Settore Education

Timeframe: -28 days

Default Categories (58): Access Management Software, Accounting Software, Anti-Malware Software, Anti-Spam Software, Application Server Software, Backup Software, Blog Software, Calendar Software, Chat Software, Cloud Software, Communications System, Database Administration Software, Database Software, Digital Media Player, Directory Service Software, Document Management Software, Document Processing Software, Document Reader Software, Endpoint Management Software, Firewall Software, Groupware Software, Hardware Driver Software, Image Processing Software, Information Management Software, IP Phone Software, Knowledge Base Software, Learning Management Software, Library Management System Software, Log Management Software, Mail Client Software, Mail Server Software, Messaging Software, Middleware, Multimedia Player Software, Multimedia Processing Software, Network Attached Storage Software, Network Encryption Software, Network Management Software, Network Routing Software, Office Suite Software, Operating System, Presentation Software, Printing Software, Programming Language Software, Project Management Software, Remote Access Software, Reporting Software, Router Operating System, Server Management Software, Spreadsheet Software, SSH Server Software, Survey Software, Unified Communication Software, Virtualization Software, Web Browser, Web Server, Wireless LAN Software, Word Processing Software

Sequenza temporale

Fornitore

Prodotto

Apple macOS68
Microsoft Windows48
Linux Kernel32
Google Chrome24
Microsoft Edge22

Contromisure

Official Fix346
Temporary Fix0
Workaround0
Unavailable2
Not Defined132

Sfruttabilità

High0
Functional6
Proof-of-Concept52
Unproven54
Not Defined368

Accesso al vettore

Not Defined0
Physical2
Local162
Adjacent76
Network240

Autenticazione

Not Defined0
High24
Low274
None182

Interazione dell'utente

Not Defined0
Required150
None330

C3BM Index

CVSSv3 Base

≤10
≤20
≤30
≤454
≤554
≤6142
≤7122
≤872
≤932
≤104

CVSSv3 Temp

≤10
≤20
≤32
≤462
≤582
≤6184
≤770
≤866
≤912
≤102

VulDB

≤10
≤20
≤36
≤462
≤580
≤6114
≤7118
≤872
≤924
≤104

NVD

≤1480
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

CNA

≤1384
≤20
≤30
≤40
≤50
≤610
≤732
≤830
≤914
≤1010

Fornitore

≤1422
≤20
≤30
≤42
≤50
≤66
≤710
≤820
≤916
≤104

Exploiter 0 giorni

<1k34
<2k114
<5k88
<10k82
<25k68
<50k70
<100k24
≥100k0

Exploiter aujourd'hui

<1k168
<2k92
<5k84
<10k46
<25k90
<50k0
<100k0
≥100k0

Sfrutta il volume del mercato

IOB - Indicator of Behavior (1000)

Sequenza temporale

Linguaggio

en934
it18
de16
es12
fr10

Nazione

us178
gb70
it48
de22
fr14

Attori

Attività

Interesse

Sequenza temporale

Genere

Fornitore

Prodotto

Apple macOS28
IObit Malware Fighter12
Microsoft Windows8
D-Link DIR820LA16
Netgear R6700v36

