CVE-2015-0984 |
n/a |
uncategorized |
T1005 |
Data from Local System |
CVE-2015-0984 |
n/a |
uncategorized |
T1190 |
Exploit Public-Facing Application |
CVE-2015-0984 |
n/a |
uncategorized |
T1552 |
Unsecured Credentials |
CVE-2015-2945 |
n/a |
uncategorized |
T1059 |
Command and Scripting Interpreter |
CVE-2015-2945 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2015-6475 |
n/a |
uncategorized |
T1059.007 |
JavaScript |
CVE-2015-6475 |
n/a |
uncategorized |
T1185 |
Man in the Browser |
CVE-2015-7910 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2015-2387 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2015-2360 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2015-0016 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2015-1769 |
n/a |
uncategorized |
T1091 |
Replication Through Removable Media |
CVE-2015-1769 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2015-7912 |
n/a |
uncategorized |
T1190 |
Exploit Public-Facing Application |
CVE-2015-7912 |
n/a |
uncategorized |
T1059 |
Command and Scripting Interpreter |
CVE-2015-7935 |
n/a |
uncategorized |
T1133 |
External Remote Services |
CVE-2015-7935 |
n/a |
uncategorized |
T1005 |
Data from Local System |
CVE-2015-1701 |
n/a |
uncategorized |
T1134.001. |
|
CVE-2015-1701 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2015-4051 |
n/a |
uncategorized |
T1136 |
Create Account |
CVE-2015-4051 |
n/a |
uncategorized |
T1499.004 |
Application or System Exploitation |
CVE-2015-2590 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2015-2590 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2015-2425 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2015-2425 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2015-1641 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2015-1641 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2015-1641 |
n/a |
uncategorized |
T1055 |
Process Injection |
CVE-2015-0071 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2015-0071 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2015-0071 |
n/a |
uncategorized |
T1204.001 |
Malicious Link |
CVE-2015-7756 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2015-7756 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2015-7756 |
n/a |
uncategorized |
T1499.004 |
Application or System Exploitation |
CVE-2015-2426 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2015-2426 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2015-2426 |
n/a |
uncategorized |
T1499.004 |
Application or System Exploitation |
CVE-2015-2424 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2015-4902 |
n/a |
uncategorized |
T1190 |
Exploit Public-Facing Application |
CVE-2015-0072 |
n/a |
uncategorized |
T1190 |
Exploit Public-Facing Application |
CVE-2015-6480 |
n/a |
uncategorized |
T1190 |
Exploit Public-Facing Application |
CVE-2015-6480 |
n/a |
uncategorized |
T1059 |
Command and Scripting Interpreter |
CVE-2015-8562 |
n/a |
uncategorized |
T1190 |
Exploit Public-Facing Application |
CVE-2015-8562 |
n/a |
uncategorized |
T1528 |
Steal Application Access Token |
CVE-2015-8562 |
n/a |
uncategorized |
T1548 |
Abuse Elevation Control Mechanism |
CVE-2015-8562 |
n/a |
uncategorized |
T1552 |
Unsecured Credentials |
CVE-2015-1539 |
n/a |
uncategorized |
T1190 |
Exploit Public-Facing Application |
CVE-2015-1539 |
n/a |
uncategorized |
T1548 |
Abuse Elevation Control Mechanism |
CVE-2015-3864 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2015-1494 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2015-1494 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2015-1494 |
n/a |
uncategorized |
T1211 |
Exploitation for Defense Evasion |
CVE-2015-1494 |
n/a |
uncategorized |
T1497 |
Virtualization/Sandbox Evasion |
CVE-2015-5123 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2015-5123 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2015-2502 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2015-2502 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2015-2419 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2015-2419 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2015-6585 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2015-6585 |
n/a |
uncategorized |
T1204.002 |
Malicious File |
CVE-2015-1642 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2015-1642 |
n/a |
uncategorized |
T1204.002 |
Malicious File |
CVE-2015-0096 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2015-0096 |
n/a |
uncategorized |
T1204.002 |
Malicious File |
CVE-2015-7925 |
n/a |
uncategorized |
T1204.001. |
|
CVE-2015-7925 |
n/a |
uncategorized |
T1529 |
System Shutdown/Reboot |
CVE-2015-7925 |
n/a |
uncategorized |
T1542.001 |
System Firmware |
CVE-2015-7925 |
n/a |
uncategorized |
T1565.001 |
Stored Data Manipulation |
CVE-2015-2509 |
n/a |
uncategorized |
T1204.002 |
Malicious File |
CVE-2015-2509 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2015-7755 |
n/a |
uncategorized |
T1211 |
Exploitation for Defense Evasion |
CVE-2015-1805 |
n/a |
uncategorized |
T1404 |
Exploit OS Vulnerability |
CVE-2015-1805 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2015-7931 |
n/a |
uncategorized |
T1557 |
Man-in-the-Middle |
CVE-2015-6175 |
n/a |
uncategorized |
T1608 |
Stage Capabilities |
CVE-2015-2546 |
n/a |
uncategorized |
T1608 |
Stage Capabilities |