POWERSHOWER Analyse

IOB - Indicator of Behavior (37)

Chronologie

Langue

en28
es8
sv2

De campagne

Acteurs

Activités

Intérêt

Chronologie

Taper

Fournisseur

Produit

Apple M12
FLDS2
Comersus Open Technologies Comersus Backoffice Lit ...2
DZCP deV!L`z Clanportal2
GeoServer2

Vulnérabilités

#VulnérabilitéBaseTemp0dayAujourd'huiExpConEPSSCTICVE
1Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash divulgation de l'information5.35.2$5k-$25kCalculateurHighWorkaround0.020160.00CVE-2007-1192
2DZCP deV!L`z Clanportal config.php elévation de privilèges7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.009430.72CVE-2010-0966
3GeoServer OGC sql injection8.58.4$0-$5k$0-$5kNot DefinedOfficial Fix0.592990.04CVE-2023-25157
4Yoast SEO Plugin REST Endpoint posts divulgation de l'information3.53.4$0-$5k$0-$5kNot DefinedOfficial Fix0.001230.05CVE-2021-25118
5Sophos Firewall User Portal/Webadmin authentification faible8.58.5$0-$5k$0-$5kHighNot Defined0.974340.00CVE-2022-1040
6Apple Mac OS X Wiki Server directory traversal8.87.9$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.010680.00CVE-2008-1000
7Comersus Open Technologies Comersus Backoffice Lite default.asp sql injection7.37.3$0-$5k$0-$5kNot DefinedNot Defined0.001770.00CVE-2005-0302
8Apache HTTP Server mod_lua Multipart Parser r:parsebody buffer overflow8.58.4$25k-$100k$5k-$25kNot DefinedOfficial Fix0.088080.00CVE-2021-44790
9Bitrix24 elévation de privilèges8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.005210.00CVE-2020-13484
10Umi UMI.CMS Administrator Account cross site request forgery6.35.7$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.010990.05CVE-2013-2754
11Microsoft Exchange Server Remote Code Execution7.37.0$5k-$25k$0-$5kHighOfficial Fix0.716520.08CVE-2021-26857
12hostapd/wpa_supplicant EAP-PWD elévation de privilèges7.77.7$0-$5k$0-$5kNot DefinedNot Defined0.007350.00CVE-2019-9499
13QNAP QTS/QuTS Hero elévation de privilèges5.55.3$0-$5k$0-$5kHighOfficial Fix0.002900.08CVE-2020-2509
14Apple M1 Register s3_5_c15_c10_1 M1RACLES elévation de privilèges8.88.8$5k-$25k$5k-$25kNot DefinedNot Defined0.000000.04CVE-2021-30747
15OpenEMR register.php authentification faible8.27.7$0-$5k$0-$5kNot DefinedOfficial Fix0.042020.00CVE-2018-15152
16Kamailio REGISTER Message tmx_pretran.c tmx_check_pretran buffer overflow8.58.4$0-$5k$0-$5kNot DefinedOfficial Fix0.139520.02CVE-2018-8828
17e-Quick Cart shopprojectlogin.asp sql injection6.36.3$0-$5k$0-$5kNot DefinedNot Defined0.000000.04
18PHP Outburst Easynews admin.php buffer overflow7.36.7$0-$5k$0-$5kProof-of-ConceptUnavailable0.059210.04CVE-2006-5412
19Allegro RomPager buffer overflow7.36.4$0-$5k$0-$5kUnprovenOfficial Fix0.046180.00CVE-2014-9223
20TP-LINK TL-MR3220 Wireless MAC Filter cross site scripting5.24.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.001150.00CVE-2017-15291

IOC - Indicator of Compromise (4)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (8)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueClasseVulnérabilitésVecteur d'accèsTaperConfiance
1T1006CAPEC-126CWE-22Path TraversalpredictiveÉlevé
2T1059CAPEC-242CWE-94Argument InjectionpredictiveÉlevé
3TXXXX.XXXCAPEC-209CWE-XXXxxxx Xxxx XxxxxxxxxpredictiveÉlevé
4TXXXXCAPEC-CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveÉlevé
5TXXXXCAPEC-136CWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx XxxxxxxxxpredictiveÉlevé
6TXXXX.XXXCAPEC-178CWE-XXXXxxx XxxxxxxxpredictiveÉlevé
7TXXXXCAPEC-108CWE-XXXxx XxxxxxxxxpredictiveÉlevé
8TXXXXCAPEC-116CWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveÉlevé

IOA - Indicator of Attack (18)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClasseIndicatorTaperConfiance
1Fileadmin.phppredictiveMoyen
2FileC:\Windows\Temp\OLEACC.dllpredictiveÉlevé
3Filedata/gbconfiguration.datpredictiveÉlevé
4Filexxxxxxx.xxxpredictiveMoyen
5Filexxx/xxxxxx.xxxpredictiveÉlevé
6Filexxxxxxx/xxx/xxx_xxxxxxx.xpredictiveÉlevé
7Filexxxxxx/xxxxxxx/xxxxxxxx.xxxpredictiveÉlevé
8Filexxxxx.xxxpredictiveMoyen
9Filexxxxxxxx/xxxx/xxxx.xxx?xxxxxx=xxxxxxxxxxxxxxxxpredictiveÉlevé
10Filexxxxxxxxxxxxxxxx.xxxpredictiveÉlevé
11Filexxx.xxxpredictiveFaible
12Filexx/xx/xxxxxpredictiveMoyen
13ArgumentxxxxxxxxpredictiveMoyen
14ArgumentxxxxxxxxxxxpredictiveMoyen
15Argumentxx_xxxxx_xxpredictiveMoyen
16ArgumentxxpredictiveFaible
17ArgumentxxxxxxxxxpredictiveMoyen
18Argumentxxxx->xxxxxxxpredictiveÉlevé

Références (2)

The following list contains external sources which discuss the actor and the associated activities:

Might our Artificial Intelligence support you?

Check our Alexa App!