Donot Analysis

Activities

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

Lang

en615
de21
fr13
es11
sv10

Country

us508
gb19
tr19
ru17
de16

Actors

Activities

Interest

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need you unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemCTICVE
1DZCP deV!L`z Clanportal config.php code injection7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.57CVE-2010-0966
2Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash information disclosure5.35.2$5k-$25k$0-$5kHighWorkaround0.05CVE-2007-1192
3Linux Foundation Xen EFLAGS Register SYSENTER input validation6.25.9$5k-$25k$0-$5kNot DefinedOfficial Fix0.06CVE-2013-1917
4D-Link DIR-865L register_send.php improper authentication7.57.1$5k-$25k$5k-$25kProof-of-ConceptNot Defined0.03CVE-2013-3096
5WordPress Access Restriction user-new.php access control7.57.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.03CVE-2017-17091
6OpenSSH Authentication Username information disclosure5.34.8$5k-$25k$0-$5kHighOfficial Fix0.27CVE-2016-6210
7nginx request smuggling6.96.9$0-$5k$0-$5kNot DefinedNot Defined2.39CVE-2020-12440
8MGB OpenSource Guestbook email.php sql injection7.37.3$0-$5k$0-$5kHighUnavailable0.13CVE-2007-0354
9Phplinkdirectory PHP Link Directory conf_users_edit.php cross-site request forgery6.36.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.20CVE-2011-0643
10PHP Link Directory Administration Page index.html cross site scriting4.34.3$0-$5k$0-$5kNot DefinedNot Defined0.80CVE-2007-0529
11Apache HTTP Server HTTP Digest Authentication Challenge improper authentication8.58.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.04CVE-2018-1312
12Microsoft Windows MSHTML Remote Code Execution8.87.9$100k and more$25k-$100kProof-of-ConceptOfficial Fix0.04CVE-2021-40444
13CrushFTP redirect6.66.6$0-$5k$0-$5kNot DefinedNot Defined0.04CVE-2018-18288
14McAfee Security-as-a-Service MyCioScan.Scan.ShowReport() myCIOScn.dll MyCioScan.Scan.ShowReport privileges management7.57.1$25k-$100k$0-$5kProof-of-ConceptNot Defined0.03
15Apple iOS/iPadOS Kernel information disclosure3.33.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.05CVE-2020-27950
16WoltLab Burning Book addentry.php sql injection7.36.8$0-$5k$0-$5kFunctionalUnavailable0.06CVE-2006-5509
17FileZilla Server information disclosure4.34.1$0-$5k$0-$5kNot DefinedOfficial Fix0.03
18Puppet Agent SSL Certificate Valu certificate validation5.55.3$0-$5k$0-$5kNot DefinedOfficial Fix0.00CVE-2018-11751
19Norton Password Manager origin validation6.36.0$0-$5k$0-$5kNot DefinedOfficial Fix0.04CVE-2019-18381
20Microsoft IIS IP/Domain Restriction access control6.55.7$25k-$100k$0-$5kUnprovenOfficial Fix0.65CVE-2014-4078

Campaigns (2)

These are the campaigns that can be associated with the actor:

IOC - Indicator of Compromise (48)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsTypeConfidence
15.135.19.26DonotverifiedHigh
25.135.199.0DonotverifiedHigh
337.48.122.145DonotGeditverifiedHigh
437.120.140.211DonotverifiedHigh
537.120.198.208DonotDarkMusicalverifiedHigh
637.139.3.130DonotverifiedHigh
737.139.28.208DonotverifiedHigh
845.33.29.133li1046-133.members.linode.comDonotverifiedHigh
946.101.204.168DonotverifiedHigh
1046.105.40.12ip12.ip-46-105-40.euDonotverifiedHigh
11XX.XX.XX.XXXxxxxx.xx-xx-xx-xx.xxXxxxxXxxxxxxxxxxverifiedHigh
12XX.XX.XX.XXXxx.xx.xx.xxx.xxxxx.xxxXxxxxverifiedMedium
13XX.XX.XXX.XXxx-xx-xxx-xx.xx.xxxxxxxxxxxxxxxxx.xxxXxxxxverifiedHigh
14XX.XXX.XXX.XXxxxxx.xxxxxx.xxxXxxxxverifiedHigh
15XX.XXX.X.XXXxxxxXxxxxverifiedHigh
16XX.XXX.X.XXXXxxxxverifiedHigh
17XX.XXX.XX.XXXxxxxx-xxxx.xxXxxxxverifiedHigh
18XX.XX.XXX.XXXxxxxverifiedHigh
19XX.XX.XX.XXXXxxxxverifiedHigh
20XXX.XXX.XXX.XXXXxxxxverifiedHigh
21XXX.XXX.XXX.XXXxxx.xxx.xxx.xxx.xxxxx.xxxXxxxxverifiedMedium
22XXX.XXX.XXX.XXxxx-xxx-xx.xxxxxxx.xxxXxxxxverifiedHigh
23XXX.XXX.XXX.XXXXxxxxverifiedHigh
24XXX.XX.XX.XXXxxxxverifiedHigh
25XXX.XX.XX.XXXxxxxverifiedHigh
26XXX.XX.XX.XXXXxxxxverifiedHigh
27XXX.XX.XXX.XXXXxxxxverifiedHigh
28XXX.XXX.XXX.XXXXxxxxverifiedHigh
29XXX.XXX.XX.XXXxxx-xx-xxx-xxx.xxxxxx.xxxx.xxXxxxxverifiedHigh
30XXX.XX.XXX.XXXXxxxxverifiedHigh
31XXX.XXX.XXX.XXXxxxxverifiedHigh
32XXX.XX.XXX.XXXxxxxverifiedHigh
33XXX.XXX.XXX.XXXXxxxxverifiedHigh
34XXX.XXX.XX.XXXxxxxverifiedHigh
35XXX.XXX.XX.XXXxxx-xxx-xx-xxx.xx.xxxxxxxxxxxxxxxxx.xxxXxxxxverifiedHigh
36XXX.XX.XXX.XXXxxxxverifiedHigh
37XXX.XX.XXX.XXXXxxxxverifiedHigh
38XXX.XX.XXX.XXXXxxxxverifiedHigh
39XXX.XX.XXX.XXXxxxxverifiedHigh
40XXX.XX.XXX.XXXXxxxxverifiedHigh
41XXX.XX.XXX.XXxxxxx.xxx.xxxxxxxxxx.xxxXxxxxverifiedHigh
42XXX.XX.XXX.XXxxxxxx.xxxxxxx.xxxXxxxxverifiedHigh
43XXX.XX.XXX.XXXxxxxxxxx-xxxx.xxxx-xxx.xxxXxxxxverifiedHigh
44XXX.XX.XX.XXXxxxxverifiedHigh
45XXX.XXX.XXX.XXxxxxx.xxxXxxxxverifiedHigh
46XXX.XXX.XXX.XXXXxxxxverifiedHigh
47XXX.XXX.XX.XXXxxxxverifiedHigh
48XXX.XXX.XXX.XXXXxxxxverifiedHigh

TTP - Tactics, Techniques, Procedures (8)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueVulnerabilitiesAccess VectorTypeConfidence
1T1059.007CWE-79, CWE-80Cross Site ScriptingpredictiveHigh
2T1068CWE-264, CWE-284Execution with Unnecessary PrivilegespredictiveHigh
3TXXXX.XXXCWE-XXXXxxxxxxx Xxxxxxxxxxx Xx Xxxxxxxxx Xxxxxxxxxxxxxx XxxxxxxxpredictiveHigh
4TXXXXCWE-XXX7xx Xxxxxxxx XxxxxxxxpredictiveHigh
5TXXXXCWE-XXXXxxxxxxxxx XxxxxxpredictiveHigh
6TXXXXCWE-XXXXxxxxxxx Xx Xxxx Xxxxxxx Xxxxxxxxx XxxxxpredictiveHigh
7TXXXX.XXXCWE-XXXXxxxxxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveHigh
8TXXXXCWE-XXX, CWE-XXX, CWE-XXXXxxxxxxxxxxxx XxxxxxpredictiveHigh

