| Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes | 
|---|---|---|---|---|---|
| CVE-2010-2883 | Adobe Acrobat and Reader Stack-Based Buffer Overflow Vulnerability | secondary_impact | T1059 | Command and Scripting Interpreter | Comments This vulnerability is exploited by the user opening a malicious pdf file to achieve arbitrary code execution. References | 
| CVE-2010-2883 | Adobe Acrobat and Reader Stack-Based Buffer Overflow Vulnerability | primary_impact | T1027 | Obfuscated Files or Information | Comments This vulnerability is exploited by the user opening a malicious pdf file to achieve arbitrary code execution. References | 
| CVE-2021-21148 | Google Chromium V8 Heap Buffer Overflow Vulnerability | exploitation_technique | T1059.007 | JavaScript | Comments CVE-2021-21148 allows an adversary to use JavaScript to exploit the Chromium browser V8 JavaScript engine which allows for a write into the heap. References | 
| CVE-2021-21148 | Google Chromium V8 Heap Buffer Overflow Vulnerability | primary_impact | T1203 | Exploitation for Client Execution | Comments CVE-2021-21148 allows an adversary to use JavaScript to exploit the Chromium browser V8 JavaScript engine which allows for a write into the heap. References | 
| CVE-2020-5735 | Amcrest Cameras and NVR Stack-based Buffer Overflow Vulnerability | primary_impact | T1574 | Hijack Execution Flow | Comments CVE-2020-5735 is a stack-based buffer overflow vulnerability in Amcrest cameras and NVR that allows an authenticated remote attacker to possibly execute unauthorized code over port 37777 and crash the device. References | 
| CVE-2020-5735 | Amcrest Cameras and NVR Stack-based Buffer Overflow Vulnerability | secondary_impact | T1499 | Endpoint Denial of Service | Comments CVE-2020-5735 is a stack-based buffer overflow vulnerability in Amcrest cameras and NVR that allows an authenticated remote attacker to possibly execute unauthorized code over port 37777 and crash the device. References | 
| CVE-2007-5659 | Adobe Acrobat and Reader Buffer Overflow Vulnerability | exploitation_technique | T1204.002 | Malicious File | Comments This vulnerability is exploited via a malicious PDF file in order to execute arbitrary code. References | 
| CVE-2021-21017 | Adobe Acrobat and Reader Heap-based Buffer Overflow Vulnerability | exploitation_technique | T1204.002 | Malicious File | Comments This exploit requires a user to open a malicious file. It can then result in execution of arbitrary code which could have any number of impacts. References | 
| CVE-2010-2883 | Adobe Acrobat and Reader Stack-Based Buffer Overflow Vulnerability | exploitation_technique | T1204.002 | Malicious File | Comments This vulnerability is exploited by the user opening a malicious pdf file to achieve arbitrary code execution. References | 
| CVE-2013-0641 | Adobe Reader Buffer Overflow Vulnerability | secondary_impact | T1048 | Exfiltration Over Alternative Protocol | Comments This buffer overflow vulnerability is exploited via malicious-crafted pdf files delivered via targeted emails. Adversaries use this exploit to deliver a remote administration tool with the goal of data exfiltration. References | 
| CVE-2013-0641 | Adobe Reader Buffer Overflow Vulnerability | primary_impact | T1105 | Ingress Tool Transfer | Comments This buffer overflow vulnerability is exploited via malicious-crafted pdf files delivered via targeted emails. Adversaries use this exploit to deliver a remote administration tool with the goal of data exfiltration. References | 
| CVE-2013-0641 | Adobe Reader Buffer Overflow Vulnerability | exploitation_technique | T1204.002 | Malicious File | Comments This buffer overflow vulnerability is exploited via malicious-crafted pdf files delivered via targeted emails. Adversaries use this exploit to deliver a remote administration tool with the goal of data exfiltration. References | 
| CVE-2015-3113 | Adobe Flash Player Heap-Based Buffer Overflow Vulnerability | secondary_impact | T1622 | Debugger Evasion | Comments This heap-based buffer overflow vulnerability is exploited by having a user open a maliciously-crafted file. 
