CVE-2016-0099 |
n/a |
uncategorized |
T1055 |
Process Injection |
CVE-2016-5195 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2016-5645 |
n/a |
uncategorized |
T1078 |
Valid Accounts |
CVE-2016-5645 |
n/a |
uncategorized |
T1542.001 |
System Firmware |
CVE-2016-3298 |
n/a |
uncategorized |
T1083 |
File and Directory Discovery |
CVE-2016-3298 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2016-6367 |
n/a |
uncategorized |
T1133 |
External Remote Services |
CVE-2016-6367 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2016-6367 |
n/a |
uncategorized |
T1480 |
Execution Guardrails |
CVE-2016-5180 |
n/a |
uncategorized |
T1133 |
External Remote Services |
CVE-2016-5180 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2016-5180 |
n/a |
uncategorized |
T1499.004 |
Application or System Exploitation |
CVE-2016-4656 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2016-4656 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2016-1409 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2016-1409 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2016-7256 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2016-7256 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2016-7256 |
n/a |
uncategorized |
T1134.001 |
Token Impersonation/Theft |
CVE-2016-3714 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2016-3714 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2016-3714 |
n/a |
uncategorized |
T1204.001 |
Malicious Link |
CVE-2016-0034 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2016-0034 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2016-0034 |
n/a |
uncategorized |
T1499.004 |
Application or System Exploitation |
CVE-2016-9192 |
Cisco AnyConnect Secure Mobility Client |
uncategorized |
T1190 |
Exploit Public-Facing Application |
CVE-2016-5062 |
n/a |
uncategorized |
T1190 |
Exploit Public-Facing Application |
CVE-2016-5062 |
n/a |
uncategorized |
T1059 |
Command and Scripting Interpreter |
CVE-2016-9684 |
n/a |
uncategorized |
T1190 |
Exploit Public-Facing Application |
CVE-2016-9684 |
n/a |
uncategorized |
T1059.004 |
Unix Shell |
CVE-2016-6909 |
n/a |
uncategorized |
T1190 |
Exploit Public-Facing Application |
CVE-2016-6909 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2016-9299 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2016-2208 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2016-9079 |
Firefox |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2016-9079 |
Firefox |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2016-7189 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2016-7189 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2016-3393 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2016-3393 |
n/a |
uncategorized |
T1189 |
Drive-by Compromise |
CVE-2016-6366 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2016-6366 |
n/a |
uncategorized |
T1190 |
Exploit Public-Facing Application |
CVE-2016-7193 |
n/a |
uncategorized |
T1204.002 |
Malicious File |
CVE-2016-7193 |
n/a |
uncategorized |
T1203 |
Exploitation for Client Execution |
CVE-2016-6415 |
n/a |
uncategorized |
T1212 |
Exploitation for Credential Access |
CVE-2016-4655 |
n/a |
uncategorized |
T1456 |
Drive-by Compromise |
CVE-2016-3088 |
n/a |
uncategorized |
T1505.003 |
Web Shell |
CVE-2016-3088 |
n/a |
uncategorized |
T1190 |
Exploit Public-Facing Application |
CVE-2016-3351 |
n/a |
uncategorized |
T1518 |
Software Discovery |
CVE-2016-7255 |
n/a |
uncategorized |
T1608 |
Stage Capabilities |
CVE-2016-0728 |
n/a |
uncategorized |
T1608 |
Stage Capabilities |
CVE-2016-0167 |
n/a |
uncategorized |
T1608 |
Stage Capabilities |
CVE-2016-0165 |
n/a |
uncategorized |
T1608 |
Stage Capabilities |