Muhstik Analysis

Activities

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

Lang

en790
fr151
de12
es10
pl5

Country

fr757
us65
nl18
cn17
de8

Actors

Activities

Interest

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need you unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemCTICVE
1Python callproc.c PyCArg_repr buffer overflow8.58.5$0-$5k$0-$5kNot DefinedOfficial Fix0.03CVE-2021-3177
2PuTTY Title denial of service4.33.9$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.04CVE-2021-33500
3Microsoft Windows Privilege Escalation8.87.7$100k and more$25k-$100kUnprovenOfficial Fix0.00CVE-2021-28455
4Microsoft Windows Wireless Networking unknown vulnerability5.44.7$25k-$100k$5k-$25kUnprovenOfficial Fix0.07CVE-2020-24588
5Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash information disclosure5.35.2$5k-$25k$0-$5kHighWorkaround0.05CVE-2007-1192
6Git Pull git.cmd access control6.35.7$0-$5k$0-$5kProof-of-ConceptNot Defined0.07CVE-2021-46101
7Autodesk Revit/Navisworks/Autodesk/AutoCAD PDFTron buffer overflow6.36.0$0-$5k$0-$5kNot DefinedOfficial Fix0.04CVE-2021-40160
8DZCP deV!L`z Clanportal config.php code injection7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.69CVE-2010-0966
9Microsoft .NET/Visual Studio denial of service7.56.8$5k-$25k$0-$5kUnprovenOfficial Fix0.07CVE-2022-24464
10HAProxy HTTP Header resource consumption5.35.1$0-$5k$0-$5kNot DefinedOfficial Fix0.06CVE-2022-0711
11VMware ESXi/Fusion/Workstation CD-ROM Device Emulation heap-based overflow7.16.8$5k-$25k$5k-$25kNot DefinedOfficial Fix0.03CVE-2021-22045
12TeamViewer TVS File Parser out-of-bounds read7.06.9$0-$5k$0-$5kNot DefinedOfficial Fix0.00CVE-2021-34858
13Autodesk Revit/Navisworks/Autodesk/AutoCAD PDFTron memory corruption6.36.0$0-$5k$0-$5kNot DefinedOfficial Fix0.03CVE-2021-40161
14polkit pkexec access control8.88.1$0-$5k$0-$5kProof-of-ConceptWorkaround0.28CVE-2021-4034
15Vmware Tools/Remote Console/App Volumes openssl.cnf access control6.36.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.03CVE-2021-21999
16Grafana AngularJS Rendering cross site scripting5.85.7$0-$5k$0-$5kNot DefinedOfficial Fix0.05CVE-2021-41174
17Adobe Creative Cloud Desktop Application temp file3.63.5$0-$5k$0-$5kNot DefinedOfficial Fix0.04CVE-2021-28633
18SAP Commerce Cloud virtualjdbc extension code injection8.58.5$5k-$25k$5k-$25kNot DefinedNot Defined0.04CVE-2019-0344
19Oracle VM VirtualBox information disclosure4.44.2$0-$5k$0-$5kNot DefinedOfficial Fix0.04CVE-2021-2321
20Commvault CommCell pathname traversal6.56.2$0-$5k$0-$5kNot DefinedOfficial Fix0.00CVE-2020-25780

Campaigns (3)

These are the campaigns that can be associated with the actor:

