QNAPCrypt Analiza

IOB - Indicator of Behavior (21)

Oś czasu

Język

en20
sv2

Kraj

us16
ru2
gb2

Aktorzy

Zajęcia

Wysiłek

Oś czasu

Rodzaj

Sprzedawca

Produkt

eMeeting Online Dating Software2
Microsoft Outlook Web App2
Microsoft IIS2
Teradata Virtual Machine Community Edition2
Microsoft SQL Server2

Luki w zabezpieczeniach

#Słaby punktBaseTemp0dayDzisiajWykPrzEPSSCTICVE
1Fortinet FortiOS SSL-VPN Daemon denial of service7.57.2$0-$5k$0-$5kNot DefinedOfficial Fix0.000430.03CVE-2023-29180
2QNAP Multimedia Console/QTS/Media Streaming Add-on privilege escalation9.08.8$0-$5k$0-$5kNot DefinedOfficial Fix0.000670.04CVE-2023-23369
3OpenSSH Authentication Username information disclosure5.34.8$5k-$25k$0-$5kHighOfficial Fix0.107370.15CVE-2016-6210
4Mikrotik RouterOS SNMP information disclosure8.07.7$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.003070.04CVE-2022-45315
5Odoo Community/Enterprise Database Manager privilege escalation8.58.3$0-$5k$0-$5kNot DefinedNot Defined0.004930.00CVE-2018-14885
61C:Enterprise URL Parameter information disclosure5.95.6$0-$5k$0-$5kNot DefinedOfficial Fix0.001680.06CVE-2021-3131
7Hikvision Wwireless Bridge Web Server privilege escalation7.37.3$0-$5k$0-$5kNot DefinedNot Defined0.001420.05CVE-2022-28173
8Synology DiskStation Manager Web Interface info.cgi Reflected cross site scripting5.55.1$0-$5k$0-$5kProof-of-ConceptWorkaround0.000000.03
9Online Student Admission sql injection6.35.7$0-$5k$0-$5kProof-of-ConceptNot Defined0.001720.03CVE-2022-28467
10Mini-Inventory-and-Sales-Management-System Inventory cross site request forgery3.53.4$0-$5k$0-$5kNot DefinedNot Defined0.000440.00CVE-2021-44321
11TightVNC InitialiseRFBConnection memory corruption8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.019270.02CVE-2019-15679
12Host Web Server phpinfo.php phpinfo information disclosure5.35.2$5k-$25k$0-$5kNot DefinedWorkaround0.000000.04
13Microsoft Outlook Web App redir.aspx weak authentication5.35.0$5k-$25k$0-$5kProof-of-ConceptUnavailable0.000000.00
14Teradata Virtual Machine Community Edition Temp File t2a.pl privilege escalation9.89.8$0-$5k$0-$5kNot DefinedNot Defined0.017960.00CVE-2016-7489
15Microsoft SQL Server Virtual Function privilege escalation6.36.0$25k-$100k$0-$5kNot DefinedOfficial Fix0.025710.04CVE-2015-1763
16Mlffat index.php sql injection7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.000990.00CVE-2009-2585
17Microsoft IIS FTP Server memory corruption7.57.2$25k-$100k$0-$5kHighOfficial Fix0.968430.05CVE-2010-3972
18WordPress wp_crop_image directory traversal5.95.8$5k-$25k$0-$5kProof-of-ConceptNot Defined0.958840.02CVE-2019-8943
19Gempar Script Toko Online shop_display_products.php sql injection7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.001000.02CVE-2009-0296
20Drupal System Module Reflected privilege escalation6.46.2$0-$5k$0-$5kNot DefinedOfficial Fix0.002630.03CVE-2016-3168

IOC - Indicator of Compromise (4)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (7)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueLuki w zabezpieczeniachWektor dostępuRodzajPewność siebie
1T1006CWE-22Path TraversalpredictiveWysoki
2T1059.007CWE-80Cross Site ScriptingpredictiveWysoki
3TXXXXCWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveWysoki
4TXXXXCWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx XxxxxxxxxpredictiveWysoki
5TXXXXCWE-XXX7xx Xxxxxxxx XxxxxxxxpredictiveWysoki
6TXXXXCWE-XXXxx XxxxxxxxxpredictiveWysoki
7TXXXXCWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveWysoki

IOA - Indicator of Attack (14)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDKlasaIndicatorRodzajPewność siebie
1File/opt/teradata/gsctools/bin/t2a.plpredictiveWysoki
2File/webman/info.cgipredictiveWysoki
3Fileaccount/gallery.phppredictiveWysoki
4Filexxxxx.xxxpredictiveMedium
5Filexxx/xxxxx.xxxxpredictiveWysoki
6Filexxxxxxx.xxxpredictiveMedium
7Filexxxx_xxxxxxx_xxxxxxxx.xxxpredictiveWysoki
8Argumentxxx_xxpredictiveNiski
9Argumentxxxx/xxxxxx/xxxpredictiveWysoki
10ArgumentxxpredictiveNiski
11ArgumentxxxxxxxxpredictiveMedium
12ArgumentxxxxxxxxxxxxxxxxpredictiveWysoki
13ArgumentxxxpredictiveNiski
14Input Value.xxx?/../../xxxx.xxxpredictiveWysoki

Referencje (2)

The following list contains external sources which discuss the actor and the associated activities:

Samples (3)

The following list contains associated samples:

Do you want to use VulDB in your project?

Use the official API to access entries easily!