catDDoS Analysisinfo

IOB - Indicator of Behavior (178)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en154
ru16
ko2
pl2
de2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Google Android6
Google Chrome4
PHP4
Trend Micro InterScan Web Security Virtual Applian ...4
TP-Link TL-WR940N4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1Safe Exam Browser Clipboard Management information disclosure5.75.7$0-$5k$0-$5kNot DefinedOfficial Fix0.000430.04CVE-2024-37742
2FLDS redir.php sql injection7.37.3$0-$5k$0-$5kHighUnavailable0.002030.28CVE-2008-5928
3ESecurityServices GPS Userdata Form allows Persistent cross site scripting5.55.3$0-$5kCalculatingNot DefinedNot Defined0.000000.00
4GitLab Community Edition/Enterprise Edition Runner Registration Token information disclosure7.67.5$0-$5k$0-$5kNot DefinedOfficial Fix0.030930.04CVE-2022-0735
5Microsoft IIS Frontpage Server Extensions shtml.dll Username information disclosure5.35.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.159580.06CVE-2000-0114
6Human Resource Management System Authentication Error Message cross site scripting4.84.7$0-$5k$0-$5kNot DefinedNot Defined0.000780.00CVE-2022-45218
7Adobe Acrobat Reader integer overflow5.35.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.001010.00CVE-2021-21036
8Open TFTP Server Multithreaded OpenTFTPServerMT.exe access control6.66.6$0-$5k$0-$5kNot DefinedNot Defined0.000910.03CVE-2020-26130
9PrestaShop information disclosure5.35.2$0-$5k$0-$5kNot DefinedOfficial Fix0.000430.45CVE-2024-34717
10Lars Ellingsen Guestserver guestbook.cgi cross site scripting4.34.3$0-$5k$0-$5kNot DefinedNot Defined0.001690.08CVE-2005-4222
11ArcGIS Enterprise Server services information disclosure5.35.1$0-$5k$0-$5kNot DefinedNot Defined0.000430.04CVE-2024-37694
12CodeAstro Internet Banking System pages_reset_pwd.php cross site scripting4.44.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.000600.05CVE-2023-5695
13SourceCodester Employee and Visitor Gate Pass Logging System Master.php save_designation cross site scripting3.23.1$0-$5k$0-$5kProof-of-ConceptNot Defined0.000900.11CVE-2024-6650
14Pligg cloud.php sql injection6.36.3$0-$5k$0-$5kNot DefinedNot Defined0.000000.00
15SPIP spip.php cross site scripting3.53.4$0-$5k$0-$5kNot DefinedOfficial Fix0.001320.06CVE-2022-28959
16PHP Parametrized Query uninitialized pointer8.17.9$5k-$25k$0-$5kNot DefinedOfficial Fix0.003570.00CVE-2022-31625
17Siemens R3964 Linux Kernel n_r3964.c race condition7.07.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.000770.00CVE-2019-11486
18Tiki Admin Password tiki-login.php improper authentication8.07.7$0-$5k$0-$5kNot DefinedOfficial Fix0.009360.79CVE-2020-15906
19Serendipity exit.php privileges management6.36.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.000000.08
20vBulletin redirector.php6.66.6$0-$5k$0-$5kNot DefinedNot Defined0.001210.03CVE-2018-6200

