Secteur Agriculture

Timeframe: -28 days

Default Categories (49): Accounting Software, Anti-Malware Software, Anti-Spam Software, Appointment Software, Automation Software, Backup Software, Calendar Software, Chip Software, Communications System, Content Management System, Customer Relationship Management System, Database Software, Document Management Software, Document Processing Software, Document Reader Software, Enterprise Resource Planning Software, File Compression Software, File Transfer Software, Financial Software, Firewall Software, Firmware Software, Hardware Driver Software, Image Processing Software, Information Management Software, Mail Client Software, Mail Server Software, Network Attached Storage Software, Network Camera Software, Network Encryption Software, Network Routing Software, Office Suite Software, Operating System, Photo Gallery Software, Presentation Software, Printing Software, Project Management Software, Router Operating System, SCADA Software, Server Management Software, Service Management Software, Spreadsheet Software, Supplier Relationship Management Software, Supply Chain Management Software, Transport Management Software, Video Surveillance Software, Warehouse Management System Software, Web Browser, Web Server, Word Processing Software

Chronologie

Fournisseur

Produit

Microsoft Windows50
Apple macOS48
Google Chrome40
Linux Kernel34
MediaTek MT689528

Contre-mesures

Official Fix370
Temporary Fix0
Workaround0
Unavailable4
Not Defined116

Exploitabilité

High0
Functional2
Proof-of-Concept40
Unproven54
Not Defined394

Vecteur d'accès

Not Defined0
Physical6
Local156
Adjacent64
Network264

Authentification

Not Defined0
High52
Low256
None182

Interaction de l'utilisateur

Not Defined0
Required174
None316

C3BM Index

CVSSv3 Base

≤10
≤20
≤320
≤466
≤580
≤6112
≤7112
≤854
≤938
≤108

CVSSv3 Temp

≤10
≤20
≤322
≤490
≤586
≤6146
≤766
≤858
≤916
≤106

VulDB

≤10
≤20
≤326
≤472
≤5104
≤682
≤7106
≤864
≤928
≤108

NVD

≤1488
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤92
≤100

CNA

≤1368
≤20
≤32
≤416
≤54
≤616
≤726
≤832
≤912
≤1014

Fournisseur

≤1434
≤20
≤30
≤40
≤50
≤62
≤718
≤814
≤920
≤102

Exploiter 0 jour

<1k70
<2k134
<5k86
<10k52
<25k40
<50k80
<100k28
≥100k0

Exploiter aujourd'hui

<1k228
<2k80
<5k56
<10k44
<25k82
<50k0
<100k0
≥100k0

Exploiter le volume du marché

IOB - Indicator of Behavior (1000)

Chronologie

Langue

en908
de24
es18
it14
fr14

De campagne

us106
gb70
it30
de26
fr16

Acteurs

Activités

Intérêt

Chronologie

Taper

Fournisseur

Produit

Apple macOS28
Linux Kernel12
IObit Malware Fighter10
Microsoft Windows8
Google Chrome6

