Nemucod Analysis

IOB - Indicator of Behavior (1000)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en658
zh252
de24
ja14
es14

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

cn350
us152
es44
ru18
de12

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Google Android34
Linux Kernel34
Microsoft Windows16
Google Chrome14
MediaTek MT67798

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemCTIEPSSCVE
1Apple iOS/iPadOS Kernel out-of-bounds write7.87.6$25k-$100k$5k-$25kHighOfficial Fix0.030.01363CVE-2022-32894
2Apple Safari WebKit out-of-bounds write7.57.4$25k-$100k$5k-$25kHighOfficial Fix0.000.02806CVE-2022-32893
3Joomla CMS com_easyblog sql injection6.36.1$5k-$25k$5k-$25kNot DefinedNot Defined1.360.00000
4Google Android ActivityRecord.java setOptions Local Privilege Escalation6.56.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.030.01036CVE-2022-20419
5DZCP deV!L`z Clanportal config.php code injection7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.390.04187CVE-2010-0966
6Digital Guardian Agent access control4.74.6$0-$5k$0-$5kNot DefinedNot Defined0.030.00885CVE-2022-35412
7LogicBoard CMS away.php redirect6.36.1$0-$5k$0-$5kNot DefinedUnavailable1.240.00000
8XpressEngine XE3 Image File unrestricted upload7.57.5$0-$5k$0-$5kNot DefinedNot Defined0.000.01156CVE-2021-26642
9Apple Mac OS X Server Wiki Server cross site scripting4.34.3$5k-$25k$0-$5kNot DefinedNot Defined0.030.01319CVE-2009-2814
10FreeBSD Ping pr_pack stack-based overflow7.37.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.090.00000CVE-2022-23093
11QEMU VirtFS access control7.57.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.010.01034CVE-2017-7493
12Pligg cloud.php sql injection6.36.3$0-$5k$0-$5kNot DefinedNot Defined4.070.00000
13Google Android WindowManager permission5.35.1$25k-$100k$0-$5kNot DefinedOfficial Fix0.020.02763CVE-2021-39749
14Google Android AppRestrictionsFragment.java onReceive permission5.35.1$25k-$100k$5k-$25kNot DefinedOfficial Fix0.010.01036CVE-2021-39707
15libexpat xmlparse.c doContent use after free7.67.5$0-$5k$0-$5kNot DefinedOfficial Fix0.030.17166CVE-2022-40674
16Server NFS Export privileges management9.89.6$0-$5k$0-$5kHighWorkaround0.030.00885CVE-1999-0554
17Kubernetes kubelet pprof information disclosure7.77.4$0-$5k$0-$5kNot DefinedOfficial Fix0.030.62923CVE-2019-11248
18Google Android WindowManager permission6.56.4$25k-$100k$5k-$25kNot DefinedOfficial Fix0.060.01036CVE-2022-20246
19Scala JAR File deserialization5.55.3$0-$5k$0-$5kNot DefinedOfficial Fix0.030.01108CVE-2022-36944

