CVE-2019-15243
|
Cisco SPA112 2-Port Phone Adapter
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-15243
|
Cisco SPA112 2-Port Phone Adapter
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-15243
|
Cisco SPA112 2-Port Phone Adapter
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-15976
|
Cisco Data Center Network Manager
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-15976
|
Cisco Data Center Network Manager
| secondary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-15976
|
Cisco Data Center Network Manager
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-15956
|
Cisco Web Security Appliance (WSA)
| primary_impact |
T1499
|
Endpoint Denial of Service
|
CVE-2019-15956
|
Cisco Web Security Appliance (WSA)
| primary_impact |
T1098
|
Account Manipulation
|
CVE-2019-15956
|
Cisco Web Security Appliance (WSA)
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-15956
|
Cisco Web Security Appliance (WSA)
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-15958
|
Cisco Prime Infrastructure
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-15958
|
Cisco Prime Infrastructure
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-12660
|
Cisco IOS XE Software 3.2.11aSG
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2019-12660
|
Cisco IOS XE Software 3.2.11aSG
| secondary_impact |
T1562
|
Impair Defenses
|
CVE-2019-12660
|
Cisco IOS XE Software 3.2.11aSG
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-1753
|
Cisco IOS XE Software
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-1753
|
Cisco IOS XE Software
| secondary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-1753
|
Cisco IOS XE Software
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-1753
|
Cisco IOS XE Software
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-1860
|
Cisco Unified Intelligence Center
| primary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2019-1860
|
Cisco Unified Intelligence Center
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2019-1831
|
Cisco Email Security Appliance (ESA)
| primary_impact |
T1036
|
Masquerading
|
CVE-2019-1831
|
Cisco Email Security Appliance (ESA)
| secondary_impact |
T1566
|
Phishing
|
CVE-2019-1942
|
Cisco Identity Services Engine Software
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-1942
|
Cisco Identity Services Engine Software
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2019-1942
|
Cisco Identity Services Engine Software
| secondary_impact |
T1565.001
|
Stored Data Manipulation
|
CVE-2019-1942
|
Cisco Identity Services Engine Software
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2019-1942
|
Cisco Identity Services Engine Software
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-15972
|
Cisco Unified Communications Manager
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-15972
|
Cisco Unified Communications Manager
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2019-15972
|
Cisco Unified Communications Manager
| secondary_impact |
T1565.001
|
Stored Data Manipulation
|
CVE-2019-15972
|
Cisco Unified Communications Manager
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2019-15972
|
Cisco Unified Communications Manager
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-16009
|
Cisco IOS 12.2(15)B
| primary_impact |
T1608
|
Stage Capabilities
|
CVE-2019-16009
|
Cisco IOS 12.2(15)B
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2019-1879
|
Cisco Unified Computing System (Management Software)
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-1879
|
Cisco Unified Computing System (Management Software)
| secondary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-1879
|
Cisco Unified Computing System (Management Software)
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-1863
|
Cisco Unified Computing System E-Series Software (UCSE)
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-1863
|
Cisco Unified Computing System E-Series Software (UCSE)
| secondary_impact |
T1565.001
|
Stored Data Manipulation
|
CVE-2019-1863
|
Cisco Unified Computing System E-Series Software (UCSE)
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-1863
|
Cisco Unified Computing System E-Series Software (UCSE)
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-1941
|
Cisco Identity Services Engine Software
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2019-1941
|
Cisco Identity Services Engine Software
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2019-1941
|
Cisco Identity Services Engine Software
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2019-1838
|
Cisco Application Policy Infrastructure Controller (APIC)
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2019-1838
|
Cisco Application Policy Infrastructure Controller (APIC)
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2019-1838
|
Cisco Application Policy Infrastructure Controller (APIC)
