🛡 Hogar Sector Hostingprovider
Sector Hostingprovider Timeframe: -28 days
Default Categories (69): Access Management Software, Accounting Software, Anti-Malware Software, Anti-Spam Software, Application Server Software, Atlassian Confluence Plugin, Atlassian Jira App Software, Backup Software, Billing Software, Bug Tracking Software, Calendar Software, Chat Software, Cloud Software, Communications System, Connectivity Software, Content Management System, Continuous Integration Software, Customer Relationship Management System, Database Administration Software, Database Software, Directory Service Software, Document Reader Software, Domain Name Software, E-Commerce Management Software, File Compression Software, File Transfer Software, Firewall Software, Firmware Software, Groupware Software, Hardware Driver Software, Information Management Software, JavaScript Library, Joomla Component, Log Management Software, Mail Client Software, Mail Server Software, Mailing List Software, Network Attached Storage Software, Network Authentication Software, Network Encryption Software, Network Management Software, Network Routing Software, Network Utility Software, Office Suite Software, Operating System, Operating System Utility Software, Packet Analyzer Software, Printing Software, Product Lifecycle Management Software, Programming Language Software, Programming Tool Software, Project Management Software, Remote Access Software, Router Operating System, Server Management Software, Service Management Software, Software Library, Software Management Software, Spreadsheet Software, SSH Server Software, Testing Software, Ticket Tracking Software, Versioning Software, Virtualization Software, Web Browser, Web Server, Windowing System Software, Word Processing Software, WordPress Plugin
Linux Kernel 410 Microsoft Windows 102 Foxit PDF Reader 38 Microsoft SQL Server 36 Google Chrome 30
Official Fix 996 Temporary Fix 0 Workaround 2 Unavailable 0 Not Defined 1030
High 4 Functional 2 Proof-of-Concept 54 Unproven 142 Not Defined 1826
Not Defined 0 Physical 8 Local 140 Adjacent 470 Network 1410
Not Defined 0 High 220 Low 1112 None 696
Not Defined 0 Required 916 None 1112
≤1 0 ≤2 0 ≤3 50 ≤4 228 ≤5 708 ≤6 512 ≤7 266 ≤8 186 ≤9 78 ≤10 0
≤1 0 ≤2 0 ≤3 52 ≤4 248 ≤5 700 ≤6 622 ≤7 222 ≤8 160 ≤9 24 ≤10 0
≤1 0 ≤2 2 ≤3 106 ≤4 442 ≤5 638 ≤6 350 ≤7 266 ≤8 176 ≤9 48 ≤10 0
≤1 2028 ≤2 0 ≤3 0 ≤4 0 ≤5 0 ≤6 0 ≤7 0 ≤8 0 ≤9 0 ≤10 0
≤1 1126 ≤2 2 ≤3 4 ≤4 14 ≤5 176 ≤6 192 ≤7 212 ≤8 216 ≤9 54 ≤10 32
≤1 1876 ≤2 0 ≤3 0 ≤4 0 ≤5 2 ≤6 16 ≤7 28 ≤8 56 ≤9 50 ≤10 0
<1k 100 <2k 1138 <5k 46 <10k 474 <25k 114 <50k 138 <100k 18 ≥100k 0
<1k 1032 <2k 574 <5k 208 <10k 106 <25k 102 <50k 6 <100k 0 ≥100k 0
IOB - Indicator of Behavior (1000) Interesar Linux Kernel 20 Microsoft SQL Server 10 Microsoft Windows 10 code-projects Online Book System 8 Mozilla Firefox 8
Vulnerabilidad IOC - Indicator of Compromise (42) These indicators of compromise highlight associated network ranges which are known to be part of research and attack activities.
TTP - Tactics, Techniques, Procedures (27) Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.
ID Technique Vulnerabilidad Vector de acceso Escribe Confianza 1 T1006 CWE-22, CWE-24, CWE-35 Path Traversal predictive Alto 2 T1040 CWE-319 Authentication Bypass by Capture-replay predictive Alto 3 T1055 CWE-74 Improper Neutralization of Data within XPath Expressions predictive Alto 4 T1059 CWE-88, CWE-94, CWE-1321 Argument Injection predictive Alto 5 T1059.007 CWE-79, CWE-80 Cross Site Scripting predictive Alto 6 T1068 CWE-250, CWE-269, CWE-274, CWE-284 Execution with Unnecessary Privileges predictive Alto 7 TXXXX CWE-XXX Xxxx Xxx Xxxxxxxxx Xxxxxxxxxxx Xxxxxxxx predictive Alto 8 TXXXX.XXX CWE-XXX, CWE-XXX Xxxx-xxxxx Xxxxxxxxxxx predictive Alto 9 TXXXX CWE-XX, CWE-XX Xxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx Xxxxxxxxx predictive Alto 10 TXXXX.XXX CWE-XXX Xxxx Xxxxxxxx predictive Alto 11 TXXXX CWE-XXX, CWE-XXX, CWE-XXX Xxxxxxxxxx Xxxxxx predictive Alto 12 TXXXX CWE-XXX Xxxxxxxx Xx Xxxx Xxxxxxx Xxxxxxxxx Xxxxx predictive Alto 13 TXXXX CWE-XX, CWE-XX Xxx Xxxxxxxxx predictive Alto 14 TXXXX.XXX CWE-XXX Xxxxxxxx Xxxxxxxxxxxxx predictive Alto 15 TXXXX CWE-XXX, CWE-XXX Xxxxxxxxxxx Xxxxxxxxxx predictive Alto 16 TXXXX CWE-XXX Xxxxxxxxx Xxxxxxx Xx Xxxxxxxxx Xxxxxxxxxxx predictive Alto 17 TXXXX.XXX CWE-XXX Xxxxxxx Xxxxxxxxxx Xxx Xxxxxxxx Xxxxxxx Xx Xx-xxxx Xxxxxx Xxxxxxxx predictive Alto 18 TXXXX.XXX CWE-XXX Xxxxxxxxxxxx predictive Alto 19 TXXXX CWE-XXX, CWE-XXX Xxxxxxxxx Xxxxxx Xxxx predictive Alto 20 TXXXX.XXX CWE-XXX Xxxxxxxx Xxxxxx Xxxx predictive Alto 21 TXXXX.XXX CWE-XXX Xxxxxxxx Xxxxxxxxxxx Xxxxxxxxxx predictive Alto 22 TXXXX CWE-XXX Xxxxxxxx Xx Xxxxxxx Xxxxxxxx Xxxxxxxxxxx Xx Xx Xxxxxxxxxxxx Xxxxx predictive Alto 23 TXXXX CWE-XXX, CWE-XXX, CWE-XXX, CWE-XXX Xxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx Xxxxxxxxxxx predictive Alto 24 TXXXX CWE-XXX, CWE-XXX, CWE-XXX, CWE-XXX Xxxxxxxxxxxxx Xxxxxx predictive Alto 25 TXXXX.XXX CWE-XXX Xxx Xxxxxxxxxx Xxxxx predictive Alto 26 TXXXX.XXX CWE-XXX Xxxxxxxxxx Xxxxxxxxxxxxxx Xx Xxxxxxxx Xxxx Xxxxxxxxx predictive Alto 27 TXXXX CWE-XXX Xxxxxxxxxxx Xxxxxx predictive Alto