IOC - Indicator of Compromise (37)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsTypeConfidence
124.96.108.157static-24-96-108-157.knology.netNemucodverifiedHigh
261.134.39.188NemucodverifiedHigh
362.173.145.104sadovaya-mebel.comNemucodverifiedHigh
476.73.17.194NemucodverifiedHigh
578.129.150.54NemucodverifiedHigh
682.192.94.125NemucodverifiedHigh
785.93.145.251mail.boanywhere.comNemucodverifiedHigh
886.59.21.38tor.noreply.orgNemucodverifiedHigh
9XX.XX.XXX.XXXxxxxxx.xxxxxxxx.xxxXxxxxxxverifiedHigh
10XX.XXX.XX.XXXxxxxxx.xxx.xx.xxx.xx.xxxxxxx.xxxx-xxxxxx.xxXxxxxxxverifiedHigh
11XXX.XX.XXX.XXXxxxxxxverifiedHigh
12XXX.XX.XXX.XXXxxxxxxverifiedHigh
13XXX.XX.XX.XXXXxxxxxxverifiedHigh
14XXX.XX.XX.XXXXxxxxxxverifiedHigh
15XXX.XXX.XXX.XXxxx-xxx-xxx-xx.xxxxxxx.xxxx.xxXxxxxxxverifiedHigh
16XXX.XX.X.XXxxxxxxxx.xxxxx.xxx.xxxXxxxxxxverifiedHigh
17XXX.XXX.XX.XXXxxxxxxx.xxxxxxxxxx.xxx-xxxxxxxx.xxXxxxxxxverifiedHigh
18XXX.XX.XXX.XXXxxxxxxverifiedHigh
19XXX.XX.XXX.XXXxxxxxx.xxxxxxxxxx.xxxXxxxxxxverifiedHigh
20XXX.XXX.XX.XXXxxxxxxx.xxxxxx.xxxXxxxxxxverifiedHigh
21XXX.XXX.XXX.XXxxxxx.xxxxxxxxx.xxxXxxxxxxverifiedHigh
22XXX.XXX.XXX.XXXxxxxx.xx-xxx-xxx-xxx.xxxXxxxxxxverifiedHigh
23XXX.XXX.XXX.XXXxxxx.xxx.xx.xxXxxxxxxverifiedHigh
24XXX.XX.XX.Xxxxxxxxxx.xxxxxxx.xxXxxxxxxverifiedHigh
25XXX.XX.XXX.Xxxxxxxxx.xxxx.xxXxxxxxxverifiedHigh
26XXX.XXX.XXX.XXxxx.xxx.xxx.xx.xxxxxx.xxxxxxxxx.xxxXxxxxxxverifiedHigh
27XXX.XXX.XX.XXXxxxxxxxx.xxxx.xxXxxxxxxverifiedHigh
28XXX.XXX.XXX.XXX.XxxxxxxverifiedHigh
29XXX.XXX.XXX.XXXxxxx.xxxxxxxxxxxx.xxxXxxxxxxverifiedHigh
30XXX.XXX.XX.XXxxxxxxxx.xxxxxxxxxxxxxxx.xxxXxxxxxxverifiedHigh
31XXX.XX.XXX.XXXxxxxxxxxxx.xxxxxxx.xxXxxxxxxverifiedHigh
32XXX.XXX.XXX.XXXxxxxxx.xxxxx.xxxXxxxxxxverifiedHigh
33XXX.XXX.XXX.XXXxxxxxxx.xxxxxxxxxxxxxx.xxXxxxxxxverifiedHigh
34XXX.XX.XXX.XXxxxx.xxxXxxxxxxverifiedHigh
35XXX.XXX.XXX.Xxxxx-xxxxxxx.xxXxxxxxxverifiedHigh
36XXX.XX.XXX.XXXXxxxxxxverifiedHigh
37XXX.XX.XXX.XXXXxxxxxxverifiedHigh

TTP - Tactics, Techniques, Procedures (26)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueVulnerabilitiesAccess VectorTypeConfidence
1T1006CWE-21, CWE-22, CWE-23, CWE-28Pathname TraversalpredictiveHigh
2T1040CWE-319Authentication Bypass by Capture-replaypredictiveHigh
3T1055CWE-74InjectionpredictiveHigh
4T1059CWE-88, CWE-94, CWE-1321Cross Site ScriptingpredictiveHigh
5T1059.007CWE-79, CWE-80Cross Site ScriptingpredictiveHigh
6T1068CWE-264, CWE-269, CWE-284Execution with Unnecessary PrivilegespredictiveHigh
7TXXXXCWE-XXX, CWE-XXXXxxx Xxx Xxxxxxxxx Xxxxxxxxxxx XxxxxxxxpredictiveHigh
8TXXXX.XXXCWE-XXX, CWE-XXXXxxxxxxx Xxxxxxxxxxx Xx Xxxxxxxxx Xxxxxxxxxxxxxx XxxxxxxxpredictiveHigh