IOA - Indicator of Attack (302)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File.htaccesspredictiveMedium
2File/+CSCOE+/logon.htmlpredictiveHigh
3File/.htpasswdpredictiveMedium
4File/admin/index.phppredictiveHigh
5File/bin/login.phppredictiveHigh
6File/CategorypredictiveMedium
7File/de/cgi/dfs_guest/predictiveHigh
8File/event/runquery.dopredictiveHigh
9File/filemanager/ajax_calls.phppredictiveHigh
10File/htmlcode/html/indexdefault.asppredictiveHigh
11File/out.phppredictiveMedium
12File/products/details.asppredictiveHigh
13File/system/ws/v11/ss/emailpredictiveHigh
14File/uncpath/predictiveMedium
15File/var/www/xms/application/config/config.phppredictiveHigh
16File/var/www/xms/application/controllers/gatherLogs.phppredictiveHigh
17File/var/www/xms/application/controllers/verifyLogin.phppredictiveHigh
18File/var/www/xms/cleanzip.shpredictiveHigh
19File/web/jquery/uploader/multi_uploadify.phppredictiveHigh
20File/wp-admin/admin-ajax.phppredictiveHigh
21File/wp-content/plugins/woocommerce/templates/emails/plain/predictiveHigh
22File14all.cgi/14all-1.1.cgi/traffic.cgi/mrtg.cgipredictiveHigh
23Fileabout.phppredictiveMedium
24Fileadclick.phppredictiveMedium
25Fileaddentry.phppredictiveMedium
26Fileadd_vhost.phppredictiveHigh
27Fileadmin/conf_users_edit.phppredictiveHigh
28Fileadmin/default.asppredictiveHigh
29Fileadmin/media/rename.phppredictiveHigh
30Fileadmin/user.phppredictiveHigh
31Fileadvanced_component_system/index.phppredictiveHigh
32Fileagent.cfgpredictiveMedium
33Fileajax/render/widget_phppredictiveHigh
34Fileampie.swfpredictiveMedium
35Fileannouncements.phppredictiveHigh
36Filexxx/xxxxx/xxxx/xxxxpredictiveHigh
37Filexxx/xxxxxxxxxxx/xxxxxxxxxxx_xxxxxxxxxx.xxpredictiveHigh
38Filexxxxx.xxxpredictiveMedium
39Filexxxx/xxx/xxxxxxx/xxx/xxx/xxxxxxxx.xpredictiveHigh
40Filexx-xxxxxx/xxxx/xxxxxx-xxxxxx.xxxpredictiveHigh
41Filexxxx.xxxpredictiveMedium
42Filexxxx.xxxpredictiveMedium
43Filexxxxxxxxxx.xxxpredictiveHigh
44Filexxxxxxxxxx.xxxpredictiveHigh
45Filexxxxxxxxxxxxxx.xxxpredictiveHigh
46Filexxx_xxxxxxx.xxxpredictiveHigh
47Filexxx-xxx/xxxx/xxxxx/xxxxxxx/xxxxxxxx/xxxxxpredictiveHigh
48Filexxx.xpredictiveLow
49Filexxxxxxxx.xxxpredictiveMedium
50Filexxxxxxxx/xxxxpredictiveHigh
51Filexxxxxxx.xxxpredictiveMedium
52Filexxxxxxx.xxxpredictiveMedium
53Filexxxx/xxxxxxxxxxxxx/xxxxxxx.xxxpredictiveHigh
54Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveHigh
55Filexxxxxxx.xxxpredictiveMedium