Vulnérabilités

#VulnérabilitéBaseTemp0dayAujourd'huiExpConCTIEPSSCVE
1IObit Malware Fighter IOCTL IMFCameraProtect.sys 0x8018E004 buffer overflow5.34.8$0-$5k$0-$5kProof-of-ConceptNot Defined1.240.00064CVE-2023-1646
2DriverGenius IOCTL mydrivers64.sys 0x9c402084 dénie de service5.55.0$0-$5k$0-$5kProof-of-ConceptNot Defined1.550.00045CVE-2023-1677
3SNIProxy Wildcard Backend Host buffer overflow8.58.4$0-$5k$0-$5kNot DefinedOfficial Fix0.57+0.00000CVE-2023-25076
4Dreamer CMS File Upload cross site scripting3.53.4$0-$5k$0-$5kNot DefinedNot Defined0.54+0.00000CVE-2023-1746
5Infoline Project Management System elévation de privilèges6.96.8$0-$5k$0-$5kNot DefinedOfficial Fix0.54+0.00000CVE-2023-1725
6IObit Malware Fighter IOCTL IMFCameraProtect.sys 0x8018E008 dénie de service5.55.0$0-$5k$0-$5kProof-of-ConceptNot Defined1.240.00045CVE-2023-1645
7IObit Malware Fighter IOCTL IMFCameraProtect.sys 0x8018E010 dénie de service5.55.0$0-$5k$0-$5kProof-of-ConceptNot Defined1.140.00045CVE-2023-1644
8IObit Malware Fighter IOCTL ImfHpRegFilter.sys 0x8001E040 dénie de service5.55.0$0-$5k$0-$5kProof-of-ConceptNot Defined1.140.00045CVE-2023-1643
9Xunrui CMS system_log.html divulgation de l'information4.33.9$0-$5k$0-$5kProof-of-ConceptNot Defined1.650.00045CVE-2023-1683
10Ubiquiti EdgeRouter X OSPF elévation de privilèges [Contesté]7.26.5$0-$5k$0-$5kProof-of-ConceptNot Defined1.240.00043CVE-2023-1458
11OTCMS apiRun.php AutoRun cross site scripting3.53.4$0-$5k$0-$5kNot DefinedNot Defined1.150.00045CVE-2023-1635
12Microsoft Windows ICMP Remote Code Execution9.88.5$25k-$100k$5k-$25kUnprovenOfficial Fix1.190.01074CVE-2023-23415
13IObit Malware Fighter IOCTL ObCallbackProcess.sys 0x222040 dénie de service5.55.0$0-$5k$0-$5kProof-of-ConceptNot Defined1.110.00045CVE-2023-1642
14DriverGenius IOCTL mydrivers64.sys 0x9C402088 buffer overflow7.87.1$0-$5k$0-$5kProof-of-ConceptNot Defined1.520.00045CVE-2023-1676
15DriverGenius IOCTL mydrivers64.sys 0x9C40A0E0 buffer overflow5.34.8$0-$5k$0-$5kProof-of-ConceptNot Defined1.610.00045CVE-2023-1678
16Ubiquiti EdgeRouter X NAT Configuration elévation de privilèges [Contesté]7.26.5$0-$5k$0-$5kProof-of-ConceptUnavailable1.250.00043CVE-2023-1456
17D-Link DIR-3040 MiniDLNA Service buffer overflow8.88.6$5k-$25k$5k-$25kNot DefinedNot Defined0.96-0.00000CVE-2022-43648
18Xunrui CMS main.html divulgation de l'information4.33.9$0-$5k$0-$5kProof-of-ConceptNot Defined1.420.00000CVE-2023-1680
19Ubiquiti EdgeRouter X Static Routing Configuration elévation de privilèges [Contesté]7.26.5$0-$5k$0-$5kProof-of-ConceptUnavailable1.060.00043CVE-2023-1457
20Xunrui CMS test.php divulgation de l'information4.33.9$0-$5k$0-$5kProof-of-ConceptNot Defined1.290.00045CVE-2023-1681

IOC - Indicator of Compromise (5)

These indicators of compromise highlight associated network ranges which are known to be part of research and attack activities.

IDIP rangeActeurTaperConfiance
145.61.185.0/24B1txor20predictiveÉlevé
2XX.XX.XXX.X/XXXxxxxxxxxpredictiveÉlevé
3XX.XXX.XXX.X/XXXxxxxxxpredictiveÉlevé
4XX.XX.XXX.X/XXXxxxxxxxpredictiveÉlevé
5XX.XXX.XXX.X/XXXxxxxxpredictiveÉlevé

