CVE-2019-15243
|
Cisco SPA112 2-Port Phone Adapter
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-15243
|
Cisco SPA112 2-Port Phone Adapter
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-15243
|
Cisco SPA112 2-Port Phone Adapter
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-15976
|
Cisco Data Center Network Manager
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-15976
|
Cisco Data Center Network Manager
| secondary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-15976
|
Cisco Data Center Network Manager
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-15956
|
Cisco Web Security Appliance (WSA)
| primary_impact |
T1499
|
Endpoint Denial of Service
|
CVE-2019-15956
|
Cisco Web Security Appliance (WSA)
| primary_impact |
T1098
|
Account Manipulation
|
CVE-2019-15956
|
Cisco Web Security Appliance (WSA)
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-15956
|
Cisco Web Security Appliance (WSA)
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-15958
|
Cisco Prime Infrastructure
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-15958
|
Cisco Prime Infrastructure
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-12660
|
Cisco IOS XE Software 3.2.11aSG
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2019-12660
|
Cisco IOS XE Software 3.2.11aSG
| secondary_impact |
T1562
|
Impair Defenses
|
CVE-2019-12660
|
Cisco IOS XE Software 3.2.11aSG
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-1753
|
Cisco IOS XE Software
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-1753
|
Cisco IOS XE Software
| secondary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-1753
|
Cisco IOS XE Software
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-1753
|
Cisco IOS XE Software
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-1860
|
Cisco Unified Intelligence Center
| primary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2019-1860
|
Cisco Unified Intelligence Center
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2019-1831
|
Cisco Email Security Appliance (ESA)
| primary_impact |
T1036
|
Masquerading
|
CVE-2019-1831
|
Cisco Email Security Appliance (ESA)
| secondary_impact |
T1566
|
Phishing
|
CVE-2019-1942
|
Cisco Identity Services Engine Software
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-1942
|
Cisco Identity Services Engine Software
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2019-1942
|
Cisco Identity Services Engine Software
| secondary_impact |
T1565.001
|
Stored Data Manipulation
|
CVE-2019-1942
|
Cisco Identity Services Engine Software
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2019-1942
|
Cisco Identity Services Engine Software
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-15972
|
Cisco Unified Communications Manager
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-15972
|
Cisco Unified Communications Manager
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2019-15972
|
Cisco Unified Communications Manager
| secondary_impact |
T1565.001
|
Stored Data Manipulation
|
CVE-2019-15972
|
Cisco Unified Communications Manager
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2019-15972
|
Cisco Unified Communications Manager
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-16009
|
Cisco IOS 12.2(15)B
| primary_impact |
T1608
|
Stage Capabilities
|
CVE-2019-16009
|
Cisco IOS 12.2(15)B
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2019-1879
|
Cisco Unified Computing System (Management Software)
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-1879
|
Cisco Unified Computing System (Management Software)
| secondary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-1879
|
Cisco Unified Computing System (Management Software)
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-1863
|
Cisco Unified Computing System E-Series Software (UCSE)
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-1863
|
Cisco Unified Computing System E-Series Software (UCSE)
| secondary_impact |
T1565.001
|
Stored Data Manipulation
|
CVE-2019-1863
|
Cisco Unified Computing System E-Series Software (UCSE)
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-1863
|
Cisco Unified Computing System E-Series Software (UCSE)
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2020-3403
|
Cisco IOS XE Software
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-3403
|
Cisco IOS XE Software
| secondary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-3403
|
Cisco IOS XE Software
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-1941
|
Cisco Identity Services Engine Software
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2019-1941
|
Cisco Identity Services Engine Software
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2019-1941
|
Cisco Identity Services Engine Software
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2020-3292
|
Cisco Small Business RV Series Router Firmware
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-3292
|
Cisco Small Business RV Series Router Firmware
| secondary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-3292
|
Cisco Small Business RV Series Router Firmware
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3292
|
Cisco Small Business RV Series Router Firmware
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2018-15397
|
Cisco Adaptive Security Appliance (ASA) Software
| primary_impact |
T1529
|
System Shutdown/Reboot
|
CVE-2018-15397
|
Cisco Adaptive Security Appliance (ASA) Software
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3253
|
Cisco Firepower Threat Defense Software
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-3253
|
Cisco Firepower Threat Defense Software
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-1838
|
Cisco Application Policy Infrastructure Controller (APIC)
