Mispadu Analyse

IOB - Indicator of Behavior (20)

Zeitverlauf

Sprache

de10
en8
ar2

Land

us14
ir2
gb2

Akteure

Aktivitäten

Interesse

Zeitverlauf

Typ

Hersteller

Produkt

Red Hat Enterprise Linux2
WordPress2
ubuntu Linux2
Mahara2
Drupal2

Schwachstellen

#SchwachstelleBaseTemp0dayHeuteAusMasCTIEPSSCVE
1Huawei ACXXXX/SXXXX SSH Packet erweiterte Rechte7.57.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.020.00246CVE-2014-8572
2Huawei SXXX VRP MPLS LSP Ping Information Disclosure5.35.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.020.00096CVE-2014-8570
3Tribe29 Checkmk Livestatus Query Language erweiterte Rechte7.07.0$0-$5k$0-$5kNot DefinedNot Defined0.000.00043CVE-2022-47909
4Tribe29 Checkmk Agent Updater Log File Information Disclosure5.15.1$0-$5k$0-$5kNot DefinedNot Defined0.040.00043CVE-2022-48319
5Microsoft Windows ISATAP Component IP Address Spoofing Schwachstelle6.56.2$25k-$100k$0-$5kNot DefinedOfficial Fix0.020.06396CVE-2010-0812
6IBM DB2 erweiterte Rechte6.36.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.000.00343CVE-2011-1846
7Nicholas Marriott tmux erweiterte Rechte5.95.6$0-$5kWird berechnetProof-of-ConceptNot Defined0.000.00051CVE-2011-1496
8WordPress Directory Traversal5.75.6$5k-$25k$0-$5kNot DefinedOfficial Fix0.030.00326CVE-2023-2745
9netcf Path Expression find_ifcfg_path erweiterte Rechte5.95.8$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00662CVE-2014-8119
10Xerox Workcentre 5655 Authorization Information Disclosure5.35.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.000.00251CVE-2010-0548
11Xerox Workcentre 6400 Net Controller Information Disclosure5.35.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.020.00204CVE-2010-0549
12SilverStripe Information Disclosure5.35.1$0-$5k$0-$5kNot DefinedOfficial Fix0.020.01045CVE-2010-5188
13ubuntu Linux schwache Authentisierung10.09.5$5k-$25k$0-$5kNot DefinedOfficial Fix0.030.00272CVE-2010-0834
14Red Hat Enterprise Linux erweiterte Rechte5.35.3$5k-$25k$5k-$25kNot DefinedNot Defined0.000.00342CVE-2010-2598
15Drupal Form API erweiterte Rechte5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.060.00093CVE-2022-25271
16Mahara Single Sign-On schwache Authentisierung6.36.0$0-$5k$0-$5kNot DefinedOfficial Fix0.020.00450CVE-2010-1670
17Green Hills INTEGRITY RTOS Interpeak IPCOMShell TELNET Server Pufferüberlauf8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.000.00308CVE-2019-7713
18Samba receive_smb_raw Pufferüberlauf7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.030.97018CVE-2008-1105

IOC - Indicator of Compromise (5)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (4)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (1)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDKlasseIndicatorTypAkzeptanz
1Argumentdebug_profileprädiktivHigh

Referenzen (4)

The following list contains external sources which discuss the actor and the associated activities:

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!