CVE 2020 CVEs Capability Group

All Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name
CVE-2020-3403 Cisco IOS XE Software primary_impact T1068 Exploitation for Privilege Escalation
CVE-2020-3403 Cisco IOS XE Software secondary_impact T1059 Command and Scripting Interpreter
CVE-2020-3403 Cisco IOS XE Software exploitation_technique T1078 Valid Accounts
CVE-2020-3292 Cisco Small Business RV Series Router Firmware primary_impact T1499.004 Application or System Exploitation
CVE-2020-3292 Cisco Small Business RV Series Router Firmware secondary_impact T1059 Command and Scripting Interpreter
CVE-2020-3292 Cisco Small Business RV Series Router Firmware exploitation_technique T1190 Exploit Public-Facing Application
CVE-2020-3292 Cisco Small Business RV Series Router Firmware exploitation_technique T1078 Valid Accounts
CVE-2020-3253 Cisco Firepower Threat Defense Software primary_impact T1059 Command and Scripting Interpreter
CVE-2020-3253 Cisco Firepower Threat Defense Software exploitation_technique T1078 Valid Accounts
CVE-2020-3233 Cisco IOx primary_impact T1059.007 JavaScript
CVE-2020-3233 Cisco IOx secondary_impact T1557 Man-in-the-Middle
CVE-2020-3233 Cisco IOx exploitation_technique T1204.001 Malicious Link
CVE-2020-3460 Cisco Data Center Network Manager primary_impact T1565.002 Transmitted Data Manipulation
CVE-2020-3460 Cisco Data Center Network Manager secondary_impact T1185 Man in the Browser
CVE-2020-3137 Cisco Email Security Appliance (ESA) primary_impact T1059.007 JavaScript
CVE-2020-3137 Cisco Email Security Appliance (ESA) secondary_impact T1557 Man-in-the-Middle
CVE-2020-3137 Cisco Email Security Appliance (ESA) exploitation_technique T1204.001 Malicious Link
CVE-2020-3312 Cisco Firepower Threat Defense Software primary_impact T1005 Data from Local System
CVE-2020-3312 Cisco Firepower Threat Defense Software exploitation_technique T1190 Exploit Public-Facing Application
CVE-2020-3379 Cisco SD-WAN Solution primary_impact T1608 Stage Capabilities
CVE-2020-3379 Cisco SD-WAN Solution exploitation_technique T1078 Valid Accounts
CVE-2020-3477 Cisco IOS primary_impact T1005 Data from Local System
CVE-2020-3477 Cisco IOS exploitation_technique T1078 Valid Accounts
CVE-2020-3216 Cisco IOS XE SD-WAN Software primary_impact T1068 Exploitation for Privilege Escalation
CVE-2020-3216 Cisco IOS XE SD-WAN Software secondary_impact T1059 Command and Scripting Interpreter
CVE-2020-3306 Cisco Adaptive Security Appliance (ASA) Software primary_impact T1499 Endpoint Denial of Service
CVE-2020-3306 Cisco Adaptive Security Appliance (ASA) Software exploitation_technique T1190 Exploit Public-Facing Application
CVE-2020-3375 Cisco SD-WAN vManage primary_impact T1059 Command and Scripting Interpreter
CVE-2020-3375 Cisco SD-WAN vManage exploitation_technique T1190 Exploit Public-Facing Application
CVE-2020-3476 Cisco IOS XE Software primary_impact T1565.001 Stored Data Manipulation
CVE-2020-3476 Cisco IOS XE Software exploitation_technique T1078 Valid Accounts
CVE-2020-3134 Cisco Email Security Appliance (ESA) primary_impact T1489 Service Stop
CVE-2020-3120 Cisco IOS XR Software primary_impact T1499 Endpoint Denial of Service
CVE-2020-3133 Cisco Email Security Appliance (ESA) primary_impact T1190 Exploit Public-Facing Application
CVE-2020-3133 Cisco Email Security Appliance (ESA) exploitation_technique T1566.001 Spearphishing Attachment
CVE-2020-3387 Cisco SD-WAN vManage primary_impact T1068 Exploitation for Privilege Escalation
CVE-2020-3387 Cisco SD-WAN vManage exploitation_technique T1190 Exploit Public-Facing Application
CVE-2020-3387 Cisco SD-WAN vManage exploitation_technique T1133 External Remote Services
CVE-2020-3440 Cisco Webex Meetings primary_impact T1565.001 Stored Data Manipulation
CVE-2020-3440 Cisco Webex Meetings exploitation_technique T1566 Phishing
CVE-2020-3440 Cisco Webex Meetings exploitation_technique T1204.002 Malicious File
CVE-2020-3121 Cisco 550X Series Stackable Managed Switches primary_impact T1059.007 JavaScript
CVE-2020-3121 Cisco 550X Series Stackable Managed Switches secondary_impact T1557 Man-in-the-Middle
CVE-2020-3121 Cisco 550X Series Stackable Managed Switches exploitation_technique T1204.001 Malicious Link
CVE-2020-3407 Cisco IOS XE Software primary_impact T1499.004 Application or System Exploitation
CVE-2020-3407 Cisco IOS XE Software exploitation_technique T1190 Exploit Public-Facing Application
CVE-2020-3237 Cisco IOx primary_impact T1565.001 Stored Data Manipulation
CVE-2020-3237 Cisco IOx exploitation_technique T1133 External Remote Services
CVE-2020-3416 Cisco IOS XE Software primary_impact T1542.004 ROMMONkit
CVE-2020-3416 Cisco IOS XE Software exploitation_technique T1078 Valid Accounts
CVE-2020-3126 Cisco Webex Meetings Multimedia Viewer primary_impact T1080 Taint Shared Content
CVE-2020-3126 Cisco Webex Meetings Multimedia Viewer primary_impact T1204.002 Malicious File
CVE-2020-3126 Cisco Webex Meetings Multimedia Viewer exploitation_technique T1190 Exploit Public-Facing Application
CVE-2020-3356 Cisco Data Center Network Manager primary_impact T1059.007 JavaScript
CVE-2020-3356 Cisco Data Center Network Manager secondary_impact T1557 Man-in-the-Middle
CVE-2020-3356 Cisco Data Center Network Manager exploitation_technique T1204.001 Malicious Link
CVE-2020-3397 Cisco NX-OS Software primary_impact T1499.004 Application or System Exploitation
CVE-2020-3397 Cisco NX-OS Software exploitation_technique T1190 Exploit Public-Facing Application
CVE-2020-3322 Cisco Webex Network Recording Player primary_impact T1499.004 Application or System Exploitation
CVE-2020-3322 Cisco Webex Network Recording Player exploitation_technique T1566 Phishing
CVE-2020-3322 Cisco Webex Network Recording Player exploitation_technique T1204.002 Malicious File
CVE-2020-3198 Cisco IOS 12.2(60)EZ16 primary_impact T1574 Hijack Execution Flow
CVE-2020-3198 Cisco IOS 12.2(60)EZ16 primary_impact T1499.004 Application or System Exploitation
CVE-2020-3198 Cisco IOS 12.2(60)EZ16 exploitation_technique T1189 Drive-by Compromise
CVE-2020-3198 Cisco IOS 12.2(60)EZ16 exploitation_technique T1190 Exploit Public-Facing Application
