MosaicRegressor Analyse

IOB - Indicator of Behavior (40)

Zeitverlauf

Sprache

zh22
en16
fr2

Land

cn32

Akteure

Aktivitäten

Interesse

Zeitverlauf

Typ

Hersteller

Produkt

WordPress4
Concrete CMS2
Synology SSO Server2
MikroTik RouterOS2
Linux Kernel2

Schwachstellen

#SchwachstelleBaseTemp0dayHeuteAusMasCTIEPSSCVE
1Zhong Bang CRMEB PublicController.php get_image_base64 erweiterte Rechte7.16.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.090.00061CVE-2023-3233
2Synacor Zimbra Collaboration XML External Entity8.58.2$0-$5k$0-$5kNot DefinedOfficial Fix0.020.00441CVE-2016-9924
3MikroTik RouterOS Resolver Pufferüberlauf4.34.1$0-$5kWird berechnetNot DefinedOfficial Fix0.000.00201CVE-2020-20249
4Oracle Secure Backup Remote Code Execution9.89.8$25k-$100k$0-$5kNot DefinedNot Defined0.000.95514CVE-2011-2261
5Oracle Secure Backup schwache Authentisierung5.35.3$5k-$25kWird berechnetHighNot Defined0.000.10855CVE-2010-0904
6OpenProject Public Project robots.txt Information Disclosure6.46.3$0-$5k$0-$5kNot DefinedOfficial Fix0.020.00060CVE-2023-33960
7Synology SSO Server WebAPI Directory Traversal4.74.7$0-$5k$0-$5kNot DefinedOfficial Fix0.000.00068CVE-2022-27620
8All-in-One WP Migration Plugin class-ai1wm-backups.php Directory Traversal5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.040.00097CVE-2022-1476
9Joomla CMS SQL Injection7.37.0$5k-$25k$0-$5kHighOfficial Fix0.020.84848CVE-2015-7857
10CKeditor FCKeditor print_textinputs_var Cross Site Scripting4.34.1$0-$5k$0-$5kProof-of-ConceptNot Defined0.000.00467CVE-2012-4000
11webTareas New Profile Cross Site Request Forgery3.53.5$0-$5k$0-$5kNot DefinedNot Defined0.000.00177CVE-2021-41916
12WordPress wp_crop_image Directory Traversal5.95.8$5k-$25k$0-$5kProof-of-ConceptNot Defined0.030.95884CVE-2019-8943
13Concrete CMS File Manager erweiterte Rechte5.65.5$0-$5kWird berechnetNot DefinedOfficial Fix0.030.00945CVE-2021-22968
14WordPress WP_Query SQL Injection6.36.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.030.93536CVE-2022-21661
15Linux Kernel msr erweiterte Rechte5.14.6$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.030.00196CVE-2013-0268
16HP Printer/MFP Cross Site Request Forgery6.56.5$5k-$25k$0-$5kNot DefinedNot Defined0.000.00073CVE-2018-5921
17Plesk Obsidian Reflected Cross Site Scripting5.25.2$0-$5k$0-$5kNot DefinedNot Defined0.000.00151CVE-2020-11583
18FreePBX index_amp.php Cross Site Scripting8.87.9$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.000.00773CVE-2012-4870
19Thycotic Secret Server Remote Desktop Launcher Temporary erweiterte Rechte7.57.2$0-$5kWird berechnetNot DefinedOfficial Fix0.000.00222CVE-2014-4861
20ZyXEL VMG3312-B10B default.cfg erweiterte Rechte8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.060.00194CVE-2018-18754

IOC - Indicator of Compromise (16)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (9)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueSchwachstellenZugriffsartTypAkzeptanz
1T1006CWE-22Path TraversalprädiktivHigh
2T1055CWE-74Improper Neutralization of Data within XPath ExpressionsprädiktivHigh
3TXXXXCWE-XXXxxxxxxx XxxxxxxxxprädiktivHigh
4TXXXX.XXXCWE-XXXxxxx Xxxx XxxxxxxxxprädiktivHigh
5TXXXXCWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxprädiktivHigh
6TXXXX.XXXCWE-XXXXxxx XxxxxxxxprädiktivHigh
7TXXXXCWE-XXXxx XxxxxxxxxprädiktivHigh
8TXXXXCWE-XXXXxxxxxxxxxx XxxxxxxxxxprädiktivHigh
9TXXXXCWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxprädiktivHigh

IOA - Indicator of Attack (14)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDKlasseIndicatorTypAkzeptanz
1File/dev/cpu/*/msrprädiktivHigh
2File/index_amp.phpprädiktivHigh
3File/xxxxxx.xxxprädiktivMedium
4File/xxx/xxx/xxxxxprädiktivHigh
5Filexxx/xxxxxxxxxx/xx/xxxxxxxxxxxxxxxx.xxxprädiktivHigh
6Filexxxxxxxx/xxxxxxxxxx.xxxxprädiktivHigh
7Filexxx/xxxxxxx.xxxprädiktivHigh
8Filexxx/xxxx/xxx.xprädiktivHigh
9Library~/xxx/xxxxx/xxxxx-xxxxx-xxxxxxx.xxxprädiktivHigh
10ArgumentxxxxxxxprädiktivLow
11ArgumentxxxxprädiktivLow
12ArgumentxxxxxxxxxprädiktivMedium
13Input Value.xxx?/../../xxxx.xxxprädiktivHigh
14Input Valuexxxx+x@!xxxx+prädiktivHigh

Referenzen (2)

The following list contains external sources which discuss the actor and the associated activities:

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!