TheMoon Analiza

IOB - Indicator of Behavior (167)

Oś czasu

Język

en140
zh10
ru6
sv6
de2

Kraj

us162
se2
ro2
cn2

Aktorzy

Zajęcia

Wysiłek

Oś czasu

Rodzaj

Sprzedawca

Produkt

Microsoft Windows12
WordPress8
Linux Kernel8
Acme Mini HTTPd4
F5 BIG-IP4

Luki w zabezpieczeniach

#Słaby punktBaseTemp0dayDzisiajWykPrzEPSSCTICVE
1Tiki Admin Password tiki-login.php weak authentication8.07.7$0-$5k$0-$5kNot DefinedOfficial Fix0.009362.29CVE-2020-15906
2SonicWALL SMA100 libSys.so memory corruption8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.003430.03CVE-2019-7482
3Juniper Junos SRX ICAP Redirect Service memory corruption8.58.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.009320.00CVE-2020-1647
4Espruino jsvar.c jsvNewFromString memory corruption5.55.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000740.00CVE-2022-25044
5Sophos Cyberoam Firewall SSL VPN Console privilege escalation8.58.2$0-$5k$0-$5kNot DefinedOfficial Fix0.006420.03CVE-2019-17059
6VMware Tools race condition7.77.7$5k-$25k$0-$5kNot DefinedNot Defined0.000440.02CVE-2020-3941
7Microsoft IIS cross site scripting5.24.7$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.005480.06CVE-2017-0055
8Huawei SXXXX XML Parser privilege escalation3.63.6$0-$5k$0-$5kNot DefinedNot Defined0.000560.03CVE-2017-15346
9Guo Xu Guos Posting System print.asp sql injection7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.022720.00CVE-2007-0554
10WiX Toolset Installer Temp privilege escalation7.37.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000450.04CVE-2024-29187
11Microsoft Windows Privilege Escalation8.17.7$25k-$100k$5k-$25kHighOfficial Fix0.000540.04CVE-2023-36802
12Moment.js directory traversal6.96.7$0-$5k$0-$5kNot DefinedOfficial Fix0.003300.06CVE-2022-24785
13Qualiteam X-Cart home.php sql injection7.37.3$0-$5k$0-$5kNot DefinedNot Defined0.010120.00CVE-2005-1822
14SourceCodester Online Eyewear Shop sql injection7.17.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.001520.07CVE-2023-0673
15SourceCodester Online Food Ordering System manage_user.php sql injection8.17.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.005310.06CVE-2023-0332
16lirantal daloradius Privilege Escalation6.46.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000800.05CVE-2023-0046
17SnakeYAML YAML File memory corruption3.13.0$0-$5k$0-$5kNot DefinedNot Defined0.001520.03CVE-2022-41854
18Sonus SBC 1000/SBC 2000/SBC SWe Lite Web Interface privilege escalation9.89.8$0-$5k$0-$5kNot DefinedNot Defined0.002450.03CVE-2018-11541
19Sonus SBC 1000/SBC 2000/SBC SWe Lite Web Interface directory traversal6.46.4$0-$5kObliczenieNot DefinedNot Defined0.001720.02CVE-2018-11543
20XenForo Admin Panel cross site scripting4.14.1$0-$5k$0-$5kNot DefinedNot Defined0.000580.03CVE-2021-43032

