Bisonal Analysis

IOB - Indicator of Behavior (16)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en14
zh2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

cn12
br4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

FLDS2
Bitrix Site Manager2
VMware vCenter Server2
WordPress2
CodeIgniter2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemCTIEPSSCVE
1Bitrix Site Manager redirect.php link following5.34.7$0-$5k$0-$5kUnprovenUnavailable0.090.00113CVE-2008-2052
2FLDS redir.php sql injection7.37.3$0-$5k$0-$5kHighUnavailable0.060.00203CVE-2008-5928
3Idera Travis CI Activation .travis.yml information disclosure2.62.6$0-$5k$0-$5kNot DefinedNot Defined0.020.00152CVE-2021-41077
4Autoptimize Plugin Import code injection5.45.2$0-$5k$0-$5kNot DefinedOfficial Fix0.000.01016CVE-2021-24376
5Bitrix Upload from Local Disk Feature restore.php unrestricted upload6.36.1$0-$5k$0-$5kNot DefinedNot Defined0.050.00049CVE-2022-29268
6Bitrix Site Manager Vote Module Remote Code Execution7.37.0$0-$5k$0-$5kNot DefinedOfficial Fix0.020.00668CVE-2022-27228
7SSH Agent Plugin authorization3.53.5$0-$5k$0-$5kNot DefinedNot Defined0.000.00054CVE-2022-20620
8CodeIgniter Sendmail Email.php injection8.58.1$0-$5k$0-$5kNot DefinedOfficial Fix0.040.04920CVE-2016-10131
9Atlassian Bitbucket Data Center path traversal8.18.0$0-$5k$0-$5kNot DefinedOfficial Fix0.020.00441CVE-2019-3397
10furlongm openvpn-monitor Management Interface Socket command injection3.53.4$0-$5k$0-$5kNot DefinedNot Defined0.000.00120CVE-2021-31605
11VMware vCenter Server Analytics Service unrestricted upload8.68.5$5k-$25k$0-$5kFunctionalOfficial Fix0.020.97389CVE-2021-22005
12WordPress HTML Element general-template.php cross site scripting4.44.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.030.00094CVE-2017-17093
13Linux Kernel UDP Packet udp.c security check8.58.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.030.04837CVE-2016-10229
14Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash information disclosure5.35.2$5k-$25k$0-$5kHighWorkaround0.020.02016CVE-2007-1192
15Tiki TikiWiki tiki-editpage.php input validation7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.050.01194CVE-2004-1386
16INFINICART browse_group.asp sql injection7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.000.00262CVE-2006-5957

IOC - Indicator of Compromise (8)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (9)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueVulnerabilitiesAccess VectorTypeConfidence
1T1006CWE-22Path TraversalpredictiveHigh
2T1055CWE-74Improper Neutralization of Data within XPath ExpressionspredictiveHigh
3TXXXXCWE-XXXxxxxxxx XxxxxxxxxpredictiveHigh
4TXXXX.XXXCWE-XXXxxxx Xxxx XxxxxxxxxpredictiveHigh
5TXXXXCWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx XxxxxxxxxpredictiveHigh
6TXXXXCWE-XXX7xx Xxxxxxxx XxxxxxxxpredictiveHigh
7TXXXXCWE-XXXxx XxxxxxxxxpredictiveHigh
8TXXXXCWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveHigh
9TXXXX.XXXCWE-XXXXxxxxxxxxx Xxxxxxxxxxxxxx Xx Xxxxxxxx Xxxx XxxxxxxxxpredictiveHigh

IOA - Indicator of Attack (16)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File.travis.ymlpredictiveMedium
2Filebrowse_group.asppredictiveHigh
3Filedata/gbconfiguration.datpredictiveHigh
4Filexxxxx.xxxpredictiveMedium
5Filexxxxxxxx.xxxpredictiveMedium
6Filexxxxxxx.xxxpredictiveMedium
7Filexxxx-xxxxxxxx.xxxpredictiveHigh
8Filexxx.xpredictiveLow
9Filexx-xxxxxxxx/xxxxxxx-xxxxxxxx.xxxpredictiveHigh
10Libraryxxxxxx/xxxxxxxxx/xxxxx.xxxpredictiveHigh
11Argumentxxxxx->xxxxpredictiveMedium
12ArgumentxxxxpredictiveLow
13ArgumentxxpredictiveLow
14ArgumentxxxxpredictiveLow
15ArgumentxxxxxpredictiveLow
16Network PortxxxpredictiveLow

References (4)

The following list contains external sources which discuss the actor and the associated activities:

Do you want to use VulDB in your project?

Use the official API to access entries easily!