Sektor Hostingprovider

Timeframe: -28 days

Default Categories (69): Access Management Software, Accounting Software, Anti-Malware Software, Anti-Spam Software, Application Server Software, Atlassian Confluence Plugin, Atlassian Jira App Software, Backup Software, Billing Software, Bug Tracking Software, Calendar Software, Chat Software, Cloud Software, Communications System, Connectivity Software, Content Management System, Continuous Integration Software, Customer Relationship Management System, Database Administration Software, Database Software, Directory Service Software, Document Reader Software, Domain Name Software, E-Commerce Management Software, File Compression Software, File Transfer Software, Firewall Software, Firmware Software, Groupware Software, Hardware Driver Software, Information Management Software, JavaScript Library, Joomla Component, Log Management Software, Mail Client Software, Mail Server Software, Mailing List Software, Network Attached Storage Software, Network Authentication Software, Network Encryption Software, Network Management Software, Network Routing Software, Network Utility Software, Office Suite Software, Operating System, Operating System Utility Software, Packet Analyzer Software, Printing Software, Product Lifecycle Management Software, Programming Language Software, Programming Tool Software, Project Management Software, Remote Access Software, Router Operating System, Server Management Software, Service Management Software, Software Library, Software Management Software, Spreadsheet Software, SSH Server Software, Testing Software, Ticket Tracking Software, Versioning Software, Virtualization Software, Web Browser, Web Server, Windowing System Software, Word Processing Software, WordPress Plugin

Zeitverlauf

Hersteller

Produkt

Linux Kernel378
Microsoft Windows92
Foxit PDF Reader40
Microsoft SQL Server30
Google Chrome28

Massnahmen

Official Fix970
Temporary Fix0
Workaround2
Unavailable0
Not Defined1056

Ausnutzbarkeit

High2
Functional4
Proof-of-Concept42
Unproven122
Not Defined1858

Zugriffsart

Not Defined0
Physical10
Local122
Adjacent442
Network1454

Authentisierung

Not Defined0
High238
Low1066
None724

Benutzeraktivität

Not Defined0
Required952
None1076

C3BM Index

CVSSv3 Base

≤10
≤20
≤348
≤4266
≤5710
≤6474
≤7272
≤8180
≤978
≤100

CVSSv3 Temp

≤10
≤20
≤350
≤4278
≤5710
≤6586
≤7214
≤8162
≤928
≤100

VulDB

≤10
≤22
≤3128
≤4428
≤5648
≤6340
≤7272
≤8168
≤942
≤100

NVD

≤12028
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

CNA

≤11068
≤22
≤38
≤426
≤5204
≤6202
≤7202
≤8202
≤974
≤1040

Hersteller

≤11896
≤20
≤30
≤40
≤52
≤610
≤732
≤848
≤940
≤100

Exploit 0-day

<1k114
<2k1154
<5k42
<10k450
<25k132
<50k118
<100k18
≥100k0

Exploit heute

<1k1042
<2k586
<5k200
<10k96
<25k98
<50k6
<100k0
≥100k0

Exploitmarktvolumen

IOB - Indicator of Behavior (1000)

