Manjusaka Analyse

IOB - Indicator of Behavior (55)

Zeitverlauf

Sprache

en26
zh26
it4

Land

cn42
ru8
us6

Akteure

Aktivitäten

Interesse

Zeitverlauf

Typ

Hersteller

Produkt

Apache HTTP Server4
Swagger Parser2
Swagger Codegen2
pkexec2
Canvas LMS2

Schwachstellen

#SchwachstelleBaseTemp0dayHeuteAusMasCTIEPSSCVE
1vsftpd deny_file unbekannte Schwachstelle3.73.6$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00312CVE-2015-1419
2Oracle Storage Cloud Software Appliance Management Console Remote Code Execution10.09.5$100k und mehr$5k-$25kNot DefinedOfficial Fix0.000.00576CVE-2021-2256
3VMware Spring Framework erweiterte Rechte4.54.5$5k-$25k$5k-$25kNot DefinedNot Defined0.000.00079CVE-2021-22096
4nginx ngx_http_mp4_module Information Disclosure5.95.8$0-$5k$0-$5kNot DefinedOfficial Fix0.050.00198CVE-2018-16845
5Python libraries erweiterte Rechte6.56.2$0-$5k$0-$5kProof-of-ConceptNot Defined0.000.00000
6Totolink X2000R HTTP POST Request boa formTmultiAP Pufferüberlauf8.17.8$0-$5k$0-$5kProof-of-ConceptNot Defined0.060.00060CVE-2023-7222
7SAP GUI Connector for Microsoft Edge Information Disclosure6.46.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.070.00087CVE-2024-22125
8Cool Plugins Events Shortcodes for the Events Calendar Plugin SQL Injection7.07.0$0-$5k$0-$5kNot DefinedNot Defined0.020.00050CVE-2023-52142
9Acumos Design Studio Cross Site Scripting4.44.3$0-$5k$0-$5kNot DefinedOfficial Fix0.030.00052CVE-2018-25097
10Google Android ion.c ion_ioctl Pufferüberlauf5.35.1$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000.00042CVE-2022-20118
11Qualcomm Snapdragon Compute XPU Re-Configuration erweiterte Rechte8.58.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.040.00044CVE-2021-30276
12Epic Games Psyonix Rocket League UPK Object Pufferüberlauf5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.000.00300CVE-2021-32238
13Microsoft Windows IIS Pufferüberlauf7.97.6$25k-$100k$5k-$25kNot DefinedOfficial Fix0.070.00182CVE-2019-1365
14MailEnable Enterprise Premium Directory Traversal7.27.2$0-$5k$0-$5kNot DefinedNot Defined0.030.00061CVE-2019-12925
15Verschiedene Produkte H.323 H.225.0 und Q.931 Denial of Service7.57.2$0-$5kWird berechnetNot DefinedOfficial Fix0.020.31188CVE-2003-0819
16Dahua DHI-HCVR7216A-S3 MD5 erweiterte Rechte5.95.9$0-$5k$0-$5kNot DefinedNot Defined0.020.31255CVE-2017-6343
17aaPanel Websocket webssh erweiterte Rechte4.64.6$0-$5k$0-$5kNot DefinedNot Defined0.000.00288CVE-2021-37840
18Siemens LOGO!8 BM Service Port 135 schwache Authentisierung8.27.8$5k-$25k$0-$5kNot DefinedOfficial Fix0.020.00131CVE-2020-7589
19Microsoft Windows SMB Processing Array Indexing Schwachstelle7.37.0$5k-$25k$0-$5kHighOfficial Fix0.170.97288CVE-2009-3103
20Dahua IP Camera/PTZ Dome Camera erweiterte Rechte5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.030.00236CVE-2021-33046

IOC - Indicator of Compromise (6)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (10)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueSchwachstellenZugriffsartTypAkzeptanz
1T1006CWE-22Path TraversalprädiktivHigh
2T1055CWE-74Improper Neutralization of Data within XPath ExpressionsprädiktivHigh
3TXXXXCWE-XXXxxxxxxx XxxxxxxxxprädiktivHigh
4TXXXX.XXXCWE-XXXxxxx Xxxx XxxxxxxxxprädiktivHigh
5TXXXXCWE-XXX, CWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxprädiktivHigh
6TXXXXCWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx XxxxxxxxxprädiktivHigh
7TXXXXCWE-XXXxx XxxxxxxxxprädiktivHigh
8TXXXX.XXXCWE-XXXXxxxxxxx XxxxxxxxxxxxxprädiktivHigh
9TXXXXCWE-XXXXxxxxxxxxxx XxxxxxxxxxprädiktivHigh
10TXXXXCWE-XXX, CWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxprädiktivHigh

IOA - Indicator of Attack (15)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDKlasseIndicatorTypAkzeptanz
1File/bin/boaprädiktivMedium
2File/usr/bin/pkexecprädiktivHigh
3File/websshprädiktivLow
4Filexxxxx.xxxprädiktivMedium
5Filexxx.xprädiktivLow
6Filexx-xxxxx.xxxprädiktivMedium
7Library/xxx/xxx/xxx/xxxx/xxxxxxxxxx/xxxxxxxxx.xxxprädiktivHigh
8LibraryxxxxxxxxxprädiktivMedium
9ArgumentxxprädiktivLow
10ArgumentxxprädiktivLow
11ArgumentxxxxxprädiktivLow
12Argumentxxxxxx-xxxprädiktivMedium
13ArgumentxxxxxprädiktivLow
14Input Value===prädiktivLow
15Network Portxxx/xxxprädiktivLow

Referenzen (3)

The following list contains external sources which discuss the actor and the associated activities:

Do you need the next level of professionalism?

Upgrade your account now!