 | CVE-2014-1815 in Internet Explorer 6 through 11. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise. |
Describe MITRE technique T1005 | MITRE T1005 : Data from Local System from enterprise Adversaries may search local system sources, such as file systems and configuration files or local databases, to find files of interest and sensitive data prior to Exfiltration.
Adversaries may do this using a [Command and Scripting Interpreter](T1059), such as [cmd](S0106) as well as a [Network Device CLI](T1059.008), which have functionality to interact with the file system to gather information.(Citation: show_run_config_cmd_cisco) Adversaries may also use [Automated Collection](T1119) on the local system.
|
Describe the vulnerability CVE-2020-5345 | CVE-2020-5345, State: PUBLISHED, Published: 2020-06-23T20:00:17.264990Z, Updated: 2024-09-17T01:51:14.465Z, Description: Dell EMC Unisphere for PowerMax versions prior to 9.1.0.17, Dell EMC Unisphere for PowerMax Virtual Appliance versions prior to 9.1.0.17, and PowerMax OS Release 5978 contain an authorization bypass vulnerability. An authenticated malicious user may potentially execute commands to alter or stop database statistics., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: LOW, Base Score: 6.4, Base Severity: MEDIUM, Confidentiality Impact: NONE, Integrity Impact: LOW, Privileges Required: LOW, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2015-2425 | CVE-2015-2425 in Internet Explorer 11. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2012-0158 | CVE-2012-0158 in Common Controls in Microsoft Office. Is related with T1189 : Drive-by Compromise. Is related with T1059 : Command and Scripting Interpreter. Is related with T1546 : Event Triggered Execution. Is related with T1554 : Compromise Client Software Binary. Is related with T1491 : Defacement. Is related with T1565 : Data Manipulation. Is related with T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2012-2539 | CVE-2012-2539, State: PUBLISHED, Published: 2012-12-12T00:00:00, Updated: 2024-08-06T19:34:25.771Z, Description: Microsoft Word 2003 SP3, 2007 SP2 and SP3, and 2010 SP1; Word Viewer; Office Compatibility Pack SP2 and SP3; and Office Web Apps 2010 SP1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted RTF data, aka "Word RTF 'listoverridecount' Remote Code Execution Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2020-3403 | CVE-2020-3403, State: PUBLISHED, Published: 2020-09-24T18:02:13.753969Z, Updated: 2024-11-13T17:54:50.702Z, Description: A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker to inject a command to the underlying operating system that will execute with root privileges upon the next reboot of the device. The authenticated user must have privileged EXEC permissions on the device. The vulnerability is due to insufficient protection of values passed to a script that executes during device startup. An attacker could exploit this vulnerability by writing values to a specific file. A successful exploit could allow the attacker to execute commands with root privileges each time the affected device is restarted., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: HIGH, Base Score: 6.7, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: HIGH, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. |
Techniques related with vulnerability CVE-2020-2883 | CVE-2020-2883 in WebLogic Server. Is related with T1203 : Exploitation for Client Execution. Is related with T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2019-2725 | CVE-2019-2725 in Tape Library ACSLS. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059 : Command and Scripting Interpreter. |
Techniques related with vulnerability CVE-2018-7496 | CVE-2018-7496 in OSIsoft PI Vision. Is related with T1190 : Exploit Public-Facing Application. Is related with T1211 : Exploitation for Defense Evasion. |
Describe MITRE technique T1078 | MITRE T1078 : Valid Accounts from enterprise Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Compromised credentials may be used to bypass access controls placed on various resources on systems within the network and may even be used for persistent access to remote systems and externally available services, such as VPNs, Outlook Web Access, network devices, and remote desktop.(Citation: volexity_0day_sophos_FW) Compromised credentials may also grant an adversary increased privilege to specific systems or access to restricted areas of the network. Adversaries may choose not to use malware or tools in conjunction with the legitimate access those credentials provide to make it harder to detect their presence.
