Swisyn Analysis

IOB - Indicator of Behavior (676)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en616
fr22
es8
de6
it4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

de120
us118
fr16
rs8
ru2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Linux Kernel20
Google Android16
Apple macOS12
Google Chrome10
Tenda i910

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemCTIEPSSCVE
1Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash information disclosure5.35.2$5k-$25k$0-$5kHighWorkaround0.040.04187CVE-2007-1192
2SourceCodester Sanitization Management System Quote Requests Form cross site scripting4.94.8$0-$5k$0-$5kProof-of-ConceptNot Defined0.000.00885CVE-2022-3942
3Vmware Workspace ONE Access/Identity Manager Template injection9.88.8$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.060.93243CVE-2022-22954
4Online Tours & Travels Management System update_expense.php sql injection6.76.6$0-$5k$0-$5kNot DefinedNot Defined0.060.00885CVE-2022-40098
5Tenda i9 String formexeCommand buffer overflow6.66.5$0-$5k$0-$5kNot DefinedNot Defined0.000.00885CVE-2022-40107
6Linux Kernel ebpf Verifier verifier.c adjust_scalar_min_max_vals unknown vulnerability4.34.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.020.00950CVE-2021-4159
7Linux Kernel XFS File System inode.c inode_init_owner access control7.06.9$5k-$25k$0-$5kNot DefinedOfficial Fix0.050.04082CVE-2021-4037
8Linux Kernel eBPF out-of-bounds write8.07.9$25k-$100k$5k-$25kNot DefinedWorkaround0.000.00950CVE-2021-4204
9Linux Kernel SVC RDMA Counter initialization6.05.9$0-$5k$0-$5kNot DefinedOfficial Fix0.020.00890CVE-2021-4218
10Tenda i9 String formwrlSSIDset buffer overflow5.75.5$0-$5k$0-$5kNot DefinedNot Defined0.000.00885CVE-2022-40102
11Linux Kernel nfnetlink_queue.c nfqnl_mangle denial of service6.56.2$0-$5k$0-$5kNot DefinedOfficial Fix0.020.07176CVE-2022-36946
12Samsung Checkout IAPService sql injection5.65.5$0-$5k$0-$5kNot DefinedOfficial Fix0.030.00885CVE-2022-36839
13F5 BIG-IP iControl REST Authentication bash missing authentication9.89.3$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.060.91244CVE-2022-1388
14Google Chrome Input Remote Code Execution6.36.0$25k-$100k$5k-$25kNot DefinedOfficial Fix0.020.01136CVE-2022-1497
15Schneider Electric StruxureWare Data Center Expert path traversal6.96.9$0-$5k$0-$5kNot DefinedNot Defined0.080.01156CVE-2021-22794
16VMware Spring Cloud Function SpEL Expression code injection9.89.3$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.040.94581CVE-2022-22963