9TXXXXCWE-XX, CWE-XXXxxxxxx XxxxxxxxxpredictiveHigh
10TXXXX.XXXCWE-XXXXxxx XxxxxxxxpredictiveHigh
11TXXXXCWE-XXX, CWE-XXX7xx Xxxxxxxx XxxxxxxxpredictiveHigh
12TXXXXCWE-XXX, CWE-XXXXxxxxxxxxx XxxxxxpredictiveHigh
13TXXXX.XXXCWE-XXXXXxxxxxxxxxx Xxxxxxx Xxxxxxxxxx XxxxxxxxxxpredictiveHigh
14TXXXXCWE-XXXXxxxxxxx Xx Xxxx Xxxxxxx Xxxxxxxxx XxxxxpredictiveHigh
15TXXXXCWE-XX, CWE-XXXxx XxxxxxxxxpredictiveHigh
16TXXXX.XXXCWE-XXXXxxxxxxx XxxxxxxxxxxxxpredictiveHigh
17TXXXXCWE-XXX, CWE-XXX, CWE-XXX, CWE-XXX, CWE-XXXXxx.xxx Xxxxxxxxxxxxxxxx: Xxxxxxxx Xx Xxxxxxxxxxxxx XxxxpredictiveHigh
18TXXXXCWE-XXXXxxxxxxx Xxxxxxxxx Xx X Xxxxxxxxxxx'x Xxxxx Xx XxxxxpredictiveHigh
19TXXXXCWE-XXXXxxxxxxxx Xxxxxx XxxxpredictiveHigh
20TXXXX.XXXCWE-XXXXxxxxxxx Xx Xxx Xxxxxxx Xx X Xxxxxxxx XxxxxxxxpredictiveHigh
21TXXXX.XXXCWE-XXXXxxxxxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveHigh
22TXXXXCWE-XXX, CWE-XXX, CWE-XXX, CWE-XXXXxxxxxxxxxxxxpredictiveHigh
23TXXXXCWE-XXX, CWE-XXX, CWE-XXX, CWE-XXXX2xx Xxxxxxxxxxxxxxxx: Xxxx Xxxxxxxxxxxx Xxxxxxx XxxxxxxxxxpredictiveHigh
24TXXXX.XXXCWE-XXXXxx Xx Xxxx XxxxpredictiveHigh
25TXXXX.XXXCWE-XXXXxxxxxxxxxxx XxxxxxpredictiveHigh
26TXXXXCWE-XXXXxxxxxxxxxx XxxxxxpredictiveHigh

IOA - Indicator of Attack (345)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/about.phppredictiveMedium
2File/admin/del.phppredictiveHigh
3File/admin/folderrollpicture/listpredictiveHigh
4File/Admin/login.phppredictiveHigh
5File/admin/submit-articlespredictiveHigh
6File/ad_js.phppredictiveMedium
7File/attachmentspredictiveMedium
8File/bin/httpdpredictiveMedium
9File/blog/editpredictiveMedium
10File/bsms_ci/index.php/bookpredictiveHigh
11File/cgi-bin/luci/api/wirelesspredictiveHigh
12File/context/%2e/WEB-INF/web.xmlpredictiveHigh
13File/dashboard/reports/logs/viewpredictiveHigh
14File/debian/patches/load_ppp_generic_if_neededpredictiveHigh
15File/debug/pprofpredictiveMedium
16File/etc/hostspredictiveMedium
17File/forum/away.phppredictiveHigh
18File/goform/setmacpredictiveHigh
19File/goform/SystemCommandpredictiveHigh
20File/goform/WifiBasicSetpredictiveHigh
21File/goform/wizard_endpredictiveHigh
22File/hospital/hms/admin/patient-search.phppredictiveHigh
23File/hrm/index.php?msgpredictiveHigh
24File/hrm/state.phppredictiveHigh
25File/index.phppredictiveMedium
26File/index/user/user_edit.htmlpredictiveHigh
27File/libpredictiveLow
28File/librarian/lab.phppredictiveHigh
29File/manage-apartment.phppredictiveHigh
30File/medicines/profile.phppredictiveHigh
31File/modules/caddyhttp/rewrite/rewrite.gopredictiveHigh