Zeitverlauf

Sprache

en652
de84
ja64
es46
ru40

Land

us188
gb114
de88
jp42
ru40

Akteure

Aktivitäten

Interesse

Zeitverlauf

Typ

Hersteller

Produkt

Linux Kernel32
Google Chrome12
Mozilla Firefox10
PHP8
Microsoft Windows8

Schwachstellen

#SchwachstelleBaseTemp0dayHeuteAusMasEPSSCTICVE
1Backdoor.Win32.Dumador.c FTP Server Pufferüberlauf6.35.6$0-$5k$0-$5kProof-of-ConceptWorkaround0.000002.06-
2Thimo Grauerholz WP-Spreadplugin spreadplugin.php Cross Site Scripting3.53.4$0-$5k$0-$5kNot DefinedOfficial Fix0.000002.02-CVE-2015-10132
3PHP proc_open erweiterte Rechte7.37.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.000000.13CVE-2024-1874
4PuTTY ECDSA Nonce Generation Information Disclosure3.73.6$0-$5k$0-$5kNot DefinedOfficial Fix0.000460.13CVE-2024-31497
5GNU C Library iconv Pufferüberlauf5.35.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000450.17CVE-2024-2961
6SourceCodester Online Chatting System update_room.php SQL Injection6.35.7$0-$5k$0-$5kProof-of-ConceptNot Defined0.000450.67CVE-2024-2932
7Royal Elementor Addons and Templates Plugin erweiterte Rechte7.37.1$0-$5k$0-$5kNot DefinedNot Defined0.000000.40CVE-2024-1567
8Microsoft Edge Information Disclosure5.45.3$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000430.30CVE-2024-29987
9Cisco ClamAV HTML Parser Denial of Service7.57.5$5k-$25k$5k-$25kNot DefinedNot Defined0.000430.03CVE-2024-20380
10Check Point ZoneAlarm Extreme Security NextGen erweiterte Rechte5.35.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000430.00CVE-2024-24910
11Palo Alto Networks PAN-OS GlobalProtect erweiterte Rechte8.98.7$0-$5k$0-$5kHighOfficial Fix0.022210.17CVE-2024-3400
12SolarWinds Serv-U Directory Traversal6.56.5$0-$5k$0-$5kNot DefinedNot Defined0.000430.06CVE-2024-28073
13PHP password_verify unbekannte Schwachstelle3.73.4$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.000000.10CVE-2024-3096
14hCaptcha Plugin cf7-hcaptcha Shortcode Cross Site Scripting3.53.4$0-$5k$0-$5kNot DefinedNot Defined0.000000.10CVE-2024-4014
15Node.js child_process.spawn erweiterte Rechte5.55.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000000.17CVE-2024-27980
16Google Chrome V8 Pufferüberlauf6.36.0$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000430.17CVE-2024-3914
17bdthemes Prime Slider Plugin Cross Site Scripting4.44.4$0-$5k$0-$5kNot DefinedNot Defined0.000430.40-CVE-2024-1730
18Happy Addons for Elementor Plugin Image Stack Group Cross Site Scripting3.53.4$0-$5k$0-$5kNot DefinedNot Defined0.000000.00CVE-2024-3724
19code-projects Online Book System description.php SQL Injection6.35.7$0-$5k$0-$5kProof-of-ConceptNot Defined0.000450.22CVE-2024-3002
20Microsoft Edge erweiterte Rechte5.04.9$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000430.07CVE-2024-29991

IOC - Indicator of Compromise (32)

These indicators of compromise highlight associated network ranges which are known to be part of research and attack activities.

IDIP-BereichAkteurTypAkzeptanz
12.58.95.0/24BashliteprädiktivHigh
23.71.7.0/24Cobalt StrikeprädiktivHigh
35.42.66.0/24Cobalt StrikeprädiktivHigh
418.193.71.0/24Cobalt StrikeprädiktivHigh
5XX.XX.XXX.X/XXXxxxxxprädiktivHigh
6XX.XXX.XX.X/XXXxxxxx XxxxxxprädiktivHigh
7XX.XXX.XXX.X/XXXxxxxxxxxprädiktivHigh
8XX.XXX.XXX.X/XXXxxxxxx XxxxxxxprädiktivHigh
9XX.XXX.XXX.X/XXXxxxxxxprädiktivHigh
10XX.XXX.XX.X/XXXxxxxprädiktivHigh
11XX.XXX.XX.X/XXXxxxxprädiktivHigh
12XX.XX.XXX.X/XXXxxxxxxxprädiktivHigh
13XX.XXX.XXX.X/XXXxxxxxxprädiktivHigh
14XX.XX.XX.X/XXXxxxxxxxxxxprädiktivHigh
15XX.XX.XX.X/XXXxxxxprädiktivHigh
16XX.XXX.XXX.X/XXXxxxxx XxxxxxprädiktivHigh
17XX.XXX.X.X/XXXxxxx XxxxxxxprädiktivHigh
18XXX.XXX.XXX.X/XXXxxxxxx XxxxxxxprädiktivHigh
19XXX.XXX.XXX.X/XXXxxxxx XxxxxxprädiktivHigh
20XXX.XX.XXX.X/XXXxxxxxx Xxxxx XxxxxprädiktivHigh
21XXX.XXX.XXX.X/XXXxxxxprädiktivHigh
22XXX.XXX.XXX.X/XXXxxxxprädiktivHigh
23XXX.XX.XX.X/XXXxxxxxx XxxxxxprädiktivHigh
24XXX.XX.XX.X/XXXxxxxprädiktivHigh
25XXX.XXX.XXX.X/XXXxxxxx XxxprädiktivHigh
26XXX.XXX.XXX.X/XXXxxxx XxxxxxxprädiktivHigh
27XXX.XX.XX.X/XXXxxxxxxprädiktivHigh
28XXX.XX.XX.X/XXXxxxxprädiktivHigh
29XXX.XXX.XXX.X/XXXxxxxxx XxxxxxxprädiktivHigh
30XXX.XXX.XXX.X/XXXxxxxprädiktivHigh
31XXX.XXX.XXX.X/XXXxxxxprädiktivHigh
32XXX.XX.XXX.X/XXXxxxxxxprädiktivHigh

