Vollgar Analyse

IOB - Indicator of Behavior (56)

Zeitverlauf

Sprache

en48
zh8

Land

us46
cn10

Akteure

Aktivitäten

Interesse

Zeitverlauf

Typ

Hersteller

Produkt

Apple watchOS6
Alt-N MDaemon4
Measuresoft ScadaPro Server2
Measuresoft ScadaPro Client2
Emag Marketplace Connector Plugin2

Schwachstellen

#SchwachstelleBaseTemp0dayHeuteAusMasEPSSCTICVE
1All in One SEO Best WordPress SEO Plugin Import/Export erweiterte Rechte5.55.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000920.04CVE-2021-24307
2Odoo Database Anonymization Privilege Escalation5.65.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.002140.05CVE-2017-10803
3Libbitcoin Explorer Milk Sad schwache Verschlüsselung5.35.3$0-$5k$0-$5kHighNot Defined0.001160.04CVE-2023-39910
4tagDiv Composer Plugin Facebook Login schwache Authentisierung7.77.6$0-$5k$0-$5kNot DefinedOfficial Fix0.003730.01CVE-2022-3477
5Trend Micro Apex One Information Disclosure7.67.5$5k-$25k$0-$5kNot DefinedOfficial Fix0.000450.00CVE-2022-44649
6Sophos Mobile Managed On-Premises XML erweiterte Rechte8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.412830.00CVE-2022-3980
7iPXE TLS tls.c tls_new_ciphertext Information Disclosure3.23.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000480.09CVE-2022-4087
8Dolibarr SQL Injection7.87.8$0-$5k$0-$5kNot DefinedOfficial Fix0.001370.03CVE-2022-4093
9nginx erweiterte Rechte6.96.9$0-$5k$0-$5kNot DefinedNot Defined0.002412.78CVE-2020-12440
10Insyde Kernel UEFI Variable Pufferüberlauf7.87.8$0-$5k$0-$5kNot DefinedNot Defined0.000650.00CVE-2022-35897
11Trend Micro Apex One Change Prevention Service Pufferüberlauf7.67.5$5k-$25k$0-$5kNot DefinedOfficial Fix0.000450.00CVE-2022-44650
12Atlassian Bitbucket Server and Data Center Environment Variable erweiterte Rechte7.47.4$0-$5k$0-$5kNot DefinedNot Defined0.610940.02CVE-2022-43781
13Trend Micro Apex One Security Agent Race Condition7.57.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.000450.00CVE-2022-44651
14LG SmartShare erweiterte Rechte7.07.0$5k-$25k$5k-$25kNot DefinedNot Defined0.000540.04CVE-2022-45422
15WP-Polls Plugin HTTP Header erweiterte Rechte6.36.0$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.000600.04CVE-2022-1581
16Apple watchOS ImageIO Information Disclosure5.45.3$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.007540.03CVE-2016-3619
17D-Link G integrated Access Device4 Web Interface login.asp erweiterte Rechte5.75.7$5k-$25k$5k-$25kNot DefinedNot Defined0.001240.02CVE-2022-36785
18Trend Micro Apex One erweiterte Rechte8.38.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.000450.00CVE-2022-44652
19Trend Micro Apex One Security Agent Directory Traversal8.38.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.000480.00CVE-2022-44653
20Apple tvOS ImageIO Information Disclosure5.45.3$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.007540.00CVE-2016-3619

IOC - Indicator of Compromise (21)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (12)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (25)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDKlasseIndicatorTypAkzeptanz
1File/rest/api/2/user/pickerprädiktivHigh
2File/wp-content/plugins/emag-marketplace-connector/templates/order/awb-meta-box.phpprädiktivHigh
3Fileafr.phpprädiktivLow
4Filedata/gbconfiguration.datprädiktivHigh
5Filexxxx.xxxprädiktivMedium
6Filexxx/xxxxxx.xxxprädiktivHigh
7Filexxxxx.xxx/xxxx/xxxxx/xxxx/xxxx.xxxprädiktivHigh
8Filexxx/xxx.xprädiktivMedium
9Filexxxxx.xxxprädiktivMedium
10Filexxx.xxxprädiktivLow
11Filexxx/xxx/xxx.xprädiktivHigh
12Filexxxxxx.xxxprädiktivMedium
13Libraryxxx/xx.xxxprädiktivMedium
14Libraryxxxxxxx/xxxxxxx/xxxxxx/xxx/xxxxx.xxxxxxx.xxxprädiktivHigh
15ArgumentxxxxxxxxprädiktivMedium
16ArgumentxxxxxprädiktivLow
17ArgumentxxxxxprädiktivLow
18ArgumentxxprädiktivLow
19Argumentxxx_xxxprädiktivLow
20ArgumentxxxxprädiktivLow
21Argumentxxxxxx_xxxxprädiktivMedium
22ArgumentxxxxprädiktivLow
23ArgumentxxxprädiktivLow
24ArgumentxxxprädiktivLow
25ArgumentxxxxxxxxprädiktivMedium

Referenzen (4)

The following list contains external sources which discuss the actor and the associated activities:

Might our Artificial Intelligence support you?

Check our Alexa App!