32File/modules/projects/vw_files.phppredictiveHigh
33File/net-banking/send_funds.phppredictiveHigh
34File/odlms/?page=appointments/view_appointmentpredictiveHigh
35File/pages/apply_vacancy.phppredictiveHigh
36File/proc/<PID>/mempredictiveHigh
37File/proxypredictiveLow
38File/purchase_order/admin/?page=system_infopredictiveHigh
39File/spip.phppredictiveMedium
40File/xxx/xxxx/xxxxxxxxxxxxxpredictiveHigh
41File/xxxpredictiveLow
42File/xxxxxxx/predictiveMedium
43File/xxxxxxpredictiveLow
44File/xx/xxxxxxx/xxxxxpredictiveHigh
45File/xx/xxx-xxxxxxpredictiveHigh
46File/xxxxxx/xxxxx/xxx_xxxxxxx.xxxpredictiveHigh
47File/xxxx/xxx/xxx.xxxxpredictiveHigh
48File/xxxxxx/xxxxxxxxxxxxxxxxxxx/xxxxxxxxxxxxxxxxxxxxxxpredictiveHigh
49File/xxxxxxxxxxxx/xxxxxxxxxxx/predictiveHigh
50Filexxxxxxx/xxxxxxxxxxxx.xxxpredictiveHigh
51Filexxxxxxxxxxxxxx.xxxxpredictiveHigh
52Filexxxxx.xxxpredictiveMedium
53Filexxxxx.xxxxpredictiveMedium
54Filexxxxx/xx_xxxx.xxxpredictiveHigh
55Filexxxxx/xxxx_xxxxxxxx.xxxpredictiveHigh
56Filexxxxx/xxxxxx_xxxx.xxxpredictiveHigh
57Filexxxxx/xxxxxx/xxxxxxxx/xxxxx.xxxxxxxx.xxxpredictiveHigh
58Filexxxxx/xxxxxxxxxxxx_xxxx.xxxpredictiveHigh
59Filexxxxxxxxxxxxx/xxxxxxxxxx/xxx_xxxxx/xxxxxxx/xxxxx.xxxpredictiveHigh
60Filexxxxxxxx/xx/xxxxxxxxxxxxx.xxxpredictiveHigh
61Filexxx/xxpredictiveLow
62Filexxxxxxxxxxxxxxx.xxxpredictiveHigh
63Filexxxxxxxxxxxxxxxxxxxxxxx.xxxxpredictiveHigh
64Filexxxxxxxxxxxxxxxxxxxxxxxxxxxxx.xxxxpredictiveHigh
65Filexxxxxxxxxxxx/xxxxxxx.xxxpredictiveHigh
66Filexxxx.xxx.xxxpredictiveMedium
67Filexxxxxxxxxx.xxxxpredictiveHigh
68Filexxxxxx.xxxpredictiveMedium
69Filexxxx.xxxpredictiveMedium
70Filexxxxxxx.xxxpredictiveMedium
71Filex:\xxxxx\xxxxxpredictiveHigh
72Filexx_xxx.xxpredictiveMedium
73Filexxx-xxx/xxx_xxx_xxxxxx.xxxpredictiveHigh
74Filexxxxxxxxxxx_xxxxpredictiveHigh
75Filexxxxx.xxxxxxxxx.xxxpredictiveHigh
76Filexxxxx.xxxpredictiveMedium
77Filexxxxxxx_xxxxx.xxxpredictiveHigh
78Filexxxxxxxx/xxxxxxxx/xxxxxxxxxx_xxxxx.xxxpredictiveHigh
79Filexxxxxxxxxxx/xxxxxxxxxxxxxxxxx.xxxpredictiveHigh
80Filexxxxx.xpredictiveLow
81Filexxxxxxxx.xpredictiveMedium
82Filexxxxxx.xxxxpredictiveMedium
83Filexxxxxxxxxxxx.xxxpredictiveHigh
84Filexxxxxxxxxxxxxxxxxxxxxxxxxx.xxxxpredictiveHigh
85Filexxx_xxxx.xxxpredictiveMedium
86Filexxx_xxxx/xxxxxx_xxxx/xxxxxxxx/xxx.xxxpredictiveHigh
87Filexxxxxxx/xxx/xxxxxxxx.xpredictiveHigh
88Filexxxxxxx/xxxxxx/xxx/xxx-xxx.xpredictiveHigh
89Filexxxxxxx/xxxxx/xxx-xxxx/xxx_xxx.xpredictiveHigh
90Filexxxxxxx/xxxxx/xxxxxxxx/xxxxx/xxxxx-xxx.xpredictiveHigh
91Filexxxxxxx/xxx/xxxxxxxx/xxxxxxxx/xxxxx/xxxxx_xxx.xpredictiveHigh
92Filexxxxxxx/xxx/xxxxxxxx/xxxxx.xpredictiveHigh
