Skip to content

Hide Navigation Hide TOC

Vulnerability Scanning - M1016 (15437c6d-b998-4a36-be41-4ace3d54d266)

Vulnerability scanning is used to find potentially exploitable software vulnerabilities to remediate them.

Cluster A Galaxy A Cluster B Galaxy B Level
Vulnerability Scanning - M1016 (15437c6d-b998-4a36-be41-4ace3d54d266) Course of Action Compromise Software Dependencies and Development Tools - T1195.001 (191cc6af-1bb2-4344-ab5f-28e496638720) Attack Pattern 1
Vulnerability Scanning - M1016 (15437c6d-b998-4a36-be41-4ace3d54d266) Course of Action Exploit Public-Facing Application - T1190 (3f886f2a-874f-4333-b794-aa6075009b1c) Attack Pattern 1
Vulnerability Scanning - M1016 (15437c6d-b998-4a36-be41-4ace3d54d266) Course of Action Compromise Software Supply Chain - T1195.002 (bd369cd9-abb8-41ce-b5bb-fff23ee86c00) Attack Pattern 1
Vulnerability Scanning - M1016 (15437c6d-b998-4a36-be41-4ace3d54d266) Course of Action Supply Chain Compromise - T1195 (3f18edba-28f4-4bb9-82c3-8aa60dcac5f7) Attack Pattern 1
Vulnerability Scanning - M1016 (15437c6d-b998-4a36-be41-4ace3d54d266) Course of Action Exploitation of Remote Services - T1210 (9db0cf3a-a3c9-4012-8268-123b9db6fd82) Attack Pattern 1
Supply Chain Compromise - T1195 (3f18edba-28f4-4bb9-82c3-8aa60dcac5f7) Attack Pattern Compromise Software Dependencies and Development Tools - T1195.001 (191cc6af-1bb2-4344-ab5f-28e496638720) Attack Pattern 2
Supply Chain Compromise - T1195 (3f18edba-28f4-4bb9-82c3-8aa60dcac5f7) Attack Pattern Compromise Software Supply Chain - T1195.002 (bd369cd9-abb8-41ce-b5bb-fff23ee86c00) Attack Pattern 2