Metamorfo Analisi

IOB - Indicator of Behavior (25)

Sequenza temporale

Linguaggio

en12
de10
es4

Nazione

us20
tr2
pl2

Attori

Attività

Interesse

Sequenza temporale

Genere

Fornitore

Prodotto

Cacti2
Kaotik Kshop2
phpGroupWare2
MidiCart PHP Shopping Cart2
Microsoft Windows2

Vulnerabilità

#VulnerabilitàBaseTemp0dayOggiSfrConEPSSCTICVE
1Apple macOS MediaRemote escalazione di privilegi7.67.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.003770.02CVE-2018-4310
2Green Hills INTEGRITY RTOS Interpeak IPCOMShell TELNET Server buffer overflow8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.003080.00CVE-2019-7713
3phpGroupWare login.php sql injection7.37.0$0-$5k$0-$5kNot DefinedOfficial Fix0.003610.00CVE-2009-4414
4ImageMagick cache.c PersistPixelCache denial of service5.45.1$0-$5k$0-$5kNot DefinedOfficial Fix0.001030.00CVE-2017-14325
5Symphony content.blueprintspages.php cross site scripting5.25.2$0-$5k$0-$5kNot DefinedOfficial Fix0.000700.00CVE-2018-12043
6Microsoft Windows MS XML XML External Entity7.67.5$25k-$100k$5k-$25kNot DefinedOfficial Fix0.031030.00CVE-2019-0791
7MC Coming Soon Script launch_message.php escalazione di privilegi6.35.7$0-$5k$0-$5kProof-of-ConceptNot Defined0.000000.00
8Microsoft Internet Explorer JsArraySlice buffer overflow7.16.4$25k-$100k$0-$5kProof-of-ConceptOfficial Fix0.758990.04CVE-2017-11855
9Microsoft Windows VBScript/JScript escalazione di privilegi7.47.2$25k-$100k$0-$5kNot DefinedOfficial Fix0.108060.02CVE-2016-3206
10PHP var_unserializer.c escalazione di privilegi9.89.6$5k-$25k$0-$5kNot DefinedOfficial Fix0.027670.00CVE-2016-7124
11Microsoft XML Core Services escalazione di privilegi5.35.3$5k-$25k$0-$5kNot DefinedNot Defined0.004310.02CVE-2009-0419
12AXIS 2110 Network Camera virtualinput.cgi escalazione di privilegi7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.056840.02CVE-2004-2425
13Augeas Escape String buffer overflow8.58.4$0-$5k$0-$5kNot DefinedOfficial Fix0.031580.00CVE-2017-7555
14Google Android SSID Hotlist API escalazione di privilegi6.56.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.000440.04CVE-2017-11074
15Cacti graph_settings.php sql injection7.37.3$0-$5k$0-$5kNot DefinedNot Defined0.003460.00CVE-2014-5262
16cacti sql injection7.37.3$0-$5k$0-$5kNot DefinedNot Defined0.004540.00CVE-2013-5589
17Woltlab Burning Board Lite thread.php decode_cookie sql injection7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.009310.00CVE-2006-6237
18vBulletin redirector.php Redirect6.66.6$0-$5k$0-$5kNot DefinedNot Defined0.001220.13CVE-2018-6200
19Kaotik Kshop product_details.php sql injection7.37.3$0-$5k$0-$5kHighUnavailable0.008860.03CVE-2007-1810
20MidiCart PHP Shopping Cart item_show.php sql injection6.36.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.000000.05

IOC - Indicator of Compromise (5)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (5)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (20)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClasseIndicatorGenereFiducia
1File/admin/launch_message.phppredictiveAlto
2Filecontent/content.blueprintspages.phppredictiveAlto
3Fileext/standard/var_unserializer.cpredictiveAlto
4Filexxxxx_xxxxxxxx.xxxpredictiveAlto
5Filexxxxx.xxxpredictiveMedia
6Filexxxx_xxxx.xxxpredictiveAlto
7Filexxxxx.xxxpredictiveMedia
8Filexxxxxx/xxxxx.xpredictiveAlto
9Filexxxxxxx_xxxxxxx.xxxpredictiveAlto
10Filexxxxxxxxxx.xxxpredictiveAlto
11Filexxxxxxxxxxxx.xxxpredictiveAlto
12Filexxxxxx.xxxpredictiveMedia
13Filexxxxxxxxxxxx.xxxpredictiveAlto
14ArgumentxxxpredictiveBasso
15Argumentxxxx_xxpredictiveBasso
16ArgumentxxxxxxpredictiveBasso
17ArgumentxxpredictiveBasso
18ArgumentxxxxpredictiveBasso
19ArgumentxxxxxxpredictiveBasso
20ArgumentxxxpredictiveBasso

Referenze (3)

The following list contains external sources which discuss the actor and the associated activities:

Samples (2)

The following list contains associated samples:

Might our Artificial Intelligence support you?

Check our Alexa App!