CVE-2020-3403
|
Cisco IOS XE Software
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-3403
|
Cisco IOS XE Software
| secondary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-3403
|
Cisco IOS XE Software
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2020-3292
|
Cisco Small Business RV Series Router Firmware
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-3292
|
Cisco Small Business RV Series Router Firmware
| secondary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-3292
|
Cisco Small Business RV Series Router Firmware
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3292
|
Cisco Small Business RV Series Router Firmware
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2020-3253
|
Cisco Firepower Threat Defense Software
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-3253
|
Cisco Firepower Threat Defense Software
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2020-3233
|
Cisco IOx
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2020-3233
|
Cisco IOx
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2020-3233
|
Cisco IOx
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2020-3460
|
Cisco Data Center Network Manager
| primary_impact |
T1565.002
|
Transmitted Data Manipulation
|
CVE-2020-3460
|
Cisco Data Center Network Manager
| secondary_impact |
T1185
|
Man in the Browser
|
CVE-2020-3137
|
Cisco Email Security Appliance (ESA)
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2020-3137
|
Cisco Email Security Appliance (ESA)
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2020-3137
|
Cisco Email Security Appliance (ESA)
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2020-3312
|
Cisco Firepower Threat Defense Software
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-3312
|
Cisco Firepower Threat Defense Software
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3379
|
Cisco SD-WAN Solution
| primary_impact |
T1608
|
Stage Capabilities
|
CVE-2020-3379
|
Cisco SD-WAN Solution
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2020-3477
|
Cisco IOS
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-3477
|
Cisco IOS
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2020-3216
|
Cisco IOS XE SD-WAN Software
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-3216
|
Cisco IOS XE SD-WAN Software
| secondary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-3306
|
Cisco Adaptive Security Appliance (ASA) Software
| primary_impact |
T1499
|
Endpoint Denial of Service
|
CVE-2020-3306
|
Cisco Adaptive Security Appliance (ASA) Software
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3375
|
Cisco SD-WAN vManage
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-3375
|
Cisco SD-WAN vManage
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3476
|
Cisco IOS XE Software
| primary_impact |
T1565.001
|
Stored Data Manipulation
|
CVE-2020-3476
|
Cisco IOS XE Software
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2020-3134
|
Cisco Email Security Appliance (ESA)
| primary_impact |
T1489
|
Service Stop
|
CVE-2020-3120
|
Cisco IOS XR Software
| primary_impact |
T1499
|
Endpoint Denial of Service
|
CVE-2020-3133
|
Cisco Email Security Appliance (ESA)
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3133
|
Cisco Email Security Appliance (ESA)
| exploitation_technique |
T1566.001
|
Spearphishing Attachment
|
CVE-2020-3387
|
Cisco SD-WAN vManage
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-3387
|
Cisco SD-WAN vManage
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3387
|
Cisco SD-WAN vManage
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2020-3440
|
Cisco Webex Meetings
| primary_impact |
T1565.001
|
Stored Data Manipulation
|
CVE-2020-3440
|
Cisco Webex Meetings
| exploitation_technique |
T1566
|
Phishing
|
CVE-2020-3440
|
Cisco Webex Meetings
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2020-3121
|
Cisco 550X Series Stackable Managed Switches
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2020-3121
|
Cisco 550X Series Stackable Managed Switches
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2020-3121
|
Cisco 550X Series Stackable Managed Switches
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2020-3407
|
Cisco IOS XE Software
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-3407
|
Cisco IOS XE Software
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3237
|
Cisco IOx
| primary_impact |
T1565.001
|
Stored Data Manipulation
|
CVE-2020-3237
|
Cisco IOx
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2020-3416
|
Cisco IOS XE Software
| primary_impact |
T1542.004
|
ROMMONkit
|
CVE-2020-3416
|
Cisco IOS XE Software
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2020-3126
|
Cisco Webex Meetings Multimedia Viewer
| primary_impact |
T1080
|
Taint Shared Content
|
CVE-2020-3126
|
Cisco Webex Meetings Multimedia Viewer
| primary_impact |
T1204.002
|
Malicious File
|
CVE-2020-3126
|
Cisco Webex Meetings Multimedia Viewer
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3356
|
Cisco Data Center Network Manager
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2020-3356
|
Cisco Data Center Network Manager
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2020-3356
|
Cisco Data Center Network Manager
