Dkvn Analysis

Activities

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

Lang

en56
de3
it1
sv1
pl1

Country

us53
ca2
au1

Actors

Activities

Interest

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemCTICVE
1Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash information disclosure5.35.2$5k-$25k$0-$5kHighWorkaround0.05CVE-2007-1192
2DZCP deV!L`z Clanportal config.php code injection7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.17CVE-2010-0966
3magmi ajax_gettime.php cross site scripting5.24.8$0-$5k$0-$5kNot DefinedNot Defined0.04CVE-2017-7391
4Audacity DLL Loader avformat-55.dll access control6.56.5$0-$5k$0-$5kNot DefinedNot Defined0.09CVE-2017-1000010
5Cisco IOS Point-to-Point Tunneling Protocol Server Memory information disclosure5.35.1$25k-$100k$0-$5kNot DefinedOfficial Fix0.04CVE-2016-6398
6Magento GraphQL API cross-site request forgery4.34.3$0-$5k$0-$5kNot DefinedNot Defined0.04CVE-2021-21027
7Cloudera HUE LdapBackend improper authentication7.37.3$0-$5k$0-$5kNot DefinedNot Defined0.03CVE-2019-7319
8Microsoft Windows CredSSP improper authentication6.25.6$25k-$100k$0-$5kProof-of-ConceptOfficial Fix0.03CVE-2018-0886
9Splunk Enterprise splunk-launch.conf access control7.47.4$0-$5k$0-$5kNot DefinedNot Defined0.03CVE-2017-18348
10Spidersales viewCart.asp sql injection9.89.4$0-$5k$0-$5kNot DefinedOfficial Fix0.03CVE-2004-0348
11jforum User input validation5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.09CVE-2019-7550
12Active Web Softwares Active Business Directory default.asp sql injection7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.05CVE-2008-5972
13LogicBoard CMS away.php redirect6.36.1$0-$5k$0-$5kNot DefinedUnavailable0.14
14Maran PHP Shop prod.php sql injection7.37.3$0-$5k$0-$5kHighUnavailable0.00CVE-2008-4879
15X-CMS PHP member_news.php sql injection8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.07CVE-2018-18887
16Ecommerce Online Store Kit shop.php sql injection9.89.4$0-$5k$0-$5kNot DefinedOfficial Fix0.25CVE-2004-0300
17StashCat Backend Database Stored key management5.75.7$0-$5k$0-$5kNot DefinedNot Defined0.05CVE-2017-11136
18PHPWind goto.php redirect6.36.3$0-$5k$0-$5kNot DefinedNot Defined0.08CVE-2015-4134
19BXCP index.php sql injection7.37.0$0-$5k$0-$5kHighOfficial Fix0.00CVE-2006-0821
20Microsoft IIS viewcode.asp privileges management5.35.1$25k-$100k$0-$5kHighOfficial Fix0.06CVE-1999-0737

IOC - Indicator of Compromise (5)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (2)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueVulnerabilitiesAccess VectorConfidence
1T1059.007CWE-79, CWE-80Cross Site ScriptingHigh
2TXXXXCWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxHigh

IOA - Indicator of Attack (30)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorConfidence
1File$SPLUNK_HOME/etc/splunk-launch.confHigh
2File/etc/master.passwdHigh
3File/etc/passwdMedium
4File/forum/away.phpHigh
5Filexxxxxx_xx.xMedium
6Filexxxx/xxxxxxxxxxxxxxx.xxxHigh
7Filexxxxxxx.xxxMedium
8Filexxxxxxxx.xxxMedium
9Filexxxx.xxxMedium
10Filexxx/xxxxxx.xxxHigh
11Filexxxxx.xxxMedium
12Filexxxxx-xxx-xxxxxx/xxxxx/xxx/xxxx_xxxxxxx.xxxHigh
13Filexxxxxx/xxxxxx_xxxx.xxxHigh
14Filexxxx.xxxMedium
15Filexxxxxxxx.xxxMedium
16Filexxxxxxxx/xxxxx/xxxxxxxx?xxxxxxxxHigh
17Filexxxx.xxxMedium
18Filexxxxxxxx.xxxMedium
19Filexxxxxxxx.xxxMedium
20Libraryxxxxxxxx-xx.xxxHigh
21ArgumentxxxxxxLow
22ArgumentxxxxxxxxMedium
23ArgumentxxxLow
24ArgumentxxxxxLow
25ArgumentxxLow
26ArgumentxxxxxxLow
27ArgumentxxxLow
28ArgumentxxxxLow
29ArgumentxxxLow
30ArgumentxxxxxxLow

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Might our Artificial Intelligence support you?

Check our Alexa App!