Vulnerabilità

#VulnerabilitàBaseTemp0dayOggiSfrConCTIEPSSCVE
1Zhong Bang CRMEB Java list getAdminList sql injection6.35.7$0-$5k$0-$5kProof-of-ConceptNot Defined5.200.00063CVE-2023-1608
2zwczou WeChat SDK Python to_xml XML External Entity6.36.0$0-$5k$0-$5kNot DefinedOfficial Fix2.630.00063CVE-2018-25082
3KMPlayer SHFOLDER.dll escalazione di privilegi5.34.8$0-$5k$0-$5kProof-of-ConceptNot Defined0.77+0.00000CVE-2023-1745
4Zoho ManageEngine OpManager XML File XML External Entity5.45.4$0-$5k$0-$5kNot DefinedNot Defined0.59+0.00000CVE-2022-43473
5SNIProxy Wildcard Backend Host buffer overflow8.58.4$0-$5k$0-$5kNot DefinedOfficial Fix0.56+0.00000CVE-2023-25076
6Infoline Project Management System escalazione di privilegi6.96.8$0-$5k$0-$5kNot DefinedOfficial Fix0.54+0.00000CVE-2023-1725
7DriverGenius IOCTL mydrivers64.sys 0x9c402084 denial of service5.55.0$0-$5k$0-$5kProof-of-ConceptNot Defined1.580.00045CVE-2023-1677
8IObit Malware Fighter IOCTL IMFCameraProtect.sys 0x8018E004 buffer overflow5.34.8$0-$5k$0-$5kProof-of-ConceptNot Defined1.250.00064CVE-2023-1646
9IObit Malware Fighter IOCTL ImfHpRegFilter.sys 0x8001E040 denial of service5.55.0$0-$5k$0-$5kProof-of-ConceptNot Defined1.150.00045CVE-2023-1643
10IObit Malware Fighter IOCTL IMFCameraProtect.sys 0x8018E010 denial of service5.55.0$0-$5k$0-$5kProof-of-ConceptNot Defined1.150.00045CVE-2023-1644
11IObit Malware Fighter IOCTL IMFCameraProtect.sys 0x8018E008 denial of service5.55.0$0-$5k$0-$5kProof-of-ConceptNot Defined1.260.00045CVE-2023-1645
12DriverGenius IOCTL mydrivers64.sys 0x9C402088 buffer overflow7.87.1$0-$5k$0-$5kProof-of-ConceptNot Defined1.540.00045CVE-2023-1676
13D-Link DIR-3040 MiniDLNA Service buffer overflow8.88.6$5k-$25k$5k-$25kNot DefinedNot Defined0.94-0.00000CVE-2022-43648
14Ubiquiti EdgeRouter X Static Routing Configuration escalazione di privilegi [Contestazione]7.26.5$0-$5k$0-$5kProof-of-ConceptUnavailable1.060.00043CVE-2023-1457
15Ubiquiti EdgeRouter X OSPF escalazione di privilegi [Contestazione]7.26.5$0-$5k$0-$5kProof-of-ConceptNot Defined1.290.00043CVE-2023-1458
16IObit Malware Fighter IOCTL ObCallbackProcess.sys 0x222040 denial of service5.55.0$0-$5k$0-$5kProof-of-ConceptNot Defined1.090.00045CVE-2023-1642
17DriverGenius IOCTL mydrivers64.sys 0x9C40A0E0 buffer overflow5.34.8$0-$5k$0-$5kProof-of-ConceptNot Defined1.610.00045CVE-2023-1678
18Zhong Bang CRMEB Java save cross site scripting3.53.2$0-$5k$0-$5kProof-of-ConceptNot Defined3.120.00051CVE-2023-1609
19grinnellplans-php read.php interface_disp_page sql injection6.36.0$0-$5k$0-$5kNot DefinedOfficial Fix1.160.00045CVE-2015-10097
20Ubiquiti EdgeRouter X NAT Configuration escalazione di privilegi [Contestazione]7.26.5$0-$5k$0-$5kProof-of-ConceptUnavailable1.250.00043CVE-2023-1456

IOC - Indicator of Compromise (4)

These indicators of compromise highlight associated network ranges which are known to be part of research and attack activities.

IDIP rangeAttoreGenereFiducia
145.61.185.0/24B1txor20predictiveAlto
2XX.XXX.XXX.X/XXXxxxxxxpredictiveAlto
3XX.XX.XXX.X/XXXxxxxxxxpredictiveAlto
4XXX.XXX.XX.X/XXXxxxxxpredictiveAlto

