AC-16 |
Security and Privacy Attributes |
Protects |
T1565 |
Data Manipulation |
AC-17 |
Remote Access |
Protects |
T1565 |
Data Manipulation |
AC-18 |
Wireless Access |
Protects |
T1565 |
Data Manipulation |
AC-19 |
Access Control for Mobile Devices |
Protects |
T1565 |
Data Manipulation |
AC-20 |
Use of External Systems |
Protects |
T1565 |
Data Manipulation |
AC-3 |
Access Enforcement |
Protects |
T1565 |
Data Manipulation |
AC-4 |
Information Flow Enforcement |
Protects |
T1565 |
Data Manipulation |
CA-7 |
Continuous Monitoring |
Protects |
T1565 |
Data Manipulation |
CM-2 |
Baseline Configuration |
Protects |
T1565 |
Data Manipulation |
CM-6 |
Configuration Settings |
Protects |
T1565 |
Data Manipulation |
CM-7 |
Least Functionality |
Protects |
T1565 |
Data Manipulation |
CM-8 |
System Component Inventory |
Protects |
T1565 |
Data Manipulation |
CP-10 |
System Recovery and Reconstitution |
Protects |
T1565 |
Data Manipulation |
CP-6 |
Alternate Storage Site |
Protects |
T1565 |
Data Manipulation |
CP-7 |
Alternate Processing Site |
Protects |
T1565 |
Data Manipulation |
CP-9 |
System Backup |
Protects |
T1565 |
Data Manipulation |
SC-28 |
Protection of Information at Rest |
Protects |
T1565 |
Data Manipulation |
SC-36 |
Distributed Processing and Storage |
Protects |
T1565 |
Data Manipulation |
SC-4 |
Information in Shared System Resources |
Protects |
T1565 |
Data Manipulation |
SC-46 |
Cross Domain Policy Enforcement |
Protects |
T1565 |
Data Manipulation |
SC-7 |
Boundary Protection |
Protects |
T1565 |
Data Manipulation |
SI-12 |
Information Management and Retention |
Protects |
T1565 |
Data Manipulation |
SI-16 |
Memory Protection |
Protects |
T1565 |
Data Manipulation |
SI-23 |
Information Fragmentation |
Protects |
T1565 |
Data Manipulation |
SI-4 |
System Monitoring |
Protects |
T1565 |
Data Manipulation |
SI-7 |
Software, Firmware, and Information Integrity |
Protects |
T1565 |
Data Manipulation |
CVE-2020-15109 |
solidus |
secondary_impact |
T1565 |
Data Manipulation |
CVE-2020-5225 |
SimpleSAMLphp |
secondary_impact |
T1565 |
Data Manipulation |
CVE-2020-1111 |
Windows |
secondary_impact |
T1565 |
Data Manipulation |
CVE-2018-8355 |
ChakraCore |
secondary_impact |
T1565 |
Data Manipulation |
CVE-2020-0671 |
Windows |
secondary_impact |
T1565 |
Data Manipulation |
CVE-2019-1270 |
Windows |
primary_impact |
T1565 |
Data Manipulation |
CVE-2019-1118 |
Windows |
secondary_impact |
T1565 |
Data Manipulation |
CVE-2020-1456 |
Microsoft SharePoint Enterprise Server |
secondary_impact |
T1565 |
Data Manipulation |
CVE-2020-1109 |
Windows |
secondary_impact |
T1565 |
Data Manipulation |
CVE-2020-1068 |
Windows |
primary_impact |
T1565 |
Data Manipulation |
CVE-2020-1495 |
Microsoft SharePoint Server 2010 Service Pack 2 |
secondary_impact |
T1565 |
Data Manipulation |
CVE-2018-8248 |
Microsoft Office |
secondary_impact |
T1565 |
Data Manipulation |
CVE-2018-8111 |
Microsoft Edge |
secondary_impact |
T1565 |
Data Manipulation |
CVE-2018-8607 |
Microsoft Dynamics 365 |
secondary_impact |
T1565 |
Data Manipulation |
CVE-2020-1569 |
Microsoft Edge (EdgeHTML-based) |
secondary_impact |
T1565 |
Data Manipulation |
CVE-2019-1423 |
Windows 10 Version 1903 for 32-bit Systems |
primary_impact |
T1565 |
Data Manipulation |
CVE-2020-16874 |
Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6) |
secondary_impact |
T1565 |
Data Manipulation |
CVE-2019-0609 |
Internet Explorer 11 |
secondary_impact |
T1565 |
Data Manipulation |
CVE-2018-8353 |
n/a |
secondary_impact |
T1565 |
Data Manipulation |
CVE-2018-8110 |
Microsoft Edge |
secondary_impact |
T1565 |
Data Manipulation |
CVE-2018-8575 |
Microsoft Project |
secondary_impact |
T1565 |
Data Manipulation |
CVE-2019-1031 |
Microsoft SharePoint Foundation |
secondary_impact |
T1565 |
Data Manipulation |
CVE-2018-8431 |
Microsoft SharePoint Server |
secondary_impact |
T1565 |
Data Manipulation |
CVE-2019-15821 |
n/a |
uncategorized |
T1565 |
Data Manipulation |
CVE-2012-0158 |
n/a |
uncategorized |
T1565 |
Data Manipulation |
CVE-2020-6974 |
Honeywell Notifier Web Server (NWS) |
uncategorized |
T1565 |
Data Manipulation |
CVE-2020-9459 |
n/a |
uncategorized |
T1565 |
Data Manipulation |
CVE-2013-4335 |
opOpenSocialPlugin |
uncategorized |
T1565 |
Data Manipulation |
CVE-2018-8337 |
Windows 10 |
uncategorized |
T1565 |
Data Manipulation |
CVE-2018-18667 |
n/a |
uncategorized |
T1565 |
Data Manipulation |
CVE-2018-17877 |
n/a |
uncategorized |
T1565 |
Data Manipulation |
CVE-2018-19831 |
n/a |
uncategorized |
T1565 |
Data Manipulation |
CVE-2018-19830 |
n/a |
uncategorized |
T1565 |
Data Manipulation |
attribute.integrity.variety.Modify data |
Modified stored data or content |
related-to |
T1565 |
Data Manipulation |
aws_rds |
AWS RDS |
technique_scores |
T1565 |
Data Manipulation |
aws_rds |
AWS RDS |
technique_scores |
T1565 |
Data Manipulation |
amazon_guardduty |
Amazon GuardDuty |
technique_scores |
T1565 |
Data Manipulation |
aws_cloudendure_disaster_recovery |
AWS CloudEndure Disaster Recovery |
technique_scores |
T1565 |
Data Manipulation |
amazon_virtual_private_cloud |
Amazon Virtual Private Cloud |
technique_scores |
T1565 |
Data Manipulation |