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2019-15249
|
Cisco SPA112 2-Port Phone Adapter
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-15249
|
Cisco SPA112 2-Port Phone Adapter
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-15249
|
Cisco SPA112 2-Port Phone Adapter
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-15280
|
Cisco Firepower Management Center
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2019-15280
|
Cisco Firepower Management Center
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2019-15280
|
Cisco Firepower Management Center
| exploitation_technique |
T1189
|
Drive-by Compromise
|
CVE-2019-15288
|
Cisco TelePresence TC Software
| primary_impact |
T1608
|
Stage Capabilities
|
CVE-2019-15288
|
Cisco TelePresence TC Software
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2019-15288
|
Cisco TelePresence TC Software
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-1781
|
Cisco NX-OS Software
| primary_impact |
T1608
|
Stage Capabilities
|
CVE-2019-1781
|
Cisco NX-OS Software
| secondary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-1781
|
Cisco NX-OS Software
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-1768
|
Cisco NX-OS Software
| primary_impact |
T1608
|
Stage Capabilities
|
CVE-2019-1768
|
Cisco NX-OS Software
| secondary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-1768
|
Cisco NX-OS Software
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-1724
|
Cisco Small Business RV Series Router Firmware
| primary_impact |
T1563
|
Remote Service Session Hijacking
|
CVE-2019-1817
|
Cisco Web Security Appliance (WSA)
| primary_impact |
T1529
|
System Shutdown/Reboot
|
CVE-2019-1817
|
Cisco Web Security Appliance (WSA)
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-1794
|
Cisco Directory Connector
| primary_impact |
T1574.008
|
Path Interception by Search Order Hijacking
|
CVE-2019-1794
|
Cisco Directory Connector
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-1620
|
Cisco Data Center Network Manager
| primary_impact |
T1105
|
Ingress Tool Transfer
|
CVE-2019-1620
|
Cisco Data Center Network Manager
| secondary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-1886
|
Cisco Web Security Appliance (WSA)
| primary_impact |
T1489
|
Service Stop
|
CVE-2019-1711
|
Cisco IOS XR Software
| primary_impact |
T1489
|
Service Stop
|
CVE-2019-1857
|
Cisco HyperFlex HX-Series
| primary_impact |
T1608
|
Stage Capabilities
|
CVE-2019-1857
|
Cisco HyperFlex HX-Series
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2019-1703
|
Cisco Firepower Threat Defense Software
| primary_impact |
T1499.002
|
Service Exhaustion Flood
|
CVE-2019-15963
|
Cisco Unity Connection
| primary_impact |
T1005
|
Data from Local System
|
CVE-2019-15963
|
Cisco Unity Connection
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-1689
|
Cisco Webex Teams
| primary_impact |
T1105
|
Ingress Tool Transfer
|
CVE-2019-1689
|
Cisco Webex Teams
| secondary_impact |
T1565.001
|
Stored Data Manipulation
|
CVE-2019-1689
|
Cisco Webex Teams
| secondary_impact |
T1531
|
Account Access Removal
|
CVE-2019-15287
|
Cisco WebEx WRF Player
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-15287
|
Cisco WebEx WRF Player
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2019-15998
|
Cisco IOS XR Software
| primary_impact |
T1133
|
External Remote Services
|
CVE-2019-15998
|
Cisco IOS XR Software
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-1889
|
Cisco Application Policy Infrastructure Controller (APIC)
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-1889
|
Cisco Application Policy Infrastructure Controller (APIC)
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-1736
|
Cisco Identity Services Engine Software
| primary_impact |
T1542.001
|
System Firmware
|
CVE-2019-1764
|
Cisco Wireless IP Phone 8821 and 8821-EX
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-1764
|
Cisco Wireless IP Phone 8821 and 8821-EX
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2019-1943
|
Cisco Small Business 300 Series Managed Switches
| primary_impact |
T1565.002
|
Transmitted Data Manipulation
|
CVE-2019-1943
|
Cisco Small Business 300 Series Managed Switches
| secondary_impact |
T1189
|
Drive-by Compromise
|
CVE-2019-1943
|
Cisco Small Business 300 Series Managed Switches
| exploitation_technique |
T1557
|
Man-in-the-Middle
|
CVE-2019-1665
|
Cisco HyperFlex HX-Series
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2019-1665
|
Cisco HyperFlex HX-Series
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2019-1665
|
Cisco HyperFlex HX-Series
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2019-15994
|
Cisco Stealthwatch Enterprise
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2019-15994
|
Cisco Stealthwatch Enterprise
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2019-15994
|
Cisco Stealthwatch Enterprise
