PurpleFox Analysisinfo

IOB - Indicator of Behavior (58)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en46
zh8
es2
de2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

GPAC6
Cisco Firepower Device Manager2
Juniper Junos OS2
Google Android2
Jtl-software JTL-Shop2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1TeamViewer Remote Full Client/Remote Host Printer Driver Installation TeamViewer_service.exe signature verification8.37.9$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.000650.04CVE-2024-7481
2MP4v2 MP4 File atom_avcC.cpp Read memory corruption8.08.0$0-$5k$0-$5kNot DefinedOfficial Fix0.010630.00CVE-2018-14446
3libmp4v2 MP4 File mp4track.cpp FinishSdtp out-of-bounds6.46.4$0-$5k$0-$5kNot DefinedOfficial Fix0.000700.00CVE-2018-17235
4Google Chrome Compositing out-of-bounds6.36.0$25k-$100k$5k-$25kNot DefinedOfficial Fix0.002380.03CVE-2022-2010
5Google Chrome WebGL out-of-bounds6.36.0$25k-$100k$5k-$25kNot DefinedOfficial Fix0.002660.03CVE-2022-2008
6Google Chrome WebGPU use after free6.36.0$25k-$100k$5k-$25kNot DefinedOfficial Fix0.004820.00CVE-2022-2007
7DZCP deV!L`z Clanportal config.php code injection7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.028200.15CVE-2010-0966
8Pydio Imagemagick os command injection6.26.2$0-$5k$0-$5kNot DefinedNot Defined0.003070.00CVE-2019-10048
9safer-eval Sandbox input validation8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.012240.00CVE-2019-10769
10Jetty Login Password.java information disclosure5.65.5$0-$5k$0-$5kNot DefinedOfficial Fix0.002170.00CVE-2017-9735
11Oracle Communications Cloud Native Core Policy Jetty information disclosure7.57.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.002170.00CVE-2017-9735
12David de Boer Paytium Plugin authorization4.34.2$0-$5k$0-$5kNot DefinedNot Defined0.000430.03CVE-2024-51667
13WordPress wp_targeted_link_rel Stored cross site scripting4.94.7$5k-$25k$0-$5kNot DefinedOfficial Fix0.002410.05CVE-2019-16773
14Ollama HTTP Request memory corruption5.55.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000430.07CVE-2024-39720
15Ollama model.go extractFromZipFile path traversal6.76.7$0-$5k$0-$5kNot DefinedOfficial Fix0.000830.02CVE-2024-45436
16GPAC MP4Box dmx_m2ts.c m2tsdmx_on_event null pointer dereference4.03.9$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.000430.04CVE-2024-6063
17GPAC MP4Box load_text.c swf_svg_add_iso_sample null pointer dereference4.03.9$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.000460.02CVE-2024-6062
18GPAC MP4Box isoffin_read.c isoffin_process infinite loop4.03.9$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.000460.08CVE-2024-6061
19GPAC MP4Box loader_xmt.c xmt_node_end use after free5.45.2$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.000420.02CVE-2024-6064
20WAVLINK WN530H4/WN530HG4/WN572HG3 Front-End Authentication Page login.cgi Goto_chidx stack-based overflow8.88.5$0-$5k$0-$5kProof-of-ConceptWorkaround0.000500.02CVE-2024-10194

IOC - Indicator of Compromise (15)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (7)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (29)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/drobopix/api/drobo.phppredictiveHigh
2File/spip.phppredictiveMedium
3Fileatom_avcC.cpppredictiveHigh
4Filedata/gbconfiguration.datpredictiveHigh
5Filexxxxxxxxxxxx.xxxpredictiveHigh
6Filexxxxxxxxx.xxxpredictiveHigh
7Filexxx/xxxxxx.xxxpredictiveHigh
8Filexxxxx.xxxxpredictiveMedium
9Filexxxxx.xxxpredictiveMedium
10Filexxxxxx_xxxxxxxx.xxxpredictiveHigh
11Filexxxxx.xxpredictiveMedium
12Filexxxxxxxx.xxxpredictiveMedium
13Filexxxxxxxxxxxxxxx.xxxxpredictiveHigh
14Filexxxxxxxxxx.xxxpredictiveHigh
15Filexxx/xxxxxxx/xxx_xxxx.xpredictiveHigh
16Filexxx/xxxxxxx/xxxxxxx_xxxx.xpredictiveHigh
17Filexxx/xxxxxxx/xxxx_xxxx.xpredictiveHigh
18Filexxx/xxxxx_xxxxxxx/xxxxxx_xxx.xpredictiveHigh
19Filexxxxxxx-xxxxxxxx.xxxpredictiveHigh
20Filexxxxxxxxxx_xxxxxxx.xxxpredictiveHigh
21Filexxxxxxxxxx.xxxpredictiveHigh
22Filexxxx/xxxxxxxx/xxxxxxxx.xxxxpredictiveHigh
23Libraryxxxxxxxx.xxxpredictiveMedium
24ArgumentxxxxxxxxpredictiveMedium
25Argumentxxxxxxxx/xxxxxxxx/xxxxxxxx/xxxxxpredictiveHigh
26ArgumentxxpredictiveLow
27ArgumentxxxxpredictiveLow
28ArgumentxxxxxpredictiveLow
29ArgumentxxxxxxxpredictiveLow

References (4)

The following list contains external sources which discuss the actor and the associated activities:

This view requires CTI permissions

Just purchase a CTI license today!