CVE-2020-3198 Cisco IOS 12.2(60)EZ16 exploitation_technique T1133 External Remote Services
CVE-2020-3198 Cisco IOS 12.2(60)EZ16 exploitation_technique T1566 Phishing
CVE-2020-3198 Cisco IOS 12.2(60)EZ16 exploitation_technique T1204.002 Malicious File
CVE-2020-3198 Cisco IOS 12.2(60)EZ16 exploitation_technique T1091 Replication Through Removable Media
CVE-2020-3309 Cisco Firepower Threat Defense Software primary_impact T1574 Hijack Execution Flow
CVE-2020-3309 Cisco Firepower Threat Defense Software secondary_impact T1565.001 Stored Data Manipulation
CVE-2020-3309 Cisco Firepower Threat Defense Software exploitation_technique T1190 Exploit Public-Facing Application
CVE-2020-3309 Cisco Firepower Threat Defense Software exploitation_technique T1133 External Remote Services
CVE-2020-3177 Cisco Unified Communications Manager primary_impact T1005 Data from Local System
CVE-2020-3177 Cisco Unified Communications Manager exploitation_technique T1190 Exploit Public-Facing Application
CVE-2020-3510 Cisco IOS XE Software primary_impact T1499.004 Application or System Exploitation
CVE-2020-3510 Cisco IOS XE Software exploitation_technique T1190 Exploit Public-Facing Application
CVE-2020-3513 Cisco IOS XE Software primary_impact T1542.004 ROMMONkit
CVE-2020-3513 Cisco IOS XE Software exploitation_technique T1078 Valid Accounts
CVE-2020-3409 Cisco IOS primary_impact T1499.004 Application or System Exploitation
CVE-2020-3409 Cisco IOS exploitation_technique T1190 Exploit Public-Facing Application
CVE-2020-3349 Cisco Data Center Network Manager primary_impact T1059.007 JavaScript
CVE-2020-3349 Cisco Data Center Network Manager secondary_impact T1557 Man-in-the-Middle
CVE-2020-3349 Cisco Data Center Network Manager exploitation_technique T1204.001 Malicious Link
CVE-2020-3244 Cisco ASR 5000 Series Software primary_impact T1211 Exploitation for Defense Evasion
CVE-2020-3244 Cisco ASR 5000 Series Software exploitation_technique T1190 Exploit Public-Facing Application
CVE-2020-3240 Cisco UCS Director primary_impact T1005 Data from Local System
CVE-2020-3240 Cisco UCS Director primary_impact T1505.003 Web Shell
CVE-2020-3240 Cisco UCS Director secondary_impact T1003.008 /etc/passwd and /etc/shadow
CVE-2020-3240 Cisco UCS Director secondary_impact T1552.001 Credentials In Files
CVE-2020-3240 Cisco UCS Director secondary_impact T1059 Command and Scripting Interpreter
CVE-2020-3240 Cisco UCS Director exploitation_technique T1133 External Remote Services
CVE-2020-5364 Isilon OneFS primary_impact T1078.001 Default Accounts
CVE-2020-5364 Isilon OneFS secondary_impact T1005 Data from Local System
CVE-2020-5374 OMIMSSC (OpenManage Integration for Microsoft System Center) primary_impact T1078.001 Default Accounts
CVE-2020-5345 Unisphere for PowerMax primary_impact T1190 Exploit Public-Facing Application
CVE-2020-5345 Unisphere for PowerMax exploitation_technique T1565.001 Stored Data Manipulation
CVE-2020-5336 RSA Archer primary_impact T1059.007 JavaScript
CVE-2020-5336 RSA Archer secondary_impact T1557 Man-in-the-Middle
CVE-2020-5336 RSA Archer exploitation_technique T1204.001 Malicious Link
CVE-2020-5365 Isilon OneFS primary_impact T1078.001 Default Accounts
CVE-2020-5365 Isilon OneFS exploitation_technique T1110 Brute Force
CVE-2020-5326 Dell Client Consumer and Commercial Platforms primary_impact T1068 Exploitation for Privilege Escalation
CVE-2020-5326 Dell Client Consumer and Commercial Platforms secondary_impact T1542.001 System Firmware
CVE-2020-5339 RSA Authentication Manager primary_impact T1059.007 JavaScript
CVE-2020-5339 RSA Authentication Manager secondary_impact T1185 Man in the Browser
CVE-2020-5339 RSA Authentication Manager exploitation_technique T1189 Drive-by Compromise
CVE-2020-5386 Elastic Cloud Storage primary_impact T1005 Data from Local System
CVE-2020-5340 RSA Authentication Manager primary_impact T1059.007 JavaScript
CVE-2020-5340 RSA Authentication Manager secondary_impact T1185 Man in the Browser
CVE-2020-5340 RSA Authentication Manager exploitation_technique T1189 Drive-by Compromise
CVE-2020-5358 Dell Encryption Enterprise primary_impact T1068 Exploitation for Privilege Escalation
CVE-2020-5371 Isilon OneFS primary_impact T1068 Exploitation for Privilege Escalation
CVE-2020-5371 Isilon OneFS secondary_impact T1005 Data from Local System
CVE-2020-5378 CPG BIOS primary_impact T1542.001 System Firmware
CVE-2020-5376 CPG BIOS primary_impact T1542.001 System Firmware
CVE-2020-5331 RSA Archer primary_impact T1005 Data from Local System
CVE-2020-5362 Dell Client Consumer and Commercial platforms primary_impact T1068 Exploitation for Privilege Escalation
CVE-2020-5362 Dell Client Consumer and Commercial platforms secondary_impact T1098 Account Manipulation
CVE-2020-5379 CPG BIOS primary_impact T1542.001 System Firmware
CVE-2020-5369 Isilon OneFS primary_impact T1068 Exploitation for Privilege Escalation
CVE-2020-5366 Integrated Dell Remote Access Controller (iDRAC) primary_impact T1005 Data from Local System
CVE-2020-5366 Integrated Dell Remote Access Controller (iDRAC) exploitation_technique T1190 Exploit Public-Facing Application
CVE-2020-5373 OMIMSSC (OpenManage Integration for Microsoft System Center) primary_impact T1190 Exploit Public-Facing Application
CVE-2020-5373 OMIMSSC (OpenManage Integration for Microsoft System Center) secondary_impact T1005 Data from Local System
CVE-2020-5328 Isilon OneFS secondary_impact T1068 Exploitation for Privilege Escalation
CVE-2020-5350 Integrated Data Protection Appliance primary_impact T1059 Command and Scripting Interpreter
CVE-2020-5350 Integrated Data Protection Appliance secondary_impact T1098 Account Manipulation
CVE-2020-5332 RSA Archer primary_impact T1059 Command and Scripting Interpreter
CVE-2020-15105 django-two-factor-auth primary_impact T1552 Unsecured Credentials
CVE-2020-15105 django-two-factor-auth secondary_impact T1078 Valid Accounts
CVE-2020-15188 soycms primary_impact T1059 Command and Scripting Interpreter
CVE-2020-15188 soycms exploitation_technique T1133 External Remote Services
CVE-2020-5250 PrestaShop primary_impact T1036 Masquerading
