Lorenz Análisis

IOB - Indicator of Behavior (82)

Cronología

Idioma

en68
es8
zh4
ru2

País

us26
cn12
ir4
ru2
pt2

Actores

Ocupaciones

Interesar

Cronología

Escribe

Proveedor

Producto

GitLab Enterprise Edition16
GitLab Community Edition14
Violation Comments to GitLab Plugin2
F5 BIG-IP Controller for Kubernetes2
GitLab Community2

Vulnerabilidad

#VulnerabilidadBaseTemp0dayHoyExpConEPSSCTICVE
1Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash divulgación de información5.35.2$5k-$25kCalculadorHighWorkaround0.020160.02CVE-2007-1192
2Oracle REST Data Services denegación de servicio7.06.8$5k-$25k$0-$5kNot DefinedOfficial Fix0.033590.04CVE-2023-24998
3Extreme EXOS desbordamiento de búfer7.47.4$0-$5k$0-$5kNot DefinedNot Defined0.002090.00CVE-2017-14328
4SentryHD escalada de privilegios5.35.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.000000.01
5GitLab Community Edition/Enterprise Edition Bowser Cache divulgación de información5.45.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000790.00CVE-2018-18640
6Oracle REST Data Services General divulgación de información4.34.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.000540.00CVE-2020-14745
7Oracle REST Data Services divulgación de información5.35.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.475550.00CVE-2021-34429
8HP System Management Homepage Access Restriction desbordamiento de búfer10.09.5$25k-$100k$0-$5kNot DefinedOfficial Fix0.210360.00CVE-2011-1541
9nginx escalada de privilegios6.96.9$0-$5k$0-$5kNot DefinedNot Defined0.002414.65CVE-2020-12440
10Teltonika Remote Management System/RUT escalada de privilegios8.88.4$0-$5k$0-$5kNot DefinedOfficial Fix0.000520.02CVE-2023-32350
11python-jwt autenticación débil8.28.0$0-$5k$0-$5kNot DefinedOfficial Fix0.000970.05CVE-2022-39227
12OpenSSH Forward Option roaming_common.c roaming_write desbordamiento de búfer8.17.6$25k-$100k$0-$5kUnprovenOfficial Fix0.002660.00CVE-2016-0778
13Technicolor TC7337NET Password cifrado débil7.57.5$0-$5k$0-$5kNot DefinedNot Defined0.012180.04CVE-2020-10376
14Nextcloud Password Policy divulgación de información2.72.6$0-$5k$0-$5kNot DefinedOfficial Fix0.000500.00CVE-2022-35931
15Citrix XenServer directory traversal8.58.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.023400.00CVE-2018-14007
16polkit polkitd divulgación de información5.75.6$0-$5k$0-$5kNot DefinedOfficial Fix0.000660.00CVE-2018-1116
17Apache HTTP Server mod_proxy escalada de privilegios7.37.3$5k-$25k$25k-$100kHighNot Defined0.974460.00CVE-2021-40438
18mod_ssl SSLVerifyClient Remote Code Execution9.88.8$25k-$100k$0-$5kProof-of-ConceptOfficial Fix0.002140.02CVE-2005-2700
19Huawei ACXXXX/SXXXX SSH Packet escalada de privilegios7.57.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.002460.07CVE-2014-8572
20Vim desbordamiento de búfer7.17.0$0-$5kCalculadorNot DefinedOfficial Fix0.001020.00CVE-2021-3984

Campañas (1)

These are the campaigns that can be associated with the actor:

  • CVE-2022-29499

IOC - Indicator of Compromise (7)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (12)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (26)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClaseIndicatorEscribeConfianza
1Fileconfig.xmlpredictiveMedio
2Filecontact.phppredictiveMedio
3Filecontact_support.phppredictiveAlto
4Filedata/gbconfiguration.datpredictiveAlto
5Filexxxx.xxxpredictiveMedio
6Filexxx/xxxxxx.xxxpredictiveAlto
7Filexxxxx.xxxpredictiveMedio
8Filexxxxxxxxxxxxxxx.xxxxpredictiveAlto
9Filexxxxxx_xxxx_xxx_xxx.xxxpredictiveAlto
10Filexxx_xxxxx.xpredictiveMedio
11Filexxxxxxxx.xxxpredictiveMedio
12Filexxxxxxx_xxx_xxxxx_xxxxxx.xxxxpredictiveAlto
13Filexxxxxxx_xxxxxx.xpredictiveAlto
14Filexxxx-xxxxxxxx.xxxpredictiveAlto
15Filexxx.xpredictiveBajo
16Filexx-xxxxxxx/xxxxxxx/xxxx/xxpredictiveAlto
17ArgumentxxxxxxxxpredictiveMedio
18ArgumentxxxxxxxxxxxxxxpredictiveAlto
19Argumentxxxxxxx_xxpredictiveMedio
20ArgumentxxxxxxxpredictiveBajo
21ArgumentxxxxpredictiveBajo
22ArgumentxxxxxxxxpredictiveMedio
23ArgumentxxxxxxxxpredictiveMedio
24ArgumentxxxxpredictiveBajo
25ArgumentxxxpredictiveBajo
26Network PortxxxpredictiveBajo

Referencias (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you know our Splunk app?

Download it now for free!