In some cases, adversaries may abuse inactive accounts: for example, those belonging to individuals who are no longer part of an organization. Using these accounts may allow the adversary to evade detection, as the original account user will not be present to identify any anomalous activity taking place on their account.(Citation: CISA MFA PrintNightmare)
The overlap of permissions for local, domain, and cloud accounts across a network of systems is of concern because the adversary may be able to pivot across accounts and systems to reach a high level of access (i.e., domain or enterprise administrator) to bypass access controls set within the enterprise.(Citation: TechNet Credential Theft) |
Techniques related with vulnerability CVE-2020-0758 | CVE-2020-0758 in Team Foundation Server 2018. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1098 : Account Manipulation. |
Describe the vulnerability CVE-2019-10149 | CVE-2019-10149, State: PUBLISHED, Published: 2019-06-05T00:00:00, Updated: 2024-08-04T22:10:09.944Z, Description: A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 9, Base Severity: CRITICAL, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: NONE, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2017-3066 | CVE-2017-3066 in Adobe ColdFusion ColdFusion 2016 Update 3 and earlier, ColdFusion 11 update 11 and earlier, ColdFusion 10 Update 22 and earlier. Is related with T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2009-2265 | CVE-2009-2265, State: PUBLISHED, Published: 2009-07-05T16:00:00, Updated: 2024-08-07T05:44:55.927Z, Description: Multiple directory traversal vulnerabilities in FCKeditor before 2.6.4.1 allow remote attackers to create executable files in arbitrary directories via directory traversal sequences in the input to unspecified connector modules, as exploited in the wild for remote code execution in July 2009, related to the file browser and the editor/filemanager/connectors/ directory., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2018-1000861 | CVE-2018-1000861 in Stapler web framework used by Jenkins 2.153 and earlier. Is related with T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2020-11050 | CVE-2020-11050 in Java-WebSocket. Has primary impact with T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2019-18578 | CVE-2019-18578 in XtremIO. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1185 : Man in the Browser. Has an exploitation technique T1189 : Drive-by Compromise. |
Techniques related with vulnerability CVE-2020-5210 | CVE-2020-5210 in NetHack. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. |
Describe the vulnerability CVE-2010-1423 | CVE-2010-1423, State: PUBLISHED, Published: 2010-04-15T21:12:00, Updated: 2024-08-07T01:21:19.151Z, Description: Argument injection vulnerability in the URI handler in (a) Java NPAPI plugin and (b) Java Deployment Toolkit in Java 6 Update 10, 19, and other versions, when running on Windows and possibly on Linux, allows remote attackers to execute arbitrary code via the (1) -J or (2) -XXaltjvm argument to javaws.exe, which is processed by the launch method. NOTE: some of these details are obtained from third party information., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2015-7910 | CVE-2015-7910 in Exemys Telemetry Web Server. Is related with T1068 : Exploitation for Privilege Escalation. |
Describe the vulnerability CVE-2020-6964 | CVE-2020-6964, State: PUBLISHED, Published: 2020-01-24T16:32:13, Updated: 2024-08-04T09:18:02.496Z, Description: In ApexPro Telemetry Server Versions 4.2 and prior, CARESCAPE Telemetry Server v4.2 & prior, Clinical Information Center (CIC) Versions 4.X and 5.X, CARESCAPE Central Station (CSCS) Versions 1.X and CARESCAPE Central Station (CSCS) Versions 2.X, the integrated service for keyboard switching of the affected devices could allow attackers to obtain remote keyboard input access without authentication over the network., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2020-12655 | CVE-2020-12655 in Linux kernel through 5.6.10. Is related with T1499.004 : Application or System Exploitation. |
Techniques related with vulnerability CVE-2016-3714 | CVE-2016-3714 in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.001 : Malicious Link. |
Techniques related with vulnerability CVE-2018-17924 | CVE-2018-17924 in Rockwell Automation. Has primary impact with T0826 : Loss of Availability. Has secondary impact with T0803 : Block Command Message. Has secondary impact with T0804 : Block Reporting Message. Has an exploitation technique T0855 : Unauthorized Command Message. |
