Brata Analiza

IOB - Indicator of Behavior (58)

Oś czasu

Język

en48
de4
it4
ja2

Kraj

us54
ch2
ru2

Aktorzy

Zajęcia

Wysiłek

Oś czasu

Rodzaj

Sprzedawca

Produkt

Spiffy Calendar Plugin2
TikiWiki2
Ivanti Endpoint Manager Mobile2
Apple Mac OS X Server2
Oracle Solaris2

Luki w zabezpieczeniach

#Słaby punktBaseTemp0dayDzisiajWykPrzEPSSCTICVE
1Thomas R. Pasawicz HyperBook Guestbook Password Database gbconfiguration.dat Hash information disclosure5.35.2$5k-$25k$0-$5kHighWorkaround0.020160.02CVE-2007-1192
2DZCP deV!L`z Clanportal config.php privilege escalation7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.009430.33CVE-2010-0966
3Microsoft Windows Domain Name Service Privilege Escalation6.66.1$25k-$100k$5k-$25kUnprovenOfficial Fix0.010580.00CVE-2023-28223
4Apple Mac OS X Server Wiki Server sql injection5.34.6$5k-$25k$0-$5kUnprovenOfficial Fix0.003390.42CVE-2015-5911
5Pligg cloud.php sql injection6.36.3$0-$5k$0-$5kNot DefinedNot Defined0.000000.39
6Tiki TikiWiki tiki-editpage.php privilege escalation7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.011940.03CVE-2004-1386
7dayrui FineCMS Linkage.php cross site scripting5.25.2$0-$5k$0-$5kNot DefinedOfficial Fix0.000670.00CVE-2018-7476
8PharStreamWrapper Protection Mechanism directory traversal8.58.4$0-$5k$0-$5kNot DefinedOfficial Fix0.027480.03CVE-2019-11831
9jQuery Property extend Pollution cross site scripting6.66.3$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.035350.16CVE-2019-11358
10Ivanti Endpoint Manager Mobile weak authentication9.99.7$0-$5k$0-$5kHighOfficial Fix0.965840.00CVE-2023-35078
11Hitachi Vantara Pentaho Business Analytics Server Data Lineage weak encryption6.36.3$0-$5k$0-$5kNot DefinedOfficial Fix0.001450.00CVE-2021-45447
12SAP NetWeaver/ABAP Platform Route saprouttab privilege escalation7.37.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.005760.04CVE-2022-27668
13Oracle Solaris Utility Local Privilege Escalation7.77.5$5k-$25k$0-$5kNot DefinedOfficial Fix0.000430.05CVE-2023-21985
14TikiWiki tiki-register.php privilege escalation7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.010091.02CVE-2006-6168
15Francisco Burzi PHP-Nuke File case.filemanager.php privilege escalation5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.005750.00CVE-2001-0854
16Mattermost API Endpoint denial of service4.24.2$0-$5k$0-$5kNot DefinedNot Defined0.000730.03CVE-2022-4045
17libdwarf ELF File denial of service5.45.3$0-$5k$0-$5kNot DefinedOfficial Fix0.002720.00CVE-2015-8750
18Lanner IAC-AST2500A spx_restservice KillDupUsr_func memory corruption9.99.8$0-$5k$0-$5kNot DefinedNot Defined0.002390.03CVE-2021-26728
19Spiffy Calendar Plugin Event privilege escalation6.36.2$0-$5k$0-$5kNot DefinedNot Defined0.000680.00CVE-2022-29434
20Armada Design Master Index search.cgi directory traversal5.34.8$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.022360.02CVE-2000-0924

IOC - Indicator of Compromise (4)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (7)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueLuki w zabezpieczeniachWektor dostępuRodzajPewność siebie
1T1006CWE-22Path TraversalpredictiveWysoki
2T1040CWE-319Authentication Bypass by Capture-replaypredictiveWysoki
3TXXXXCWE-XXXxxxxxxx XxxxxxxxxpredictiveWysoki
4TXXXX.XXXCWE-XXXxxxx Xxxx XxxxxxxxxpredictiveWysoki
5TXXXXCWE-XXX, CWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveWysoki
6TXXXXCWE-XXXxx XxxxxxxxxpredictiveWysoki
7TXXXXCWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveWysoki

IOA - Indicator of Attack (22)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDKlasaIndicatorRodzajPewność siebie
1Fileadd_comment.phppredictiveWysoki
2Filecase.filemanager.phppredictiveWysoki
3Filecloud.phppredictiveMedium
4Filexxxxxxxxxxx/xxxxx/xxxxxxx.xxxpredictiveWysoki
5Filexxxx/xxxxxxxxxxxxxxx.xxxpredictiveWysoki
6Filexxx/xxxxxx.xxxpredictiveWysoki
7FilexxxxxxxxxxpredictiveMedium
8Filexxxxxx.xxxpredictiveMedium
9Filexxxxxx.xxxpredictiveMedium
10Filexxxx-xxxxxxxx.xxxpredictiveWysoki
11Filexxxx-xxxxxxxx.xxxpredictiveWysoki
12Filexxxxxxxxx.xxxpredictiveWysoki
13Filexxxxxx.xxxpredictiveMedium
14Argument$xxx_xxxxpredictiveMedium
15Argument--xxxpredictiveNiski
16ArgumentxxxxxxxxpredictiveMedium
17ArgumentxxxxxxxxpredictiveMedium
18ArgumentxxxxxxxxxxpredictiveMedium
19Argumentxxx_xxpredictiveNiski
20ArgumentxxpredictiveNiski
21Argumentxx/xxxpredictiveNiski
22Input Valuexxxxx.xxxpredictiveMedium

Referencje (3)

The following list contains external sources which discuss the actor and the associated activities:

Samples (1)

The following list contains associated samples:

Do you know our Splunk app?

Download it now for free!