93Filexxxxxxx/xxx/xxxxxxxxx/xxx.xpredictiveHigh
94Filexxxxxxx/xxx/xxx/xxx.xpredictiveHigh
95Filexxxxxxx/xxxxx/xxxxxx_xxxxx_xxx.xpredictiveHigh
96Filexxxxxxx/xxx/xxxx/xxxxx.xpredictiveHigh
97Filexxxxxxx/xxx/xxxxxx/xxx/xxx-xxxxxx.xpredictiveHigh
98Filexxxxxxxx.xxxpredictiveMedium
99Filexxxxx.xxxpredictiveMedium
100Filexxxxxxxxxxxxxxxx.xxxpredictiveHigh
101Filexxxx.xxxpredictiveMedium
102Filexxxxxx-xxxxx-xxx.xxxpredictiveHigh
103Filexxx/xxxx/xxxx_xxxxxx.xpredictiveHigh
104Filexxxxxxxx-xxxxxx.xxpredictiveHigh
105Filexx/xxxxx/xxxxxx-xxxx.xpredictiveHigh
106Filexx/xx_xxxxx.xpredictiveHigh
107Filexxxxxxx/xxxxx.xxxpredictiveHigh
108Filexxxxxxxxxx/xxx/xxxx/xxxx/xxx/xxx/xxxxxx/xxxxxx/xxxxxxx/xxxxxxxxx/xxxxxxxxxxxxxxx/xxxxxxxxxxxxxxxxxxxxxxxx.xxxxpredictiveHigh
109Filexxxxxxx.xxxxxx.xxxpredictiveHigh
110Filexxxxxxx/xxxxxx.xxxpredictiveHigh
111Filexxx-xxxxx.xpredictiveMedium
112Filexx/xxxx/xx.xpredictiveMedium
113Filexxxx.xpredictiveLow
114Filexxxxxxxxxx/xxxxxxxxxx/xxxxxxxx/xxxxxxxxxxxxxxxxxxx.xxxpredictiveHigh
115Filexxx/xxxxxx.xxxpredictiveHigh
116Filexxx/xxxxxxxxxxx/xxxxxxx.xxxpredictiveHigh
117Filexxx/xxxxx.xxxpredictiveHigh
118Filexxxxxxx/xxx-xxxxxxx/xxx.xpredictiveHigh
119Filexxxxxxx/xxxxxxxxx.xxx.xxxpredictiveHigh
120Filexxxxx.xxxxpredictiveMedium
121Filexxxxx.xxxpredictiveMedium
122Filexxxxxxx.xpredictiveMedium
123Filexxxxxxxx/xxxxxxxx_xxxxxxx_xxxxxx/xxxxx.xxxpredictiveHigh
124Filexx.xxxpredictiveLow
125Filexx_xxxxx.xpredictiveMedium
126Filexxxx.xxxxpredictiveMedium
127Filexxxxx/xxxxxxxxxxxx/xxxxxpredictiveHigh
128Filexxxx.xpredictiveLow
129Filexxxxxxxx.xxxpredictiveMedium
130Filexxx/xxxxxx-xxxxxx.xpredictiveHigh
131Filexxxxxx.xxxpredictiveMedium
132Filexxxxx/xxx_xxx.xpredictiveHigh
133Filexxx_xxxxxxx/xxxxxx.xpredictiveHigh
134Filexxxxxxxxxxx/xxxxxxxxxxx.xpredictiveHigh
135Filexxxxxxxxx/xxxxxxx/xxxxxx/xxxxxxxxxx.xxxpredictiveHigh
136Filexxxxxxx.xxpredictiveMedium
137Filexxxxxxx/xxx_xxxxxxxx.xpredictiveHigh
138Filexxxxxxx.xxxpredictiveMedium
139Filexxxxxxxxx.xxxpredictiveHigh
140Filexxxxxxxxxxxxxxx.xxxpredictiveHigh
141Filexxxxx-xxxxxx-xxxxxx.xxxxpredictiveHigh
142Filexxxxx.xxxpredictiveMedium
143Filexxxxx.xxxpredictiveMedium
144Filexxxxxxxxxx-xxxx-xxxx.xxxpredictiveHigh
145Filexxxxx_xxxxx/xx_xxxxxxx.xpredictiveHigh
146Filexxxxxxxx/xxxxxxxxxxx.xxpredictiveHigh
147Filexx/xxxx.xpredictiveMedium
148Filexxx_xxxxx.xpredictiveMedium
149Filexxx/xxxxxxxxx/xxxxx_xxxx.xpredictiveHigh
150Filexxx/xxxx/xxxx.xpredictiveHigh
151Filexxx/xxxx/xxxxxx_xxx_xxxx.xpredictiveHigh
152Filexxx/xxxx/xxxx_xxxx.xpredictiveHigh
153Filexxx/xxx.xpredictiveMedium
