Babar Analyse

IOB - Indicator of Behavior (30)

Zeitverlauf

Sprache

en30

Land

Akteure

Aktivitäten

Interesse

Zeitverlauf

Typ

Hersteller

Produkt

SonicWALL AntiSpam 2
SonicWALL EMail Security Appliance2
Incredible Interactive Dragonfly Commerce2
Thomas R. Pasawicz HyperBook Guestbook2
ZyXEL P660HN-T v12

Schwachstellen

#SchwachstelleBaseTemp0dayHeuteAusMasCTIEPSSCVE
1Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash Information Disclosure5.35.2$5k-$25k$0-$5kHighWorkaround0.020.02016CVE-2007-1192
2MailEnable Enterprise Premium XML Data XML External Entity8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.040.00224CVE-2019-12924
3SonicWALL AntiSpam / EMail Security Appliance MTA Queue Report Module reports_mta_queue_status.html Cross Site Scripting8.07.6$0-$5k$0-$5kNot DefinedOfficial Fix0.020.00000
4WoltLab Burning Book addentry.php SQL Injection7.36.8$0-$5k$0-$5kFunctionalUnavailable0.020.00804CVE-2006-5509
5DZCP deV!L`z Clanportal config.php erweiterte Rechte7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.540.00943CVE-2010-0966
6Kubernetes kubelet pprof Information Disclosure7.37.2$0-$5k$0-$5kNot DefinedOfficial Fix0.090.53513CVE-2019-11248
7D-Link DIR-815 POST Request soapcgi_main Privilege Escalation8.07.9$5k-$25k$5k-$25kNot DefinedNot Defined0.020.00317CVE-2023-51123
8Schneider Electric Modicon M218 Logic Controller Service Port 1105 Denial of Service3.53.4$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00071CVE-2021-22800
9TETRA TEA1 Keystream Generator Tetraburst Remote Code Execution8.48.4$0-$5k$0-$5kNot DefinedNot Defined0.020.00048CVE-2022-24402
10TETRA Air Interface Encryption Tetraburst unbekannte Schwachstelle5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.000.00048CVE-2022-24404
11Citrix ADC/Gateway Cross Site Scripting4.34.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.010.03845CVE-2023-24488
12ZyXEL P660HN-T v1 ViewLog.asp erweiterte Rechte7.36.4$5k-$25k$0-$5kProof-of-ConceptWorkaround0.020.00000
13Microsoft Exchange Server Email erweiterte Rechte8.47.8$25k-$100k$0-$5kFunctionalOfficial Fix0.000.55670CVE-2020-16875
14Carbonize Lazarus Guestbook template.class.php erweiterte Rechte9.88.8$0-$5kWird berechnetProof-of-ConceptOfficial Fix0.000.04617CVE-2007-1486
15Microsoft IIS Log File Permission Information Disclosure5.34.8$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.050.00042CVE-2012-2531
16Apache HTTP Server mod_cache Denial of Service5.34.6$5k-$25k$0-$5kUnprovenOfficial Fix0.010.04147CVE-2013-4352
17Host Web Server phpinfo.php phpinfo Information Disclosure5.35.2$5k-$25k$0-$5kNot DefinedWorkaround0.080.00000
18Lars Ellingsen Guestserver guestbook.cgi Cross Site Scripting4.34.3$0-$5k$0-$5kNot DefinedNot Defined0.060.00169CVE-2005-4222
19McAfee Network Security Management Command Line Interface Information Disclosure5.95.7$0-$5kWird berechnetNot DefinedOfficial Fix0.000.00042CVE-2020-7284
20Incredible Interactive Dragonfly Commerce Administration dc_categorieslist.asp Stored unbekannte Schwachstelle5.35.1$0-$5kWird berechnetNot DefinedOfficial Fix0.020.00581CVE-2005-2220

IOC - Indicator of Compromise (15)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (6)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueSchwachstellenZugriffsartTypAkzeptanz
1T1059CWE-94Argument InjectionprädiktivHigh
2T1059.007CWE-79, CWE-80Cross Site ScriptingprädiktivHigh
3TXXXXCWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxprädiktivHigh
4TXXXXCWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx XxxxxxxxxprädiktivHigh
5TXXXXCWE-XXXxx XxxxxxxxxprädiktivHigh
6TXXXXCWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxprädiktivHigh

IOA - Indicator of Attack (19)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDKlasseIndicatorTypAkzeptanz
1File/debug/pprofprädiktivMedium
2Fileaddentry.phpprädiktivMedium
3Filedata/gbconfiguration.datprädiktivHigh
4Filexx_xxxxxxxxxxxxxx.xxxprädiktivHigh
5Filexxxxxxxx_xxxxxxxxx_xxxxx.xxxprädiktivHigh
6Filexxxxxxxxx.xxxprädiktivHigh
7Filexxx/xxxxxx.xxxprädiktivHigh
8Filexxxxxxx.xxxprädiktivMedium
9Filexxxxxxx_xxx_xxxxx_xxxxxx.xxxxprädiktivHigh
10Filexxxxxxxx.xxxxx.xxxprädiktivHigh
11Filexxxxxxx.xxxprädiktivMedium
12ArgumentxxxxxxxxprädiktivMedium
13Argumentxxxxx_xxprädiktivMedium
14ArgumentxxxxxxxprädiktivLow
15ArgumentxxxxxxxxxprädiktivMedium
16ArgumentxxxxxxxxprädiktivMedium
17Argumentxxxxxx_xxxxprädiktivMedium
18ArgumentxxxxxxxprädiktivLow
19Input Value%xxxxxx+-x+x+xx.x.xx.xxx%xx%xxprädiktivHigh

Referenzen (2)

The following list contains external sources which discuss the actor and the associated activities:

Might our Artificial Intelligence support you?

Check our Alexa App!