IOC - Indicator of Compromise (70)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsTypeConfidence
11.116.59.211MuhstikverifiedHigh
23.10.224.87ec2-3-10-224-87.eu-west-2.compute.amazonaws.comMuhstikverifiedMedium
35.19.4.15relay.zmk.spb.ruMuhstikverifiedHigh
418.228.7.109ec2-18-228-7-109.sa-east-1.compute.amazonaws.comMuhstikLog4ShellverifiedMedium
534.66.229.152152.229.66.34.bc.googleusercontent.comMuhstikverifiedMedium
634.221.40.237ec2-34-221-40-237.us-west-2.compute.amazonaws.comMuhstikverifiedMedium
735.160.222.182ec2-35-160-222-182.us-west-2.compute.amazonaws.comMuhstikverifiedMedium
837.187.107.139ns326418.ip-37-187-107.euMuhstikverifiedHigh
937.187.253.12ns347308.ip-37-187-253.euMuhstikverifiedHigh
1045.130.229.168MuhstikLog4ShellverifiedHigh
1146.29.160.149MuhstikverifiedHigh
1246.218.149.85reverse.completel.frMuhstikverifiedHigh
1347.135.208.145047-135-208-145.res.spectrum.comMuhstikCVE-2018-7600 / CVE-2017-10271verifiedHigh
1451.254.219.134134.ip-51-254-219.euMuhstikCVE-2018-7600 / CVE-2017-10271verifiedHigh
15XX.XXX.XXX.XXXxxx.xx-xx-xxx-xxx.xxXxxxxxxverifiedHigh
16XX.X.XXX.XXXxxx-xx-x-xxx-xxx.xx-xxxx-x.xxxxxxx.xxxxxxxxx.xxxXxxxxxxverifiedMedium
17XX.XX.XX.XXXxxx-xx-xx-xx-xxx.xx-xxxxxxxxx-x.xxxxxxx.xxxxxxxxx.xxxXxxxxxxverifiedMedium
18XX.XX.XX.XXxxx-xx-xx-xx-xx.xx-xxxxxxxxx-x.xxxxxxx.xxxxxxxxx.xxxXxxxxxxverifiedMedium
19XX.XXX.XXX.XXxxx-xx-xxx-xxx-xx.xx-xxxx-x.xxxxxxx.xxxxxxxxx.xxxXxxxxxxverifiedMedium
20XX.XXX.XXX.XXxxxxxxxxxxxx.xxxxxxx.xxxXxxxxxxverifiedHigh
21XX.XXX.XX.XXXxxxxxxxx.xxx.xxxxxxxx.xxXxxxxxxverifiedHigh
22XX.XX.XXX.XXXXxxxxxxXxx-xxxx-xxxx / Xxx-xxxx-xxxxxverifiedHigh
23XX.XXX.XXX.XXXXxxxxxxverifiedHigh
24XX.XXX.XX.XXXxxx-xx-xxx-xx.xxxxxx.xxxxxxx.xxxx.xxxXxxxxxxverifiedHigh
25XX.XXX.XXX.XXxxxxxx-xx-xxx-xxx-xx.xxxxxx.xxxx.xxxxxxx.xxxXxxxxxxverifiedHigh
26XX.XXX.XXX.XXXxxxxxxxx.xxxxxxxxxxxx.xxxXxxxxxxverifiedHigh
27XX.XX.XX.XXXxxxxxxxx.xxxxxxxxx.xxXxxxxxxverifiedHigh
28XX.XXX.XXX.XXXxxx.xxx.xxXxxxxxxverifiedHigh
29XX.XXX.XXX.XXxx.xxxxxxxxxxxx.xxxXxxxxxxverifiedHigh
30XXX.XXX.XX.XXXXxxxxxxverifiedHigh
31XXX.XXX.XXX.XXXxxxxxxXxx-xxxx-xxxx / Xxx-xxxx-xxxxxverifiedHigh
32XXX.XXX.XX.XXXXxxxxxxverifiedHigh