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2020-3397
|
Cisco NX-OS Software
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-3397
|
Cisco NX-OS Software
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3322
|
Cisco Webex Network Recording Player
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-3322
|
Cisco Webex Network Recording Player
| exploitation_technique |
T1566
|
Phishing
|
CVE-2020-3322
|
Cisco Webex Network Recording Player
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2020-3198
|
Cisco IOS 12.2(60)EZ16
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-3198
|
Cisco IOS 12.2(60)EZ16
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-3198
|
Cisco IOS 12.2(60)EZ16
| exploitation_technique |
T1189
|
Drive-by Compromise
|
CVE-2020-3198
|
Cisco IOS 12.2(60)EZ16
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3198
|
Cisco IOS 12.2(60)EZ16
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2020-3198
|
Cisco IOS 12.2(60)EZ16
| exploitation_technique |
T1566
|
Phishing
|
CVE-2020-3198
|
Cisco IOS 12.2(60)EZ16
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2020-3198
|
Cisco IOS 12.2(60)EZ16
| exploitation_technique |
T1091
|
Replication Through Removable Media
|
CVE-2020-3309
|
Cisco Firepower Threat Defense Software
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-3309
|
Cisco Firepower Threat Defense Software
| secondary_impact |
T1565.001
|
Stored Data Manipulation
|
CVE-2020-3309
|
Cisco Firepower Threat Defense Software
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3309
|
Cisco Firepower Threat Defense Software
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2020-3177
|
Cisco Unified Communications Manager
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-3177
|
Cisco Unified Communications Manager
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3510
|
Cisco IOS XE Software
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-3510
|
Cisco IOS XE Software
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3513
|
Cisco IOS XE Software
| primary_impact |
T1542.004
|
ROMMONkit
|
CVE-2020-3513
|
Cisco IOS XE Software
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2020-3409
|
Cisco IOS
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-3409
|
Cisco IOS
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3349
|
Cisco Data Center Network Manager
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2020-3349
|
Cisco Data Center Network Manager
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2020-3349
|
Cisco Data Center Network Manager
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2020-3244
|
Cisco ASR 5000 Series Software
| primary_impact |
T1211
|
Exploitation for Defense Evasion
|
CVE-2020-3244
|
Cisco ASR 5000 Series Software
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-3240
|
Cisco UCS Director
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-3240
|
Cisco UCS Director
| primary_impact |
T1505.003
|
Web Shell
|
CVE-2020-3240
|
Cisco UCS Director
| secondary_impact |
T1003.008
|
/etc/passwd and /etc/shadow
|
CVE-2020-3240
|
Cisco UCS Director
| secondary_impact |
T1552.001
|
Credentials In Files
|
CVE-2020-3240
|
Cisco UCS Director
| secondary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-3240
|
Cisco UCS Director
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2020-5364
|
Isilon OneFS
| primary_impact |
T1078.001
|
Default Accounts
|
CVE-2020-5364
|
Isilon OneFS
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2020-5374
|
OMIMSSC (OpenManage Integration for Microsoft System Center)
| primary_impact |
T1078.001
|
Default Accounts
|
CVE-2020-5345
|
Unisphere for PowerMax
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-5345
|
Unisphere for PowerMax
| exploitation_technique |
T1565.001
|
Stored Data Manipulation
|
CVE-2020-5336
|
RSA Archer
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2020-5336
|
RSA Archer
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2020-5336
|
RSA Archer
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2020-5365
|
Isilon OneFS
| primary_impact |
T1078.001
|
Default Accounts
|
CVE-2020-5365
|
Isilon OneFS
| exploitation_technique |
T1110
|
Brute Force
|
CVE-2020-5326
|
Dell Client Consumer and Commercial Platforms
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-5326
|
Dell Client Consumer and Commercial Platforms
| secondary_impact |
T1542.001
|
System Firmware
|
CVE-2020-5339
|
RSA Authentication Manager
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2020-5339
|
RSA Authentication Manager
| secondary_impact |
T1185
|
Man in the Browser
|
CVE-2020-5339
|
RSA Authentication Manager
| exploitation_technique |
T1189
|
Drive-by Compromise
|
CVE-2020-5386
|
Elastic Cloud Storage
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-5340
|
RSA Authentication Manager
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2020-5340
|
RSA Authentication Manager
| secondary_impact |
T1185
|
Man in the Browser
|
CVE-2020-5340
|
RSA Authentication Manager
| exploitation_technique |
T1189
|
Drive-by Compromise
|
CVE-2020-5358
|
Dell Encryption Enterprise
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-5371
|
Isilon OneFS
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-5371
|
Isilon OneFS
