Sector Agriculture

Timeframe: -28 days

Default Categories (49): Accounting Software, Anti-Malware Software, Anti-Spam Software, Appointment Software, Automation Software, Backup Software, Calendar Software, Chip Software, Communications System, Content Management System, Customer Relationship Management System, Database Software, Document Management Software, Document Processing Software, Document Reader Software, Enterprise Resource Planning Software, File Compression Software, File Transfer Software, Financial Software, Firewall Software, Firmware Software, Hardware Driver Software, Image Processing Software, Information Management Software, Mail Client Software, Mail Server Software, Network Attached Storage Software, Network Camera Software, Network Encryption Software, Network Routing Software, Office Suite Software, Operating System, Photo Gallery Software, Presentation Software, Printing Software, Project Management Software, Router Operating System, SCADA Software, Server Management Software, Service Management Software, Spreadsheet Software, Supplier Relationship Management Software, Supply Chain Management Software, Transport Management Software, Video Surveillance Software, Warehouse Management System Software, Web Browser, Web Server, Word Processing Software

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Linux Kernel292
Adobe Experience Manager144
Apple macOS50
Google Chrome46
Microsoft Windows42

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Remediation

Official Fix748
Temporary Fix0
Workaround0
Unavailable0
Not Defined60

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Exploitability

High0
Functional0
Proof-of-Concept14
Unproven36
Not Defined758

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Access Vector

Not Defined0
Physical4
Local80
Adjacent312
Network412

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Authentication

Not Defined0
High14
Low582
None212

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

User Interaction

Not Defined0
Required316
None492

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

C3BM Index

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

CVSSv3 Base

≤10
≤22
≤316
≤456
≤5266
≤6172
≤7118
≤8142
≤928
≤108

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

CVSSv3 Temp

≤10
≤22
≤318
≤458
≤5264
≤6230
≤788
≤8128
≤912
≤108

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

VulDB

≤10
≤22
≤322
≤4206
≤5140
≤6168
≤7108
≤8134
≤920
≤108

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

NVD

≤1714
≤20
≤30
≤40
≤52
≤628
≤722
≤816
≤924
≤102

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

CNA

≤1490
≤22
≤30
≤410
≤524
≤6154
≤734
≤860
≤924
≤1010

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

≤1764
≤20
≤30
≤40
≤52
≤62
≤710
≤822
≤98
≤100

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Exploit 0-day

<1k20
<2k110
<5k176
<10k270
<25k140
<50k74
<100k16
≥100k2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Exploit Today

<1k336
<2k184
<5k132
<10k72
<25k76
<50k8
<100k0
≥100k0

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Exploit Market Volume

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

IOB - Indicator of Behavior (1000)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en756
de76
ja48
fr34
es28

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Linux Kernel40
Microsoft Windows8
Apache HTTP Server8
Mozilla Firefox8
Artifex Ghostscript6

