Nymaim Analysis

IOB - Indicator of Behavior (1000)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en790
es138
pt48
fr8
ru4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

us972
ru10
bg8
de4
ro2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Microsoft Windows64
Google Chrome42
Microsoft Exchange Server22
Apache HTTP Server20
Apple iOS18

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemCTIEPSSCVE
1nginx request smuggling6.96.9$0-$5k$0-$5kNot DefinedNot Defined1.460.00000CVE-2020-12440
2Microsoft IIS cross site scripting5.24.7$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.080.25090CVE-2017-0055
3F5 BIG-IP iControl REST Authentication bash missing authentication9.89.3$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.060.91244CVE-2022-1388
4Apple iOS/iPadOS Kernel out-of-bounds write7.87.5$25k-$100k$5k-$25kHighOfficial Fix0.000.01455CVE-2022-32917
5Microsoft IIS IP/Domain Restriction access control6.55.7$25k-$100k$0-$5kUnprovenOfficial Fix0.060.29797CVE-2014-4078
6polkit pkexec access control8.88.1$0-$5k$0-$5kProof-of-ConceptWorkaround0.000.04106CVE-2021-4034
7Microsoft Windows MSHTML Remote Code Execution8.87.9$100k and more$5k-$25kProof-of-ConceptOfficial Fix0.000.90841CVE-2021-40444
8Apache Tomcat HTTP Header request smuggling7.37.3$5k-$25k$5k-$25kNot DefinedNot Defined0.070.05242CVE-2021-33037
9FreeBSD Ping pr_pack stack-based overflow7.37.0$5k-$25k$5k-$25kNot DefinedOfficial Fix0.030.00000CVE-2022-23093
10Google Chrome V8 type confusion7.57.3$25k-$100k$5k-$25kFunctionalOfficial Fix0.030.01055CVE-2022-3723
11Splunk Enterprise Forwarder Bundle access control8.58.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000.01440CVE-2022-32158
12Linux Kernel Pipe Dirty Pipe Privilege Escalation6.35.7$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.020.06503CVE-2022-0847
13Google Chrome v8 type confusion6.35.9$25k-$100k$5k-$25kFunctionalOfficial Fix0.050.01136CVE-2022-1096
14VMware Spring Cloud Function SpEL Expression code injection9.89.3$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.040.94581CVE-2022-22963
15nginx Error Page request smuggling6.36.1$0-$5k$0-$5kNot DefinedOfficial Fix0.060.01537CVE-2019-20372
16Microsoft SQL Server Privilege Escalation7.56.8$25k-$100k$5k-$25kUnprovenOfficial Fix0.040.01967CVE-2022-29143
17Apache HTTP Server mod_reqtimeout resource management5.35.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.020.03718CVE-2007-6750
