Saint Kitts and Nevis Unknown Analysis

IOB - Indicator of Behavior (82)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en78
ja2
de2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

PRTG Network Monitor4
PHP4
Magento4
Citrix XenMobile2
Microsoft IIS2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1Raspberry Pi OS hard-coded password8.88.6$0-$5k$0-$5kNot DefinedWorkaround0.042870.04CVE-2021-38759
2GetSimple CMS theme-edit.php credentials management8.08.0$0-$5k$0-$5kNot DefinedNot Defined0.481110.00CVE-2019-11231
3Microsoft Windows Network File System Remote Code Execution9.88.5$25k-$100k$5k-$25kUnprovenOfficial Fix0.014240.00CVE-2022-34715
4SourceCodester Library Management System index.php sql injection7.16.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.001140.09CVE-2022-2492
5Microsoft .NET Framework input validation8.58.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.009660.02CVE-2018-8540
6Brocade BigIron RX switch access control5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.006230.00CVE-2011-2760
7Amazon AWS Apache Log4j Hotpatch Package race condition7.07.0$0-$5k$0-$5kNot DefinedNot Defined0.000420.04CVE-2022-33915
8CloudPanel 2 File Manager improper authentication8.07.9$0-$5k$0-$5kNot DefinedOfficial Fix0.505340.00CVE-2023-35885
9Wifi-soft UniBox controller Diagnostic Tools Controller diagnostic_tools_controller command injection9.39.3$0-$5k$0-$5kNot DefinedNot Defined0.016920.04CVE-2019-3496
10Magento code injection8.08.0$0-$5k$0-$5kNot DefinedNot Defined0.004520.00CVE-2020-9632
11Magento code injection8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.002380.03CVE-2020-9664
12Magento sql injection5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.000630.04CVE-2020-24400
13nginx request smuggling6.96.9$0-$5k$0-$5kNot DefinedNot Defined0.002412.17CVE-2020-12440
14Tiki Admin Password tiki-login.php improper authentication8.07.7$0-$5k$0-$5kNot DefinedOfficial Fix0.009362.21CVE-2020-15906
15Host NetBIOS/SMB privileges management7.37.1$0-$5k$0-$5kHighWorkaround0.015000.00CVE-1999-0621
16jQuery dataType script.js Cross-Domain cross site scripting5.24.9$0-$5k$0-$5kNot DefinedOfficial Fix0.006600.19CVE-2015-9251
17Moodle Backup File Restore input validation8.08.0$5k-$25k$5k-$25kNot DefinedNot Defined0.007360.07CVE-2021-3943
18Dell EMC iDRAC6/iDRAC7/iDRAC8/iDRAC9 Web Server memory corruption8.48.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.009730.00CVE-2019-3705
19puppetlabs-apt os command injection8.58.4$0-$5k$0-$5kNot DefinedOfficial Fix0.001750.00CVE-2022-3275
20GLPI Login Page sql injection8.58.4$0-$5k$0-$5kNot DefinedOfficial Fix0.001800.04CVE-2022-31061