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2019-1838
|
Cisco Application Policy Infrastructure Controller (APIC)
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2019-1838
|
Cisco Application Policy Infrastructure Controller (APIC)
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2020-3233
|
Cisco IOx
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2020-3233
|
Cisco IOx
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2020-3233
|
Cisco IOx
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2018-15401
|
Cisco Hosted Collaboration Mediation Fulfillment
| primary_impact |
T1608
|
Stage Capabilities
|
CVE-2018-15401
|
Cisco Hosted Collaboration Mediation Fulfillment
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2019-15249
|
Cisco SPA112 2-Port Phone Adapter
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-15249
|
Cisco SPA112 2-Port Phone Adapter
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-15249
|
Cisco SPA112 2-Port Phone Adapter
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-15280
|
Cisco Firepower Management Center
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2019-15280
|
Cisco Firepower Management Center
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2019-15280
|
Cisco Firepower Management Center
| exploitation_technique |
T1189
|
Drive-by Compromise
|
CVE-2019-15288
|
Cisco TelePresence TC Software
| primary_impact |
T1608
|
Stage Capabilities
|
CVE-2019-15288
|
Cisco TelePresence TC Software
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2019-15288
|
Cisco TelePresence TC Software
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-1781
|
Cisco NX-OS Software
| primary_impact |
T1608
|
Stage Capabilities
|
CVE-2019-1781
|
Cisco NX-OS Software
| secondary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-1781
|
Cisco NX-OS Software
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2020-3460
|
Cisco Data Center Network Manager
| primary_impact |
T1565.002
|
Transmitted Data Manipulation
|
CVE-2020-3460
|
Cisco Data Center Network Manager
| secondary_impact |
T1185
|
Man in the Browser
|
CVE-2020-3137
|
Cisco Email Security Appliance (ESA)
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2020-3137
|
Cisco Email Security Appliance (ESA)
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2020-3137
|
Cisco Email Security Appliance (ESA)
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2020-3312
|
Cisco Firepower Threat Defense Software
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-3312
|
Cisco Firepower Threat Defense Software
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-1768
|
Cisco NX-OS Software
| primary_impact |
T1608
|
Stage Capabilities
|
CVE-2019-1768
|
Cisco NX-OS Software
| secondary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-1768
|
Cisco NX-OS Software
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2020-3379
|
Cisco SD-WAN Solution
| primary_impact |
T1608
|
Stage Capabilities
|
CVE-2020-3379
|
Cisco SD-WAN Solution
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-1724
|
Cisco Small Business RV Series Router Firmware
| primary_impact |
T1563
|
Remote Service Session Hijacking
|
CVE-2019-1817
|
Cisco Web Security Appliance (WSA)
| primary_impact |
T1529
|
System Shutdown/Reboot
|
CVE-2019-1817
|
Cisco Web Security Appliance (WSA)
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3477
|
Cisco IOS
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-3477
|
Cisco IOS
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-1794
|
Cisco Directory Connector
| primary_impact |
T1574.008
|
Path Interception by Search Order Hijacking
|
CVE-2019-1794
|
Cisco Directory Connector
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-1620
|
Cisco Data Center Network Manager
| primary_impact |
T1105
|
Ingress Tool Transfer
|
CVE-2019-1620
|
Cisco Data Center Network Manager
| secondary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-3216
|
Cisco IOS XE SD-WAN Software
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-3216
|
Cisco IOS XE SD-WAN Software
| secondary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-3306
|
Cisco Adaptive Security Appliance (ASA) Software
| primary_impact |
T1499
|
Endpoint Denial of Service
|
CVE-2020-3306
|
Cisco Adaptive Security Appliance (ASA) Software
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-1886
|
Cisco Web Security Appliance (WSA)
| primary_impact |
T1489
|
Service Stop
|
CVE-2019-1711
|
Cisco IOS XR Software
| primary_impact |
T1489
|
Service Stop
|
CVE-2020-3375
|
Cisco SD-WAN vManage
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-3375
|
Cisco SD-WAN vManage
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-1857
|
Cisco HyperFlex HX-Series
| primary_impact |
T1608
|
Stage Capabilities
|
CVE-2019-1857
|
Cisco HyperFlex HX-Series
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2019-1703
|
Cisco Firepower Threat Defense Software
| primary_impact |
T1499.002
|
Service Exhaustion Flood
|
CVE-2019-15963
|
Cisco Unity Connection
| primary_impact |
T1005
|
Data from Local System
|
CVE-2019-15963
|
Cisco Unity Connection
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-1689
|
Cisco Webex Teams
| primary_impact |
T1105
|
Ingress Tool Transfer
|
CVE-2019-1689
|
Cisco Webex Teams
| secondary_impact |
T1565.001
|
Stored Data Manipulation
|
CVE-2019-1689
|
Cisco Webex Teams
| secondary_impact |
T1531
|
Account Access Removal
|
CVE-2020-3476
|
Cisco IOS XE Software
| primary_impact |
T1565.001
|
Stored Data Manipulation
|
CVE-2020-3476
|
Cisco IOS XE Software
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2018-15466
|
Cisco Policy Suite (CPS) Software
| primary_impact |
T1608
|
Stage Capabilities
|
CVE-2018-15466
|
Cisco Policy Suite (CPS) Software
