🛡 Start Sektor Chemical
Sektor Chemical Timeframe: -28 days
Default Categories (89): Access Management Software, Accounting Software, Anti-Malware Software, Anti-Spam Software, Application Server Software, Atlassian Confluence Plugin, Atlassian Jira App Software, Automation Software, Backup Software, Big Data Software, Billing Software, Bug Tracking Software, Business Process Management Software, Calendar Software, Chat Software, Chip Software, Cloud Software, Communications System, Connectivity Software, Continuous Integration Software, Customer Relationship Management System, Data Loss Prevention Software, Database Administration Software, Database Software, Directory Service Software, Document Management Software, Document Processing Software, Document Reader Software, Domain Name Software, Endpoint Management Software, Enterprise Resource Planning Software, File Compression Software, File Transfer Software, Firewall Software, Firmware Software, Groupware Software, Hardware Driver Software, Health Information Software, Human Capital Management Software, Image Processing Software, Information Management Software, IP Phone Software, Knowledge Base Software, Log Management Software, Mail Client Software, Mail Server Software, Medical Device Software, Middleware, Multimedia Player Software, Network Attached Storage Software, Network Authentication Software, Network Encryption Software, Network Management Software, Network Routing Software, Network Utility Software, Office Suite Software, Operating System, Policy Management Software, Presentation Software, Printing Software, Product Lifecycle Management Software, Programming Language Software, Project Management Software, Remote Access Software, Reporting Software, Risk Management System, Router Operating System, SCADA Software, Security Testing Software, Server Management Software, Service Management Software, Software Library, Software Management Software, Solution Stack Software, Spreadsheet Software, SSH Server Software, Supplier Relationship Management Software, Supply Chain Management Software, Testing Software, Ticket Tracking Software, Unified Communication Software, Video Surveillance Software, Virtualization Software, Warehouse Management System Software, Web Browser, Web Server, Windowing System Software, Wireless LAN Software, Word Processing Software
Linux Kernel 402 Microsoft Windows 88 Foxit PDF Reader 48 Juniper Junos OS 32 MediaTek MT8781 22
Official Fix 918 Temporary Fix 0 Workaround 2 Unavailable 0 Not Defined 156
High 4 Functional 4 Proof-of-Concept 40 Unproven 108 Not Defined 920
Not Defined 0 Physical 6 Local 136 Adjacent 446 Network 488
Not Defined 0 High 116 Low 624 None 336
Not Defined 0 Required 224 None 852
≤1 0 ≤2 0 ≤3 38 ≤4 84 ≤5 258 ≤6 322 ≤7 154 ≤8 146 ≤9 66 ≤10 8
≤1 0 ≤2 0 ≤3 38 ≤4 98 ≤5 250 ≤6 426 ≤7 120 ≤8 112 ≤9 24 ≤10 8
≤1 0 ≤2 0 ≤3 46 ≤4 114 ≤5 240 ≤6 302 ≤7 158 ≤8 160 ≤9 48 ≤10 8
≤1 1076 ≤2 0 ≤3 0 ≤4 0 ≤5 0 ≤6 0 ≤7 0 ≤8 0 ≤9 0 ≤10 0
≤1 768 ≤2 2 ≤3 10 ≤4 14 ≤5 64 ≤6 60 ≤7 40 ≤8 72 ≤9 32 ≤10 14
≤1 956 ≤2 0 ≤3 0 ≤4 0 ≤5 2 ≤6 10 ≤7 18 ≤8 52 ≤9 38 ≤10 0
<1k 46 <2k 226 <5k 54 <10k 484 <25k 142 <50k 98 <100k 26 ≥100k 0
<1k 412 <2k 264 <5k 212 <10k 98 <25k 84 <50k 6 <100k 0 ≥100k 0
IOB - Indicator of Behavior (1000) Interesse Linux Kernel 48 Google Chrome 22 Oracle VM VirtualBox 10 Mozilla Firefox 10 Oracle MySQL Server 8
Schwachstellen IOC - Indicator of Compromise (27) These indicators of compromise highlight associated network ranges which are known to be part of research and attack activities.
TTP - Tactics, Techniques, Procedures (26) Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.
ID Technique Schwachstellen Zugriffsart Typ Akzeptanz 1 T1006 CWE-22, CWE-23, CWE-35 Path Traversal prädiktiv High 2 T1040 CWE-319 Authentication Bypass by Capture-replay prädiktiv High 3 T1055 CWE-74 Improper Neutralization of Data within XPath Expressions prädiktiv High 4 T1059 CWE-88, CWE-94, CWE-1321 Argument Injection prädiktiv High 5 T1059.007 CWE-79, CWE-80 Cross Site Scripting prädiktiv High 6 T1068 CWE-250, CWE-269, CWE-274, CWE-284 Execution with Unnecessary Privileges prädiktiv High 7 TXXXX.XXX CWE-XXX Xxx Xx Xxxx-xxxxx Xxxxxxxx prädiktiv High 8 TXXXX.XXX CWE-XXX, CWE-XXX Xxxx-xxxxx Xxxxxxxxxxx prädiktiv High 9 TXXXX CWE-XX, CWE-XX Xxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx Xxxxxxxxx prädiktiv High 10 TXXXX.XXX CWE-XXX Xxxx Xxxxxxxx prädiktiv High 11 TXXXX CWE-XXX, CWE-XXX, CWE-XXX Xxxxxxxxxx Xxxxxx prädiktiv High 12 TXXXX CWE-XX, CWE-XX Xxx Xxxxxxxxx prädiktiv High 13 TXXXX.XXX CWE-XXX Xxxxxxxx Xxxxxxxxxxxxx prädiktiv High 14 TXXXX CWE-XXX, CWE-XXX, CWE-XXX Xxxxxxxxxxx Xxxxxxxxxx prädiktiv High 15 TXXXX CWE-XXX Xxxxxxxxx Xxxxxxx Xx Xxxxxxxxx Xxxxxxxxxxx prädiktiv High 16 TXXXX.XXX CWE-XXX Xxxxxxx Xxxxxxxxxx Xxx Xxxxxxxx Xxxxxxx Xx Xx-xxxx Xxxxxx Xxxxxxxx prädiktiv High 17 TXXXX.XXX CWE-XXX Xxxxxxxxxxxx prädiktiv High 18 TXXXX CWE-XXX, CWE-XXX Xxxxxxxxx Xxxxxx Xxxx prädiktiv High 19 TXXXX.XXX CWE-XXX Xxxxxxxx Xxxxxx Xxxx prädiktiv High 20 TXXXX.XXX CWE-XXX Xxxxxxxx Xxxxxxxxxxx Xxxxxxxxxx prädiktiv High 21 TXXXX CWE-XXX Xxxxxxxx Xx Xxxxxxx Xxxxxxxx Xxxxxxxxxxx Xx Xx Xxxxxxxxxxxx Xxxxx prädiktiv High 22 TXXXX CWE-XXX, CWE-XXX, CWE-XXX, CWE-XXX, CWE-XXX Xxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx Xxxxxxxxxxx prädiktiv High 23 TXXXX CWE-XXX, CWE-XXX, CWE-XXX, CWE-XXX Xxxxxxxxxxxxx Xxxxxx prädiktiv High 24 TXXXX.XXX CWE-XXX Xxx Xxxxxxxxxx Xxxxx prädiktiv High 25 TXXXX.XXX CWE-XXX Xxxxxxxxxx Xxxxxxxxxxxxxx Xx Xxxxxxxx Xxxx Xxxxxxxxx prädiktiv High 26 TXXXX CWE-XXX Xxxxxxxxxxx Xxxxxx prädiktiv High