33XXX.XX.XX.XXXxxxxxxverifiedHigh
34XXX.XXX.XXX.XXXXxxxxxxverifiedHigh
35XXX.XXX.XXX.XXXxxx.xxx.xxx.xxx.xx.xxxxxxxxxxxxxxxxx.xxxXxxxxxxverifiedMedium
36XXX.XXX.XXX.XXxx.xxx.xxx.xxx.xx.xxxxxxxxxxxxxxxxx.xxxXxxxxxxverifiedMedium
37XXX.XX.XX.XXXxxxxxxverifiedHigh
38XXX.XXX.XX.XXxxxxxxxxxxxxxxxxx.xxxXxxxxxxverifiedHigh
39XXX.XXX.XXX.XXXXxxxxxxverifiedHigh
40XXX.XX.XXX.XXxx.xx-xxx-xx-xxx.xxxXxxxxxxXxx-xxxx-xxxx / Xxx-xxxx-xxxxxverifiedHigh
41XXX.XX.XXX.XXXxxx-xxxxxxxx.xxx.xxx.xxXxxxxxxXxx-xxxx-xxxx / Xxx-xxxx-xxxxxverifiedHigh
42XXX.XX.XXX.XXxx.xx-xxx-xx-xxx.xxxXxxxxxxXxx-xxxx-xxxx / Xxx-xxxx-xxxxxverifiedHigh
43XXX.XX.XX.XXXXxxxxxxverifiedHigh
44XXX.XXX.XX.XXxx.xx-xxx-xxx-xx.xxxXxxxxxxXxx-xxxx-xxxx / Xxx-xxxx-xxxxxverifiedHigh
45XXX.XXX.XX.Xxxx-xxxxxxxx.xxx.xxx.xxxXxxxxxxXxx-xxxx-xxxx / Xxx-xxxx-xxxxxverifiedHigh
46XXX.XXX.XX.XXXxxx-xxxxxxxx.xxx.xxx.xxxXxxxxxxXxx-xxxx-xxxx / Xxx-xxxx-xxxxxverifiedHigh
47XXX.XXX.XXX.XXXxxx.xx-xxx-xxx-xxx.xxXxxxxxxXxx-xxxx-xxxx / Xxx-xxxx-xxxxxverifiedHigh
48XXX.XX.XX.XXxxx.xx.xx.xx.xxxxx.xxxXxxxxxxverifiedMedium
49XXX.XX.XXX.XXXxxx.xx.xxx.xxx.xxxxx.xxxXxxxxxxverifiedMedium
50XXX.XXX.XX.XXxxxxxx.xxxxxxxxxxxxxx.xxxXxxxxxxverifiedHigh
51XXX.XX.XX.XXXXxxxxxxverifiedHigh
52XXX.XX.XXX.XXXXxxxxxxverifiedHigh
53XXX.XX.XXX.XXXXxxxxxxXxxxxxxxxverifiedHigh
54XXX.XXX.XXX.XXXXxxxxxxverifiedHigh
55XXX.XXX.XX.XXXxxx-xxx-xx-xxx.xxx.xxxxxxxxxxxx.xxXxxxxxxverifiedHigh
56XXX.XX.X.XXXXxxxxxxverifiedHigh
57XXX.XXX.XX.XXXXxxxxxxXxx-xxxx-xxxxverifiedHigh
58XXX.XX.XX.XXXXxxxxxxverifiedHigh
59XXX.XX.XXX.XXXxx.xx.xxxx.xxx.xxxxxx.xx-xxxxxxx.xxxXxxxxxxverifiedHigh
60XXX.XXX.XXX.XXXxxxxxxxxxx.xxxxxxxxxx.xx.xxXxxxxxxverifiedHigh
61XXX.X.XXX.XXXxxxxxxverifiedHigh
62XXX.XXX.XXX.XXXXxxxxxxverifiedHigh
63XXX.XXX.XXX.XXXxxx-xxx-xxx-xxx.xxxx.xxxx.xxxxx.xxxXxxxxxxverifiedHigh
64XXX.XXX.XX.XXXXxxxxxxverifiedHigh
65XXX.XXX.XXX.XXXXxxxxxxverifiedHigh
66XXX.XXX.XXX.XXXXxxxxxxXxx-xxxx-xxxx / Xxx-xxxx-xxxxxverifiedHigh
67XXX.XX.XX.XXXxxx.xx-xxx-xx-xx.xxxXxxxxxxXxx-xxxx-xxxx / Xxx-xxxx-xxxxxverifiedHigh
68XXX.XX.XX.XXXXxxxxxxverifiedHigh
69XXX.XXX.XXX.XXxxxx.xxxxx.xx.xxXxxxxxxXxxxxxxxxverifiedHigh
70XXX.XXX.XXX.XXXxxx.xxx.xxx.xxx.xxxxxx.xxxx.xxXxxxxxxverifiedHigh