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2020-5378
|
CPG BIOS
| primary_impact |
T1542.001
|
System Firmware
|
CVE-2020-5376
|
CPG BIOS
| primary_impact |
T1542.001
|
System Firmware
|
CVE-2020-5331
|
RSA Archer
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-5362
|
Dell Client Consumer and Commercial platforms
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-5362
|
Dell Client Consumer and Commercial platforms
| secondary_impact |
T1098
|
Account Manipulation
|
CVE-2020-5379
|
CPG BIOS
| primary_impact |
T1542.001
|
System Firmware
|
CVE-2020-5369
|
Isilon OneFS
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-5366
|
Integrated Dell Remote Access Controller (iDRAC)
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-5366
|
Integrated Dell Remote Access Controller (iDRAC)
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-5373
|
OMIMSSC (OpenManage Integration for Microsoft System Center)
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-5373
|
OMIMSSC (OpenManage Integration for Microsoft System Center)
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2020-5328
|
Isilon OneFS
| secondary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-5350
|
Integrated Data Protection Appliance
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-5350
|
Integrated Data Protection Appliance
| secondary_impact |
T1098
|
Account Manipulation
|
CVE-2020-5332
|
RSA Archer
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-15105
|
django-two-factor-auth
| primary_impact |
T1552
|
Unsecured Credentials
|
CVE-2020-15105
|
django-two-factor-auth
| secondary_impact |
T1078
|
Valid Accounts
|
CVE-2020-15188
|
soycms
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-15188
|
soycms
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2020-5250
|
PrestaShop
| primary_impact |
T1036
|
Masquerading
|
CVE-2020-5250
|
PrestaShop
| secondary_impact |
T1478
|
Install Insecure or Malicious Configuration
|
CVE-2020-15147
|
Red-DiscordBot
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-15147
|
Red-DiscordBot
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2020-15118
|
wagtail
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-15118
|
wagtail
| secondary_impact |
T1185
|
Man in the Browser
|
CVE-2020-5210
|
NetHack
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-5210
|
NetHack
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-11055
|
BookStack
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-11055
|
BookStack
| secondary_impact |
T1185
|
Man in the Browser
|
CVE-2020-5283
|
viewvc
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-5283
|
viewvc
| secondary_impact |
T1185
|
Man in the Browser
|
CVE-2020-15211
|
tensorflow
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-15211
|
tensorflow
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-5220
|
SyliusResourceBundle
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-5220
|
SyliusResourceBundle
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-11021
|
http-client
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-11021
|
http-client
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-5269
|
PrestaShop
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2020-5269
|
PrestaShop
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2020-5269
|
PrestaShop
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2020-11030
|
WordPress
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2020-11030
|
WordPress
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2020-11030
|
WordPress
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2020-11036
|
GLPI
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2020-11036
|
GLPI
| secondary_impact |
T1185
|
Man in the Browser
|
CVE-2020-11036
|
GLPI
| exploitation_technique |
T1189
|
Drive-by Compromise
|
CVE-2020-15100
|
freewvs
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-15100
|
freewvs
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-15100
|
freewvs
| exploitation_technique |
T1078
|
Valid Accounts
|
CVE-2020-15094
|
symfony
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-15094
|
symfony
| exploitation_technique |
T1040
|
Network Sniffing
|
CVE-2020-15140
|
Red-DiscordBot
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-15140
|
Red-DiscordBot
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2020-11087
|
FreeRDP
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-11087
|
FreeRDP
| secondary_impact |
T1211
|
Exploitation for Defense Evasion
|
CVE-2020-11023
|
jQuery
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2020-11023
|
jQuery
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2020-11023
|
jQuery
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2020-5290
|
rctf
| primary_impact |
T1563
|
Remote Service Session Hijacking
|
CVE-2020-5290
|
rctf
| exploitation_technique |
T1189
|
Drive-by Compromise
|
CVE-2020-11090
|
Indy Node
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-5270
|
PrestaShop
| secondary_impact |
T1036
|
Masquerading
|
CVE-2020-5270
|
PrestaShop
| secondary_impact |
T1059.007
|
JavaScript
|
CVE-2020-5270
|
PrestaShop
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2020-5270
|
PrestaShop
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2020-5270
|
PrestaShop