18Oracle WebLogic Server Core Remote Code Execution9.89.6$100k and more$5k-$25kNot DefinedOfficial Fix0.040.00885CVE-2022-21306
19Google Chrome WebRTC heap-based overflow6.36.0$25k-$100k$5k-$25kHighOfficial Fix0.000.01319CVE-2022-2294
20Microsoft Office 365 Conditional Access Policy access control5.04.6$5k-$25k$0-$5kProof-of-ConceptWorkaround0.010.00000CVE-2022-2077

IOC - Indicator of Compromise (41)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsTypeConfidence
18.253.131.120NymaimverifiedHigh
28.253.132.120NymaimverifiedHigh
334.227.185.153ec2-34-227-185-153.compute-1.amazonaws.comNymaimverifiedMedium
437.152.176.90NymaimverifiedHigh
546.4.52.109witntech.devNymaimverifiedHigh
646.47.98.12846-47-98-128.stz.ddns.bulsat.comNymaimverifiedHigh
746.238.18.157ip-46-238-18-157.home.megalan.bgNymaimverifiedHigh
847.91.242.212NymaimverifiedHigh
950.22.169.261a.a9.1632.ip4.static.sl-reverse.comNymaimverifiedHigh
10XX.XXX.XXX.XXXXxxxxxverifiedHigh
11XX.XX.XXX.XXxxxxxx-xx-xx-xxx-xx.xxxxx.x.xxxxxxxxxx.xxxXxxxxxverifiedHigh
12XX.XXX.XXX.XXXxxxxxverifiedHigh
13XX.XX.XXX.XXXxx-xx-xxx-xxx.xxxxxxxx.xxxxxxxxxxxx.xxxXxxxxxverifiedHigh
14XX.XXX.XX.XXXxx-xxx-xx-xxx.xxxxxxxx.xxxxxxxxxxxx.xxxXxxxxxverifiedHigh
15XX.XX.XX.XXxxxxxverifiedHigh
16XX.XX.XXX.XXXxxxxxverifiedHigh
17XX.XX.XX.XXxxxxxx.xxxxx.xxxxxxxxxxxxx.xxXxxxxxverifiedHigh
18XX.XX.XXX.XXXXxxxxxverifiedHigh
19XX.XXX.XXX.XXxxxxxxxxx.xxxx.x-xxxxxxxxx.xxXxxxxxverifiedHigh
20XX.X.XX.XXXxxxxxxxxxxx.xxxxx.x-xxxxxx.xxXxxxxxverifiedHigh
21XX.XX.XX.XXxxx-xx-xx-xx.xxxxxx.xxxx.xxxXxxxxxverifiedHigh
22XX.XXX.XXX.XXXXxxxxxverifiedHigh
23XX.XXX.XX.XXXxxxxxverifiedHigh
24XX.XXX.XXX.XXXxx-xxx-xxx-xxx.xxxxxx.xxXxxxxxverifiedHigh
25XX.XXX.XXX.XXXXxxxxxverifiedHigh
26XX.XXX.XXX.XXXxx-xxx-xxx-xxx.xxxxxxxxxxx.xxXxxxxxverifiedHigh
27XX.XXX.XX.XXXXxxxxxverifiedHigh
28XX.XX.XXX.XXXXxxxxxverifiedHigh
29XXX.XX.XXX.XXXxxxxxverifiedHigh
30XXX.XX.XX.XXXXxxxxxverifiedHigh
31XXX.XXX.XX.XXXXxxxxxverifiedHigh
32XXX.XXX.XXX.XXxx-xx-xxx.xxxxx.xxxXxxxxxverifiedHigh
33XXX.X.XXX.XXXxxxx.xxxxxxxxx.xxxXxxxxxverifiedHigh
34XXX.XXX.XX.XXXxxx-xxx-xx-xxx.xxxxxxxx.xxxxxxxxxxxx.xxxXxxxxxverifiedHigh
35XXX.XXX.XX.XXXXxxxxxverifiedHigh
36XXX.XX.XXX.XXXXxxxxxverifiedHigh
37XXX.XXX.XX.Xxxxxxxxxxxxx.xxxxx.x-xxxxxx.xxXxxxxxverifiedHigh
38XXX.XX.XXX.XXXxxxxxverifiedHigh
39XXX.XXX.XXX.XXXXxxxxxverifiedHigh
40XXX.XX.XXX.XXXxxx-xxx-xx-xxx-xxx.xxxxx.xxx.xxXxxxxxverifiedHigh
