CVE-2012-6685 |
n/a |
uncategorized |
T1046 |
Network Service Scanning |
CVE-2012-0181 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2012-5958 |
n/a |
uncategorized |
T1133 |
External Remote Services |
CVE-2012-5958 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2012-4681 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2012-4681 |
n/a |
uncategorized |
T1059 |
Command and Scripting Interpreter |
CVE-2012-4681 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2012-4681 |
n/a |
uncategorized |
T1057 |
Process Discovery |
CVE-2012-4681 |
n/a |
uncategorized |
T1497 |
Virtualization/Sandbox Evasion |
CVE-2012-4681 |
n/a |
uncategorized |
T1480 |
Execution Guardrails |
CVE-2012-0158 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2012-0158 |
n/a |
uncategorized |
T1059 |
Command and Scripting Interpreter |
CVE-2012-0158 |
n/a |
uncategorized |
T1546 |
Event Triggered Execution |
CVE-2012-0158 |
n/a |
uncategorized |
T1554 |
Compromise Client Software Binary |
CVE-2012-0158 |
n/a |
uncategorized |
T1491 |
Defacement |
CVE-2012-0158 |
n/a |
uncategorized |
T1565 |
Data Manipulation |
CVE-2012-0158 |
n/a |
uncategorized |
T1190 |
Exploit Public-Facing Application |
CVE-2012-2539 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2012-2520 |
n/a |
uncategorized |
T1190 |
Exploit Public-Facing Application |
CVE-2012-1723 |
n/a |
uncategorized |
T1190 |
Exploit Public-Facing Application |
CVE-2012-1557 |
n/a |
uncategorized |
T1190 |
Exploit Public-Facing Application |
CVE-2012-0874 |
n/a |
uncategorized |
T1190 |
Exploit Public-Facing Application |
CVE-2012-6498 |
n/a |
uncategorized |
T1190 |
Exploit Public-Facing Application |
CVE-2012-6498 |
n/a |
uncategorized |
T1059 |
Command and Scripting Interpreter |
CVE-2012-6498 |
n/a |
uncategorized |
T1505.003 |
Web Shell |
CVE-2012-1795 |
n/a |
uncategorized |
T1190 |
Exploit Public-Facing Application |
CVE-2012-1795 |
n/a |
uncategorized |
T1059.004 |
Unix Shell |
CVE-2012-1675 |
n/a |
uncategorized |
T1190 |
Exploit Public-Facing Application |
CVE-2012-1675 |
n/a |
uncategorized |
T1499.004 |
Application or System Exploitation |
CVE-2012-6081 |
n/a |
uncategorized |
T1190 |
Exploit Public-Facing Application |
CVE-2012-6081 |
n/a |
uncategorized |
T1505.003 |
Web Shell |
CVE-2012-3015 |
n/a |
uncategorized |
T1190 |
Exploit Public-Facing Application |
CVE-2012-3015 |
n/a |
uncategorized |
T1557 |
Man-in-the-Middle |
CVE-2012-3015 |
n/a |
uncategorized |
T1213 |
Data from Information Repositories |
CVE-2012-2311 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2012-1856 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2012-3213 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2012-3213 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2012-6467 |
n/a |
uncategorized |
T1566 |
Phishing |
CVE-2012-6467 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2012-1854 |
n/a |
uncategorized |
T1574.008 |
Path Interception by Search Order Hijacking |
CVE-2012-2319 |
n/a |
uncategorized |
T1608 |
Stage Capabilities |