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2019-1747
|
Cisco IOS and IOS XE Software
| primary_impact |
T1477
|
Exploit via Radio Interfaces
|
CVE-2019-1747
|
Cisco IOS and IOS XE Software
| secondary_impact |
T1489
|
Service Stop
|
CVE-2019-15959
|
Cisco SPA525G2 5-line IP Phone
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-15959
|
Cisco SPA525G2 5-line IP Phone
| exploitation_technique |
T1091
|
Replication Through Removable Media
|
CVE-2019-15974
|
Cisco Managed Services Accelerator
| primary_impact |
T1565.002
|
Transmitted Data Manipulation
|
CVE-2019-15974
|
Cisco Managed Services Accelerator
| secondary_impact |
T1189
|
Drive-by Compromise
|
CVE-2019-1772
|
Cisco WebEx WRF Player
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-1772
|
Cisco WebEx WRF Player
| exploitation_technique |
T1566
|
Phishing
|
CVE-2019-1772
|
Cisco WebEx WRF Player
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2019-12696
|
Cisco FireSIGHT System Software
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-12696
|
Cisco FireSIGHT System Software
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2019-1594
|
Nexus 1000V Switch for VMware vSphere
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2019-1594
|
Nexus 1000V Switch for VMware vSphere
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-1876
|
Cisco Wide Area Application Services (WAAS)
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-1876
|
Cisco Wide Area Application Services (WAAS)
| secondary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-1612
|
Nexus 3000 Series Switches
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-1612
|
Nexus 3000 Series Switches
| secondary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-1612
|
Nexus 3000 Series Switches
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-1612
|
Nexus 3000 Series Switches
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2019-1715
|
Cisco Adaptive Security Appliance (ASA) Software
| primary_impact |
T1078
|
Valid Accounts
|
CVE-2019-1715
|
Cisco Adaptive Security Appliance (ASA) Software
| primary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2019-1715
|
Cisco Adaptive Security Appliance (ASA) Software
| primary_impact |
T1040
|
Network Sniffing
|
CVE-2019-1715
|
Cisco Adaptive Security Appliance (ASA) Software
| exploitation_technique |
T1110
|
Brute Force
|
CVE-2019-1609
|
MDS 9000 Series Multilayer Switches
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-1609
|
MDS 9000 Series Multilayer Switches
| secondary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-1609
|
MDS 9000 Series Multilayer Switches
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-1836
|
Cisco NX-OS Software for Nexus 9000 Series Fabric Switches ACI Mode
| primary_impact |
T1565.001
|
Stored Data Manipulation
|
CVE-2019-1836
|
Cisco NX-OS Software for Nexus 9000 Series Fabric Switches ACI Mode
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2019-15289
|
Cisco TelePresence TC Software
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2019-15289
|
Cisco TelePresence TC Software
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-1611
|
Firepower 4100 Series Next-Generation Firewalls
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-1611
|
Firepower 4100 Series Next-Generation Firewalls
| secondary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-1611
|
Firepower 4100 Series Next-Generation Firewalls
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-15276
|
Cisco Wireless LAN Controller (WLC)
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2019-15276
|
Cisco Wireless LAN Controller (WLC)
| exploitation_technique |
T1189
|
Drive-by Compromise
|
CVE-2019-15276
|
Cisco Wireless LAN Controller (WLC)
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-15276
|
Cisco Wireless LAN Controller (WLC)
| exploitation_technique |
T1566
|
Phishing
|
CVE-2019-1915
|
Cisco Unified Communications Manager
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-1915
|
Cisco Unified Communications Manager
| secondary_impact |
T1098
|
Account Manipulation
|
CVE-2019-1915
|
Cisco Unified Communications Manager
| exploitation_technique |
T1189
|
Drive-by Compromise
|
CVE-2019-1915
|
Cisco Unified Communications Manager
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-1915
|
Cisco Unified Communications Manager
| exploitation_technique |
T1566
|
Phishing
|
CVE-2019-1915
|
Cisco Unified Communications Manager
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2019-1746
|
Cisco IOS and IOS XE Software
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2019-1746
|
Cisco IOS and IOS XE Software
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-1812
|
Cisco NX-OS Software
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-1812
|
Cisco NX-OS Software
| secondary_impact |
T1548
|
Abuse Elevation Control Mechanism
