Cyber Av3ngers Analysisinfo

IOB - Indicator of Behavior (363)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en354
de10

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Qualcomm Snapdragon Auto18
Qualcomm Snapdragon Compute18
Qualcomm Snapdragon Consumer IOT18
Qualcomm Snapdragon Industrial IOT18
Qualcomm Snapdragon Mobile18

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1LogicBoard CMS away.php redirect6.36.1$0-$5k$0-$5kNot DefinedUnavailable0.000000.64
2nginx request smuggling6.96.9$0-$5k$0-$5kNot DefinedNot Defined0.002410.46CVE-2020-12440
3woo-variation-swatches Plugin admin.php cross site scripting5.25.2$0-$5k$0-$5kNot DefinedNot Defined0.001440.04CVE-2019-14774
4vldPersonals index.php sql injection7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.002220.06CVE-2014-9005
5Couchbase Sync Gateway Sync Document cleartext storage2.62.6$0-$5k$0-$5kNot DefinedNot Defined0.000650.00CVE-2021-43963
6BusyBox netstat Privilege Escalation6.36.0$0-$5k$0-$5kNot DefinedOfficial Fix0.012790.05CVE-2022-28391
7Google Chrome TabStrip heap-based overflow7.57.2$25k-$100k$5k-$25kNot DefinedOfficial Fix0.008150.04CVE-2021-21159
8DZCP deV!L`z Clanportal browser.php information disclosure5.35.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.046040.49CVE-2007-1167
9VMware vRealize Operations JMX RMI Service input validation8.58.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.008620.00CVE-2020-3943
10vBulletin redirector.php6.66.6$0-$5k$0-$5kNot DefinedNot Defined0.002330.00CVE-2018-6200
11Alt-N MDaemon Worldclient injection4.94.7$5k-$25k$0-$5kNot DefinedOfficial Fix0.001780.00CVE-2021-27182
12Moodle Lesson Question Import path traversal6.36.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.002080.06CVE-2022-35650
13Flask-RESTX Regular Expression email_regex resource consumption6.46.3$0-$5k$0-$5kNot DefinedOfficial Fix0.010340.00CVE-2021-32838
14Couchbase Sync Gateway REST API sql injection8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.006520.04CVE-2019-9039
15SkaDate Skadate Online Dating Software featured_list.php path traversal5.35.3$0-$5k$0-$5kHighUnavailable0.013970.00CVE-2007-5299
16WordPress WP_Query sql injection6.36.1$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.883030.06CVE-2022-21661
17vldPersonals index.php cross site scripting4.33.9$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.001590.00CVE-2014-9004
18IBM Lotus Mobile Connect Connection Manager improper authentication5.95.7$5k-$25k$0-$5kNot DefinedOfficial Fix0.000440.00CVE-2010-4591
19Google Chrome WebAudio heap-based overflow7.57.2$25k-$100k$5k-$25kNot DefinedOfficial Fix0.005230.00CVE-2021-21160
20Qualcomm Snapdragon Auto DL ROHC Packet Decompression buffer overflow7.37.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.002080.00CVE-2020-11144

IOC - Indicator of Compromise (2)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
1178.162.227.180Cyber Av3ngers12/14/2023verifiedHigh
2XXX.XXX.XXX.XXXXxxxx Xxxxxxxx12/14/2023verifiedHigh