TTP - Tactics, Techniques, Procedures (9)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueVulnerabilitiesAccess VectorTypeConfidence
1T1059.007CWE-79, CWE-80Cross Site ScriptingpredictiveHigh
2T1068CWE-264, CWE-284Execution with Unnecessary PrivilegespredictiveHigh
3TXXXX.XXXCWE-XXXXxxxxxxx Xxxxxxxxxxx Xx Xxxxxxxxx Xxxxxxxxxxxxxx XxxxxxxxpredictiveHigh
4TXXXXCWE-XXX7xx Xxxxxxxx XxxxxxxxpredictiveHigh
5TXXXXCWE-XXXXxxxxxxxxx XxxxxxpredictiveHigh
6TXXXX.XXXCWE-XXXXxxxxxxx XxxxxxxxxxxxxpredictiveHigh
7TXXXX.XXXCWE-XXXXxxxxxxxxxxxpredictiveHigh
8TXXXX.XXXCWE-XXXXxxxxxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveHigh
9TXXXXCWE-XXX, CWE-XXXXxxxxxxxxxxxx XxxxxxpredictiveHigh

IOA - Indicator of Attack (191)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File.htaccesspredictiveMedium
2File/adminlogin.asppredictiveHigh
3File/data/local.proppredictiveHigh
4File/deviceIPpredictiveMedium
5File/etc/shadowpredictiveMedium
6File/firewall/policy/predictiveHigh
7File/getcfg.phppredictiveMedium
8File/graphStatus/displayServiceStatus.phppredictiveHigh
9File/iisadmpwdpredictiveMedium
10File/index.php/admin/tag/add.htmlpredictiveHigh
11File/Items/*/RemoteImages/DownloadpredictiveHigh
12File/proc/pid/syscallpredictiveHigh
13File/rom-0predictiveLow
14File/servlet.gupldpredictiveHigh
15File/sql/sql_type.ccpredictiveHigh
16File/statuspredictiveLow
17File/tools/developerConsoleOperations.jsppredictiveHigh
18File/uncpath/predictiveMedium
19File/usr/bin/pkexecpredictiveHigh
20File/WEB-INF/web.xmlpredictiveHigh
21FileActivityManagerService.javapredictiveHigh
22Fileadclick.phppredictiveMedium
23Fileadm1n/admin_config.phppredictiveHigh
24Filexxxxx-xxxx.xxxpredictiveHigh
25Filexxxxx/xxxxx.xxxpredictiveHigh
26Filexxx.xpredictiveLow
27Filexxxx/xxxxxxxxx.xxxpredictiveHigh
28Filexxx/xxxxxxxx/xxxx-xxxx.xxxpredictiveHigh
29Filexxxxxxxxxx.xx/xxxx-xxxxx.xxxx.xxxxpredictiveHigh
30Filexxxx-xxxx.xpredictiveMedium
31Filexxxx.xxxpredictiveMedium
32Filexxxx/xxxxxxxxxxxx.xxxpredictiveHigh
33Filexxxxxxxxxxxxxxxxxxxxxx.xxxxpredictiveHigh
34Filexxxxxx.xpredictiveMedium
35Filexxx_xxxx_xxxxx.xpredictiveHigh
36Filexxxxxxxx.xxxpredictiveMedium
37Filexxx.xpredictiveLow
38Filexxx.xxxpredictiveLow
39Filexxxxx/xxxxxxxx-xxxxxxxxx/xxxxxxxxxxxxxxx.xxxxx.xxxpredictiveHigh
40Filexxx/xxxxxxxxx/xxxxxx/xxxxxxxxxxxxx.xxxxpredictiveHigh
41Filexxxxxxx.xpredictiveMedium
42Filexxxxxxxxx.xpredictiveMedium
43Filexxxxxx/xxxx/xxx_xxxx.xpredictiveHigh
44Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveHigh
45Filexxxxxxx.xxxpredictiveMedium
46Filexxxxxxxxx.xxxpredictiveHigh
47Filexxxxx.xxxpredictiveMedium
48Filexxxx_xxx.xxxpredictiveMedium
49Filexxxxxxxx-xxxxxxxx.xxxpredictiveHigh
50Filexxxxxxx/xxxxx/xxx/xxxxxx/xxxxxx-xxxxx.xpredictiveHigh
51Filexxxxxxx/xxx/xx/xx_xxxxx.xpredictiveHigh
52Filexxxx/xxxxxxxxxx/xxxxxx-xxxx_xxx.xpredictiveHigh
