French Southern Territories Unknown Analysisinfo

IOB - Indicator of Behavior (73)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en64
zh4
fr2
it2
de2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Joomla CMS4
Microsoft IIS4
Apache Tapestry2
JForum2
Apache Tomcat2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1Check Point Security Management CA Web Management input validation4.44.2$0-$5k$0-$5kNot DefinedOfficial Fix0.000440.00CVE-2020-6020
2Apple Safari BMP/GIF Image memory corruption7.36.4$100k and more$0-$5kProof-of-ConceptOfficial Fix0.022840.05CVE-2008-1573
3Microsoft Windows PowerShell Integrated Scripting Environment privileges management5.35.0$25k-$100k$0-$5kProof-of-ConceptUnavailable0.000000.03
4AnyDesk Tunneling Feature access control6.05.9$0-$5k$0-$5kNot DefinedOfficial Fix0.000860.03CVE-2021-44425
5AnyDesk Downloads unrestricted upload7.57.4$0-$5k$0-$5kNot DefinedOfficial Fix0.002370.04CVE-2021-44426
6Check Point Gaia Portal Security Management GUI Client os command injection4.34.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000440.05CVE-2021-30361
7Linux Foundation Xen EFLAGS Register SYSENTER input validation6.25.9$5k-$25k$0-$5kNot DefinedOfficial Fix0.000620.02CVE-2013-1917
8Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash information disclosure5.35.2$5k-$25kCalculatingHighWorkaround0.038280.00CVE-2007-1192
9CarSpot Theme Phone Number Stored cross site scripting4.74.6$0-$5k$0-$5kNot DefinedOfficial Fix0.000740.00CVE-2019-15870
10Apache Tapestry HMAC Verification input validation9.89.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.089370.03CVE-2019-10071
11Gempar Script Toko Online shop_display_products.php sql injection7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.001000.05CVE-2009-0296
12SourceCodester Clinics Patient Management System user_images direct request6.05.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.002920.02CVE-2024-7753
13SourceCodester Clinics Patient Management System check_user_name.php sql injection7.57.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.001920.02CVE-2024-7841
14Inventory Management editProduct.php cross site scripting4.44.4$0-$5k$0-$5kNot DefinedNot Defined0.000580.04CVE-2023-46580
15D-Link DIR-850L category_view.php improper authentication8.58.1$5k-$25k$0-$5kProof-of-ConceptNot Defined0.797270.04CVE-2018-9032
16Comersus Open Technologies Comersus Cart comersus_optreviewreadexec.asp sql injection7.37.1$0-$5k$0-$5kHighUnavailable0.003050.07CVE-2007-3323
17MIT Kerberos kadmin memory corruption7.36.4$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.255010.02CVE-2006-6144
18IdeaBox generformlib_date.php privileges management7.36.1$0-$5k$0-$5kUnprovenOfficial Fix0.000000.00
19OpenSSL DTLS CBC Encryption cryptographic issues5.35.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.009980.00CVE-2011-4108

IOC - Indicator of Compromise (15)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (9)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (55)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/category_view.phppredictiveHigh
2File/my_photo_gallery/image.phppredictiveHigh
3File/pms/ajax/check_user_name.phppredictiveHigh
4File/uncpath/predictiveMedium
5File/user_images/predictiveHigh
6Fileadd_comment.phppredictiveHigh
7Fileadmin/conf_users_edit.phppredictiveHigh
8Filexxxxxxxxxxxxx/xxxxxxxxxx/xxx_xxxxx/xxxxxxx/xxxxx.xxxpredictiveHigh
9Filexxxxxxx/xxxxxxxxxxx.xpredictiveHigh
10Filexxx.xxxpredictiveLow
11Filexxxxxxxx_xxxxxxxxxxxxxxxxx.xxxpredictiveHigh
12Filexxxxxxxxx-xxxxxx-xxxxxx/xxx/xxxxxxxx/xxxxx/xxxxx/xxxxxxxx_xxxx.xxxpredictiveHigh
13Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveHigh
14Filexxxxxxxxxxx.xxxpredictiveHigh
15Filexxxxx.xxxpredictiveMedium
16Filexxxxxxxxxxxx_xxxx.xxxpredictiveHigh
17Filexxxxxxx/xxxxxxx/xxxxxxxx_xxxxxxxx.xxx.xxxpredictiveHigh
18Filexxxxx.xxxpredictiveMedium
19Filexxxxxxx\xxxxxxxxx\xxxxxxx.xxxpredictiveHigh
20Filexxx_xxxxx_xxxx.xpredictiveHigh
21Filexxx/xxxxxx/xxxxxxxx/xxxxx/xxxxxxxxx.xxxxpredictiveHigh
22Filexxxxxxx_xxx_xxxxx_xxxxxx.xxxxpredictiveHigh
23Filexxxxxxxxxx.xxxpredictiveHigh
24Filexxxxxx_xxxxxxxxx_xxxxxxxx.xxxpredictiveHigh
25Filexxxxxxxxx.xxxpredictiveHigh
26Filexxxx_xxxxxxx_xxxxxxxx.xxxpredictiveHigh
27Filexxxxxxx.xxxpredictiveMedium
28Filexx-xxxxxxxxx.xxxpredictiveHigh
29File~/xxxxxxxxx/predictiveMedium
30Libraryxxxxxxx/xxxx/xxxxxx/xxx_xxxxxxxx.xpredictiveHigh
31Libraryxxxxxxxx.xxxpredictiveMedium
32Libraryxxxxx.xxxpredictiveMedium
33Argumentxxx_xxpredictiveLow
34ArgumentxxxxxxxxpredictiveMedium
35ArgumentxxxxxxxxxpredictiveMedium
36ArgumentxxxxxxxxpredictiveMedium
37ArgumentxxpredictiveLow
38ArgumentxxxxxxxxxpredictiveMedium
39ArgumentxxxxxpredictiveLow
40Argumentxxxxxxx_xxxxpredictiveMedium
41Argumentxxxx_xxxxxx_xxpredictiveHigh
42ArgumentxxxxxxxxpredictiveMedium
43ArgumentxxpredictiveLow
44ArgumentxxxxxpredictiveLow
45ArgumentxxxxxpredictiveLow
46ArgumentxxxxxxxxxxpredictiveMedium
47Argumentxxxxxx_xxpredictiveMedium
48Argumentxxxx_xxxxxx/xxxxxx/xxxxxxpredictiveHigh
49Argumentxx_xxpredictiveLow
50Argumentxxxxxxxx/xxxxxxxxpredictiveHigh
51Argumentxxxx_xxxxpredictiveMedium
52Input Valuex xxxxx xxx xxxxxx xxxx,xxxx,xxxx,xxxx,xxxxxx(xxxxxxxxxxxx,xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx,xxxxxxxxxxxx)--predictiveHigh
53Input Value::$xxxxx_xxxxxxxxxxpredictiveHigh
54Network PortxxxpredictiveLow
55Network Portxxx xxxxxx xxxxpredictiveHigh

References (2)

The following list contains external sources which discuss the actor and the associated activities:

This view requires CTI permissions

Just purchase a CTI license today!