Oto Gonderici 分析

IOB - Indicator of Behavior (70)

时间轴

语言

en62
fr4
ru2
de2

国家/地区

演员

活动

利益

时间轴

类型

供应商

产品

Microsoft IIS4
Google Chrome4
Apple iOS4
Apple iPadOS4
Dell EMC iDRAC94

漏洞

#漏洞BaseTemp0day今天修正EPSSCTICVE
1ABUS TVIP 20000-21150 Metacharacter wireless_mft 权限升级6.76.7$0-$5k$0-$5kNot DefinedNot Defined0.010340.05CVE-2023-26609
2Free5gc NAS Message 拒绝服务6.56.5$0-$5k$0-$5kNot DefinedNot Defined0.000630.00CVE-2022-38871
3Qualcomm Snapdragon Consumer IOT Meta Image 内存损坏4.64.4$0-$5k$0-$5kNot DefinedOfficial Fix0.000580.00CVE-2021-1899
4Qualcomm Snapdragon Auto Display 内存损坏7.87.5$5k-$25k$0-$5kNot DefinedOfficial Fix0.000440.00CVE-2021-1900
5IBM Cognos Analytics 跨网站请求伪造4.34.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.001530.00CVE-2021-38886
6Huawei ACXXXX/SXXXX SSH Packet 权限升级7.57.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.002460.02CVE-2014-8572
7Mambo CMS thumbs.php Path 目录遍历5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.001200.02CVE-2013-2565
8Mutare Voice getfile.asp 权限升级8.58.2$0-$5k$0-$5kNot DefinedOfficial Fix0.006160.00CVE-2021-27236
9Dell EMC Unity/UnityVSA/Unity XT Upgrade Readiness Utility 弱加密1.91.9$0-$5k$0-$5kNot DefinedOfficial Fix0.000440.02CVE-2021-21547
10Parallels Desktop Toolgate 内存损坏7.87.8$0-$5k$0-$5kNot DefinedNot Defined0.000500.00CVE-2021-31420
11Dell EMC iDRAC9 Configuration 内存损坏6.36.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.001580.00CVE-2021-21540
12Samsung SmartThings Port 拒绝服务3.33.2$0-$5k$0-$5kNot DefinedOfficial Fix0.001040.00CVE-2021-25378
13Cisco Small Business RV Series Router Link Layer Discovery Protocol 内存损坏6.36.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.000700.00CVE-2021-1251
14Kagemai 跨网站脚本4.84.8$0-$5k$0-$5kNot DefinedNot Defined0.001150.00CVE-2021-20685
15Qualcomm Snapdragon Auto RTCP Packet 拒绝服务7.57.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.001030.00CVE-2020-11255
16RTA 499ES EtherNet-IP Adaptor Source Code 内存损坏8.08.0$0-$5k$0-$5kNot DefinedNot Defined0.004890.00CVE-2020-25159
17Apple iOS/iPadOS CoreText 信息公开6.36.0$25k-$100k$5k-$25kNot DefinedOfficial Fix0.016790.00CVE-2021-1792
18Apple iOS/iPadOS 拒绝服务6.36.0$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000620.00CVE-2021-1773
19arenavec Crate default 拒绝服务3.53.5$0-$5k$0-$5kNot DefinedNot Defined0.001620.00CVE-2021-29930
20Synology DiskStation Manager SYNO.Core.Network.PPPoE 权限升级7.26.9$0-$5k$0-$5kNot DefinedOfficial Fix0.000720.02CVE-2021-29083

IOC - Indicator of Compromise (4)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (14)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (25)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

ID分类Indicator类型可信度
1File/cgi-bin/mft/wireless_mftpredictive
2File/usr/local/nagiosxi/html/includes/configwizards/windowswmi/windowswmi.inc.phppredictive
3Fileaudiohd.exepredictive
4FileC:\Windupdtpredictive
5Filex:\x_xxxxxxxpredictive
6Filexxx-xxx/xxxxxxxpredictive
7Filexxxxxxxx.xxx/xxxxxxx_xxxxxx.xxxpredictive
8Filexxxx/xxxxxxxxxxxxxxx.xxxpredictive
9Filexxx/xxxxxxxx/xxxx_xxxxx.xpredictive
10Filexxxxxxx.xxxpredictive
11Filexxxxxxpredictive
12Filexxxxxx.xxxpredictive
13Filexxx.xpredictive
14Libraryxxxxxxxxx.xxxpredictive
15Libraryxxxxxxxxxx.xxxpredictive
16Argumentxxpredictive
17Argumentxxpredictive
18Argumentxxxxxxxpredictive
19Argumentxxxx_xxxxpredictive
20Argumentxxxxxxxxpredictive
21Argumentxxxxxxpredictive
22Input Value%xxx%xxxxxxxxx%xxxxxxx(x)>%xxpredictive
23Input Value.x./predictive
24Input Value::$xxxxx_xxxxxxxxxxpredictive
25Network Portxxx xxxxxx xxxxpredictive

参考 (2)

The following list contains external sources which discuss the actor and the associated activities:

Interested in the pricing of exploits?

See the underground prices here!