Tomiris Analiza

IOB - Indicator of Behavior (34)

Oś czasu

Język

en32
sv2

Kraj

us20
ru4
gb4

Aktorzy

Zajęcia

Wysiłek

Oś czasu

Rodzaj

Sprzedawca

Produkt

Microsoft Windows4
Host2
Abstrium Pydio Cells2
1C:Enterprise2
Grafana2

Luki w zabezpieczeniach

#Słaby punktBaseTemp0dayDzisiajWykPrzEPSSCTICVE
1PRTG Network Monitor login.htm privilege escalation8.58.2$0-$5k$0-$5kNot DefinedOfficial Fix0.002880.04CVE-2018-19410
2Mikrotik RouterOS SNMP information disclosure8.07.7$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.003070.05CVE-2022-45315
3nginx privilege escalation6.96.9$0-$5k$0-$5kNot DefinedNot Defined0.002414.86CVE-2020-12440
4Abstrium Pydio Cells Change Subscription privilege escalation6.36.3$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.000610.05CVE-2023-2978
5ningzichun Student Management System Password Reset resetPassword.php privilege escalation7.67.4$0-$5k$0-$5kProof-of-ConceptNot Defined0.002730.05CVE-2023-3007
6Campcodes Online Thesis Archiving System manage_user.php sql injection7.57.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.001460.14CVE-2023-2149
7Odoo Community/Enterprise Database Manager privilege escalation8.58.3$0-$5k$0-$5kNot DefinedNot Defined0.004930.00CVE-2018-14885
81C:Enterprise URL Parameter information disclosure5.95.6$0-$5k$0-$5kNot DefinedOfficial Fix0.001680.06CVE-2021-3131
9Hikvision Wwireless Bridge Web Server privilege escalation7.37.3$0-$5k$0-$5kNot DefinedNot Defined0.001420.05CVE-2022-28173
10Microsoft Windows SMB information disclosure6.45.5$25k-$100k$5k-$25kUnprovenOfficial Fix0.008940.00CVE-2021-36960
11Microsoft Windows SMB privilege escalation7.77.5$25k-$100k$0-$5kHighOfficial Fix0.974270.24CVE-2017-0144
12Microsoft Windows SMB Client Security Feature information disclosure4.33.8$25k-$100k$0-$5kUnprovenOfficial Fix0.005390.00CVE-2021-31205
13Synology DiskStation Manager Web Interface info.cgi Reflected cross site scripting5.55.1$0-$5k$0-$5kProof-of-ConceptWorkaround0.000000.03
14Grafana Dashboard directory traversal3.53.4$0-$5k$0-$5kNot DefinedNot Defined0.002260.03CVE-2022-32275
15Online Student Admission sql injection6.35.7$0-$5k$0-$5kProof-of-ConceptNot Defined0.001720.04CVE-2022-28467
16PHP EXIF exif_process_IFD_in_MAKERNOTE memory corruption7.57.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.004770.00CVE-2019-9639
17Mini-Inventory-and-Sales-Management-System Inventory cross site request forgery3.53.4$0-$5k$0-$5kNot DefinedNot Defined0.000440.00CVE-2021-44321
18JFrog Artifactory upload privilege escalation8.57.4$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.113830.02CVE-2016-10036
19TightVNC InitialiseRFBConnection memory corruption8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.019270.02CVE-2019-15679
20Linux Kernel Patch CVE-2020-14356 memory corruption6.56.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.000450.01CVE-2020-25220

Kampanie (1)

These are the campaigns that can be associated with the actor:

  • Tomiris

IOC - Indicator of Compromise (3)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDadres IPHostnameAktorKampanieIdentifiedRodzajPewność siebie
151.195.68.217time1.lyhuao.comTomiris2021-09-30verifiedWysoki
2XXX.XXX.XXX.XXXxxxxxxxx.xxxx.xxxxxx.xxxXxxxxxx2021-09-30verifiedWysoki
3XXX.XXX.XXX.XXxxxx.xxXxxxxxx2021-09-30verifiedWysoki

TTP - Tactics, Techniques, Procedures (7)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueKlasaLuki w zabezpieczeniachWektor dostępuRodzajPewność siebie
1T1006CAPEC-139CWE-23Path TraversalpredictiveWysoki
2T1059.007CAPEC-18CWE-80Cross Site ScriptingpredictiveWysoki
3TXXXXCAPEC-19CWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveWysoki
4TXXXXCAPEC-108CWE-XXXxx XxxxxxxxxpredictiveWysoki
5TXXXXCAPEC-50CWE-XXXXxxxxxxxxxx XxxxxxxxxxpredictiveWysoki
6TXXXXCAPEC-116CWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveWysoki
7TXXXX.XXXCAPEC-1CWE-XXXXxxxxxxxxx Xxxxxxxxxxxxxx Xx Xxxxxxxx Xxxx XxxxxxxxxpredictiveWysoki

IOA - Indicator of Attack (19)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDKlasaIndicatorRodzajPewność siebie
1File/admin/user/manage_user.phppredictiveWysoki
2File/cgi-bin/webadminget.cgipredictiveWysoki
3File/opt/teradata/gsctools/bin/t2a.plpredictiveWysoki
4File/xxxxxx/xxxxx.xxxpredictiveWysoki
5File/xxxxxx/xxxx.xxxpredictiveWysoki
6Filexxxxxxx/xxx/xxx/xxxx_xxxxxx.xpredictiveWysoki
7Filexxxx.xxxpredictiveMedium
8Filexxx/xxxxx.xxxxpredictiveWysoki
9Filexxxxxxx.xxxpredictiveMedium
10Filexxxxxxxxxxxxx.xxxpredictiveWysoki
11Filexxxxxx.xpredictiveMedium
12Filexx/xxxxxxxx/xxxxxxpredictiveWysoki
13Argumentxxxx_xxxpredictiveMedium
14Argumentxxxx/xxxxxx/xxxpredictiveWysoki
15ArgumentxxpredictiveNiski
16Argumentxxxxxxx_xxxpredictiveMedium
17ArgumentxxxpredictiveNiski
18ArgumentxxxxxxxxxxxxxxxxpredictiveWysoki
19ArgumentxxxpredictiveNiski

Referencje (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you want to use VulDB in your project?

Use the official API to access entries easily!