In the wild, this exploitation has been used in order to establish command and control (over HTTP) with a target system.  The command and control functionality has also been seen to employ debugging/sandboxing evasion. References | 
| CVE-2015-3113 | Adobe Flash Player Heap-Based Buffer Overflow Vulnerability | secondary_impact | T1497 | Virtualization/Sandbox Evasion | Comments This heap-based buffer overflow vulnerability is exploited by having a user open a maliciously-crafted file. 
In the wild, this exploitation has been used in order to establish command and control (over HTTP) with a target system.  The command and control functionality has also been seen to employ debugging/sandboxing evasion. References | 
| CVE-2015-3113 | Adobe Flash Player Heap-Based Buffer Overflow Vulnerability | primary_impact | T1071.001 | Web Protocols | Comments This heap-based buffer overflow vulnerability is exploited by having a user open a maliciously-crafted file. 
In the wild, this exploitation has been used in order to establish command and control (over HTTP) with a target system.  The command and control functionality has also been seen to employ debugging/sandboxing evasion. References | 
| CVE-2015-3113 | Adobe Flash Player Heap-Based Buffer Overflow Vulnerability | exploitation_technique | T1204.002 | Malicious File | Comments This heap-based buffer overflow vulnerability is exploited by having a user open a maliciously-crafted file. 
In the wild, this exploitation has been used in order to establish command and control (over HTTP) with a target system.  The command and control functionality has also been seen to employ debugging/sandboxing evasion. References | 
| CVE-2018-6789 | Exim Buffer Overflow Vulnerability | primary_impact | T1059 | Command and Scripting Interpreter | Comments CVE-2018-6789 is a vulnerability in Exim, an open-source mail transfer agent. This vulnerability, identified as an off-by-one buffer overflow, allows attackers to execute arbitrary code remotely by sending specially crafted messages to the SMTP listener. References | 
| CVE-2018-6789 | Exim Buffer Overflow Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application | Comments CVE-2018-6789 is a vulnerability in Exim, an open-source mail transfer agent. This vulnerability, identified as an off-by-one buffer overflow, allows attackers to execute arbitrary code remotely by sending specially crafted messages to the SMTP listener. References | 
| CVE-2020-29557 | D-Link DIR-825 R1 Devices Buffer Overflow Vulnerability | secondary_impact | T1584.005 | Botnet | Comments CVE-2020-29557 is a buffer overflow vulnerability  in the web interface allows attackers to achieve pre-authentication remote code execution. Unidentified threat actors are reported to have been actively exploiting it to co-opt them to a Mirai-variant botnet used for carrying out DDoS attacks, merely two days after its public disclosure. References | 
| CVE-2020-29557 | D-Link DIR-825 R1 Devices Buffer Overflow Vulnerability | primary_impact | T1059 | Command and Scripting Interpreter | Comments CVE-2020-29557 is a buffer overflow vulnerability  in the web interface allows attackers to achieve pre-authentication remote code execution. Unidentified threat actors are reported to have been actively exploiting it to co-opt them to a Mirai-variant botnet used for carrying out DDoS attacks, merely two days after its public disclosure. References | 
| CVE-2020-29557 | D-Link DIR-825 R1 Devices Buffer Overflow Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application | Comments CVE-2020-29557 is a buffer overflow vulnerability  in the web interface allows attackers to achieve pre-authentication remote code execution. Unidentified threat actors are reported to have been actively exploiting it to co-opt them to a Mirai-variant botnet used for carrying out DDoS attacks, merely two days after its public disclosure. References | 
| CVE-2022-42475 | Fortinet FortiOS Heap-Based Buffer Overflow Vulnerability | secondary_impact | T1071.001 | Web Protocols | Comments CVE-2022-42475 is a remotely-expoitable heap overflow vulnerability. Adversaries have been observed exploiting this vulnerability to deliver malicious software to the target device.
This malicious software has observed anti-debugging and command and control capabilities (over HTTP). References | 
| CVE-2022-42475 | Fortinet FortiOS Heap-Based Buffer Overflow Vulnerability | secondary_impact | T1622 | Debugger Evasion | Comments CVE-2022-42475 is a remotely-expoitable heap overflow vulnerability. Adversaries have been observed exploiting this vulnerability to deliver malicious software to the target device.
