Konni Analysis

IOB - Indicator of Behavior (22)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en20
zh2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Roku2
Roku TV2
Microsoft Windows2
Sir GNUboard2
Bitcoin2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1Bitcoin wallet.dat AES Encryption Padding missing encryption7.16.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000000.06
2Google Chrome WebGL out-of-bounds write7.57.4$25k-$100k$5k-$25kNot DefinedOfficial Fix0.001150.04CVE-2023-4072
3MailEnable Enterprise Premium Stored cross site scripting5.25.2$0-$5k$0-$5kNot DefinedNot Defined0.000920.00CVE-2019-12927
4Smarty code injection7.37.0$0-$5k$0-$5kNot DefinedOfficial Fix0.047580.00CVE-2014-8350
5Microsoft IIS cross site scripting5.24.7$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.005480.06CVE-2017-0055
6Google Chrome Index DB use after free6.36.0$25k-$100k$5k-$25kNot DefinedOfficial Fix0.002380.00CVE-2022-1853
7Citrix ShareFile Storage Zones Controller access control7.37.0$5k-$25k$0-$5kHighOfficial Fix0.011860.00CVE-2021-22941
8Microsoft Windows Remote Desktop Client Remote Code Execution8.87.9$100k and more$5k-$25kProof-of-ConceptOfficial Fix0.052160.04CVE-2021-34535
9OpenX File Upload banner-edit.php input validation6.36.3$0-$5k$0-$5kHighNot Defined0.128300.00CVE-2009-4098
10D-Link DIR-600M C1 wan.htm improper authentication8.58.4$5k-$25k$0-$5kNot DefinedWorkaround0.004320.00CVE-2019-7736
11Apple iOS/iPadOS Kernel information disclosure3.33.2$5k-$25k$0-$5kHighOfficial Fix0.007780.00CVE-2020-27950
12PHProxy Hotlinking Prevention privileges management6.35.6$0-$5k$0-$5kProof-of-ConceptWorkaround0.000000.05
13Linux Kernel blktrace.c __blk_add_trace use after free7.47.4$5k-$25k$5k-$25kNot DefinedNot Defined0.009680.00CVE-2019-19768
14Basti2web Book Panel books.php sql injection7.37.0$0-$5k$0-$5kHighOfficial Fix0.000640.07CVE-2009-4889
15Microsoft .NET Framework Code Access Security cryptographic issues9.89.8$5k-$25k$0-$5kNot DefinedNot Defined0.001630.28CVE-2008-5100
16Adobe Acrobat Reader use after free8.07.7$25k-$100k$5k-$25kNot DefinedOfficial Fix0.010930.00CVE-2019-8257
17Sir GNUboard sql injection6.36.3$0-$5k$0-$5kNot DefinedNot Defined0.001120.00CVE-2014-2339
18Roku/Roku TV External Control API DNS Rebinding input validation8.38.3$0-$5k$0-$5kNot DefinedNot Defined0.003160.04CVE-2018-11314
19ThinkCMF ProfileController.class.php do_avatar path traversal5.95.9$0-$5k$0-$5kNot DefinedNot Defined0.000610.00CVE-2018-16141
20Cisco Linksys Router tmUnblock.cgi privileges management9.89.2$25k-$100k$0-$5kHighWorkaround0.000000.00

IOC - Indicator of Compromise (12)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (7)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (15)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/uncpath/predictiveMedium
2Fileapplication\User\Controller\ProfileController.class.phppredictiveHigh
3Filebanner-edit.phppredictiveHigh
4Filexxxxx.xxxpredictiveMedium
5Filexxxxxx/xxxxx/xxxxxxxx.xpredictiveHigh
6Filexxxxxxxxx.xxxpredictiveHigh
7Filexxxxxx.xxxpredictiveMedium
8Filexxx.xxxpredictiveLow
9ArgumentxxxxxxpredictiveLow
10ArgumentxxxxxxxpredictiveLow
11ArgumentxxxxxxpredictiveLow
12Argumentxxxxxxxx=xxx>predictiveHigh
13Argumentxxxx_xxpredictiveLow
14Input Value..\predictiveLow
15Network Portxxx/xxxxpredictiveMedium

References (7)

The following list contains external sources which discuss the actor and the associated activities:

Do you want to use VulDB in your project?

Use the official API to access entries easily!