| exploitation_technique |
T1566.002
|
Spearphishing Link
|
CVE-2020-5254
|
NetHack
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-5254
|
NetHack
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-15096
|
electron
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-15096
|
electron
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-11013
|
Helm
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-15095
|
cli
| primary_impact |
T1552
|
Unsecured Credentials
|
CVE-2020-15233
|
fosite
| secondary_impact |
T1036
|
Masquerading
|
CVE-2020-15233
|
fosite
| exploitation_technique |
T1566.002
|
Spearphishing Link
|
CVE-2020-5252
|
safety
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-11019
|
FreeRDP
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-11019
|
FreeRDP
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-11019
|
FreeRDP
| secondary_impact |
T1211
|
Exploitation for Defense Evasion
|
CVE-2020-15182
|
soycms
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-15182
|
soycms
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2020-5264
|
PrestaShop
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2020-5264
|
PrestaShop
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2020-5264
|
PrestaShop
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2020-11078
|
httplib2
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-11050
|
Java-WebSocket
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-15170
|
apollo
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-15170
|
apollo
| primary_impact |
T1478
|
Install Insecure or Malicious Configuration
|
CVE-2020-5295
|
october
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-5295
|
october
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2020-15189
|
soycms
| primary_impact |
T1505.003
|
Web Shell
|
CVE-2020-15189
|
soycms
| secondary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-15189
|
soycms
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2020-15137
|
HoRNDIS
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-15137
|
HoRNDIS
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-15137
|
HoRNDIS
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-11035
|
GLPI
| primary_impact |
T1078
|
Valid Accounts
|
CVE-2020-11035
|
GLPI
| primary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2020-11035
|
GLPI
| primary_impact |
T1040
|
Network Sniffing
|
CVE-2020-11035
|
GLPI
| exploitation_technique |
T1110
|
Brute Force
|
CVE-2020-5217
|
secure_headers
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-5217
|
secure_headers
| secondary_impact |
T1185
|
Man in the Browser
|
CVE-2020-5261
|
Saml2
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-5261
|
Saml2
| exploitation_technique |
T1040
|
Network Sniffing
|
CVE-2020-11054
|
qutebrowser
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-11054
|
qutebrowser
| exploitation_technique |
T1189
|
Drive-by Compromise
|
CVE-2020-4068
|
APNSwift
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-4068
|
APNSwift
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-4068
|
APNSwift
| exploitation_technique |
T1189
|
Drive-by Compromise
|
CVE-2020-4068
|
APNSwift
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-4068
|
APNSwift
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2020-4068
|
APNSwift
| exploitation_technique |
T1566
|
Phishing
|
CVE-2020-4068
|
APNSwift
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2020-4068
|
APNSwift
| exploitation_technique |
T1091
|
Replication Through Removable Media
|
CVE-2020-15109
|
solidus
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-15109
|
solidus
| secondary_impact |
T1565
|
Data Manipulation
|
CVE-2020-15109
|
solidus
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2020-11082
|
Kaminari
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2020-11082
|
Kaminari
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2020-11082
|
Kaminari
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2020-15093
|
tough
| primary_impact |
T1078
|
Valid Accounts
|
CVE-2020-15093
|
tough
| primary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2020-15093
|
tough
| primary_impact |
T1040
|
Network Sniffing
|
CVE-2020-15093
|
tough
| exploitation_technique |
T1110
|
Brute Force
|
CVE-2020-5225
|
SimpleSAMLphp
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-5225
|
SimpleSAMLphp
| secondary_impact |
T1565
|
Data Manipulation
|
CVE-2020-5225
|
SimpleSAMLphp
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2020-5266
|
ps_linklist
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2020-5266
|
ps_linklist
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2020-5266
|
ps_linklist
| exploitation_technique |
T1189
|
Drive-by Compromise
|
CVE-2020-15208
|
tensorflow
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-15208
|
tensorflow
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-11010
|
tortoise-orm
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-11010
|
tortoise-orm
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2020-11010
|
tortoise-orm
| secondary_impact |
T1505.003
|
Web Shell
|
CVE-2020-11010
|
tortoise-orm
| secondary_impact |
T1136
|
Create Account
|
CVE-2020-11010
|
tortoise-orm
| secondary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-11010
