Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
CVE-2024-4978 | Justice AV Solutions (JAVS) Viewer Installer Embedded Malicious Code Vulnerability | secondary_impact | T1005 | Data from Local System |
Comments
CVE-2024-4978 is a vulnerability where compromised software is signed and hosted on the legitimate software distribution website. Adversaries have been observed to use this backdoored software to install additional tools on target machines. The adversary-installed software establishing persistent communications with a command-and-control (C2) server using Windows sockets and WinHTTP requests. Once successfully connected, it transmits data about the compromised host, including hostname, operating system details, processor architecture, program working directory and the user name to the C2.
References
|
CVE-2024-4978 | Justice AV Solutions (JAVS) Viewer Installer Embedded Malicious Code Vulnerability | secondary_impact | T1071.001 | Web Protocols |
Comments
CVE-2024-4978 is a vulnerability where compromised software is signed and hosted on the legitimate software distribution website. Adversaries have been observed to use this backdoored software to install additional tools on target machines. The adversary-installed software establishing persistent communications with a command-and-control (C2) server using Windows sockets and WinHTTP requests. Once successfully connected, it transmits data about the compromised host, including hostname, operating system details, processor architecture, program working directory and the user name to the C2.
References
|
CVE-2024-4978 | Justice AV Solutions (JAVS) Viewer Installer Embedded Malicious Code Vulnerability | primary_impact | T1105 | Ingress Tool Transfer |
Comments
CVE-2024-4978 is a vulnerability where compromised software is signed and hosted on the legitimate software distribution website. Adversaries have been observed to use this backdoored software to install additional tools on target machines. The adversary-installed software establishing persistent communications with a command-and-control (C2) server using Windows sockets and WinHTTP requests. Once successfully connected, it transmits data about the compromised host, including hostname, operating system details, processor architecture, program working directory and the user name to the C2.
References
|
CVE-2024-4978 | Justice AV Solutions (JAVS) Viewer Installer Embedded Malicious Code Vulnerability | exploitation_technique | T1195.002 | Compromise Software Supply Chain |
Comments
CVE-2024-4978 is a vulnerability where compromised software is signed and hosted on the legitimate software distribution website. Adversaries have been observed to use this backdoored software to install additional tools on target machines. The adversary-installed software establishing persistent communications with a command-and-control (C2) server using Windows sockets and WinHTTP requests. Once successfully connected, it transmits data about the compromised host, including hostname, operating system details, processor architecture, program working directory and the user name to the C2.
References
|
CVE-2024-23692 | Rejetto HTTP File Server Improper Neutralization of Special Elements Used in a Template Engine Vulnerability | secondary_impact | T1496 | Resource Hijacking |
Comments
CVE-2024-23692 is a OS command injection vulnerability within the HTTP File Server (HFS) process for Rejetto. It has been reported to be exploited by threat actors to deploy cryptomining malware, install backdoors, Remote Access Trojans (RATs), and other malware like “GoThief” to exfiltrate sensitive data.
References
|
CVE-2024-23692 | Rejetto HTTP File Server Improper Neutralization of Special Elements Used in a Template Engine Vulnerability | secondary_impact | T1005 | Data from Local System |
Comments
CVE-2024-23692 is a OS command injection vulnerability within the HTTP File Server (HFS) process for Rejetto. It has been reported to be exploited by threat actors to deploy cryptomining malware, install backdoors, Remote Access Trojans (RATs), and other malware like “GoThief” to exfiltrate sensitive data.
References
|
CVE-2024-23692 | Rejetto HTTP File Server Improper Neutralization of Special Elements Used in a Template Engine Vulnerability | secondary_impact | T1105 | Ingress Tool Transfer |
Comments
CVE-2024-23692 is a OS command injection vulnerability within the HTTP File Server (HFS) process for Rejetto. It has been reported to be exploited by threat actors to deploy cryptomining malware, install backdoors, Remote Access Trojans (RATs), and other malware like “GoThief” to exfiltrate sensitive data.