41XXX.XXX.XXX.XXxxxx-xx.xxxxxxxxxxxx.xxxXxxxxxverifiedHigh

TTP - Tactics, Techniques, Procedures (25)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueVulnerabilitiesAccess VectorTypeConfidence
1T1006CWE-21, CWE-22, CWE-23, CWE-25Pathname TraversalpredictiveHigh
2T1040CWE-319Authentication Bypass by Capture-replaypredictiveHigh
3T1055CWE-74InjectionpredictiveHigh
4T1059CWE-94Cross Site ScriptingpredictiveHigh
5T1059.007CWE-79, CWE-80Cross Site ScriptingpredictiveHigh
6TXXXXCWE-XXX, CWE-XXX, CWE-XXX, CWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveHigh
7TXXXX.XXXCWE-XXXXxx Xx Xxxx-xxxxx XxxxxxxxpredictiveHigh
8TXXXXCWE-XXXXxxx Xxx Xxxxxxxxx Xxxxxxxxxxx XxxxxxxxpredictiveHigh
9TXXXX.XXXCWE-XXX, CWE-XXXXxxxxxxx Xxxxxxxxxxx Xx Xxxxxxxxx Xxxxxxxxxxxxxx XxxxxxxxpredictiveHigh
10TXXXXCWE-XX, CWE-XXXxxxxxx XxxxxxxxxpredictiveHigh
11TXXXX.XXXCWE-XXXXxxx XxxxxxxxpredictiveHigh
12TXXXXCWE-XXX, CWE-XXX7xx Xxxxxxxx XxxxxxxxpredictiveHigh
13TXXXXCWE-XXX, CWE-XXXXxxxxxxxxx XxxxxxpredictiveHigh
14TXXXX.XXXCWE-XXXXXxxxxxxxxxx Xxxxxxx Xxxxxxxxxx XxxxxxxxxxpredictiveHigh
15TXXXXCWE-XX, CWE-XX, CWE-XXXxx XxxxxxxxxpredictiveHigh
16TXXXX.XXXCWE-XXXXxxxxxxx XxxxxxxxxxxxxpredictiveHigh
17TXXXXCWE-XXX, CWE-XXXXxx.xxx Xxxxxxxxxxxxxxxx: Xxxxxxxx Xx Xxxxxxxxxxxxx XxxxpredictiveHigh
18TXXXXCWE-XXXXxxxxxxxx Xxxxxxx Xx Xxxxxxxxx XxxxxxxxxxxpredictiveHigh
19TXXXXCWE-XXXXxxxxxxx Xxxxxxxxx Xx X Xxxxxxxxxxx'x Xxxxx Xx XxxxxpredictiveHigh
20TXXXXCWE-XXX, CWE-XXXXxxxxxxxx Xxxxxx XxxxpredictiveHigh
21TXXXX.XXXCWE-XXX, CWE-XXXXxxxxxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveHigh
22TXXXX.XXXCWE-XXXXxxxxxxxpredictiveHigh
23TXXXXCWE-XXX, CWE-XXX, CWE-XXXXxxxxxxxxxxxxpredictiveHigh
24TXXXXCWE-XXX, CWE-XXX, CWE-XXX, CWE-XXXX2xx Xxxxxxxxxxxxxxxx: Xxxx Xxxxxxxxxxxx Xxxxxxx XxxxxxxxxxpredictiveHigh
25TXXXX.XXXCWE-XXXXxxxxxxxxxxx XxxxxxpredictiveHigh

IOA - Indicator of Attack (184)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File//predictiveLow
2File/admin/doctors/view_doctor.phppredictiveHigh
3File/appliance/users?action=editpredictiveHigh
4File/bin/boapredictiveMedium
5File/classes/Master.php?f=delete_reservationpredictiveHigh
6File/config/getuserpredictiveHigh
7File/data-service/users/predictiveHigh
8File/IISADMPWDpredictiveMedium
9File/inc/campaign/count_of_send.phppredictiveHigh
10File/index.phppredictiveMedium
11File/js/app.jspredictiveMedium
12File/loginpredictiveLow
13File/mgmt/tm/util/bashpredictiveHigh