Techniques related with vulnerability CVE-2013-1493 | CVE-2013-1493 in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2014-2817 | CVE-2014-2817 in Internet Explorer 6. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2020-5217 | CVE-2020-5217, State: PUBLISHED, Published: 2020-01-23T02:15:17, Updated: 2024-08-04T08:22:08.919Z, Description: In Secure Headers (RubyGem secure_headers), a directive injection vulnerability is present in versions before 3.8.0, 5.1.0, and 6.2.0. If user-supplied input was passed into append/override_content_security_policy_directives, a semicolon could be injected leading to directive injection. This could be used to e.g. override a script-src directive. Duplicate directives are ignored and the first one wins. The directives in secure_headers are sorted alphabetically so they pretty much all come before script-src. A previously undefined directive would receive a value even if SecureHeaders::OPT_OUT was supplied. The fixed versions will silently convert the semicolons to spaces and emit a deprecation warning when this happens. This will result in innocuous browser console messages if being exploited/accidentally used. In future releases, we will raise application errors resulting in 500s. Depending on what major version you are using, the fixed versions are 6.2.0, 5.1.0, 3.8.0., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 4.4, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: LOW, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2020-0884 | CVE-2020-0884, State: PUBLISHED, Published: 2020-03-12T15:48:53, Updated: 2024-08-04T06:18:03.533Z, Description: A spoofing vulnerability exists in Microsoft Visual Studio as it includes a reply URL that is not secured by SSL, aka 'Microsoft Visual Studio Spoofing Vulnerability'., No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2019-3731 | CVE-2019-3731, State: PUBLISHED, Published: 2019-09-30T21:48:40.294314Z, Updated: 2024-09-16T23:56:35.629Z, Description: RSA BSAFE Crypto-C Micro Edition versions prior to 4.1.4 and RSA Micro Edition Suite versions prior to 4.4 are vulnerable to an Information Exposure Through Timing Discrepancy. A malicious remote user could potentially exploit this vulnerability to extract information leaving data at risk of exposure., CVSS v3.0 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 5.9, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: NONE, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2020-5250 | CVE-2020-5250, State: PUBLISHED, Published: 2020-03-05T17:00:18, Updated: 2024-08-04T08:22:09.084Z, Description: In PrestaShop before version 1.7.6.4, when a customer edits their address, they can freely change the id_address in the form, and thus steal someone else's address. It is the same with CustomerForm, you are able to change the id_customer and change all information of all accounts. The problem is patched in version 1.7.6.4., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 7.6, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: LOW, Privileges Required: LOW, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2020-5369 | CVE-2020-5369, State: PUBLISHED, Published: 2020-09-02T20:55:17.768175Z, Updated: 2024-09-16T19:46:53.889Z, Description: Dell EMC Isilon OneFS versions 8.2.2 and earlier and Dell EMC PowerScale OneFS version 9.0.0 contain a privilege escalation vulnerability. An authenticated malicious user may exploit this vulnerability by using SyncIQ to gain unauthorized access to system management files., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.8, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available |
Describe MITRE technique T0812 | MITRE T0812 : Default Credentials from ics Adversaries may leverage manufacturer or supplier set default credentials on control system devices. These default credentials may have administrative permissions and may be necessary for initial configuration of the device. It is general best practice to change the passwords for these accounts as soon as possible, but some manufacturers may have devices that have passwords or usernames that cannot be changed. (Citation: Keith Stouffer May 2015)
Default credentials are normally documented in an instruction manual that is either packaged with the device, published online through official means, or published online through unofficial means. Adversaries may leverage default credentials that have not been properly modified or disabled. |
Describe the vulnerability CVE-2014-4113 | CVE-2014-4113, State: PUBLISHED, Published: 2014-10-15T10:00:00, Updated: 2024-08-06T11:04:28.739Z, Description: win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, as exploited in the wild in October 2014, aka "Win32k.sys Elevation of Privilege Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2008-2992 | CVE-2008-2992, State: PUBLISHED, Published: 2008-11-04T18:00:00, Updated: 2024-08-07T09:21:34.450Z, Description: Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a PDF file that calls the util.printf JavaScript function with a crafted format string argument, a related issue to CVE-2008-1104., No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2013-3893 | CVE-2013-3893, State: PUBLISHED, Published: 2013-09-18T10:00:00, Updated: 2024-08-06T16:22:01.292Z, Description: Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code via crafted JavaScript strings, as demonstrated by use of an ms-help: URL that triggers loading of hxds.dll., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2018-15764 | CVE-2018-15764 in ESRS Policy Manager. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2018-10376 | CVE-2018-10376, State: PUBLISHED, Published: 2018-04-25T09:00:00, Updated: 2024-08-05T07:39:07.523Z, Description: An integer overflow in the transferProxy function of a smart contract implementation for SmartMesh (aka SMT), an Ethereum ERC20 token, allows attackers to accomplish an unauthorized increase of digital assets via crafted _fee and _value parameters, as exploited in the wild in April 2018, aka the "proxyOverflow" issue., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2018-18987 | CVE-2018-18987 in VT-Designer Version 2.1.7.31. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1574 : Hijack Execution Flow. Has secondary impact with T1499.004 : Application or System Exploitation. |