This malicious software has observed anti-debugging and command and control capabilities (over HTTP). References | 
| CVE-2022-42475 | Fortinet FortiOS Heap-Based Buffer Overflow Vulnerability | primary_impact | T1574 | Hijack Execution Flow | Comments CVE-2022-42475 is a remotely-expoitable heap overflow vulnerability. Adversaries have been observed exploiting this vulnerability to deliver malicious software to the target device.
This malicious software has observed anti-debugging and command and control capabilities (over HTTP). References | 
| CVE-2022-42475 | Fortinet FortiOS Heap-Based Buffer Overflow Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application | Comments CVE-2022-42475 is a remotely-expoitable heap overflow vulnerability. Adversaries have been observed exploiting this vulnerability to deliver malicious software to the target device.
This malicious software has observed anti-debugging and command and control capabilities (over HTTP). References | 
| CVE-2023-27997 | Fortinet FortiOS and FortiProxy SSL-VPN Heap-Based Buffer Overflow Vulnerability | primary_impact | T1136 | Create Account | Comments This buffer overflow vulnerability allows adversaries to remotely execute arbitrary code via specially crafted requests.
Adversaries have been observed adding accounts to config files References | 
| CVE-2023-27997 | Fortinet FortiOS and FortiProxy SSL-VPN Heap-Based Buffer Overflow Vulnerability | exploitation_technique | T1574 | Hijack Execution Flow | Comments This buffer overflow vulnerability allows adversaries to remotely execute arbitrary code via specially crafted requests.
Adversaries have been observed adding accounts to config files References | 
| CVE-2023-27997 | Fortinet FortiOS and FortiProxy SSL-VPN Heap-Based Buffer Overflow Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application | Comments This buffer overflow vulnerability allows adversaries to remotely execute arbitrary code via specially crafted requests.
Adversaries have been observed adding accounts to config files References | 
| CVE-2023-6549 | Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability | primary_impact | T1499 | Endpoint Denial of Service | Comments This buffer overflow vulnerability can be exploited to cause a denial of service. References | 
| CVE-2023-6549 | Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability | exploitation_technique | T1574 | Hijack Execution Flow | Comments This buffer overflow vulnerability can be exploited to cause a denial of service. References | 
| CVE-2023-4966 | Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability | secondary_impact | T1134.001 | Token Impersonation/Theft | Comments This is a buffer overflow vulnerability that results in unauthorized disclosure of memory, including session tokens. References | 
| CVE-2023-4966 | Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability | primary_impact | T1005 | Data from Local System | Comments This is a buffer overflow vulnerability that results in unauthorized disclosure of memory, including session tokens. References | 
| CVE-2023-4966 | Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability | exploitation_technique | T1574 | Hijack Execution Flow | Comments This is a buffer overflow vulnerability that results in unauthorized disclosure of memory, including session tokens. References | 
| CVE-2022-20699 | Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability | primary_impact | T1059.004 | Unix Shell | Comments This vulnerability is exploited by a remote, unauthenticated attacker by "sending a specially crafted HTTP request to a vulnerable device that is acting as an SSL VPN Gateway.” This can be performed due to insufficient boundary checks when processing specific HTTP requests. If exploited, this could grant root privileges to the attacker. References | 
| CVE-2022-20699 | Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability | exploitation_technique | T1133 | External Remote Services | Comments This vulnerability is exploited by a remote, unauthenticated attacker by "sending a specially crafted HTTP request to a vulnerable device that is acting as an SSL VPN Gateway.” This can be performed due to insufficient boundary checks when processing specific HTTP requests. If exploited, this could grant root privileges to the attacker. References | 
| CVE-2022-20700 | Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability | primary_impact | T1059.004 | Unix Shell | Comments This vulnerability is exploited by a remote attacker who sends specific commands to a Cisco router that does not have sufficient authorization enforcement mechanisms in place. This could allow the remote attacker to gain root privileges and execute arbitrary commands on the system. References | 