CVE-2020-5250 PrestaShop secondary_impact T1478 Install Insecure or Malicious Configuration
CVE-2020-15147 Red-DiscordBot primary_impact T1059 Command and Scripting Interpreter
CVE-2020-15147 Red-DiscordBot exploitation_technique T1133 External Remote Services
CVE-2020-15118 wagtail primary_impact T1059 Command and Scripting Interpreter
CVE-2020-15118 wagtail secondary_impact T1185 Man in the Browser
CVE-2020-5210 NetHack primary_impact T1574 Hijack Execution Flow
CVE-2020-5210 NetHack primary_impact T1499.004 Application or System Exploitation
CVE-2020-11055 BookStack primary_impact T1059 Command and Scripting Interpreter
CVE-2020-11055 BookStack secondary_impact T1185 Man in the Browser
CVE-2020-5283 viewvc primary_impact T1059 Command and Scripting Interpreter
CVE-2020-5283 viewvc secondary_impact T1185 Man in the Browser
CVE-2020-15211 tensorflow primary_impact T1574 Hijack Execution Flow
CVE-2020-15211 tensorflow exploitation_technique T1190 Exploit Public-Facing Application
CVE-2020-5220 SyliusResourceBundle primary_impact T1005 Data from Local System
CVE-2020-5220 SyliusResourceBundle exploitation_technique T1190 Exploit Public-Facing Application
CVE-2020-11021 http-client primary_impact T1005 Data from Local System
CVE-2020-11021 http-client exploitation_technique T1190 Exploit Public-Facing Application
CVE-2020-5269 PrestaShop primary_impact T1059.007 JavaScript
CVE-2020-5269 PrestaShop secondary_impact T1557 Man-in-the-Middle
CVE-2020-5269 PrestaShop exploitation_technique T1204.001 Malicious Link
CVE-2020-11030 WordPress primary_impact T1059.007 JavaScript
CVE-2020-11030 WordPress secondary_impact T1557 Man-in-the-Middle
CVE-2020-11030 WordPress exploitation_technique T1204.001 Malicious Link
CVE-2020-11036 GLPI primary_impact T1059.007 JavaScript
CVE-2020-11036 GLPI secondary_impact T1185 Man in the Browser
CVE-2020-11036 GLPI exploitation_technique T1189 Drive-by Compromise
CVE-2020-15100 freewvs primary_impact T1574 Hijack Execution Flow
CVE-2020-15100 freewvs primary_impact T1499.004 Application or System Exploitation
CVE-2020-15100 freewvs exploitation_technique T1078 Valid Accounts
CVE-2020-15094 symfony primary_impact T1059 Command and Scripting Interpreter
CVE-2020-15094 symfony exploitation_technique T1040 Network Sniffing
CVE-2020-15140 Red-DiscordBot primary_impact T1059 Command and Scripting Interpreter
CVE-2020-15140 Red-DiscordBot exploitation_technique T1133 External Remote Services
CVE-2020-11087 FreeRDP primary_impact T1005 Data from Local System
CVE-2020-11087 FreeRDP secondary_impact T1211 Exploitation for Defense Evasion
CVE-2020-11023 jQuery primary_impact T1059.007 JavaScript
CVE-2020-11023 jQuery secondary_impact T1557 Man-in-the-Middle
CVE-2020-11023 jQuery exploitation_technique T1204.001 Malicious Link
CVE-2020-5290 rctf primary_impact T1563 Remote Service Session Hijacking
CVE-2020-5290 rctf exploitation_technique T1189 Drive-by Compromise
CVE-2020-11090 Indy Node primary_impact T1499.004 Application or System Exploitation
CVE-2020-5270 PrestaShop secondary_impact T1036 Masquerading
CVE-2020-5270 PrestaShop secondary_impact T1059.007 JavaScript
CVE-2020-5270 PrestaShop secondary_impact T1557 Man-in-the-Middle
CVE-2020-5270 PrestaShop secondary_impact T1005 Data from Local System
CVE-2020-5270 PrestaShop exploitation_technique T1566.002 Spearphishing Link
CVE-2020-5254 NetHack primary_impact T1574 Hijack Execution Flow
CVE-2020-5254 NetHack exploitation_technique T1190 Exploit Public-Facing Application
CVE-2020-15096 electron primary_impact T1059 Command and Scripting Interpreter
CVE-2020-15096 electron exploitation_technique T1190 Exploit Public-Facing Application
CVE-2020-11013 Helm primary_impact T1190 Exploit Public-Facing Application
CVE-2020-15095 cli primary_impact T1552 Unsecured Credentials
CVE-2020-15233 fosite secondary_impact T1036 Masquerading
CVE-2020-15233 fosite exploitation_technique T1566.002 Spearphishing Link
CVE-2020-5252 safety primary_impact T1190 Exploit Public-Facing Application
CVE-2020-11019 FreeRDP primary_impact T1005 Data from Local System
CVE-2020-11019 FreeRDP primary_impact T1499.004 Application or System Exploitation
CVE-2020-11019 FreeRDP secondary_impact T1211 Exploitation for Defense Evasion
CVE-2020-15182 soycms primary_impact T1068 Exploitation for Privilege Escalation
CVE-2020-15182 soycms exploitation_technique T1204.001 Malicious Link
CVE-2020-5264 PrestaShop primary_impact T1059.007 JavaScript
CVE-2020-5264 PrestaShop secondary_impact T1557 Man-in-the-Middle
CVE-2020-5264 PrestaShop exploitation_technique T1204.001 Malicious Link
CVE-2020-11078 httplib2 primary_impact T1190 Exploit Public-Facing Application
CVE-2020-11050 Java-WebSocket primary_impact T1190 Exploit Public-Facing Application
CVE-2020-15170 apollo primary_impact T1190 Exploit Public-Facing Application
CVE-2020-15170 apollo primary_impact T1478 Install Insecure or Malicious Configuration
CVE-2020-5295 october primary_impact T1005 Data from Local System
CVE-2020-5295 october exploitation_technique T1133 External Remote Services
CVE-2020-15189 soycms primary_impact T1505.003 Web Shell
CVE-2020-15189 soycms secondary_impact T1059 Command and Scripting Interpreter
CVE-2020-15189 soycms exploitation_technique T1133 External Remote Services
CVE-2020-15137 HoRNDIS primary_impact T1005 Data from Local System
CVE-2020-15137 HoRNDIS primary_impact T1499.004 Application or System Exploitation
CVE-2020-15137 HoRNDIS exploitation_technique T1190 Exploit Public-Facing Application
CVE-2020-11035 GLPI primary_impact T1078 Valid Accounts
CVE-2020-11035 GLPI primary_impact T1557 Man-in-the-Middle
CVE-2020-11035 GLPI primary_impact T1040 Network Sniffing
CVE-2020-11035 GLPI exploitation_technique T1110 Brute Force
CVE-2020-5217 secure_headers primary_impact T1059 Command and Scripting Interpreter
CVE-2020-5217 secure_headers secondary_impact T1185 Man in the Browser
CVE-2020-5261 Saml2 primary_impact T1190 Exploit Public-Facing Application
CVE-2020-5261 Saml2 exploitation_technique T1040 Network Sniffing
CVE-2020-11054 qutebrowser primary_impact T1190 Exploit Public-Facing Application
CVE-2020-11054 qutebrowser exploitation_technique T1189 Drive-by Compromise