17Barracuda Web Application Firewall information disclosure3.53.2$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.020.00950CVE-2012-5561
18Apache Struts code injection6.56.2$5k-$25k$0-$5kHighOfficial Fix0.050.04240CVE-2013-1966
19PhreeBooksERP js_include.php cross site scripting5.24.6$0-$5k$0-$5kNot DefinedOfficial Fix0.040.00954CVE-2017-5990
20My Link Trader login.php SQL improper authentication7.36.6$0-$5k$0-$5kProof-of-ConceptNot Defined0.030.00000

IOC - Indicator of Compromise (56)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsTypeConfidence
15.39.72.2ns3065363.ip-5-39-72.euSwisynverifiedHigh
213.107.21.200SwisynverifiedHigh
320.42.65.92SwisynverifiedHigh
451.91.73.194ns3164589.ip-51-91-73.euSwisynverifiedHigh
551.254.45.43ip-51-254-45-43.ddhosts.netSwisynverifiedHigh
658.221.32.3SwisynverifiedHigh
758.221.33.111SwisynverifiedHigh
858.221.35.121SwisynverifiedHigh
959.42.71.178SwisynverifiedHigh
1059.188.239.165SwisynverifiedHigh
1161.60.12.16461-60-12-164.GSN-IP.hinet.netSwisynverifiedHigh
1264.32.28.254curtir.gicscorple.comSwisynverifiedHigh
13XX.XX.XXX.XXXxxxxxverifiedHigh
14XX.XXX.XXX.XXXXxxxxxverifiedHigh
15XX.XX.XXX.XXxxx-xxxx-x.xxxxxxxxxx.xxXxxxxxverifiedHigh
16XX.XXX.XXX.XXXXxxxxxverifiedHigh
17XX.XXX.XXX.XXxxxxxxxx.xxxx.xxxxxxxxxxxxx.xxXxxxxxverifiedHigh
18XX.XXX.XXX.XXxxxxxxxx.xxxx.xxxxxxxxxxxxx.xxXxxxxxverifiedHigh
19XX.XXX.XX.XXXXxxxxxverifiedHigh
20XXX.XX.XXX.XXXxxxxxverifiedHigh
21XXX.XX.XXX.XXXxxxxxverifiedHigh
22XXX.XXX.XXX.XXXxxx-xxxxx.xxxxxx.xxxXxxxxxverifiedHigh
23XXX.XXX.XXX.XXXXxxxxxverifiedHigh
24XXX.XXX.XXX.XXXXxxxxxverifiedHigh
25XXX.XXX.XXX.XXXXxxxxxverifiedHigh
26XXX.XX.XXX.XXXxxxxxverifiedHigh
27XXX.XX.XXX.XXXxxxxxverifiedHigh
28XXX.XX.XXX.XXXXxxxxxverifiedHigh
29XXX.XXX.XX.XXXxxxxxx.xxx.xx.xxx.xxx.xxxxxxx.xxxx-xxxxxx.xxXxxxxxverifiedHigh
30XXX.XX.XXX.XXXxxxxxverifiedHigh
31XXX.XX.XXX.XXXxxxxxxxx.xxxx.xxXxxxxxverifiedHigh
32XXX.XXX.XXX.XXXxxxx.xxxxxxxx.xxXxxxxxverifiedHigh
33XXX.XX.XXX.XXXXxxxxxverifiedHigh
34XXX.XX.XX.XXXXxxxxxverifiedHigh
35XXX.XXX.XXX.XXxx-xx-xxx.xxxxx.xxxXxxxxxverifiedHigh
36XXX.XXX.XXX.XXXXxxxxxverifiedHigh
37XXX.XX.XX.XXXxxxxxverifiedHigh
38XXX.X.XX.XXXxxxxxx.xxx.xx.x.xxx.xxxxxxx.xxxx-xxxxxx.xxXxxxxxverifiedHigh
39XXX.XX.XX.XXXxxxxxx.xxx.xx.xx.xxx.xxxxxxx.xxxx-xxxxxx.xxXxxxxxverifiedHigh
40XXX.XX.XXX.XXXxxxxxverifiedHigh
41XXX.XX.XXX.XXXXxxxxxverifiedHigh
42XXX.XX.XXX.XXXXxxxxxverifiedHigh