TTP - Tactics, Techniques, Procedures (19)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (104)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/admin/index.phppredictiveHigh
2File/bdswebui/assignusers/predictiveHigh
3File/cgi-bin/supervisor/PwdGrp.cgipredictiveHigh
4File/forum/away.phppredictiveHigh
5File/GetCSSashx/?CP=%2fwebconfigpredictiveHigh
6File/goform/GetIPTVpredictiveHigh
7File/horde/util/go.phppredictiveHigh
8File/login.htmlpredictiveMedium
9File/uir/predictiveLow
10File/uncpath/predictiveMedium
11Fileactions.hsppredictiveMedium
12Fileadclick.phppredictiveMedium
13Fileadd_edit_user.asppredictiveHigh
14Filexxxxx/xxxxxxxxx/predictiveHigh
15Filexxxxx/xxxxx.xxxpredictiveHigh
16Filexxx/xxpredictiveLow
17Filexxxxxxx/xxxxxxxxxxx.xpredictiveHigh
18Filexxxxx_xxxx.xpredictiveMedium
19Filexxxxxxx=xxxxxxxxxx&xxxx=xxxx&xxxxxxxxxxxxx=/predictiveHigh
20Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveHigh
21Filexxxxxx.xxxpredictiveMedium
22Filexxxxxxx/xxxx/xxxxxx.xpredictiveHigh
23Filexxxxxxx/xxx/xxxxxx/xxx-xxxxx-xxxxxxx.xpredictiveHigh
24Filexxxxxxx/xxx/xxx.xpredictiveHigh
25Filexxxxxxxx.xpredictiveMedium
26Filexxxx/xxxxxxxxxx/xxxxxx-xxxxx.xpredictiveHigh
27Filexxx_xx/xxx/xxx/xxxxxx_xxxxxxx.xxxpredictiveHigh
28Filexxxx.xxxpredictiveMedium
29Filexxxx.xpredictiveLow
30Filexxx/xxxx/xxxx_xxxxxx.xpredictiveHigh
31Filexxxxxxxx_xxxx.xxxpredictiveHigh
32Filexxxxxxxxxxxxxxx.xxxpredictiveHigh
33Filexxxxxxxx.xxxxpredictiveHigh
34Filexxxxxxxxx.xxxpredictiveHigh
35Filexxxx.xxxpredictiveMedium
36Filexxxx.xxxpredictiveMedium
37Filexxxxxxxxx/xxxxxx/xxxxxxx.xxxpredictiveHigh
38Filex/xpredictiveLow
39Filexxx/xxxxxx.xxxpredictiveHigh
40Filexxx/xxxxxxxxxxx/xxxxxxx.xxxpredictiveHigh
41Filexxxxx.xxxpredictiveMedium
42Filexx-xxx.xpredictiveMedium
43Filexx_xxxxx/xxx_xxxx.xpredictiveHigh
44Filexxxxxxxxxxxx/xxxxxx_xxxxx.xxpredictiveHigh
45Filexxxxx.xxxpredictiveMedium
46Filexxxxx.xxxxpredictiveMedium
47Filexxxxx.xxxpredictiveMedium
48Filexxx/xxx_xxx/xxxxxx/xxx_xxxxx.xpredictiveHigh
49Filexxx/xxxxxxxxx/xxxxx_xxxx.xpredictiveHigh
50Filexxx_xxxx.xpredictiveMedium
51Filexxxxxxxxx.xxxpredictiveHigh
52Filexxxxx.xxxpredictiveMedium
53Filexxxxxxxx.xxpredictiveMedium
54Filexxxxxxxxxx.xxxpredictiveHigh
55Filexxxxxxxx/xxxxx/xxxxxxxx?xxxxxxxxpredictiveHigh
56Filex/xxxxx.xxxpredictiveMedium
57Filexxx_xxxx.xpredictiveMedium
58Filexxx.xxxpredictiveLow
59Filexxxx.xpredictiveLow
60Filexx-xxxxx/xxxxx.xxxpredictiveHigh
61Filexx-xxxxx/xxxxx.xxx?xxxx=xxx-xxxxxxxxx-xxxxxxxx-xxxxxxxxpredictiveHigh
62Filexx-xxxx.xxxpredictiveMedium
63Filexx-xxxxxxxx/xxxxxxxxx.xxxpredictiveHigh
64Filexx-xxxxxxxx/xxxx.xxxpredictiveHigh
65Filexx-xxxxxxxx/xxxx.xxxpredictiveHigh
66Filexx-xxxxxxxxxxx.xxxpredictiveHigh
67Library/xxx/xxxx/xxxxx.x/xx-xxxx-xxxxxxx.xxxxxpredictiveHigh
68Libraryxxxxxx.xxxpredictiveMedium
69Argumentxxxxxx:/xxxxxxxx:/xxxxxxxxxxxxxx:predictiveHigh
70ArgumentxxxxxxxxpredictiveMedium
71Argumentxxxxxxx-xxxxxxpredictiveHigh
72Argumentxxxx/xxxxpredictiveMedium
73Argumentxxxxx$xxxxxxxxxxxxxx$xxxxxxxxxxxpredictiveHigh
74ArgumentxxxxpredictiveLow
75ArgumentxxxxpredictiveLow
76ArgumentxxxxxxxxxpredictiveMedium
77Argumentxxxxxx_xxxxxx_xxxxxpredictiveHigh
78Argumentxxxx_xxpredictiveLow
79ArgumentxxxxxxxpredictiveLow
80ArgumentxxxxpredictiveLow
81ArgumentxxxxxxxxpredictiveMedium
82ArgumentxxpredictiveLow
83ArgumentxxxxxxxxxpredictiveMedium
84ArgumentxxxxxpredictiveLow
85Argumentxxx_xxxxx_xxxxxxxxpredictiveHigh
86Argumentxxx_xxxxxxxxpredictiveMedium
87ArgumentxxxxxxxxpredictiveMedium
88Argumentx_xxxxxxxxpredictiveMedium
89ArgumentxxxxxxxxpredictiveMedium
90ArgumentxxxxxxxxxpredictiveMedium
91ArgumentxxxxxxxxxpredictiveMedium
92Argumentxxx-xxxxxxxxxx-xxxxpredictiveHigh
93Argumentxxxxxxxx/xxxxxxpredictiveHigh
94ArgumentxxxpredictiveLow
95ArgumentxxxpredictiveLow
96ArgumentxxxxxxxxpredictiveMedium
97Argumentxxxx_xxpredictiveLow
98Argumentxxxx_xxxxpredictiveMedium
99Input Valuex">[xxx/xxxxxx=xxxxx(x)]predictiveHigh
100Input Valuexxxxxxx-xxxxxxxxxxx: xxxx-xxxx; xxxx="xx"[\x][\x][\x]predictiveHigh
101Input Valuexxxx://xxx.xxxxxx.xxxpredictiveHigh
102Pattern|xx|xx|xx|predictiveMedium
103Network Portxxx/xx (xxx)predictiveMedium
104Network Portxxx xxxxxx xxxxpredictiveHigh

References (2)

The following list contains external sources which discuss the actor and the associated activities:

This view requires CTI permissions

Just purchase a CTI license today!