References
|
CVE-2024-23692 | Rejetto HTTP File Server Improper Neutralization of Special Elements Used in a Template Engine Vulnerability | primary_impact | T1082 | System Information Discovery |
Comments
CVE-2024-23692 is a OS command injection vulnerability within the HTTP File Server (HFS) process for Rejetto. It has been reported to be exploited by threat actors to deploy cryptomining malware, install backdoors, Remote Access Trojans (RATs), and other malware like “GoThief” to exfiltrate sensitive data.
References
|
CVE-2024-23692 | Rejetto HTTP File Server Improper Neutralization of Special Elements Used in a Template Engine Vulnerability | exploitation_technique | T1221 | Template Injection |
Comments
CVE-2024-23692 is a OS command injection vulnerability within the HTTP File Server (HFS) process for Rejetto. It has been reported to be exploited by threat actors to deploy cryptomining malware, install backdoors, Remote Access Trojans (RATs), and other malware like “GoThief” to exfiltrate sensitive data.
References
|
CVE-2023-44487 | HTTP/2 Rapid Reset Attack Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
This vulnerability is exploited through a 'Rapid Reset' flaw in HTTP/2 endpoints. Attackers initiate this vulnerability by sending a crafted sequence of HTTP requests using HEADERS followed by RST_STREAM frames. This allows them to generate substantial traffic on targeted servers, significantly increasing CPU usage and leading to resource exhaustion without authentication.
References
|
CVE-2023-44487 | HTTP/2 Rapid Reset Attack Vulnerability | primary_impact | T1499 | Endpoint Denial of Service |
Comments
This vulnerability is exploited through a 'Rapid Reset' flaw in HTTP/2 endpoints. Attackers initiate this vulnerability by sending a crafted sequence of HTTP requests using HEADERS followed by RST_STREAM frames. This allows them to generate substantial traffic on targeted servers, significantly increasing CPU usage and leading to resource exhaustion without authentication.
References
|
CVE-2023-36845 | Juniper Junos OS EX Series and SRX Series PHP External Variable Modification Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
This vulnerability is exploited through a PHP External Variable Modification flaw in the J-Web interface of Juniper Networks Junos OS, affecting EX Series switches and SRX Series firewalls. Attackers leverage this vulnerability to gain initial access by crafting a request that sets the PHPRC variable, thereby altering the PHP execution environment. This manipulation enables the injection and execution of arbitrary code. By exploiting the auto_prepend_file and allow_url_include PHP features, attackers can include a base64 encoded PHP payload using the data:// wrapper. This method allows them to execute code within a confined FreeBSD jail environment, with the potential to escalate privileges by stealing authentication tokens from a user logged into the J-Web application, ultimately enabling unauthorized SSH access with elevated privileges.
References
|
CVE-2023-36845 | Juniper Junos OS EX Series and SRX Series PHP External Variable Modification Vulnerability | primary_impact | T1059 | Command and Scripting Interpreter |
Comments
This vulnerability is exploited through a PHP External Variable Modification flaw in the J-Web interface of Juniper Networks Junos OS, affecting EX Series switches and SRX Series firewalls. Attackers leverage this vulnerability to gain initial access by crafting a request that sets the PHPRC variable, thereby altering the PHP execution environment. This manipulation enables the injection and execution of arbitrary code. By exploiting the auto_prepend_file and allow_url_include PHP features, attackers can include a base64 encoded PHP payload using the data:// wrapper. This method allows them to execute code within a confined FreeBSD jail environment, with the potential to escalate privileges by stealing authentication tokens from a user logged into the J-Web application, ultimately enabling unauthorized SSH access with elevated privileges.
References
|
CVE-2023-36844 | Juniper Junos OS EX Series PHP External Variable Modification Vulnerability | primary_impact | T1190 | Exploit Public-Facing Application |
Comments
This vulnerability is exploited through a PHP External Variable Modification flaw in the J-Web component of Juniper Networks Junos OS on EX Series devices. Attackers first use this vulnerability to gain control over certain environment variables by sending a crafted request, which allows them to manipulate these variables without authentication.