14File/northstar/Portal/processlogin.jsppredictiveHigh
15File/public/plugins/predictiveHigh
16File/rdms/admin/?page=user/manage_userpredictiveHigh
17File/registration.phppredictiveHigh
18File/rest/api/1.0/issues/{id}/ActionsAndOperationspredictiveHigh
19File/rest/api/latest/projectvalidate/keypredictiveHigh
20File/rest/collectors/1.0/template/custompredictiveHigh
21File/xxx_xxxxxxxxxxx_xxxxxx/xxxxxxxxxxx/xxx_xxxxx.xxxpredictiveHigh
22File/xxxxxx/xxxxx/xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx.xxxxpredictiveHigh
23File/xxxxxxxxpredictiveMedium
24File/xxxxxxx/predictiveMedium
25File/xxx/xxx/xxxxxxpredictiveHigh
26File/xxxxxx/xxxxxxxx/xxxxxxxx/xxxxxxxxxxxx.xxxpredictiveHigh
27File/xxx-xxx/xxx.xxxpredictiveHigh
28File/xxxxxx/xxxxxxxxxxxxxxxxx/xxxxxxxxxxxxxxxxxxxxxpredictiveHigh
29Filexxxxxxxxxxxxxx.xxxpredictiveHigh
30Filexxxxxxxxxxxxxxx.xxxpredictiveHigh
31Filexxxx_xxx.xxpredictiveMedium
32Filexxxxxx.xpredictiveMedium
33Filex:/xxxx.xxx"predictiveMedium
34Filex:\xxxxxxx\xxx\xxx.xxxpredictiveHigh
35Filex:\xxxxxxxxpredictiveMedium
36Filex:\xxxxxxx\xxxxxxxx\xxxxxx\xxxpredictiveHigh
37Filexxxxxxxxx.xpredictiveMedium
38Filexxxxxxx.xxxpredictiveMedium
39Filexxxxx.xxxxxxxxxxx.xxxx[x]=xxxpredictiveHigh
40Filexxxxxxx.xxxpredictiveMedium
41Filexxxxxxxxxxx/xxxxx/xxxxxxx.xxxpredictiveHigh
42Filexxxxxxx.xpredictiveMedium
43Filexxxxxx_xx/xxxxxxxxxxxxxxxxxxxxxxxxxpredictiveHigh
44Filexxx_xx_xxx.xpredictiveMedium
45Filex_xxxxxxpredictiveMedium
46Filexxxx-xx/xxxx/xxxxxxxxxxx.xxxpredictiveHigh
47Filexxxxxxx/xxxxx/xxx.xpredictiveHigh
48Filexxxxxxx/xxx/xxxxxxxx/xxxxxxx/xxxxxxxx/xxxxxxxx_xxxxx.xpredictiveHigh
49Filexxxxxxxxxxxxx.xxxpredictiveHigh
50Filexxxxxxx.xxxpredictiveMedium
51Filexxxxxxx.xxxxpredictiveMedium
52Filexxxxxxx.xxpredictiveMedium
53Filexxxxxxxx.xxxpredictiveMedium
54Filexx/xxxxx/xxxxxxx.xpredictiveHigh
55Filexx/xxxxx/xxxxx_xxxx.xpredictiveHigh
56Filexxxxxx/xxxxxxxxxxxxxpredictiveHigh
57Filexxxxxxxx/xxxx_xxxxpredictiveHigh
58Filexx_xxxxxxx.xpredictiveMedium
59Filexx.xxxpredictiveLow
60Filexxx_xxxxxxx.xxxpredictiveHigh
61Filexxxxx.xxxpredictiveMedium
62Filexxxxxxx.xpredictiveMedium
63Filexxxxxx.xxx/xxxxxx.xxxpredictiveHigh
64Filexxx/xxxx_xxxx.xpredictiveHigh
65Filexxx/xxxx/xxxxxx.xpredictiveHigh
66Filexxxxxxx/xxx_xxxxxxxx.xpredictiveHigh
67Filexxxxxxxxxxx/xxxxxxx.xxxpredictiveHigh
68Filexxx_xxxxx_xxxx.xpredictiveHigh
69Filexxxxx.xxxxxxpredictiveMedium
70Filexxxx.xxxpredictiveMedium
71Filexxx/xxxxxxxxx/x_xxxxxx.xpredictiveHigh