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2019-15287
|
Cisco WebEx WRF Player
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-15287
|
Cisco WebEx WRF Player
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2019-15998
|
Cisco IOS XR Software
| primary_impact |
T1133
|
External Remote Services
|
CVE-2019-15998
|
Cisco IOS XR Software
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-1889
|
Cisco Application Policy Infrastructure Controller (APIC)
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-1889
|
Cisco Application Policy Infrastructure Controller (APIC)
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2020-3134
|
Cisco Email Security Appliance (ESA)
| primary_impact |
T1489
|
Service Stop
|
CVE-2019-1736
|
Cisco Identity Services Engine Software
| primary_impact |
T1542.001
|
System Firmware
|
CVE-2020-3120
|
Cisco IOS XR Software
| primary_impact |
T1499
|
Endpoint Denial of Service
|
CVE-2019-1764
|
Cisco Wireless IP Phone 8821 and 8821-EX
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-1764
|
Cisco Wireless IP Phone 8821 and 8821-EX
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2019-1943
|
Cisco Small Business 300 Series Managed Switches
| primary_impact |
T1565.002
|
Transmitted Data Manipulation
|
CVE-2019-1943
|
Cisco Small Business 300 Series Managed Switches
| secondary_impact |
T1189
|
Drive-by Compromise
|
CVE-2019-1943
|
Cisco Small Business 300 Series Managed Switches
| exploitation_technique |
T1557
|
Man-in-the-Middle
|
CVE-2019-1665
|
Cisco HyperFlex HX-Series
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2019-1665
|
Cisco HyperFlex HX-Series
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2019-1665
|
Cisco HyperFlex HX-Series
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2019-15994
|
Cisco Stealthwatch Enterprise
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2019-15994
|
Cisco Stealthwatch Enterprise
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2019-15994
|
Cisco Stealthwatch Enterprise
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2019-1747
|
Cisco IOS and IOS XE Software
| primary_impact |
T1477
|
Exploit via Radio Interfaces
|
CVE-2019-1747
|
Cisco IOS and IOS XE Software
| secondary_impact |
T1489
|
Service Stop
|
CVE-2019-15959
|
Cisco SPA525G2 5-line IP Phone
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-15959
|
Cisco SPA525G2 5-line IP Phone
| exploitation_technique |
T1091
|
Replication Through Removable Media
|
CVE-2019-15974
|
Cisco Managed Services Accelerator
| primary_impact |
T1565.002
|
Transmitted Data Manipulation
|
CVE-2019-15974
|
Cisco Managed Services Accelerator
| secondary_impact |
T1189
|
Drive-by Compromise
|
CVE-2019-1772
|
Cisco WebEx WRF Player
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-1772
|
Cisco WebEx WRF Player
| exploitation_technique |
T1566
|
Phishing
|
CVE-2019-1772
|
Cisco WebEx WRF Player
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2020-3133
|
Cisco Email Security Appliance (ESA)
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3133
|
Cisco Email Security Appliance (ESA)
| exploitation_technique |
T1566.001
|
Spearphishing Attachment
|
CVE-2019-12696
|
Cisco FireSIGHT System Software
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-12696
|
Cisco FireSIGHT System Software
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2020-3387
|
Cisco SD-WAN vManage
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-3387
|
Cisco SD-WAN vManage
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3387
|
Cisco SD-WAN vManage
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2018-15393
|
Cisco Content Security Management Appliance (SMA)
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2018-15393
|
Cisco Content Security Management Appliance (SMA)
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2018-15393
|
Cisco Content Security Management Appliance (SMA)
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2019-1594
|
Nexus 1000V Switch for VMware vSphere
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2019-1594
|
Nexus 1000V Switch for VMware vSphere
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3440
|
Cisco Webex Meetings
| primary_impact |
T1565.001
|
Stored Data Manipulation
|
CVE-2020-3440
|
Cisco Webex Meetings
| exploitation_technique |
T1566
|
Phishing
|
CVE-2020-3440
|
Cisco Webex Meetings
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2019-1876
|
Cisco Wide Area Application Services (WAAS)
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-1876
|
Cisco Wide Area Application Services (WAAS)
| secondary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-3121
|
Cisco 550X Series Stackable Managed Switches
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2020-3121
|
Cisco 550X Series Stackable Managed Switches
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2020-3121
|
Cisco 550X Series Stackable Managed Switches
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2019-1612
|
Nexus 3000 Series Switches
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-1612
|
Nexus 3000 Series Switches
| secondary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-1612
|
Nexus 3000 Series Switches
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-1612
|
Nexus 3000 Series Switches
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2019-1715
|
Cisco Adaptive Security Appliance (ASA) Software
| primary_impact |
T1078
|
Valid Accounts
|
CVE-2019-1715
|
Cisco Adaptive Security Appliance (ASA) Software
| primary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2019-1715
|
Cisco Adaptive Security Appliance (ASA) Software
| primary_impact |
T1040
|
Network Sniffing
|
CVE-2019-1715
|
Cisco Adaptive Security Appliance (ASA) Software
| exploitation_technique |
