FontOnLake Analyse

IOB - Indicator of Behavior (36)

Zeitverlauf

Sprache

en22
zh12
ko2

Land

cn32
us4

Akteure

Aktivitäten

Interesse

Zeitverlauf

Typ

Hersteller

Produkt

ExifTool2
Google Chrome2
Dropbear SSH2
AnyMacro AnyMacro Mail System2
Penta WAPPLES2

Schwachstellen

#SchwachstelleBaseTemp0dayHeuteAusMasEPSSCTICVE
1Penta WAPPLES erweiterte Rechte7.57.5$0-$5k$0-$5kNot DefinedNot Defined0.000870.00CVE-2022-35582
2GNU binutils BFD Library opncls.c bfd_zalloc Pufferüberlauf4.44.4$0-$5k$0-$5kNot DefinedNot Defined0.001320.03CVE-2018-17359
3UUSee UUPlayer ActiveX control ActiveX Control erweiterte Rechte9.89.8$0-$5k$0-$5kNot DefinedNot Defined0.010630.00CVE-2011-2590
4Oracle MySQL Server Client programs Privilege Escalation7.16.9$5k-$25k$0-$5kNot DefinedOfficial Fix0.000950.03CVE-2023-21980
5Penta WAPPLES Fehlkonfiguration7.07.0$0-$5k$0-$5kNot DefinedNot Defined0.000440.00CVE-2022-31322
6Spring Boot Admins Notifier env erweiterte Rechte7.57.4$0-$5k$0-$5kNot DefinedOfficial Fix0.002620.02CVE-2022-46166
7Apache Commons FileUpload Request Part Denial of Service5.55.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.033590.00CVE-2023-24998
8redis-py Async Command Information Disclosure4.03.9$0-$5k$0-$5kNot DefinedOfficial Fix0.000950.02CVE-2023-28858
9Microsoft Windows Win32k Local Privilege Escalation7.87.4$25k-$100k$0-$5kHighOfficial Fix0.003500.21CVE-2021-1732
10Microsoft Windows L2TP Privilege Escalation7.87.3$25k-$100k$5k-$25kUnprovenOfficial Fix0.008270.02CVE-2022-30211
11ZStack REST API erweiterte Rechte5.65.4$0-$5k$0-$5kNot DefinedOfficial Fix0.004820.00CVE-2021-32836
12ZhongBangKeJi CRMEB UploadService.php Getshell erweiterte Rechte5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.003090.02CVE-2020-21787
13WP Fastest Cache Directory Traversal3.83.7$0-$5k$0-$5kNot DefinedOfficial Fix0.002940.00CVE-2021-20714
14Atlassian Bamboo Double OGNL Evaluation Java erweiterte Rechte8.38.0$0-$5k$0-$5kNot DefinedOfficial Fix0.010400.00CVE-2017-14589
15Atlassian Confluence Server Information Disclosure4.34.1$0-$5k$0-$5kNot DefinedOfficial Fix0.963210.07CVE-2021-26085
16Google Chrome V8 Remote Code Execution6.36.0$25k-$100k$5k-$25kNot DefinedOfficial Fix0.243800.02CVE-2020-16040
17ExifTool djvu File Remote Code Execution6.36.0$0-$5k$0-$5kNot DefinedOfficial Fix0.924380.02CVE-2021-22204
18Microsoft Windows DNS Server SigRed Pufferüberlauf10.09.8$25k-$100k$0-$5kHighOfficial Fix0.944580.03CVE-2020-1350
19Huawei NIP6800/Secospace USG6600/Secospace USG9500 Pufferüberlauf7.47.4$5k-$25k$5k-$25kNot DefinedNot Defined0.001100.05CVE-2020-1876
20Microsoft Windows NTLM Information Disclosure5.44.7$25k-$100k$0-$5kUnprovenOfficial Fix0.006540.04CVE-2021-1678

IOC - Indicator of Compromise (5)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (8)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (17)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDKlasseIndicatorTypAkzeptanz
1File/crmeb/crmeb/services/UploadService.phpprädiktivHigh
2File/envprädiktivLow
3File/s/prädiktivLow
4Filexxxxxxxxxxxxxxxxxxx.xxxxx.xxxprädiktivHigh
5Filexxxxxxxxxxx\xxxx\xxxxxxxxxx\xxxxxxxxxxxxxxxxx.xxxxx.xxxprädiktivHigh
6Filexxxx.xprädiktivLow
7Filexxxxxxx.xxxprädiktivMedium
8Filexxxxxx.xprädiktivMedium
9Filexxxxxx.xprädiktivMedium
10Libraryxxxx.xxxprädiktivMedium
11Argument-x/-xprädiktivLow
12ArgumentxxxxxxprädiktivLow
13Argumentxxxxxxxxxx[xxx][x]prädiktivHigh
14ArgumentxxxxxxxxxxxprädiktivMedium
15ArgumentxxprädiktivLow
16Input Value..\prädiktivLow
17Network PortxxxxprädiktivLow

Referenzen (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you know our Splunk app?

Download it now for free!