TTP - Tactics, Techniques, Procedures (18)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (95)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClasseIndicatorGenereFiducia
1File/ajax/update_certificatepredictiveAlto
2File/api/admin/store/product/listpredictiveAlto
3File/api/admin/store/product/savepredictiveAlto
4File/api/admin/system/store/order/listpredictiveAlto
5File/api/admin/user/listpredictiveAlto
6File/batm/app/admin/standalone/deploymentspredictiveAlto
7File/bookstore/bookPerPub.phppredictiveAlto
8File/dev/infiniband/rdma_cmpredictiveAlto
9File/tmppredictiveBasso
10File/tmp/mulipartFilepredictiveAlto
11Filearch/x86/kvm/x86.cpredictiveAlto
12Fileblog-web.phppredictiveMedia
13Filebugs.cpredictiveBasso
14Filex:\xxxxxxxxxx\xxxx\xxxxxxxxxx_xxxxx.xxxpredictiveAlto
15Filexxxxxxxxxx.xxxpredictiveAlto
16Filexxxxxx.xxxpredictiveMedia
17Filexxxxxx/xxxx/xxxx_xxx.xpredictiveAlto
18Filexxxxxxx/xxx/xxx-xxxx.xpredictiveAlto
19Filexxxxxxx/xxx/xxx-xxxx.xpredictiveAlto
20Filexxxxxxx/xxx/xxx.xpredictiveAlto
21Filexxxxxxx/xxx/xxxxxxxx/xxxxxxxx/xxxxxxxxx/xxxxxxxx/xxxxxxxx.xpredictiveAlto
22Filexxxxxxx/xxxxxxx/xxxxxxx/xxxxxxx_xxx.xpredictiveAlto
23Filexxxxxxxxxxx-xxxx.xxxxxxxpredictiveAlto
24Filexx/xxxx/xxxxxxx.xpredictiveAlto
25Filexx/xxxx/xxxxxxxx.xpredictiveAlto
26Filexx/xxxxx/xxxxx.xpredictiveAlto
27Filexx/xxxxx/xxxxxx.xpredictiveAlto
28Filexx/xxxxxxxxx/xxxx_xx.xpredictiveAlto
29Filexx/xxx/xxxxx.xpredictiveAlto
30Filexx_xxxxx/xxxxxxxxx.xpredictiveAlto
31Filexxxxxx/xxxxx/xx.xpredictiveAlto
32Filexxx.xxxpredictiveBasso
33Filexxxxxxxxxx/xxxxxxx_xxxxx.xpredictiveAlto
34Filexxxxxxxxxxxxx.xxpredictiveAlto
35Filexxxxx.xxxx.xxxpredictiveAlto
36Filexxxxx_xxxx.xxxxxpredictiveAlto
37Filexxxxx_xxxxx_xxxxxxx.xxxxxpredictiveAlto
38Filexxxxx_xxxxxx.xxxxxpredictiveAlto
39Filexxxxxxxxxxxx.xxxpredictiveAlto
40Filexxxxxxx_xxx.xxxpredictiveAlto
41Filexxx/xxxxxxxxx/xxx_xxxx.xpredictiveAlto
42Filexxx/xxx/xxxxxxx.xpredictiveAlto
43Filexxx/xxxx/xxxx.xpredictiveAlto
44Filexxx/xxxx/xxxxxx.xpredictiveAlto
45Filexxx/xxx/xxx_xxxx.xpredictiveAlto
46Filexxx/xxx/xxx_xx.xpredictiveAlto
47Filexxxx.xxxpredictiveMedia
48Filexxxx.xxxpredictiveMedia
49Filexxxxxxxxxx_xxxxxxx.xxxpredictiveAlto
50Filexxx_xxxxx.xpredictiveMedia
51Filexxxxx/xxxxxx.xpredictiveAlto
52Filexxxxx.xxxxxx.xxxxxxx.xxxpredictiveAlto
53Filexxxxxx.xxxpredictiveMedia
54Filexxx/xxxxx/xxx.xpredictiveAlto
55Libraryxxxxxx.xxxpredictiveMedia
56Libraryxxxxxxxxxxxxxxxx.xxxpredictiveAlto
57Libraryxxxxxxxxxxxxxx.xxxpredictiveAlto
58Libraryxxxxxxxxxxxxxxxxx.xxxpredictiveAlto
59Libraryxxxxxx.xxxpredictiveMedia
60Libraryxxx/xxxxxx.xpredictiveMedia
61Libraryxxx/xxx_xxx.xpredictiveAlto
62Libraryxxxxxxxxxxx.xxxpredictiveAlto
63Libraryxxxxxxxxx.xxxpredictiveAlto
64Libraryxxxxxxxxxxxxxx.xxxpredictiveAlto
65Libraryxxxxxxxxxxx.xxxpredictiveAlto
66Libraryxxxxxx.xxpredictiveMedia
67Libraryxxxxxxxxxxxxxxxxx.xxxpredictiveAlto
68Libraryxxx.xxxpredictiveBasso
69Libraryxxxxxxxx.xxxpredictiveMedia
70Libraryxxxxxxxx.xxxpredictiveMedia
71Libraryxxxx-xxxxxx.xxxpredictiveAlto
72Argumentxxx_xxxxx[]/xxx_xxxxx[]predictiveAlto
73ArgumentxxxxpredictiveBasso
74ArgumentxxxxpredictiveBasso
75ArgumentxxxxxxpredictiveBasso
76ArgumentxxxxxxxpredictiveBasso
77ArgumentxxxxxxxxxxxxxpredictiveAlto
78ArgumentxxpredictiveBasso
79ArgumentxxxxxxxxpredictiveMedia
80ArgumentxxxpredictiveBasso
81ArgumentxxxxxxxxxxxxxxpredictiveAlto
82Argumentxxx_xx_xxxxxx/xxx_xxx_xxxxxxxxxxxpredictiveAlto
83Argumentxxx_xxx_xxxpredictiveMedia
84ArgumentxxxxxxxxxxxxxxxxxpredictiveAlto
85Argumentxxxx/xxxxxpredictiveMedia
86Argumentxxxx-xxx-xxxxxxxxxpredictiveAlto
87ArgumentxxxxxxxxpredictiveMedia
88Argumentxxxx_xxxxpredictiveMedia
89ArgumentxxxxxxxpredictiveBasso
90Argumentxxxxxx_xxxxpredictiveMedia
91Argumentxxxxxxxxxxx_xxxxxxxx_x.x.x.xpredictiveAlto
92ArgumentxxxxxxpredictiveBasso
93ArgumentxxxxxxxxxxxxpredictiveMedia
94ArgumentxxxpredictiveBasso
95ArgumentxxxxxpredictiveBasso

Interested in the pricing of exploits?

See the underground prices here!