CVE-2010-3888 |
n/a |
uncategorized |
T1059 |
Command and Scripting Interpreter |
CVE-2010-3888 |
n/a |
uncategorized |
T1190 |
Exploit Public-Facing Application |
CVE-2010-2884 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2010-2743 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2010-1592 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2010-1592 |
n/a |
uncategorized |
T1574.002 |
DLL Side-Loading |
CVE-2010-2772 |
n/a |
uncategorized |
T1133 |
External Remote Services |
CVE-2010-2772 |
n/a |
uncategorized |
T1190 |
Exploit Public-Facing Application |
CVE-2010-1423 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2010-1423 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2010-1165 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2010-1165 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2010-1885 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2010-1885 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2010-1885 |
n/a |
uncategorized |
T1204.002 |
Malicious File |
CVE-2010-3916 |
n/a |
uncategorized |
T1190 |
Exploit Public-Facing Application |
CVE-2010-3653 |
n/a |
uncategorized |
T1190 |
Exploit Public-Facing Application |
CVE-2010-0817 |
n/a |
uncategorized |
T1190 |
Exploit Public-Facing Application |
CVE-2010-5326 |
n/a |
uncategorized |
T1190 |
Exploit Public-Facing Application |
CVE-2010-5326 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2010-3765 |
n/a |
uncategorized |
T1190 |
Exploit Public-Facing Application |
CVE-2010-3765 |
n/a |
uncategorized |
T1548 |
Abuse Elevation Control Mechanism |
CVE-2010-4398 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2010-2568 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2010-2152 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2010-1297 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2010-0842 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2010-0480 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2010-3971 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2010-3971 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2010-1424 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2010-1424 |
n/a |
uncategorized |
T1204.002 |
Malicious File |
CVE-2010-0840 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2010-0840 |
n/a |
uncategorized |
T1204.002 |
Malicious File |
CVE-2010-3915 |
n/a |
uncategorized |
T1204.002 |
Malicious File |
CVE-2010-3915 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2010-3333 |
n/a |
uncategorized |
T1204.002 |
Malicious File |
CVE-2010-3333 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2010-2862 |
n/a |
uncategorized |
T1204.002 |
Malicious File |
CVE-2010-2862 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2010-0028 |
n/a |
uncategorized |
T1204.002 |
Malicious File |
CVE-2010-0028 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2010-2729 |
n/a |
uncategorized |
T1210 |
Exploitation of Remote Services |
CVE-2010-5290 |
n/a |
uncategorized |
T1550.002 |
Pass the Hash |
CVE-2010-5290 |
n/a |
uncategorized |
T1552.001 |
Credentials In Files |
CVE-2010-3081 |
n/a |
uncategorized |
T1608 |
Stage Capabilities |
CVE-2010-0232 |
n/a |
uncategorized |
T1608 |
Stage Capabilities |
CVE-2010-3338 |
n/a |
uncategorized |
T1608 |
Stage Capabilities |
CVE-2010-3338 |
n/a |
uncategorized |
T1053.005 |
Scheduled Task |