154Filexxx/xxxxxxxxx/xx_xxxxxx_xxx.xpredictiveHigh
155Filexxx/xxxxxpredictiveMedium
156Filexxx/xxx_xxxxx/xx_xxxxx.xpredictiveHigh
157Filexxxxxxxxxxxxxx.xxxxpredictiveHigh
158Filexxx_xxxxxxxx.xpredictiveHigh
159Filexxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx.xxxxpredictiveHigh
160Filexxxxxxxx.xxxpredictiveMedium
161Filexxxxxxx-xxxx/xxx/xxxx/xxxx/xxx/xxxxxxx/xxx/xxxxxxxxxxxx.xxxxpredictiveHigh
162Filexxxxxxxxxxxxxxxxxxxxx.xxpredictiveHigh
163Filexxx.xpredictiveLow
164Filexxxxxxx-xxxx.xxxxpredictiveHigh
165Filexxxx.xxxxxxxxx.xxxpredictiveHigh
166Filexxxxxx.xxxxpredictiveMedium
167Filexxxxxx.xxpredictiveMedium
168Filexxxxxxx.xxxpredictiveMedium
169Filexxxxxxx/xxx/xxxxxxx/xxxxxx/xxxx-xxxxxxxxxx/<xxxxxx>/xx.xxxpredictiveHigh
170Filexxxxxxxx.xpredictiveMedium
171Filexxxx.xxxpredictiveMedium
172Filexxxxxx.xxxpredictiveMedium
173Filexxxxxx.xxxpredictiveMedium
174Filexxxxx-xxxxx.xpredictiveHigh
175Filexxxxx-xxxxx.xpredictiveHigh
176Filexxxxxxxx.xxxpredictiveMedium
177Filexxx.xxxxx.xxxpredictiveHigh
178Filexxxx-xxxxxx-xxxxxx.xpredictiveHigh
179Filexxx/xxxxxxxx-xxxxx.xpredictiveHigh
180Filexxxxxxx.xpredictiveMedium
181Filexxxxxxxxxxxxxx.xxxpredictiveHigh
182Filexxxxxxxx.xxxpredictiveMedium
183Filexxxxxxxxxx.xxxpredictiveHigh
184Filexxxxxxxx.xxxpredictiveMedium
185Filexxxxxx.xxpredictiveMedium
186Filexxxxxx/xxxxxxx.xpredictiveHigh
187Filexxxxxxx/xxxxxxxxxxxxxxxxxxxpredictiveHigh
188Filexxxxx.xxxpredictiveMedium
189Filexxxx.xpredictiveLow
190Filexxxxxx/xxx-xxxx.xpredictiveHigh
191Filexxxxx/xxxxxx.xpredictiveHigh
192Filexxxx_xxxxxxx.xxxxx.xxxpredictiveHigh
193Filexxx/xxxxxxx/xxxxxxxxxxxxxx.xxxpredictiveHigh
194Filexxx/xxxx/xxxxxxx.xxxpredictiveHigh
195Filexxx/xxxxxx.xpredictiveMedium
196Filexxx/xxxxxxx.xxxpredictiveHigh
197Filexxxxxxxx.xxxpredictiveMedium
198Filexxxxxx/xxxx/xxxxxxxxxxxxxxxxxxxxx.xxxpredictiveHigh
199Filexxxxxx_xxx.xxpredictiveHigh
200Filexxxx.xxxxpredictiveMedium
201Filexxxxxxxxx/xxxxx.xxx.xxxpredictiveHigh
202Filexxxx-xxxxx.xxxpredictiveHigh
203Filexxxxxxx.xxxpredictiveMedium
204FilexxxxxxpredictiveLow
205Filexxxxxx/xxxxxx/xxxxxxxxxx/xxxxxxx/xxxx.xxxpredictiveHigh
206Filexxxxxxxxx/xx_xxx.xxx?xxxxx=&xx_xxxxx=xxxx&xx_xxxx=xxxx&xx_xxxxxxx=xxxx&xx_xxxxx=&xx_xxx=xxxxxxxxxx&xxxxx_xxxx=&xxpredictiveHigh
207Filexxxx-xxxxx.xpredictiveMedium
208Filexxxx_xxxx.xxxxpredictiveHigh
209Filexxx.xxxxpredictiveMedium
210Filexxxxx.xxxpredictiveMedium
211Filexxxxxx.xpredictiveMedium
212Filexx-xxxxx-xxxxxx.xxxpredictiveHigh
213Filexx-xxxxxxxx/xxxxx-xx-xxxxx.xxxpredictiveHigh
214Filexx/xx/xxxxxpredictiveMedium
215Filexxxxxxxx.xpredictiveMedium