References
|
CVE-2023-36844 | Juniper Junos OS EX Series PHP External Variable Modification Vulnerability | exploitation_technique | T1203 | Exploitation for Client Execution |
Comments
This vulnerability is exploited through a PHP External Variable Modification flaw in the J-Web component of Juniper Networks Junos OS on EX Series devices. Attackers first use this vulnerability to gain control over certain environment variables by sending a crafted request, which allows them to manipulate these variables without authentication.
References
|
CVE-2022-20821 | Cisco IOS XR Open Port Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
This vulnerability is exploited by an unauthenticated, remote user who can access the Redis instance via port 6379 due to a health check RPM issue in IOS XR software. A successful exploitation of this vulnerability could allow an attacker the ability to write to the Redis in-memory database, write arbitrary files to the file system, or retrieve information about the Redis database. This vulnerability has been identified as being exploited in the wild, but specific details have not been released.
References
|
CVE-2020-8515 | Multiple DrayTek Vigor Routers Web Management Page Vulnerability | secondary_impact | T1496 | Resource Hijacking |
Comments
CVE-2020-8515 is a command injection vulnerability affecting certain DrayTek devices, This vulnerability allows an attacker to make arbitrary commands on the affected devices without authentication. Successful exploitation has been reported leading to resource hijacking for botnet use.
References
|
CVE-2020-8515 | Multiple DrayTek Vigor Routers Web Management Page Vulnerability | primary_impact | T1059 | Command and Scripting Interpreter |
Comments
CVE-2020-8515 is a command injection vulnerability affecting certain DrayTek devices, This vulnerability allows an attacker to make arbitrary commands on the affected devices without authentication. Successful exploitation has been reported leading to resource hijacking for botnet use.
References
|
CVE-2020-8515 | Multiple DrayTek Vigor Routers Web Management Page Vulnerability | exploitation_technique | T1133 | External Remote Services |
Comments
CVE-2020-8515 is a command injection vulnerability affecting certain DrayTek devices, This vulnerability allows an attacker to make arbitrary commands on the affected devices without authentication. Successful exploitation has been reported leading to resource hijacking for botnet use.
References
|
CVE-2009-1862 | Adobe Acrobat and Reader, Flash Player Unspecified Vulnerability | exploitation_technique | T1204.002 | Malicious File |
Comments
This vulnerability is exploited through a user opening a maliciously-crafted pdf file or swf file.
References
|
CVE-2008-0655 | Adobe Acrobat and Reader Unspecified Vulnerability | exploitation_technique | T1204.002 | Malicious File |
Comments
This vulnerability is exploited by having a user open a maliciously-crafted pdf file.
References
|
CVE-2025-0111 | Palo Alto Networks PAN-OS File Read Vulnerability | exploitation_technique | T1068 | Exploitation for Privilege Escalation |
Comments
This exploit is part of a chain of exploits (with CVE-2025-0108 and CVE-2024-9474) that can end with an attacker gaining root access to the system. After bypassing authentication with CVE-2025-0108, the attacker can exploit this to gain read access to system files with "nobody" privileges.
References
|
CVE-2025-0111 | Palo Alto Networks PAN-OS File Read Vulnerability | primary_impact | T1005 | Data from Local System |
Comments
This exploit is part of a chain of exploits (with CVE-2025-0108 and CVE-2024-9474) that can end with an attacker gaining root access to the system. After bypassing authentication with CVE-2025-0108, the attacker can exploit this to gain read access to system files with "nobody" privileges.
References
|
CVE-2024-58136 | Yiiframework Yii Improper Protection of Alternate Path Vulnerability | exploitation_technique | T1055 | Process Injection |
Comments
The Yii2 PHP framework, prior to version 2.0.52, contains an improper validation flaw that allows an attacker to input arbitrary PHP classes to a JSON file, which will then be instantiated and executed. This can lead to remote code execution and server-side request forgery, among other potential impacts.
References
|
CVE-2024-58136 | Yiiframework Yii Improper Protection of Alternate Path Vulnerability | primary_impact | T1059 | Command and Scripting Interpreter |
Comments
The Yii2 PHP framework, prior to version 2.0.52, contains an improper validation flaw that allows an attacker to input arbitrary PHP classes to a JSON file, which will then be instantiated and executed. This can lead to remote code execution and server-side request forgery, among other potential impacts.
