🛡 Start Sektor Hostingprovider
Sektor Hostingprovider Timeframe: -28 days
Default Categories (69): Access Management Software, Accounting Software, Anti-Malware Software, Anti-Spam Software, Application Server Software, Atlassian Confluence Plugin, Atlassian Jira App Software, Backup Software, Billing Software, Bug Tracking Software, Calendar Software, Chat Software, Cloud Software, Communications System, Connectivity Software, Content Management System, Continuous Integration Software, Customer Relationship Management System, Database Administration Software, Database Software, Directory Service Software, Document Reader Software, Domain Name Software, E-Commerce Management Software, File Compression Software, File Transfer Software, Firewall Software, Firmware Software, Groupware Software, Hardware Driver Software, Information Management Software, JavaScript Library, Joomla Component, Log Management Software, Mail Client Software, Mail Server Software, Mailing List Software, Network Attached Storage Software, Network Authentication Software, Network Encryption Software, Network Management Software, Network Routing Software, Network Utility Software, Office Suite Software, Operating System, Operating System Utility Software, Packet Analyzer Software, Printing Software, Product Lifecycle Management Software, Programming Language Software, Programming Tool Software, Project Management Software, Remote Access Software, Router Operating System, Server Management Software, Service Management Software, Software Library, Software Management Software, Spreadsheet Software, SSH Server Software, Testing Software, Ticket Tracking Software, Versioning Software, Virtualization Software, Web Browser, Web Server, Windowing System Software, Word Processing Software, WordPress Plugin
Linux Kernel 378 Microsoft Windows 92 Foxit PDF Reader 40 Microsoft SQL Server 30 Google Chrome 28
Official Fix 970 Temporary Fix 0 Workaround 2 Unavailable 0 Not Defined 1056
High 2 Functional 4 Proof-of-Concept 42 Unproven 122 Not Defined 1858
Not Defined 0 Physical 10 Local 122 Adjacent 442 Network 1454
Not Defined 0 High 238 Low 1066 None 724
Not Defined 0 Required 952 None 1076
≤1 0 ≤2 0 ≤3 48 ≤4 266 ≤5 710 ≤6 474 ≤7 272 ≤8 180 ≤9 78 ≤10 0
≤1 0 ≤2 0 ≤3 50 ≤4 278 ≤5 710 ≤6 586 ≤7 214 ≤8 162 ≤9 28 ≤10 0
≤1 0 ≤2 2 ≤3 128 ≤4 428 ≤5 648 ≤6 340 ≤7 272 ≤8 168 ≤9 42 ≤10 0
≤1 2028 ≤2 0 ≤3 0 ≤4 0 ≤5 0 ≤6 0 ≤7 0 ≤8 0 ≤9 0 ≤10 0
≤1 1068 ≤2 2 ≤3 8 ≤4 26 ≤5 204 ≤6 202 ≤7 202 ≤8 202 ≤9 74 ≤10 40
≤1 1896 ≤2 0 ≤3 0 ≤4 0 ≤5 2 ≤6 10 ≤7 32 ≤8 48 ≤9 40 ≤10 0
<1k 114 <2k 1154 <5k 42 <10k 450 <25k 132 <50k 118 <100k 18 ≥100k 0
<1k 1042 <2k 586 <5k 200 <10k 96 <25k 98 <50k 6 <100k 0 ≥100k 0
IOB - Indicator of Behavior (1000) Interesse Linux Kernel 32 Google Chrome 12 Mozilla Firefox 10 PHP 8 Microsoft Windows 8
Schwachstellen IOC - Indicator of Compromise (32) These indicators of compromise highlight associated network ranges which are known to be part of research and attack activities.
TTP - Tactics, Techniques, Procedures (27) Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.
ID Technique Schwachstellen Zugriffsart Typ Akzeptanz 1 T1006 CWE-22, CWE-24, CWE-35 Path Traversal prädiktiv High 2 T1040 CWE-319 Authentication Bypass by Capture-replay prädiktiv High 3 T1055 CWE-74 Improper Neutralization of Data within XPath Expressions prädiktiv High 4 T1059 CWE-88, CWE-94, CWE-1321 Argument Injection prädiktiv High 5 T1059.007 CWE-79, CWE-80 Cross Site Scripting prädiktiv High 6 T1068 CWE-250, CWE-269, CWE-274, CWE-284 Execution with Unnecessary Privileges prädiktiv High 7 TXXXX CWE-XXX Xxxx Xxx Xxxxxxxxx Xxxxxxxxxxx Xxxxxxxx prädiktiv High 8 TXXXX.XXX CWE-XXX, CWE-XXX Xxxx-xxxxx Xxxxxxxxxxx prädiktiv High 9 TXXXX CWE-XX, CWE-XX Xxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx Xxxxxxxxx prädiktiv High 10 TXXXX.XXX CWE-XXX Xxxx Xxxxxxxx prädiktiv High 11 TXXXX CWE-XXX, CWE-XXX, CWE-XXX Xxxxxxxxxx Xxxxxx prädiktiv High 12 TXXXX CWE-XXX Xxxxxxxx Xx Xxxx Xxxxxxx Xxxxxxxxx Xxxxx prädiktiv High 13 TXXXX CWE-XX, CWE-XX Xxx Xxxxxxxxx prädiktiv High 14 TXXXX.XXX CWE-XXX Xxxxxxxx Xxxxxxxxxxxxx prädiktiv High 15 TXXXX CWE-XXX, CWE-XXX Xxxxxxxxxxx Xxxxxxxxxx prädiktiv High 16 TXXXX CWE-XXX Xxxxxxxxx Xxxxxxx Xx Xxxxxxxxx Xxxxxxxxxxx prädiktiv High 17 TXXXX.XXX CWE-XXX Xxxxxxx Xxxxxxxxxx Xxx Xxxxxxxx Xxxxxxx Xx Xx-xxxx Xxxxxx Xxxxxxxx prädiktiv High 18 TXXXX.XXX CWE-XXX Xxxxxxxxxxxx prädiktiv High 19 TXXXX CWE-XXX, CWE-XXX Xxxxxxxxx Xxxxxx Xxxx prädiktiv High 20 TXXXX.XXX CWE-XXX Xxxxxxxx Xxxxxx Xxxx prädiktiv High 21 TXXXX.XXX CWE-XXX Xxxxxxxx Xxxxxxxxxxx Xxxxxxxxxx prädiktiv High 22 TXXXX CWE-XXX Xxxxxxxx Xx Xxxxxxx Xxxxxxxx Xxxxxxxxxxx Xx Xx Xxxxxxxxxxxx Xxxxx prädiktiv High 23 TXXXX CWE-XXX, CWE-XXX, CWE-XXX, CWE-XXX Xxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx Xxxxxxxxxxx prädiktiv High 24 TXXXX CWE-XXX, CWE-XXX, CWE-XXX, CWE-XXX Xxxxxxxxxxxxx Xxxxxx prädiktiv High 25 TXXXX.XXX CWE-XXX Xxx Xxxxxxxxxx Xxxxx prädiktiv High 26 TXXXX.XXX CWE-XXX Xxxxxxxxxx Xxxxxxxxxxxxxx Xx Xxxxxxxx Xxxx Xxxxxxxxx prädiktiv High 27 TXXXX CWE-XXX Xxxxxxxxxxx Xxxxxx prädiktiv High