Sector Homeoffice

Timeframe: -28 days

Default Categories (32): Android App Software, Anti-Malware Software, Calendar Software, Digital Media Player, Document Processing Software, Document Reader Software, File Compression Software, File Transfer Software, Firewall Software, Game Console, Groupware Software, Hardware Driver Software, Image Processing Software, iOS App Software, Mail Client Software, Messaging Software, Multimedia Player Software, Network Attached Storage Software, Network Encryption Software, Office Suite Software, Operating System, Presentation Software, Printing Software, Remote Access Software, Router Operating System, Smartphone Operating System, Smartwatch Operating System, Spreadsheet Software, Tablet Operating System, Web Browser, Wireless LAN Software, Word Processing Software

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Linux Kernel376
Microsoft Windows106
Juniper Junos OS26
Juniper Junos OS Evolved20
Google Android18

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Remediation

Official Fix638
Temporary Fix0
Workaround4
Unavailable0
Not Defined64

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Exploitability

High6
Functional0
Proof-of-Concept10
Unproven106
Not Defined584

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Access Vector

Not Defined0
Physical6
Local122
Adjacent410
Network168

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Authentication

Not Defined0
High42
Low516
None148

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

User Interaction

Not Defined0
Required82
None624

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

C3BM Index

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

CVSSv3 Base

≤10
≤20
≤326
≤458
≤5158
≤6250
≤782
≤8100
≤930
≤102

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

CVSSv3 Temp

≤10
≤20
≤326
≤470
≤5156
≤6282
≤7104
≤860
≤96
≤102

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

VulDB

≤10
≤22
≤324
≤470
≤5154
≤6242
≤790
≤898
≤922
≤104

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

NVD

≤1706
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

CNA

≤1594
≤20
≤34
≤40
≤512
≤634
≤716
≤822
≤922
≤102

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

≤1598
≤20
≤30
≤40
≤52
≤614
≤724
≤854
≤914
≤100

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Exploit 0-day

<1k18
<2k64
<5k24
<10k396
<25k100
<50k86
<100k18
≥100k0

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Exploit Today

<1k222
<2k176
<5k154
<10k76
<25k66
<50k12
<100k0
≥100k0

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Exploit Market Volume

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

IOB - Indicator of Behavior (1000)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en720
ja66
fr58
es46
de32

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

us244
jp78
fr54
es46
cn44

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Linux Kernel72
Google Chrome20
Microsoft Windows16
Google Android4
QNAP QTS4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1Contemporary Controls BASrouter BACnet BASRT-B Device-Communication-Control Service denial of service6.55.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.000453.62CVE-2024-4292
2Netgear DG834Gv5 Web Management Interface cleartext storage2.72.5$5k-$25k$0-$5kProof-of-ConceptNot Defined0.000452.75CVE-2024-4235
3Google Chrome ANGLE type confusion6.36.0$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000001.86CVE-2024-4058
4QNAP QTS/QuTS hero/QuTScloud command injection9.99.7$0-$5k$0-$5kNot DefinedOfficial Fix0.000431.46CVE-2024-32766
5Artifex Ghostscript SAFER Mode zmisc1.c Privilege Escalation5.55.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000430.13CVE-2023-52722
6Cisco ASA/Firepower Threat Defense Web Server infinite loop8.07.9$5k-$25k$0-$5kHighOfficial Fix0.002260.43CVE-2024-20353
7Linux Kernel smb cifs_debug_files_proc_show use after free5.55.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.000450.37CVE-2024-26928
8Linux Kernel gpio allocation of resources5.55.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000450.10CVE-2022-48661
9Xiamen Four-Faith RMP Router Management Platform sql injection6.35.7$0-$5k$0-$5kProof-of-ConceptNot Defined0.000450.34CVE-2024-3688
10Microsoft Windows Cryptographic Services cryptographic issues7.86.8$25k-$100k$5k-$25kUnprovenOfficial Fix0.000430.51CVE-2024-26228
11Linux Kernel ASoC memory corruption5.55.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.000450.17CVE-2024-26927
12Linux Kernel arm_scmi out-of-bounds3.53.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.000450.13CVE-2022-48655
13Cisco ASA/Firepower Threat Defense Legacy Capability code injection5.15.0$5k-$25k$0-$5kHighOfficial Fix0.001280.37CVE-2024-20359
14Google Chrome V8 API out-of-bounds6.36.0$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000000.26CVE-2024-4059
15Linux Kernel gma500 psb_gem_unpin denial of service4.84.6$5k-$25k$0-$5kNot DefinedOfficial Fix0.000430.14CVE-2022-48633
16Backdoor.Win32.Dumador.c FTP Server stack-based overflow6.35.6$0-$5k$0-$5kProof-of-ConceptWorkaround0.000000.07
17Linux Kernel exfat buffer overflow5.55.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.000430.07CVE-2022-48665
18Google Chrome Dawn use after free6.36.0$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000000.17CVE-2024-4060
19QNAP QTS/QuTS hero/QuTScloud path traversal6.76.6$0-$5k$0-$5kNot DefinedOfficial Fix0.000440.20CVE-2023-51365
20Linux Kernel gpio null pointer dereference5.75.5$5k-$25k$0-$5kNot DefinedOfficial Fix0.000450.20CVE-2022-48663

IOC - Indicator of Compromise (48)

These indicators of compromise highlight associated network ranges which are known to be part of research and attack activities.