TTP - Tactics, Techniques, Procedures (27)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueSchwachstellenZugriffsartTypAkzeptanz
1T1006CWE-22, CWE-24, CWE-35Path TraversalprädiktivHigh
2T1040CWE-319Authentication Bypass by Capture-replayprädiktivHigh
3T1055CWE-74Improper Neutralization of Data within XPath ExpressionsprädiktivHigh
4T1059CWE-88, CWE-94, CWE-1321Argument InjectionprädiktivHigh
5T1059.007CWE-79, CWE-80Cross Site ScriptingprädiktivHigh
6T1068CWE-250, CWE-269, CWE-274, CWE-284Execution with Unnecessary PrivilegesprädiktivHigh
7TXXXXCWE-XXXXxxx Xxx Xxxxxxxxx Xxxxxxxxxxx XxxxxxxxprädiktivHigh
8TXXXX.XXXCWE-XXX, CWE-XXXXxxx-xxxxx XxxxxxxxxxxprädiktivHigh
9TXXXXCWE-XX, CWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx XxxxxxxxxprädiktivHigh
10TXXXX.XXXCWE-XXXXxxx XxxxxxxxprädiktivHigh
11TXXXXCWE-XXX, CWE-XXX, CWE-XXXXxxxxxxxxx XxxxxxprädiktivHigh
12TXXXXCWE-XXXXxxxxxxx Xx Xxxx Xxxxxxx Xxxxxxxxx XxxxxprädiktivHigh
13TXXXXCWE-XX, CWE-XXXxx XxxxxxxxxprädiktivHigh
14TXXXX.XXXCWE-XXXXxxxxxxx XxxxxxxxxxxxxprädiktivHigh
15TXXXXCWE-XXX, CWE-XXXXxxxxxxxxxx XxxxxxxxxxprädiktivHigh
16TXXXXCWE-XXXXxxxxxxxx Xxxxxxx Xx Xxxxxxxxx XxxxxxxxxxxprädiktivHigh
17TXXXX.XXXCWE-XXXXxxxxxx Xxxxxxxxxx Xxx Xxxxxxxx Xxxxxxx Xx Xx-xxxx Xxxxxx XxxxxxxxprädiktivHigh
18TXXXX.XXXCWE-XXXXxxxxxxxxxxxprädiktivHigh
19TXXXXCWE-XXX, CWE-XXXXxxxxxxxx Xxxxxx XxxxprädiktivHigh
20TXXXX.XXXCWE-XXXXxxxxxxx Xxxxxx XxxxprädiktivHigh
21TXXXX.XXXCWE-XXXXxxxxxxx Xxxxxxxxxxx XxxxxxxxxxprädiktivHigh
22TXXXXCWE-XXXXxxxxxxx Xx Xxxxxxx Xxxxxxxx Xxxxxxxxxxx Xx Xx Xxxxxxxxxxxx XxxxxprädiktivHigh
23TXXXXCWE-XXX, CWE-XXX, CWE-XXX, CWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxprädiktivHigh
24TXXXXCWE-XXX, CWE-XXX, CWE-XXX, CWE-XXXXxxxxxxxxxxxx XxxxxxprädiktivHigh
25TXXXX.XXXCWE-XXXXxx Xxxxxxxxxx XxxxxprädiktivHigh
26TXXXX.XXXCWE-XXXXxxxxxxxxx Xxxxxxxxxxxxxx Xx Xxxxxxxx Xxxx XxxxxxxxxprädiktivHigh
27TXXXXCWE-XXXXxxxxxxxxxx XxxxxxprädiktivHigh

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!