Describe the vulnerability CVE-2019-18263 | CVE-2019-18263, State: PUBLISHED, Published: 2019-12-20T15:27:16, Updated: 2024-08-05T01:47:14.119Z, Description: An issue was found in Philips Veradius Unity, Pulsera, and Endura Dual WAN Router, Veradius Unity (718132) with wireless option (shipped between 2016-August 2018), Veradius Unity (718132) with ViewForum option (shipped between 2016-August 2018), Pulsera (718095) and Endura (718075) with wireless option (shipped between 26-June-2017 through 07-August 2018), Pulsera (718095) and Endura (718075) with ViewForum option (shipped between 26-June-2017 through 07-August 2018). The router software uses an encryption scheme that is not strong enough for the level of protection required., No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2019-1214 | CVE-2019-1214, State: PUBLISHED, Published: 2019-09-11T21:24:58, Updated: 2024-08-04T18:13:29.129Z, Description: An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory, aka 'Windows Common Log File System Driver Elevation of Privilege Vulnerability'., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2014-1812 | CVE-2014-1812 in Windows. Is related with T1003 : OS Credential Dumping. Is related with T1552.001 : Credentials In Files. |
Describe the vulnerability CVE-2010-2729 | CVE-2010-2729, State: PUBLISHED, Published: 2010-09-15T18:00:00, Updated: 2024-08-07T02:46:48.161Z, Description: The Print Spooler service in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, when printer sharing is enabled, does not properly validate spooler access permissions, which allows remote attackers to create files in a system directory, and consequently execute arbitrary code, by sending a crafted print request over RPC, as exploited in the wild in September 2010, aka "Print Spooler Service Impersonation Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2020-3177 | CVE-2020-3177, State: PUBLISHED, Published: 2020-04-15T20:10:20.904083Z, Updated: 2024-11-15T17:31:41.239Z, Description: A vulnerability in the Tool for Auto-Registered Phones Support (TAPS) of Cisco Unified Communications Manager (UCM) and Cisco Unified Communications Manager Session Management Edition (SME) could allow an unauthenticated, remote attacker to conduct directory traversal attacks on an affected device. The vulnerability is due to insufficient validation of user-supplied input to the TAPS interface of the affected device. An attacker could exploit this vulnerability by sending a crafted request to the TAPS interface. A successful exploit could allow the attacker to read arbitrary files in the system., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 7.5, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: NONE, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. |
Techniques related with vulnerability CVE-2018-11067 | CVE-2018-11067 in Avamar. Has secondary impact with T1036 : Masquerading. Has an exploitation technique T1566.002 : Spearphishing Link. |
Describe the vulnerability CVE-2018-15780 | CVE-2018-15780, State: PUBLISHED, Published: 2019-01-03T21:00:00Z, Updated: 2024-09-17T03:37:26.681Z, Description: RSA Archer versions prior to 6.5.0.1 contain an improper access control vulnerability. A remote malicious user could potentially exploit this vulnerability to bypass authorization checks and gain read access to restricted user information., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 4.3, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: NONE, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2019-3786 | CVE-2019-3786 in BOSH Backup and Restore. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1565.001 : Stored Data Manipulation. |
Describe the vulnerability CVE-2019-1831 | CVE-2019-1831, State: PUBLISHED, Published: 2019-04-18T01:20:26.675817Z, Updated: 2024-11-19T19:10:48.135Z, Description: A vulnerability in the email message scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured content filters on the device. The vulnerability is due to improper input validation of the email body. An attacker could exploit this vulnerability by inserting specific character strings in the message. A successful exploit could allow the attacker to bypass configured content filters that would normally drop the email., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 5.8, Base Severity: MEDIUM, Confidentiality Impact: NONE, Integrity Impact: LOW, Privileges Required: NONE, Scope: CHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. |