56Filexxxxxx.xxxpredictiveMedium
57Filexxxxxx.xxxpredictiveMedium
58Filexxxxxx.xxxpredictiveMedium
59Filexxxxxx/xxxxxxx/xxxxxxxx/xxxxxxxx.xxpredictiveHigh
60Filexxxxxxx/xxx/xx/xx.xpredictiveHigh
61Filexxxxxxx/xxx/xxxx/xxxxxxxxx.xpredictiveHigh
62Filexxxxxxx/xxx/xxxxxx/xxxxxx_xxxx.xpredictiveHigh
63Filexxxxx.xxxpredictiveMedium
64Filexxx/xxx/xxxxxpredictiveHigh
65Filexxxxxxx.xxxpredictiveMedium
66Filexxxxxxxxxx.xpredictiveMedium
67Filexxxxx.xxxpredictiveMedium
68Filexxxxx-xxxxxx.xxxpredictiveHigh
69Filexxxxxxx.xxxpredictiveMedium
70Filexxx/xxxx/xxxxxx/xxxxxx_xxxxxxx.xpredictiveHigh
71Filexxx/xxx/xxx_xxxx.xpredictiveHigh
72Filexxxxxxxx.xxxpredictiveMedium
73Filexxxxxxx/xxxxxx-xxx/xxxxxx-xxxxxx.xpredictiveHigh
74Filexxxxxxxxxxxxxxx.xxxpredictiveHigh
75Filexxxxx/xxxxx_xxxxx_xpredictiveHigh
76Filexxxxx.xxxpredictiveMedium
77Filexx/xxxx/xxxxx.xpredictiveHigh
78Filexx/xx-xx.xpredictiveMedium
79Filexx/xx_xxxxx.xpredictiveHigh
80Filexx/xxxx/xxxxxxx.xpredictiveHigh
81Filexx/xxxxx/xxxxxxx.xpredictiveHigh
82Filexxxxxxxx.xpredictiveMedium
83Filexxxxxxxxx/xxx_xxxx_xxxxxx.xxxpredictiveHigh
84Filexxxxxxx_xxxx.xxxpredictiveHigh
85Filexxx_xxx.xxxpredictiveMedium
86Filexxxx.xxxpredictiveMedium
87Filexxxx_xxxxxxx.xxx.xxxpredictiveHigh
88Filexxxxxxxxxxxxxxxxxxxxx.xxxpredictiveHigh
89Filexxxx/xxxx_xxxxx.xpredictiveHigh
90Filexxx/xxxxxx.xxxpredictiveHigh
91Filexxx/xxxxxxxxxxx/xxxxxxx.xxxpredictiveHigh
92Filexxxxxxx/xxxx.xxxxx.xxxpredictiveHigh
93Filexxxxx.xxxxpredictiveMedium
94Filexxxxx.xxxpredictiveMedium
95Filexxxxx.xxx/xxxx/xxxxx/xxxx/xxxx.xxxpredictiveHigh
96Filexxxxx.xxx?xxx=xxxx&xxx=xxxxxxxxpredictiveHigh
97Filexxxxx.xxx?xx=xxxxxxxxxpredictiveHigh
98Filexxxx.xpredictiveLow
99Filexxxxxxx.xxxpredictiveMedium
100Filexxxxxxxxxxx-xxxxxxx-xxxx.xxxx.xxxpredictiveHigh
101Filexxxxxxxxxxxxx.xxxpredictiveHigh
102Filexxxx.xxxpredictiveMedium
103Filexxxx_xxxx.xxxpredictiveHigh
104Filexxxxxxx.xxxpredictiveMedium
105Filexxxxxx.xpredictiveMedium
106Filexxxxxxxxxx/xxx/xxxxxx_xxxx.xxxpredictiveHigh
107Filexxxxxxxxxx.xxxpredictiveHigh
108Filexxxx/xxx/xxx.xpredictiveHigh
109Filexxxx-xxxx.xxxpredictiveHigh
110Filexxxx/xxxxxx/xxxxx.xxxpredictiveHigh
111Filexxxxx.xxxpredictiveMedium
112Filexxxxxxx.xxxxpredictiveMedium
113Filexxxxx.xxx.xxxpredictiveHigh
114Filexx/xxx.xpredictiveMedium
115Filexx/xxxxxxx.xpredictiveMedium
116Filexx/xxxx.xpredictiveMedium
117Filexx/xxxx.xpredictiveMedium