43XXX.XX.XXX.XXxxxxxx.xxxxxxxxxxxx.xxxXxxxxxverifiedHigh
44XXX.XX.XXX.XXxxx-xx-xxx-xx.xxxxxxxx.xxxxxxx.xxxXxxxxxverifiedHigh
45XXX.XX.XXX.XXxxx-xx-xxx-xx.xxxxxxxx.xxxxxxx.xxxXxxxxxverifiedHigh
46XXX.XX.XXX.XXxxx-xx-xxx-xx.xxxxxxxx.xxxxxxx.xxxXxxxxxverifiedHigh
47XXX.XX.XXX.XXxxx-xx-xxx-xx.xxxxxxxx.xxxxxxx.xxxXxxxxxverifiedHigh
48XXX.XX.XXX.XXxxxxxxxxxx.xxxxxxxxxxxxxxxxx.xxXxxxxxverifiedHigh
49XXX.XXX.XXX.XXXXxxxxxverifiedHigh
50XXX.XXX.XX.XXxxxxxx.xxxxXxxxxxverifiedHigh
51XXX.XX.XX.XXXxxxxxverifiedHigh
52XXX.XXX.XXX.XXxx-xxx-xxx-xxx.xxxxxxx.xxxxxx.xxxXxxxxxverifiedHigh
53XXX.XXX.XXX.XXXxxxxxxx.xxxxxx.xxxXxxxxxverifiedHigh
54XXX.XXX.XXX.XXxx-xxx-xxx-xxx-xx.xxx.xxxxxx.xxXxxxxxverifiedHigh
55XXX.XXX.XXX.XXXxxx-xxx-xxx-xxx.xxxxx-xx.xxxxx.xxxXxxxxxverifiedHigh
56XXX.XXX.XX.XXXXxxxxxverifiedHigh

TTP - Tactics, Techniques, Procedures (24)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueVulnerabilitiesAccess VectorTypeConfidence
1T1006CWE-21, CWE-22, CWE-23Pathname TraversalpredictiveHigh
2T1055CWE-74InjectionpredictiveHigh
3T1059CWE-94Cross Site ScriptingpredictiveHigh
4T1059.007CWE-79, CWE-80Cross Site ScriptingpredictiveHigh
5T1068CWE-264, CWE-269, CWE-273, CWE-284Execution with Unnecessary PrivilegespredictiveHigh
6TXXXX.XXXCWE-XXXXxx Xx Xxxx-xxxxx XxxxxxxxpredictiveHigh
7TXXXX.XXXCWE-XXX, CWE-XXXXxxxxxxx Xxxxxxxxxxx Xx Xxxxxxxxx Xxxxxxxxxxxxxx XxxxxxxxpredictiveHigh
8TXXXXCWE-XX, CWE-XX, CWE-XXXXxxxxxx XxxxxxxxxpredictiveHigh
9TXXXX.XXXCWE-XXXXxxx XxxxxxxxpredictiveHigh
10TXXXXCWE-XXX7xx Xxxxxxxx XxxxxxxxpredictiveHigh
11TXXXXCWE-XXX, CWE-XXXXxxxxxxxxx XxxxxxpredictiveHigh
12TXXXX.XXXCWE-XXXXXxxxxxxxxxx Xxxxxxx Xxxxxxxxxx XxxxxxxxxxpredictiveHigh
13TXXXXCWE-XX, CWE-XXXxx XxxxxxxxxpredictiveHigh
14TXXXXCWE-XXXXxx Xx Xxxxxxxxxx Xxxxxxx Xxxxxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveHigh
15TXXXX.XXXCWE-XXXXxxxxxxx XxxxxxxxxxxxxpredictiveHigh
16TXXXXCWE-XXX, CWE-XXX, CWE-XXX, CWE-XXXXxx.xxx Xxxxxxxxxxxxxxxx: Xxxxxxxx Xx Xxxxxxxxxxxxx XxxxpredictiveHigh
17TXXXXCWE-XXXXxxxxxxxx Xxxxxxx Xx Xxxxxxxxx XxxxxxxxxxxpredictiveHigh
18TXXXXCWE-XXXXxxxxxxx Xxxxxxxxx Xx X Xxxxxxxxxxx'x Xxxxx Xx XxxxxpredictiveHigh
19TXXXXCWE-XXXXxxxxxxxx Xxxxxx XxxxpredictiveHigh
20TXXXX.XXXCWE-XXXXxxxxxxx Xxxxxx XxxxpredictiveHigh
21TXXXX.XXXCWE-XXXXxxxxxxxpredictiveHigh
22TXXXXCWE-XXX, CWE-XXX, CWE-XXX, CWE-XXX, CWE-XXXXxxxxxxxxxxxxpredictiveHigh
23TXXXXCWE-XXX, CWE-XXX, CWE-XXXX2xx Xxxxxxxxxxxxxxxx: Xxxx Xxxxxxxxxxxx Xxxxxxx XxxxxxxxxxpredictiveHigh