| CVE-2022-20700 | Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application | Comments This vulnerability is exploited by a remote attacker who sends specific commands to a Cisco router that does not have sufficient authorization enforcement mechanisms in place. This could allow the remote attacker to gain root privileges and execute arbitrary commands on the system. References | 
| CVE-2022-20701 | Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability | primary_impact | T1203 | Exploitation for Client Execution | Comments This insufficient authorization vulnerability is exploited by a local attacker who has access to  low-privileged code where they then execute commands within confd_cli at a higher privilege levels. Performing these commands could grant the local attacker root privileges. References | 
| CVE-2022-20701 | Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability | exploitation_technique | T1078 | Valid Accounts | Comments This insufficient authorization vulnerability is exploited by a local attacker who has access to  low-privileged code where they then execute commands within confd_cli at a higher privilege levels. Performing these commands could grant the local attacker root privileges. References | 
| CVE-2022-20708 | Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability | primary_impact | T1068 | Exploitation for Privilege Escalation | Comments This vulnerability is exploited by bypassing user authentication mechanisms via a lack of proper validation of a user-supplied string before executing a system call. This could grant adversaries root access to execute arbitrary code. References 
 | 
| CVE-2022-20708 | Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application | Comments This vulnerability is exploited by bypassing user authentication mechanisms via a lack of proper validation of a user-supplied string before executing a system call. This could grant adversaries root access to execute arbitrary code. References 
 | 
| CVE-2022-20703 | Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability | exploitation_technique | T1203 | Exploitation for Client Execution | Comments This Digital Signature Verification Bypass vulnerability is exploited by an unauthenticated, local attacker. The attacker exploits an improper verification of software images that could allow the attacker to install and boot malicious images or execute unsigned binaries. References | 
| CVE-2021-22894 | Ivanti Pulse Connect Secure Collaboration Suite Buffer Overflow Vulnerability | primary_impact | T1059 | Command and Scripting Interpreter | Comments This vulnerability is exploited through a buffer overflow weakness. Remote authenticated attackers leverage this vulnerability to perform arbitrary code execution with root privileges on the Pulse Connect Secure gateway by manipulating input buffers. References | 
| CVE-2021-22894 | Ivanti Pulse Connect Secure Collaboration Suite Buffer Overflow Vulnerability | exploitation_technique | T1078 | Valid Accounts | Comments This vulnerability is exploited through a buffer overflow weakness. Remote authenticated attackers leverage this vulnerability to perform arbitrary code execution with root privileges on the Pulse Connect Secure gateway by manipulating input buffers. References | 
| CVE-2023-5217 | Google Chromium libvpx Heap Buffer Overflow Vulnerability | primary_impact | T1574 | Hijack Execution Flow | Comments This vulnerability was exploited by a remote attacker using a crafted HTML page to trigger a heap buffer overflow in the vp8 encoding of libvpx, leading to heap corruption. This flaw was part of a spyware campaign. The exploitation allowed for program crashes or arbitrary code execution, ultimately resulting in the installation of spyware. References 
 | 
| CVE-2023-5217 | Google Chromium libvpx Heap Buffer Overflow Vulnerability | exploitation_technique | T1204.001 | Malicious Link | Comments This vulnerability was exploited by a remote attacker using a crafted HTML page to trigger a heap buffer overflow in the vp8 encoding of libvpx, leading to heap corruption. This flaw was part of a spyware campaign. The exploitation allowed for program crashes or arbitrary code execution, ultimately resulting in the installation of spyware. References 
 | 
| CVE-2023-7024 | Google Chromium WebRTC Heap Buffer Overflow Vulnerability | primary_impact | T1574 | Hijack Execution Flow | Comments This heap buffer overflow vulnerability is exploited by a remote attacker via a crafted HTML page. This vulnerability has been leveraged by the NSO group to enable remote code execution within a browser's WebRTC component to install the spyware Pegasus on victim endpoints. References | 
| CVE-2023-7024 | Google Chromium WebRTC Heap Buffer Overflow Vulnerability | exploitation_technique | T1189 | Drive-by Compromise | Comments This heap buffer overflow vulnerability is exploited by a remote attacker via a crafted HTML page. This vulnerability has been leveraged by the NSO group to enable remote code execution within a browser's WebRTC component to install the spyware Pegasus on victim endpoints. References |