118Filexxxxxxx/xxxxx/xxx/xxx.xpredictiveHigh
119Filexxxxxxx/xxxxxxx/xxx_xxxxxxx.xpredictiveHigh
120Filexxxxxxx/xxx_xxxxxxx.xxxpredictiveHigh
121Filexxxxxxx/xxxxxxx/xxxxxxxxxx.xxxpredictiveHigh
122Filexxxxxxx/xxxxxxx/xxxxxxx.xxxpredictiveHigh
123Filexxx_xxx.xpredictiveMedium
124Filexxxxxx.xxpredictiveMedium
125Filexxxxxxxxxxxxxxxx.xxxpredictiveHigh
126Filexxx/xxxxxxxxx/xxxx.xpredictiveHigh
127Filexxxxxxxx.xxxx/xxxx.xxxxpredictiveHigh
128Filexxx/xxxxx.xxxxpredictiveHigh
129Filexxx.xpredictiveLow
130Filexxxxx.xxxpredictiveMedium
131Filexxxxxxxxxxxxxxx.xxxpredictiveHigh
132Filexxx/xxxx.xxxpredictiveMedium
133Filexxxxxxx.xxxpredictiveMedium
134Filexxxxxxxxxx.xxxpredictiveHigh
135Filexxxxxx/xxxx/xx_xxxxx.xxpredictiveHigh
136Filexxxxxxxx.xxxpredictiveMedium
137Filexxxxx_xxxxxx_xxx.xxxpredictiveHigh
138Filexxxxx_xxxxxx_xxxxxxxx.xxxpredictiveHigh
139Filexxxx.xxxpredictiveMedium
140Filexxxxxxxxxxxxxxxxxx.xxxxpredictiveHigh
141Filexxxxxxxx.xxxpredictiveMedium
142Filexxxxxxxx/xxxxx/xxxxxxxx?xxxxxxxxpredictiveHigh
143Filexxxxxxxx_xxxx.xxxpredictiveHigh
144Filexxxxxxx_xxx_xxxxx_xxxxxx.xxxxpredictiveHigh
145Filexxxxxxxxxxx.xxpredictiveHigh
146Filexxxx/xxxxxxpredictiveMedium
147Filexxxxxx.xxxpredictiveMedium
148Filexxxxxx_xxxx.xxxpredictiveHigh
149Filexxxxxx_xxxxxx.xxxpredictiveHigh
150Filexxxxxxx.xpredictiveMedium
151Filexxxxx/xxxxx.xxxpredictiveHigh
152Filexxxxxxx.xxxpredictiveMedium
153Filexxxxxx.xxxpredictiveMedium
154Filexxxx.xxxpredictiveMedium
155Filexxxxxxxx.xpredictiveMedium
156Filexxxxxxx/xxxx_xxxxx.xxxpredictiveHigh
157Filexxxxxx.xxxxpredictiveMedium
158Filexxxxxx.xxxpredictiveMedium
159Filexxxx.xpredictiveLow
160Filexxxx/xx.xxxpredictiveMedium
161Filexxxxxxx.xxxpredictiveMedium
162Filexxxxxxx.xxx/xxxxxxx.xxxxxxxxxxxx/xxxxxxx/xxxxxxx/xxxxxxxxxxxxxxxxxx.xxxx.xxpredictiveHigh
163Filexxxxxxxxxxx.xxxxpredictiveHigh
164Filexxxx/xxxxxxxx/xxxxxxxx.xxxxpredictiveHigh
165Filexxxx/xxxxxxxxxxxx.xxxpredictiveHigh
166Filexxxxxxx.xxxpredictiveMedium
167Filexxxx_xxxx.xxxpredictiveHigh
168Filexxxxx.xxxpredictiveMedium
169Filexxxxxxx\xxxxx\xxxxx\xxxxxxxxx.xxxxpredictiveHigh
170Filexx-xxxxx/xxxx-xxx-xxxx.xxxpredictiveHigh
171Filexx-xxxxx/xxxxxxx-xxxxxxx.xxx?xxxx=xxxxxxxxxx-xpredictiveHigh
172Filexx-xxxxx/xxxx.xxxpredictiveHigh
173Filexx-xxxxx/xxxx-xxx.xxxpredictiveHigh
174Filexx-xxxxxxxx/xxxxx-xx-xxxxx.xxxpredictiveHigh
175Filexx-xxxxxxxx/xxxxxxx-xxxxxxxx.xxxpredictiveHigh
176Filexx-xxxxxxxx/xxxxxxxxx.xxxpredictiveHigh