|
CVE-2019-1812
|
Cisco NX-OS Software
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-1704
|
Cisco Firepower Threat Defense Software
| primary_impact |
T1499
|
Endpoint Denial of Service
|
CVE-2019-1704
|
Cisco Firepower Threat Defense Software
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-1790
|
Cisco NX-OS Software
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-1790
|
Cisco NX-OS Software
| secondary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-1790
|
Cisco NX-OS Software
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-3707
|
iDRAC
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-3735
|
Dell SupportAssist for Business PCs
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-3735
|
Dell SupportAssist for Business PCs
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-3754
|
Unity Operating Environment
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2019-3754
|
Unity Operating Environment
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2019-3754
|
Unity Operating Environment
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2019-3723
|
OpenManage Server Administrator
| primary_impact |
T1485
|
Data Destruction
|
CVE-2019-3723
|
OpenManage Server Administrator
| secondary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-3723
|
OpenManage Server Administrator
| secondary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2019-3723
|
OpenManage Server Administrator
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-3717
|
Dell Client Commercial and Consumer platforms
| primary_impact |
T1548
|
Abuse Elevation Control Mechanism
|
CVE-2019-3717
|
Dell Client Commercial and Consumer platforms
| exploitation_technique |
T1200
|
Hardware Additions
|
CVE-2019-3732
|
RSA BSAFE Crypto-C Micro Edition
| primary_impact |
T1005
|
Data from Local System
|
CVE-2019-3732
|
RSA BSAFE Crypto-C Micro Edition
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-3731
|
RSA BSAFE Crypto-C Micro Edition
| primary_impact |
T1005
|
Data from Local System
|
CVE-2019-3731
|
RSA BSAFE Crypto-C Micro Edition
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-18573
|
RSA Identity Governance & Lifecycle
| primary_impact |
T1563
|
Remote Service Session Hijacking
|
CVE-2019-3727
|
RecoverPoint
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-3727
|
RecoverPoint
| secondary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-3728
|
RSA BSAFE Crypto-C Micro Edition
| primary_impact |
T1489
|
Service Stop
|
CVE-2019-3790
|
Pivotal Ops Manager
| primary_impact |
T1563
|
Remote Service Session Hijacking
|
CVE-2019-3790
|
Pivotal Ops Manager
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-3719
|
SupportAssist Client
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-3719
|
SupportAssist Client
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2019-3704
|
VNX Control Station in Dell EMC VNX2 OE for File
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-3704
|
VNX Control Station in Dell EMC VNX2 OE for File
| secondary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-3704
|
VNX Control Station in Dell EMC VNX2 OE for File
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2019-3799
|
Spring Cloud Config
| primary_impact |
T1005
|
Data from Local System
|
CVE-2019-3799
|
Spring Cloud Config
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-18578
|
XtremIO
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2019-18578
|
XtremIO
| secondary_impact |
T1185
|
Man in the Browser
|
CVE-2019-18578
|
XtremIO
| exploitation_technique |
T1189
|
Drive-by Compromise
|
CVE-2019-3758
|
RSA Archer
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-3758
|
RSA Archer
| secondary_impact |
T1136
|
Create Account
|
CVE-2019-3767
|
ImageAssist
| primary_impact |
T1005
|
Data from Local System
|
CVE-2019-3775
|
UAA Release (OSS)
| primary_impact |
T1098
|
Account Manipulation
|
CVE-2019-3787
|
UAA Release (OSS)
| primary_impact |
T1552
|
Unsecured Credentials
|
CVE-2019-3787
|
UAA Release (OSS)
| secondary_impact |
T1078
|
Valid Accounts
|
CVE-2019-3787
|
UAA Release (OSS)
| secondary_impact |
T1098
|
Account Manipulation
|
CVE-2019-18571
|
RSA Identity Governance & Lifecycle
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2019-18571
|
RSA Identity Governance & Lifecycle
| secondary_impact |
T1185
|
Man in the Browser
|
CVE-2019-18571
|
RSA Identity Governance & Lifecycle
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2019-3782
|
CredHub CLI
| primary_impact |
T1552.001
|
Credentials In Files
|
CVE-2019-3782
|
CredHub CLI
| secondary_impact |
T1098
|
Account Manipulation
|
CVE-2019-3780
|
Cloud Foundry Container Runtime (CFCR)
| primary_impact |
T1552.001
|
Credentials In Files
|
CVE-2019-3780
|
Cloud Foundry Container Runtime (CFCR)
| secondary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-3798
|
CAPI-release
