BLM Analysis

IOB - Indicator of Behavior (48)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en44
fr4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

us46
pt2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Hitachi Cosminexus Portal Framework2
Aspsiteware JobPost2
Novell GroupWise2
Huge-IT Portfolio Gallery Plugin2
OCaml2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1Microsoft Internet Explorer memory corruption6.96.6$25k-$100k$0-$5kProof-of-ConceptOfficial Fix0.881010.00CVE-2017-0202
2Guo Xu Guos Posting System print.asp sql injection7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.022720.00CVE-2007-0554
3Libra File Manager Php Filemanager fileadmin.php improper authentication6.56.4$0-$5k$0-$5kFunctionalUnavailable0.008450.00CVE-2008-4319
4u5cms loginsave.php redirect5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.001480.04CVE-2022-32444
5MidiCart midicart.mdb information disclosure5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.011280.04CVE-2002-1432
6Microsoft Host Integration Server input validation7.56.7$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.956860.00CVE-2011-2007
7Microsoft Windows Bitlocker Password Output information disclosure3.73.6$5k-$25k$0-$5kNot DefinedOfficial Fix0.003530.00CVE-2008-3893
8Novell GroupWise WebAccess webacc improper authentication6.55.9$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.000000.04
9D-Link DSL-320B login.xgi information disclosure5.34.8$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.000000.00
10ZyXEL XGS2210-52HP rpSys.html Stored cross site scripting4.84.8$0-$5k$0-$5kNot DefinedNot Defined0.000720.04CVE-2019-13495
11Symantec Raptor Firewall Secure Webserver 1.1 privileges management5.35.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.001750.00CVE-2002-1535
12Hitachi Cosminexus Portal Framework information disclosure5.34.8$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.012860.00CVE-2004-2452
13Linux Kernel ICMP Error Message ip_options_echo resource management7.56.5$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.127430.03CVE-2006-0454
14Stoverud PHPhotoalbum File Upload upload.php unrestricted upload7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.028730.00CVE-2009-4819
15Jetbox One CMS memory corruption5.95.9$0-$5k$0-$5kNot DefinedNot Defined0.019990.05CVE-2004-1448
16Jetbox One CMS cleartext storage5.34.9$0-$5k$0-$5kProof-of-ConceptWorkaround0.006470.02CVE-2004-1447
17Ethereal Protocol Dissector memory corruption5.65.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.022720.00CVE-2003-0428
18Netscape Communicator Mail Password missing encryption5.35.1$0-$5k$0-$5kNot DefinedOfficial Fix0.002220.02CVE-1999-1002
19Mozilla Firefox XHTML DOM Node Name Remote Code Execution6.35.7$25k-$100k$0-$5kProof-of-ConceptOfficial Fix0.049470.03CVE-2005-2260
20nginx ngx_http_mp4_module memory corruption10.09.5$0-$5k$0-$5kNot DefinedOfficial Fix0.024030.04CVE-2012-2089

IOC - Indicator of Compromise (6)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (11)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (47)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/loginsave.phppredictiveHigh
2File/mc-admin/page.phppredictiveHigh
3File/servlet/webaccpredictiveHigh
4File/showfile.phppredictiveHigh
5File/Side.phppredictiveMedium
6File/textpattern/index.phppredictiveHigh
7Filexxxx_xxx.xxxpredictiveMedium
8Filexxxxxxx/xxxxxxxx.xpredictiveHigh
9Filexxxxxxxxxxxx/xxxxxxxxxxxxxxxxxx.xxpredictiveHigh
10Filexxxx_xxxx.xxxpredictiveHigh
11Filexxxxxxx.xxxxpredictiveMedium
12Filexxxxxx.xxxpredictiveMedium
13Filexxxxxxxxx.xxxpredictiveHigh
14Filexxxxxxxxxxxx.xxxpredictiveHigh
15Filexxxxx.xxx?xxx=xxxx&xxxxxx=xxxxxxxxxpredictiveHigh
16Filexxxxx.xxxpredictiveMedium
17Filexxxxxxxx.xxxpredictiveMedium
18Filexxxxx.xxxpredictiveMedium
19Filexxxx.xxxpredictiveMedium
20Filexxxxx.xxxxpredictiveMedium
21Filexxxxxx.xxxpredictiveMedium
22Filexxxxxxxx.xxxxpredictiveHigh
23Filexxxxx/xxxxx_xxxxx.xxx / xxxxx.xxxpredictiveHigh
24Filexxxx.xxxpredictiveMedium
25Filexxxxxx.xxxpredictiveMedium
26Filexxxx_xxxx.xxxpredictiveHigh
27Filexxxxxxx/xxxxxxxxx/xxxxxxxxxxxx.xxxpredictiveHigh
28Filexx-xxxxx/xxxx.xxxpredictiveHigh
29ArgumentxxxxxpredictiveLow
30ArgumentxxxxpredictiveLow
31ArgumentxxxpredictiveLow
32ArgumentxxxxxxxxxxpredictiveMedium
33Argumentxx_xxpredictiveLow
34ArgumentxxxxxxxpredictiveLow
35ArgumentxxxxpredictiveLow
36ArgumentxxxxpredictiveLow
37ArgumentxxxxxxxxpredictiveMedium
38Argumentxxxx_xxxx[]predictiveMedium
39ArgumentxxpredictiveLow
40Argumentxxxx_xxpredictiveLow
41ArgumentxxxxxpredictiveLow
42Argumentxxxx/xxxxxxxxpredictiveHigh
43ArgumentxxxxxpredictiveLow
44ArgumentxxxxxpredictiveLow
45Argumentxxx/xxxxx.xxxx.xxxxxxxx.xxxxx/xxxxxxxxpredictiveHigh
46Input ValuexxxxxxpredictiveLow
47Network Portxxx xxxxxx xxxxpredictiveHigh

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you need the next level of professionalism?

Upgrade your account now!