YaBucks Analysis

IOB - Indicator of Behavior (145)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en90
fr34
de22

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Juniper Junos8
Microsoft Windows4
Oracle GlassFish Server4
Linux Kernel4
Pexip Infinity4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemCTIEPSSCVE
1Jalios JCMS ajaxPortal.jsp cross site scripting5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.030.00141CVE-2020-15497
2Microsoft Internet Explorer CORS privileges management5.34.8$5k-$25k$0-$5kProof-of-ConceptNot Defined0.030.00000
3Google Android BitmapExport.java logic error5.55.4$25k-$100k$5k-$25kNot DefinedOfficial Fix0.090.00043CVE-2023-21036
4PHPGurukul Teachers Record Management System Profile Picture changeimage.php unrestricted upload6.05.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.000.00116CVE-2023-3187
5Django URL Parser django.core.urlresolvers.reverse code injection5.34.6$5k-$25k$0-$5kUnprovenOfficial Fix0.070.02344CVE-2014-0472
6Microsoft Internet Explorer Scripting Engine memory corruption7.17.0$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000.03860CVE-2018-8385
7SourceCodester Gadget Works Online Ordering System GET Parameter index.php cross site scripting3.53.2$0-$5k$0-$5kProof-of-ConceptNot Defined0.040.00052CVE-2023-1795
8zsh utils.c checkmailpath memory corruption6.56.4$0-$5k$0-$5kNot DefinedOfficial Fix0.030.00042CVE-2018-1100
9DocuTrac QuicDoc / Office Therapy DTISQLInstaller.exe hard-coded credentials8.88.8$0-$5k$0-$5kNot DefinedNot Defined0.000.00659CVE-2018-5551
10OpenSSH FIDO Authentication improper authentication5.65.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.070.00142CVE-2021-36368
11KNX ETS Group Messages Monitor memory corruption8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.050.11235CVE-2015-8299
12HashiCorp Vault/Vault Enterprise access control7.37.3$0-$5k$0-$5kNot DefinedNot Defined0.040.00092CVE-2022-36129
13Blue Prism Enterprise access control4.74.7$0-$5k$0-$5kNot DefinedNot Defined0.060.00056CVE-2022-36117
14Oracle WebLogic Server Centralized Third Party Jars path traversal9.08.9$25k-$100k$5k-$25kNot DefinedOfficial Fix0.040.00135CVE-2022-23457
15Oracle Middleware Common Libraries and Tools Third Party Patch input validation9.89.6$25k-$100k$5k-$25kNot DefinedOfficial Fix0.030.00581CVE-2021-42575
16Pexip Infinity Epic Telehealth denial of service5.95.8$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00155CVE-2022-27935
