Cyber Posture

Exploiting vulnerabilities

Which techniques are used to exploit vulnerabilities?

We have analyzed each CVE to identify the MITRE ATT&CK Enterprise techniques it enables or facilitates. These charts show the distribution of attack tactics and techniques across 16,700 annotated CVEs, their severity and exploit probability, and how actively-exploited vulnerabilities (CISA KEV) compare to the full set.

Last updated: 04 May 2026 04:03 UTC

Tactics & Techniques

How are vulnerabilities linked to tactics and techniques?

→ Click any tactic bar to filter the technique list below it.

→ Click any technique bar to open its MITRE ATT&CK detail page in a new tab.

Technique Risk

Which techniques are used to exploit the most severe vulnerabilities?

→ Each bubble is one MITRE technique. Bubble size = CVE count. The upper-right quadrant (high CVSS, high EPSS) highlights techniques associated with the most severe and exploit-likely vulnerabilities.

→ Hover (or tap) any bubble for technique details.

Top 25 techniques by CVE count.

IDNameTacticCVEsAvg CVSSAvg EPSS
T1190Exploit Public-Facing ApplicationInitial Access11,3217.510.0222
T1213.006DatabasesCollection2,8957.150.0076
T1059.007JavaScriptExecution1,7085.340.0065
T1068Exploitation for Privilege EscalationPrivilege Escalation1,5507.750.0179
T1505Server Software ComponentPersistence1,2056.640.0046
T1499.004Application or System ExploitationImpact1,1476.850.0075
T1539Steal Web Session CookieCredential Access9715.740.0078
T1203Exploitation for Client ExecutionExecution8437.790.0207
T1210Exploitation of Remote ServicesLateral Movement7398.110.0293
T1059.004Unix ShellExecution7378.250.0516
T1005Data from Local SystemCollection7007.400.0512
T1505.003Web ShellPersistence5957.680.0422
T1565.001Stored Data ManipulationImpact3877.180.0062
T1555.003Credentials from Web BrowsersCredential Access3725.470.0085
T1552.001Credentials In FilesCredential Access3607.170.0586
T1059.008Network Device CLIExecution3117.800.0495
T1083File and Directory DiscoveryDiscovery3046.960.0658
T1059Command and Scripting InterpreterExecution2928.010.0209
T1185Browser Session HijackingCollection2906.650.0072
T1189Drive-by CompromiseInitial Access2776.930.0121
T1204.001Malicious LinkExecution2766.970.0037
T1202Indirect Command ExecutionStealth1896.300.0419
T1566.002Spearphishing LinkInitial Access1856.630.0058
T1105Ingress Tool TransferCommand And Control1837.210.0441
T1046Network Service DiscoveryDiscovery1806.910.0182

KEV Tactics

→ Compares how attack tactics are distributed across all annotated CVEs versus those on the CISA Known Exploited Vulnerabilities list. Tactics with a larger red bar than grey bar are over-represented in actively exploited vulnerabilities.

KEV Techniques

→ Each circle is one MITRE ATT&CK technique used by at least one KEV-listed CVE. Above the dashed diagonal = the technique appears in KEV-listed exploits more frequently than its share of the overall annotated-CVE population (attackers favour it). Below = under-represented. Bubble size encodes KEV count. Hover (or tap) any bubble for technique details.

Top 25 techniques by KEV count, sorted by KEV count descending. Tap any column header to re-sort.

IDNameKEV countAll countKEV %All %Ratio
T1190Exploit Public-Facing Application9411,45054.7%68.56%0.8×
T1068Exploitation for Privilege Escalation371,56821.5%9.39%2.3×
T1203Exploitation for Client Execution2287212.8%5.22%2.4×
T1005Data from Local System147298.1%4.37%1.9×
T1059.004Unix Shell127407.0%4.43%1.6×
T1210Exploitation of Remote Services127477.0%4.47%1.6×
T1189Drive-by Compromise102805.8%1.68%3.5×
T1505.003Web Shell66013.5%3.60%1.0×
T1083File and Directory Discovery53272.9%1.96%1.5×
T1195.002Compromise Software Supply Chain5432.9%0.26%11.3×
T1552.001Credentials In Files53792.9%2.27%1.3×
T1078.001Default Accounts41292.3%0.77%3.0×
T1136.001Local Account4602.3%0.36%6.5×
T1187Forced Authentication4112.3%0.07%35.3×
T1212Exploitation for Credential Access41772.3%1.06%2.2×
T1059Command and Scripting Interpreter33091.7%1.85%0.9×
T1059.006Python31341.7%0.80%2.2×
T1059.008Network Device CLI33111.7%1.86%0.9×
T1105Ingress Tool Transfer31911.7%1.14%1.5×
T1204.002Malicious File31371.7%0.82%2.1×
T1211Exploitation for Stealth31301.7%0.78%2.2×
T1611Escape to Host3251.7%0.15%11.7×
T1003OS Credential Dumping271.2%0.04%27.7×
T1016System Network Configuration Discovery291.2%0.05%21.6×
T1041Exfiltration Over C2 Channel2191.2%0.11%10.2×