Describe the vulnerability CVE-2018-5459 | CVE-2018-5459, State: PUBLISHED, Published: 2018-02-13T21:00:00, Updated: 2024-08-05T05:33:44.375Z, Description: An Improper Authentication issue was discovered in WAGO PFC200 Series 3S CoDeSys Runtime versions 2.3.X and 2.4.X. An attacker can execute different unauthenticated remote operations because of the CoDeSys Runtime application, which is available via network by default on Port 2455. An attacker could execute some unauthenticated commands such as reading, writing, or deleting arbitrary files, or manipulate the PLC application during runtime by sending specially-crafted TCP packets to Port 2455., No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2020-3379 | CVE-2020-3379, State: PUBLISHED, Published: 2020-07-16T17:21:51.004104Z, Updated: 2024-11-15T16:53:01.086Z, Description: A vulnerability in Cisco SD-WAN Solution Software could allow an authenticated, local attacker to elevate privileges to Administrator on the underlying operating system. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted request to an affected system. A successful exploit could allow the attacker to gain administrative privileges., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: LOCAL, Availability Impact: LOW, Base Score: 5.3, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. |
Techniques related with vulnerability CVE-2020-5350 | CVE-2020-5350 in Integrated Data Protection Appliance. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1098 : Account Manipulation. |
Techniques related with vulnerability CVE-2020-5331 | CVE-2020-5331 in RSA Archer. Has primary impact with T1005 : Data from Local System. |
Describe the vulnerability CVE-2019-1013 | CVE-2019-1013, State: PUBLISHED, Published: 2019-06-12T13:49:39, Updated: 2024-08-04T18:06:31.296Z, Description: An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-0968, CVE-2019-0977, CVE-2019-1009, CVE-2019-1010, CVE-2019-1011, CVE-2019-1012, CVE-2019-1015, CVE-2019-1016, CVE-2019-1046, CVE-2019-1047, CVE-2019-1048, CVE-2019-1049, CVE-2019-1050., No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2014-6324 | CVE-2014-6324, State: PUBLISHED, Published: 2014-11-18T23:00:00, Updated: 2024-08-06T12:10:13.306Z, Description: The Kerberos Key Distribution Center (KDC) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote authenticated domain users to obtain domain administrator privileges via a forged signature in a ticket, as exploited in the wild in November 2014, aka "Kerberos Checksum Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2017-8464 | CVE-2017-8464, State: PUBLISHED, Published: 2017-06-15T01:00:00, Updated: 2024-08-05T16:34:23.052Z, Description: Windows Shell in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows local users or remote attackers to execute arbitrary code via a crafted .LNK file, which is not properly handled during icon display in Windows Explorer or any other application that parses the icon of the shortcut. aka "LNK Remote Code Execution Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2019-1781 | CVE-2019-1781 in Cisco NX-OS Software. Has primary impact with T1608 : Stage Capabilities. Has secondary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1078 : Valid Accounts. |
Describe the vulnerability CVE-2020-5358 | CVE-2020-5358, State: PUBLISHED, Published: 2020-06-15T20:20:11.377037Z, Updated: 2024-09-17T01:56:50.455Z, Description: Dell Encryption versions prior to 10.7 and Dell Endpoint Security Suite versions prior to 2.7 contain a privilege escalation vulnerability due to incorrect permissions. A local malicious user with low privileges could potentially exploit this vulnerability to gain elevated privilege on the affected system with the help of a symbolic link., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: LOCAL, Availability Impact: HIGH, Base Score: 6.7, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2019-10971 | CVE-2019-10971 in Network Configurator for DeviceNet Safety. Has primary impact with T1574.001 : DLL Search Order Hijacking. |
Describe the vulnerability CVE-2020-12769 | CVE-2020-12769, State: PUBLISHED, Published: 2020-05-09T20:16:45, Updated: 2024-08-04T12:04:22.954Z, Description: An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2019-1772 | CVE-2019-1772 in Cisco WebEx WRF Player. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1566 : Phishing. Has an exploitation technique T1204.002 : Malicious File. |
Describe the vulnerability CVE-2013-0632 | CVE-2013-0632, State: PUBLISHED, Published: 2013-01-17T00:00:00, Updated: 2024-08-06T14:33:05.651Z, Description: administrator.cfc in Adobe ColdFusion 9.0, 9.0.1, 9.0.2, and 10 allows remote attackers to bypass authentication and possibly execute arbitrary code by logging in to the RDS component using the default empty password and leveraging this session to access the administrative web interface, as exploited in the wild in January 2013., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2019-18581 | CVE-2019-18581 in Data Protection Advisor. Has primary impact with T1562 : Impair Defenses. Has secondary impact with T1059 : Command and Scripting Interpreter. |
Techniques related with vulnerability CVE-2015-2419 | CVE-2015-2419 in JScript 9 in Microsoft Internet Explorer 10 and 11. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise. |
Describe MITRE technique T1574.001 | MITRE T1574.001 : DLL Search Order Hijacking from enterprise Adversaries may execute their own malicious payloads by hijacking the search order used to load DLLs. Windows systems use a common method to look for required DLLs to load into a program. (Citation: Microsoft Dynamic Link Library Search Order)(Citation: FireEye Hijacking July 2010) Hijacking DLL loads may be for the purpose of establishing persistence as well as elevating privileges and/or evading restrictions on file execution.
