DreamBus Analysisinfo

IOB - Indicator of Behavior (167)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Language

de86
en58
ja20
es4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Apache HTTP Server8
Drupal6
code-projects Simple Ticket Booking4
SourceCodester Kortex Lite Advocate Office Managem ...4
SourceCodester Library Management System4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

These are the vulnerabilities that we have identified as researched, approached, or attacked.

#VulnerabilityBaseTemp0dayTodayExpCouKEVEPSSCTICVE
1nginx request smuggling6.96.9$0-$5k$0-$5kNot definedNot defined 0.000000.16CVE-2020-12440
2WikkaWiki wikka.php cross site scripting4.33.9$0-$5k$0-$5kProof-of-ConceptOfficial fix 0.009840.04CVE-2013-5586
3OpenSSL OCSP Response OCSP_basic_verify certificate validation7.37.0$5k-$25k$0-$5kNot definedOfficial fix 0.001270.00CVE-2022-1343
4Apache Wicket cross site scripting4.34.1$5k-$25k$0-$5kNot definedOfficial fix 0.028470.00CVE-2011-2712
5ClamAV Antivirus MIME Parser input validation6.86.8$5k-$25k$5k-$25kNot definedNot defined 0.022150.06CVE-2019-15961
6Omron CX-One CX-Programmer Password Storage information disclosure5.95.7$0-$5k$0-$5kNot definedOfficial fix 0.000580.06CVE-2015-0988
7phpBB information disclosure9.88.5$0-$5k$0-$5kProof-of-ConceptOfficial fix 0.003230.00CVE-2008-1766
8request-baskets API Request {name} server-side request forgery6.46.4$0-$5k$0-$5kNot definedNot definedexpected0.928160.04CVE-2023-27163
9rConfig PHP File unrestricted upload7.16.9$0-$5k$0-$5kProof-of-ConceptNot defined 0.000440.05CVE-2022-44384
10Symantec pcAnywhere CIF File Hosts privileges management7.87.0$5k-$25k$0-$5kProof-of-ConceptOfficial fix 0.000440.03CVE-2006-3784
11SourceCodester Leads Manager Tool Add Leads add-leads.php cross site scripting4.14.0$0-$5k$0-$5kProof-of-ConceptNot defined 0.000980.06CVE-2024-7644
12SourceCodester Kortex Lite Advocate Office Management System activate_act.php sql injection7.57.3$0-$5k$0-$5kProof-of-ConceptNot defined 0.001300.04CVE-2024-7642
13SourceCodester Kortex Lite Advocate Office Management System delete_register.php sql injection7.57.3$0-$5k$0-$5kProof-of-ConceptNot defined 0.001300.02CVE-2024-7640
14SourceCodester Kortex Lite Advocate Office Management System delete_act.php sql injection7.57.3$0-$5k$0-$5kProof-of-ConceptNot defined 0.001300.04CVE-2024-7639
15SourceCodester Kortex Lite Advocate Office Management System delete_client.php sql injection7.57.3$0-$5k$0-$5kProof-of-ConceptNot defined 0.001300.00CVE-2024-7638
16code-projects Online Polling Registration registeracc.php sql injection8.17.9$0-$5k$0-$5kProof-of-ConceptNot defined 0.001320.02CVE-2024-7637
17code-projects Simple Ticket Booking Registration register_insert.php sql injection8.17.9$0-$5k$0-$5kProof-of-ConceptNot defined 0.001360.02CVE-2024-7635
18code-projects Simple Ticket Booking Login authenticate.php sql injection8.17.9$0-$5k$0-$5kProof-of-ConceptNot defined 0.001410.02CVE-2024-7636
19Joomla CMS sql injection7.36.9$5k-$25k$0-$5kProof-of-ConceptNot defined 0.000350.00CVE-2013-1453
20jQuery IMG Element cross site scripting5.25.0$0-$5k$0-$5kNot definedNot defined 0.002980.07CVE-2018-18405

