AC-4 |
Information Flow Enforcement |
Protects |
T1189 |
Drive-by Compromise |
AC-6 |
Least Privilege |
Protects |
T1189 |
Drive-by Compromise |
CA-7 |
Continuous Monitoring |
Protects |
T1189 |
Drive-by Compromise |
CM-2 |
Baseline Configuration |
Protects |
T1189 |
Drive-by Compromise |
CM-6 |
Configuration Settings |
Protects |
T1189 |
Drive-by Compromise |
CM-8 |
System Component Inventory |
Protects |
T1189 |
Drive-by Compromise |
SA-22 |
Unsupported System Components |
Protects |
T1189 |
Drive-by Compromise |
SC-18 |
Mobile Code |
Protects |
T1189 |
Drive-by Compromise |
SC-2 |
Separation of System and User Functionality |
Protects |
T1189 |
Drive-by Compromise |
SC-29 |
Heterogeneity |
Protects |
T1189 |
Drive-by Compromise |
SC-3 |
Security Function Isolation |
Protects |
T1189 |
Drive-by Compromise |
SC-30 |
Concealment and Misdirection |
Protects |
T1189 |
Drive-by Compromise |
SC-39 |
Process Isolation |
Protects |
T1189 |
Drive-by Compromise |
SC-7 |
Boundary Protection |
Protects |
T1189 |
Drive-by Compromise |
SI-2 |
Flaw Remediation |
Protects |
T1189 |
Drive-by Compromise |
SI-3 |
Malicious Code Protection |
Protects |
T1189 |
Drive-by Compromise |
SI-4 |
System Monitoring |
Protects |
T1189 |
Drive-by Compromise |
SI-7 |
Software, Firmware, and Information Integrity |
Protects |
T1189 |
Drive-by Compromise |
CVE-2019-15280 |
Cisco Firepower Management Center |
exploitation_technique |
T1189 |
Drive-by Compromise |
CVE-2019-1943 |
Cisco Small Business 300 Series Managed Switches |
secondary_impact |
T1189 |
Drive-by Compromise |
CVE-2019-15974 |
Cisco Managed Services Accelerator |
secondary_impact |
T1189 |
Drive-by Compromise |
CVE-2019-15276 |
Cisco Wireless LAN Controller (WLC) |
exploitation_technique |
T1189 |
Drive-by Compromise |
CVE-2019-1915 |
Cisco Unified Communications Manager |
exploitation_technique |
T1189 |
Drive-by Compromise |
CVE-2020-3198 |
Cisco IOS 12.2(60)EZ16 |
exploitation_technique |
T1189 |
Drive-by Compromise |
CVE-2020-5339 |
RSA Authentication Manager |
exploitation_technique |
T1189 |
Drive-by Compromise |
CVE-2019-18578 |
XtremIO |
exploitation_technique |
T1189 |
Drive-by Compromise |
CVE-2020-5340 |
RSA Authentication Manager |
exploitation_technique |
T1189 |
Drive-by Compromise |
CVE-2018-11059 |
RSA Archer |
exploitation_technique |
T1189 |
Drive-by Compromise |
CVE-2018-11073 |
Authentication Manager |
exploitation_technique |
T1189 |
Drive-by Compromise |
CVE-2020-11036 |
GLPI |
exploitation_technique |
T1189 |
Drive-by Compromise |
CVE-2020-5290 |
rctf |
exploitation_technique |
T1189 |
Drive-by Compromise |
CVE-2020-11054 |
qutebrowser |
exploitation_technique |
T1189 |
Drive-by Compromise |
CVE-2020-4068 |
APNSwift |
exploitation_technique |
T1189 |
Drive-by Compromise |
CVE-2020-5266 |
ps_linklist |
exploitation_technique |
T1189 |
Drive-by Compromise |
CVE-2019-0911 |
Internet Explorer 11 |
exploitation_technique |
T1189 |
Drive-by Compromise |
CVE-2018-8355 |
ChakraCore |
exploitation_technique |
T1189 |
Drive-by Compromise |
CVE-2019-1118 |
Windows |
exploitation_technique |
T1189 |
Drive-by Compromise |
CVE-2018-8248 |
Microsoft Office |
exploitation_technique |
T1189 |
Drive-by Compromise |
CVE-2019-1106 |
Microsoft Edge |
exploitation_technique |
T1189 |
Drive-by Compromise |
CVE-2019-0926 |
Microsoft Edge |
exploitation_technique |
T1189 |
Drive-by Compromise |
CVE-2019-1052 |
Microsoft Edge |
exploitation_technique |
T1189 |
Drive-by Compromise |
CVE-2020-6820 |
Thunderbird |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2019-9978 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2013-0707 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2016-3298 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2012-4681 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2012-0158 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2020-6418 |
Chrome |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2020-5902 |
BIG-IP |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2019-7286 |
iOS |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2019-18935 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2019-17026 |
Firefox ESR |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2019-13720 |
Chrome |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2019-11886 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2018-9206 |
Blueimp jQuery-File-Upload |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2018-8174 |
Windows 7 |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2018-8120 |
Windows Server 2008 |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2018-0798 |
Equation Editor |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2016-4656 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2016-1409 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2015-2590 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2015-2425 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2014-2817 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2014-0324 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2014-0307 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2013-5211 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2013-2471 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2013-1493 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2013-0625 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2013-0422 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2011-3402 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2010-1423 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2010-1165 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2009-1862 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2009-1807 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2009-1151 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2015-1641 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2020-11901 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2016-7256 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2016-3714 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2015-0071 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2014-4123 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2014-0266 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2010-1885 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2009-3459 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2020-13125 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2014-7187 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2011-3544 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2016-0034 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2015-7756 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2015-2426 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2018-0802 |
Equation Editor |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2015-2424 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2012-2539 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2017-0022 |
XML Core Services |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2020-6819 |
Thunderbird |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2020-10257 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2017-15919 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2017-0222 |
Internet Explorer |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2017-0149 |
Internet Explorer |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2016-9079 |
Firefox |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2016-7189 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2016-3393 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2015-5123 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2015-2502 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2015-2419 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2014-6332 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2014-1815 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2013-2465 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2013-2423 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2012-3213 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2010-3971 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2009-1136 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2014-1776 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2013-3918 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
action.malware.vector.Web application - drive-by |
Web via auto-executed or "drive-by" infection. Child of 'Web application'. |
related-to |
T1189 |
Drive-by Compromise |
amazon_guardduty |
Amazon GuardDuty |
technique_scores |
T1189 |
Drive-by Compromise |
amazon_inspector |
Amazon Inspector |
technique_scores |
T1189 |
Drive-by Compromise |
aws_web_application_firewall |
AWS Web Application Firewall |
technique_scores |
T1189 |
Drive-by Compromise |