CVE-2016-0099
|
n/a
| uncategorized |
T1055
|
Process Injection
|
CVE-2016-5195
|
n/a
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2016-5645
|
n/a
| uncategorized |
T1078
|
Valid Accounts
|
CVE-2016-5645
|
n/a
| uncategorized |
T1542.001
|
System Firmware
|
CVE-2016-3298
|
n/a
| uncategorized |
T1083
|
File and Directory Discovery
|
CVE-2016-3298
|
n/a
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2016-6367
|
n/a
| uncategorized |
T1133
|
External Remote Services
|
CVE-2016-6367
|
n/a
| uncategorized |
T1068
|
Exploitation for Privilege Escalation
|
CVE-2016-6367
|
n/a
| uncategorized |
T1480
|
Execution Guardrails
|
CVE-2016-5180
|
n/a
| uncategorized |
T1133
|
External Remote Services
|
CVE-2016-5180
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2016-5180
|
n/a
| uncategorized |
T1499.004
|
Application or System Exploitation
|
CVE-2016-4656
|
n/a
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2016-4656
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2016-1409
|
n/a
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2016-1409
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2016-7256
|
n/a
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2016-7256
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2016-7256
|
n/a
| uncategorized |
T1134.001
|
Token Impersonation/Theft
|
CVE-2016-3714
|
n/a
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2016-3714
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2016-3714
|
n/a
| uncategorized |
T1204.001
|
Malicious Link
|
CVE-2016-0034
|
n/a
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2016-0034
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2016-0034
|
n/a
| uncategorized |
T1499.004
|
Application or System Exploitation
|
CVE-2016-9192
|
Cisco AnyConnect Secure Mobility Client
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2016-5062
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2016-5062
|
n/a
| uncategorized |
T1059
|
Command and Scripting Interpreter
|
CVE-2016-9684
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2016-9684
|
n/a
| uncategorized |
T1059.004
|
Unix Shell
|
CVE-2016-6909
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2016-6909
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2016-9299
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2016-2208
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2016-9079
|
Firefox
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2016-9079
|
Firefox
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2016-7189
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2016-7189
|
n/a
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2016-3393
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2016-3393
|
n/a
| uncategorized |
T1189
|
Drive-by Compromise
|
CVE-2016-6366
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2016-6366
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2016-7193
|
n/a
| uncategorized |
T1204.002
|
Malicious File
|
CVE-2016-7193
|
n/a
| uncategorized |
T1203
|
Exploitation for Client Execution
|
CVE-2016-6415
|
n/a
| uncategorized |
T1212
|
Exploitation for Credential Access
|
CVE-2016-4655
|
n/a
| uncategorized |
T1456
|
Drive-by Compromise
|
CVE-2016-3088
|
n/a
| uncategorized |
T1505.003
|
Web Shell
|
CVE-2016-3088
|
n/a
| uncategorized |
T1190
|
Exploit Public-Facing Application
|
CVE-2016-3351
|
n/a
| uncategorized |
T1518
|
Software Discovery
|
CVE-2016-7255
|
n/a
| uncategorized |
T1608
|
Stage Capabilities
|
CVE-2016-0728
|
n/a
| uncategorized |
T1608
|
Stage Capabilities
|
CVE-2016-0167
|
n/a
| uncategorized |
T1608
|
Stage Capabilities
|
CVE-2016-0165
|
n/a
| uncategorized |
T1608
|
Stage Capabilities
|