There are many ways an adversary can hijack DLL loads. Adversaries may plant trojan dynamic-link library files (DLLs) in a directory that will be searched before the location of a legitimate library that will be requested by a program, causing Windows to load their malicious library when it is called for by the victim program. Adversaries may also perform DLL preloading, also called binary planting attacks, (Citation: OWASP Binary Planting) by placing a malicious DLL with the same name as an ambiguously specified DLL in a location that Windows searches before the legitimate DLL. Often this location is the current working directory of the program.(Citation: FireEye fxsst June 2011) Remote DLL preloading attacks occur when a program sets its current directory to a remote location such as a Web share before loading a DLL. (Citation: Microsoft Security Advisory 2269637)
Phantom DLL hijacking is a specific type of DLL search order hijacking where adversaries target references to non-existent DLL files.(Citation: Adversaries Hijack DLLs) They may be able to load their own malicious DLL by planting it with the correct name in the location of the missing module.
Adversaries may also directly modify the search order via DLL redirection, which after being enabled (in the Registry and creation of a redirection file) may cause a program to load a different DLL.(Citation: Microsoft Dynamic-Link Library Redirection)(Citation: Microsoft Manifests)(Citation: FireEye DLL Search Order Hijacking)
If a search order-vulnerable program is configured to run at a higher privilege level, then the adversary-controlled DLL that is loaded will also be executed at the higher level. In this case, the technique could be used for privilege escalation from user to administrator or SYSTEM or from administrator to SYSTEM, depending on the program. Programs that fall victim to path hijacking may appear to behave normally because malicious DLLs may be configured to also load the legitimate DLLs they were meant to replace. |
Describe the vulnerability CVE-2019-0797 | CVE-2019-0797, State: PUBLISHED, Published: 2019-04-09T02:34:55, Updated: 2024-08-04T17:58:59.172Z, Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0808., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2018-17892 | CVE-2018-17892 in NUUO CMS. Has primary impact with T1562 : Impair Defenses. |
Describe the vulnerability CVE-2018-19207 | CVE-2018-19207, State: PUBLISHED, Published: 2018-11-12T17:00:00, Updated: 2024-08-05T11:30:04.040Z, Description: The Van Ons WP GDPR Compliance (aka wp-gdpr-compliance) plugin before 1.4.3 for WordPress allows remote attackers to execute arbitrary code because $wpdb->prepare() input is mishandled, as exploited in the wild in November 2018., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2011-2005 | CVE-2011-2005 in Ancillary Function Driver in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2017-1274 | CVE-2017-1274 in Domino. Is related with T1068 : Exploitation for Privilege Escalation. |
Techniques related with vulnerability CVE-2015-2590 | CVE-2015-2590 in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2020-11897 | CVE-2020-11897 in Treck TCP/IP stack before 5.0.1.3. Is related with T1190 : Exploit Public-Facing Application. Is related with T1203 : Exploitation for Client Execution. Is related with T1499 : Endpoint Denial of Service. |
Describe MITRE technique T0826 | MITRE T0826 : Loss of Availability from ics Adversaries may attempt to disrupt essential components or systems to prevent owner and operator from delivering products or services. (Citation: Corero) (Citation: Michael J. Assante and Robert M. Lee) (Citation: Tyson Macaulay)
Adversaries may leverage malware to delete or encrypt critical data on HMIs, workstations, or databases.
In the 2021 Colonial Pipeline ransomware incident, pipeline operations were temporally halted on May 7th and were not fully restarted until May 12th. (Citation: Colonial Pipeline Company May 2021) |
Describe MITRE technique T1552.004 | MITRE T1552.004 : Private Keys from enterprise Adversaries may search for private key certificate files on compromised systems for insecurely stored credentials. Private cryptographic keys and certificates are used for authentication, encryption/decryption, and digital signatures.(Citation: Wikipedia Public Key Crypto) Common key and certificate file extensions include: .key, .pgp, .gpg, .ppk., .p12, .pem, .pfx, .cer, .p7b, .asc.