CVE-2020-4068 APNSwift primary_impact T1574 Hijack Execution Flow
CVE-2020-4068 APNSwift primary_impact T1499.004 Application or System Exploitation
CVE-2020-4068 APNSwift exploitation_technique T1189 Drive-by Compromise
CVE-2020-4068 APNSwift exploitation_technique T1190 Exploit Public-Facing Application
CVE-2020-4068 APNSwift exploitation_technique T1133 External Remote Services
CVE-2020-4068 APNSwift exploitation_technique T1566 Phishing
CVE-2020-4068 APNSwift exploitation_technique T1204.002 Malicious File
CVE-2020-4068 APNSwift exploitation_technique T1091 Replication Through Removable Media
CVE-2020-15109 solidus primary_impact T1190 Exploit Public-Facing Application
CVE-2020-15109 solidus secondary_impact T1565 Data Manipulation
CVE-2020-15109 solidus exploitation_technique T1133 External Remote Services
CVE-2020-11082 Kaminari primary_impact T1059.007 JavaScript
CVE-2020-11082 Kaminari secondary_impact T1557 Man-in-the-Middle
CVE-2020-11082 Kaminari exploitation_technique T1204.001 Malicious Link
CVE-2020-15093 tough primary_impact T1078 Valid Accounts
CVE-2020-15093 tough primary_impact T1557 Man-in-the-Middle
CVE-2020-15093 tough primary_impact T1040 Network Sniffing
CVE-2020-15093 tough exploitation_technique T1110 Brute Force
CVE-2020-5225 SimpleSAMLphp primary_impact T1190 Exploit Public-Facing Application
CVE-2020-5225 SimpleSAMLphp secondary_impact T1565 Data Manipulation
CVE-2020-5225 SimpleSAMLphp exploitation_technique T1133 External Remote Services
CVE-2020-5266 ps_linklist primary_impact T1059.007 JavaScript
CVE-2020-5266 ps_linklist secondary_impact T1557 Man-in-the-Middle
CVE-2020-5266 ps_linklist exploitation_technique T1189 Drive-by Compromise
CVE-2020-15208 tensorflow primary_impact T1574 Hijack Execution Flow
CVE-2020-15208 tensorflow primary_impact T1499.004 Application or System Exploitation
CVE-2020-11010 tortoise-orm primary_impact T1059 Command and Scripting Interpreter
CVE-2020-11010 tortoise-orm secondary_impact T1005 Data from Local System
CVE-2020-11010 tortoise-orm secondary_impact T1505.003 Web Shell
CVE-2020-11010 tortoise-orm secondary_impact T1136 Create Account
CVE-2020-11010 tortoise-orm secondary_impact T1190 Exploit Public-Facing Application
CVE-2020-11010 tortoise-orm secondary_impact T1565.001 Stored Data Manipulation
CVE-2020-11010 tortoise-orm exploitation_technique T1133 External Remote Services
CVE-2020-15143 SyliusResourceBundle primary_impact T1059 Command and Scripting Interpreter
CVE-2020-15143 SyliusResourceBundle exploitation_technique T1133 External Remote Services
CVE-2020-11039 FreeRDP primary_impact T1574 Hijack Execution Flow
CVE-2020-11039 FreeRDP primary_impact T1005 Data from Local System
CVE-2020-11039 FreeRDP primary_impact T1499.004 Application or System Exploitation
CVE-2020-15199 tensorflow primary_impact T1574 Hijack Execution Flow
CVE-2020-15199 tensorflow primary_impact T1499.004 Application or System Exploitation
CVE-2020-15179 wiki-scratchsig primary_impact T1059 Command and Scripting Interpreter
CVE-2020-15179 wiki-scratchsig secondary_impact T1185 Man in the Browser
CVE-2020-5271 PrestaShop primary_impact T1059.007 JavaScript
CVE-2020-5271 PrestaShop secondary_impact T1557 Man-in-the-Middle
CVE-2020-5271 PrestaShop exploitation_technique T1204.001 Malicious Link
CVE-2020-5231 opencast primary_impact T1078.001 Default Accounts
CVE-2020-5231 opencast secondary_impact T1136 Create Account
CVE-2020-5279 PrestaShop primary_impact T1190 Exploit Public-Facing Application
CVE-2020-11059 AEgir primary_impact T1005 Data from Local System
CVE-2020-15183 soycms primary_impact T1059 Command and Scripting Interpreter
CVE-2020-15183 soycms secondary_impact T1185 Man in the Browser
CVE-2020-11044 FreeRDP primary_impact T1499.004 Application or System Exploitation
CVE-2020-5284 next.js primary_impact T1005 Data from Local System
CVE-2020-15162 PrestaShop primary_impact T1059 Command and Scripting Interpreter
CVE-2020-15162 PrestaShop secondary_impact T1185 Man in the Browser
CVE-2020-11073 zsh-autoswitch-virtualenv primary_impact T1059 Command and Scripting Interpreter
CVE-2020-11073 zsh-autoswitch-virtualenv exploitation_technique T1204.002 Malicious File
CVE-2020-5267 actionview primary_impact T1059 Command and Scripting Interpreter
CVE-2020-5267 actionview secondary_impact T1185 Man in the Browser
CVE-2020-11068 LoRaMac-node primary_impact T1574 Hijack Execution Flow
CVE-2020-11068 LoRaMac-node primary_impact T1499.004 Application or System Exploitation
CVE-2020-5297 october primary_impact T1505.003 Web Shell
CVE-2020-5297 october secondary_impact T1059 Command and Scripting Interpreter
CVE-2020-5241 matestack-ui-core primary_impact T1059 Command and Scripting Interpreter
CVE-2020-5241 matestack-ui-core secondary_impact T1185 Man in the Browser
CVE-2020-5253 NetHack primary_impact T1574 Hijack Execution Flow
CVE-2020-5253 NetHack primary_impact T1499.004 Application or System Exploitation
CVE-2020-5253 NetHack exploitation_technique T1478 Install Insecure or Malicious Configuration
CVE-2020-15132 sulu primary_impact T1589 Gather Victim Identity Information
CVE-2020-11045 FreeRDP primary_impact T1005 Data from Local System
CVE-2020-11083 October secondary_impact T1185 Man in the Browser
CVE-2020-5281 perun primary_impact T1059 Command and Scripting Interpreter
CVE-2020-6986 Omron PLC CJ Series primary_impact T0814 Denial of Service
CVE-2020-6986 Omron PLC CJ Series primary_impact T1499 Endpoint Denial of Service
CVE-2020-12029 FactoryTalk View SE primary_impact T1505.003 Web Shell
CVE-2020-12029 FactoryTalk View SE secondary_impact T1059 Command and Scripting Interpreter
CVE-2020-12029 FactoryTalk View SE exploitation_technique T1133 External Remote Services
CVE-2020-6960 Honeywell Maxpro VMS & NVR primary_impact T1059 Command and Scripting Interpreter
CVE-2020-12014 Advantech WebAccess Node primary_impact T1059 Command and Scripting Interpreter
CVE-2020-12038 EDS Subsystem, FactoryTalk Linx software (Previously called RSLinx Enterprise), RSLinx Classic, RSNetWorx software, Studio 5000 Logix Designer software primary_impact T1499.004 Application or System Exploitation
