Manjusaka Analysisinfo

IOB - Indicator of Behavior (61)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en34
zh26
it2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Dahua DHI-HCVR7216A-S32
Huawei S127002
Huawei S17002
Huawei S27002
Huawei S37002

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1vsftpd deny_file3.73.6$0-$5k$0-$5kNot DefinedOfficial Fix0.002610.04CVE-2015-1419
2Oracle Storage Cloud Software Appliance Management Console Remote Code Execution10.09.5$100k and more$5k-$25kNot DefinedOfficial Fix0.005760.00CVE-2021-2256
3VMware Spring Framework neutralization for logs4.54.5$5k-$25k$5k-$25kNot DefinedNot Defined0.000790.00CVE-2021-22096
4nginx ngx_http_mp4_module information disclosure5.95.8$0-$5k$0-$5kNot DefinedOfficial Fix0.001980.04CVE-2018-16845
5Python libraries privileges management6.56.2$0-$5k$0-$5kProof-of-ConceptNot Defined0.000000.00
6Fortinet FortiOS SSL-VPN out-of-bounds write9.89.6$100k and more$25k-$100kHighOfficial Fix0.018420.00CVE-2024-21762
7GilaCMS GET Parameter cm.php sql injection6.36.1$0-$5k$0-$5kNot DefinedNot Defined0.002180.00CVE-2020-20692
8SourceCodester Simple Subscription Website manage_plan.php sql injection6.36.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.000450.04CVE-2024-3015
9Chengdu VEC40G Network Detection send_order.cgi os command injection5.55.4$0-$5k$0-$5kProof-of-ConceptNot Defined0.001940.04CVE-2023-2522
10code-projects Bus Dispatch and Information System view_admin.php sql injection6.35.7$0-$5k$0-$5kProof-of-ConceptNot Defined0.001860.08CVE-2023-2773
11frioux ptome sql injection6.96.9$0-$5k$0-$5kNot DefinedOfficial Fix0.001730.04CVE-2010-10009
12Totolink X2000R HTTP POST Request boa formTmultiAP buffer overflow8.17.8$0-$5k$0-$5kProof-of-ConceptNot Defined0.000590.08CVE-2023-7222
13SAP GUI Connector for Microsoft Edge exposure of sensitive system information to an unauthorized control sphere6.46.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.000870.02CVE-2024-22125
14Cool Plugins Events Shortcodes for the Events Calendar Plugin sql injection7.07.0$0-$5k$0-$5kNot DefinedNot Defined0.000500.00CVE-2023-52142
15Acumos Design Studio cross site scripting4.44.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000520.04CVE-2018-25097
16Google Android ion.c ion_ioctl use after free5.35.1$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000420.00CVE-2022-20118
17Qualcomm Snapdragon Compute XPU Re-Configuration access control8.58.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.000440.00CVE-2021-30276
18Epic Games Psyonix Rocket League UPK Object stack-based overflow5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.003620.00CVE-2021-32238
19Microsoft Windows IIS memory corruption7.97.6$25k-$100k$5k-$25kNot DefinedOfficial Fix0.001820.03CVE-2019-1365
20MailEnable Enterprise Premium path traversal7.27.2$0-$5k$0-$5kNot DefinedNot Defined0.000610.00CVE-2019-12925

IOC - Indicator of Compromise (6)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (10)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (22)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/bin/boapredictiveMedium
2File/send_order.cgi?parameter=access_detectpredictiveHigh
3File/src/core/controllers/cm.phppredictiveHigh
4File/xxx/xxx/xxxxxxpredictiveHigh
5File/xxxxxxpredictiveLow
6Filexxxxx.xxxpredictiveMedium
7Filexxx.xpredictiveLow
8Filexxxxxx_xxxx.xxxpredictiveHigh
9Filexxxx_xxxxx.xxxpredictiveHigh
10Filexx-xxxxx.xxxpredictiveMedium
11Library/xxx/xxx/xxx/xxxx/xxxxxxxxxx/xxxxxxxxx.xxxpredictiveHigh
12LibraryxxxxxxxxxpredictiveMedium
13ArgumentxxxxxxxpredictiveLow
14ArgumentxxxxxpredictiveLow
15ArgumentxxpredictiveLow
16ArgumentxxpredictiveLow
17ArgumentxxxxxpredictiveLow
18Argumentxxxxxx-xxxpredictiveMedium
19ArgumentxxxxxpredictiveLow
20Input Valuex | xxxxxxx -xxpredictiveHigh
21Input Value===predictiveLow
22Network Portxxx/xxxpredictiveLow

References (3)

The following list contains external sources which discuss the actor and the associated activities:

This view requires CTI permissions

Just purchase a CTI license today!