TTP - Tactics, Techniques, Procedures (19)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueVulnérabilitésVecteur d'accèsTaperConfiance
1T1006CWE-22, CWE-23, CWE-425Pathname TraversalpredictiveÉlevé
2T1040CWE-319Authentication Bypass by Capture-replaypredictiveÉlevé
3T1055CWE-74InjectionpredictiveÉlevé
4T1059CWE-88, CWE-94Cross Site ScriptingpredictiveÉlevé
5TXXXX.XXXCWE-XX, CWE-XXXxxxx Xxxx XxxxxxxxxpredictiveÉlevé
6TXXXXCWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveÉlevé
7TXXXX.XXXCWE-XXX, CWE-XXXXxxxxxxx Xxxxxxxxxxx Xx Xxxxxxxxx Xxxxxxxxxxxxxx XxxxxxxxpredictiveÉlevé
8TXXXXCWE-XX, CWE-XXXxxxxxx XxxxxxxxxpredictiveÉlevé
9TXXXX.XXXCWE-XXXXxxx XxxxxxxxpredictiveÉlevé
10TXXXXCWE-XXX, CWE-XXXXxxxxxxxxx XxxxxxpredictiveÉlevé
11TXXXXCWE-XXXxx XxxxxxxxxpredictiveÉlevé
12TXXXX.XXXCWE-XXXXxxxxxxx XxxxxxxxxxxxxpredictiveÉlevé
13TXXXXCWE-XXXXxx.xxx Xxxxxxxxxxxxxxxx: Xxxxxxxx Xx Xxxxxxxxxxxxx XxxxpredictiveÉlevé
14TXXXXCWE-XXXXxxxxxxxx Xxxxxx XxxxpredictiveÉlevé
15TXXXX.XXXCWE-XXXXxxxxxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveÉlevé
16TXXXX.XXXCWE-XXXXxxxxxxxpredictiveÉlevé
17TXXXXCWE-XXXXxxxxxxxxxxxxpredictiveÉlevé
18TXXXX.XXXCWE-XXXXxxxxxxxxxxx XxxxxxpredictiveÉlevé
19TXXXXCWE-XXXXxxxxxxxxxx XxxxxxpredictiveÉlevé