CVE-2020-12038 EDS Subsystem, FactoryTalk Linx software (Previously called RSLinx Enterprise), RSLinx Classic, RSNetWorx software, Studio 5000 Logix Designer software exploitation_technique T1204.001 Malicious Link
CVE-2020-12008 Baxter ExactaMix EM 2400 & EM 1200 primary_impact T1552 Unsecured Credentials
CVE-2020-12008 Baxter ExactaMix EM 2400 & EM 1200 secondary_impact T0859 Valid Accounts
CVE-2020-12008 Baxter ExactaMix EM 2400 & EM 1200 exploitation_technique T0842 Network Sniffing
CVE-2020-16200 Philips Clinical Collaboration Platform primary_impact T1496 Resource Hijacking
CVE-2020-16200 Philips Clinical Collaboration Platform secondary_impact T0826 Loss of Availability
CVE-2020-6964 GE CARESCAPE Telemetry Server,ApexPro Telemetry Server,CARESCAPE Central Station,Clinical Information Center systems,CARESCAPE B450,B650,B850 Monitors primary_impact T1190 Exploit Public-Facing Application
CVE-2020-6964 GE CARESCAPE Telemetry Server,ApexPro Telemetry Server,CARESCAPE Central Station,Clinical Information Center systems,CARESCAPE B450,B650,B850 Monitors primary_impact T1068 Exploitation for Privilege Escalation
CVE-2020-6964 GE CARESCAPE Telemetry Server,ApexPro Telemetry Server,CARESCAPE Central Station,Clinical Information Center systems,CARESCAPE B450,B650,B850 Monitors secondary_impact T1059 Command and Scripting Interpreter
CVE-2020-6993 Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower primary_impact T1005 Data from Local System
CVE-2020-6993 Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower exploitation_technique T1190 Exploit Public-Facing Application
CVE-2020-14510 GateManager primary_impact T1078.001 Default Accounts
CVE-2020-14510 GateManager secondary_impact T1068 Exploitation for Privilege Escalation
CVE-2020-14510 GateManager secondary_impact T1059 Command and Scripting Interpreter
CVE-2020-14508 GateManager primary_impact T1059 Command and Scripting Interpreter
CVE-2020-14508 GateManager primary_impact T1499 Endpoint Denial of Service
CVE-2020-14508 GateManager exploitation_technique T1190 Exploit Public-Facing Application
CVE-2020-7004 VBASE Editor primary_impact T1068 Exploitation for Privilege Escalation
CVE-2020-10603 WebAccess/NMS primary_impact T1059 Command and Scripting Interpreter
CVE-2020-10603 WebAccess/NMS exploitation_technique T1133 External Remote Services
CVE-2020-12024 Baxter ExactaMix EM 2400 & EM 1200 primary_impact T1091 Replication Through Removable Media
CVE-2020-12000 Ignition 8 Gateway primary_impact T1059 Command and Scripting Interpreter
CVE-2020-12000 Ignition 8 Gateway exploitation_technique T1133 External Remote Services
CVE-2020-16211 Advantech WebAccess HMI Designer primary_impact T1005 Data from Local System
CVE-2020-16211 Advantech WebAccess HMI Designer exploitation_technique T1204.002 Malicious File
CVE-2020-16198 Philips Clinical Collaboration Platform primary_impact T1036 Masquerading
CVE-2020-10602 OSIsoft PI System multiple products and versions primary_impact T1499.004 Application or System Exploitation
CVE-2020-0884 Microsoft Visual Studio 2017 version 15.9 (includes 15.1 - 15.8) primary_impact T1528 Steal Application Access Token
CVE-2020-0884 Microsoft Visual Studio 2017 version 15.9 (includes 15.1 - 15.8) exploitation_technique T1040 Network Sniffing
CVE-2020-1025 Skype for Business Server 2019 CU2 primary_impact T1190 Exploit Public-Facing Application
CVE-2020-1111 Windows primary_impact T1068 Exploitation for Privilege Escalation
CVE-2020-1111 Windows secondary_impact T1005 Data from Local System
CVE-2020-1111 Windows secondary_impact T1565 Data Manipulation
CVE-2020-1111 Windows secondary_impact T1485 Data Destruction
CVE-2020-1111 Windows secondary_impact T1136 Create Account
CVE-2020-0671 Windows primary_impact T1574 Hijack Execution Flow
CVE-2020-0671 Windows primary_impact T1499.004 Application or System Exploitation
CVE-2020-0671 Windows secondary_impact T1005 Data from Local System
CVE-2020-0671 Windows secondary_impact T1565 Data Manipulation
CVE-2020-0671 Windows secondary_impact T1485 Data Destruction
CVE-2020-0671 Windows secondary_impact T1136 Create Account
CVE-2020-0898 Windows primary_impact T1574 Hijack Execution Flow
CVE-2020-0898 Windows primary_impact T1499.004 Application or System Exploitation
CVE-2020-1456 Microsoft SharePoint Enterprise Server primary_impact T1059 Command and Scripting Interpreter
CVE-2020-1456 Microsoft SharePoint Enterprise Server secondary_impact T1005 Data from Local System
CVE-2020-1456 Microsoft SharePoint Enterprise Server secondary_impact T1565 Data Manipulation
CVE-2020-1456 Microsoft SharePoint Enterprise Server secondary_impact T1485 Data Destruction
CVE-2020-1456 Microsoft SharePoint Enterprise Server secondary_impact T1478 Install Insecure or Malicious Configuration
CVE-2020-1456 Microsoft SharePoint Enterprise Server secondary_impact T1036 Masquerading
CVE-2020-1109 Windows primary_impact T1574 Hijack Execution Flow
CVE-2020-1109 Windows primary_impact T1499.004 Application or System Exploitation
CVE-2020-1109 Windows secondary_impact T1005 Data from Local System
CVE-2020-1109 Windows secondary_impact T1565 Data Manipulation
CVE-2020-1109 Windows secondary_impact T1485 Data Destruction
CVE-2020-1109 Windows secondary_impact T1136 Create Account
CVE-2020-1347 Windows 10 Version 2004 for 32-bit Systems primary_impact T1068 Exploitation for Privilege Escalation
CVE-2020-1163 Microsoft Forefront Endpoint Protection primary_impact T1485 Data Destruction
CVE-2020-1068 Windows primary_impact T1565 Data Manipulation
CVE-2020-1495 Microsoft SharePoint Server 2010 Service Pack 2 primary_impact T1574 Hijack Execution Flow
CVE-2020-1495 Microsoft SharePoint Server 2010 Service Pack 2 primary_impact T1499.004 Application or System Exploitation
CVE-2020-1495 Microsoft SharePoint Server 2010 Service Pack 2 secondary_impact T1005 Data from Local System
CVE-2020-1495 Microsoft SharePoint Server 2010 Service Pack 2 secondary_impact T1565 Data Manipulation
CVE-2020-1495 Microsoft SharePoint Server 2010 Service Pack 2 secondary_impact T1485 Data Destruction