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
17-Zip NTFS NtfsHandler.cpp heap-based overflow6.36.0$2k-$5k$0-$1kNot DefinedOfficial Fix0.000451.26CVE-2023-52168
2y_project RuoYi Content-Type isJsonRequest cross site scripting3.53.3$1k-$2k$0-$1kProof-of-ConceptNot Defined0.000452.36CVE-2024-6511
3Apache HTTP Server AddType source code5.35.1$10k-$25k$2k-$5kNot DefinedOfficial Fix0.000432.57CVE-2024-39884
4Linux Kernel starfive stack-based overflow8.07.6$10k-$25k$2k-$5kNot DefinedOfficial Fix0.000430.63CVE-2024-39478
5Linux Kernel kdb memcpy buffer overflow8.07.6$10k-$25k$2k-$5kNot DefinedOfficial Fix0.000440.42CVE-2024-39480
6Linux Kernel async list_del_init Privilege Escalation5.55.3$5k-$10k$1k-$2kNot DefinedOfficial Fix0.000450.32CVE-2024-39485
7Linux Kernel ipc4-topology null pointer dereference5.75.5$5k-$10k$0-$1kNot DefinedOfficial Fix0.000450.26CVE-2024-39473
8Linux Kernel davinci Privilege Escalation5.55.3$5k-$10k$1k-$2kNot DefinedOfficial Fix0.000440.42CVE-2024-39484
9Linux Kernel injection5.55.3$5k-$10k$2k-$5kNot DefinedOfficial Fix0.000450.37CVE-2024-39483
10Linux Kernel xfs memory corruption5.55.3$5k-$10k$1k-$2kNot DefinedOfficial Fix0.000430.48CVE-2024-39472
11jc21 NGINX Proxy Manager DNS Provider Configuration certificate.js os command injection5.55.3$1k-$2k$0-$1kNot DefinedOfficial Fix0.000450.32CVE-2024-39935
12Linux Kernel media_pipeline_start denial of service5.75.5$5k-$10k$1k-$2kNot DefinedOfficial Fix0.000450.32CVE-2024-39481
137-Zip NTFS NtfsHandler.cpp out-of-bounds4.34.1$1k-$2k$0-$1kNot DefinedOfficial Fix0.000450.16CVE-2023-52169
14Linux Kernel vmalloc __vmalloc_area_node null pointer dereference4.84.6$5k-$10k$1k-$2kNot DefinedOfficial Fix0.000450.42CVE-2024-39474
15Linux Kernel bcache btree_iter out-of-bounds3.53.4$5k-$10k$1k-$2kNot DefinedOfficial Fix0.000440.21CVE-2024-39482
16Exim Multiline RFC 2231 Header Filename protection mechanism6.36.0$2k-$5k$0-$1kNot DefinedOfficial Fix0.000450.26CVE-2024-39929
17Linux Kernel hugetlb __unmap_hugepage_range allocation of resources3.53.4$5k-$10k$0-$1kNot DefinedOfficial Fix0.000430.37CVE-2024-39477
18Linux Kernel fbdev savagefb_probe divide by zero5.75.5$5k-$10k$1k-$2kNot DefinedOfficial Fix0.000440.32CVE-2024-39475
19Linux Kernel drm_file drm_file_update_pid use after free7.16.8$10k-$25k$5k-$10kNot DefinedOfficial Fix0.000000.74CVE-2024-39486
20WpDevArt Responsive Image Gallery, Gallery Album Plugin authorization5.45.3$1k-$2k$1k-$2kNot DefinedNot Defined0.000000.68CVE-2024-37542

IOC - Indicator of Compromise (47)

These indicators of compromise highlight associated network ranges which are known to be part of research and attack activities.