24TXXXX.XXXCWE-XXXXxxxxxxxxxxx XxxxxxpredictiveHigh

IOA - Indicator of Attack (233)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/action/import_e2c_json_file/predictiveHigh
2File/admin.php/vod/admin/topic/delpredictiveHigh
3File/admin.php?action=themeinstallpredictiveHigh
4File/admin/admapi.phppredictiveHigh
5File/admin/api/theme-edit/predictiveHigh
6File/admin/config.php?display=disa&view=formpredictiveHigh
7File/admin/login.phppredictiveHigh
8File/admin/posts.php&action=editpredictiveHigh
9File/admin/sysmon.phppredictiveHigh
10File/admin/update_expense.phppredictiveHigh
11File/api/v1/chat.getThreadsListpredictiveHigh
12File/balance/service/listpredictiveHigh
13File/base/ecma-helpers-string.cpredictiveHigh
14File/blog/editpredictiveMedium
15File/cimompredictiveLow
16File/ci_spms/admin/search/searching/predictiveHigh
17File/classes/Master.php?f=delete_studentpredictiveHigh
18File/dev/ttypredictiveMedium
19File/EPOAGENTMETA/DisplayMSAPropsDetail.dopredictiveHigh
20File/etc/sysconfig/tomcatpredictiveHigh
21File/fantasticblog/single.phppredictiveHigh
22File/goform/aspFormpredictiveHigh
23File/goform/delIpMacBind/predictiveHigh
24File/goform/SetLEDCfgpredictiveHigh
25File/home/iojs/build/ws/out/Release/obj.target/deps/openssl/openssl.cnfpredictiveHigh
26File/htdocs/utils/Files.phppredictiveHigh
27File/xxx/xxxxx.xxxpredictiveHigh
28File/xxxx_xxxxxxxxx_xxxxxxx.xxxpredictiveHigh
29File/xxxx/xx/xxxx/xxxxpredictiveHigh
30File/xxx-xxxxxxx/xxxxxx_xxxxxxxxx.xxxpredictiveHigh
31File/xxxxxxxx/xxxxx/xxxxx/xxxxx.xxx?xxxx=xxxxpredictiveHigh
32File/xxxxx/xxxxxxxxxxxx.xxxpredictiveHigh
33File/xxxxxxx/xxxxxxx.xxxpredictiveHigh
34File/xxx_xxxxxx/xxxxxxxxxxxxx.xxxpredictiveHigh
35File/xxx_xxxxxx/xxxxxxxxxx.xxxpredictiveHigh
36File/xxxxx-xxxx-xxxxxxx/predictiveHigh
37File/xxxxxxxpredictiveMedium
38File/xxxx/xxxxxxx/xxxxxx.xxx?x=xxxxxx_xxxxxxxpredictiveHigh
39File/xxxxx_xxxxxxx/xxxxx_xxxx.xpredictiveHigh
40File/xxxxxxxxxx/xxxxxxxx/xxxxxpredictiveHigh
41File/xxxxxxxxxxxxxxx/xxxxx.xxxpredictiveHigh
42File/xxxxxxxx/xxxxxx/xxxxxxxxxxxx/xxxx xxxxxxx/xxxxxxxxx/xxxxxxx xxxxpredictiveHigh
43File/xxx/xxxxx/xxx/xxx_xxxxxx.xpredictiveHigh
44File/xxxxx/xxxxx/xxxxxx-xxxxxxpredictiveHigh
45File/xxxpredictiveLow
46File/xxxxxxx/predictiveMedium
47File/xxxxx/xxxxxxxxx/xxx/xxxxxxxxxxxxxxxxxxxxxx.xxxxpredictiveHigh
48File/xxxx/xxx/xxx.xxxxpredictiveHigh
49File/xxxx/xxxxx/?xxxx=xxxxpredictiveHigh
50Filexxxxxxxxxxxxxx.xxxxpredictiveHigh