Adversaries may also look in common key directories, such as `~/.ssh` for SSH keys on * nix-based systems or `C:\Users\(username)\.ssh\` on Windows. Adversary tools may also search compromised systems for file extensions relating to cryptographic keys and certificates.(Citation: Kaspersky Careto)(Citation: Palo Alto Prince of Persia)
When a device is registered to Azure AD, a device key and a transport key are generated and used to verify the device’s identity.(Citation: Microsoft Primary Refresh Token) An adversary with access to the device may be able to export the keys in order to impersonate the device.(Citation: AADInternals Azure AD Device Identities)
On network devices, private keys may be exported via [Network Device CLI](T1059.008) commands such as `crypto pki export`.(Citation: cisco_deploy_rsa_keys)
Some private keys require a password or passphrase for operation, so an adversary may also use [Input Capture](T1056) for keylogging or attempt to [Brute Force](T1110) the passphrase off-line. These private keys can be used to authenticate to [Remote Services](T1021) like SSH or for use in decrypting other collected files such as email. |
Describe the vulnerability CVE-2018-19007 | CVE-2018-19007, State: PUBLISHED, Published: 2018-12-14T20:00:00, Updated: 2024-08-05T11:23:09.034Z, Description: In Geutebrueck GmbH E2 Camera Series versions prior to 1.12.0.25 the DDNS configuration (in the Network Configuration panel) is vulnerable to an OS system command injection as root., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2019-15821 | CVE-2019-15821 in bold-page-builder plugin before 2.3.2 for WordPress. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1133 : External Remote Services. Is related with T1136 : Create Account. Is related with T1565 : Data Manipulation. Is related with T1149 : LC_MAIN Hijacking . |
Techniques related with vulnerability CVE-2018-0798 | CVE-2018-0798 in Equation Editor. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2020-5328 | CVE-2020-5328 in Isilon OneFS. Has secondary impact with T1068 : Exploitation for Privilege Escalation. |
Techniques related with vulnerability CVE-2019-1943 | CVE-2019-1943 in Cisco Small Business 300 Series Managed Switches. Has primary impact with T1565.002 : Transmitted Data Manipulation. Has secondary impact with T1189 : Drive-by Compromise. Has an exploitation technique T1557 : Man-in-the-Middle. |
Describe the vulnerability CVE-2020-8468 | CVE-2020-8468, State: PUBLISHED, Published: 2020-03-18T00:30:43, Updated: 2024-08-04T10:03:44.778Z, Description: Trend Micro Apex One (2019), OfficeScan XG and Worry-Free Business Security (9.0, 9.5, 10.0) agents are affected by a content validation escape vulnerability which could allow an attacker to manipulate certain agent client components. An attempted attack requires user authentication., No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2019-1132 | CVE-2019-1132, State: PUBLISHED, Published: 2019-07-29T14:13:38, Updated: 2024-08-04T18:06:31.730Z, Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'., No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2019-1857 | CVE-2019-1857, State: PUBLISHED, Published: 2019-05-03T16:40:23.067089Z, Updated: 2024-09-17T02:27:18.712Z, Description: A vulnerability in the web-based management interface of Cisco HyperFlex HX-Series could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on an affected system by using a web browser and with the privileges of the user., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 6.1, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: NONE, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. |
Describe the vulnerability CVE-2019-15289 | CVE-2019-15289, State: PUBLISHED, Published: 2020-09-23T00:30:13.703662Z, Updated: 2024-11-13T18:02:40.021Z, Description: Multiple vulnerabilities in the video service of Cisco TelePresence Collaboration Endpoint (CE) and Cisco RoomOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerabilities are due to insufficient input validation. An attacker could exploit these vulnerabilities by sending crafted traffic to the video service of an affected endpoint. A successful exploit could allow the attacker to cause the video service to crash, resulting in a DoS condition on an affected device., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 7.5, Base Severity: HIGH, Confidentiality Impact: NONE, Integrity Impact: NONE, Privileges Required: NONE, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. |
Techniques related with vulnerability CVE-2018-15466 | CVE-2018-15466 in Cisco Policy Suite (CPS) Software. Has primary impact with T1608 : Stage Capabilities. Has secondary impact with T1005 : Data from Local System. |
