ATLAS Landscape
AML.T0079

Stage Capabilities

Adversaries may upload, install, or otherwise set up capabilities that can be used during targeting. To support their operations, an adversary may need to take capabilities they developed ([Develop Capabilities](/techniques/AML.T0017)) or obtained ([Obtain Capabilities](/techniques/AML.T0016)) and stage them on infrastructure under their control. These capabilities may be staged on infrastructure that was previously purchased/rented by the adversary ([Acquire Infrastructure](/techniques/AML.T0008)) or was otherwise compromised by them. Capabilities may also be staged on web services, such as GitHub, model registries, such as Hugging Face, or container registries. Adversaries may stage a variety of AI Artifacts including poisoned datasets ([Publish Poisoned Datasets](/techniques/AML.T0019), malicious models ([Publish Poisoned Models](/techniques/AML.T0058), and prompt injections. They may target names of legitimate companies or products, engage in typosquatting, or use hallucinated entities ([Discover LLM Hallucinations](/techniques/AML.T0062)).

Severity CVE CVSS
CRITICAL CVE-2026-30821 9.8
HIGH CVE-2026-41269 8.8
HIGH CVE-2025-61687 8.8
HIGH GHSA-j7w6-vpvq-j3gm 8.8
HIGH CVE-2026-39307 8.1
HIGH CVE-2026-35043 7.8
HIGH GHSA-r39h-4c2p-3jxp 7.8
HIGH CVE-2026-33744 7.8
HIGH CVE-2024-47867 7.5
HIGH CVE-2026-39306 7.3
HIGH GHSA-rh7v-6w34-w2rr 7.1
HIGH CVE-2026-39308 7.1
UNKNOWN CVE-2024-3924
CRITICAL GHSA-5mg7-485q-xm76
UNKNOWN CVE-2026-42249
UNKNOWN CVE-2025-14924