|
tortoise-orm
| secondary_impact |
T1565.001
|
Stored Data Manipulation
|
CVE-2020-11010
|
tortoise-orm
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2020-15143
|
SyliusResourceBundle
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-15143
|
SyliusResourceBundle
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2020-11039
|
FreeRDP
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-11039
|
FreeRDP
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-11039
|
FreeRDP
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-15199
|
tensorflow
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-15199
|
tensorflow
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-15179
|
wiki-scratchsig
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-15179
|
wiki-scratchsig
| secondary_impact |
T1185
|
Man in the Browser
|
CVE-2020-5271
|
PrestaShop
| primary_impact |
T1059.007
|
JavaScript
|
CVE-2020-5271
|
PrestaShop
| secondary_impact |
T1557
|
Man-in-the-Middle
|
CVE-2020-5271
|
PrestaShop
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2020-5231
|
opencast
| primary_impact |
T1078.001
|
Default Accounts
|
CVE-2020-5231
|
opencast
| secondary_impact |
T1136
|
Create Account
|
CVE-2020-5279
|
PrestaShop
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-11059
|
AEgir
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-15183
|
soycms
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-15183
|
soycms
| secondary_impact |
T1185
|
Man in the Browser
|
CVE-2020-11044
|
FreeRDP
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-5284
|
next.js
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-15162
|
PrestaShop
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-15162
|
PrestaShop
| secondary_impact |
T1185
|
Man in the Browser
|
CVE-2020-11073
|
zsh-autoswitch-virtualenv
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-11073
|
zsh-autoswitch-virtualenv
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2020-5267
|
actionview
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-5267
|
actionview
| secondary_impact |
T1185
|
Man in the Browser
|
CVE-2020-11068
|
LoRaMac-node
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-11068
|
LoRaMac-node
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-5297
|
october
| primary_impact |
T1505.003
|
Web Shell
|
CVE-2020-5297
|
october
| secondary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-5241
|
matestack-ui-core
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-5241
|
matestack-ui-core
| secondary_impact |
T1185
|
Man in the Browser
|
CVE-2020-5253
|
NetHack
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-5253
|
NetHack
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-5253
|
NetHack
| exploitation_technique |
T1478
|
Install Insecure or Malicious Configuration
|
CVE-2020-15132
|
sulu
| primary_impact |
T1589
|
Gather Victim Identity Information
|
CVE-2020-11045
|
FreeRDP
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-11083
|
October
| secondary_impact |
T1185
|
Man in the Browser
|
CVE-2020-5281
|
perun
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-6986
|
Omron PLC CJ Series
| primary_impact |
T0814
|
Denial of Service
|
CVE-2020-6986
|
Omron PLC CJ Series
| primary_impact |
T1499
|
Endpoint Denial of Service
|
CVE-2020-12029
|
FactoryTalk View SE
| primary_impact |
T1505.003
|
Web Shell
|
CVE-2020-12029
|
FactoryTalk View SE
| secondary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-12029
|
FactoryTalk View SE
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2020-6960
|
Honeywell Maxpro VMS & NVR
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-12014
|
Advantech WebAccess Node
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-12038
|
EDS Subsystem, FactoryTalk Linx software (Previously called RSLinx Enterprise), RSLinx Classic, RSNetWorx software, Studio 5000 Logix Designer software
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-12038
|
EDS Subsystem, FactoryTalk Linx software (Previously called RSLinx Enterprise), RSLinx Classic, RSNetWorx software, Studio 5000 Logix Designer software
| exploitation_technique |
T1204.001
|
Malicious Link
|
CVE-2020-12008
|
Baxter ExactaMix EM 2400 & EM 1200
| primary_impact |
T1552
|
Unsecured Credentials
|
CVE-2020-12008
|
Baxter ExactaMix EM 2400 & EM 1200
| secondary_impact |
T0859
|
Valid Accounts
|
CVE-2020-12008
|
Baxter ExactaMix EM 2400 & EM 1200
| exploitation_technique |
T0842
|
Network Sniffing
|
CVE-2020-16200
|
Philips Clinical Collaboration Platform
| primary_impact |
T1496
|
Resource Hijacking
|
CVE-2020-16200
|
Philips Clinical Collaboration Platform
| secondary_impact |
T0826
|
Loss of Availability
|
CVE-2020-6964
|
GE CARESCAPE Telemetry Server,ApexPro Telemetry Server,CARESCAPE Central Station,Clinical Information Center systems,CARESCAPE B450,B650,B850 Monitors
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-6964
|
GE CARESCAPE Telemetry Server,ApexPro Telemetry Server,CARESCAPE Central Station,Clinical Information Center systems,CARESCAPE B450,B650,B850 Monitors
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-6964
|
GE CARESCAPE Telemetry Server,ApexPro Telemetry Server,CARESCAPE Central Station,Clinical Information Center systems,CARESCAPE B450,B650,B850 Monitors
