ATLAS Landscape
AML.T0106

Exploitation for Credential Access

Adversaries may exploit software vulnerabilities in an attempt to collect credentials. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code.

Severity CVE CVSS
CRITICAL CVE-2026-33663 10.0
CRITICAL CVE-2025-53767 10.0
CRITICAL CVE-2023-25574 10.0
CRITICAL CVE-2026-25052 9.9
CRITICAL CVE-2026-25960 9.8
CRITICAL CVE-2026-41276 9.8
CRITICAL CVE-2026-42208 9.8
CRITICAL CVE-2026-35022 9.8
CRITICAL CVE-2023-25823 9.8
CRITICAL CVE-2024-3234 9.8
CRITICAL CVE-2025-59434 9.6
CRITICAL CVE-2026-35030 9.1
CRITICAL CVE-2026-35216 9.1
CRITICAL CVE-2026-44551 9.1
HIGH CVE-2026-30820 8.8
HIGH CVE-2025-34291 8.8
HIGH CVE-2026-28416 8.6
HIGH CVE-2026-26286 8.5
HIGH CVE-2024-47084 8.3
HIGH CVE-2026-41273 8.2
HIGH CVE-2023-27506 7.8
HIGH CVE-2025-33233 7.8
HIGH CVE-2024-11030 7.5
HIGH CVE-2025-59425 7.5
HIGH CVE-2025-6386 7.5
HIGH CVE-2024-9606 7.5
HIGH CVE-2024-11031 7.5
HIGH CVE-2024-6587 7.5
HIGH CVE-2024-34510 7.5
HIGH CVE-2025-65098 7.4
HIGH CVE-2026-32887 7.4
HIGH CVE-2025-8709 7.3
HIGH CVE-2026-1777 7.2
HIGH GHSA-xhmj-rg95-44hv 7.1
MEDIUM CVE-2025-51471 6.9
MEDIUM CVE-2026-30886 6.5
MEDIUM CVE-2026-25631 6.5
MEDIUM CVE-2024-42474 6.5
MEDIUM GHSA-mvv8-v4jj-g47j 6.5
MEDIUM CVE-2023-6568 6.1
MEDIUM CVE-2026-27167 5.9
MEDIUM GHSA-m7mq-85xj-9x33 5.6
MEDIUM CVE-2026-40190 5.6
MEDIUM GHSA-ffp3-3562-8cv3 5.5
MEDIUM GHSA-6pcv-j4jx-m4vx 5.3
MEDIUM CVE-2026-33722 5.3
MEDIUM CVE-2026-33682 4.7
MEDIUM GHSA-xgx4-2wgv-4jhm 4.4
MEDIUM CVE-2026-6598 4.3
MEDIUM CVE-2025-12732 4.3
MEDIUM CVE-2026-33720 4.2
LOW CVE-2026-6597 2.7
UNKNOWN CVE-2025-11203
HIGH GHSA-x5w6-38gp-mrqh
HIGH CVE-2026-22033
HIGH GHSA-f6hc-c5jr-878p
UNKNOWN CVE-2026-42203
HIGH CVE-2026-40171
UNKNOWN CVE-2026-42226
CRITICAL GHSA-r75f-5x8p-qvmc
MEDIUM CVE-2026-35646
MEDIUM GHSA-jj6q-rrrf-h66h
HIGH CVE-2026-34511
UNKNOWN CVE-2026-30823