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-3798
|
CAPI-release
| exploitation_technique |
T1136
|
Create Account
|
CVE-2019-3788
|
UAA Release (OSS)
| secondary_impact |
T1036
|
Masquerading
|
CVE-2019-3788
|
UAA Release (OSS)
| exploitation_technique |
T1566.002
|
Spearphishing Link
|
CVE-2019-3784
|
Stratos
| primary_impact |
T1563
|
Remote Service Session Hijacking
|
CVE-2019-3762
|
Data Protection Central
| primary_impact |
T1553
|
Subvert Trust Controls
|
CVE-2019-3762
|
Data Protection Central
| exploitation_technique |
T1588.004
|
Digital Certificates
|
CVE-2019-18582
|
Data Protection Advisor
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-18581
|
Data Protection Advisor
| primary_impact |
T1562
|
Impair Defenses
|
CVE-2019-18581
|
Data Protection Advisor
| secondary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-3778
|
Spring Security OAuth
| secondary_impact |
T1036
|
Masquerading
|
CVE-2019-3778
|
Spring Security OAuth
| exploitation_technique |
T1566.002
|
Spearphishing Link
|
CVE-2019-3786
|
BOSH Backup and Restore
| primary_impact |
T1005
|
Data from Local System
|
CVE-2019-3786
|
BOSH Backup and Restore
| exploitation_technique |
T1565.001
|
Stored Data Manipulation
|
CVE-2019-3706
|
iDRAC
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-3708
|
Dell EMC IsilonSD Management Server
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2019-3708
|
Dell EMC IsilonSD Management Server
| secondary_impact |
T1185
|
Man in the Browser
|
CVE-2019-3708
|
Dell EMC IsilonSD Management Server
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2019-3763
|
RSA Identity Governance and Lifecycle
| primary_impact |
T1552
|
Unsecured Credentials
|
CVE-2019-3763
|
RSA Identity Governance and Lifecycle
| secondary_impact |
T1078
|
Valid Accounts
|
CVE-2019-3750
|
Dell Command Update (DCU)
| primary_impact |
T1485
|
Data Destruction
|
CVE-2019-16768
|
Sylius
| primary_impact |
T1005
|
Data from Local System
|
CVE-2019-16784
|
PyInstaller
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-16784
|
PyInstaller
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-16784
|
PyInstaller
| secondary_impact |
T1059.006
|
Python
|
CVE-2019-16760
|
cargo
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-16760
|
cargo
| secondary_impact |
T1478
|
Install Insecure or Malicious Configuration
|
CVE-2019-16782
|
rack
| primary_impact |
T1563
|
Remote Service Session Hijacking
|
CVE-2019-16782
|
rack
| exploitation_technique |
T1110
|
Brute Force
|
CVE-2019-6522
|
Moxa IKS, EDS
| primary_impact |
T1005
|
Data from Local System
|
CVE-2019-6522
|
Moxa IKS, EDS
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2019-10980
|
LCDS LAquis SCADA
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2019-10980
|
LCDS LAquis SCADA
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2019-6538
|
Medtronic Conexus Radio Frequency Telemetry Protocol
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2019-6538
|
Medtronic Conexus Radio Frequency Telemetry Protocol
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2019-6538
|
Medtronic Conexus Radio Frequency Telemetry Protocol
| primary_impact |
T1005
|
Data from Local System
|
CVE-2019-6538
|
Medtronic Conexus Radio Frequency Telemetry Protocol
| primary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2019-6538
|
Medtronic Conexus Radio Frequency Telemetry Protocol
| exploitation_technique |
T0860
|
Wireless Compromise
|
CVE-2019-6538
|
Medtronic Conexus Radio Frequency Telemetry Protocol
| exploitation_technique |
T1477
|
Exploit via Radio Interfaces
|
CVE-2019-13511
|
Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier
| primary_impact |
T1005
|
Data from Local System
|
CVE-2019-13511
|
Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2019-6563
|
Moxa IKS, EDS
| primary_impact |
T1539
|
Steal Web Session Cookie
|
CVE-2019-6563
|
Moxa IKS, EDS
| secondary_impact |
T1078
|
Valid Accounts
|
CVE-2019-6563
|
Moxa IKS, EDS
| exploitation_technique |
T1110
|
Brute Force
|
CVE-2019-13555
|
Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU: serial number 21081 and prior, Q04/06/13/26UDPVCPU: serial number 21081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 21081 and prior. MELSEC-L Series L02/06/26CPU, L26CPU-BT: serial number 21101 and prior, L02/06/26CPU-P, L26CPU-PBT: serial number 21101 and prior, and L02/06/26CPU-CM, L26CPU-BT-CM: serial number 21101 and prior.
| primary_impact |
T1499
|
Endpoint Denial of Service
|
CVE-2019-13555
|
Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU: serial number 21081 and prior, Q04/06/13/26UDPVCPU: serial number 21081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 21081 and prior. MELSEC-L Series L02/06/26CPU, L26CPU-BT: serial number 21101 and prior, L02/06/26CPU-P, L26CPU-PBT: serial number 21101 and prior, and L02/06/26CPU-CM, L26CPU-BT-CM: serial number 21101 and prior.