IOC - Indicator of Compromise (58)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP addressHostnameActorCampaignsIdentifiedTypeConfidence
123.131.208.0Saint Kitts and Nevis Unknown02/28/2023verifiedHigh
223.137.40.0Saint Kitts and Nevis Unknown05/11/2023verifiedHigh
338.86.181.28Saint Kitts and Nevis Unknown05/11/2023verifiedHigh
438.87.225.0Saint Kitts and Nevis Unknown05/11/2023verifiedHigh
538.87.231.192Saint Kitts and Nevis Unknown05/11/2023verifiedHigh
638.131.5.0Saint Kitts and Nevis Unknown05/11/2023verifiedHigh
745.42.252.0Saint Kitts and Nevis Unknown02/28/2023verifiedHigh
845.88.187.0Saint Kitts and Nevis Unknown02/28/2023verifiedHigh
957.74.108.0Saint Kitts and Nevis Unknown02/28/2023verifiedHigh
1057.91.128.0Saint Kitts and Nevis Unknown02/28/2023verifiedHigh
1165.48.155.0Saint Kitts and Nevis Unknown05/11/2023verifiedHigh
1265.48.156.0Saint Kitts and Nevis Unknown05/11/2023verifiedHigh
13XX.XX.XXX.XXxxx-xxxxx.xxxxxxxxx.xxxXxxxx Xxxxx Xxx Xxxxx Xxxxxxx05/11/2023verifiedHigh
14XX.XX.XXX.XXxxx-xxxxx.xxxxxxxxx.xxxXxxxx Xxxxx Xxx Xxxxx Xxxxxxx05/11/2023verifiedHigh
15XX.XX.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
16XX.XX.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
17XX.XX.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
18XX.XX.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
19XX.XX.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
20XX.XX.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx05/11/2023verifiedHigh
21XXX.XXX.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
22XXX.XXX.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
23XXX.XXX.XX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx05/11/2023verifiedHigh
24XXX.XX.XX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
25XXX.XXX.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
26XXX.XXX.XX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx05/11/2023verifiedHigh
27XXX.X.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
28XXX.XX.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx05/11/2023verifiedHigh
29XXX.XXX.XXX.Xx.xxxxxx.xxxXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
30XXX.XX.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
31XXX.XX.XX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
32XXX.XX.XX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx05/11/2023verifiedHigh
33XXX.XX.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
34XXX.XX.X.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
35XXX.XX.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
36XXX.XXX.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
37XXX.XXX.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx05/11/2023verifiedHigh
38XXX.XXX.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
39XXX.XXX.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx05/11/2023verifiedHigh
40XXX.XXX.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
41XXX.XXX.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
42XXX.XXX.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
43XXX.XXX.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
44XXX.XXX.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
45XXX.XXX.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx05/11/2023verifiedHigh
46XXX.XX.XX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
47XXX.XX.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
48XXX.XX.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
49XXX.XX.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
50XXX.XX.XX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
51XXX.XX.XX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
52XXX.XX.XX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx05/11/2023verifiedHigh
53XXX.XX.XX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
54XXX.XX.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
55XXX.XX.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
56XXX.XX.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx05/11/2023verifiedHigh
57XXX.XX.XXX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx02/28/2023verifiedHigh
58XXX.XXX.XX.XXxxxx Xxxxx Xxx Xxxxx Xxxxxxx05/11/2023verifiedHigh

TTP - Tactics, Techniques, Procedures (10)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (33)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/+CSCOE+/logon.htmlpredictiveHigh
2File/index.phppredictiveMedium
3File/pms/index.phppredictiveHigh
4File/uncpath/predictiveMedium
5Fileclasses/wc-cartsguru-event-handler.phppredictiveHigh
6Filexxxxxx.xxxpredictiveMedium
7Filexxxxx.xpredictiveLow
8Filexxxxxxx.xpredictiveMedium
9Filexxx/xxxx/xxxx.xpredictiveHigh
10Filexxx/xxxx/xxxx.xpredictiveHigh
11Filexxxxxxxxxxxxxxxxxx.xxxpredictiveHigh
12Filexxxxx.xxxpredictiveMedium
13Filexxxxx.xxxpredictiveMedium
14Filexxxxxxx.xxxpredictiveMedium
15Filexxxxx.xpredictiveLow
16Filexxxxxx.xxpredictiveMedium
17Filexxxxxxx.xxx.xx.xxxxxxxxxxx.xxxpredictiveHigh
18Filexxxxx-xxxx.xxxpredictiveHigh
19Filexxxx-xxxxx.xxxpredictiveHigh
20Filexxxxx/xxxxxxxxxx/xxxxxxxxxx_xxxxx_xxxxxxxxxxpredictiveHigh
21Libraryxxxxxxxx/xxx-xxx.xxpredictiveHigh
22ArgumentxxxxxxxxpredictiveMedium
23Argumentxxxxxxxxx_predictiveMedium
24ArgumentxxxxxxpredictiveLow
25ArgumentxxxxpredictiveLow
26Argumentxxxx_xxxxpredictiveMedium
27Argumentxxxx_xxxxxpredictiveMedium
28Argument_xxx_xxxxxxxxxxx_predictiveHigh
29Input Valuexxxxx' xxx (xxxxxx xxxx xxxx (xxxxxx(xxxxx(x)))xxxx) xxx 'xxxx'='xxxx&xxxxxxxx=xxxxxxxxxxpredictiveHigh
30Input Valuexxxxx' xx 'x'='xpredictiveHigh
31Input ValuexxxxxxpredictiveLow
32Patternxxxx xx|xx|predictiveMedium
33Network Portxxxxx xxx-xxx, xxxpredictiveHigh

References (3)

The following list contains external sources which discuss the actor and the associated activities:

Do you want to use VulDB in your project?

Use the official API to access entries easily!