References
|
CVE-2024-45195 | Apache OFBiz Forced Browsing Vulnerability | exploitation_technique | T1133 | External Remote Services |
Comments
Insufficient authorization checks in affected Apache OFBiz versions (before 18.12.16) allow an attacker running their own server to send POST requests that instruct the OFBiz server to fetch malicious files from the attacker's server. The attacker can then send another request that triggers the malicious files to run arbitrary code.
References
|
CVE-2024-45195 | Apache OFBiz Forced Browsing Vulnerability | exploitation_technique | T1203 | Exploitation for Client Execution |
Comments
Insufficient authorization checks in affected Apache OFBiz versions (before 18.12.16) allow an attacker running their own server to send POST requests that instruct the OFBiz server to fetch malicious files from the attacker's server. The attacker can then send another request that triggers the malicious files to run arbitrary code.
References
|
CVE-2024-45195 | Apache OFBiz Forced Browsing Vulnerability | primary_impact | T1059 | Command and Scripting Interpreter |
Comments
Insufficient authorization checks in affected Apache OFBiz versions (before 18.12.16) allow an attacker running their own server to send POST requests that instruct the OFBiz server to fetch malicious files from the attacker's server. The attacker can then send another request that triggers the malicious files to run arbitrary code.
References
|
CVE-2024-45195 | Apache OFBiz Forced Browsing Vulnerability | secondary_impact | T1498.001 | Direct Network Flood |
Comments
Insufficient authorization checks in affected Apache OFBiz versions (before 18.12.16) allow an attacker running their own server to send POST requests that instruct the OFBiz server to fetch malicious files from the attacker's server. The attacker can then send another request that triggers the malicious files to run arbitrary code.
References
|
CVE-2024-38475 | Apache HTTP Server Improper Escaping of Output Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
Improper escaping in Apache HTTP Server versions 2.4.59 and before permits code execution or disclosure of source code, as well as session hijacking and a potential full system compromise. An attacker can use a crafted URL to perform a traversal attack to trick the Apache server into reading sensitive files.
References
|
CVE-2024-38475 | Apache HTTP Server Improper Escaping of Output Vulnerability | primary_impact | T1059 | Command and Scripting Interpreter |
Comments
Improper escaping in Apache HTTP Server versions 2.4.59 and before permits code execution or disclosure of source code, as well as session hijacking and a potential full system compromise. An attacker can use a crafted URL to perform a traversal attack to trick the Apache server into reading sensitive files.
References
|
CVE-2024-38475 | Apache HTTP Server Improper Escaping of Output Vulnerability | primary_impact | T1528 | Steal Application Access Token |
Comments
Improper escaping in Apache HTTP Server versions 2.4.59 and before permits code execution or disclosure of source code, as well as session hijacking and a potential full system compromise. An attacker can use a crafted URL to perform a traversal attack to trick the Apache server into reading sensitive files.
References
|
CVE-2024-38475 | Apache HTTP Server Improper Escaping of Output Vulnerability | primary_impact | T1005 | Data from Local System |
Comments
Improper escaping in Apache HTTP Server versions 2.4.59 and before permits code execution or disclosure of source code, as well as session hijacking and a potential full system compromise. An attacker can use a crafted URL to perform a traversal attack to trick the Apache server into reading sensitive files.
References
|
CVE-2024-29059 | Microsoft .NET Framework Information Disclosure Vulnerability | exploitation_technique | T1068 | Exploitation for Privilege Escalation |
Comments
This information disclosure vulnerability allows an attacker to gain access to ObjRef URI, which can be leveraged to facilitate remote code execution and privilege escalation.
References
|
CVE-2024-29059 | Microsoft .NET Framework Information Disclosure Vulnerability | primary_impact | T1059 | Command and Scripting Interpreter |
Comments
This information disclosure vulnerability allows an attacker to gain access to ObjRef URI, which can be leveraged to facilitate remote code execution and privilege escalation.