| secondary_impact |
T0826
|
Loss of Availability
|
CVE-2019-10990
|
Red Lion Controls Crimson (Windows configuration software)
| primary_impact |
T1078.001
|
Default Accounts
|
CVE-2019-10990
|
Red Lion Controls Crimson (Windows configuration software)
| secondary_impact |
T1066
|
|
CVE-2019-10971
|
Network Configurator for DeviceNet Safety
| primary_impact |
T1574.001
|
DLL Search Order Hijacking
|
CVE-2019-18234
|
Equinox Control Expert
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-18234
|
Equinox Control Expert
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2019-18234
|
Equinox Control Expert
| secondary_impact |
T1505.003
|
Web Shell
|
CVE-2019-18234
|
Equinox Control Expert
| secondary_impact |
T1136
|
Create Account
|
CVE-2019-18234
|
Equinox Control Expert
| secondary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-18234
|
Equinox Control Expert
| secondary_impact |
T1565.001
|
Stored Data Manipulation
|
CVE-2019-18234
|
Equinox Control Expert
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2019-13522
|
EZ PLC Editor
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2019-13522
|
EZ PLC Editor
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2019-6549
|
PR100088 Modbus gateway
| primary_impact |
T1552
|
Unsecured Credentials
|
CVE-2019-6549
|
PR100088 Modbus gateway
| secondary_impact |
T1078
|
Valid Accounts
|
CVE-2019-18263
|
Philips Veradius Unity, Pulsera, and Endura Dual WAN Router
| exploitation_technique |
T1110
|
Brute Force
|
CVE-2019-10987
|
WebAccess/SCADA
| primary_impact |
T1575
|
Native Code
|
CVE-2019-13541
|
Horner Automation Cscape
| primary_impact |
T1575
|
Native Code
|
CVE-2019-0911
|
Internet Explorer 11
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2019-0911
|
Internet Explorer 11
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2019-0911
|
Internet Explorer 11
| exploitation_technique |
T1189
|
Drive-by Compromise
|
CVE-2019-0911
|
Internet Explorer 11
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2019-1087
|
Windows
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-1270
|
Windows
| primary_impact |
T1565
|
Data Manipulation
|
CVE-2019-1270
|
Windows
| primary_impact |
T1485
|
Data Destruction
|
CVE-2019-1270
|
Windows
| exploitation_technique |
T1202
|
Indirect Command Execution
|
CVE-2019-1118
|
Windows
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2019-1118
|
Windows
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2019-1118
|
Windows
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2019-1118
|
Windows
| secondary_impact |
T1565
|
Data Manipulation
|
CVE-2019-1118
|
Windows
| secondary_impact |
T1485
|
Data Destruction
|
CVE-2019-1118
|
Windows
| secondary_impact |
T1136
|
Create Account
|
CVE-2019-1118
|
Windows
| exploitation_technique |
T1189
|
Drive-by Compromise
|
CVE-2019-1118
|
Windows
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2019-1086
|
Windows
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-0576
|
Windows 7
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2019-0576
|
Windows 7
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2019-0576
|
Windows 7
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2019-1021
|
Windows
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-1423
|
Windows 10 Version 1903 for 32-bit Systems
| primary_impact |
T1565
|
Data Manipulation
|
CVE-2019-1423
|
Windows 10 Version 1903 for 32-bit Systems
| secondary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-1013
|
Windows
| primary_impact |
T1005
|
Data from Local System
|
CVE-2019-1013
|
Windows
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2019-1013
|
Windows
| exploitation_technique |
T1566
|
Phishing
|
CVE-2019-0609
|
Internet Explorer 11
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2019-0609
|
Internet Explorer 11
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2019-0609
|
Internet Explorer 11
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2019-0609
|
Internet Explorer 11
| secondary_impact |
T1565
|
Data Manipulation
|
CVE-2019-0609
|
Internet Explorer 11
| secondary_impact |
T1485
|
Data Destruction
|
CVE-2019-0609
|
Internet Explorer 11
| secondary_impact |
T1136
|
Create Account
|
CVE-2019-0609
|
Internet Explorer 11
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2019-0609
|
Internet Explorer 11
| exploitation_technique |
T1566
|
Phishing
|
CVE-2019-1031
|
Microsoft SharePoint Foundation
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-1031
|
Microsoft SharePoint Foundation
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2019-1031
|
Microsoft SharePoint Foundation
| secondary_impact |
T1565
|
Data Manipulation
|
CVE-2019-1031
|
Microsoft SharePoint Foundation
| secondary_impact |
T1485