177Filexx-xxxxx.xxxpredictiveMedium
178Filexxxx.xxpredictiveLow
179File_xxxx__.xxpredictiveMedium
180Library/xxx/xxx/xxxxxxx/xxxxxxx/xxxxx.xxxxxxx.xxxpredictiveHigh
181Libraryxxxxxxxx.xxxpredictiveMedium
182Libraryxxxxx.xxxpredictiveMedium
183Libraryxxxxxxxx-xx.xxxpredictiveHigh
184Libraryxxxxxx[xxxxxx_xxxxpredictiveHigh
185Libraryxxxxxxxxx.xxxpredictiveHigh
186Libraryxxxxxxxx.xxxpredictiveMedium
187Libraryxxx/xxxxxx/xxx.xxxpredictiveHigh
188Libraryxxx/xxx.xxxpredictiveMedium
189Libraryxxx/xxxxxxxx.xxpredictiveHigh
190Libraryxxxxxxxx.xxxpredictiveMedium
191Libraryxxxxxx_xxx.xxx.xxxpredictiveHigh
192Argument$xxxxpredictiveLow
193Argument--xxxxxx/--xxxxxxxxpredictiveHigh
194ArgumentxxpredictiveLow
195Argumentxx_xxxxx_xxx_xxxxpredictiveHigh
196Argumentxxxxxxxx_xxxxpredictiveHigh
197Argumentxxx_xxxxpredictiveMedium
198ArgumentxxxxxxxpredictiveLow
199Argumentxxxxx_xxpredictiveMedium
200ArgumentxxxxxxxpredictiveLow
201Argumentxxxxxx_xxxxpredictiveMedium
202ArgumentxxxxxxpredictiveLow
203Argumentxxxx_xxxpredictiveMedium
204ArgumentxxxxxxxxpredictiveMedium
205Argumentxxxx_xxxpredictiveMedium
206Argumentxxxxxx/xxxxxpredictiveMedium
207ArgumentxxxxpredictiveLow
208ArgumentxxxpredictiveLow
209ArgumentxxxxxpredictiveLow
210Argumentxxx_xxxxpredictiveMedium
211Argumentxxx_xxxpredictiveLow
212ArgumentxxxpredictiveLow
213ArgumentxxxpredictiveLow
214Argumentxxxx_xxpredictiveLow
215Argumentxxxxxx[xxxxxx_xxxx]predictiveHigh
216ArgumentxxxxxxxpredictiveLow
217ArgumentxxxxxxxxpredictiveMedium
218ArgumentxxxxxxpredictiveLow
219Argumentxxxxxx xxxxpredictiveMedium
220ArgumentxxxxxxxxpredictiveMedium
221ArgumentxxxxxpredictiveLow
222ArgumentxxxpredictiveLow
223ArgumentxxxxxxxxxxpredictiveMedium
224ArgumentxxxxpredictiveLow
225ArgumentxxxxxpredictiveLow
226Argumentxxxxxxxx/xxxxxxxpredictiveHigh
227ArgumentxxxxxxxxxxxxxxpredictiveHigh
228Argumentxxxx_xxxxpredictiveMedium
229ArgumentxxxxxxxxpredictiveMedium
230Argumentxxxx_xxpredictiveLow
231ArgumentxxpredictiveLow
232ArgumentxxxxxxpredictiveLow
233Argumentxxxxxxx_xxxpredictiveMedium
234ArgumentxxxxpredictiveLow
235Argumentxxxx_xxxxxx_xxxxx/xxxx_xxxxxx_xxxx_xxxxxxpredictiveHigh
236ArgumentxxxxxxxxpredictiveMedium
237ArgumentxxxxpredictiveLow
238Argumentxx_xxxxxxxpredictiveMedium
239ArgumentxxxpredictiveLow
240ArgumentxxxxxpredictiveLow
241ArgumentxxxxxxxpredictiveLow
242ArgumentxxxpredictiveLow
243Argumentxxxxxx_xxxxxpredictiveMedium