IOC - Indicator of Compromise (11)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (16)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (75)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/api/baskets/{name}predictiveHigh
2File/config/getuserpredictiveHigh
3File/endpoint/add-leads.phppredictiveHigh
4File/index.php?action=seomatic/file/seo-file-linkpredictiveHigh
5File/librarian/bookdetails.phppredictiveHigh
6File/mgmt/tm/util/bashpredictiveHigh
7File/staff/bookdetails.phppredictiveHigh
8File/student/bookdetails.phppredictiveHigh
9File/text/pdf/PdfReader.javapredictiveHigh
10Filexxxxxxxx_xxx.xxxpredictiveHigh
11Filexxx.xxxpredictiveLow
12Filexxxxx/xxxxxx.xxx/xxxxxx.xxx.xxxpredictiveHigh
13Filexxxxxxxxxxxx.xxxpredictiveHigh
14Filexxxxxxx.xxpredictiveMedium
15Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveHigh
16Filexxxxxx_xxx.xxxpredictiveHigh
17Filexxxxxx_xxxxxx.xxxpredictiveHigh
18Filexxxxxx_xxxxxxxx.xxxpredictiveHigh
19Filexxxxxxxxxx.xxxpredictiveHigh
20Filexxxxxxxxxxxx.xxxpredictiveHigh
21Filexxxxxxxxxxxxxxxxx.xxxpredictiveHigh
22Filexxxxx-xxxxxx/xxxxxxxx/xxxx-xxxx.xxpredictiveHigh
23Filexxxx_xxxx_xxxxxx.xxxpredictiveHigh
24Filexxxx/xxxxpredictiveMedium
25Filexxxx.xxxpredictiveMedium
26Filexxxxxx/xxxxxpredictiveMedium
27Filexxx/xxxxx/xxxxx.xxxx.xxxpredictiveHigh
28Filexxxxxxx.xxpredictiveMedium
29Filexxxxxx/xxxxxxxxxxx.xxxpredictiveHigh
30Filexxx_xxxxx_xxxxx.xpredictiveHigh
31Filexxxxxx/xxxxxxx/xxxxxxxxx/xxx/xxxxx_xxx.xxxpredictiveHigh
32Filexxxxx-xxxxxxx/xxx/xxxxx/xxxx_xxxxx/predictiveHigh
33Filexxxxxxxx.xpredictiveMedium
34Filexxxxxxxxxxx.xxxpredictiveHigh
35Filexxxxxxxx_xxxxxx.xxxpredictiveHigh
36Filexxxxxxxx_xxxxxx.xxxpredictiveHigh
37Filexxxxxxxxx-xxxxxxxxxxxx-xxx/xxxx/xxxxx-xxxx.xxxpredictiveHigh
38Filexxxxxxxx\xxxxxxxxxx\xxxxxpredictiveHigh
39Filexxxx.xxxpredictiveMedium
40Filexxxx.xxxpredictiveMedium
41Filexxxxx.xxxpredictiveMedium
42Filexx-xxxxx/xxxxx.xxx?xxxx=xxxxxxxxxxxxpredictiveHigh
43Libraryxxxxxxxx.xxxpredictiveMedium
44Libraryxxxxxx.xxxpredictiveMedium
45Libraryxxx/xxxxxxxx/xxxx.xxxpredictiveHigh
46Argumentxxxxx_xx/xxxxxpredictiveHigh
47Argumentxxxx_xxxxxxxxpredictiveHigh
48Argumentxxxx_xxxxxxxx_xxpredictiveHigh
49ArgumentxxxxxxpredictiveLow
50ArgumentxxxxxpredictiveLow
51Argumentxxxxx/xxxxxxxxpredictiveHigh
52Argumentxxx_xxxpredictiveLow
53ArgumentxxxxpredictiveLow
54Argumentxx_xxxxxxxxpredictiveMedium
55ArgumentxxxxxxxxxpredictiveMedium
56ArgumentxxpredictiveLow
57ArgumentxxpredictiveLow
58ArgumentxxxxxxpredictiveLow
59Argumentxxxxx_xxxx/xxxxx_xxxxxxpredictiveHigh
60Argumentxxxx/xxxxx/xxx/xxxxxxxx/xxxxxx/xxxxxpredictiveHigh
61ArgumentxxxxxxxpredictiveLow
62Argumentxxxxx_xxpredictiveMedium
63ArgumentxxxxxxxxxpredictiveMedium
64Argumentxxxx_xxxxxxpredictiveMedium
65ArgumentxxxxxxxxpredictiveMedium
66Argumentxxx_xxpredictiveLow
67ArgumentxxxpredictiveLow
68ArgumentxxxxpredictiveLow
69Argumentxxxx_xxxxxx/xxxxxx/xxxxxxpredictiveHigh
70ArgumentxxxpredictiveLow
71ArgumentxxxxpredictiveLow
72ArgumentxxxxxpredictiveLow
73Input Value' xxx (xxxxxx xxxx xxxx (xxxxxx(xxxxx(x)))xxxx)-- xxxxpredictiveHigh
74Input Value..\/predictiveLow
75Network Portxxx/xxxxpredictiveMedium

References (6)

The following list contains external sources which discuss the actor and the associated activities:

This view requires CTI permissions

Just purchase a CTI license today!