IOA - Indicator of Attack (97)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClasseIndicatorTaperConfiance
1File/adminpredictiveFaible
2File/api/uploadpredictiveMoyen
3File/bookstore/bookPerPub.phppredictiveÉlevé
4File/config/myfield/test.phppredictiveÉlevé
5File/dayrui/Fcms/View/system_log.htmlpredictiveÉlevé
6File/dayrui/My/Config/Install.txtpredictiveÉlevé
7File/dayrui/My/View/main.htmlpredictiveÉlevé
8File/dede/group_store.phppredictiveÉlevé
9File/dev/infiniband/rdma_cmpredictiveÉlevé
10File/Sys/index.htmlpredictiveÉlevé
11File/tmppredictiveFaible
12FileadminHome.phppredictiveÉlevé
13FileapiRun.phppredictiveMoyen
14Filearch/x86/kvm/x86.cpredictiveÉlevé
15Filexxxx.xpredictiveFaible
16Filex:\xxxxxxxxxx\xxxx\xxxxxxxxxx_xxxxx.xxxpredictiveÉlevé
17Filexxxxxxx/xxxxxxxxxx.xxpredictiveÉlevé
18Filexxxxxx.xxxpredictiveMoyen
19Filexxxx.xxxpredictiveMoyen
20Filexxxxxx/xxxx/xxxx_xxx.xpredictiveÉlevé
21Filexxxxxxxxx_xxxxxxx.xxxpredictiveÉlevé
22Filexxxxxx_xxxx/xxxxxx/xxxx-xxxxxxxxx/xx/xxxxxxxxxx.xxpredictiveÉlevé
23Filexxxxxxx/xxx/xxx-xxxx.xpredictiveÉlevé
24Filexxxxxxx/xxx/xxx-xxxx.xpredictiveÉlevé
25Filexxxxxxx/xxx/xxx.xpredictiveÉlevé
26Filexxxxxxx/xxx/xxxxxxxx/xxxxxxxx/xxxxxxxxx/xxxxxxxx/xxxxxxxx.xpredictiveÉlevé
27Filexxxxxxx/xxxxxxx/xxxxxxx/xxxxxxx_xxx.xpredictiveÉlevé
28Filexxxxxxxxxxx-xxxx.xxxxxxxpredictiveÉlevé
29Filexx/xxxx/xxxxxxx.xpredictiveÉlevé
30Filexx/xxxx/xxxxxxxx.xpredictiveÉlevé
31Filexx/xxxxx/xxxxx.xpredictiveÉlevé
32Filexx/xxxxx/xxxxxx.xpredictiveÉlevé
33Filexx/xxxxxxxxx/xxxx_xx.xpredictiveÉlevé
34Filexx_xxxxx/xxxxxxxxx.xpredictiveÉlevé
35Filexxxxxx/xxxxx/xx.xpredictiveÉlevé
36Filexxx.xxxpredictiveFaible
37Filexxxxxxxxxxxx.xxxpredictiveÉlevé
38Filexxxxxxx_xxx.xxxpredictiveÉlevé
39Filexxx/xxxxxxxxx/xxx_xxxx.xpredictiveÉlevé
40Filexxx/xxx/xxxxxxx.xpredictiveÉlevé
41Filexxx/xxxx/xxxx.xpredictiveÉlevé
42Filexxx/xxxx/xxxxxx.xpredictiveÉlevé
43Filexxx/xxx/xxx_xxxx.xpredictiveÉlevé
44Filexxx/xxx/xxx_xx.xpredictiveÉlevé
45Filexxxx.xxxpredictiveMoyen
46Filexxxxxx/xxxxxxxxx.xxxpredictiveÉlevé
47Filexxx_xxxxx.xpredictiveMoyen
48Filexxxxxxxxxx.xxxpredictiveÉlevé
49Filexxxxx/xxxxxx.xpredictiveÉlevé
50Filexxxxx.xxxxxx.xxxxxxx.xxxpredictiveÉlevé
51Filexxxxxx.xxxpredictiveMoyen
52Filexxx/xxxxx/xxx.xpredictiveÉlevé
53File\xxxxx\x\xxxxxxxxxxxxxxxx.xxxpredictiveÉlevé
54File\xxxxxx\xxxxxx\xxxxx_xxx.xxxxpredictiveÉlevé
55Libraryxxxxxx.xxxpredictiveMoyen
56Libraryxxxxxxxxxxxxxxxx.xxxpredictiveÉlevé
57Libraryxxxxxxxxxxxxxx.xxxpredictiveÉlevé
58Libraryxxxxxxxxxxxxxxxxx.xxxpredictiveÉlevé
59Libraryxxxxxx.xxxpredictiveMoyen
60Libraryxxx/xxxxxx.xpredictiveMoyen
61Libraryxxx/xxx_xxx.xpredictiveÉlevé
62Libraryxxxxxxxxxxx.xxxpredictiveÉlevé
63Libraryxxxxxxxxx.xxxpredictiveÉlevé
64Libraryxxxxxxxxxxxxxx.xxxpredictiveÉlevé
65Libraryxxxxxxxxxxx.xxxpredictiveÉlevé
66Libraryxxxxxx.xxpredictiveMoyen
67Libraryxxxxxxxxxxxxxxxxx.xxxpredictiveÉlevé
68Libraryxxx.xxxpredictiveFaible
69Libraryxxxxxxxx.xxxpredictiveMoyen
70Libraryxxxx-xxxxxx.xxxpredictiveÉlevé
71Argumentxxxxx_xxxxpredictiveMoyen
72Argumentxxx_xxxxx[]/xxx_xxxxx[]predictiveÉlevé
73ArgumentxxxxpredictiveFaible
74ArgumentxxxxxxxxxxxxxxxxxxxxpredictiveÉlevé
75ArgumentxxxxpredictiveFaible
76ArgumentxxxxxxpredictiveFaible
77ArgumentxxxpredictiveFaible
78ArgumentxxxxxxxxxxxxxxpredictiveÉlevé
79Argumentxxx_xx_xxxxxx/xxx_xxx_xxxxxxxxxxxpredictiveÉlevé
80Argumentxxx_xxx_xxxpredictiveMoyen
81ArgumentxxxxpredictiveFaible
82Argumentxxxx-xxx-xxxxxxxxxpredictiveÉlevé
83ArgumentxxxxxxxxpredictiveMoyen
84Argumentxxxx_xxxxpredictiveMoyen
85Argumentxxxx_*predictiveFaible
86Argumentxxxxx_xxxxpredictiveMoyen
87Argumentxxxxxx_xxxxpredictiveMoyen
88Argumentxxxxxxxxxxx_xxxxxxxx_x.x.x.xpredictiveÉlevé
89ArgumentxxxxxxpredictiveFaible
90Argumentxxxxxx_xxxxxxxxpredictiveÉlevé
91ArgumentxxxxxxxxxxxxpredictiveMoyen
92ArgumentxxxpredictiveFaible
93ArgumentxxxxpredictiveFaible
94ArgumentxxxxxxxxxxpredictiveMoyen
95ArgumentxxxpredictiveFaible
96ArgumentxxxxxxxxpredictiveMoyen
97ArgumentxxxxxxpredictiveFaible

Interested in the pricing of exploits?

See the underground prices here!