244Argumentxxxxxxxxx_xxxxxxxx_xxxxpredictiveHigh
245ArgumentxxxxxxpredictiveLow
246ArgumentxxxxxxxxxxxpredictiveMedium
247ArgumentxxxpredictiveLow
248ArgumentxxpredictiveLow
249Argumentxxxxxx_xxpredictiveMedium
250ArgumentxxxxxpredictiveLow
251ArgumentxxxxxxxxpredictiveMedium
252Argumentxxxxx[x]predictiveMedium
253Argumentxxxx_xxxxpredictiveMedium
254ArgumentxxxxxxxxxpredictiveMedium
255ArgumentxxxpredictiveLow
256Argumentxxxx_xx/xxxxxxpredictiveHigh
257Argumentxxxxxxxx_xxxxxpredictiveHigh
258ArgumentxxxxxxpredictiveLow
259Argumentxxxxxxx_xxpredictiveMedium
260Argumentxxxxxxx_xxpredictiveMedium
261ArgumentxxxxxpredictiveLow
262ArgumentxxxxxxxpredictiveLow
263ArgumentxxxxxxxpredictiveLow
264Argumentxxxxxx_xxxxpredictiveMedium
265ArgumentxxxxxxxxpredictiveMedium
266ArgumentxxxxxxpredictiveLow
267ArgumentxxxxxxxxxxxxpredictiveMedium
268ArgumentxxxxxxpredictiveLow
269ArgumentxxxxxxxpredictiveLow
270Argumentxxxxxxxx_xxxxpredictiveHigh
271ArgumentxxxxpredictiveLow
272ArgumentxxxpredictiveLow
273ArgumentxxxxpredictiveLow
274Argumentxxxxxx_xxxxpredictiveMedium
275Argumentxxxxxx_xxpredictiveMedium
276ArgumentxxxxxxpredictiveLow
277Argumentxxxxxxxx_xxxxxpredictiveHigh
278ArgumentxxxxxpredictiveLow
279ArgumentxxxpredictiveLow
280ArgumentxxxpredictiveLow
281Argumentxx_xxxx_xxxpredictiveMedium
282ArgumentxxxpredictiveLow
283ArgumentxxxpredictiveLow
284Argumentxxxxxxxx/xxxxxxxxpredictiveHigh
285ArgumentxxxxxxxxxxxxxxxxxpredictiveHigh
286Argumentxxxx/xxxx/xxxxxxpredictiveHigh
287ArgumentxxxxxxxxxxxxxpredictiveHigh
288Argumentxxxxxx:xxxxxxxxxxxpredictiveHigh
289Argumentxxxxxxxxxxxx[xxxx]predictiveHigh
290Argumentxxxxxxxxx_xxxxxx_xx_[xxxx]predictiveHigh
291Input Value%xx/%xxpredictiveLow
292Input Value%xxpredictiveLow
293Input Value%xxxxxx+-x+x+xx.x.xx.xxx%xx%xxpredictiveHigh
294Input Value%xxpredictiveLow
295Input Valuex" xxxxxxxxxxx=xxxxxx(xxxxxx) xxx="predictiveHigh
296Input Value@xxxxxxxx.xxxpredictiveHigh
297Input Valuexxxxxxxxxxxxxxxxxxxxxxxxxxxxxx%xx%xx%xxxxx%xxx=%xxxpredictiveHigh
298Input Valuexxxxxxxxxx:xxxxxxxxxpredictiveHigh
299Patternxxxxx|xx|//predictiveMedium
300Network Portxxxx/xxxxpredictiveMedium
301Network Portxxx/xxxxpredictiveMedium
302Network Portxxx/xxx (xxx)predictiveHigh

References (4)

The following list contains external sources which discuss the actor and the associated activities:

Interested in the pricing of exploits?

See the underground prices here!