Bouvet Island Unknown Analysis

IOB - Indicator of Behavior (17)

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

Lang

en15
fr1
es1

Country

Actors

Activities

Interest

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemCTIEPSSCVE
1Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash information disclosure5.35.2$5k-$25k$0-$5kHighWorkaround0.040.04187CVE-2007-1192
2vsftpd deny_file unknown vulnerability3.73.6$0-$5k$0-$5kNot DefinedOfficial Fix0.050.01136CVE-2015-1419
3Microsoft Windows Multimedia Library winmm.dll memory corruption10.09.5$100k and more$0-$5kHighOfficial Fix0.030.92021CVE-2012-0003
4Smarty input validation9.89.4$0-$5k$0-$5kNot DefinedOfficial Fix0.060.00885CVE-2010-4727
5Codoforum User Registration cross site scripting5.24.7$0-$5k$0-$5kProof-of-ConceptNot Defined0.060.02173CVE-2020-5842
6Pivotal RabbitMQ password access control7.77.4$0-$5k$0-$5kNot DefinedOfficial Fix0.030.01018CVE-2016-9877
7Apache ActiveMQ Web-based Administration Console queue.jsp cross site scripting6.86.5$5k-$25k$0-$5kNot DefinedOfficial Fix0.030.03032CVE-2018-8006
8Oracle MySQL Workbench improper authentication9.18.7$25k-$100k$0-$5kHighOfficial Fix0.040.92171CVE-2018-10933
9Intel Server Board/Compute Module Platform Sample/Silicon Reference firmware access control5.45.4$0-$5k$0-$5kNot DefinedNot Defined0.000.00950CVE-2018-12204
10Unix SGID privileges management6.36.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.080.00000
11Studio 42 elFinder elFinder.class.php zipdl path traversal7.86.8$0-$5k$0-$5kNot DefinedOfficial Fix0.030.01136CVE-2018-9109
12Pilotgroup eLMS Pro subscribe.php cross site scripting4.34.3$0-$5k$0-$5kHighUnavailable0.040.01213CVE-2010-2356
13myPHPNuke print.php cross site scripting4.33.9$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.070.01213CVE-2008-4089
14WordPress Password Reset wp-login.php mail password recovery6.15.8$5k-$25k$0-$5kProof-of-ConceptNot Defined0.040.23476CVE-2017-8295
15lighttpd Log File http_auth.c injection7.57.1$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.040.01974CVE-2015-3200

IOC - Indicator of Compromise (7)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (6)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueVulnerabilitiesAccess VectorTypeConfidence
1T1006CWE-22Pathname TraversalpredictiveHigh
2T1055CWE-74InjectionpredictiveHigh
3TXXXX.XXXCWE-XXXxxxx Xxxx XxxxxxxxxpredictiveHigh
4TXXXXCWE-XXX, CWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveHigh
5TXXXXCWE-XXXXxx.xxx Xxxxxxxxxxxxxxxx: Xxxxxxxx Xx Xxxxxxxxxxxxx XxxxpredictiveHigh
6TXXXXCWE-XXXXxxxxxxxxxxxxpredictiveHigh

IOA - Indicator of Attack (15)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1Filedata/gbconfiguration.datpredictiveHigh
2FileelFinder.class.phppredictiveHigh
3Filehttp_auth.cpredictiveMedium
4Filexxxxx.xxx?x=/xxxx/xxxxxxxxpredictiveHigh
5Filexxxxx.xxxpredictiveMedium
6Filexxxxx.xxxpredictiveMedium
7Filexxxxxxxxx.xxxpredictiveHigh
8Filexxxxxxxx/xxxxxxxxpredictiveHigh
9Filexx-xxxxx.xxxpredictiveMedium
10Libraryxxxxx.xxxpredictiveMedium
11Argument?xxxpredictiveLow
12Argumentxxxxxx_xxpredictiveMedium
13ArgumentxxxxpredictiveLow
14ArgumentxxxxxxxxxxxpredictiveMedium
15ArgumentxxxpredictiveLow

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you want to use VulDB in your project?

Use the official API to access entries easily!