Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
CVE-2016-1010 | Adobe Flash Player and AIR Integer Overflow Vulnerability | exploitation_technique | T1574 | Hijack Execution Flow |
Comments
This vulnerability is exploited via an integer overflow.
References
|
CVE-2012-5054 | Adobe Flash Player Integer Overflow Vulnerability | exploitation_technique | T1189 | Drive-by Compromise |
Comments
This vulnerability can be exploited by a malicioiusly-crafted webpage via drive-by compromise.
References
|
CVE-2015-8651 | Adobe Flash Player Integer Overflow Vulnerability | secondary_impact | T1486 | Data Encrypted for Impact |
Comments
This vulnerability is exploited with maliciously-crafted code hosted on a website via drive-by compromise. It has been seen used in the wild by exploit kits whose goal is frequently to load ransomware onto the target machine.
References
|
CVE-2015-8651 | Adobe Flash Player Integer Overflow Vulnerability | primary_impact | T1105 | Ingress Tool Transfer |
Comments
This vulnerability is exploited with maliciously-crafted code hosted on a website via drive-by compromise. It has been seen used in the wild by exploit kits whose goal is frequently to load ransomware onto the target machine.
References
|
CVE-2015-8651 | Adobe Flash Player Integer Overflow Vulnerability | exploitation_technique | T1189 | Drive-by Compromise |
Comments
This vulnerability is exploited with maliciously-crafted code hosted on a website via drive-by compromise. It has been seen used in the wild by exploit kits whose goal is frequently to load ransomware onto the target machine.
References
|
CVE-2023-2136 | Google Chrome Skia Integer Overflow Vulnerability | exploitation_technique | T1204.001 | Malicious Link |
Comments
This integer overflow vulnerability is exploited by a remote attacker who has already compromised the renderer process of Google Chrome. Exploiting this vulnerability might lead to incorrect rendering, memory corruption, and arbitrary code execution that could grant the adversary unauthorized access to the system.
Exploitation in the wild techniques have not been publicly released to reduce further abuse.
References
|
Capability ID | Capability Name | Number of Mappings |
---|---|---|
CVE-2015-8651 | Adobe Flash Player Integer Overflow Vulnerability | 3 |
CVE-2016-1010 | Adobe Flash Player and AIR Integer Overflow Vulnerability | 1 |
CVE-2023-2136 | Google Chrome Skia Integer Overflow Vulnerability | 1 |
CVE-2012-5054 | Adobe Flash Player Integer Overflow Vulnerability | 1 |