| secondary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-6993
|
Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-6993
|
Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-14510
|
GateManager
| primary_impact |
T1078.001
|
Default Accounts
|
CVE-2020-14510
|
GateManager
| secondary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-14510
|
GateManager
| secondary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-14508
|
GateManager
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-14508
|
GateManager
| primary_impact |
T1499
|
Endpoint Denial of Service
|
CVE-2020-14508
|
GateManager
| exploitation_technique |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-7004
|
VBASE Editor
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-10603
|
WebAccess/NMS
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-10603
|
WebAccess/NMS
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2020-12024
|
Baxter ExactaMix EM 2400 & EM 1200
| primary_impact |
T1091
|
Replication Through Removable Media
|
CVE-2020-12000
|
Ignition 8 Gateway
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-12000
|
Ignition 8 Gateway
| exploitation_technique |
T1133
|
External Remote Services
|
CVE-2020-16211
|
Advantech WebAccess HMI Designer
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-16211
|
Advantech WebAccess HMI Designer
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2020-16198
|
Philips Clinical Collaboration Platform
| primary_impact |
T1036
|
Masquerading
|
CVE-2020-10602
|
OSIsoft PI System multiple products and versions
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-0884
|
Microsoft Visual Studio 2017 version 15.9 (includes 15.1 - 15.8)
| primary_impact |
T1528
|
Steal Application Access Token
|
CVE-2020-0884
|
Microsoft Visual Studio 2017 version 15.9 (includes 15.1 - 15.8)
| exploitation_technique |
T1040
|
Network Sniffing
|
CVE-2020-1025
|
Skype for Business Server 2019 CU2
| primary_impact |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-1111
|
Windows
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-1111
|
Windows
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2020-1111
|
Windows
| secondary_impact |
T1565
|
Data Manipulation
|
CVE-2020-1111
|
Windows
| secondary_impact |
T1485
|
Data Destruction
|
CVE-2020-1111
|
Windows
| secondary_impact |
T1136
|
Create Account
|
CVE-2020-0671
|
Windows
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-0671
|
Windows
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-0671
|
Windows
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2020-0671
|
Windows
| secondary_impact |
T1565
|
Data Manipulation
|
CVE-2020-0671
|
Windows
| secondary_impact |
T1485
|
Data Destruction
|
CVE-2020-0671
|
Windows
| secondary_impact |
T1136
|
Create Account
|
CVE-2020-0898
|
Windows
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-0898
|
Windows
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-1456
|
Microsoft SharePoint Enterprise Server
| primary_impact |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-1456
|
Microsoft SharePoint Enterprise Server
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2020-1456
|
Microsoft SharePoint Enterprise Server
| secondary_impact |
T1565
|
Data Manipulation
|
CVE-2020-1456
|
Microsoft SharePoint Enterprise Server
| secondary_impact |
T1485
|
Data Destruction
|
CVE-2020-1456
|
Microsoft SharePoint Enterprise Server
| secondary_impact |
T1478
|
Install Insecure or Malicious Configuration
|
CVE-2020-1456
|
Microsoft SharePoint Enterprise Server
| secondary_impact |
T1036
|
Masquerading
|
CVE-2020-1109
|
Windows
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-1109
|
Windows
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-1109
|
Windows
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2020-1109
|
Windows
| secondary_impact |
T1565
|
Data Manipulation
|
CVE-2020-1109
|
Windows
| secondary_impact |
T1485
|
Data Destruction
|
CVE-2020-1109
|
Windows
| secondary_impact |
T1136
|
Create Account
|
CVE-2020-1347
|
Windows 10 Version 2004 for 32-bit Systems
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-1163
|
Microsoft Forefront Endpoint Protection
| primary_impact |
T1485
|
Data Destruction
|
CVE-2020-1068
|
Windows
| primary_impact |
T1565
|
Data Manipulation
|
CVE-2020-1495
|
Microsoft SharePoint Server 2010 Service Pack 2
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-1495
|
Microsoft SharePoint Server 2010 Service Pack 2
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-1495
|
Microsoft SharePoint Server 2010 Service Pack 2
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2020-1495
|
Microsoft SharePoint Server 2010 Service Pack 2
| secondary_impact |
T1565
|
Data Manipulation
|
CVE-2020-1495
|
Microsoft SharePoint Server 2010 Service Pack 2
| secondary_impact |
T1485
|
Data Destruction
|
CVE-2020-1495
|
Microsoft SharePoint Server 2010 Service Pack 2
| secondary_impact |
T1136
|
Create Account
|
CVE-2020-1495
|
Microsoft SharePoint Server 2010 Service Pack 2
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2020-1495
|
Microsoft SharePoint Server 2010 Service Pack 2
| exploitation_technique |
T1566
|
Phishing
|
CVE-2020-1425
|
Windows 10 Version 2004 for x64-based Systems