51Filexxxxxxxxxx.xxxxpredictiveHigh
52Filexxx.xxxpredictiveLow
53Filexxxxx.xxxpredictiveMedium
54Filexxxxx/xxxxxx.xxxpredictiveHigh
55Filexxx-xxxxx-xxxxxx-xxxxx.xpredictiveHigh
56Filexxx/xxxxxxxxxxx/xxxx_xxxxxx_xxxxxxxxxx.xxxpredictiveHigh
57Filexxx.xxxpredictiveLow
58Filexxxxx/xxxx_xxx.xpredictiveHigh
59Filexxx/xxx.xxxpredictiveMedium
60Filexxxxx.xpredictiveLow
61Filexxx_xxxx.xxpredictiveMedium
62Filex:\xxxxxxx xxxxx\xxxxxxxxx xxx xxxxxx\xxxxxxxxx.xxxpredictiveHigh
63Filex:\xxxxxxxxxxpredictiveHigh
64Filexxxxxxxxxxxx.xpredictiveHigh
65Filexxxxxx.xxxpredictiveMedium
66Filexx/xxxxxxx/xxxxx/xxxxxxxxxxxxxxxxxxxxxxxxpredictiveHigh
67Filexxxxxxxxxx.xxxpredictiveHigh
68Filexxxxxx/xxx/xx-xxxxxx-xx.xpredictiveHigh
69Filexxxxxx.xxxpredictiveMedium
70FilexxxxxpredictiveLow
71Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveHigh
72Filexxx.xxxpredictiveLow
73Filexxxxxxx.xxxxpredictiveMedium
74Filexxxxxxxxxxxx.xxxpredictiveHigh
75Filexxxx_xxxxxx.xxxpredictiveHigh
76Filexxxxxxx/xxx/xxx/xxx/xx_xxx.xpredictiveHigh
77Filexxxxxxxxxxx.xxxpredictiveHigh
78Filexxxxxxxxxx.xxxpredictiveHigh
79Filexxxx.xxxpredictiveMedium
80Filexxxxxxxx.xxxpredictiveMedium
81Filexx/xxxxx.xpredictiveMedium
82Filexxxxxxxx.xxxpredictiveMedium
83Filexxxxxxxxxxxxxx.xxxpredictiveHigh
84Filexxxxx/xxxxx/xxxxx/xxxxxxxx.xxpredictiveHigh
85Filexxxxxxxxxxxxxxxxx.xxxpredictiveHigh
86Filexxxxxxxxxxxxxxxxxxx.xxxpredictiveHigh
87Filexxx/xxxxxx.xxxpredictiveHigh
88Filexxxxxxxx/xxxx/xxxxx-xxxxxxxxxx.xxxpredictiveHigh
89Filexxxxxxxx/xxxxxxxx/xxxxxxxxxxxxxxxx.xxxpredictiveHigh
90Filexxxxx.xxxpredictiveMedium
91Filexxxxx.xpredictiveLow
92Filexxxxxxxxxxxxx.xxxpredictiveHigh
93Filexxxxxxx.xpredictiveMedium
94Filexxxxxx.xpredictiveMedium
95Filexxxxxx/xxx/xxxxxxxx.xpredictiveHigh
96Filexxxxxxxxxx/xxxxxx.xpredictiveHigh
97Filexxxxxxxxx/xxxx-xxxxxxxx.xpredictiveHigh
98Filexxxxxxxxx/xxxx/xxx_xxxxx.xpredictiveHigh
99Filexxxxx.xxxpredictiveMedium
100Filexxxxxx_xxxxxx_xxxxx_xxxx_xxxx.xxxpredictiveHigh
101Filexxxxxxxxx/xxxxxxxxxxxxxxxxpredictiveHigh
102Filexxxxxxx.xpredictiveMedium
103Filexxxxxxx/xxxx/xxxx_xxxx.xxpredictiveHigh
104FilexxxxxxxxxxpredictiveMedium
105Filexxx_xx/xxx_xx_xxxxxx.xpredictiveHigh
106Filexxx/xxxx/xx_xxxxxxxx.xpredictiveHigh
107Filexxx/xxxxxxxxx/xxxxxxxxx_xxxxx.xpredictiveHigh
108Filexxx/xxx_xxxxx/xx_xxxxx.xpredictiveHigh
109Filexxx/xxxx/xxxx_xxxxxx.xpredictiveHigh
110Filexxxxxxxxxxxxxxxxxxxxxxxxxx.xxxxpredictiveHigh
111Filexxxxxx.xxpredictiveMedium
