Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
CVE-2023-2136 | Google Chrome Skia Integer Overflow Vulnerability | exploitation_technique | T1204.001 | Malicious Link |
Comments
This integer overflow vulnerability is exploited by a remote attacker who has already compromised the renderer process of Google Chrome. Exploiting this vulnerability might lead to incorrect rendering, memory corruption, and arbitrary code execution that could grant the adversary unauthorized access to the system.
Exploitation in the wild techniques have not been publicly released to reduce further abuse.
References
|
CVE-2016-1010 | Adobe Flash Player and AIR Integer Overflow Vulnerability | exploitation_technique | T1574 | Hijack Execution Flow |
Comments
This vulnerability is exploited via an integer overflow.
References
|
CVE-2015-8651 | Adobe Flash Player Integer Overflow Vulnerability | secondary_impact | T1486 | Data Encrypted for Impact |
Comments
This vulnerability is exploited with maliciously-crafted code hosted on a website via drive-by compromise. It has been seen used in the wild by exploit kits whose goal is frequently to load ransomware onto the target machine.
References
|
CVE-2015-8651 | Adobe Flash Player Integer Overflow Vulnerability | primary_impact | T1105 | Ingress Tool Transfer |
Comments
This vulnerability is exploited with maliciously-crafted code hosted on a website via drive-by compromise. It has been seen used in the wild by exploit kits whose goal is frequently to load ransomware onto the target machine.
References
|
CVE-2015-8651 | Adobe Flash Player Integer Overflow Vulnerability | exploitation_technique | T1189 | Drive-by Compromise |
Comments
This vulnerability is exploited with maliciously-crafted code hosted on a website via drive-by compromise. It has been seen used in the wild by exploit kits whose goal is frequently to load ransomware onto the target machine.
References
|
CVE-2012-5054 | Adobe Flash Player Integer Overflow Vulnerability | exploitation_technique | T1189 | Drive-by Compromise |
Comments
This vulnerability can be exploited by a malicioiusly-crafted webpage via drive-by compromise.
References
|
CVE-2025-24985 | Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability | exploitation_technique | T1091 | Replication Through Removable Media |
Comments
An attacker can trick users into executing malicious code by mounting images or drives. This code exploits vulnerabilities in the Windows Fast FAT File System Driver.
References
|
CVE-2025-24985 | Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability | primary_impact | T1059 | Command and Scripting Interpreter |
Comments
An attacker can trick users into executing malicious code by mounting images or drives. This code exploits vulnerabilities in the Windows Fast FAT File System Driver.
References
|