T1110
|
Brute Force
|
CVE-2019-1609
|
MDS 9000 Series Multilayer Switches
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-1609
|
MDS 9000 Series Multilayer Switches
| secondary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-1609
|
MDS 9000 Series Multilayer Switches
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-1836
|
Cisco NX-OS Software for Nexus 9000 Series Fabric Switches ACI Mode
| primary_impact |
T1565.001
|
Stored Data Manipulation
|
CVE-2019-1836
|
Cisco NX-OS Software for Nexus 9000 Series Fabric Switches ACI Mode
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2019-15289
|
Cisco TelePresence TC Software
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2019-15289
|
Cisco TelePresence TC Software
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2018-15444
|
Cisco Energy Management Suite
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2018-15444
|
Cisco Energy Management Suite
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2018-15444
|
Cisco Energy Management Suite
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2019-1611
|
Firepower 4100 Series Next-Generation Firewalls
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-1611
|
Firepower 4100 Series Next-Generation Firewalls
| secondary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-1611
|
Firepower 4100 Series Next-Generation Firewalls
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2020-3407
|
Cisco IOS XE Software
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-3407
|
Cisco IOS XE Software
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3237
|
Cisco IOx
| primary_impact |
T1565.001
|
Stored Data Manipulation
|
CVE-2020-3237
|
Cisco IOx
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2018-15376
|
Cisco IOS Software
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2018-15376
|
Cisco IOS Software
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2018-15376
|
Cisco IOS Software
| exploitation_technique |
T1566
|
Phishing
|
CVE-2018-15376
|
Cisco IOS Software
| exploitation_technique |
T1091
|
Replication Through Removable Media
|
CVE-2018-15376
|
Cisco IOS Software
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2019-15276
|
Cisco Wireless LAN Controller (WLC)
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2019-15276
|
Cisco Wireless LAN Controller (WLC)
| exploitation_technique |
T1189
|
Drive-by Compromise
|
CVE-2019-15276
|
Cisco Wireless LAN Controller (WLC)
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-15276
|
Cisco Wireless LAN Controller (WLC)
| exploitation_technique |
T1566
|
Phishing
|
CVE-2020-3416
|
Cisco IOS XE Software
| primary_impact |
T1542.004
|
ROMMONkit
|
CVE-2020-3416
|
Cisco IOS XE Software
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2020-3126
|
Cisco Webex Meetings Multimedia Viewer
| primary_impact |
T1080
|
Taint Shared Content
|
CVE-2020-3126
|
Cisco Webex Meetings Multimedia Viewer
| primary_impact |
T1204.002
|
Malicious File
|
CVE-2020-3126
|
Cisco Webex Meetings Multimedia Viewer
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3356
|
Cisco Data Center Network Manager
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2020-3356
|
Cisco Data Center Network Manager
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2020-3356
|
Cisco Data Center Network Manager
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2019-1915
|
Cisco Unified Communications Manager
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-1915
|
Cisco Unified Communications Manager
| secondary_impact |
T1098
|
Account Manipulation
|
CVE-2019-1915
|
Cisco Unified Communications Manager
| exploitation_technique |
T1189
|
Drive-by Compromise
|
CVE-2019-1915
|
Cisco Unified Communications Manager
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-1915
|
Cisco Unified Communications Manager
| exploitation_technique |
T1566
|
Phishing
|
CVE-2019-1915
|
Cisco Unified Communications Manager
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2019-1746
|
Cisco IOS and IOS XE Software
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2019-1746
|
Cisco IOS and IOS XE Software
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3397
|
Cisco NX-OS Software
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-3397
|
Cisco NX-OS Software
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-1812
|
Cisco NX-OS Software
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-1812
|
Cisco NX-OS Software
| secondary_impact |
T1548
|
Abuse Elevation Control Mechanism
|
CVE-2019-1812
|
Cisco NX-OS Software
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2020-3322
|
Cisco Webex Network Recording Player
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-3322
|
Cisco Webex Network Recording Player
| exploitation_technique |
T1566
|
Phishing
|
CVE-2020-3322
|
Cisco Webex Network Recording Player
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2020-3198
|
Cisco IOS 12.2(60)EZ16
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-3198
|
Cisco IOS 12.2(60)EZ16
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-3198
|
Cisco IOS 12.2(60)EZ16
| exploitation_technique |
T1189
|
Drive-by Compromise
|
CVE-2020-3198
|
Cisco IOS 12.2(60)EZ16
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3198
|
Cisco IOS 12.2(60)EZ16
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2020-3198
|
Cisco IOS 12.2(60)EZ16
| exploitation_technique |
T1566
|
Phishing
|
CVE-2020-3198
|
Cisco IOS 12.2(60)EZ16
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2020-3198
|
Cisco IOS 12.2(60)EZ16
| exploitation_technique |
T1091
|
Replication Through Removable Media
|
CVE-2020-3309
|
Cisco Firepower Threat Defense Software
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-3309
|