112Filexxxxx.xxxx.xxxpredictiveHigh
113Filexxxxx-xxxxx.xpredictiveHigh
114Filexxx-xxx/?x=xxxxxxx_xxxxxpredictiveHigh
115Filexxxxxxxxxxxxx-xxxxxx/xxxxxxxxxx/xxxxxxxxxxxxxxx/xxx/xxxxx_xxx/xx_xxxxxxx.xxxpredictiveHigh
116Filexxxxxxx/xxxxxxxxx.xxxpredictiveHigh
117FilexxxxpredictiveLow
118Filexxxxxxxxx.xxxpredictiveHigh
119Filexxxxxxxx.xxxpredictiveMedium
120Filexxxxxx.xxxpredictiveMedium
121Filexxxx.xxxpredictiveMedium
122Filexxxxxx-xxxxxxx.xxxpredictiveHigh
123Filexxxxxxxx/xxxx/xxxxxxx_xxxx.xpredictiveHigh
124Filexxxxxxxxx/xxxx/xxxxxxxxxxxxxxxx.xpredictiveHigh
125Filexxxxx/xxxx/xxxxx.xpredictiveHigh
126Filexxx/xxx_xxxx.xpredictiveHigh
127Filexxx/xxx/xxx_xxx/xxxxxx/xxx_xxxxxx_xxxxx.xpredictiveHigh
128Filexxxxxx/xxxxxx_xxxx.xpredictiveHigh
129Filexxxxxxxxxxxxxxxxxxx.xxxpredictiveHigh
130Filexxxxxxxxxxx.xxxpredictiveHigh
131Filexxxx-xxxxx.xxxpredictiveHigh
132Filexxxx-xxxxxxx.xpredictiveHigh
133Filexxxxxx/xxxxxxx/xxxxxxxx/xxxx/xxxxxxx.xxxpredictiveHigh
134Filexxxxxxxx.xxxpredictiveMedium
135Filexxx/xxxpredictiveLow
136Filexx-xxxxx/xxxxx.xxxpredictiveHigh
137Filexx-xxxxxxxx/xxxxxxxxx.xxxpredictiveHigh
138File__xxxx_xxxxxxxx.xxxpredictiveHigh
139Libraryxxxxx.xx/xxxxx.xxxpredictiveHigh
140Libraryxxx_xxxx_xxxxxx.xxxpredictiveHigh
141Libraryxxxxx.xxxpredictiveMedium
142Libraryxxxx.xxxpredictiveMedium
143Libraryxxxxxxxx/xxx-xxx.xxpredictiveHigh
144Libraryxxxxxxxxxxx/xxx/xxxxxx_xxxx.xxxpredictiveHigh
145Libraryxxx/xxx/xxxxxx/xxxxxxxxxxxxx.xxxxx.xxxpredictiveHigh
146Argumentx:xxxxxxx xxxxxxpredictiveHigh
147ArgumentxxxxxxxxpredictiveMedium
148Argumentxxx_xxxxxxxpredictiveMedium
149Argumentxxx_xxxxxxxxxpredictiveHigh
150ArgumentxxxxxxxxxxpredictiveMedium
151ArgumentxxxxxxxxpredictiveMedium
152ArgumentxxxxxxxpredictiveLow
153ArgumentxxxxxxxpredictiveLow
154Argumentxxxxxxxxx xxxxxxxpredictiveHigh
155ArgumentxxxpredictiveLow
156Argumentxxxxxx xxxxxxxxx xxxxpredictiveHigh
157ArgumentxxxxxxxxxxxxxxxxxxpredictiveHigh
158Argumentxxx_xxxpredictiveLow
159Argumentxxxxx xxxxpredictiveMedium
160ArgumentxxxxxxxxxxxpredictiveMedium
161Argumentxxx_xxxpredictiveLow
162ArgumentxxxxxxxpredictiveLow
163ArgumentxxxxxxxxxpredictiveMedium
164ArgumentxxxxxxxxpredictiveMedium
165ArgumentxxxxxxpredictiveLow
166Argumentxxxxx xxxx/xxxx xxxxpredictiveHigh
167Argumentxx_xxpredictiveLow
168ArgumentxxxxpredictiveLow
169Argumentxxxx/xxpredictiveLow
170ArgumentxxxxxxxxpredictiveMedium
171Argumentxxx_xxxxx_xxxx_xxxxxxxpredictiveHigh
172ArgumentxxxxxxpredictiveLow
