Mispadu Analisi

IOB - Indicator of Behavior (20)

Sequenza temporale

Linguaggio

de10
en8
ar2

Nazione

us18
ir2

Attori

Attività

Interesse

Sequenza temporale

Genere

Fornitore

Prodotto

Green Hills INTEGRITY RTOS2
IBM DB22
netcf2
Drupal2
Mahara2

Vulnerabilità

#VulnerabilitàBaseTemp0dayOggiSfrConEPSSCTICVE
1Huawei ACXXXX/SXXXX SSH Packet escalazione di privilegi7.57.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.002460.07CVE-2014-8572
2Huawei SXXX VRP MPLS LSP Ping rivelazione di un 'informazione5.35.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.000960.10CVE-2014-8570
3Tribe29 Checkmk Livestatus Query Language escalazione di privilegi7.07.0$0-$5k$0-$5kNot DefinedNot Defined0.000430.00CVE-2022-47909
4Tribe29 Checkmk Agent Updater Log File rivelazione di un 'informazione5.15.1$0-$5k$0-$5kNot DefinedNot Defined0.000430.04CVE-2022-48319
5Microsoft Windows ISATAP escalazione di privilegi6.56.2$25k-$100k$0-$5kNot DefinedOfficial Fix0.063960.00CVE-2010-0812
6IBM DB2 escalazione di privilegi6.36.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.003430.00CVE-2011-1846
7Nicholas Marriott tmux escalazione di privilegi5.95.6$0-$5k$0-$5kProof-of-ConceptNot Defined0.000510.00CVE-2011-1496
8WordPress directory traversal5.75.6$5k-$25k$0-$5kNot DefinedOfficial Fix0.003260.05CVE-2023-2745
9netcf Path Expression find_ifcfg_path escalazione di privilegi5.95.8$0-$5k$0-$5kNot DefinedOfficial Fix0.006620.00CVE-2014-8119
10Xerox Workcentre 5655 Authorization rivelazione di un 'informazione5.35.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.002680.00CVE-2010-0548
11Xerox Workcentre 6400 Net Controller rivelazione di un 'informazione5.35.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.002820.02CVE-2010-0549
12SilverStripe rivelazione di un 'informazione5.35.1$0-$5k$0-$5kNot DefinedOfficial Fix0.010450.00CVE-2010-5188
13ubuntu Linux autenticazione debole10.09.5$5k-$25k$0-$5kNot DefinedOfficial Fix0.003450.03CVE-2010-0834
14Red Hat Enterprise Linux escalazione di privilegi5.35.3$5k-$25k$5k-$25kNot DefinedNot Defined0.004850.00CVE-2010-2598
15Drupal Form API escalazione di privilegi5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.000930.05CVE-2022-25271
16Mahara Single Sign-On autenticazione debole6.36.0$0-$5k$0-$5kNot DefinedOfficial Fix0.004720.02CVE-2010-1670
17Green Hills INTEGRITY RTOS Interpeak IPCOMShell TELNET Server buffer overflow8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.003080.00CVE-2019-7713
18Samba receive_smb_raw buffer overflow7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.970180.03CVE-2008-1105

IOC - Indicator of Compromise (5)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (4)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (1)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClasseIndicatorGenereFiducia
1Argumentdebug_profilepredictiveAlto

Referenze (4)

The following list contains external sources which discuss the actor and the associated activities:

Want to stay up to date on a daily basis?

Enable the mail alert feature now!