Bisonal Analiza

IOB - Indicator of Behavior (16)

Oś czasu

Język

en14
it2

Kraj

Aktorzy

Zajęcia

Wysiłek

Oś czasu

Rodzaj

Sprzedawca

Produkt

Bitrix Site Manager4
CodeIgniter2
Idera Travis CI2
FLDS2
Thomas R. Pasawicz HyperBook Guestbook2

Luki w zabezpieczeniach

#Słaby punktBaseTemp0dayDzisiajWykPrzCTIEPSSCVE
1Bitrix Site Manager redirect.php privilege escalation5.34.7$0-$5k$0-$5kUnprovenUnavailable0.090.00113CVE-2008-2052
2FLDS redir.php sql injection7.37.3$0-$5k$0-$5kHighUnavailable0.070.00203CVE-2008-5928
3Idera Travis CI Activation .travis.yml information disclosure2.62.6$0-$5k$0-$5kNot DefinedNot Defined0.020.00152CVE-2021-41077
4Autoptimize Plugin Import privilege escalation5.45.2$0-$5k$0-$5kNot DefinedOfficial Fix0.000.01016CVE-2021-24376
5Bitrix Upload from Local Disk Feature restore.php privilege escalation6.36.1$0-$5k$0-$5kNot DefinedNot Defined0.050.00049CVE-2022-29268
6Bitrix Site Manager Vote Module Remote Code Execution7.37.0$0-$5k$0-$5kNot DefinedOfficial Fix0.020.00668CVE-2022-27228
7SSH Agent Plugin privilege escalation3.53.5$0-$5k$0-$5kNot DefinedNot Defined0.000.00054CVE-2022-20620
8CodeIgniter Sendmail Email.php privilege escalation8.58.1$0-$5k$0-$5kNot DefinedOfficial Fix0.080.04920CVE-2016-10131
9Atlassian Bitbucket Data Center directory traversal8.18.0$0-$5k$0-$5kNot DefinedOfficial Fix0.020.00441CVE-2019-3397
10furlongm openvpn-monitor Management Interface Socket privilege escalation3.53.4$0-$5k$0-$5kNot DefinedNot Defined0.000.00120CVE-2021-31605
11VMware vCenter Server Analytics Service privilege escalation8.68.5$5k-$25k$0-$5kFunctionalOfficial Fix0.020.97389CVE-2021-22005
12WordPress HTML Element general-template.php cross site scripting4.44.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.030.00094CVE-2017-17093
13Linux Kernel UDP Packet udp.c privilege escalation8.58.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.030.04837CVE-2016-10229
14Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash information disclosure5.35.2$5k-$25k$0-$5kHighWorkaround0.020.02016CVE-2007-1192
15Tiki TikiWiki tiki-editpage.php privilege escalation7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.050.01194CVE-2004-1386
16INFINICART browse_group.asp sql injection7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.000.00262CVE-2006-5957

IOC - Indicator of Compromise (8)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (9)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueLuki w zabezpieczeniachWektor dostępuRodzajPewność siebie
1T1006CWE-22Path TraversalpredictiveWysoki
2T1055CWE-74Improper Neutralization of Data within XPath ExpressionspredictiveWysoki
3TXXXXCWE-XXXxxxxxxx XxxxxxxxxpredictiveWysoki
4TXXXX.XXXCWE-XXXxxxx Xxxx XxxxxxxxxpredictiveWysoki
5TXXXXCWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx XxxxxxxxxpredictiveWysoki
6TXXXXCWE-XXX7xx Xxxxxxxx XxxxxxxxpredictiveWysoki
7TXXXXCWE-XXXxx XxxxxxxxxpredictiveWysoki
8TXXXXCWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveWysoki
9TXXXX.XXXCWE-XXXXxxxxxxxxx Xxxxxxxxxxxxxx Xx Xxxxxxxx Xxxx XxxxxxxxxpredictiveWysoki

IOA - Indicator of Attack (16)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDKlasaIndicatorRodzajPewność siebie
1File.travis.ymlpredictiveMedium
2Filebrowse_group.asppredictiveWysoki
3Filedata/gbconfiguration.datpredictiveWysoki
4Filexxxxx.xxxpredictiveMedium
5Filexxxxxxxx.xxxpredictiveMedium
6Filexxxxxxx.xxxpredictiveMedium
7Filexxxx-xxxxxxxx.xxxpredictiveWysoki
8Filexxx.xpredictiveNiski
9Filexx-xxxxxxxx/xxxxxxx-xxxxxxxx.xxxpredictiveWysoki
10Libraryxxxxxx/xxxxxxxxx/xxxxx.xxxpredictiveWysoki
11Argumentxxxxx->xxxxpredictiveMedium
12ArgumentxxxxpredictiveNiski
13ArgumentxxpredictiveNiski
14ArgumentxxxxpredictiveNiski
15ArgumentxxxxxpredictiveNiski
16Network PortxxxpredictiveNiski

Referencje (4)

The following list contains external sources which discuss the actor and the associated activities:

Want to stay up to date on a daily basis?

Enable the mail alert feature now!