53Filexxxxxxxxx/xx/xxxxxxxxxxxx.xxxpredictiveHigh
54Filexxxxxx_xxxx_xxxxx.xpredictiveHigh
55Filexxx_xxxxxx.xxxpredictiveHigh
56Filexxx.xxxpredictiveLow
57Filexxxx.xxxpredictiveMedium
58Filexxxxxx.xxxpredictiveMedium
59Filexxxxxxxx/xxxx_xxxxpredictiveHigh
60Filexxxxx_xxxxxxxx.xxxpredictiveHigh
61Filexxxx_xxxx.xpredictiveMedium
62Filexxxx.xpredictiveLow
63Filexxx/xxxxxx.xxxpredictiveHigh
64Filexxx/xxxxxxxxxxx/xxxxxxx.xxxpredictiveHigh
65Filexxxxxxx/xxxxxxxxx/xxxxxxxxx/xxxxxxxxx/xxx_xxxxxxxxxxxxx.xxxpredictiveHigh
66Filexxxxxxx/xxxxx/xxxxxx/xxxxxxxxxxxxxx/xxxxxxxxxxxxx.xxxpredictiveHigh
67Filexxxxx.xxx/xxxxxxxx.xxxpredictiveHigh
68Filexxxxx.xxxpredictiveMedium
69Filexxxxx.xxx/xxxxxxxxxxxxx/xxxpredictiveHigh
70Filexxxxx.xxx?xxx=xxxxxx&xxxx=xxxxxx&xx=xxxxxpredictiveHigh
71Filexxxxx_xxxxxxx.xpredictiveHigh
72Filexxxxxx.xpredictiveMedium
73Filexxxxxx/xxxxx.xpredictiveHigh
74FilexxxxxxxpredictiveLow
75Filexxxxx.xxxpredictiveMedium
76Filexxxxx_xx.xxxxpredictiveHigh
77Filexxxx_xxxxx.xpredictiveMedium
78Filexxxxxxx.xxxpredictiveMedium
79Filexxx_xxxxx.xpredictiveMedium
80Filexxx_xxxxx_xxxx.xpredictiveHigh
81Filexxxxx.xxxpredictiveMedium
82Filexxx/xxxx/xxx_xxx.xpredictiveHigh
83Filexxx/xxxxxx/xx_xxxxxx.xpredictiveHigh
84Filexxx.xxxpredictiveLow
85Filexxxxxxx.xxxpredictiveMedium
86Filexxx/xxxxxx/xxxxxxxx/xxxxx/xxxxxxxxx.xxxxpredictiveHigh
87Filexxxxxxxx.xxxpredictiveMedium
88Filexxxxxxx.xxxpredictiveMedium
89Filexxxxxxx/xxxxxx.xxxxxxx/xxxxxxxxxxxxxx.xxxpredictiveHigh
90Filexxxxxxx/xxxxxxxx/xxxxxx-xxxxxx-xx-xx.xpredictiveHigh
91Filexxxxxx.xxx?xxx=xxxxxxxx&xx=xxxxxxxpredictiveHigh
92Filexxxxxxxxxx.xxxpredictiveHigh
93Filexxxxx/xxx/xxxxxx_xxxxx/!xxxxxxxx?xxxxxxxxxx=xxxx-xxxxx-xx-xxxx.xxxxxxxx_xxxxxxxxxxxxxpredictiveHigh
94Filexxxxx.xxxpredictiveMedium
95Filexxxxx.xxxpredictiveMedium
96Filexxxxx-xxxx/xxxxx-xxxxx-xxxx.xxxpredictiveHigh
97Filexxxxxxxx.xxxpredictiveMedium
98Filexxxxxxx.xxpredictiveMedium
99Filexxxxxxxx.xpredictiveMedium
100Filexxxxxx.xxpredictiveMedium
101Filexxxxxxxx/xxxxxxxxxxxx/xxxxxxx/xxxxx.xxxxxxxxxxx.xxxpredictiveHigh
102Filexxxxx.xxxpredictiveMedium
103Filexxxxxxx.xxpredictiveMedium
104Filexxxxxxx.xxxpredictiveMedium
105Filexxxxxxxxxxxxxx.xxpredictiveHigh
106Filexxx_xxx.xpredictiveMedium
107Filexxx-xxxxxxx.xpredictiveHigh
108Filexxxxxxxxx.xxxpredictiveHigh
109Filexxxxxxxxx.xxxpredictiveHigh
110Filexxxxxx.xxxpredictiveMedium
111Filexxxxxxxx.xxxpredictiveMedium
112Filexxxxx/xxxxxxxx.xpredictiveHigh
113Filexxxxxx.xxxpredictiveMedium
114Filexx-xxxxx/xxxxx-xxx.xxx?xxxxxxx-xxxxxxxxpredictiveHigh
115Filexx-xxxxx/xxxx-xxx.xxxpredictiveHigh
116Filexx-xxxxxxx/xxxxxxx/xxxxxxxx-xxxxxxxxxx/xx-xxx-xxxpredictiveHigh
117File_xxxxxx/xxxxxxxx.xpredictiveHigh
118Libraryxxx/xxx.xxxpredictiveMedium
119LibraryxxxxxxxxxpredictiveMedium
120Libraryxxxxxxxxx/xxxxxxxx.xxx.xxxpredictiveHigh
