Xanthe Análisis

IOB - Indicator of Behavior (47)

Cronología

Idioma

en24
zh18
ja6

País

Actores

Ocupaciones

Interesar

Cronología

Escribe

Proveedor

Producto

Jenkins4
nginx2
BusyBox2
MikroTik RouterOS2
Weblogicnet2

Vulnerabilidad

#VulnerabilidadBaseTemp0dayHoyExpConEPSSCTICVE
1Apache Archiva File Upload Service cross site scripting5.15.1$5k-$25k$5k-$25kNot DefinedNot Defined0.001080.00CVE-2023-28158
2Splunk Enterprise Forwarder Bundle escalada de privilegios8.58.3$0-$5k$0-$5kNot DefinedOfficial Fix0.003060.00CVE-2022-32158
3Microsoft Windows 16-bit Compatibility divulgación de información3.33.3$25k-$100k$0-$5kNot DefinedWorkaround0.000000.02
4virglrenderer IOCTL desbordamiento de búfer7.07.0$0-$5k$0-$5kNot DefinedNot Defined0.000450.00CVE-2022-0135
5EQdkp dbal.php escalada de privilegios6.56.2$0-$5k$0-$5kProof-of-ConceptNot Defined0.031880.04CVE-2006-2256
6MikroTik RouterOS HTTP Server denegación de servicio5.45.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000780.00CVE-2019-13955
7Dreamer CMS cross site scripting4.44.4$0-$5k$0-$5kNot DefinedNot Defined0.000470.00CVE-2023-29774
8Weblogicnet es_desp.php escalada de privilegios7.36.7$0-$5k$0-$5kProof-of-ConceptUnavailable0.088790.00CVE-2007-4715
9PrestaShop sql injection8.08.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.838960.05CVE-2021-3110
10Oracle MySQL Server Compiling denegación de servicio7.27.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.000450.04CVE-2021-22570
11Microsoft Outlook autenticación débil9.08.6$5k-$25k$0-$5kFunctionalOfficial Fix0.926450.05CVE-2023-23397
12Apache Dubbo Generic Invoke escalada de privilegios5.05.0$5k-$25k$5k-$25kNot DefinedNot Defined0.014790.00CVE-2023-23638
13Grafana Authentication Cookies divulgación de información5.65.5$0-$5k$0-$5kNot DefinedOfficial Fix0.001010.02CVE-2022-39201
14Hugo Pandoc Document exec escalada de privilegios5.05.0$0-$5k$0-$5kNot DefinedOfficial Fix0.002280.02CVE-2020-26284
15GNU C Library Call Graph Monitor gmon.c __monstartup desbordamiento de búfer [Disputa]6.36.2$0-$5k$0-$5kNot DefinedOfficial Fix0.001210.30CVE-2023-0687
16nginx escalada de privilegios6.96.9$0-$5k$0-$5kNot DefinedNot Defined0.002415.26CVE-2020-12440
17Google Chrome denegación de servicio7.37.0$25k-$100k$0-$5kNot DefinedOfficial Fix0.009890.02CVE-2011-2796
18Samsung TizenRT l2_packet_pcap.c l2_packet_receive_timeout denegación de servicio5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.002700.00CVE-2022-40279
19Microsoft Internet Explorer FTP Server desbordamiento de búfer6.36.3$25k-$100k$0-$5kHighUnavailable0.969730.07CVE-2009-3023
20Microsoft Windows Shell Shortcut Parser escalada de privilegios10.09.5$100k y más$0-$5kHighOfficial Fix0.972230.05CVE-2010-2568

IOC - Indicator of Compromise (5)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDdirección IPHostnameActorCampañasIdentifiedEscribeConfianza
134.92.166.158158.166.92.34.bc.googleusercontent.comXanthe2022-02-02verifiedMedio
2XX.XXX.XX.XXXxxxxx2022-02-02verifiedAlto
3XXX.XX.XX.XXxxxxxxx.xxxXxxxxx2022-02-02verifiedAlto
4XXX.XXX.XXX.XXxxx-xxx-xxx-xx.xx.xxxxxxxxxxxxxxxxx.xxxXxxxxx2022-02-02verifiedAlto
5XXX.XX.XX.XXXXxxxxx2022-02-02verifiedAlto

TTP - Tactics, Techniques, Procedures (12)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueClaseVulnerabilidadVector de accesoEscribeConfianza
1T1040CAPEC-102CWE-294Authentication Bypass by Capture-replaypredictiveAlto
2T1055CAPEC-10CWE-74Improper Neutralization of Data within XPath ExpressionspredictiveAlto
3T1059CAPEC-242CWE-94Argument InjectionpredictiveAlto
4TXXXX.XXXCAPEC-209CWE-XXXxxxx Xxxx XxxxxxxxxpredictiveAlto
5TXXXXCAPEC-19CWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveAlto
6TXXXXCAPEC-136CWE-XX, CWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx XxxxxxxxxpredictiveAlto
7TXXXXCAPEC-CWE-XXXXxxxxxxxxx XxxxxxpredictiveAlto
8TXXXXCAPEC-108CWE-XXXxx XxxxxxxxxpredictiveAlto
9TXXXX.XXXCAPEC-1CWE-XXXXxxxxxxx XxxxxxxxxxxxxpredictiveAlto
10TXXXXCAPEC-112CWE-XXXXxxxxxxxxxx XxxxxxxxxxpredictiveAlto
11TXXXXCAPEC-116CWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveAlto
12TXXXX.XXXCAPEC-112CWE-XXXXxx Xxxxxxxxxx XxxxxpredictiveAlto

IOA - Indicator of Attack (16)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClaseIndicatorEscribeConfianza
1Fileauth2-gss.cpredictiveMedio
2Filecategory.phppredictiveMedio
3Filees_desp.phppredictiveMedio
4Filexxxx.xpredictiveBajo
5Filexxxxxxxx/xxxx.xxxpredictiveAlto
6Filexx/xxxxpredictiveBajo
7Filexxxxxx.xxxpredictiveMedio
8Filexxxx-xxxxxx.xpredictiveAlto
9Filexxxx/xxxx/xxxxxxxxxxxxxxxxxx.xxxxpredictiveAlto
10Filexxx_xxxxxxxxxx/xxx/xx_xxxxxx/xx_xxxxxx_xxxx.xpredictiveAlto
11Argumentxxxxx_xxxx_xxxxpredictiveAlto
12Argumentxxxxx_xxxpredictiveMedio
13Argumentxxxx/xxpredictiveBajo
14Argumentxx_xxxxxxxxpredictiveMedio
15ArgumentxxxxpredictiveBajo
16ArgumentxxxxpredictiveBajo

Referencias (2)

The following list contains external sources which discuss the actor and the associated activities:

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!