Mettle Analysis

IOB - Indicator of Behavior (27)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en26
fr2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

us22
vn6

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Dnsmasq6
Google Android2
pfSense2
WordPress2
TP-LINK TL-WR841N2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1Dnsmasq extract_name heap-based overflow5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.001440.00CVE-2021-45954
2TP-LINK TL-WR841N Firmware path traversal7.57.5$0-$5k$0-$5kHighNot Defined0.029520.04CVE-2012-5687
3devise-two-factor excessive authentication5.45.4$0-$5k$0-$5kNot DefinedNot Defined0.000430.02CVE-2024-0227
4pfSense diag_command.php csrf_callback cross-site request forgery6.56.5$0-$5k$0-$5kNot DefinedNot Defined0.001800.00CVE-2019-16667
5Apache Superset REST API Get Endpoint access control5.85.8$5k-$25k$5k-$25kNot DefinedNot Defined0.002700.00CVE-2022-45438
6WordPress Scheduled Task wp-cron.php resource consumption6.56.5$5k-$25k$0-$5kNot DefinedNot Defined0.000960.04CVE-2023-22622
7Dnsmasq fuzz_rfc1035.c resize_packet heap-based overflow5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.001440.04CVE-2021-45955
8Dnsmasq print_mac heap-based overflow5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.001440.03CVE-2021-45956
9Dnsmasq rfc1035.c extract_name heap-based overflow7.77.3$0-$5k$0-$5kNot DefinedOfficial Fix0.108720.04CVE-2020-25682
10Dnsmasq fuzz_rfc1035.c answer_request heap-based overflow5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.001440.04CVE-2021-45957
11PHP FPM SAPI out-of-bounds write8.07.7$25k-$100k$0-$5kNot DefinedOfficial Fix0.001480.04CVE-2021-21703
12Magento Deserialization deserialization8.08.0$0-$5k$0-$5kNot DefinedNot Defined0.005870.05CVE-2020-3716
13Magento sql injection8.58.4$0-$5k$0-$5kNot DefinedOfficial Fix0.005820.03CVE-2019-7139
14Google Android file_input_stream.cc Read memory corruption7.57.2$25k-$100k$5k-$25kNot DefinedOfficial Fix0.001050.00CVE-2019-2105
15Google Android TQS App memscpy memory corruption8.58.2$25k-$100k$5k-$25kNot DefinedOfficial Fix0.001870.00CVE-2015-9173
16nginx HTTP/2 resource consumption6.06.0$0-$5k$0-$5kNot DefinedOfficial Fix0.029740.09CVE-2018-16844
17Moodle Installation information disclosure5.35.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.002000.03CVE-2012-4403
18NoneCms App.php input validation8.58.5$0-$5k$0-$5kHighNot Defined0.966780.05CVE-2018-20062
19Creolabs Gravity gravity_lexer.c use after free8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.003350.00CVE-2017-1000172
20Squid Proxy HTTP Request data authenticity8.78.1$5k-$25k$0-$5kUnprovenOfficial Fix0.528680.03CVE-2016-4553

IOC - Indicator of Compromise (2)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
1118.70.80.143Mettle02/12/2022verifiedHigh
2XXX.XXX.XX.XXXXxxxxx02/12/2022verifiedHigh

TTP - Tactics, Techniques, Procedures (6)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueClassVulnerabilitiesAccess VectorTypeConfidence
1T1006CAPEC-126CWE-22Path TraversalpredictiveHigh
2T1059.007CAPEC-18CWE-80Cross Site ScriptingpredictiveHigh
3TXXXXCAPEC-19CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveHigh
4TXXXX.XXXCAPEC-16CWE-XXXXxxx-xxxxx XxxxxxxxxxxpredictiveHigh
5TXXXXCAPEC-108CWE-XXXxx XxxxxxxxxpredictiveHigh
6TXXXXCAPEC-116CWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveHigh

IOA - Indicator of Attack (11)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1Filediag_command.phppredictiveHigh
2Filefile_input_stream.ccpredictiveHigh
3Filexxxx_xxxxxxx.xpredictiveHigh
4Filexxxxxxx_xxxxx.xpredictiveHigh
5Filexxxxxxx.xpredictiveMedium
6Filexxxxxxxx/xxxxxxxxpredictiveHigh
7Filexx-xxxx.xxxpredictiveMedium
8Libraryxxxxxxxx/xxxxxxx/xxxxx/xxx.xxxpredictiveHigh
9Argumentxxxxxxxx_xxpredictiveMedium
10ArgumentxxxxxxpredictiveLow
11Argumentxxxxxxxxxx/xxxxxxxxxxxxxxxpredictiveHigh

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you want to use VulDB in your project?

Use the official API to access entries easily!