Techniques related with vulnerability CVE-2018-8589 | CVE-2018-8589 in Windows Server 2008. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2017-18362 | CVE-2017-18362, State: PUBLISHED, Published: 2019-02-05T05:00:00, Updated: 2024-08-05T21:20:50.848Z, Description: ConnectWise ManagedITSync integration through 2017 for Kaseya VSA is vulnerable to unauthenticated remote commands that allow full direct access to the Kaseya VSA database. In February 2019, attackers have actively exploited this in the wild to download and execute ransomware payloads on all endpoints managed by the VSA server. If the ManagedIT.asmx page is available via the Kaseya VSA web interface, anyone with access to the page is able to run arbitrary SQL queries, both read and write, without authentication., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2019-3775 | CVE-2019-3775 in UAA Release (OSS). Has primary impact with T1098 : Account Manipulation. |
Techniques related with vulnerability CVE-2020-5253 | CVE-2020-5253 in NetHack. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1478 : Install Insecure or Malicious Configuration. |
Techniques related with vulnerability CVE-2020-11087 | CVE-2020-11087 in FreeRDP. Has primary impact with T1005 : Data from Local System. Has secondary impact with T1211 : Exploitation for Defense Evasion. |
Describe the vulnerability CVE-2019-1031 | CVE-2019-1031, State: PUBLISHED, Published: 2019-06-12T13:49:40, Updated: 2024-08-04T18:06:31.538Z, Description: A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'. This CVE ID is unique from CVE-2019-1032, CVE-2019-1033, CVE-2019-1036., No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2014-0266 | CVE-2014-0266, State: PUBLISHED, Published: 2014-02-12T02:00:00, Updated: 2024-08-06T09:13:09.697Z, Description: The XMLHTTP ActiveX controls in XML Core Services 3.0 in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to bypass the Same Origin Policy via a web page that is visited in Internet Explorer, aka "MSXML Information Disclosure Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available |
Describe MITRE technique T1489 | MITRE T1489 : Service Stop from enterprise Adversaries may stop or disable services on a system to render those services unavailable to legitimate users. Stopping critical services or processes can inhibit or stop response to an incident or aid in the adversary's overall objectives to cause damage to the environment.(Citation: Talos Olympic Destroyer 2018)(Citation: Novetta Blockbuster)
Adversaries may accomplish this by disabling individual services of high importance to an organization, such as `MSExchangeIS`, which will make Exchange content inaccessible (Citation: Novetta Blockbuster). In some cases, adversaries may stop or disable many or all services to render systems unusable.(Citation: Talos Olympic Destroyer 2018) Services or processes may not allow for modification of their data stores while running. Adversaries may stop services or processes in order to conduct [Data Destruction](T1485) or [Data Encrypted for Impact](T1486) on the data stores of services like Exchange and SQL Server.(Citation: SecureWorks WannaCry Analysis) |
Describe the vulnerability CVE-2020-5295 | CVE-2020-5295, State: PUBLISHED, Published: 2020-06-03T21:50:12, Updated: 2024-08-04T08:22:09.093Z, Description: In OctoberCMS (october/october composer package) versions from 1.0.319 and before 1.0.466, an attacker can exploit this vulnerability to read local files of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the `cms.manage_assets` permission. Issue has been patched in Build 466 (v1.0.466)., CVSS v3.1 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 4.8, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: HIGH, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2019-18571 | CVE-2019-18571, State: PUBLISHED, Published: 2019-12-18T20:50:13.968502Z, Updated: 2024-09-16T19:10:42.619Z, Description: The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain a reflected cross-site scripting vulnerability in the My Access Live module [MAL]. An authenticated malicious local user could potentially exploit this vulnerability by sending crafted URL with scripts. When victim users access the module through their browsers, the malicious code gets injected and executed by the web browser in the context of the vulnerable web application., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 5.4, Base Severity: MEDIUM, Confidentiality Impact: LOW, Integrity Impact: LOW, Privileges Required: LOW, Scope: CHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2018-11060 | CVE-2018-11060 in RSA Archer. Has primary impact with T1068 : Exploitation for Privilege Escalation. |
Describe the vulnerability CVE-2017-0222 | CVE-2017-0222, State: PUBLISHED, Published: 2017-05-12T14:00:00, Updated: 2024-08-05T12:55:19.287Z, Description: A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0226., No CVSS metrics available, Exploit Info: No exploit information available |
End of preview. Expand
in Dataset Viewer.
README.md exists but content is empty.
- Downloads last month
- 37