IDIP rangeActorTypeConfidence
12.58.56.0/24RecordBreakerpredictiveHigh
25.255.124.0/24IcedIDpredictiveHigh
323.137.248.0/24ResponderpredictiveHigh
423.154.177.0/24B1txor20predictiveHigh
523.239.16.0/24NSO GrouppredictiveHigh
6XX.XX.XXX.X/XXXxxxxx XxxpredictiveHigh
7XX.XX.XXX.X/XXXxxxxxxxpredictiveHigh
8XX.XXX.XXX.X/XXXxxxxpredictiveHigh
9XX.XXX.XX.X/XXXxxxxxxxpredictiveHigh
10XX.XXX.XXX.X/XXXxxxxxx XxxxxxxpredictiveHigh
11XX.XXX.XXX.X/XXXxxxxxxxxxxxxpredictiveHigh
12XX.XX.XXX.X/XXXxxxxxpredictiveHigh
13XX.XX.XXX.X/XXXxxxxxxxpredictiveHigh
14XX.XXX.XXX.X/XXXxxxxxxpredictiveHigh
15XX.XXX.XX.X/XXXxxxxxxxx XxxxxxpredictiveHigh
16XX.XX.XXX.X/XXXxxxxxxxpredictiveHigh
17XX.XX.XXX.X/XXXxxxxxxxpredictiveHigh
18XX.XXX.X.X/XXXxxxpredictiveHigh
19XX.XXX.XXX.X/XXXxxxxx XxxxxxpredictiveHigh
20XX.XX.XX.X/XXXxxxxxxpredictiveHigh
21XX.XX.XXX.X/XXXxxxxxxpredictiveHigh
22XX.XX.XXX.X/XXXxxxxxxxpredictiveHigh
23XX.XXX.XXX.X/XXXxxxxxxxpredictiveHigh
24XX.XXX.X.X/XXXxxxxxxxxxxpredictiveHigh
25XXX.XXX.XXX.X/XXXxxxxxxxxxxxxxxpredictiveHigh
26XXX.XX.XXX.X/XXXxxxxpredictiveHigh
27XXX.XXX.X.X/XXXxxxxxxxxpredictiveHigh
28XXX.XXX.X.X/XXXxxxxx XxxxxxpredictiveHigh
29XXX.XXX.X.X/XXXxxxxxxxpredictiveHigh
30XXX.XXX.X.X/XXXxxxxxxxxpredictiveHigh
31XXX.XXX.X.X/XXXxxxxx XxxxxxpredictiveHigh
32XXX.XX.XXX.X/XXXxxxxxpredictiveHigh
33XXX.XXX.XXX.X/XXXxxxxx XxxxxxpredictiveHigh
34XXX.XX.XXX.X/XXXxxxxxxxpredictiveHigh
35XXX.XX.XX.X/XXXxxxxx XxxxxxpredictiveHigh
36XXX.XX.XXX.X/XXXxxxxxxxpredictiveHigh
37XXX.XXX.XXX.X/XXXxxxxxxxx XxxxxxpredictiveHigh
38XXX.XX.XXX.X/XXXxxxxxxxpredictiveHigh
39XXX.XX.X.X/XXXxxxxxpredictiveHigh
40XXX.XXX.XXX.X/XXXxxxxx XxxpredictiveHigh
41XXX.XXX.XXX.X/XXXxxxx XxxxxxxpredictiveHigh
42XXX.XXX.XXX.X/XXXxxxxxxxpredictiveHigh
43XXX.XXX.XXX.X/XXXxxxxxxxpredictiveHigh
44XXX.XXX.XXX.X/XXXxxxxxxxpredictiveHigh
45XXX.XX.XX.X/XXXxxxxpredictiveHigh
46XXX.XXX.XXX.X/XXXxxxxx XxxxxxpredictiveHigh