216File\xxxxx\xxxx_xxxxxxxx.xxxpredictiveHigh
217File_xxxxx.xxxpredictiveMedium
218File~/.xxxxxpredictiveMedium
219File~/xxxxxxxx/xxxxx-xx-xxxxxxxxxx-xx.xxxpredictiveHigh
220File~/xxxxxx.xxxpredictiveMedium
221Library/xxx/xxx/xxxx/xxxx.xxxpredictiveHigh
222Library/xxx/xxxx/xxxxx.x/xx-xxxx-xxxxxxx.xxxxxpredictiveHigh
223Library/xxxxxxxxx/xxxxxxxxxxxxxx.xxxpredictiveHigh
224Libraryx:/xxxxxxx xxxxx/xxxxx/xxxxxxx.xxxpredictiveHigh
225Libraryxxxxxxx/xxx/xxxxxx.xxx.xxxpredictiveHigh
226Libraryxxxxxxxxx.xxxpredictiveHigh
227Libraryxxxxxx.xxxpredictiveMedium
228Libraryxxxxxxx.xxxpredictiveMedium
229Libraryxxxxxxxxx/xxx-xxxxxx/xxxxxxxx.xxxpredictiveHigh
230Libraryxxxxxx.xxxpredictiveMedium
231Libraryxxxxxx.xxxpredictiveMedium
232Libraryxxxxxx-xx/xxx/xxx-xxxxxx-xxxxx-xx.xxxpredictiveHigh
233Libraryxxxxxxxxxxx.xxxpredictiveHigh
234Libraryxxxxx/xxxxxx/xxx/xxxxx/xxxxx.xxxxx_xx.xxxpredictiveHigh
235Libraryxxxxxx.xxxpredictiveMedium
236Argument--xxpredictiveLow
237Argumentxxxxxx:/xxxxxxxx:/xxxxxxxxxxxxxx:predictiveHigh
238ArgumentxxxxpredictiveLow
239Argumentxxxxxxxxx xxxxxxpredictiveHigh
240Argumentxxx_xxxpredictiveLow
241ArgumentxxxxxxxxpredictiveMedium
242ArgumentxxxxxpredictiveLow
243Argumentxxxx_xxxxpredictiveMedium
244Argumentxxxxx_xxxxpredictiveMedium
245Argumentxxxxxxx_xxxxxxx_xxxxpredictiveHigh
246ArgumentxxxpredictiveLow
247ArgumentxxxxxxxxxxpredictiveMedium
248Argumentxxx_xxpredictiveLow
249Argumentxx_xxxxxx_xxpredictiveMedium
250Argumentxxxxxxx xxxx/xxxxxxxxxxxpredictiveHigh
251ArgumentxxxxxxxxxxxxxpredictiveHigh
252Argumentxxxx_xxpredictiveLow
253Argumentxxxxx/xxxxxxxpredictiveHigh
254Argumentxxxx_xxxpredictiveMedium
255ArgumentxxxxxpredictiveLow
256ArgumentxxxpredictiveLow
257Argumentxxxxxxx xxxxxxxpredictiveHigh
258Argumentxxxxxxxx[xxxx_xxx]predictiveHigh
259Argumentxxxxxxx_xxxxxpredictiveHigh
260Argumentxxxxxxxx xxpredictiveMedium
261ArgumentxxxxxxxxxxxxxxpredictiveHigh
262ArgumentxxxxxxxpredictiveLow
263Argumentxx_xxxxxxpredictiveMedium
264ArgumentxxxxpredictiveLow
265ArgumentxxxxxxxxpredictiveMedium
266ArgumentxxxxxxxxpredictiveMedium
267Argumentx_xxxx_xxxpredictiveMedium
268Argumentxxxxxxx[xx_xxx_xxxx]predictiveHigh
269ArgumentxxxxpredictiveLow
270ArgumentxxpredictiveLow
271ArgumentxxpredictiveLow
272ArgumentxxpredictiveLow
273ArgumentxxxxxxxxpredictiveMedium
274Argumentxxxxx_xxx/xxxxx_xxxpredictiveHigh
275ArgumentxxpredictiveLow
276ArgumentxxxxxxxpredictiveLow
277Argumentxxxxx.xxxxxx.xxxxx-xxxpredictiveHigh
278ArgumentxxxxpredictiveLow
279Argumentxxxx_xxxxpredictiveMedium
280Argumentxxxxx/xxxxx_xxxxxxxx/xxxxpredictiveHigh
281Argumentxxx_xxpredictiveLow