121Libraryxxxxxx.xxxpredictiveMedium
122Libraryxxx/xxx/xxxx/predictiveHigh
123ArgumentxxxxxxxpredictiveLow
124ArgumentxxxxpredictiveLow
125ArgumentxxxxxxxxpredictiveMedium
126ArgumentxxxpredictiveLow
127ArgumentxxxxxxpredictiveLow
128ArgumentxxxxxxpredictiveLow
129Argumentx_xxxxxx.xxxx_xxxxxpredictiveHigh
130Argumentx_xxpredictiveLow
131Argumentxxxx_xxxxxx=xxxxpredictiveHigh
132ArgumentxxxxxxxxxxxxxxxpredictiveHigh
133ArgumentxxxxpredictiveLow
134Argumentxxxxxxxxxxxxxx($xxx)predictiveHigh
135ArgumentxxxxxpredictiveLow
136Argumentxxxx_xxxx/xxxxxxx_xxxxxxxxxxxpredictiveHigh
137ArgumentxxpredictiveLow
138Argumentxx/xxxxxxpredictiveMedium
139ArgumentxxxxxxxxpredictiveMedium
140ArgumentxxxxxpredictiveLow
141ArgumentxxxxxpredictiveLow
142ArgumentxxpredictiveLow
143ArgumentxxxpredictiveLow
144ArgumentxxxxxxpredictiveLow
145Argumentxxxxx_xxxxpredictiveMedium
146ArgumentxxxxxxpredictiveLow
147ArgumentxxxxxxpredictiveLow
148ArgumentxxpredictiveLow
149ArgumentxxxxxxxxpredictiveMedium
150ArgumentxxxxxxxxpredictiveMedium
151Argumentxxx_xxxxpredictiveMedium
152ArgumentxxxxxxxxxxpredictiveMedium
153Argumentxxxxx-xxxxxxxxxxxxxpredictiveHigh
154ArgumentxxxxxpredictiveLow
155ArgumentxxxxxxxpredictiveLow
156ArgumentxxxxxxxxpredictiveMedium
157ArgumentxxxxxxxxxxxxxxxxxxpredictiveHigh
158ArgumentxxxpredictiveLow
159Argumentxxxxxxxxxxx_xxxxpredictiveHigh
160Argumentxxx_xxxxxx_x_xxx_xxxxxpredictiveHigh
161ArgumentxxxxxxxxpredictiveMedium
162Argumentxxx-xxxxxxxpredictiveMedium
163Argumentxxxx xxxxpredictiveMedium
164ArgumentxxpredictiveLow
165Argumentxxxx_xxxxxxpredictiveMedium
166Argumentxxxxx/xxxpredictiveMedium
167Argumentxxxxx[xxxxxxx_xxxxx]predictiveHigh
168ArgumentxxxxpredictiveLow
169Argumentxxxx_xxpredictiveLow
170ArgumentxxxxxxxpredictiveLow
171ArgumentxxxpredictiveLow
172Argumentxxxx/xxxxxxxxpredictiveHigh
173ArgumentxxxxxxxxpredictiveMedium
174Argumentxxxxxxxx/xxxxxxxxpredictiveHigh
175ArgumentxxxxxxxxxxxxxxxxxpredictiveHigh
176Argumentx-xxxxxxxxx-xxxpredictiveHigh
177Argument_xxxxxxxpredictiveMedium
178Input Value"><xxxx xxxxxx=xxxxx(xxxxxxxx.xxxxxx)>predictiveHigh
179Input Value'xx''='predictiveLow
180Input Value../predictiveLow
181Input Value</xxxxxx >predictiveMedium
182Input Value????️x????predictiveMedium
183Input ValuexxxxxxxxpredictiveMedium
184Input Valuexxxx -x xxxxxxxx=xxxxxx.xxxxxxx xxxx://xxx.xxx.x.x/xxxxxx.xxxpredictiveHigh
185Input ValuexxxxpredictiveLow
186Network Portxxxx/xxxxpredictiveMedium
187Network Portxxx/xxxpredictiveLow
188Network Portxxx/xxxx (xxx)predictiveHigh
189Network Portxxx/xxxxpredictiveMedium
190Network Portxxx/xxxxxpredictiveMedium
191Network Portxxx xxxxxx xxxxpredictiveHigh

References (9)

The following list contains external sources which discuss the actor and the associated activities:

Want to stay up to date on a daily basis?

Enable the mail alert feature now!