BlackNet Analysis

IOB - Indicator of Behavior (32)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en26
ru4
zh2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

us18
nl2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Asus RT-AC86U4
medoo2
Post Grid Plugin2
ampleShop2
Linux Kernel2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemCTIEPSSCVE
1Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash information disclosure5.35.2$5k-$25k$0-$5kHighWorkaround0.040.01847CVE-2007-1192
2Asus RT-AC86U Web URL os command injection8.88.8$0-$5k$0-$5kNot DefinedNot Defined0.000.00076CVE-2023-28702
3Asus RT-AC86U LPD Service os command injection8.88.6$0-$5k$0-$5kNot DefinedNot Defined0.030.00047CVE-2022-25597
4Asus RT-AC56U out-of-bounds write8.88.6$0-$5k$0-$5kNot DefinedNot Defined0.080.00070CVE-2022-25596
5Asus RT-AX56U V2/RT-AC86U cm_processChangedConfigMsg format string9.89.8$0-$5k$0-$5kNot DefinedNot Defined0.040.00330CVE-2023-35087
6lighttpd mod_alias_physical_handler mod_alias.c path traversal7.47.2$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00368CVE-2018-19052
7Phpsugar PHP Melody Cookie watch.php sql injection8.57.7$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.040.00156CVE-2017-15579
8PDF24 Article To PDF Plugin cross-site request forgery4.34.2$0-$5k$0-$5kNot DefinedNot Defined0.060.00054CVE-2022-1827
9medoo columnQuote sql injection8.58.2$0-$5k$0-$5kNot DefinedOfficial Fix0.050.00146CVE-2019-10762
10Privoxy Template Name cgi_error_no_template cross site scripting3.53.4$0-$5k$0-$5kNot DefinedOfficial Fix0.010.00078CVE-2021-44543
11Telesquare SDT-CS3B1/SDT-CW3B1 Telnet Service hard-coded credentials8.58.3$0-$5k$0-$5kNot DefinedWorkaround0.050.00905CVE-2018-12526
12Mods for HESK Time-Based sql injection7.47.4$0-$5k$0-$5kNot DefinedNot Defined0.050.00301CVE-2020-13993
13Linux Kernel hid-elo.c hid_parse memory leak3.53.4$0-$5k$0-$5kNot DefinedOfficial Fix0.040.00042CVE-2022-27950
14Linux Kernel load_elf_binary memory corruption8.37.9$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.080.00072CVE-2017-1000253
15Corero SecureWatch Managed Services HTTP API Endpoint get_snapshot path traversal3.53.5$0-$5k$0-$5kNot DefinedNot Defined0.010.00087CVE-2021-38136
16Post Grid Plugin Slider Import Search cross site scripting3.53.4$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00302CVE-2021-24488
17IBM i2 Analyze information exposure4.34.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00076CVE-2021-29784
18Apple watchOS WebKit use after free6.36.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00358CVE-2021-30795
19Lesterchan wp-postratings wp-postratings.php code injection6.36.0$0-$5k$0-$5kNot DefinedOfficial Fix0.090.00190CVE-2011-4646
20phpList Bounce Rules cross site scripting4.44.4$0-$5k$0-$5kNot DefinedNot Defined0.020.00058CVE-2020-36399

IOC - Indicator of Compromise (5)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (7)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueVulnerabilitiesAccess VectorTypeConfidence
1T1006CWE-22Pathname TraversalpredictiveHigh
2T1059CWE-94Cross Site ScriptingpredictiveHigh
3TXXXX.XXXCWE-XXXxxxx Xxxx XxxxxxxxxpredictiveHigh
4TXXXX.XXXCWE-XXXXxxxxxxx Xxxxxxxxxxx Xx Xxxxxxxxx Xxxxxxxxxxxxxx XxxxxxxxpredictiveHigh
5TXXXXCWE-XXXxxxxxx XxxxxxxxxpredictiveHigh
6TXXXXCWE-XXXxx XxxxxxxxxpredictiveHigh
7TXXXXCWE-XXX, CWE-XXXXxxxxxxxxxxxxpredictiveHigh

IOA - Indicator of Attack (22)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/about.phppredictiveMedium
2File/it-IT/splunkd/__raw/services/get_snapshotpredictiveHigh
3File/phpwcms/setup/setup.phppredictiveHigh
4Filexxxxxxxx.xxxpredictiveMedium
5Filexxxxxxxx_xxxxxxxxxxxxxxxxx.xxxpredictiveHigh
6Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveHigh
7Filexxxxxxx/xxx/xxx-xxx.xpredictiveHigh
8Filexxxxx.xxxpredictiveMedium
9Filexxxx_xxxx.xxxpredictiveHigh
10Filexxx_xxxxx.xpredictiveMedium
11Filexxxxx.xxxpredictiveMedium
12Filexx-xxxxxxxxxxx.xxxpredictiveHigh
13Argumentxx_xxxxx_xxx_xxxxpredictiveHigh
14ArgumentxxxpredictiveLow
15Argumentxxxx_xxpredictiveLow
16ArgumentxxpredictiveLow
17ArgumentxxxxxxxxxpredictiveMedium
18ArgumentxxxxxpredictiveLow
19Argumentxxxx_xxxxpredictiveMedium
20ArgumentxxxxpredictiveLow
21ArgumentxxxpredictiveLow
22Input Value../predictiveLow

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you want to use VulDB in your project?

Use the official API to access entries easily!