|
Data Destruction
|
CVE-2019-1031
|
Microsoft SharePoint Foundation
| secondary_impact |
T1478
|
Install Insecure or Malicious Configuration
|
CVE-2019-1031
|
Microsoft SharePoint Foundation
| secondary_impact |
T1036
|
Masquerading
|
CVE-2019-1402
|
Microsoft Office
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-1106
|
Microsoft Edge
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2019-1106
|
Microsoft Edge
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2019-1106
|
Microsoft Edge
| exploitation_technique |
T1189
|
Drive-by Compromise
|
CVE-2019-1106
|
Microsoft Edge
| exploitation_technique |
T1203
|
Exploitation for Client Execution
|
CVE-2019-1035
|
Microsoft Office
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2019-1035
|
Microsoft Office
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2019-1035
|
Microsoft Office
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2019-1035
|
Microsoft Office
| exploitation_technique |
T1203
|
Exploitation for Client Execution
|
CVE-2019-0926
|
Microsoft Edge
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2019-0926
|
Microsoft Edge
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2019-0926
|
Microsoft Edge
| exploitation_technique |
T1189
|
Drive-by Compromise
|
CVE-2019-0926
|
Microsoft Edge
| exploitation_technique |
T1203
|
Exploitation for Client Execution
|
CVE-2019-1052
|
Microsoft Edge
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2019-1052
|
Microsoft Edge
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2019-1052
|
Microsoft Edge
| exploitation_technique |
T1189
|
Drive-by Compromise
|
CVE-2019-1052
|
Microsoft Edge
| exploitation_technique |
T1203
|
Exploitation for Client Execution
|
CVE-2019-9670
|
n/a
| uncategorized |
T1005
|
Data from Local System
|
CVE-2019-9670
|
n/a
| uncategorized |
T1552.001
|
Credentials In Files
|
CVE-2019-9978
|
n/a
| uncategorized |
T1055
|
Process Injection
|
CVE-2019-9978
|
n/a
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2019-1458
|
Windows
| uncategorized |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-1458
|
Windows
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-13538
|
n/a
| uncategorized |
T1059.007
|
JavaScript
|
CVE-2019-13538
|
n/a
| uncategorized |
T1185
|
Man in the Browser
|
CVE-2019-1215
|
Windows
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-1214
|
Windows
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-0859
|
Windows
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-15821
|
n/a
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-15821
|
n/a
| uncategorized |
T1133
|
External Remote Services
|
CVE-2019-15821
|
n/a
| uncategorized |
T1136
|
Create Account
|
CVE-2019-15821
|
n/a
| uncategorized |
T1565
|
Data Manipulation
|
CVE-2019-15821
|
n/a
| uncategorized |
T1149
|
|
CVE-2019-5786
|
Chrome
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-5786
|
Chrome
| uncategorized |
T1211
|
Exploitation for Defense Evasion
|
CVE-2019-2215
|
Android
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-2215
|
Android
| uncategorized |
T1404
|
Exploit OS Vulnerability
|
CVE-2019-0808
|
Windows
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-0808
|
Windows
| uncategorized |
T1497
|
Virtualization/Sandbox Evasion
|
CVE-2019-5954
|
JR East Japan train operation information push notification App for Android
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-5954
|
JR East Japan train operation information push notification App for Android
| uncategorized |
T1565.001
|
Stored Data Manipulation
|
CVE-2019-19735
|
n/a
| uncategorized |
T1110
|
Brute Force
|
CVE-2019-11219
|
n/a
| uncategorized |
T1110
|
Brute Force
|
CVE-2019-11219
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-18872
|
n/a
| uncategorized |
T1110.001
|
Password Guessing
|
CVE-2019-11510
|
n/a
| uncategorized |
T1133
|
External Remote Services
|
CVE-2019-11510
|
n/a
| uncategorized |
T1212
|
Exploitation for Credential Access
|
CVE-2019-11510
|
n/a
| uncategorized |
T1083
|
File and Directory Discovery
|
CVE-2019-7286
|
iOS
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2019-7286
|
iOS
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2019-18935
|
n/a
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2019-18935
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2019-17026
|
Firefox ESR
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2019-17026
|
Firefox ESR
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2019-13720
|
Chrome
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2019-13720
|
Chrome
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2019-11886
|
n/a
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2019-11886
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2019-6703