IOC - Indicator of Compromise (19)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (20)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (68)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/advanced-tools/nova/bin/netwatchpredictiveHigh
2File/arcgis/rest/servicespredictiveHigh
3File/classes/Master.phppredictiveHigh
4File/forum/away.phppredictiveHigh
5File/proc/iomempredictiveMedium
6File/spip.phppredictiveMedium
7File/uncpath/predictiveMedium
8Fileadmin/dashboard.phppredictiveHigh
9Filexxxxx/xxxxxx_xxxxxxxx.xxxpredictiveHigh
10Filexxxxxxx.xxxpredictiveMedium
11Filexxxxxxx/xxxxxxxxxxx/xxxx_xxxx.xxxpredictiveHigh
12Filexxxxxx.xpredictiveMedium
13Filexxxxxx_xxxxx.xpredictiveHigh
14Filexxxxxx.xpredictiveMedium
15Filex:\$xxxxxxx$predictiveMedium
16Filex:\xxxxxxxxxx.xxxpredictiveHigh
17Filex:\xxxxxxx\xxxxxxxx\xxxxxxxxx\xxx.xxxpredictiveHigh
18Filexxx-xxx/xxxxxxxxxxxx.xxxpredictiveHigh
19Filexxxxx-xxxxxx_xxx_xxxxx_xxxxxx_xxxxxxxx_xxxxxxx.xxxpredictiveHigh
20Filexxxxx.xxxpredictiveMedium
21Filexxx.xxxpredictiveLow
22Filexxxxxxx/xxxxx/xxx.xpredictiveHigh
23Filexxxxxxx/xxx/x_xxxxx.xpredictiveHigh
24Filexxxx.xxxpredictiveMedium
25Filexxxxxxx.xpredictiveMedium
26Filexx/xxxxx/xxxxxxx.xpredictiveHigh
27Filexxxxxxxxx.xxxpredictiveHigh
28Filexxxxxxx/xxxxxxxxxxxx.xxxpredictiveHigh
29Filexxxx.xpredictiveLow
30Filexxxxx.xxpredictiveMedium
31Filexxxxxxxxx.xxxxxxxxpredictiveHigh
32Filexxxxxxx_xx.xxxpredictiveHigh
33Filexxxxxxxxx_xxx.xpredictiveHigh
34Filexx/xxxxxxxxx.xpredictiveHigh
35Filexxxxxxxxxxxxxxxx.xxxpredictiveHigh
36Filexxxxx_xxxxx_xxx.xxxpredictiveHigh
37Filexxxxxx.xpredictiveMedium
38Filexxxxx.xxxpredictiveMedium
39Filexxxxxxxxxx.xxxpredictiveHigh
40Filexxxxxxxx.xxxpredictiveMedium
41Filexx_xxxx.xxpredictiveMedium
42Filexxxxxxxx_xxx-xxxx-xx.xxxpredictiveHigh
43Filexxx/xxxx/xxxx/xxx/xxxxxxxxx/xxxxxxx/xxxxxxxx/xxx/xxxxxxxxxxxxxx.xxxxpredictiveHigh
44Filexxxx-xxxxx.xxxpredictiveHigh
45Filexxxx/xxxxxxxpredictiveMedium
46Filexxxx_xxx.xxxpredictiveMedium
47Library/_xxx_xxx/xxxxx.xxxpredictiveHigh
48Libraryxxx/xxxxxxxx.xxxpredictiveHigh
49ArgumentxxxxxxxxxxpredictiveMedium
50Argumentxxxxxxx xxxxpredictiveMedium
51Argumentxxxx_xxxxpredictiveMedium
52ArgumentxxxpredictiveLow
53ArgumentxxxxxpredictiveLow
54ArgumentxxxxxxxxxxxxxxxpredictiveHigh
55ArgumentxxpredictiveLow
56ArgumentxxxxpredictiveLow
57ArgumentxxxxxxxpredictiveLow
58Argumentxxxxxxx_xxxxxxpredictiveHigh
59ArgumentxxxpredictiveLow
60Argumentxxxxxx_xxxpredictiveMedium
61Argumentxxx_xxxxpredictiveMedium
62Argumentxxxxx_xxxxxxpredictiveMedium
63ArgumentxxxpredictiveLow
64ArgumentxxxxpredictiveLow
65ArgumentxxxxxxxxxxxxpredictiveMedium
66Argumentx/xpredictiveLow
67Input Value../../predictiveLow
68Input Valuexxxxxxx%xxxxxxxxx.xxx'%xx%xx<xxxxxx%xx>xxxxx(xxxx)</xxxxxx>predictiveHigh

References (3)

The following list contains external sources which discuss the actor and the associated activities:

This view requires CTI permissions

Just purchase a CTI license today!