Cisco Firepower Threat Defense Software
| secondary_impact |
T1565.001
|
Stored Data Manipulation
|
CVE-2020-3309
|
Cisco Firepower Threat Defense Software
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3309
|
Cisco Firepower Threat Defense Software
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2020-3177
|
Cisco Unified Communications Manager
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-3177
|
Cisco Unified Communications Manager
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3510
|
Cisco IOS XE Software
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-3510
|
Cisco IOS XE Software
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3513
|
Cisco IOS XE Software
| primary_impact |
T1542.004
|
ROMMONkit
|
CVE-2020-3513
|
Cisco IOS XE Software
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2020-3409
|
Cisco IOS
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-3409
|
Cisco IOS
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3349
|
Cisco Data Center Network Manager
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2020-3349
|
Cisco Data Center Network Manager
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2020-3349
|
Cisco Data Center Network Manager
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2018-15392
|
Cisco Industrial Network Director
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2018-15392
|
Cisco Industrial Network Director
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2018-15462
|
Cisco Firepower Threat Defense Software
| primary_impact |
T1499
|
Endpoint Denial of Service
|
CVE-2018-15462
|
Cisco Firepower Threat Defense Software
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-1704
|
Cisco Firepower Threat Defense Software
| primary_impact |
T1499
|
Endpoint Denial of Service
|
CVE-2019-1704
|
Cisco Firepower Threat Defense Software
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3244
|
Cisco ASR 5000 Series Software
| primary_impact |
T1211
|
Exploitation for Defense Evasion
|
CVE-2020-3244
|
Cisco ASR 5000 Series Software
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3240
|
Cisco UCS Director
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-3240
|
Cisco UCS Director
| primary_impact |
T1505.003
|
Web Shell
|
CVE-2020-3240
|
Cisco UCS Director
| secondary_impact |
T1003.008
|
/etc/passwd and /etc/shadow
|
CVE-2020-3240
|
Cisco UCS Director
| secondary_impact |
T1552.001
|
Credentials In Files
|
CVE-2020-3240
|
Cisco UCS Director
| secondary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-3240
|
Cisco UCS Director
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2019-1790
|
Cisco NX-OS Software
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-1790
|
Cisco NX-OS Software
| secondary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-1790
|
Cisco NX-OS Software
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2020-5364
|
Isilon OneFS
| primary_impact |
T1078.001
|
Default Accounts
|
CVE-2020-5364
|
Isilon OneFS
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2019-3707
|
iDRAC
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-3735
|
Dell SupportAssist for Business PCs
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-3735
|
Dell SupportAssist for Business PCs
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2018-11048
|
Data Protection Advisor
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2018-11048
|
Data Protection Advisor
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2018-11048
|
Data Protection Advisor
| secondary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2018-11048
|
Data Protection Advisor
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2019-3754
|
Unity Operating Environment
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2019-3754
|
Unity Operating Environment
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2019-3754
|
Unity Operating Environment
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2020-5374
|
OMIMSSC (OpenManage Integration for Microsoft System Center)
| primary_impact |
T1078.001
|
Default Accounts
|
CVE-2018-15771
|
Dell EMC RecoverPoint
| primary_impact |
T1078.001
|
Default Accounts
|
CVE-2018-15771
|
Dell EMC RecoverPoint
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2018-15782
|
RSA Authentication Manager
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2018-15782
|
RSA Authentication Manager
| exploitation_technique |
T1566
|
Phishing
|
CVE-2018-15782
|
RSA Authentication Manager
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2019-3723
|
OpenManage Server Administrator
| primary_impact |
T1485
|
Data Destruction
|
CVE-2019-3723
|
OpenManage Server Administrator
| secondary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-3723
|
OpenManage Server Administrator
| secondary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2019-3723
|
OpenManage Server Administrator
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2018-11045
|
Pivotal Operations Manager
| primary_impact |
T1078
|
Valid Accounts
|
CVE-2018-11045
|
Pivotal Operations Manager
| exploitation_technique |
T1110
|
Brute Force
|
CVE-2020-5345
|
Unisphere for PowerMax
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-5345
|
Unisphere for PowerMax
| exploitation_technique |
T1565.001
|
Stored Data Manipulation
|
CVE-2020-5336
|
RSA Archer
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2020-5336
|
RSA Archer
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2020-5336
|
RSA Archer
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2018-15795
|
CredHub Service Broker
| primary_impact |
T1078
|
Valid Accounts
|
CVE-2018-15795
|
CredHub Service Broker
| exploitation_technique |
T1110
|
Brute Force
|
CVE-2020-5365
|
Isilon OneFS
| primary_impact |
T1078.001
|
Default Accounts