72Filexxx/xxx/xxxxxxx.xpredictiveHigh
73Filexxx/xxxx/xxxxxx.xpredictiveHigh
74Filexxx_xxxx_xxx_xxxxxxxxxx.xpredictiveHigh
75Filexxx_xxxx.xpredictiveMedium
76Filexx_xxxxxx_xxxxxxx.xxxpredictiveHigh
77Filexxxxxxxxxxxxxxxxxx.xxxxpredictiveHigh
78Filexxxxxxx.xxxpredictiveMedium
79Filexxx/xxxxx/xxxxxx/xxx/xxxxxxxxxxxxxxxxxxxxxxxxxxx.xxxxpredictiveHigh
80Filexxxxxxxx_xxxxxx.xxxpredictiveHigh
81Filexxxxxxx.xxxpredictiveMedium
82Filexxxxxxx/xxxxxx/xxxxxx-xxxxxx.xpredictiveHigh
83Filexxxxx/xxxxxxx.xpredictiveHigh
84Filexxxxx-xxxxxx.xpredictiveHigh
85Filexxxxxxxx.xpredictiveMedium
86Filexxxxxxxx.xpredictiveMedium
87Filexxxxxxxxxxxxxxxxx.xxxpredictiveHigh
88Filexxxxxx/xxxxx/xxxxx.xpredictiveHigh
89Filexxx.xxxxxpredictiveMedium
90Filexxxx_xxx_xx.xpredictiveHigh
91Filexxxxx.xxxpredictiveMedium
92Filexxxxxxxxx.xxxpredictiveHigh
93Filexxxxxxxxxx_xxxxpredictiveHigh
94Filexxxxx.xxxpredictiveMedium
95Filexxxxx.xxxpredictiveMedium
96Filexxx.xxxxpredictiveMedium
97Filexxxx-xxxxxxxpredictiveMedium
98Filexxxxxxx.xxxpredictiveMedium
99Filexxx/xxxx/xxxx/xxx/xxxxxx/xxxxxx/xxx/xxxxxxxxxxxxxxxxxx.xxxxpredictiveHigh
100Filexxxxxxx.xxx.xx.xxxxxxxxxxx.xxxpredictiveHigh
101Filexxxxx/xxx/xxx/xxxxxx.xpredictiveHigh
102Filexxxxx/xxx/xxxxxxx/xxxxxx.xxxpredictiveHigh
103Filexxx/xxx/xxx-xxxxxxpredictiveHigh
104Filexxxx/xxx/xxxx-xxxxx.xxxpredictiveHigh
105Filexxxxxxx.xxxpredictiveMedium
106Filexxxxx/xxxxx.xxpredictiveHigh
107Filexxxx.xxxpredictiveMedium
108Filexx-xxxxxxxx/xxxx-xxx/xxxxxxxxx/xxxxx-xx-xxxx-xxxxx-xxxxxxxxxx.xxxpredictiveHigh
109Filexxxxxxxx.xpredictiveMedium
110File~/xxxxxxxx/xxx-xxxxxxxxx/xxxxx/xxxxx-xxx-xxxxx-xxxxxxxx.xxxpredictiveHigh
111Library/_xxx_xxx/xxxxx.xxxpredictiveHigh
112Libraryx:/xxxxxxx xxxxx/xxxxx/xxxxxxx.xxxpredictiveHigh
113Libraryxxxxx.xxxpredictiveMedium
114Libraryxxxxxxxxxx.xxxpredictiveHigh
115Libraryxxx/xxxx/xxxxxx.xxpredictiveHigh
116Libraryxxx/xxxxxxx/xxxx.xpredictiveHigh
117Libraryxxxxxxxxxxxx.xxxpredictiveHigh
118Libraryxxxxxx.xxxpredictiveMedium
119Libraryxxx.xxxpredictiveLow
120Libraryxxxxxx.xxxpredictiveMedium
121Libraryxxxxxxxxxxxxxx.xxxpredictiveHigh
122Libraryxxx/xxxxxxxxx/xxxxxxxxxxx.xpredictiveHigh
123Libraryxxxxxx.xxxpredictiveMedium
124Libraryxxxxxx.xxxpredictiveMedium
125Libraryxxxxxx.xxxpredictiveMedium
126Libraryxxxxxxxxxxxxxx.xxxpredictiveHigh
127Libraryxxxxx.xxxpredictiveMedium
128LibraryxxxxpredictiveLow
129Argument--xxxxxxx-xxx=)predictiveHigh