173ArgumentxxxxpredictiveLow
174Argumentxxxx_xxxxxpredictiveMedium
175ArgumentxxpredictiveLow
176ArgumentxxxxxpredictiveLow
177Argumentxx[x]predictiveLow
178Argumentxxxxx_xxxxxxxxxxpredictiveHigh
179ArgumentxxxxxxxxxxxxxpredictiveHigh
180ArgumentxxxpredictiveLow
181Argumentxxx_xxxxpredictiveMedium
182ArgumentxxxxpredictiveLow
183Argumentxxxx/xxxxxxxxxxxpredictiveHigh
184Argumentxxxx/xxxxxxxxxxxpredictiveHigh
185Argumentxxxx/xxxxxxxxpredictiveHigh
186ArgumentxxxxxxpredictiveLow
187Argumentxx xxxxxxxpredictiveMedium
188ArgumentxxxxxxxxxpredictiveMedium
189Argumentxxxxx_xx/xxxxxpredictiveHigh
190ArgumentxxxxxxxxxxxxxxxpredictiveHigh
191ArgumentxxxxxxxxpredictiveMedium
192Argumentxx_xxxxpredictiveLow
193Argumentxxxxxxx_xxxxpredictiveMedium
194ArgumentxxxxxxxxxxxxxxxxxxpredictiveHigh
195ArgumentxxxxxxxxxxxxxpredictiveHigh
196Argumentxxxxx_xxxxxxpredictiveMedium
197ArgumentxxxxxxpredictiveLow
198ArgumentxxxxxpredictiveLow
199Argumentxxxxxx_xxxxpredictiveMedium
200ArgumentxxxxxxpredictiveLow
201ArgumentxxxxpredictiveLow
202Argumentxxxxx/xxxxxxxpredictiveHigh
203ArgumentxxxxxxpredictiveLow
204ArgumentxxxxxxxxxxpredictiveMedium
205ArgumentxxxxxxxxpredictiveMedium
206ArgumentxxxxxxxxxpredictiveMedium
207Argumentxxx-xxxxxxxpredictiveMedium
208ArgumentxxxpredictiveLow
209ArgumentxxxxxxpredictiveLow
210ArgumentxxxxxxxxxpredictiveMedium
211ArgumentxxxxpredictiveLow
212ArgumentxxxxxpredictiveLow
213ArgumentxxxxxpredictiveLow
214ArgumentxxxpredictiveLow
215ArgumentxxxpredictiveLow
216Argumentxxxx/xxxxxxxxpredictiveHigh
217ArgumentxxxxxxxxpredictiveMedium
218ArgumentxxxxxxxxpredictiveMedium
219Argumentxxxxxxxx/xxxxxxxxpredictiveHigh
220Argumentxxxxxxxx/xxxxxxxxpredictiveHigh
221Argumentxxxx xxxxxxx xxxxpredictiveHigh
222ArgumentxxxxxpredictiveLow
223Argumentx_xxxxpredictiveLow
224Input Value"><xxxxxx>xxxxx("xxx")</xxxxxx>predictiveHigh
225Input Value%xxpredictiveLow
226Input Value%xx%xx%xx;xxxxxxx%xx%xx;/*predictiveHigh
227Input Value'xx''='predictiveLow
228Input Value../predictiveLow
229Input Value<xxxxxx>xxxxx(x);</xxxxxx>predictiveHigh
230Input Value>"<xxxxxx xxx=xxxx://xxxx.xx>@xxxx.xxpredictiveHigh
231Input Valuexxx%xx(xxxxxx*xxxx(xxxxxx(xxxxx(x)))x)predictiveHigh
232Input Valuexxxx<xxx xxx="" xxxxxxx=xxxxx(x)>predictiveHigh
233Patternxxxxxxxxxxxxx|xx| xxxxxpredictiveHigh

References (8)

The following list contains external sources which discuss the actor and the associated activities:

Do you know our Splunk app?

Download it now for free!