Cape Verde Unknown Analyse

IOB - Indicator of Behavior (32)

Zeitverlauf

Sprache

en16
pt14
es2

Land

pt22
cv6
br4

Akteure

Aktivitäten

Interesse

Zeitverlauf

Typ

Hersteller

Produkt

GitLab Community Edition2
GitLab Enterprise Edition2
Apache HTTP Server2
JIRA2
Zoho ManageEngine ManageEngine OpManager2

Schwachstellen

#SchwachstelleBaseTemp0dayHeuteAusMasEPSSCTICVE
1Redhat Nagios XI Core nagios.upgrade_to_v3.sh erweiterte Rechte6.86.8$0-$5k$0-$5kNot DefinedNot Defined0.000420.00CVE-2013-2029
2Fortinet FortiOS Restore Command erweiterte Rechte3.83.7$0-$5k$0-$5kHighOfficial Fix0.001460.05CVE-2021-44168
3OpenSSH ssh-add Privilege Escalation7.67.5$5k-$25k$0-$5kNot DefinedOfficial Fix0.001060.06CVE-2023-28531
4Wiki.js Storage Module Directory Traversal6.46.3$0-$5k$0-$5kNot DefinedOfficial Fix0.001260.04CVE-2021-43800
5Wiki.js SVG File Cross Site Scripting4.44.4$0-$5k$0-$5kNot DefinedOfficial Fix0.000530.00CVE-2021-25993
6lighttpd mod_extforward Plugin mod_extforward_Forwarded Pufferüberlauf6.36.3$0-$5k$0-$5kNot DefinedNot Defined0.022510.02CVE-2022-22707
7Simple College Website file_put_contents erweiterte Rechte8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.004660.00CVE-2022-40087
8CMSUno central.php file_put_contents erweiterte Rechte5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.007180.03CVE-2021-40889
9Xiaomi Redmi Note 9T/Redmi Note 11 write Pufferüberlauf5.75.7$0-$5k$0-$5kNot DefinedNot Defined0.000890.05CVE-2020-14125
10WSO2 API Manager/IS as Key Manager/Identity Server File Based Service Provider Creation XML External Entity5.55.3$0-$5k$0-$5kNot DefinedOfficial Fix0.021230.07CVE-2021-42646
11Zoho ManageEngine ManageEngine OpManager getmailserversettings SQL Injection6.46.4$0-$5k$0-$5kNot DefinedNot Defined0.002740.00CVE-2017-11559
12Yoast SEO Plugin REST Endpoint posts Information Disclosure3.53.4$0-$5k$0-$5kNot DefinedOfficial Fix0.001230.06CVE-2021-25118
13WordPress wp_die Information Disclosure4.54.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.000930.06CVE-2021-39200
14WordPress SQL Injection6.86.7$5k-$25k$0-$5kNot DefinedOfficial Fix0.004670.06CVE-2022-21664
15pac-resolver PAC File Remote Code Execution5.65.4$0-$5k$0-$5kNot DefinedOfficial Fix0.004330.05CVE-2021-23406
16Oracle Blockchain Platform BCS Console erweiterte Rechte7.37.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.003310.00CVE-2019-10086
17GitLab Community Edition/Enterprise Edition OmniAuth schwache Authentisierung8.28.0$0-$5k$0-$5kNot DefinedOfficial Fix0.244550.00CVE-2022-1162
18Fortinet FortiOS TFTP Client Pufferüberlauf7.06.8$0-$5k$0-$5kNot DefinedOfficial Fix0.000420.04CVE-2021-42757
19Apache Directory Studio SASL Authentication schwache Verschlüsselung3.13.1$0-$5k$5k-$25kNot DefinedNot Defined0.000550.00CVE-2021-33900
20JIRA picker Username erweiterte Rechte5.35.2$0-$5k$0-$5kNot DefinedOfficial Fix0.003790.03CVE-2019-3403

IOC - Indicator of Compromise (19)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (11)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (12)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDKlasseIndicatorTypAkzeptanz
1File.htaccessprädiktivMedium
2File/api/json/admin/getmailserversettingsprädiktivHigh
3File/xxxx/xxx/x/xxxx/xxxxxxprädiktivHigh
4Filexxxxxx.xxxxxxx_xx_xx.xxprädiktivHigh
5Filexxxx/xxxxxprädiktivMedium
6Filexx/xx/xxxxxprädiktivMedium
7File{xxxxxxx}/xxx/xxxxxxx.xxxprädiktivHigh
8ArgumentxxxxxxprädiktivLow
9ArgumentxxxxprädiktivLow
10ArgumentxxxxxxprädiktivLow
11Pattern|xx xx xx xx|prädiktivHigh
12Network Portxxx/xx (xxxxxx)prädiktivHigh

Referenzen (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you want to use VulDB in your project?

Use the official API to access entries easily!