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-1425
|
Windows 10 Version 2004 for x64-based Systems
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-0758
|
Team Foundation Server 2018
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-0758
|
Team Foundation Server 2018
| exploitation_technique |
T1098
|
Account Manipulation
|
CVE-2020-1141
|
Windows
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-1141
|
Windows
| secondary_impact |
T1211
|
Exploitation for Defense Evasion
|
CVE-2020-1569
|
Microsoft Edge (EdgeHTML-based)
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-1569
|
Microsoft Edge (EdgeHTML-based)
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-1569
|
Microsoft Edge (EdgeHTML-based)
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2020-1569
|
Microsoft Edge (EdgeHTML-based)
| secondary_impact |
T1565
|
Data Manipulation
|
CVE-2020-1569
|
Microsoft Edge (EdgeHTML-based)
| secondary_impact |
T1485
|
Data Destruction
|
CVE-2020-1569
|
Microsoft Edge (EdgeHTML-based)
| secondary_impact |
T1136
|
Create Account
|
CVE-2020-1569
|
Microsoft Edge (EdgeHTML-based)
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2020-1569
|
Microsoft Edge (EdgeHTML-based)
| exploitation_technique |
T1566
|
Phishing
|
CVE-2020-16874
|
Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6)
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-16874
|
Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6)
| primary_impact |
T1499.004
|
Application or System Exploitation
|
CVE-2020-16874
|
Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6)
| secondary_impact |
T1005
|
Data from Local System
|
CVE-2020-16874
|
Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6)
| secondary_impact |
T1565
|
Data Manipulation
|
CVE-2020-16874
|
Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6)
| secondary_impact |
T1485
|
Data Destruction
|
CVE-2020-16874
|
Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6)
| secondary_impact |
T1136
|
Create Account
|
CVE-2020-16874
|
Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6)
| exploitation_technique |
T1204.002
|
Malicious File
|
CVE-2020-1190
|
Windows
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-0955
|
Windows
| primary_impact |
T1005
|
Data from Local System
|
CVE-2020-0981
|
Windows 10 Version 1909 for 32-bit Systems
| primary_impact |
T1134
|
Access Token Manipulation
|
CVE-2020-0981
|
Windows 10 Version 1909 for 32-bit Systems
| secondary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-0981
|
Windows 10 Version 1909 for 32-bit Systems
| secondary_impact |
T1497
|
Virtualization/Sandbox Evasion
|
CVE-2020-1471
|
Windows 10 Version 1803
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-0636
|
Windows 10 Version 1903 for 32-bit Systems
| primary_impact |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-11652
|
n/a
| uncategorized |
T1005
|
Data from Local System
|
CVE-2020-11652
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-6808
|
Firefox
| uncategorized |
T1036.005
|
Match Legitimate Name or Location
|
CVE-2020-6820
|
Thunderbird
| uncategorized |
T1055
|
Process Injection
|
CVE-2020-6820
|
Thunderbird
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2020-8835
|
Linux kernel
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-8467
|
Trend Micro OfficeScan, Trend Micro Apex One
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-12659
|
n/a
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-10751
|
kernel
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-1027
|
Windows
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-5539
|
GRANDIT
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-5539
|
GRANDIT
| uncategorized |
T1565.001
|
Stored Data Manipulation
|
CVE-2020-5539
|
GRANDIT
| uncategorized |
T1005
|
Data from Local System
|
CVE-2020-10817
|
n/a
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-10817
|
n/a
| uncategorized |
T1211
|
Exploitation for Defense Evasion
|
CVE-2020-8649
|
n/a
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-8649
|
n/a
| uncategorized |
T1499.004
|
Application or System Exploitation
|
CVE-2020-12652
|
n/a
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-12652
|
n/a
| uncategorized |
T1499.004
|
Application or System Exploitation
|
CVE-2020-7456
|
FreeBSD
| uncategorized |
T1091
|
Replication Through Removable Media
|
CVE-2020-7456
|
FreeBSD
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2020-12464
|
n/a
| uncategorized |
T1091
|
Replication Through Removable Media
|
CVE-2020-12464
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2020-15393
|
n/a
| uncategorized |
T1091
|
Replication Through Removable Media
|
CVE-2020-15393
|
n/a
| uncategorized |
T1499.001
|
OS Exhaustion Flood
|
CVE-2020-9804
|
macOS
| uncategorized |
T1091
|
Replication Through Removable Media
|
CVE-2020-9804
|
macOS
| uncategorized |
T1499.004
|
Application or System Exploitation
|
CVE-2020-11957
|
n/a
| uncategorized |
T1110
|
Brute Force
|
CVE-2020-9819
|
iOS
| uncategorized |
T1114.001
|
Local Email Collection
|
CVE-2020-9819
|
iOS
| uncategorized |
T1565.001
|
Stored Data Manipulation
|
CVE-2020-9819
|
iOS
| uncategorized |
T1485
|
Data Destruction
|
CVE-2020-6418
|
Chrome