130Argument-xpredictiveLow
131Argument?xxxx_xxxx=xxxxxxx.xxx/xxxx=xxxxxx/xxx=xxx+/xxx/.xxxxxxxx/xxxxxxx=//xxxxxxxxxxxxxx.xxx=xpredictiveHigh
132ArgumentxxpredictiveLow
133Argumentxxxx_xxpredictiveLow
134ArgumentxxxpredictiveLow
135Argumentxxxxx.xxxxxxxxxxx.xxxx[x]=xxxpredictiveHigh
136Argumentxxxxxxxxx.xxxxpredictiveHigh
137Argumentxxxxxxxxxxxx/xxxxxxxxxxxpredictiveHigh
138Argumentxxxxxxxx_xxxxpredictiveHigh
139Argumentxxxx_xxxxxx=xxxxpredictiveHigh
140ArgumentxxxxxxxxxxxxxxxpredictiveHigh
141Argumentxx_xxxxxxxpredictiveMedium
142ArgumentxxxxpredictiveLow
143ArgumentxxxxxxxxpredictiveMedium
144Argumentxxx/xxxxxxxx/xxxxxxxxpredictiveHigh
145ArgumentxxxxpredictiveLow
146Argumentxx_xxxx_xx/xx_xxxx_xxpredictiveHigh
147ArgumentxxpredictiveLow
148Argumentxx_xxxxx_xxxxxx/xx_xxxxxxx_xxxxxxxxpredictiveHigh
149ArgumentxxxxxxxxxpredictiveMedium
150ArgumentxxxxxxpredictiveLow
151Argumentxxxx_xx_xxx_xxx/xxxx_xxxxxxxxxxxxpredictiveHigh
152Argumentxxxxxx xxxxxxpredictiveHigh
153ArgumentxxxpredictiveLow
154ArgumentxxxxxxxxpredictiveMedium
155ArgumentxxxxxxxxxpredictiveMedium
156Argumentxxxxxxxx_xxpredictiveMedium
157Argumentxxxxxxx_xxxpredictiveMedium
158ArgumentxxxxxxpredictiveLow
159Argumentxxx_xxpredictiveLow
160ArgumentxxxxxxpredictiveLow
161ArgumentxxxxxxxxxxxxxxxxxpredictiveHigh
162Argumentxxxx.xxxpredictiveMedium
163Argumentxxxxxxxx[xxxx xxxxxxx][xxxxxxxxxxxxxxxxxx]predictiveHigh
164ArgumentxxxxxxpredictiveLow
165ArgumentxxxxxxxxxxxxxxpredictiveHigh
166ArgumentxxxxxxxxpredictiveMedium
167ArgumentxxxxxxxxpredictiveMedium
168Argumentxxxxx/xxxxxxxpredictiveHigh
169Argumentxxxxxxxx-xxxxxxxxpredictiveHigh
170ArgumentxxxpredictiveLow
171ArgumentxxxxxxxxpredictiveMedium
172ArgumentxxxxxxxxpredictiveMedium
173ArgumentxxxxxxxxpredictiveMedium
174Argumentxxxxxxxx/xxxxpredictiveHigh
175Argumentxxxx_xxxxxpredictiveMedium
176ArgumentxxxxpredictiveLow
177ArgumentxxxxpredictiveLow
178Argument_xxx_xxxxxxxxxxx_predictiveHigh
179Argument__xxxxxxxxxpredictiveMedium
180Input Valuexxxxx' xxx (xxxxxx xxxx xxxx (xxxxxx(xxxxx(x)))xxxx) xxx 'xxxx'='xxxx&xxxxxxxx=xxxxxxxxxxpredictiveHigh
181Pattern|xx|xxx|xx xx xx xx|predictiveHigh
182Network PortxxxpredictiveLow
183Network Portxxx/xx (xxx)predictiveMedium
184Network Portxxx/xxxxpredictiveMedium

References (10)

The following list contains external sources which discuss the actor and the associated activities:

Interested in the pricing of exploits?

See the underground prices here!