CVE-2020-1495 Microsoft SharePoint Server 2010 Service Pack 2 secondary_impact T1136 Create Account
CVE-2020-1495 Microsoft SharePoint Server 2010 Service Pack 2 exploitation_technique T1204.002 Malicious File
CVE-2020-1495 Microsoft SharePoint Server 2010 Service Pack 2 exploitation_technique T1566 Phishing
CVE-2020-1425 Windows 10 Version 2004 for x64-based Systems primary_impact T1574 Hijack Execution Flow
CVE-2020-1425 Windows 10 Version 2004 for x64-based Systems primary_impact T1499.004 Application or System Exploitation
CVE-2020-0758 Team Foundation Server 2018 primary_impact T1068 Exploitation for Privilege Escalation
CVE-2020-0758 Team Foundation Server 2018 exploitation_technique T1098 Account Manipulation
CVE-2020-1141 Windows primary_impact T1005 Data from Local System
CVE-2020-1141 Windows secondary_impact T1211 Exploitation for Defense Evasion
CVE-2020-1569 Microsoft Edge (EdgeHTML-based) primary_impact T1574 Hijack Execution Flow
CVE-2020-1569 Microsoft Edge (EdgeHTML-based) primary_impact T1499.004 Application or System Exploitation
CVE-2020-1569 Microsoft Edge (EdgeHTML-based) secondary_impact T1005 Data from Local System
CVE-2020-1569 Microsoft Edge (EdgeHTML-based) secondary_impact T1565 Data Manipulation
CVE-2020-1569 Microsoft Edge (EdgeHTML-based) secondary_impact T1485 Data Destruction
CVE-2020-1569 Microsoft Edge (EdgeHTML-based) secondary_impact T1136 Create Account
CVE-2020-1569 Microsoft Edge (EdgeHTML-based) exploitation_technique T1204.002 Malicious File
CVE-2020-1569 Microsoft Edge (EdgeHTML-based) exploitation_technique T1566 Phishing
CVE-2020-16874 Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6) primary_impact T1574 Hijack Execution Flow
CVE-2020-16874 Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6) primary_impact T1499.004 Application or System Exploitation
CVE-2020-16874 Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6) secondary_impact T1005 Data from Local System
CVE-2020-16874 Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6) secondary_impact T1565 Data Manipulation
CVE-2020-16874 Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6) secondary_impact T1485 Data Destruction
CVE-2020-16874 Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6) secondary_impact T1136 Create Account
CVE-2020-16874 Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6) exploitation_technique T1204.002 Malicious File
CVE-2020-1190 Windows primary_impact T1068 Exploitation for Privilege Escalation
CVE-2020-0955 Windows primary_impact T1005 Data from Local System
CVE-2020-0981 Windows 10 Version 1909 for 32-bit Systems primary_impact T1134 Access Token Manipulation
CVE-2020-0981 Windows 10 Version 1909 for 32-bit Systems secondary_impact T1068 Exploitation for Privilege Escalation
CVE-2020-0981 Windows 10 Version 1909 for 32-bit Systems secondary_impact T1497 Virtualization/Sandbox Evasion
CVE-2020-1471 Windows 10 Version 1803 primary_impact T1068 Exploitation for Privilege Escalation
CVE-2020-0636 Windows 10 Version 1903 for 32-bit Systems primary_impact T1068 Exploitation for Privilege Escalation
CVE-2020-11652 n/a uncategorized T1005 Data from Local System
CVE-2020-11652 n/a uncategorized T1190 Exploit Public-Facing Application
CVE-2020-6808 Firefox uncategorized T1036.005 Match Legitimate Name or Location
CVE-2020-6820 Thunderbird uncategorized T1055 Process Injection
CVE-2020-6820 Thunderbird uncategorized T1189 Drive-by Compromise
CVE-2020-8835 Linux kernel uncategorized T1068 Exploitation for Privilege Escalation
CVE-2020-8467 Trend Micro OfficeScan, Trend Micro Apex One uncategorized T1068 Exploitation for Privilege Escalation
CVE-2020-12659 n/a uncategorized T1068 Exploitation for Privilege Escalation
CVE-2020-10751 kernel uncategorized T1068 Exploitation for Privilege Escalation
CVE-2020-1027 Windows uncategorized T1068 Exploitation for Privilege Escalation
CVE-2020-5539 GRANDIT uncategorized T1068 Exploitation for Privilege Escalation
CVE-2020-5539 GRANDIT uncategorized T1565.001 Stored Data Manipulation
CVE-2020-5539 GRANDIT uncategorized T1005 Data from Local System
CVE-2020-10817 n/a uncategorized T1068 Exploitation for Privilege Escalation
CVE-2020-10817 n/a uncategorized T1211 Exploitation for Defense Evasion
CVE-2020-8649 n/a uncategorized T1068 Exploitation for Privilege Escalation
CVE-2020-8649 n/a uncategorized T1499.004 Application or System Exploitation
CVE-2020-12652 n/a uncategorized T1068 Exploitation for Privilege Escalation
CVE-2020-12652 n/a uncategorized T1499.004 Application or System Exploitation
CVE-2020-7456 FreeBSD uncategorized T1091 Replication Through Removable Media
CVE-2020-7456 FreeBSD uncategorized T1203 Exploitation for Client Execution
CVE-2020-12464 n/a uncategorized T1091 Replication Through Removable Media
CVE-2020-12464 n/a uncategorized T1203 Exploitation for Client Execution
CVE-2020-15393 n/a uncategorized T1091 Replication Through Removable Media
CVE-2020-15393 n/a uncategorized T1499.001 OS Exhaustion Flood
CVE-2020-9804 macOS uncategorized T1091 Replication Through Removable Media
CVE-2020-9804 macOS uncategorized T1499.004 Application or System Exploitation
CVE-2020-11957 n/a uncategorized T1110 Brute Force
CVE-2020-9819 iOS uncategorized T1114.001 Local Email Collection
CVE-2020-9819 iOS uncategorized T1565.001 Stored Data Manipulation
CVE-2020-9819 iOS uncategorized T1485 Data Destruction
CVE-2020-6418 Chrome uncategorized T1189 Drive-by Compromise
CVE-2020-6418 Chrome uncategorized T1203 Exploitation for Client Execution
CVE-2020-5902 BIG-IP uncategorized T1189 Drive-by Compromise
CVE-2020-5902 BIG-IP uncategorized T1203 Exploitation for Client Execution
CVE-2020-11901 n/a uncategorized T1189 Drive-by Compromise
CVE-2020-11901 n/a uncategorized T1203 Exploitation for Client Execution
CVE-2020-11901 n/a uncategorized T1059.007 JavaScript
CVE-2020-13125 n/a uncategorized T1189 Drive-by Compromise
CVE-2020-13125 n/a uncategorized T1203 Exploitation for Client Execution
CVE-2020-13125 n/a uncategorized T1204.002 Malicious File
CVE-2020-13125 n/a uncategorized T1499.004 Application or System Exploitation
CVE-2020-6974 Honeywell Notifier Web Server (NWS) uncategorized T1190 Exploit Public-Facing Application