IDIP rangeActorTypeConfidence
12.57.122.0/24MiraipredictiveHigh
22.58.56.0/24RecordBreakerpredictiveHigh
35.255.99.0/24RhysidapredictiveHigh
45.255.117.0/24IRATApredictiveHigh
55.255.127.0/24RaccoonpredictiveHigh
6XX.XX.XX.X/XXXxxxxxxxpredictiveHigh
7XX.XXX.XXX.X/XXXxxxxxxxpredictiveHigh
8XX.XXX.XX.X/XXXxxxxxxxxpredictiveHigh
9XX.XXX.X.X/XXXxxxxpredictiveHigh
10XX.XX.XXX.X/XXXxxxxxxxpredictiveHigh
11XX.XX.XXX.X/XXXxxxxpredictiveHigh
12XX.XXX.XXX.X/XXXxxxxpredictiveHigh
13XX.XXX.XXX.X/XXXxxxxxxxpredictiveHigh
14XX.XXX.XXX.X/XXXxxxxxx XxxxxxxpredictiveHigh
15XX.XXX.XX.X/XXXxxxxxx XxxxxxxpredictiveHigh
16XX.XXX.XXX.X/XXXxxxxxxxxpredictiveHigh
17XX.XX.XXX.X/XXXxxxxxxxpredictiveHigh
18XX.XXX.XX.X/XXXxxxxx XxxxxxxpredictiveHigh
19XX.XX.XXX.X/XXXxxxxxxxpredictiveHigh
20XX.XXX.XXX.X/XXXxxxxxxxxxxxxpredictiveHigh
21XX.XX.XXX.X/XXXxxxxxxpredictiveHigh
22XX.XXX.XXX.X/XXXxxxxpredictiveHigh
23XX.XX.XXX.X/XXXxxxxxx XxxxxxpredictiveHigh
24XX.XX.XX.X/XXXxxxxx XxxxxxpredictiveHigh
25XX.XXX.XX.X/XXXxxxxxpredictiveHigh
26XX.XXX.XXX.X/XXXxx XxxxxpredictiveHigh
27XXX.XX.XX.X/XXXxxxxxxxpredictiveHigh
28XXX.XXX.XX.X/XXXxxxxxpredictiveHigh
29XXX.XXX.XX.X/XXXxxxxpredictiveHigh
30XXX.XXX.XX.X/XXXxxxxxpredictiveHigh
31XXX.XXX.XXX.X/XXXxxxxxxxxxxxpredictiveHigh
32XXX.XXX.XXX.X/XXXxxxpredictiveHigh
33XXX.XXX.XX.X/XXXxxxxxx XxxxxxpredictiveHigh
34XXX.XXX.XX.X/XXXxxxxxxxpredictiveHigh
35XXX.XX.XXX.X/XXXxxxxxx XxxxxxxpredictiveHigh
36XXX.XXX.XXX.X/XXXxxxxxxxpredictiveHigh
37XXX.XXX.XXX.X/XXXxxxx XxxxxxxpredictiveHigh
38XXX.XXX.XXX.X/XXXxxxxxxxpredictiveHigh
39XXX.XXX.XXX.X/XXXxxxxxxxx XxxxxxpredictiveHigh
40XXX.XX.XX.X/XXXxxxxx_xxxpredictiveHigh
41XXX.XX.XXX.X/XXXxxxxxx XxxxxxxpredictiveHigh
42XXX.XX.XX.X/XXXxxxxxxxpredictiveHigh
43XXX.XX.XX.X/XXXxxxxxpredictiveHigh
44XXX.XXX.XX.X/XXXxxxpredictiveHigh
45XXX.XXX.XXX.X/XXXxxxxxxxpredictiveHigh
46XXX.XXX.XXX.X/XXXxxxxxx XxxxxxxpredictiveHigh
47XXX.XXX.XXX.X/XXXxxxxxxxxpredictiveHigh
48XXX.XXX.XX.X/XXXxxxxxpredictiveHigh