IOC - Indicator of Compromise (9)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (14)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (73)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDKlasaIndicatorRodzajPewność siebie
1File/bin/webserverpredictiveWysoki
2File/cgi-bin/hi3510/param.cgipredictiveWysoki
3File/cgi-bin/user/Config.cgipredictiveWysoki
4File/forum/away.phppredictiveWysoki
5File/htsrv/call_plugin.phppredictiveWysoki
6File/uncpath/predictiveMedium
7File/var/avamar/f_cache.datpredictiveWysoki
8File/webmail/predictiveMedium
9Fileadmin.asppredictiveMedium
10Filexxxxx.xxx?xxxxxx=xxxxxxxxpredictiveWysoki
11Filexxxxx/xxxxxx_xxxx.xxxpredictiveWysoki
12Filexxxxx/xxxxxxxxx.xxxpredictiveWysoki
13Filexxxxxxx.xxxpredictiveMedium
14Filexxxxxx-xxxxxxxxx.xxxpredictiveWysoki
15Filex:\xxxxxxx\xxxxpredictiveWysoki
16Filexxxxxx.xxxpredictiveMedium
17Filex_xxxxxxpredictiveMedium
18Filexxxxxxx.xxxxx.xxxpredictiveWysoki
19Filexxxxxxx/xxx/xxxxxxxx/xxx/xxx_xxx_xxx.xpredictiveWysoki
20Filexxxxxxxxxxxxxxxxxx.xxxpredictiveWysoki
21Filexx-xxxxxxx/xxxxxxxpredictiveWysoki
22Filexxxxxxx.xxxpredictiveMedium
23Filexxxx.xxxpredictiveMedium
24Filexxxxx.xxxpredictiveMedium
25Filexxxxx.xxxpredictiveMedium
26Filexxxxxx/xxxxxx.xpredictiveWysoki
27Filexxxxxx.xxpredictiveMedium
28Filexxxxxxxxxxxxx.xxxpredictiveWysoki
29Filexxx/xxxxxxxxx/xxxxx_xxxx.xpredictiveWysoki
30Filexxx/xxxx/xxx_xxxxxx.xpredictiveWysoki
31Filexxx/xxxxxpredictiveMedium
32Filexxx_xxxx_xxx_xxxxxxxxxx.xpredictiveWysoki
33Filexxxx/?x=xxxxxxxx/xxxx_xxxxxxx.xxxpredictiveWysoki
34Filexxxx/xxxxxxxx/xxxx_xxxxxxx.xxxpredictiveWysoki
35Filexxxxxxxxxxxxxxxxxxxxxxxx.xxxxpredictiveWysoki
36Filexxxxxx/xxxxxxxxxx/xxx/xxxx.xxxpredictiveWysoki
37Filexxxxx.xxxpredictiveMedium
38Filexxxxxxxxx.xxxpredictiveWysoki
39Filexxx/xxxxx.xpredictiveMedium
40Filexxxxxxx/xxxxx.xxxpredictiveWysoki
41Filexxx.xxxpredictiveNiski
42Filexxxx-xxxxx.xxxpredictiveWysoki
43Filexx-xxxxxxxxx.xxxpredictiveWysoki
44Filexxxxxxxxxx.xxxpredictiveWysoki
45Libraryxx/xxx/xxxx_xxxxxx.xxxpredictiveWysoki
46Libraryxxxxxxxxxxxxxxx.xxxpredictiveWysoki
47Libraryxxxx.xxx.xxxpredictiveMedium
48Argumentxxx_xxxxx_xxxxpredictiveWysoki
49ArgumentxxxxxxxxxxxpredictiveMedium
50ArgumentxxxxxxxpredictiveNiski
51ArgumentxxxxxpredictiveNiski
52ArgumentxxxxpredictiveNiski
53ArgumentxxxxxxxpredictiveNiski
54ArgumentxxpredictiveNiski
55ArgumentxxxxxxxxpredictiveMedium
56ArgumentxxxxpredictiveNiski
57Argumentx_x_xpredictiveNiski
58Argumentxxxxxxxxxxxxx xxpredictiveWysoki
59Argumentxxxx_xxxpredictiveMedium
60ArgumentxxxpredictiveNiski
61ArgumentxxxxxxxpredictiveNiski
62ArgumentxxxxxxxxxpredictiveMedium
63ArgumentxxxxxxxpredictiveNiski
64Argumentxx_xxpredictiveNiski
65ArgumentxxxxpredictiveNiski
66ArgumentxxxxxxxxpredictiveMedium
67Argumentxxx_xxxxxxxxxxxx_xxxpredictiveWysoki
68Argumentx-xxx-xx-xxpredictiveMedium
69Input Value..predictiveNiski
70Input Value../predictiveNiski
71Input Value/xxxxxx&xxxxxx=xxx&xxxxxxxx=xxxxxxx.*predictiveWysoki
72Input Value<xxx xxx="xxxx://x"; xx xxxxxxx="$(’x').xxxx(’xxxxxx’)" />predictiveWysoki
73Network Portxxx/xxx, xxx/xxx, xxx/xxxx, xxx/xxxxpredictiveWysoki

Referencje (2)

The following list contains external sources which discuss the actor and the associated activities:

Interested in the pricing of exploits?

See the underground prices here!