Vollgar Analysis

IOB - Indicator of Behavior (49)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en42
zh8

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

us36
cn14

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Apple watchOS4
Measuresoft ScadaPro Server4
Wowza Streaming Engine2
Honda Vehicle2
Trend Micro Apex One2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemCTIEPSSCVE
1All in One SEO Best WordPress SEO Plugin Import/Export code injection5.55.3$0-$5k$0-$5kNot DefinedOfficial Fix0.040.01440CVE-2021-24307
2Odoo Database Anonymization data processing5.65.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.010.03908CVE-2017-10803
3Trend Micro Apex One out-of-bounds7.67.5$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00885CVE-2022-44649
4Sophos Mobile Managed On-Premises XML server-side request forgery8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.000.01086CVE-2022-3980
5iPXE TLS tls.c tls_new_ciphertext information exposure3.23.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00885CVE-2022-4087
6Dolibarr sql injection7.87.8$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00885CVE-2022-4093
7nginx request smuggling6.96.9$0-$5k$0-$5kNot DefinedNot Defined6.850.00000CVE-2020-12440
8Insyde Kernel UEFI Variable stack-based overflow7.87.8$0-$5k$0-$5kNot DefinedNot Defined0.020.01005CVE-2022-35897
9Trend Micro Apex One Change Prevention Service memory corruption7.67.5$5k-$25k$5k-$25kNot DefinedOfficial Fix0.020.00885CVE-2022-44650
10Atlassian Bitbucket Server and Data Center Environment Variable command injection7.47.4$0-$5k$0-$5kNot DefinedNot Defined0.000.01440CVE-2022-43781
11Trend Micro Apex One Security Agent toctou7.57.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.020.00885CVE-2022-44651
12LG SmartShare uncontrolled search path7.07.0$5k-$25k$5k-$25kNot DefinedNot Defined0.000.00885CVE-2022-45422
13WP-Polls Plugin HTTP Header authorization6.36.0$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.040.00885CVE-2022-1581
14Apple watchOS ImageIO out-of-bounds5.45.3$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.000.01213CVE-2016-3619
15D-Link G integrated Access Device4 Web Interface login.asp authorization5.75.7$5k-$25k$5k-$25kNot DefinedNot Defined0.000.00885CVE-2022-36785
16Trend Micro Apex One exceptional condition8.38.1$5k-$25k$5k-$25kNot DefinedOfficial Fix0.020.00885CVE-2022-44652
17Trend Micro Apex One Security Agent pathname traversal8.38.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00885CVE-2022-44653
18Apple tvOS ImageIO out-of-bounds5.45.3$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.000.01213CVE-2016-3619
19Qualcomm Snapdragon Consumer IOT memory corruption9.89.6$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000.00885CVE-2022-25727
20Apple watchOS Kernel integer overflow8.07.8$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.000.01402CVE-2017-2440

IOC - Indicator of Compromise (12)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (9)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueVulnerabilitiesAccess VectorTypeConfidence
1T1006CWE-21, CWE-22Pathname TraversalpredictiveHigh
2T1059CWE-94Cross Site ScriptingpredictiveHigh
3TXXXX.XXXCWE-XXXxxxx Xxxx XxxxxxxxxpredictiveHigh
4TXXXXCWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveHigh
5TXXXXCWE-XX, CWE-XXXxxxxxx XxxxxxxxxpredictiveHigh
6TXXXX.XXXCWE-XXXXxxx XxxxxxxxpredictiveHigh
7TXXXXCWE-XXXxx XxxxxxxxxpredictiveHigh
8TXXXXCWE-XXXXxxxxxxxx Xxxxxx XxxxpredictiveHigh
9TXXXXCWE-XXX, CWE-XXXXxxxxxxxxxxxxpredictiveHigh

IOA - Indicator of Attack (23)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/wp-content/plugins/emag-marketplace-connector/templates/order/awb-meta-box.phppredictiveHigh
2Filedata/gbconfiguration.datpredictiveHigh
3Filegoto.phppredictiveMedium
4Filexxx/xxxxxx.xxxpredictiveHigh
5Filexxxxx.xxx/xxxx/xxxxx/xxxx/xxxx.xxxpredictiveHigh
6Filexxx/xxx.xpredictiveMedium
7Filexxxxx.xxxpredictiveMedium
8Filexxx.xxxpredictiveLow
9Filexxx/xxx/xxx.xpredictiveHigh
10Filexxxxxx.xxxpredictiveMedium
11Libraryxxx/xx.xxxpredictiveMedium
12Libraryxxxxxxx/xxxxxxx/xxxxxx/xxx/xxxxx.xxxxxxx.xxxpredictiveHigh
13ArgumentxxxxxxxxpredictiveMedium
14ArgumentxxxxxpredictiveLow
15ArgumentxxxxxpredictiveLow
16ArgumentxxpredictiveLow
17Argumentxxx_xxxpredictiveLow
18ArgumentxxxxpredictiveLow
19Argumentxxxxxx_xxxxpredictiveMedium
20ArgumentxxxxpredictiveLow
21ArgumentxxxpredictiveLow
22ArgumentxxxpredictiveLow
23ArgumentxxxxxxxxpredictiveMedium

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Interested in the pricing of exploits?

See the underground prices here!