TTP - Tactics, Techniques, Procedures (21)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (86)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/api/runs/search/run/predictiveHigh
2File/Device/Device/GetDeviceInfoList?deviceCode=&searchField=&deviceState=predictiveHigh
3File/loginpredictiveLow
4File/sys/kernel/notespredictiveHigh
5Fileandroidmanifest.xmlpredictiveHigh
6FileAp4Atom.cpppredictiveMedium
7FileAp4ByteStream.cpppredictiveHigh
8FileAp4Dec3Atom.cpppredictiveHigh
9FileAp4MdhdAtom.cpppredictiveHigh
10FileAp4Sample.hpredictiveMedium
11FileAp4StsdAtom.cpppredictiveHigh
12FileAp4Utils.cpppredictiveMedium
13Fileasn1_common.cpredictiveHigh
14Filexxxxx/xxx-xxxxxx.xpredictiveHigh
15Filexxxxx/xxx-xx-xxx.xpredictiveHigh
16Filexxx_xxx.xxxxpredictiveMedium
17Filexxxxxx/xxxxxx_xxxxxx.xpredictiveHigh
18Filexx_xxx.xpredictiveMedium
19Filexxxxxxxxxxxxxx.xxxpredictiveHigh
20Filexxxxxxxxx.xxxpredictiveHigh
21Filexxxxxxx/xxxxxx/xxxxxxx/xxxxxx_xxxx.xpredictiveHigh
22Filexxxxxxx/xxx/xxxx/xxx.xpredictiveHigh
23Filexxxxxxx/xxxxx/xxxxxxx/xx_xxxxxxxxx.xpredictiveHigh
24Filexxxxxxx/xxx/xxxxxxxx/xxx/xx.xpredictiveHigh
25Filexxxxxxx/xxxx/xxx/xxxxxx.xpredictiveHigh
26Filexxxx.xpredictiveLow
27Filexx/xxxxx/xxxx-xx.xpredictiveHigh
28Filexx/xxxx/xxxx.xpredictiveHigh
29Filexx/xxxx/xxxxxxx.xpredictiveHigh
30Filexx/xxxxx/xxxx.xpredictiveHigh
31FilexxxxxpredictiveLow
32Filexxxxx_xxxxxxpredictiveMedium
33Filexxxxxxx/xxxxx/xxxxxxxxxxxx.xpredictiveHigh
34Filexxxxxxx/xxxxx/xxxxxx.xpredictiveHigh
35Filexxxxx.xpredictiveLow
36Filexxxxxx/xxx/xxxxxx.xpredictiveHigh
37Filexxxxxx/xxx/xxxxx.xpredictiveHigh
38Filexxxxxx/xxxx_xxxxx.xpredictiveHigh
39Filexxxxxx/xxx/xxxx.x:predictiveHigh
40Filexxx.xpredictiveLow
41Filexxxxxxxxx.xxpredictiveMedium
42Filexxx.xpredictiveLow
43Filexx/xxxx_xxxxx.xpredictiveHigh
44Filexx/xxxxxxxx.xpredictiveHigh
45Filexxx/xxx/xxx_xxxxxx.xpredictiveHigh
46Filexxxx.xxxpredictiveMedium
47Filexxx/xxxxxx.xpredictiveMedium
48Filexxxxx.xpredictiveLow
49Filexxxxx.xpredictiveLow
50Filexxx.xpredictiveLow
51Filexxxxx/xxx/xxxx/xxxxx-xxx-xxx.xpredictiveHigh
52Filexxxxx_xxxx.xpredictiveMedium
53Filexxx.xpredictiveLow
54Filexxxxxx_xxxxxxxx.xxxpredictiveHigh
55Libraryxxxxx-xx.xxpredictiveMedium
56Libraryxxxx.xxxpredictiveMedium
57Libraryxxxxxxx/xxx/xxxx_xxx.xpredictiveHigh
58Libraryxxx/xxxxxxxxxxxx.xpredictiveHigh
59Libraryxxx/xxxx_xxxxx.xpredictiveHigh
60Libraryxxx/xxx_xxxx.xpredictiveHigh
61Libraryxxx/xxxx_xxxxx.xpredictiveHigh
62Libraryxxx/xxxxxx.xpredictiveMedium
63Libraryxxx/xxx_xxxxxxx.xpredictiveHigh
64Libraryxxx/xxxxxxxxxxx.xpredictiveHigh
65Libraryxxx/xxxxxxxx.xpredictiveHigh
66Libraryxxxxxxxx.xxxpredictiveMedium
67Libraryxxxx.xpredictiveLow
68Libraryxxxx-xxxxxx.xxxpredictiveHigh
69ArgumentxxxxxxpredictiveLow
70ArgumentxxxxpredictiveLow
71Argumentxx-xxxxxxpredictiveMedium
72Argumentxx_xxxx_xxxpredictiveMedium
73ArgumentxxxxxxxpredictiveLow
74Argumentxx/xxx/xxxxxpredictiveMedium
75ArgumentxxxxxpredictiveLow
76Argumentxxx_xxxxxxxpredictiveMedium
77Argumentxxxxx_xxxpredictiveMedium
78Argumentxxx_xxxxxxpredictiveMedium
79Argumentxxxxxxx_xxxxx_xxxxxxpredictiveHigh
80ArgumentxxxxxxxpredictiveLow
81ArgumentxxxxxxxxxxxpredictiveMedium
82Argumentxxxx_xxxxxxx_xxxxpredictiveHigh
83ArgumentxxxxpredictiveLow
84Argumentxxxx/xxxxxxxxpredictiveHigh
85Argumentxx_xxxxxpredictiveMedium
86Input ValuexxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxpredictiveHigh

Want to stay up to date on a daily basis?

Enable the mail alert feature now!