17Pexip Infinity H.264 resource consumption5.95.8$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00149CVE-2022-27937
18dbus-broker Exec Line Parser stack-based overflow6.56.4$0-$5k$0-$5kNot DefinedOfficial Fix0.070.00075CVE-2022-31212
19lemonldap-ng x.509 Certificate NG certificate validation6.56.5$0-$5k$0-$5kNot DefinedNot Defined0.030.00071CVE-2020-16093
20OrientDB Server Community Edition Studio cross-site request forgery8.88.6$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00496CVE-2015-2912

IOC - Indicator of Compromise (96)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
13.138.54.87ec2-3-138-54-87.us-east-2.compute.amazonaws.comYaBucks11/02/2022verifiedMedium
23.140.179.210ec2-3-140-179-210.us-east-2.compute.amazonaws.comYaBucks11/02/2022verifiedMedium
33.141.79.17ec2-3-141-79-17.us-east-2.compute.amazonaws.comYaBucks11/02/2022verifiedMedium
43.143.123.90ec2-3-143-123-90.us-east-2.compute.amazonaws.comYaBucks11/02/2022verifiedMedium
53.223.115.185ec2-3-223-115-185.compute-1.amazonaws.comYaBucks11/02/2022verifiedMedium
63.224.108.191ec2-3-224-108-191.compute-1.amazonaws.comYaBucks11/02/2022verifiedMedium
713.70.194.134YaBucks11/02/2022verifiedHigh
818.119.154.66ec2-18-119-154-66.us-east-2.compute.amazonaws.comYaBucks11/02/2022verifiedMedium
918.211.9.206ec2-18-211-9-206.compute-1.amazonaws.comYaBucks11/02/2022verifiedMedium
1023.20.239.12ec2-23-20-239-12.compute-1.amazonaws.comYaBucks11/02/2022verifiedMedium
1123.195.69.108a23-195-69-108.deploy.static.akamaitechnologies.comYaBucks11/02/2022verifiedHigh
1223.202.231.167a23-202-231-167.deploy.static.akamaitechnologies.comYaBucks11/02/2022verifiedHigh
1323.202.231.168a23-202-231-168.deploy.static.akamaitechnologies.comYaBucks11/02/2022verifiedHigh
1423.217.138.108a23-217-138-108.deploy.static.akamaitechnologies.comYaBucks11/02/2022verifiedHigh
1523.246.252.1066a.fc.f617.ip4.static.sl-reverse.comYaBucks11/02/2022verifiedHigh
1634.102.136.180180.136.102.34.bc.googleusercontent.comYaBucks11/02/2022verifiedMedium
1734.117.168.233233.168.117.34.bc.googleusercontent.comYaBucks11/02/2022verifiedMedium
1834.206.145.143ec2-34-206-145-143.compute-1.amazonaws.comYaBucks11/02/2022verifiedMedium
1935.171.109.224ec2-35-171-109-224.compute-1.amazonaws.comYaBucks11/02/2022verifiedMedium
2036.86.63.182YaBucks11/02/2022verifiedHigh
21XX.XX.XXX.Xxxxxxxxxxxxx-xxx.xxxx.xxxx.xxxxxxxxxxxx.xxxXxxxxxx11/02/2022verifiedHigh
22XX.XXX.XX.XXXxxxxxx11/02/2022verifiedHigh
