CVE-2010-3888
|
n/a
| uncategorized |
T1059
|
Command and Scripting Interpreter
|
CVE-2010-3888
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2010-2884
|
n/a
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2010-2743
|
n/a
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2010-1592
|
n/a
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2010-1592
|
n/a
| uncategorized |
T1574.002
|
DLL Side-Loading
|
CVE-2010-2772
|
n/a
| uncategorized |
T1133
|
External Remote Services
|
CVE-2010-2772
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2010-1423
|
n/a
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2010-1423
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2010-1165
|
n/a
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2010-1165
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2010-1885
|
n/a
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2010-1885
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2010-1885
|
n/a
| uncategorized |
T1204.002
|
Malicious File
|
CVE-2010-3916
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2010-3653
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2010-0817
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2010-5326
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2010-5326
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2010-3765
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2010-3765
|
n/a
| uncategorized |
T1548
|
Abuse Elevation Control Mechanism
|
CVE-2010-4398
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2010-2568
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2010-2152
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2010-1297
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2010-0842
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2010-0480
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2010-3971
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2010-3971
|
n/a
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2010-1424
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2010-1424
|
n/a
| uncategorized |
T1204.002
|
Malicious File
|
CVE-2010-0840
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2010-0840
|
n/a
| uncategorized |
T1204.002
|
Malicious File
|
CVE-2010-3915
|
n/a
| uncategorized |
T1204.002
|
Malicious File
|
CVE-2010-3915
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2010-3333
|
n/a
| uncategorized |
T1204.002
|
Malicious File
|
CVE-2010-3333
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2010-2862
|
n/a
| uncategorized |
T1204.002
|
Malicious File
|
CVE-2010-2862
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2010-0028
|
n/a
| uncategorized |
T1204.002
|
Malicious File
|
CVE-2010-0028
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2010-2729
|
n/a
| uncategorized |
T1210
|
Exploitation of Remote Services
|
CVE-2010-5290
|
n/a
| uncategorized |
T1550.002
|
Pass the Hash
|
CVE-2010-5290
|
n/a
| uncategorized |
T1552.001
|
Credentials In Files
|
CVE-2010-3081
|
n/a
| uncategorized |
T1608
|
Stage Capabilities
|
CVE-2010-0232
|
n/a
| uncategorized |
T1608
|
Stage Capabilities
|
CVE-2010-3338
|
n/a
| uncategorized |
T1608
|
Stage Capabilities
|
CVE-2010-3338
|
n/a
| uncategorized |
T1053.005
|
Scheduled Task
|