|
CVE-2020-5365
|
Isilon OneFS
| exploitation_technique |
T1110
|
Brute Force
|
CVE-2019-3717
|
Dell Client Commercial and Consumer platforms
| primary_impact |
T1548
|
Abuse Elevation Control Mechanism
|
CVE-2019-3717
|
Dell Client Commercial and Consumer platforms
| exploitation_technique |
T1200
|
Hardware Additions
|
CVE-2019-3732
|
RSA BSAFE Crypto-C Micro Edition
| primary_impact |
T1005
|
Data from Local System
|
CVE-2019-3732
|
RSA BSAFE Crypto-C Micro Edition
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-3731
|
RSA BSAFE Crypto-C Micro Edition
| primary_impact |
T1005
|
Data from Local System
|
CVE-2019-3731
|
RSA BSAFE Crypto-C Micro Edition
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-5326
|
Dell Client Consumer and Commercial Platforms
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-5326
|
Dell Client Consumer and Commercial Platforms
| secondary_impact |
T1542.001
|
System Firmware
|
CVE-2018-15776
|
iDRAC
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2018-15776
|
iDRAC
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-18573
|
RSA Identity Governance & Lifecycle
| primary_impact |
T1563
|
Remote Service Session Hijacking
|
CVE-2019-3727
|
RecoverPoint
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-3727
|
RecoverPoint
| secondary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-3728
|
RSA BSAFE Crypto-C Micro Edition
| primary_impact |
T1489
|
Service Stop
|
CVE-2019-3790
|
Pivotal Ops Manager
| primary_impact |
T1563
|
Remote Service Session Hijacking
|
CVE-2019-3790
|
Pivotal Ops Manager
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-3719
|
SupportAssist Client
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-3719
|
SupportAssist Client
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2018-15764
|
ESRS Policy Manager
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2018-15764
|
ESRS Policy Manager
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2018-11084
|
Garden-runC
| primary_impact |
T1496
|
Resource Hijacking
|
CVE-2020-5339
|
RSA Authentication Manager
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2020-5339
|
RSA Authentication Manager
| secondary_impact |
T1185
|
Man in the Browser
|
CVE-2020-5339
|
RSA Authentication Manager
| exploitation_technique |
T1189
|
Drive-by Compromise
|
CVE-2018-15784
|
Dell Networking OS10
| primary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2020-5386
|
Elastic Cloud Storage
| primary_impact |
T1005
|
Data from Local System
|
CVE-2019-3704
|
VNX Control Station in Dell EMC VNX2 OE for File
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-3704
|
VNX Control Station in Dell EMC VNX2 OE for File
| secondary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-3704
|
VNX Control Station in Dell EMC VNX2 OE for File
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-3799
|
Spring Cloud Config
| primary_impact |
T1005
|
Data from Local System
|
CVE-2019-3799
|
Spring Cloud Config
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-18578
|
XtremIO
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2019-18578
|
XtremIO
| secondary_impact |
T1185
|
Man in the Browser
|
CVE-2019-18578
|
XtremIO
| exploitation_technique |
T1189
|
Drive-by Compromise
|
CVE-2020-5340
|
RSA Authentication Manager
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2020-5340
|
RSA Authentication Manager
| secondary_impact |
T1185
|
Man in the Browser
|
CVE-2020-5340
|
RSA Authentication Manager
| exploitation_technique |
T1189
|
Drive-by Compromise
|
CVE-2020-5358
|
Dell Encryption Enterprise
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-5371
|
Isilon OneFS
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-5371
|
Isilon OneFS
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2019-3758
|
RSA Archer
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-3758
|
RSA Archer
| secondary_impact |
T1136
|
Create Account
|
CVE-2018-11051
|
Certificate Manager Path Traversal Vulnerability
| primary_impact |
T1005
|
Data from Local System
|
CVE-2018-11051
|
Certificate Manager Path Traversal Vulnerability
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-5378
|
CPG BIOS
| primary_impact |
T1542.001
|
System Firmware
|
CVE-2019-3767
|
ImageAssist
| primary_impact |
T1005
|
Data from Local System
|
CVE-2018-15800
|
Bits Service Release
| primary_impact |
T1078
|
Valid Accounts
|
CVE-2018-15800
|
Bits Service Release
| exploitation_technique |
T1110
|
Brute Force
|
CVE-2018-11059
|
RSA Archer
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2018-11059
|
RSA Archer
| secondary_impact |
T1185
|
Man in the Browser
|
CVE-2018-11059
|
RSA Archer
| exploitation_technique |
T1189
|
Drive-by Compromise
|
CVE-2019-3775
|
UAA Release (OSS)
| primary_impact |
T1098
|
Account Manipulation
|
CVE-2018-11075
|
Authentication Manager
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2018-11075
|
Authentication Manager
| secondary_impact |
T1185
|
Man in the Browser
|
CVE-2018-11075
|
Authentication Manager
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2020-5376
|
CPG BIOS
| primary_impact |
T1542.001
|
System Firmware
|
CVE-2018-15761
|
UAA
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2018-15761
|
UAA
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-3787
|
UAA Release (OSS)
| primary_impact |
T1552
|
Unsecured Credentials
|
CVE-2019-3787
|
UAA Release (OSS)
| secondary_impact |
T1078
|
Valid Accounts
|
CVE-2019-3787
|
UAA Release (OSS)
| secondary_impact |
T1098
|
Account Manipulation
|
CVE-2018-15797
|
NFS Volume Release
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2018-15797
|
NFS Volume Release
| exploitation_technique |
T1552
|
Unsecured Credentials
|
CVE-2018-15772
|
Dell EMC RecoverPoint
| primary_impact |
T1499
