MosaicRegressor Análisis

IOB - Indicator of Behavior (40)

Cronología

Idioma

en24
zh16

País

cn30
us2

Actores

Ocupaciones

Interesar

Cronología

Escribe

Proveedor

Producto

Oracle PeopleSoft Enterprise PeopleTools4
Synacor Zimbra Collaboration2
nginx2
Elasticsearch Kibana2
Microsoft Edge2

Vulnerabilidad

#VulnerabilidadBaseTemp0dayHoyExpConEPSSCTICVE
1Zhong Bang CRMEB PublicController.php get_image_base64 escalada de privilegios7.16.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.000670.04CVE-2023-3233
2Synacor Zimbra Collaboration XML External Entity8.58.2$0-$5k$0-$5kNot DefinedOfficial Fix0.004410.02CVE-2016-9924
3MikroTik RouterOS Resolver desbordamiento de búfer4.34.1$0-$5k$0-$5kNot DefinedOfficial Fix0.002010.00CVE-2020-20249
4Oracle Secure Backup Remote Code Execution9.89.8$25k-$100k$0-$5kNot DefinedNot Defined0.955140.00CVE-2011-2261
5Oracle Secure Backup autenticación débil5.35.3$5k-$25k$0-$5kHighNot Defined0.125700.00CVE-2010-0904
6OpenProject Public Project robots.txt divulgación de información6.46.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000600.02CVE-2023-33960
7Synology SSO Server WebAPI directory traversal4.74.7$0-$5k$0-$5kNot DefinedOfficial Fix0.000680.00CVE-2022-27620
8All-in-One WP Migration Plugin class-ai1wm-backups.php directory traversal5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.000970.04CVE-2022-1476
9Joomla CMS sql injection7.37.0$5k-$25k$0-$5kHighOfficial Fix0.814230.02CVE-2015-7857
10CKeditor FCKeditor print_textinputs_var cross site scripting4.34.1$0-$5k$0-$5kProof-of-ConceptNot Defined0.004670.04CVE-2012-4000
11webTareas New Profile cross site request forgery3.53.5$0-$5k$0-$5kNot DefinedNot Defined0.001770.00CVE-2021-41916
12WordPress wp_crop_image directory traversal5.95.8$5k-$25k$0-$5kProof-of-ConceptNot Defined0.958840.02CVE-2019-8943
13Concrete CMS File Manager escalada de privilegios5.65.5$0-$5k$0-$5kNot DefinedOfficial Fix0.009450.03CVE-2021-22968
14WordPress WP_Query sql injection6.36.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.935360.00CVE-2022-21661
15Linux Kernel msr escalada de privilegios5.14.6$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.001960.03CVE-2013-0268
16HP Printer/MFP cross site request forgery6.56.5$5k-$25k$0-$5kNot DefinedNot Defined0.000730.00CVE-2018-5921
17Plesk Obsidian Reflected cross site scripting5.25.2$0-$5k$0-$5kNot DefinedNot Defined0.001510.00CVE-2020-11583
18FreePBX index_amp.php cross site scripting8.87.9$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.007730.00CVE-2012-4870
19Thycotic Secret Server Remote Desktop Launcher Temporary escalada de privilegios7.57.2$0-$5k$0-$5kNot DefinedOfficial Fix0.002220.00CVE-2014-4861
20ZyXEL VMG3312-B10B default.cfg escalada de privilegios8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.001940.03CVE-2018-18754

IOC - Indicator of Compromise (16)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (9)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueVulnerabilidadVector de accesoEscribeConfianza
1T1006CWE-22Path TraversalpredictiveAlto
2T1055CWE-74Improper Neutralization of Data within XPath ExpressionspredictiveAlto
3TXXXXCWE-XXXxxxxxxx XxxxxxxxxpredictiveAlto
4TXXXX.XXXCWE-XXXxxxx Xxxx XxxxxxxxxpredictiveAlto
5TXXXXCWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveAlto
6TXXXX.XXXCWE-XXXXxxx XxxxxxxxpredictiveAlto
7TXXXXCWE-XXXxx XxxxxxxxxpredictiveAlto
8TXXXXCWE-XXXXxxxxxxxxxx XxxxxxxxxxpredictiveAlto
9TXXXXCWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveAlto

IOA - Indicator of Attack (14)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClaseIndicatorEscribeConfianza
1File/dev/cpu/*/msrpredictiveAlto
2File/index_amp.phppredictiveAlto
3File/xxxxxx.xxxpredictiveMedio
4File/xxx/xxx/xxxxxpredictiveAlto
5Filexxx/xxxxxxxxxx/xx/xxxxxxxxxxxxxxxx.xxxpredictiveAlto
6Filexxxxxxxx/xxxxxxxxxx.xxxxpredictiveAlto
7Filexxx/xxxxxxx.xxxpredictiveAlto
8Filexxx/xxxx/xxx.xpredictiveAlto
9Library~/xxx/xxxxx/xxxxx-xxxxx-xxxxxxx.xxxpredictiveAlto
10ArgumentxxxxxxxpredictiveBajo
11ArgumentxxxxpredictiveBajo
12ArgumentxxxxxxxxxpredictiveMedio
13Input Value.xxx?/../../xxxx.xxxpredictiveAlto
14Input Valuexxxx+x@!xxxx+predictiveAlto

Referencias (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you know our Splunk app?

Download it now for free!