23XX.XX.XXX.XXxx.xxx.xx.xx.xxxx.xxxxxxxxxxxx.xxxXxxxxxx11/02/2022verifiedHigh
24XX.XX.XXX.XXxx.xxx.xx.xx.xxxx.xxxxxxxxxxxx.xxxXxxxxxx11/02/2022verifiedHigh
25XX.XX.XXX.XXxx.xxx.xx.xx.xxxx.xxxxxxxxxxxx.xxxXxxxxxx11/02/2022verifiedHigh
26XX.XX.XXX.XXxx.xxx.xx.xx.xxxx.xxxxxxxxxxxx.xxxXxxxxxx11/02/2022verifiedHigh
27XX.XX.XXX.XXXxxx.xxx.xx.xx.xxxx.xxxxxxxxxxxx.xxxXxxxxxx11/02/2022verifiedHigh
28XX.X.XXX.XXXxxx-xx-x-xxx-xxx.xxxxxxx-x.xxxxxxxxx.xxxXxxxxxx11/02/2022verifiedMedium
29XX.X.X.XXxxx-xx-x-x-xx.xxxxxxx-x.xxxxxxxxx.xxxXxxxxxx11/02/2022verifiedMedium
30XX.XX.XXX.XXXxxx-xx-xx-xxx-xxx.xx-xxxx-x.xxxxxxx.xxxxxxxxx.xxxXxxxxxx11/02/2022verifiedMedium
31XX.XX.XXX.XXXxxx-xx-xx-xxx-xxx.xx-xxxx-x.xxxxxxx.xxxxxxxxx.xxxXxxxxxx11/02/2022verifiedMedium
32XX.XX.XXX.XXxxx-xx-xx-xxx-xx.xx-xxxx-x.xxxxxxx.xxxxxxxxx.xxxXxxxxxx11/02/2022verifiedMedium
33XX.XX.XXX.XXxxx-xx-xx-xxx-xx.xx-xxxx-x.xxxxxxx.xxxxxxxxx.xxxXxxxxxx11/02/2022verifiedMedium
34XX.XX.XXX.XXXxxx-xx-xx-xxx-xxx.xxxxxxx-x.xxxxxxxxx.xxxXxxxxxx11/02/2022verifiedMedium
35XX.XX.XXX.XXXxxx-xx-xx-xxx-xxx.xxxxxxx-x.xxxxxxxxx.xxxXxxxxxx11/02/2022verifiedMedium
36XX.XX.XX.XXXxxx-xx-xx-xx-xxx.xxxxxxx-x.xxxxxxxxx.xxxXxxxxxx11/02/2022verifiedMedium
37XX.XXX.XX.Xxxx-xx-xxx-xx-x.xxxxxxx-x.xxxxxxxxx.xxxXxxxxxx11/02/2022verifiedMedium
38XX.XX.XX.XXXxxx-xx-xx-xx-xxx.xx-xxxx-x.xxxxxxx.xxxxxxxxx.xxxXxxxxxx11/02/2022verifiedMedium
39XX.XX.XX.XXxxx-xx-xx-xx-xx.xxxxxxx-x.xxxxxxxxx.xxxXxxxxxx11/02/2022verifiedMedium
40XX.XXX.XXX.XXXxxx-xx-xxx-xxx-xxx.xxxxxxx-x.xxxxxxxxx.xxxXxxxxxx11/02/2022verifiedMedium
41XX.XXX.XXX.XXXxxx-xx-xxx-xxx-xxx.xxxxxxx-x.xxxxxxxxx.xxxXxxxxxx11/02/2022verifiedMedium
42XX.XXX.XX.XXxxx-xx-xxx-xx-xx.xx-xxxx-x.xxxxxxx.xxxxxxxxx.xxxXxxxxxx11/02/2022verifiedMedium
43XX.XXX.XX.XXxxx-xx-xxx-xx-xx.xx-xxxx-x.xxxxxxx.xxxxxxxxx.xxxXxxxxxx11/02/2022verifiedMedium
44XX.XXX.XX.XXXxxx-xx-xxx-xx-xxx.xxxxxxx-x.xxxxxxxxx.xxxXxxxxxx11/02/2022verifiedMedium
45XX.XXX.XXX.XXXxxx-xx-xxx-xxx-xxx.xxxxxxx-x.xxxxxxxxx.xxxXxxxxxx11/02/2022verifiedMedium
46XX.XXX.XX.XXXxxx-xx-xxx-xx-xxx.xxxxxxx-x.xxxxxxxxx.xxxXxxxxxx11/02/2022verifiedMedium
47XX.XXX.XX.XXXxxx-xx-xxx-xx-xxx.xxxxxxx-x.xxxxxxxxx.xxxXxxxxxx11/02/2022verifiedMedium
48XX.XXX.XXX.XXXxxxxxxxxxxxx-xxx.xxxx.xxxx.xxxxxxxxxxxx.xxxXxxxxxx11/02/2022verifiedHigh
49XX.XX.XXX.XXxx.xx.xxxx.xxxxxx.xxxxxxxxx.xxxXxxxxxx11/02/2022verifiedHigh
50XX.XX.XXX.XXXxxxxxx11/02/2022verifiedHigh
51XX.XX.XXX.XXXxx.xx.xxxx.xxxxxx.xxxxxxxxx.xxxXxxxxxx11/02/2022verifiedHigh