References
|
CVE-2023-48365 | Qlik Sense HTTP Tunneling Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
This vulnerability stems from improper HTTP header validation, if exploited, allows for remote code execution on affected devices.
References
|
CVE-2023-48365 | Qlik Sense HTTP Tunneling Vulnerability | exploitation_technique | T1133 | External Remote Services |
Comments
This vulnerability stems from improper HTTP header validation, if exploited, allows for remote code execution on affected devices.
References
|
CVE-2023-48365 | Qlik Sense HTTP Tunneling Vulnerability | primary_impact | T1059 | Command and Scripting Interpreter |
Comments
This vulnerability stems from improper HTTP header validation, if exploited, allows for remote code execution on affected devices.
References
|
CVE-2022-23748 | Dante Discovery Process Control Vulnerability | exploitation_technique | T1203 | Exploitation for Client Execution |
Comments
An attacker with local access can exploit a DLL sideloading vulnerability by tricking mDNSResponder.exe into loading a malicious DLL, facilitating arbitrary code execution.
References
|
CVE-2022-23748 | Dante Discovery Process Control Vulnerability | exploitation_technique | T1059 | Command and Scripting Interpreter |
Comments
An attacker with local access can exploit a DLL sideloading vulnerability by tricking mDNSResponder.exe into loading a malicious DLL, facilitating arbitrary code execution.
References
|
CVE-2025-48928 | TeleMessage TM SGNL Exposure of Core Dump File to an Unauthorized Control Sphere Vulnerability | exploitation_technique | T1212 | Exploitation for Credential Access |
Comments
TeleMessage TM SNGL utilizes a JavaServer Pages framework which improperly handles content in heaps and making them functionally the same as a core dump file. Attackers with local access can use this to obtain sensitive information, including credentials.
References
|
CVE-2025-48928 | TeleMessage TM SGNL Exposure of Core Dump File to an Unauthorized Control Sphere Vulnerability | primary_impact | T1005 | Data from Local System |
Comments
TeleMessage TM SNGL utilizes a JavaServer Pages framework which improperly handles content in heaps and making them functionally the same as a core dump file. Attackers with local access can use this to obtain sensitive information, including credentials.
References
|
CVE-2025-48928 | TeleMessage TM SGNL Exposure of Core Dump File to an Unauthorized Control Sphere Vulnerability | primary_impact | T1555 | Credentials from Password Stores |
Comments
TeleMessage TM SNGL utilizes a JavaServer Pages framework which improperly handles content in heaps and making them functionally the same as a core dump file. Attackers with local access can use this to obtain sensitive information, including credentials.
References
|
CVE-2025-48927 | TeleMessage TM SGNL Initialization of a Resource with an Insecure Default Vulnerability | exploitation_technique | T1212 | Exploitation for Credential Access |
Comments
TeleMessage TM SNGL's Spring Boot Actuator exposes the /heapdump endpoint publicly, allowing an unauthenticated attacker to access it.
References
|
CVE-2025-48927 | TeleMessage TM SGNL Initialization of a Resource with an Insecure Default Vulnerability | primary_impact | T1005 | Data from Local System |
Comments
TeleMessage TM SNGL's Spring Boot Actuator exposes the /heapdump endpoint publicly, allowing an unauthenticated attacker to access it.
References
|
CVE-2025-48927 | TeleMessage TM SGNL Initialization of a Resource with an Insecure Default Vulnerability | primary_impact | T1555 | Credentials from Password Stores |
Comments
TeleMessage TM SNGL's Spring Boot Actuator exposes the /heapdump endpoint publicly, allowing an unauthenticated attacker to access it.
References
|
CVE-2025-3928 | Commvault Web Server Unspecified Vulnerability | primary_impact | T1059 | Command and Scripting Interpreter |
Comments
While public technical details of this exploit are limited, including the techniques used, it is known that authenticated, low-privileged attackers were able to achieve remote code execution and web shell deployment.