CVE-2020-6974 Honeywell Notifier Web Server (NWS) uncategorized T1005 Data from Local System
CVE-2020-6974 Honeywell Notifier Web Server (NWS) uncategorized T1565 Data Manipulation
CVE-2020-11738 n/a uncategorized T1190 Exploit Public-Facing Application
CVE-2020-11738 n/a uncategorized T1055 Process Injection
CVE-2020-9380 n/a uncategorized T1190 Exploit Public-Facing Application
CVE-2020-9380 n/a uncategorized T1059 Command and Scripting Interpreter
CVE-2020-10189 n/a uncategorized T1190 Exploit Public-Facing Application
CVE-2020-10189 n/a uncategorized T1059 Command and Scripting Interpreter
CVE-2020-9459 n/a uncategorized T1190 Exploit Public-Facing Application
CVE-2020-9459 n/a uncategorized T1059.007 JavaScript
CVE-2020-9459 n/a uncategorized T1539 Steal Web Session Cookie
CVE-2020-9459 n/a uncategorized T1565 Data Manipulation
CVE-2020-9459 n/a uncategorized T1491 Defacement
CVE-2020-13126 n/a uncategorized T1190 Exploit Public-Facing Application
CVE-2020-13126 n/a uncategorized T1203 Exploitation for Client Execution
CVE-2020-11897 n/a uncategorized T1190 Exploit Public-Facing Application
CVE-2020-11897 n/a uncategorized T1203 Exploitation for Client Execution
CVE-2020-11897 n/a uncategorized T1499 Endpoint Denial of Service
CVE-2020-11896 n/a uncategorized T1190 Exploit Public-Facing Application
CVE-2020-11896 n/a uncategorized T1203 Exploitation for Client Execution
CVE-2020-11896 n/a uncategorized T1499 Endpoint Denial of Service
CVE-2020-9818 iOS uncategorized T1203 Exploitation for Client Execution
CVE-2020-1631 Junos OS uncategorized T1203 Exploitation for Client Execution
CVE-2020-1350 Windows Server uncategorized T1203 Exploitation for Client Execution
CVE-2020-0938 Windows uncategorized T1203 Exploitation for Client Execution
CVE-2020-6819 Thunderbird uncategorized T1203 Exploitation for Client Execution
CVE-2020-6819 Thunderbird uncategorized T1189 Drive-by Compromise
CVE-2020-10257 n/a uncategorized T1203 Exploitation for Client Execution
CVE-2020-10257 n/a uncategorized T1189 Drive-by Compromise
CVE-2020-2883 WebLogic Server uncategorized T1203 Exploitation for Client Execution
CVE-2020-2883 WebLogic Server uncategorized T1190 Exploit Public-Facing Application
CVE-2020-0601 Windows uncategorized T1203 Exploitation for Client Execution
CVE-2020-0601 Windows uncategorized T1190 Exploit Public-Facing Application
CVE-2020-1206 Windows 10 Version 1909 for 32-bit Systems uncategorized T1210 Exploitation of Remote Services
CVE-2020-8468 Trend Micro OfficeScan, Trend Micro Apex One, Trend Micro Worry-Free Business Security (WFBS) uncategorized T1211 Exploitation for Defense Evasion
CVE-2020-8648 n/a uncategorized T1499.004 Application or System Exploitation
CVE-2020-14059 n/a uncategorized T1499.004 Application or System Exploitation
CVE-2020-12888 n/a uncategorized T1499.004 Application or System Exploitation
CVE-2020-12655 n/a uncategorized T1499.004 Application or System Exploitation
CVE-2020-11884 n/a uncategorized T1499.004 Application or System Exploitation
CVE-2020-11668 n/a uncategorized T1499.004 Application or System Exploitation
CVE-2020-12653 n/a uncategorized T1499.004 Application or System Exploitation
CVE-2020-12653 n/a uncategorized T1068 Exploitation for Privilege Escalation
CVE-2020-11608 n/a uncategorized T1499.004 Application or System Exploitation
CVE-2020-11608 n/a uncategorized T1068 Exploitation for Privilege Escalation
CVE-2020-12769 n/a uncategorized T1499.004 Application or System Exploitation
CVE-2020-11651 n/a uncategorized T1528 Steal Application Access Token
CVE-2020-11651 n/a uncategorized T1068 Exploitation for Privilege Escalation
CVE-2020-11651 n/a uncategorized T1059 Command and Scripting Interpreter
CVE-2020-5300 hydra uncategorized T1528 Steal Application Access Token
CVE-2020-5300 hydra uncategorized T1068 Exploitation for Privilege Escalation
CVE-2020-4408 Qradar Advisor uncategorized T1552 Unsecured Credentials
CVE-2020-1020 Windows uncategorized T1566 Phishing
CVE-2020-1020 Windows uncategorized T1203 Exploitation for Client Execution
CVE-2020-4100 "HCL Verse for Android" uncategorized T1574 Hijack Execution Flow
CVE-2020-0688 Microsoft Exchange Server 2013 uncategorized T1574 Hijack Execution Flow
CVE-2020-0688 Microsoft Exchange Server 2013 uncategorized T1068 Exploitation for Privilege Escalation

Capabilities

Capability ID Capability Name Number of Mappings
CVE-2020-11087 FreeRDP 2
CVE-2020-11090 Indy Node 1
CVE-2020-11035 GLPI 4
CVE-2020-1111 Windows 5
CVE-2020-3407 Cisco IOS XE Software 2
CVE-2020-5350 Integrated Data Protection Appliance 2
CVE-2020-8467 Trend Micro OfficeScan, Trend Micro Apex One 1
CVE-2020-5379 CPG BIOS 1
CVE-2020-11021 http-client 2
CVE-2020-1141 Windows 2
CVE-2020-15143 SyliusResourceBundle 2
CVE-2020-6974 Honeywell Notifier Web Server (NWS) 3
CVE-2020-3177 Cisco Unified Communications Manager 2
CVE-2020-5371 Isilon OneFS 2
CVE-2020-3312 Cisco Firepower Threat Defense Software 2
CVE-2020-1109 Windows 6
CVE-2020-3356 Cisco Data Center Network Manager 3
CVE-2020-1025 Skype for Business Server 2019 CU2 1
CVE-2020-3513 Cisco IOS XE Software 2
CVE-2020-2883 WebLogic Server 2
CVE-2020-9380 n/a 2
CVE-2020-5328 Isilon OneFS 1
CVE-2020-3387 Cisco SD-WAN vManage 3
CVE-2020-15093 tough 4
CVE-2020-1163 Microsoft Forefront Endpoint Protection 1
CVE-2020-3133 Cisco Email Security Appliance (ESA) 2
CVE-2020-15147 Red-DiscordBot 2
CVE-2020-3309 Cisco Firepower Threat Defense Software 4
CVE-2020-1456 Microsoft SharePoint Enterprise Server 6
CVE-2020-15118 wagtail 2
CVE-2020-11068 LoRaMac-node 2
CVE-2020-5253 NetHack 3
CVE-2020-5358 Dell Encryption Enterprise 1
CVE-2020-15393 n/a 2
CVE-2020-6986 Omron PLC CJ Series 2
CVE-2020-10602 OSIsoft PI System multiple products and versions 1
CVE-2020-11668 n/a 1
CVE-2020-15208 tensorflow 2
CVE-2020-1206 Windows 10 Version 1909 for 32-bit Systems 1
CVE-2020-5364 Isilon OneFS 2
CVE-2020-5217 secure_headers 2
CVE-2020-10603 WebAccess/NMS 2
CVE-2020-5271 PrestaShop 3
CVE-2020-5339 RSA Authentication Manager 3
CVE-2020-11651 n/a 3
CVE-2020-5340 RSA Authentication Manager 3
CVE-2020-5210 NetHack 2