52XX.XXX.XX.XXXxxxxxx11/02/2022verifiedHigh
53XX.XXX.XXX.XXXxx-xxx-xxx-xxx.xxxxxxx-xxx.xx-x.xxxXxxxxxx11/02/2022verifiedHigh
54XX.XXX.XX.XXXxxxxxxxxxxxxxxxxx.xxxxxxxxxxxxxxxxxxxx.xxxXxxxxxx11/02/2022verifiedHigh
55XX.XX.XXX.XXXxxxxxxx.xxxxxxxxx.xxxXxxxxxx11/02/2022verifiedHigh
56XX.XXX.XX.XXXXxxxxxx11/02/2022verifiedHigh
57XX.XX.XXX.XXxx-xx-xxx-xx.xxx.xxx.xxXxxxxxx11/02/2022verifiedHigh
58XXX.XXX.XXX.XXXxx-xxx-xxx.xxxxx.xxxXxxxxxx11/02/2022verifiedHigh
59XXX.XX.XXX.XXXXxxxxxx11/02/2022verifiedHigh
60XXX.XXX.XXX.XXxxxxxx11/02/2022verifiedHigh
61XXX.XX.XXX.XXXxxx-xxx-xx-xxx-xxx.xxxxxxx-x.xxxxxxxxx.xxxXxxxxxx11/02/2022verifiedMedium
62XXX.XXX.XXX.XXxxx.xxxxxxxxxxxxxxxxx.xxxXxxxxxx11/02/2022verifiedHigh
63XXX.X.XXX.XXXxxxxxx11/02/2022verifiedHigh
64XXX.XX.XX.XXxx-xxx-xx-xx-xx.xxxxxxxXxxxxxx11/02/2022verifiedHigh
65XXX.XXX.XX.XXXxxx-xxxxx.xxxxxxx.xxxXxxxxxx11/02/2022verifiedHigh
66XXX.XXX.XX.XXXxxx-xxxxxxx.xxxxxxx.xxxXxxxxxx11/02/2022verifiedHigh
67XXX.XX.XXX.XXXXxxxxxx11/02/2022verifiedHigh
68XXX.XX.XXX.XXxxx.xxx.xx.xxXxxxxxx11/02/2022verifiedHigh
69XXX.XXX.XXX.XXXxxxxxx11/02/2022verifiedHigh
70XXX.XX.XX.XXXxxxxxxx.xxxXxxxxxx11/02/2022verifiedHigh
71XXX.XXX.XXX.XXXXxxxxxx11/02/2022verifiedHigh
72XXX.XXX.XXX.XXxx.xxx.xxx.xxx.xxxx.xxxxxxxxxxxx.xxxXxxxxxx11/02/2022verifiedHigh
73XXX.XXX.XXX.XXxx.xxx.xxx.xxx.xxxx.xxxxxxxxxxxx.xxxXxxxxxx11/02/2022verifiedHigh
74XXX.XXX.XXX.XXxx.xxx.xxx.xxx.xxxx.xxxxxxxxxxxx.xxxXxxxxxx11/02/2022verifiedHigh
75XXX.XXX.XXX.XXxx.xxx.xxx.xxx.xxxx.xxxxxxxxxxxx.xxxXxxxxxx11/02/2022verifiedHigh
76XXX.XXX.XXX.XXxx.xxx.xxx.xxx.xxxx.xxxxxxxxxxxx.xxxXxxxxxx11/02/2022verifiedHigh
77XXX.XXX.XXX.XXxx.xxx.xxx.xxx.xxxx.xxxxxxxxxxxx.xxxXxxxxxx11/02/2022verifiedHigh
78XXX.XX.XXX.XXxxxxxx11/02/2022verifiedHigh
79XXX.XXX.XXX.XXXxxxxxx11/02/2022verifiedHigh
80XXX.XXX.XX.XXXxxxxxxxxxx.xx.xxxxxxx.xxxXxxxxxx11/02/2022verifiedHigh
81XXX.XXX.XX.XXXxxxxxxxxxx.xx.xxxxxxx.xxxXxxxxxx11/02/2022verifiedHigh
82XXX.XXX.XX.XXXxxxxxxxxxx.xx.xxxxxxx.xxxXxxxxxx11/02/2022verifiedHigh
83XXX.XXX.XX.XXXxxxxxxxxxx.xx.xxxxxxx.xxxXxxxxxx11/02/2022verifiedHigh
84XXX.XXX.XXX.XXXxxx-xxx-xxx-xxx.xxxxxxxxxxxx.xxxXxxxxxx11/02/2022verifiedHigh
85XXX.XXX.XXX.XXxxx-xxx-xxx-xx.xxxxxxxxxxxx.xxxXxxxxxx11/02/2022verifiedHigh
86XXX.XX.XXX.XXXXxxxxxx11/02/2022verifiedHigh
87XXX.XXX.XXX.XXXxxxxxx11/02/2022verifiedHigh
88XXX.XXX.XXX.XXXxxxxxx11/02/2022verifiedHigh
89XXX.XX.XXX.XXxxxxx-xxxxxx-xx.xxxxxx.xxxXxxxxxx11/02/2022verifiedHigh