References
|
CVE-2025-3928 | Commvault Web Server Unspecified Vulnerability | secondary_impact | T1505.003 | Web Shell |
Comments
While public technical details of this exploit are limited, including the techniques used, it is known that authenticated, low-privileged attackers were able to achieve remote code execution and web shell deployment.
References
|
CVE-2025-35939 | Craft CMS External Control of Assumed-Immutable Web Parameter Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
This vulnerability allows an attacker to write arbitrary files to a known location on the target server, including potentially malicious files such as PHP scripts by leveraging the fact that Craft CMS creates session files for unauthenticated users at the login page. However, this vulnerability does not, by itself, cause any scripts to be executed or any information to be accessed, so it would need to be chained with another vulnerability in order to achieve code execution.
References
|
CVE-2025-35939 | Craft CMS External Control of Assumed-Immutable Web Parameter Vulnerability | primary_impact | T1505.003 | Web Shell |
Comments
This vulnerability allows an attacker to write arbitrary files to a known location on the target server, including potentially malicious files such as PHP scripts by leveraging the fact that Craft CMS creates session files for unauthenticated users at the login page. However, this vulnerability does not, by itself, cause any scripts to be executed or any information to be accessed, so it can only write files and would need to be chained with another vulnerability in order to achieve code execution.
References
|
CVE-2025-35939 | Craft CMS External Control of Assumed-Immutable Web Parameter Vulnerability | secondary_impact | T1059 | Command and Scripting Interpreter |
Comments
This vulnerability allows an attacker to write arbitrary files to a known location on the target server, including potentially malicious files such as PHP scripts by leveraging the fact that Craft CMS creates session files for unauthenticated users at the login page. However, this vulnerability does not, by itself, cause any scripts to be executed or any information to be accessed, so it can only write files and would need to be chained with another vulnerability in order to achieve code execution.
References
|
CVE-2025-33053 | Microsoft Windows External Control of File Name or Path Vulnerability | exploitation_technique | T1566.001 | Spearphishing Attachment |
Comments
By manipulating the working directory of Windows processes, attackers can utilize these valid processes and trick them into running arbitrary code from a WebDAV server. This has been done by using a phishing email with a malicious PDF document attached, leading to code execution, the creation of backdoors, the introduction of a keylogger onto the system, and data exfiltration via C2.
References
|
CVE-2025-33053 | Microsoft Windows External Control of File Name or Path Vulnerability | primary_impact | T1059 | Command and Scripting Interpreter |
Comments
By manipulating the working directory of Windows processes, attackers can utilize these valid processes and trick them into running arbitrary code from a WebDAV server. This has been done by using a phishing email with a malicious PDF document attached, leading to code execution, the creation of backdoors, the introduction of a keylogger onto the system, and data exfiltration via C2.
References
|
CVE-2025-33053 | Microsoft Windows External Control of File Name or Path Vulnerability | secondary_impact | T1056.001 | Keylogging |
Comments
By manipulating the working directory of Windows processes, attackers can utilize these valid processes and trick them into running arbitrary code from a WebDAV server. This has been done by using a phishing email with a malicious PDF document attached, leading to code execution, the creation of backdoors, the introduction of a keylogger onto the system, and data exfiltration via C2.
References
|
CVE-2025-33053 | Microsoft Windows External Control of File Name or Path Vulnerability | secondary_impact | T1041 | Exfiltration Over C2 Channel |
Comments
By manipulating the working directory of Windows processes, attackers can utilize these valid processes and trick them into running arbitrary code from a WebDAV server. This has been done by using a phishing email with a malicious PDF document attached, leading to code execution, the creation of backdoors, the introduction of a keylogger onto the system, and data exfiltration via C2.
References
|
CVE-2025-33053 | Microsoft Windows External Control of File Name or Path Vulnerability | secondary_impact | T1543 | Create or Modify System Process |
Comments
By manipulating the working directory of Windows processes, attackers can utilize these valid processes and trick them into running arbitrary code from a WebDAV server. This has been done by using a phishing email with a malicious PDF document attached, leading to code execution, the creation of backdoors, the introduction of a keylogger onto the system, and data exfiltration via C2.
References
|