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-16759
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-15107
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-1132
|
Windows
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-10973
|
Quest KACE
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-0880
|
Windows Server
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-5910
|
HOUSE GATE App for iOS
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-5910
|
HOUSE GATE App for iOS
| uncategorized |
T1005
|
Data from Local System
|
CVE-2019-2729
|
WebLogic Server
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-2729
|
WebLogic Server
| uncategorized |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-2725
|
Tape Library ACSLS
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-2725
|
Tape Library ACSLS
| uncategorized |
T1059
|
Command and Scripting Interpreter
|
CVE-2019-11708
|
Firefox ESR
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-11708
|
Firefox ESR
| uncategorized |
T1133
|
External Remote Services
|
CVE-2019-11708
|
Firefox ESR
| uncategorized |
T1211
|
Exploitation for Defense Evasion
|
CVE-2019-8540
|
iOS
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-8540
|
iOS
| uncategorized |
T1499.004
|
Application or System Exploitation
|
CVE-2019-0604
|
Microsoft SharePoint Server
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-0604
|
Microsoft SharePoint Server
| uncategorized |
T1499.004
|
Application or System Exploitation
|
CVE-2019-9019
|
n/a
| uncategorized |
T1200
|
Hardware Additions
|
CVE-2019-9019
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2019-9791
|
Thunderbird
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2019-1579
|
Palo Alto Networks GlobalProtect Portal/Gateway Interface
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2019-11932
|
android-gif-drawable
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2019-0903
|
Windows
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2019-0803
|
Windows
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2019-10149
|
exim
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2019-10149
|
exim
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-3396
|
Confluence Server
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2019-3396
|
Confluence Server
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2019-3396
|
Confluence Server
| uncategorized |
T1083
|
File and Directory Discovery
|
CVE-2019-13510
|
Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2019-13510
|
Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier
| uncategorized |
T1499.004
|
Application or System Exploitation
|
CVE-2019-13541
|
Horner Automation Cscape
| uncategorized |
T1204.002
|
Malicious File
|
CVE-2019-13541
|
Horner Automation Cscape
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2019-13527
|
Rockwell Automation Arena Simulation Software Cat. 9502-Ax, Versions 16.00.00 and earlier
| uncategorized |
T1204.002
|
Malicious File
|
CVE-2019-13527
|
Rockwell Automation Arena Simulation Software Cat. 9502-Ax, Versions 16.00.00 and earlier
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2019-7287
|
iOS
| uncategorized |
T1404
|
Exploit OS Vulnerability
|
CVE-2019-3568
|
WhatsApp for Android
| uncategorized |
T1477
|
Exploit via Radio Interfaces
|
CVE-2019-9081
|
| uncategorized |
T1497
|
Virtualization/Sandbox Evasion
|
CVE-2019-9081
|
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-9081
|
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2019-11707
|
Firefox ESR
| uncategorized |
T1499
|
Endpoint Denial of Service
|
CVE-2019-16302
|
n/a
| uncategorized |
T1499.004
|
Application or System Exploitation
|
CVE-2019-11869
|
n/a
| uncategorized |
T1499.004
|
Application or System Exploitation
|
CVE-2019-13922
|
SINEMA Remote Connect Server
| uncategorized |
T1552
|
Unsecured Credentials
|
CVE-2019-12258
|
n/a
| uncategorized |
T1563
|
Remote Service Session Hijacking
|
CVE-2019-6340
|
Drupal Core
| uncategorized |
T1566.001
|
Spearphishing Attachment
|
CVE-2019-6340
|
Drupal Core
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2019-0708
|
Windows
| uncategorized |
T1574
|
Hijack Execution Flow
|
CVE-2019-0708
|
Windows
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2019-0797
|
Windows Server
| uncategorized |
T1608
|
Stage Capabilities
|
CVE-2019-13533
|
Omron PLC CJ and CS Series
| uncategorized |
T0855
|
Unauthorized Command Message
|
CVE-2019-13533
|
Omron PLC CJ and CS Series
| uncategorized |
T0842
|
Network Sniffing
|
CVE-2019-10980
|
LCDS LAquis SCADA
| uncategorized |
T0873
|
Project File Infection
|
CVE-2019-10980
|
LCDS LAquis SCADA
| uncategorized |
T1203
|
Exploitation for Client Execution
|