47XXX.XXX.XX.X/XXXxxxxxpredictiveHigh

TTP - Tactics, Techniques, Procedures (24)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueClassVulnerabilitiesAccess VectorTypeConfidence
1T1006CAPEC-126CWE-22, CWE-425Path TraversalpredictiveHigh
2T1040CAPEC-102CWE-319Authentication Bypass by Capture-replaypredictiveHigh
3T1055CAPEC-10CWE-74Improper Neutralization of Data within XPath ExpressionspredictiveHigh
4T1059CAPEC-242CWE-94Argument InjectionpredictiveHigh
5T1059.007CAPEC-209CWE-79Cross Site ScriptingpredictiveHigh
6TXXXXCAPEC-19CWE-XXX, CWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveHigh
7TXXXX.XXXCAPEC-CWE-XXXXxx Xx Xxxx-xxxxx XxxxxxxxpredictiveHigh
8TXXXXCAPEC-150CWE-XXXXxxx Xxx Xxxxxxxxx Xxxxxxxxxxx XxxxxxxxpredictiveHigh
9TXXXX.XXXCAPEC-191CWE-XXXXxxx-xxxxx XxxxxxxxxxxpredictiveHigh
10TXXXXCAPEC-136CWE-XX, CWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx XxxxxxxxxpredictiveHigh
11TXXXX.XXXCAPEC-178CWE-XXXXxxx XxxxxxxxpredictiveHigh
12TXXXXCAPEC-1CWE-XXX, CWE-XXXXxxxxxxxxx XxxxxxpredictiveHigh
13TXXXXCAPEC-184CWE-XXXXxxxxxxx Xx Xxxx Xxxxxxx Xxxxxxxxx XxxxxpredictiveHigh
14TXXXXCAPEC-108CWE-XXXxx XxxxxxxxxpredictiveHigh
15TXXXX.XXXCAPEC-1CWE-XXXXxxxxxxx XxxxxxxxxxxxxpredictiveHigh
16TXXXXCAPEC-55CWE-XXXXxxxxxxxxxx XxxxxxxxxxpredictiveHigh
17TXXXX.XXXCAPEC-154CWE-XXXXxxxxxxxxxxxpredictiveHigh
18TXXXX.XXXCAPEC-CWE-XXXXxxxxxxx Xxxxxx XxxxpredictiveHigh
19TXXXX.XXXCAPEC-459CWE-XXXXxxxxxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveHigh
20TXXXXCAPEC-116CWE-XXX, CWE-XXX, CWE-XXX, CWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveHigh
21TXXXXCAPEC-20CWE-XXXXxxxxxxxxxxxx XxxxxxpredictiveHigh
22TXXXX.XXXCAPEC-112CWE-XXX, CWE-XXXXxx Xxxxxxxxxx XxxxxpredictiveHigh
23TXXXX.XXXCAPEC-1CWE-XXXXxxxxxxxxx Xxxxxxxxxxxxxx Xx Xxxxxxxx Xxxx XxxxxxxxxpredictiveHigh
24TXXXXCAPEC-CWE-XXXXxxxxxxxxxx XxxxxxpredictiveHigh