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2020-6418
|
Chrome
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2020-5902
|
BIG-IP
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2020-5902
|
BIG-IP
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2020-11901
|
n/a
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2020-11901
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2020-11901
|
n/a
| uncategorized |
T1059.007
|
JavaScript
|
CVE-2020-13125
|
n/a
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2020-13125
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2020-13125
|
n/a
| uncategorized |
T1204.002
|
Malicious File
|
CVE-2020-13125
|
n/a
| uncategorized |
T1499.004
|
Application or System Exploitation
|
CVE-2020-6974
|
Honeywell Notifier Web Server (NWS)
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-6974
|
Honeywell Notifier Web Server (NWS)
| uncategorized |
T1005
|
Data from Local System
|
CVE-2020-6974
|
Honeywell Notifier Web Server (NWS)
| uncategorized |
T1565
|
Data Manipulation
|
CVE-2020-11738
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-11738
|
n/a
| uncategorized |
T1055
|
Process Injection
|
CVE-2020-9380
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-9380
|
n/a
| uncategorized |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-10189
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-10189
|
n/a
| uncategorized |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-9459
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-9459
|
n/a
| uncategorized |
T1059.007
|
JavaScript
|
CVE-2020-9459
|
n/a
| uncategorized |
T1539
|
Steal Web Session Cookie
|
CVE-2020-9459
|
n/a
| uncategorized |
T1565
|
Data Manipulation
|
CVE-2020-9459
|
n/a
| uncategorized |
T1491
|
Defacement
|
CVE-2020-13126
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-13126
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2020-11897
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-11897
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2020-11897
|
n/a
| uncategorized |
T1499
|
Endpoint Denial of Service
|
CVE-2020-11896
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-11896
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2020-11896
|
n/a
| uncategorized |
T1499
|
Endpoint Denial of Service
|
CVE-2020-9818
|
iOS
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2020-1631
|
Junos OS
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2020-1350
|
Windows Server
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2020-0938
|
Windows
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2020-6819
|
Thunderbird
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2020-6819
|
Thunderbird
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2020-10257
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2020-10257
|
n/a
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2020-2883
|
WebLogic Server
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2020-2883
|
WebLogic Server
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-0601
|
Windows
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2020-0601
|
Windows
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2020-1206
|
Windows 10 Version 1909 for 32-bit Systems
| uncategorized |
T1210
|
Exploitation of Remote Services
|
CVE-2020-8468
|
Trend Micro OfficeScan, Trend Micro Apex One, Trend Micro Worry-Free Business Security (WFBS)
| uncategorized |
T1211
|
Exploitation for Defense Evasion
|
CVE-2020-8648
|
n/a
| uncategorized |
T1499.004
|
Application or System Exploitation
|
CVE-2020-14059
|
n/a
| uncategorized |
T1499.004
|
Application or System Exploitation
|
CVE-2020-12888
|
n/a
| uncategorized |
T1499.004
|
Application or System Exploitation
|
CVE-2020-12655
|
n/a
| uncategorized |
T1499.004
|
Application or System Exploitation
|
CVE-2020-11884
|
n/a
| uncategorized |
T1499.004
|
Application or System Exploitation
|
CVE-2020-11668
|
n/a
| uncategorized |
T1499.004
|
Application or System Exploitation
|
CVE-2020-12653
|
n/a
| uncategorized |
T1499.004
|
Application or System Exploitation
|
CVE-2020-12653
|
n/a
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-11608
|
n/a
| uncategorized |
T1499.004
|
Application or System Exploitation
|
CVE-2020-11608
|
n/a
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-12769
|
n/a
| uncategorized |
T1499.004
|
Application or System Exploitation
|
CVE-2020-11651
|
n/a
| uncategorized |
T1528
|
Steal Application Access Token
|
CVE-2020-11651
|
n/a
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-11651
|
n/a
| uncategorized |
T1059
|
Command and Scripting Interpreter
|
CVE-2020-5300
|
hydra
| uncategorized |
T1528
|
Steal Application Access Token
|
CVE-2020-5300
|
hydra
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2020-4408
|
Qradar Advisor
| uncategorized |
T1552
|
Unsecured Credentials
|
CVE-2020-1020
|
Windows
| uncategorized |
T1566
|
Phishing
|
CVE-2020-1020
|
Windows
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2020-4100
|
"HCL Verse for Android"
| uncategorized |
T1574
|
Hijack Execution Flow
|
CVE-2020-0688
|
Microsoft Exchange Server 2013
| uncategorized |
T1574
|
Hijack Execution Flow
|
CVE-2020-0688
|
Microsoft Exchange Server 2013
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|