HomuWitch 解析

IOB - Indicator of Behavior (29)

タイムライン

言語

en26
zh2
ru2

国・地域

sc24
us2
cn2

アクター

アクティビティ

関心

タイムライン

タイプ

ベンダー

製品

SourceCodester Online Student Management System2
SourceCodester Employee Task Management System2
Papercut NG2
Papercut MF2
ElkaGroup Image Gallery2

脆弱性

#脆弱性BaseTemp0day本日修復EPSSCTICVE
1SourceCodester Sales Tracker Management System view_product.php SQLインジェクション6.66.5$0-$5k$0-$5kProof-of-ConceptNot Defined0.002040.07CVE-2023-0964
2SourceCodester Online Student Management System edit-class-detail.php SQLインジェクション7.57.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.001480.07CVE-2023-1099
3Apache Solr Operator 情報の漏洩4.34.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.000430.00CVE-2024-31391
4SourceCodester Library Management System bookdetails.php SQLインジェクション7.16.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.003220.07CVE-2022-2214
5Itech Movie Portal Script film-rating.php Error SQLインジェクション7.57.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.004250.00CVE-2017-20143
6SourceCodester Employee Task Management System admin-manage-user.php Redirect7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.000450.04CVE-2024-2569
7QNAP QuMagie SQLインジェクション7.57.4$0-$5k$0-$5kNot DefinedOfficial Fix0.000500.00CVE-2023-41284
8Multi-Vendor Online Groceries Management System view_product.php SQLインジェクション6.35.7$0-$5k$0-$5kProof-of-ConceptNot Defined0.002550.04CVE-2022-26632
9PaperCut MF/NG libsmb2 特権昇格9.89.7$0-$5k$0-$5kHighOfficial Fix0.971240.04CVE-2023-27350
10Papercut NG/MF ディレクトリトラバーサル8.07.9$0-$5k$0-$5kNot DefinedOfficial Fix0.953670.02CVE-2023-39143
11Papercut NG/MF Script 特権昇格7.26.5$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.000460.02CVE-2023-39469
12Papercut NG 特権昇格7.47.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000810.03CVE-2023-3486
13Papercut NG XMLRPC 弱い認証6.96.9$0-$5k$0-$5kNot DefinedNot Defined0.022170.04CVE-2023-4568
14Pivotal Spring Framework 特権昇格9.89.5$0-$5k$0-$5kProof-of-ConceptNot Defined0.024440.00CVE-2016-1000027
15SourceCodester Online Food Ordering System view_prod.php SQLインジェクション6.76.5$0-$5k$0-$5kProof-of-ConceptNot Defined0.001080.08CVE-2023-0303
16ElkaGroup Image Gallery view.php SQLインジェクション7.37.3$0-$5k$0-$5kNot DefinedNot Defined0.001490.00CVE-2008-5037
17XXL-JOB New Password updatePwd 未知の脆弱性5.04.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.000710.10CVE-2023-0674
18ciubotaru share-on-diaspora new_window.php クロスサイトスクリプティング4.44.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000630.04CVE-2017-20176
19SSH SSH-1 Protocol 弱い暗号化7.37.0$0-$5k$0-$5kNot DefinedOfficial Fix0.002580.04CVE-2001-1473
20Google Android System Service 特権昇格6.56.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.000440.02CVE-2022-20434

IOC - Indicator of Compromise (4)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (9)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (17)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDクラスIndicatorタイプ信頼度
1File/admin-manage-user.phppredictive
2File/film-rating.phppredictive
3File/librarian/bookdetails.phppredictive
4File/xxxxxxxx/xxxx_xxxxxxx.xxxpredictive
5File/xxxx/xxxxxxxxxpredictive
6Filexxxxx/xxxxxxxx/xxxx_xxxxxxx.xxxpredictive
7Filexxxxxxx/xxxx-xxxxx-xxxxxx.xxxpredictive
8Filexxxxxxx/xxxx-xxxxx-xxxxxx.xxx?xxxxxx=xpredictive
9Filexxx_xxxxxx.xxxpredictive
10Filexxxx.xxxpredictive
11Filexxxx_xxxx.xxxpredictive
12Argumentxxxpredictive
13Argumentxxxxxxpredictive
14Argumentxxxxxxxxxxxxpredictive
15Argumentxxpredictive
16Argumentxxxxx/xxxpredictive
17Input Value' xxx (xxxxxx xxxx xxxx (xxxxxx(xxxxx(x)))xxxx)-- xxxxpredictive

参考 (2)

The following list contains external sources which discuss the actor and the associated activities:

Want to stay up to date on a daily basis?

Enable the mail alert feature now!