90XXX.XXX.XXX.XXXxxxxxx11/02/2022verifiedHigh
91XXX.XX.XX.XXXxxxxxx11/02/2022verifiedHigh
92XXX.XX.XXX.XXXxxxxxxxxxxxx.xxxxxxxxxxxxxxxx.xxXxxxxxx11/02/2022verifiedHigh
93XXX.XXX.XXX.XXXXxxxxxx11/02/2022verifiedHigh
94XXX.XXX.XX.XXxxxxxxxxxx.xxx.xxxXxxxxxx11/02/2022verifiedHigh
95XXX.XXX.X.XXXxxx-xxx-x-xxx.xxxxxxx-xxx.xx-x.xxxXxxxxxx11/02/2022verifiedHigh
96XXX.XX.XXX.XXXxxxxxx11/02/2022verifiedHigh

TTP - Tactics, Techniques, Procedures (18)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (47)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/admin/products/index.phppredictiveHigh
2File/changeimage.phppredictiveHigh
3File/goform/dir_setWanWifipredictiveHigh
4File/opt/tms/bin/clipredictiveHigh
5File/preferences/tagspredictiveHigh
6File/relax-order-checkspredictiveHigh
7Filexxx/xxpredictiveLow
8Filexxxxxxxxxxxx.xxxxpredictiveHigh
9Filexxxxxxxxxxxxxxxxxx.xxxpredictiveHigh
10Filexxx?xxx=xxxxxpredictiveHigh
11Filexxxxxxxxxxxxx.xxxxpredictiveHigh
12Filexxxxxxxxxxxxxxx.xxxpredictiveHigh
13Filexxxxxxxxxxxxx.xxxpredictiveHigh
14Filexxxxxxx.xxxpredictiveMedium
15Filexxxxxxxxxx/xxxxxxxpredictiveHigh
16Filexx/xxxxxx/xxxxxx.xpredictiveHigh
17Filexx/xxxxx.xpredictiveMedium
18Filexxxxx.xxxpredictiveMedium
19Filexxxxxxxxx/xxxxxx/xxxxxxx_xxxxx_xxxxxx.xxxpredictiveHigh
20Filexxxxx/xxxxxx/xxxxxxxxxx.xxxpredictiveHigh
21Filexxxxxxxx.xpredictiveMedium
22Filexxxx_xxxx.xxpredictiveMedium
23Filexxx_xxx_xxxxxx.xpredictiveHigh
24Filexxxxx-xxxxxx.xpredictiveHigh
25Filexxxxx-xxxxxxx.xpredictiveHigh
26Filexxx_xx_xxxxxx.xxpredictiveHigh
27Filexxxxxxxxxxxxx.xxxpredictiveHigh
28Filexxxxxx_xxxxxxx.xxxpredictiveHigh
29Filexxxxxx/xxxxxxx/xxxxxxxx/xxxx/xxxxxxxxxxxxxxxxxxx.xxxxpredictiveHigh
30Filexxxx/xxx/xxxx-xxxxx.xxxpredictiveHigh
31Filexxxxx.xpredictiveLow
32ArgumentxxxxxxxxxxpredictiveMedium
33Argumentxxxxxx_xxxxx_xxx/xxxxxx_xxxxxpredictiveHigh
34ArgumentxxxpredictiveLow
35ArgumentxxxxxxxpredictiveLow
36Argumentxxxx xxxx/xxxx xxpredictiveHigh
37ArgumentxxxxxxxxpredictiveMedium
38ArgumentxxxxxxxpredictiveLow
39ArgumentxxxxxxpredictiveLow
40ArgumentxxxxxxxxpredictiveMedium
41ArgumentxxxxpredictiveLow
42ArgumentxxxxxxxxxxxxxxxxxxxxpredictiveHigh
43ArgumentxxxxxpredictiveLow
44ArgumentxxxxpredictiveLow
45Input Value<xxxxxx>xxxxx(xxx)</xxxxxx>predictiveHigh
46Input ValuexxxxxpredictiveLow
47Input Valuexxxxx/xxxxxxxxpredictiveHigh

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you want to use VulDB in your project?

Use the official API to access entries easily!