Cape Verde Unknown Analysis

IOB - Indicator of Behavior (32)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en20
pt10
es2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

phpMyAdmin4
Microsoft Windows4
Yoast SEO Plugin2
Zoho ManageEngine ManageEngine OpManager2
Wiki.js2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1Redhat Nagios XI Core nagios.upgrade_to_v3.sh link following6.86.8$0-$5k$0-$5kNot DefinedNot Defined0.000420.00CVE-2013-2029
2Fortinet FortiOS Restore Command range error3.83.7$0-$5k$0-$5kHighOfficial Fix0.001460.05CVE-2021-44168
3OpenSSH ssh-add Privilege Escalation7.67.5$5k-$25k$0-$5kNot DefinedOfficial Fix0.001060.21CVE-2023-28531
4Wiki.js Storage Module path traversal6.46.3$0-$5k$0-$5kNot DefinedOfficial Fix0.001260.04CVE-2021-43800
5Wiki.js SVG File cross site scripting4.44.4$0-$5k$0-$5kNot DefinedOfficial Fix0.000530.00CVE-2021-25993
6lighttpd mod_extforward Plugin mod_extforward_Forwarded stack-based overflow6.36.3$0-$5k$0-$5kNot DefinedNot Defined0.022510.02CVE-2022-22707
7Simple College Website file_put_contents unrestricted upload8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.002950.00CVE-2022-40087
8CMSUno central.php file_put_contents code injection5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.005810.03CVE-2021-40889
9Xiaomi Redmi Note 9T/Redmi Note 11 write out-of-bounds write5.75.7$0-$5k$0-$5kNot DefinedNot Defined0.000890.04CVE-2020-14125
10WSO2 API Manager/IS as Key Manager/Identity Server File Based Service Provider Creation xml external entity reference5.55.3$0-$5k$0-$5kNot DefinedOfficial Fix0.021230.07CVE-2021-42646
11Zoho ManageEngine ManageEngine OpManager getmailserversettings sql injection6.46.4$0-$5k$0-$5kNot DefinedNot Defined0.003230.00CVE-2017-11559
12Yoast SEO Plugin REST Endpoint posts information disclosure3.53.4$0-$5k$0-$5kNot DefinedOfficial Fix0.001230.04CVE-2021-25118
13WordPress wp_die information disclosure4.54.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.000930.04CVE-2021-39200
14WordPress sql injection6.86.7$5k-$25k$0-$5kNot DefinedOfficial Fix0.004670.00CVE-2022-21664
15pac-resolver PAC File Remote Code Execution5.65.4$0-$5k$0-$5kNot DefinedOfficial Fix0.004330.05CVE-2021-23406
16Oracle Blockchain Platform BCS Console deserialization7.37.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.003310.00CVE-2019-10086
17GitLab Community Edition/Enterprise Edition OmniAuth hard-coded password8.28.0$0-$5k$0-$5kNot DefinedOfficial Fix0.244550.02CVE-2022-1162
18Fortinet FortiOS TFTP Client stack-based overflow7.06.8$0-$5k$0-$5kNot DefinedOfficial Fix0.000420.03CVE-2021-42757
19Apache Directory Studio SASL Authentication missing encryption3.13.1$0-$5k$5k-$25kNot DefinedNot Defined0.000550.00CVE-2021-33900
20JIRA picker Username improper authorization5.35.2$0-$5k$0-$5kNot DefinedOfficial Fix0.003790.05CVE-2019-3403

IOC - Indicator of Compromise (19)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (11)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (12)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File.htaccesspredictiveMedium
2File/api/json/admin/getmailserversettingspredictiveHigh
3File/xxxx/xxx/x/xxxx/xxxxxxpredictiveHigh
4Filexxxxxx.xxxxxxx_xx_xx.xxpredictiveHigh
5Filexxxx/xxxxxpredictiveMedium
6Filexx/xx/xxxxxpredictiveMedium
7File{xxxxxxx}/xxx/xxxxxxx.xxxpredictiveHigh
8ArgumentxxxxxxpredictiveLow
9ArgumentxxxxpredictiveLow
10ArgumentxxxxxxpredictiveLow
11Pattern|xx xx xx xx|predictiveHigh
12Network Portxxx/xx (xxxxxx)predictiveHigh

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you need the next level of professionalism?

Upgrade your account now!