CVE-2015-0984
|
n/a
| uncategorized |
T1005
|
Data from Local System
|
CVE-2015-0984
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2015-0984
|
n/a
| uncategorized |
T1552
|
Unsecured Credentials
|
CVE-2015-2945
|
n/a
| uncategorized |
T1059
|
Command and Scripting Interpreter
|
CVE-2015-2945
|
n/a
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2015-6475
|
n/a
| uncategorized |
T1059.007
|
JavaScript
|
CVE-2015-6475
|
n/a
| uncategorized |
T1185
|
Man in the Browser
|
CVE-2015-7910
|
n/a
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2015-2387
|
n/a
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2015-2360
|
n/a
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2015-0016
|
n/a
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2015-1769
|
n/a
| uncategorized |
T1091
|
Replication Through Removable Media
|
CVE-2015-1769
|
n/a
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2015-7912
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2015-7912
|
n/a
| uncategorized |
T1059
|
Command and Scripting Interpreter
|
CVE-2015-7935
|
n/a
| uncategorized |
T1133
|
External Remote Services
|
CVE-2015-7935
|
n/a
| uncategorized |
T1005
|
Data from Local System
|
CVE-2015-1701
|
n/a
| uncategorized |
T1134.001.
|
|
CVE-2015-1701
|
n/a
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2015-4051
|
n/a
| uncategorized |
T1136
|
Create Account
|
CVE-2015-4051
|
n/a
| uncategorized |
T1499.004
|
Application or System Exploitation
|
CVE-2015-2590
|
n/a
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2015-2590
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2015-2425
|
n/a
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2015-2425
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2015-1641
|
n/a
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2015-1641
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2015-1641
|
n/a
| uncategorized |
T1055
|
Process Injection
|
CVE-2015-0071
|
n/a
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2015-0071
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2015-0071
|
n/a
| uncategorized |
T1204.001
|
Malicious Link
|
CVE-2015-7756
|
n/a
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2015-7756
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2015-7756
|
n/a
| uncategorized |
T1499.004
|
Application or System Exploitation
|
CVE-2015-2426
|
n/a
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2015-2426
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2015-2426
|
n/a
| uncategorized |
T1499.004
|
Application or System Exploitation
|
CVE-2015-2424
|
n/a
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2015-4902
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2015-0072
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2015-6480
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2015-6480
|
n/a
| uncategorized |
T1059
|
Command and Scripting Interpreter
|
CVE-2015-8562
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2015-8562
|
n/a
| uncategorized |
T1528
|
Steal Application Access Token
|
CVE-2015-8562
|
n/a
| uncategorized |
T1548
|
Abuse Elevation Control Mechanism
|
CVE-2015-8562
|
n/a
| uncategorized |
T1552
|
Unsecured Credentials
|
CVE-2015-1539
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2015-1539
|
n/a
| uncategorized |
T1548
|
Abuse Elevation Control Mechanism
|
CVE-2015-3864
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2015-1494
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2015-1494
|
n/a
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2015-1494
|
n/a
| uncategorized |
T1211
|
Exploitation for Defense Evasion
|
CVE-2015-1494
|
n/a
| uncategorized |
T1497
|
Virtualization/Sandbox Evasion
|
CVE-2015-5123
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2015-5123
|
n/a
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2015-2502
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2015-2502
|
n/a
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2015-2419
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2015-2419
|
n/a
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2015-6585
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2015-6585
|
n/a
| uncategorized |
T1204.002
|
Malicious File
|
CVE-2015-1642
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2015-1642
|
n/a
| uncategorized |
T1204.002
|
Malicious File
|
CVE-2015-0096
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2015-0096
|
n/a
| uncategorized |
T1204.002
|
Malicious File
|
CVE-2015-7925
|
n/a
| uncategorized |
T1204.001.
|
|
CVE-2015-7925
|
n/a
| uncategorized |
T1529
|
System Shutdown/Reboot
|
CVE-2015-7925
|
n/a
| uncategorized |
T1542.001
|
System Firmware
|
CVE-2015-7925
|
n/a
| uncategorized |
T1565.001
|
Stored Data Manipulation
|
CVE-2015-2509
|
n/a
| uncategorized |
T1204.002
|
Malicious File
|
CVE-2015-2509
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2015-7755
|
n/a
| uncategorized |
T1211
|
Exploitation for Defense Evasion
|
CVE-2015-1805
|
n/a
| uncategorized |
T1404
|
Exploit OS Vulnerability
|
CVE-2015-1805
|
n/a
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2015-7931
|
n/a
| uncategorized |
T1557
|
Man-in-the-Middle
|
CVE-2015-6175
|
n/a
| uncategorized |
T1608
|
Stage Capabilities
|
CVE-2015-2546
|
n/a
| uncategorized |
T1608
|
Stage Capabilities
|