IOA - Indicator of Attack (97)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/asn1/ber_encoder.cpredictiveHigh
2File/dev/vdbpredictiveMedium
3File/etc/passwdpredictiveMedium
4File/proc/net/ptypepredictiveHigh
5File/proc/sys/kernel/hung_task_timeout_secspredictiveHigh
6File/proc/vmallocinfopredictiveHigh
7File/proxypredictiveLow
8File/sys/class/net/bonding_masterspredictiveHigh
9File/sys/kernel/config/nullb/nullb0predictiveHigh
10File/tmp/outpredictiveMedium
11File/TS/export/pagedefinitionpredictiveHigh
12Filearch/x86/kvm/vmx/vmx.cpredictiveHigh
13Filearch/x86/kvm/x86.cpredictiveHigh
14Filexxxxxxx/xxxxxxxx/xxxxxxxxxxx.xxpredictiveHigh
15Filexxxxx/xxx-xxxxxx.xpredictiveHigh
16Filexxxxxxx.xpredictiveMedium
17Filexxxxx.xxxxpredictiveMedium
18Filexxxxxxx/xxx/xxx/xxx-xxxxxxx-xxx.xpredictiveHigh
19Filexxxxxxx/xxx/xxx/xxx-xxxxxxxxxxx.xpredictiveHigh
20Filexxxxxxx/xxxx/xxxx/xxxxx.xpredictiveHigh
21Filexxxxxxx/xxx/xxxxxx/xxxxxx_xxxx.xpredictiveHigh
22Filexxxxxxx/xxx/xxxx/xxxxxx.xpredictiveHigh
23Filexxxxxxx/xxx/xxxx/xxx.xpredictiveHigh
24Filexxxxxxx.xxxpredictiveMedium
25Filexxxx_xxxxxx.xpredictiveHigh
26Filexxxxx/xxxxpredictiveMedium
27Filexx/xxxxx/xxxxx.xpredictiveHigh
28Filexx/xxxx/xxxx.xpredictiveHigh
29Filexx/xxxx/xxx.xpredictiveHigh
30Filexx/xxxxxx/xxx.xpredictiveHigh
31Filexx/xxxxxxx.xpredictiveMedium
32Filexx/xxxxx/xxxxx.xpredictiveHigh
33Filexxxxx.xpredictiveLow
34Filexx/xxxxxxxxxpredictiveMedium
35Filexxxxxx/xxx/xxx_xxxxxxxxx.xpredictiveHigh
36Filexxxxxx/xxx/xxxxxx.xpredictiveHigh
37Filexxxxxx/xxxxxxx/xxxxx.xpredictiveHigh
38Filexxxxxx/xxxxx/xxxx_xxxxxx.xpredictiveHigh
39Filexxxx/xx.xxpredictiveMedium
40Filexxxxxxx.xxxpredictiveMedium
41Filexxx/xxxx/xxx.xpredictiveHigh
42Filexxx/xxxx/xxxx.xpredictiveHigh
43Filexxx/xxxxxxx/xxxx.xpredictiveHigh
44Filexxx/xxxx/xx_xxxx.xpredictiveHigh
45Filexxx/xxxxxxxxx/xxxxxxxxx_xxxxx.xpredictiveHigh
46Filexxx/xxx/xxx_xxxx.xpredictiveHigh
47Filexxxxxxxxxxx.xxxpredictiveHigh
48Filexxxxxxx.xxxpredictiveMedium
49Filexxxxxxxxx.xpredictiveMedium
50Filexxx.xpredictiveLow
51Filexx/xxxxxx/xxxxxxxxxxxpredictiveHigh
52Filexxx.xpredictiveLow
53Library/xxxx/xxx/xxxxxxx/xxx/xxxxxxxx.xpredictiveHigh
54Library/xxxxxxx/xxxxx/xxxx.xpredictiveHigh
55Libraryxxxxxxx/xxxxx/xxxxxxx-xxxxxx.xpredictiveHigh
56Libraryxxxxxxx/xxxxx/xxxxxx.xpredictiveHigh
57Libraryxxxxxxx/xxxxx/xxxx.xpredictiveHigh
58Libraryxxxxxxx/xxxxx/xxxxxx.xpredictiveHigh
59Libraryxxx/xxxx_xxxxxx.xpredictiveHigh
60Libraryxxx/xxxxxxxxxxxx.xpredictiveHigh
61Libraryxxx/xxx_xxxx.xpredictiveHigh
62Libraryxxx/xxxx_xxx.xpredictiveHigh
63Libraryxxxxx/./xxxxxxx/xxx/xx/xxxxxx.xpredictiveHigh
64Libraryxxx/xxxxxx/xx_xxxxxxx.xpredictiveHigh
65Libraryxxxxxx.xxxpredictiveMedium
66Argumentxxxxxxxxxxxxx/xxxxxxxxxxxxxpredictiveHigh
67Argumentxxxxxx/xxxxxx_xxxpredictiveHigh
68ArgumentxxxpredictiveLow
69ArgumentxxxxxpredictiveLow
70ArgumentxxxpredictiveLow
71Argumentxxxxxxxxxxxxxx.xxxxpredictiveHigh
72Argumentxxxxxx xxxxpredictiveMedium
73ArgumentxxxxxxxxpredictiveMedium
74Argumentxxxxx/xxxxxpredictiveMedium
75ArgumentxxxxpredictiveLow
76Argumentxxxxxxxxx/xxxxxxxxxpredictiveHigh
77ArgumentxxxxpredictiveLow
78Argumentxxxxxxxxxxx.xxxxxxx_xxxxpredictiveHigh
79Argumentx_xxxxpredictiveLow
80ArgumentxxpredictiveLow
81ArgumentxxpredictiveLow
82ArgumentxxxxxxxxxxpredictiveMedium
83Argumentxxxxx xxxxxpredictiveMedium
84ArgumentxxxxxxpredictiveLow
85ArgumentxxxxxxxxpredictiveMedium
86ArgumentxxxxpredictiveLow
87Argumentxxxxx[]predictiveLow
88ArgumentxxxpredictiveLow
89Argumentxxxx.xxxxxxx_xxxpredictiveHigh
90ArgumentxxxxxxxxpredictiveMedium
91ArgumentxxxxxxxxxxxxxxpredictiveHigh
92ArgumentxxxpredictiveLow
93ArgumentxxxxxxpredictiveLow
94Argumentxxxx_xxxxxxxpredictiveMedium
95ArgumentxxxxpredictiveLow
96ArgumentxxxxxxxxxxxxxxpredictiveHigh
97Argumentx-xxxxx-xxxxxxxpredictiveHigh

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!