JSOutProx Analysis

IOB - Indicator of Behavior (88)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en62
de14
fr6
es4
pl2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Microsoft Windows8
thttpd4
B&R GateManager 42604
B&R GateManager 92504
Todd Miller sudo2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemCTIEPSSCVE
1All Enthusiast Inc Reviewpost Php Pro showproduct.php sql injection7.37.0$0-$5k$0-$5kNot DefinedOfficial Fix0.040.00501CVE-2004-2175
2PhotoPost PHP Pro showproduct.php sql injection9.89.4$0-$5k$0-$5kNot DefinedOfficial Fix0.040.00276CVE-2004-0250
3Squitosoft Squito Gallery photolist.inc.php memory corruption7.37.3$0-$5k$0-$5kNot DefinedNot Defined0.040.01371CVE-2005-2258
4OpenSSH Authentication Username information disclosure5.34.8$5k-$25k$0-$5kHighOfficial Fix0.040.10737CVE-2016-6210
5BitTorrent uTorrent Bencoding Parser input validation6.46.4$0-$5k$0-$5kNot DefinedNot Defined0.020.00867CVE-2020-8437
6MDaemon Webmail cross site scripting5.45.3$0-$5k$0-$5kNot DefinedOfficial Fix0.020.00070CVE-2019-8983
7Synology DiskStation Manager Change Password password recovery7.17.0$0-$5k$0-$5kNot DefinedOfficial Fix0.030.00068CVE-2018-8916
8Microsoft IIS cross site scripting5.24.7$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.040.00548CVE-2017-0055
9WordPress Thumbnail input validation7.57.5$5k-$25k$5k-$25kNot DefinedNot Defined0.030.00990CVE-2018-1000773
10Google Chrome PDF Remote Code Execution6.36.0$25k-$100k$5k-$25kNot DefinedOfficial Fix0.020.00134CVE-2022-1875
11PHPX news.php cross-site request forgery4.34.1$0-$5kCalculatingProof-of-ConceptNot Defined0.000.00000
12PHPX auth.inc.php sql injection7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.030.00357CVE-2005-3968
13phpcart phpcart.php input validation5.35.1$0-$5k$0-$5kHighUnavailable0.000.03197CVE-2005-1398
14EVOLUCARE ECS Imaging showfile.php os command injection8.08.0$0-$5k$0-$5kNot DefinedWorkaround0.030.00371CVE-2021-3029
15pollvote pollvote.php code injection7.36.9$0-$5kCalculatingProof-of-ConceptNot Defined0.030.01517CVE-2005-3775
16Hassan Consulting Shopping Cart shop.cgi path traversal5.35.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.000.02149CVE-2000-0921
17Ajax Load More Plugin admin-ajax.php sql injection6.76.1$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.080.00087CVE-2021-24140
18Nextcloud Server getFullPath path traversal6.66.5$0-$5k$0-$5kNot DefinedOfficial Fix0.030.00083CVE-2023-25579
19RoundCube func.inc cross site scripting5.25.1$0-$5k$0-$5kNot DefinedOfficial Fix0.020.67612CVE-2018-19206
20RoundCube GnuPG MDC Integrity-Protection Warning enigma_driver_gnupg.php information disclosure6.46.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00225CVE-2018-19205

IOC - Indicator of Compromise (8)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (11)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueVulnerabilitiesAccess VectorTypeConfidence
1T1006CWE-22Path TraversalpredictiveHigh
2T1059CWE-94Argument InjectionpredictiveHigh
3T1059.007CWE-79, CWE-80Cross Site ScriptingpredictiveHigh
4TXXXXCWE-XXX, CWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveHigh
5TXXXXCWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx XxxxxxxxxpredictiveHigh
6TXXXXCWE-XXX7xx Xxxxxxxx XxxxxxxxpredictiveHigh
7TXXXXCWE-XXXXxxxxxxxxx XxxxxxpredictiveHigh
8TXXXXCWE-XXXxx XxxxxxxxxpredictiveHigh
9TXXXXCWE-XXXXxxxxxxxxxx XxxxxxxxxxpredictiveHigh
10TXXXXCWE-XXX, CWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveHigh
11TXXXXCWE-XXXXxxxxxxxxxxxx XxxxxxpredictiveHigh

IOA - Indicator of Attack (49)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/etc/sudoerspredictiveMedium
2File/see_more_details.phppredictiveHigh
3File/showfile.phppredictiveHigh
4File/uncpath/predictiveMedium
5File/wp-admin/admin-ajax.phppredictiveHigh
6Fileadmin/news.phppredictiveHigh
7Fileauth.inc.phppredictiveMedium
8Filexxx.xxxpredictiveLow
9Filexxxxxx.xxxpredictiveMedium
10Filexxxx\xx_xx.xxxpredictiveHigh
11Filexxxxxx.xxxpredictiveMedium
12Filexxxxxxxxxxxxxxxxxx.xxxpredictiveHigh
13Filexxxxxxxxxxx/xxxxx.xxxpredictiveHigh
14Filexxxxxxx.xxxpredictiveMedium
15Filexxxxx.xxxpredictiveMedium
16Filexxxxx/xxxxxxxx.xpredictiveHigh
17Filexxx.xxpredictiveLow
18Filexxxxxxxxx.xxx.xxxpredictiveHigh
19Filexxxxxxx.xxxpredictiveMedium
20Filexxxxxxxx.xxxpredictiveMedium
21Filexxxx.xxxpredictiveMedium
22Filexxxxxxx_xxx_xxxxx_xxxxxx.xxxxpredictiveHigh
23Filexxxx_xxxxxxxxx.xxxpredictiveHigh
24Filexxxx.xxxpredictiveMedium
25Filexxxx_xxxxxxx_xxxxxxxx.xxxpredictiveHigh
26Filexxxxxxxxxxx.xxxpredictiveHigh
27Filexxxxx/xxxx/xxxx.xxxpredictiveHigh
28Filexxxxxx.xxxxxxx.xxxxxxxxxxxxxxxxxxxxxxxxpredictiveHigh
29Libraryxxxxxx.xxxpredictiveMedium
30Libraryxxxxxxx/xxxxxx/xxx/xxxxxx_xxxxxx_xxxxx.xxxpredictiveHigh
31ArgumentxxxpredictiveLow
32ArgumentxxxxxpredictiveLow
33Argumentxxx_xxpredictiveLow
34Argumentxxxxx_xxxxxxxpredictiveHigh
35ArgumentxxxxpredictiveLow
36ArgumentxxxxxxxxpredictiveMedium
37ArgumentxxpredictiveLow
38ArgumentxxxpredictiveLow
39Argumentxxxx_xxpredictiveLow
40Argumentxx-xxxxxx-xxxxxx-xxxxpredictiveHigh
41ArgumentxxxxxpredictiveLow
42ArgumentxxxxpredictiveLow
43ArgumentxxxxxxxxpredictiveMedium
44ArgumentxxxxxxxxxpredictiveMedium
45ArgumentxxxxxxxxpredictiveMedium
46ArgumentxxxxxxxxpredictiveMedium
47ArgumentxxxxxxxxxpredictiveMedium
48ArgumentxxxxxxxxpredictiveMedium
49Pattern|xx xx xx|predictiveMedium

References (4)

The following list contains external sources which discuss the actor and the associated activities:

Might our Artificial Intelligence support you?

Check our Alexa App!