Evilnum Analisi

IOB - Indicator of Behavior (58)

Sequenza temporale

Linguaggio

en50
de6
fr2

Nazione

Attori

Attività

Interesse

Sequenza temporale

Genere

Fornitore

Prodotto

democracy-poll Plugin4
Kaotik Kshop2
Apache CloudStack2
OpenResty2
ChemCMS2

Vulnerabilità

#VulnerabilitàBaseTemp0dayOggiSfrConEPSSCTICVE
1unrar buffer overflow8.57.7$25k-$100k$0-$5kProof-of-ConceptOfficial Fix0.024170.02CVE-2012-6706
2OpenResty ngx.req.get_post_args sql injection8.58.2$0-$5k$0-$5kNot DefinedOfficial Fix0.006370.04CVE-2018-9230
3PRTG Network Monitor login.htm escalazione di privilegi8.58.2$0-$5k$0-$5kNot DefinedOfficial Fix0.002880.04CVE-2018-19410
4DZCP deV!L`z Clanportal config.php escalazione di privilegi7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.009430.70CVE-2010-0966
5democracy-poll Plugin cross site request forgery6.56.4$0-$5k$0-$5kNot DefinedOfficial Fix0.000850.00CVE-2017-18521
6democracy-poll Plugin class.DemAdminInit.php update_l10n cross site scripting5.25.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000840.00CVE-2017-18520
7FileOrbis File Management System Privilege Escalation6.96.7$0-$5k$0-$5kNot DefinedOfficial Fix0.000960.02CVE-2022-3693
8Atlassian JIRA Server/Data Center Email Template Privilege Escalation4.74.5$0-$5k$0-$5kNot DefinedOfficial Fix0.001990.04CVE-2021-43947
9phpMyAdmin Setup cross site scripting3.53.4$0-$5k$0-$5kNot DefinedOfficial Fix0.010390.00CVE-2022-23808
10Microsoft Exchange Server Outlook Web Access vulnerabilità sconosciuta4.84.6$5k-$25k$0-$5kNot DefinedOfficial Fix0.001020.00CVE-2019-0817
11Microsoft Exchange Server Outlook Web Access escalazione di privilegi7.26.8$25k-$100k$0-$5kNot DefinedOfficial Fix0.003270.00CVE-2017-11932
12Alcatel-Lucent Voice Mail System autenticazione debole9.89.8$0-$5k$0-$5kNot DefinedNot Defined0.008560.02CVE-2007-1822
13Qiku 360 Phone N6 Pro Kernel Module mmcblk0rpmb denial of service6.46.4$0-$5k$0-$5kNot DefinedNot Defined0.000820.00CVE-2018-18318
14MailEnable Enterprise Premium XML Data XML External Entity8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.002240.02CVE-2019-12924
15MailEnable Web Mail list.asp cross site scripting6.35.7$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.010030.00CVE-2007-0651
16Synology DiskStation Manager smart.cgi escalazione di privilegi7.57.4$0-$5k$0-$5kNot DefinedOfficial Fix0.119090.02CVE-2017-15889
17AuYou Wireless Smart Outlet Socket Remote Control Straisand autenticazione debole6.35.8$5k-$25k$0-$5kProof-of-ConceptWorkaround0.000000.00
18Huawei Smart Phone Bastet Module buffer overflow6.46.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.000720.02CVE-2019-5282
19Huawei P30 buffer overflow6.46.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.000730.04CVE-2019-5287
20Huawei P30 buffer overflow6.46.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.000730.02CVE-2019-5288

IOC - Indicator of Compromise (4)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (11)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (41)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClasseIndicatorGenereFiducia
1File/dev/block/mmcblk0rpmbpredictiveAlto
2File/etc/shadowpredictiveMedia
3File/public/login.htmpredictiveAlto
4Fileadmin/class.DemAdminInit.phppredictiveAlto
5Fileauth-gss2.cpredictiveMedia
6Filexxxxx.xxxpredictiveMedia
7Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveAlto
8Filexxxxx/xxx/xxxx.xxxpredictiveAlto
9Filexxxx.xxxpredictiveMedia
10Filexxx/xxxxxx.xxxpredictiveAlto
11Filexxxxx.xxxpredictiveMedia
12Filexxxxx.xxxxxxx.xxxpredictiveAlto
13Filexxxx_xxxx.xxxpredictiveAlto
14Filexxxxxxxxx/xxxxxxxx.xxxpredictiveAlto
15Filexxxxxx.xxxpredictiveMedia
16Filexxx_xxxxx.xxxpredictiveAlto
17Filexxxxxxxx.xxxxxpredictiveAlto
18Filexxxxxxxx.xxxpredictiveMedia
19Filexxxxxxx_xxxxxxx.xxxpredictiveAlto
20Filexxxxxx/xxxxx/xxxx/xxxxxxx.xxxxpredictiveAlto
21Filexxxx_xxxxxxx_xxxxxxxx.xxxpredictiveAlto
22Filexxxxx.xxxpredictiveMedia
23Filexxxxxxx.xxxpredictiveMedia
24Filexx-xxxxx/xxxxxxx-xxxxxxx.xxx?xxxx=xxxxxxxxx-xxxx&xxxxxxx=xxxxpredictiveAlto
25Libraryxxxxxxx.xxxpredictiveMedia
26ArgumentxxxxxxxxpredictiveMedia
27ArgumentxxxxxxpredictiveBasso
28ArgumentxxxxxpredictiveBasso
29Argumentxxx_xxpredictiveBasso
30Argumentxxxx_xxpredictiveBasso
31Argumentxxxx/xxxxpredictiveMedia
32ArgumentxxxxxxxpredictiveBasso
33ArgumentxxxxpredictiveBasso
34Argumentxxxx_xxxxxxpredictiveMedia
35ArgumentxxpredictiveBasso
36ArgumentxxxxxxxxxxpredictiveMedia
37Argumentxxxx_xxpredictiveBasso
38ArgumentxxxxpredictiveBasso
39Argumentxxxxxx/xxxxx/xxxxxx/xxxxxxx/xxxxxxxxxpredictiveAlto
40ArgumentxxxpredictiveBasso
41Network Portxx xxxxxxx xxx.xx.xx.xxpredictiveAlto

Referenze (3)

The following list contains external sources which discuss the actor and the associated activities:

Might our Artificial Intelligence support you?

Check our Alexa App!