menuPass Analysis

IOB - Indicator of Behavior (151)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en94
zh38
it8
fr6
es2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

us140
cn4
id2
it2
ua2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Apache Tomcat6
ThinkPHP6
Apple iOS4
PhonePe Wallet2
Alfresco Community Edition2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemCTIEPSSCVE
1Kubernetes kubelet pprof information disclosure7.37.2$0-$5k$0-$5kNot DefinedOfficial Fix0.050.53513CVE-2019-11248
2shell-quote Windows Drive Letter exec os command injection5.55.3$0-$5k$0-$5kNot DefinedOfficial Fix0.020.00160CVE-2021-42740
3Rockwellautomation 1756-ENBT series A Firmware perform access control10.010.0$0-$5k$0-$5kNot DefinedNot Defined0.020.48259CVE-2010-2965
4Simple Link Directory Plugin SQL Statement qcopd_upvote_action sql injection7.37.0$0-$5k$0-$5kNot DefinedOfficial Fix0.020.02705CVE-2022-0760
5nginx request smuggling6.96.9$0-$5k$0-$5kNot DefinedNot Defined0.300.00241CVE-2020-12440
6Litespeed Technologies OpenLiteSpeed access control8.07.6$0-$5kCalculatingProof-of-ConceptNot Defined0.000.06285CVE-2021-26758
7DZCP deV!L`z Clanportal config.php code injection7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.790.00943CVE-2010-0966
8emercoin Header resource consumption6.46.4$0-$5k$0-$5kNot DefinedNot Defined0.000.00245CVE-2018-19152
9OpenSSH Authentication Username information disclosure5.34.8$5k-$25k$0-$5kHighOfficial Fix0.040.10737CVE-2016-6210
10Joomla CMS Media Form Field cross site scripting5.24.9$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00137CVE-2019-9714
11Joomla CMS Edit View cross site scripting5.24.9$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00137CVE-2019-9711
12PHP exif.c exif_read_data use after free8.58.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00536CVE-2018-12882
13Tiki Admin Password tiki-login.php improper authentication8.07.7$0-$5k$0-$5kNot DefinedOfficial Fix5.680.00936CVE-2020-15906
14TikiWiki tiki-register.php input validation7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix10.000.01009CVE-2006-6168
15eSyndicat Directory Software suggest-listing.php cross site scripting3.53.5$0-$5k$0-$5kNot DefinedNot Defined0.040.00000
16Oracle Database Server Privilege Escalation6.36.3$5k-$25kCalculatingHighNot Defined0.020.05635CVE-2010-0866
17WP ALL Export Pro Plugin cross-site request forgery4.34.1$0-$5k$0-$5kNot DefinedOfficial Fix0.020.00136CVE-2023-5882
18EMC Replication Manager credentials management4.03.8$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00042CVE-2013-3272
19WordPress input validation5.35.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.020.00576CVE-2013-2204
20WordPress information disclosure4.34.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.020.00358CVE-2013-2202

Campaigns (3)

These are the campaigns that can be associated with the actor:

IOC - Indicator of Compromise (18)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (13)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (77)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/anony/mjpg.cgipredictiveHigh
2File/debug/pprofpredictiveMedium
3File/secure/admin/InsightDefaultCustomFieldConfig.jspapredictiveHigh
4File/uncpath/predictiveMedium
5FileArchivesMapper.xmlpredictiveHigh
6Fileblind\source\high.phppredictiveHigh
7Filecart.phppredictiveMedium
8Filecat.phppredictiveLow
9Filecategorie.php3predictiveHigh
10Filexxxxx/xxxxxxxx-xxxxxxxxx/xxxxxxxxxxxxxxx.xxxxx.xxxpredictiveHigh
11Filexxx.xxxxxxx.xxxpredictiveHigh
12Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveHigh
13Filexxxxxx.xxpredictiveMedium
14Filexxxx.xxxpredictiveMedium
15Filexxx_xxxxxx_xxx_xxxxxx.xpredictiveHigh
16Filexxx/xxxx/xxxx.xpredictiveHigh
17Filexxxxxxxxxxx.xxx/xxxxxxxxxxxpredictiveHigh
18Filexxxxxxxxx/xxxxx/xxxxxxx_xxxxxxx.xxxpredictiveHigh
19Filexxxxxx.xxpredictiveMedium
20Filexxx/xxxxxx.xxxpredictiveHigh
21Filexxxxxxx_xxxx/xxxxxxxx.xxxpredictiveHigh
22Filexxxxx.xxxpredictiveMedium
23Filexxxxxxxxx/xxx/xxx_xxxxxxxx.xxxpredictiveHigh
24Filexxx.xpredictiveLow
25Filexxxxxxxx/xxxxxxxxxpredictiveHigh
26Filexxxxxxx/xxxxx/xx/xxxxxx.xxxxx.xxxpredictiveHigh
27Filexxxxxxx/xxxxx/xx/xxxxxx/xxxxx.xxxxx.xxxpredictiveHigh
28Filexxx.xxxpredictiveLow
29Filexxxx_xxx.xxxxpredictiveHigh
30Filexxxxxxx.xxxpredictiveMedium
31Filexxxxxx/?x=xxxxx/\xxxxx\xxx/xxxxxxxxxxxxxx&xxxxxxxx=xxxx_xxxx_xxxx_xxxxx&xxxx[x]=xxxxxx&xxxx[x][]predictiveHigh
32Filexxxx/xxxxxpredictiveMedium
33Filexxxxxx_xxxxxx.xxxpredictiveHigh
34Filexxxx.xxxpredictiveMedium
35Filexxxxxxx.xxxpredictiveMedium
36Filexxxxxxxxx.xxxpredictiveHigh
37Filexxxxxxx-xxxxxxx.xxxpredictiveHigh
38Filexxxxxxxxx/xxxxxxxxxxpredictiveHigh
39Filexxxx-xxxxx.xxxpredictiveHigh
40Filexxxx-xxxxxxxx.xxxpredictiveHigh
41Filexx-xxxxx/xxxxxxxx/xxxxx-xxxx-xxxxxx-xxxxxxxx.xxxpredictiveHigh
42Filexx-xxxx.xxxpredictiveMedium
43Filexxxx.xxpredictiveLow
44ArgumentxxxxxxxxxxxpredictiveMedium
45ArgumentxxxxxxxxpredictiveMedium
46ArgumentxxxxxpredictiveLow
47ArgumentxxxxxpredictiveLow
48ArgumentxxxpredictiveLow
49ArgumentxxxxxxxxxxxxxxpredictiveHigh
50ArgumentxxxxxxxpredictiveLow
51ArgumentxxpredictiveLow
52ArgumentxxxxxxxxxxxpredictiveMedium
53ArgumentxxxxxxxxxxxxxxxpredictiveHigh
54Argumentxxxxxxx_xxxxxxxpredictiveHigh
55Argumentxxxxxxx[xx_xxx_xxxx]predictiveHigh
56Argumentxxxx_xxxx/xxxxxxx_xxxxxxxxxxxpredictiveHigh
57ArgumentxxpredictiveLow
58Argumentxxxx_xxxxxpredictiveMedium
59ArgumentxxxpredictiveLow
60ArgumentxxxxxpredictiveLow
61ArgumentxxxxxxpredictiveLow
62ArgumentxxxxpredictiveLow
63Argumentxxxx/xxxxxxxpredictiveMedium
64Argumentxxxxxx xxxxxxpredictiveHigh
65ArgumentxxxxxpredictiveLow
66ArgumentxxxxxxxxpredictiveMedium
67ArgumentxxxxxxxxpredictiveMedium
68ArgumentxxxxxxxxpredictiveMedium
69Argumentxxx_xxxxpredictiveMedium
70Argumentxxxx_xxpredictiveLow
71ArgumentxxxxpredictiveLow
72ArgumentxxxxxpredictiveLow
73ArgumentxxxxxxxxxpredictiveMedium
74ArgumentxxxxxxxxxpredictiveMedium
75Input Value::$xxxxx_xxxxxxxxxxpredictiveHigh
76Input ValuexxxxpredictiveLow
77Network Portxxx xxxxxx xxxxpredictiveHigh

References (7)

The following list contains external sources which discuss the actor and the associated activities:

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!