282ArgumentxxxxxxxxpredictiveMedium
283ArgumentxxxpredictiveLow
284Argumentxxxxxxxx_xxxxxxxpredictiveHigh
285Argumentx_xxpredictiveLow
286Argumentx_xx/xxxxpredictiveMedium
287ArgumentxxxxxxxxxxxxxxxpredictiveHigh
288ArgumentxxpredictiveLow
289ArgumentxxxxpredictiveLow
290ArgumentxxxxxxxpredictiveLow
291ArgumentxxxxxxxxxxxxxxpredictiveHigh
292ArgumentxxxxpredictiveLow
293ArgumentxxxxxxxxpredictiveMedium
294ArgumentxxxxpredictiveLow
295Argumentxxxx_xxpredictiveLow
296ArgumentxxxxxpredictiveLow
297Argumentxxxxxxxx[xx]predictiveMedium
298ArgumentxxxxxxpredictiveLow
299ArgumentxxxxxxxpredictiveLow
300ArgumentxxxxxpredictiveLow
301ArgumentxxxpredictiveLow
302ArgumentxxxxxxxxxpredictiveMedium
303ArgumentxxxxxxpredictiveLow
304ArgumentxxxxxxxxxxxxxxxxxpredictiveHigh
305ArgumentxxxxxxxpredictiveLow
306Argumentxxxxxxxxxxxxx/xxxxxpredictiveHigh
307Argumentxxxxxx_predictiveLow
308Argumentxxxxxxx/xxxxx_xxx_xxxxxxxx/xxxxxxx_xxxx/xxxxx_xxxxx/xxx_xxxxx_xxxxxpredictiveHigh
309Argumentxxxx_xxxxpredictiveMedium
310ArgumentxxxxxpredictiveLow
311ArgumentxxxxxxxxxpredictiveMedium
312ArgumentxxxxxxxpredictiveLow
313ArgumentxxxxpredictiveLow
314Argumentxxxx/xxxxxx/xxxxxxx/xxxxxxxxxxpredictiveHigh
315Argumentxxxxxxx_xxxpredictiveMedium
316Argumentxxxxxx/xxxxxxxxx/xxxxxxxpredictiveHigh
317ArgumentxxxpredictiveLow
318ArgumentxxxxpredictiveLow
319ArgumentxxxxxxpredictiveLow
320ArgumentxxxxxxxxxpredictiveMedium
321ArgumentxxxxxpredictiveLow
322ArgumentxxxxxpredictiveLow
323ArgumentxxpredictiveLow
324Argumentxxxxxxxx-xxxxxxxxpredictiveHigh
325ArgumentxxxxxxxxxxxpredictiveMedium
326ArgumentxxxpredictiveLow
327Argumentxxxx/xxxxpredictiveMedium
328ArgumentxxxxxxxxpredictiveMedium
329Argumentxxxxxxxx/xxxxxxxxpredictiveHigh
330Argumentxxxx_xxxxpredictiveMedium
331ArgumentxxxxxxxpredictiveLow
332Argumentxxx_xxx_xxxxxxxx_xxxpredictiveHigh
333Argumentxx_xxxx_xxpredictiveMedium
334ArgumentxxxxxxpredictiveLow
335ArgumentxxxxxxpredictiveLow
336Argumentx-xxxxxxxxx-xxxpredictiveHigh
337Argumentxxxx xxxxpredictiveMedium
338Input Value'xx''='predictiveLow
339Input Value../predictiveLow
340Input Value<xxxxxx>xxxxx(x)</xxxxxx>predictiveHigh
341Patternxxxxxxxxxxxxx|xx| xxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxpredictiveHigh
342Pattern|xx|predictiveLow
343Network Portxxx/xxxpredictiveLow
344Network Portxxx/xxx (xxxx)predictiveHigh
345Network Portxxx xxxxxx xxxxpredictiveHigh

References (5)

The following list contains external sources which discuss the actor and the associated activities:

Interested in the pricing of exploits?

See the underground prices here!