CVE-2020-8649 n/a 2
CVE-2020-0601 Windows 2
CVE-2020-11045 FreeRDP 1
CVE-2020-3292 Cisco Small Business RV Series Router Firmware 4
CVE-2020-0955 Windows 1
CVE-2020-12000 Ignition 8 Gateway 2
CVE-2020-11608 n/a 2
CVE-2020-5376 CPG BIOS 1
CVE-2020-11073 zsh-autoswitch-virtualenv 2
CVE-2020-5297 october 2
CVE-2020-3476 Cisco IOS XE Software 2
CVE-2020-3349 Cisco Data Center Network Manager 3
CVE-2020-3397 Cisco NX-OS Software 2
CVE-2020-3216 Cisco IOS XE SD-WAN Software 2
CVE-2020-1631 Junos OS 1
CVE-2020-5295 october 2
CVE-2020-9819 iOS 3
CVE-2020-1020 Windows 2
CVE-2020-15170 apollo 2
CVE-2020-0981 Windows 10 Version 1909 for 32-bit Systems 3
CVE-2020-11083 October 1
CVE-2020-11039 FreeRDP 3
CVE-2020-3460 Cisco Data Center Network Manager 2
CVE-2020-8835 Linux kernel 1
CVE-2020-12024 Baxter ExactaMix EM 2400 & EM 1200 1
CVE-2020-6418 Chrome 2
CVE-2020-5290 rctf 2
CVE-2020-10817 n/a 2
CVE-2020-3379 Cisco SD-WAN Solution 2
CVE-2020-3403 Cisco IOS XE Software 3
CVE-2020-3306 Cisco Adaptive Security Appliance (ASA) Software 2
CVE-2020-14510 GateManager 3
CVE-2020-4068 APNSwift 8
CVE-2020-1495 Microsoft SharePoint Server 2010 Service Pack 2 8
CVE-2020-5270 PrestaShop 5
CVE-2020-11013 Helm 1
CVE-2020-12655 n/a 1
CVE-2020-11019 FreeRDP 3
CVE-2020-5366 Integrated Dell Remote Access Controller (iDRAC) 2
CVE-2020-3233 Cisco IOx 3
CVE-2020-5231 opencast 2
CVE-2020-5261 Saml2 2
CVE-2020-6808 Firefox 1
CVE-2020-16200 Philips Clinical Collaboration Platform 2
CVE-2020-1425 Windows 10 Version 2004 for x64-based Systems 2
CVE-2020-1027 Windows 1
CVE-2020-5374 OMIMSSC (OpenManage Integration for Microsoft System Center) 1
CVE-2020-10751 kernel 1
CVE-2020-11055 BookStack 2
CVE-2020-5284 next.js 1
CVE-2020-12464 n/a 2
CVE-2020-3240 Cisco UCS Director 6
CVE-2020-11050 Java-WebSocket 1
CVE-2020-16211 Advantech WebAccess HMI Designer 2
CVE-2020-5254 NetHack 2
CVE-2020-15094 symfony 2
CVE-2020-3121 Cisco 550X Series Stackable Managed Switches 3
CVE-2020-12653 n/a 2
CVE-2020-0758 Team Foundation Server 2018 2
CVE-2020-5332 RSA Archer 1
CVE-2020-11957 n/a 1
CVE-2020-5283 viewvc 2
CVE-2020-11030 WordPress 3
CVE-2020-5281 perun 1
CVE-2020-5279 PrestaShop 1
CVE-2020-15183 soycms 2
CVE-2020-6960 Honeywell Maxpro VMS & NVR 1
CVE-2020-5386 Elastic Cloud Storage 1
CVE-2020-13126 n/a 2
CVE-2020-5539 GRANDIT 3
CVE-2020-6820 Thunderbird 2
CVE-2020-5345 Unisphere for PowerMax 2
CVE-2020-11901 n/a 3
CVE-2020-15109 solidus 3
CVE-2020-14508 GateManager 3
CVE-2020-15211 tensorflow 2
CVE-2020-12769 n/a 1
CVE-2020-8648 n/a 1
CVE-2020-1471 Windows 10 Version 1803 1
CVE-2020-3244 Cisco ASR 5000 Series Software 2
CVE-2020-15188 soycms 2
CVE-2020-1190 Windows 1
CVE-2020-5264 PrestaShop 3
CVE-2020-5300 hydra 2
CVE-2020-12038 EDS Subsystem, FactoryTalk Linx software (Previously called RSLinx Enterprise), RSLinx Classic, RSNetWorx software, Studio 5000 Logix Designer software 2
CVE-2020-11078 httplib2 1
CVE-2020-7004 VBASE Editor 1
CVE-2020-0671 Windows 6
CVE-2020-11023 jQuery 3
CVE-2020-9804 macOS 2
CVE-2020-1068 Windows 1
CVE-2020-11897 n/a 3
CVE-2020-15100 freewvs 3
CVE-2020-15233 fosite 2
CVE-2020-12652 n/a 2
CVE-2020-12008 Baxter ExactaMix EM 2400 & EM 1200 3
CVE-2020-6993 Moxa PT-7528 series firmware, Version 4.0 or lower, PT-7828 series firmware, Version 3.9 or lower 2
CVE-2020-11896 n/a 3
CVE-2020-15137 HoRNDIS 3
CVE-2020-3137 Cisco Email Security Appliance (ESA) 3
CVE-2020-15095 cli 1
CVE-2020-3440 Cisco Webex Meetings 3
CVE-2020-5373 OMIMSSC (OpenManage Integration for Microsoft System Center) 2
CVE-2020-5902 BIG-IP 2
CVE-2020-11884 n/a 1
CVE-2020-12888 n/a 1
CVE-2020-5336 RSA Archer 3
CVE-2020-15162 PrestaShop 2
CVE-2020-13125 n/a 4
CVE-2020-15182 soycms 2
CVE-2020-5266 ps_linklist 3
CVE-2020-5369 Isilon OneFS 1
CVE-2020-15199 tensorflow 2
CVE-2020-0636 Windows 10 Version 1903 for 32-bit Systems 1
CVE-2020-3237 Cisco IOx 2
CVE-2020-12029 FactoryTalk View SE 3
CVE-2020-12014 Advantech WebAccess Node 1
CVE-2020-3322 Cisco Webex Network Recording Player 3
CVE-2020-1350 Windows Server 1
CVE-2020-3126 Cisco Webex Meetings Multimedia Viewer 3
CVE-2020-11059 AEgir 1
CVE-2020-11738 n/a 2
CVE-2020-5326 Dell Client Consumer and Commercial Platforms 2
CVE-2020-15132 sulu 1
CVE-2020-5365 Isilon OneFS 2
CVE-2020-0884 Microsoft Visual Studio 2017 version 15.9 (includes 15.1 - 15.8) 2
CVE-2020-3416 Cisco IOS XE Software 2
CVE-2020-5331 RSA Archer 1
CVE-2020-16198 Philips Clinical Collaboration Platform 1
CVE-2020-5241 matestack-ui-core 2
CVE-2020-3510 Cisco IOS XE Software 2
CVE-2020-6819 Thunderbird 2
CVE-2020-11054 qutebrowser 2
CVE-2020-3253 Cisco Firepower Threat Defense Software 2
CVE-2020-5220 SyliusResourceBundle 2
CVE-2020-11010 tortoise-orm 7
CVE-2020-9459 n/a 5
CVE-2020-0688 Microsoft Exchange Server 2013 2
CVE-2020-5267 actionview 2
CVE-2020-5378 CPG BIOS 1
CVE-2020-3375 Cisco SD-WAN vManage 2
CVE-2020-9818 iOS 1
CVE-2020-1569 Microsoft Edge (EdgeHTML-based) 8
CVE-2020-0938 Windows 1
CVE-2020-3134 Cisco Email Security Appliance (ESA) 1
CVE-2020-5250 PrestaShop 2
CVE-2020-11082 Kaminari 3
CVE-2020-3198 Cisco IOS 12.2(60)EZ16 8
CVE-2020-5252 safety 1
CVE-2020-11652 n/a 2
CVE-2020-12659 n/a 1
CVE-2020-11044 FreeRDP 1
CVE-2020-16874 Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6) 7
CVE-2020-0898 Windows 2
CVE-2020-5362 Dell Client Consumer and Commercial platforms 2
CVE-2020-11036 GLPI 3
CVE-2020-5269 PrestaShop 3
CVE-2020-3120 Cisco IOS XR Software 1
CVE-2020-4100 "HCL Verse for Android" 1
CVE-2020-5225 SimpleSAMLphp 3
CVE-2020-7456 FreeBSD 2
CVE-2020-15179 wiki-scratchsig 2
CVE-2020-4408 Qradar Advisor 1
CVE-2020-15140 Red-DiscordBot 2
CVE-2020-3477 Cisco IOS 2
CVE-2020-15105 django-two-factor-auth 2
CVE-2020-15096 electron 2
CVE-2020-6964 GE CARESCAPE Telemetry Server,ApexPro Telemetry Server,CARESCAPE Central Station,Clinical Information Center systems,CARESCAPE B450,B650,B850 Monitors 3
CVE-2020-14059 n/a 1
CVE-2020-1347 Windows 10 Version 2004 for 32-bit Systems 1
CVE-2020-10189 n/a 2
CVE-2020-3409 Cisco IOS 2
CVE-2020-10257 n/a 2
CVE-2020-15189 soycms 3
CVE-2020-8468 Trend Micro OfficeScan, Trend Micro Apex One, Trend Micro Worry-Free Business Security (WFBS) 1