|
Endpoint Denial of Service
|
CVE-2020-5331
|
RSA Archer
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-5362
|
Dell Client Consumer and Commercial platforms
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-5362
|
Dell Client Consumer and Commercial platforms
| secondary_impact |
T1098
|
Account Manipulation
|
CVE-2019-18571
|
RSA Identity Governance & Lifecycle
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2019-18571
|
RSA Identity Governance & Lifecycle
| secondary_impact |
T1185
|
Man in the Browser
|
CVE-2019-18571
|
RSA Identity Governance & Lifecycle
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2019-3782
|
CredHub CLI
| primary_impact |
T1552.001
|
Credentials In Files
|
CVE-2019-3782
|
CredHub CLI
| secondary_impact |
T1098
|
Account Manipulation
|
CVE-2020-5379
|
CPG BIOS
| primary_impact |
T1542.001
|
System Firmware
|
CVE-2018-11088
|
Application Service
| primary_impact |
T1552
|
Unsecured Credentials
|
CVE-2018-11088
|
Application Service
| secondary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2018-11062
|
Integrated Data Protection Appliance
| primary_impact |
T1078.001
|
Default Accounts
|
CVE-2018-15758
|
Spring Security OAuth
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2018-15758
|
Spring Security OAuth
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-3780
|
Cloud Foundry Container Runtime (CFCR)
| primary_impact |
T1552.001
|
Credentials In Files
|
CVE-2019-3780
|
Cloud Foundry Container Runtime (CFCR)
| secondary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-5369
|
Isilon OneFS
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-5366
|
Integrated Dell Remote Access Controller (iDRAC)
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-5366
|
Integrated Dell Remote Access Controller (iDRAC)
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-3798
|
CAPI-release
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-3798
|
CAPI-release
| exploitation_technique |
T1136
|
Create Account
|
CVE-2020-5373
|
OMIMSSC (OpenManage Integration for Microsoft System Center)
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-5373
|
OMIMSSC (OpenManage Integration for Microsoft System Center)
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2019-3788
|
UAA Release (OSS)
| secondary_impact |
T1036
|
Masquerading
|
CVE-2019-3788
|
UAA Release (OSS)
| exploitation_technique |
T1566.002
|
Spearphishing Link
|
CVE-2018-11060
|
RSA Archer
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2018-11067
|
Avamar
| secondary_impact |
T1036
|
Masquerading
|
CVE-2018-11067
|
Avamar
| exploitation_technique |
T1566.002
|
Spearphishing Link
|
CVE-2020-5328
|
Isilon OneFS
| secondary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-3784
|
Stratos
| primary_impact |
T1563
|
Remote Service Session Hijacking
|
CVE-2019-3762
|
Data Protection Central
| primary_impact |
T1553
|
Subvert Trust Controls
|
CVE-2019-3762
|
Data Protection Central
| exploitation_technique |
T1588.004
|
Digital Certificates
|
CVE-2019-18582
|
Data Protection Advisor
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2018-11049
|
Pivotal Operations Manager
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-5350
|
Integrated Data Protection Appliance
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-5350
|
Integrated Data Protection Appliance
| secondary_impact |
T1098
|
Account Manipulation
|
CVE-2018-15801
|
Spring Security
| secondary_impact |
T1550.001
|
Application Access Token
|
CVE-2019-18581
|
Data Protection Advisor
| primary_impact |
T1562
|
Impair Defenses
|
CVE-2019-18581
|
Data Protection Advisor
| secondary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-5332
|
RSA Archer
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-3778
|
Spring Security OAuth
| secondary_impact |
T1036
|
Masquerading
|
CVE-2019-3778
|
Spring Security OAuth
| exploitation_technique |
T1566.002
|
Spearphishing Link
|
CVE-2018-15774
|
iDRAC
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2018-15780
|
RSA Archer
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2018-15780
|
RSA Archer
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2019-3786
|
BOSH Backup and Restore
| primary_impact |
T1005
|
Data from Local System
|
CVE-2019-3786
|
BOSH Backup and Restore
| exploitation_technique |
T1565.001
|
Stored Data Manipulation
|
CVE-2019-3706
|
iDRAC
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2018-11072
|
Dell Digital Delivery
| primary_impact |
T1055.001
|
Dynamic-link Library Injection
|
CVE-2018-11073
|
Authentication Manager
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2018-11073
|
Authentication Manager
| secondary_impact |
T1185
|
Man in the Browser
|
CVE-2018-11073
|
Authentication Manager
| exploitation_technique |
T1189
|
Drive-by Compromise
|
CVE-2018-11087
|
Spring AMQP
| primary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2019-3708
|
Dell EMC IsilonSD Management Server
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2019-3708
|
Dell EMC IsilonSD Management Server
| secondary_impact |
T1185
|
Man in the Browser
|
CVE-2019-3708
|
Dell EMC IsilonSD Management Server
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2018-15767
|
OpenManage Network Manager
| primary_impact |
T1548.003
|
Sudo and Sudo Caching
|
CVE-2018-11069
|
RSA BSAFE SSL-J
| primary_impact |
T1600
|
Weaken Encryption
|
CVE-2018-11069
|
RSA BSAFE SSL-J
| exploitation_technique |
T1110
|
Brute Force
|
CVE-2019-3763
|
RSA Identity Governance and Lifecycle
| primary_impact |
T1552
|
Unsecured Credentials
|
CVE-2019-3763
|
RSA Identity Governance and Lifecycle
| secondary_impact |
T1078
|
Valid Accounts
|
CVE-2019-3750
|
Dell Command Update (DCU)
| primary_impact |
T1485
|
Data Destruction
|
CVE-2020-15105
|
django-two-factor-auth
| primary_impact |
T1552
|
Unsecured Credentials
|
CVE-2020-15105
|
django-two-factor-auth
| secondary_impact |
T1078
|
Valid Accounts
|
CVE-2020-15188
|
soycms
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-15188
|
soycms
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2020-5250
|
PrestaShop
| primary_impact |
T1036
|
Masquerading
|
CVE-2020-5250
|
PrestaShop
| secondary_impact |
T1478
|
Install Insecure or Malicious Configuration
|
CVE-2019-16768
|
Sylius
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-15147
|
Red-DiscordBot
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-15147
|
Red-DiscordBot
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2020-15118
|
wagtail
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-15118
|
wagtail
| secondary_impact |
T1185
|
Man in the Browser
|
CVE-2020-5210
|
NetHack
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-5210
|
NetHack
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-11055
|
BookStack
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-11055
|
BookStack
| secondary_impact |
T1185
|
Man in the Browser
|
CVE-2020-5283
|
viewvc
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-5283
|
viewvc
| secondary_impact |
T1185
|
Man in the Browser
|
CVE-2020-15211
|
tensorflow
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-15211
|
tensorflow
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-5220
|
SyliusResourceBundle
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-5220
|
SyliusResourceBundle
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-11021
|
http-client
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-11021
|
http-client
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-5269
|
PrestaShop
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2020-5269
|
PrestaShop
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2020-5269
|
PrestaShop
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2020-11030
|
WordPress
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2020-11030
|
WordPress
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2020-11030
|
WordPress
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2020-11036
|
GLPI
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2020-11036
|
GLPI
| secondary_impact |
T1185
|
Man in the Browser
|
CVE-2020-11036
|
GLPI
| exploitation_technique |
T1189
|
Drive-by Compromise
|
CVE-2020-15100
|
freewvs
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-15100
|
freewvs
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-15100
|
freewvs
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2020-15094
|
symfony
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-15094
|
symfony
| exploitation_technique |
T1040
|
Network Sniffing
|
CVE-2020-15140
|
Red-DiscordBot
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-15140
|
Red-DiscordBot
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2020-11087
|
FreeRDP
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-11087
|
FreeRDP
| secondary_impact |
T1211
|
Exploitation for Defense Evasion
|
CVE-2020-11023
|
jQuery
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2020-11023
|
jQuery
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2020-11023
|
jQuery
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2020-5290
|
rctf
| primary_impact |
T1563
|
Remote Service Session Hijacking
|
CVE-2020-5290
|
rctf
| exploitation_technique |
T1189
|
Drive-by Compromise
|
CVE-2020-11090
|
Indy Node
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-5270
|
PrestaShop
| secondary_impact |
T1036
|
Masquerading
|
CVE-2020-5270
|
PrestaShop
| secondary_impact |
T1059.007
|
JavaScript
|
CVE-2020-5270
|
PrestaShop
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2020-5270
|
PrestaShop
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2020-5270
|
PrestaShop
| exploitation_technique |
T1566.002
|
Spearphishing Link
|
CVE-2020-5254
|
NetHack
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-5254
|
NetHack
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-15096
|
electron
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-15096
|
electron
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-11013
|
Helm
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-15095
|
cli
| primary_impact |
T1552
|
Unsecured Credentials
|
CVE-2020-15233
|
fosite
| secondary_impact |
T1036
|
Masquerading
|
CVE-2020-15233
|
fosite
| exploitation_technique |
T1566.002
|
Spearphishing Link
|
CVE-2020-5252
|
safety
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-11019
|
FreeRDP
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-11019
|
FreeRDP
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-11019
|
FreeRDP
| secondary_impact |
T1211
|
Exploitation for Defense Evasion
|
CVE-2020-15182
|
soycms
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-15182
|
soycms
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2020-5264
|
PrestaShop
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2020-5264
|
PrestaShop
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2020-5264
|
PrestaShop
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2020-11078
|
httplib2
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-11050
|
Java-WebSocket
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-15170
|
apollo
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-15170
|
apollo
| primary_impact |
T1478
|
Install Insecure or Malicious Configuration
|
CVE-2020-5295
|
october
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-5295
|
october
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2020-15189
|
soycms
| primary_impact |
T1505.003
|
Web Shell
|
CVE-2020-15189
|
soycms
| secondary_impact |
T1059
|
Command and Scripting Interpreter
|