DEV-1084 Analysis

IOB - Indicator of Behavior (265)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en252
zh8
es2
ja2
ru2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

gb122
us110
cn16
pl6
es2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Linux Kernel42
Xen26
Mozilla Firefox8
Microsoft Windows8
Oracle Database Server8

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1jeecg-boot check sql injection6.36.3$0-$5k$0-$5kNot DefinedNot Defined0.000700.00CVE-2023-41543
2Dahua Smart Park Management unrestricted upload7.57.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.026370.04CVE-2023-3836
3Zoom Client for Meetings buffer overflow7.37.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.003860.03CVE-2021-34423
4phpMyAdmin grab_globals.lib.php path traversal4.84.4$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.023340.16CVE-2005-3299
5jQuery html cross site scripting5.85.1$0-$5k$0-$5kNot DefinedOfficial Fix0.019000.00CVE-2020-11023
6Xen denial of service5.55.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.000450.00CVE-2020-25597
7Xen PCI Passthrough backdoor7.06.7$5k-$25k$0-$5kNot DefinedOfficial Fix0.000450.00CVE-2020-25595
8Xen Timer Migration race condition4.74.5$0-$5k$0-$5kNot DefinedOfficial Fix0.000450.00CVE-2020-25604
9Xen RCU denial of service5.55.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.000450.00CVE-2020-25598
10Linux Kernel DAX Huge Page memory corruption6.56.5$5k-$25k$0-$5kNot DefinedNot Defined0.000540.02CVE-2020-10757
11Linux Kernel VFIO PCI Driver exceptional condition6.46.4$5k-$25k$5k-$25kNot DefinedNot Defined0.000470.00CVE-2020-12888
12Linux Kernel af9005.c af9005_identify_state resource consumption6.46.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.002540.04CVE-2019-18809
13LogicBoard CMS away.php redirect6.36.1$0-$5k$0-$5kNot DefinedUnavailable0.000003.49
14E-topbiz Viral DX 1 adclick.php sql injection7.37.3$0-$5k$0-$5kHighUnavailable0.000870.05CVE-2008-2867
15Microsoft Office RTF Document Necurs Dridex access control7.06.9$25k-$100k$0-$5kHighOfficial Fix0.974550.05CVE-2017-0199
16check-spelling GitHub Action pull_request_target log file7.17.0$0-$5k$0-$5kNot DefinedOfficial Fix0.001040.00CVE-2021-32724
17SAP ERP Defense Forces and Public Security neutralization for logs4.34.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.000460.00CVE-2023-36924
18cjvnjde google-translate-api-browser Web API server-side request forgery3.73.6$0-$5k$0-$5kNot DefinedOfficial Fix0.000460.05CVE-2023-48711
19SPA-Cart eCommerce CMS search cross site scripting4.44.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.002500.04CVE-2023-4547
20WP Fastest Cache Plugin sql injection6.36.1$0-$5k$0-$5kNot DefinedNot Defined0.029740.08CVE-2023-6063

IOC - Indicator of Compromise (11)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (17)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (73)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/emap/devicePoint_addImgIco?hasSubsystem=truepredictiveHigh
2File/forum/away.phppredictiveHigh
3File/oauth/idp/.well-known/openid-configurationpredictiveHigh
4File/rukovoditel/index.php?module=dashboard/ajax_requestpredictiveHigh
5File/searchpredictiveLow
6File/sys/replicate/checkpredictiveHigh
7File/wordpress/wp-admin/options-general.phppredictiveHigh
8Fileadclick.phppredictiveMedium
9Filexxxx/xxxxxxx/xxxxxx/xxxxx_xx.xpredictiveHigh
10Filexxxxx-xxx.xpredictiveMedium
11Filexxxxx-xxxx/xxxxxx.xpredictiveHigh
12Filexxxxx/xxx-xxxxxxx.xpredictiveHigh
13Filexxxxxxxx.xxxpredictiveMedium
14Filexxxx.xxxpredictiveMedium
15Filexxxxxxx.xxxpredictiveMedium
16Filexxxxxxx.xxxpredictiveMedium
17Filexxxxxxx/xxxx/xxxx/xxxx_xxxxxxxxxx.xpredictiveHigh
18Filexxxxxxx/xxxxxx/xxx/xxx-xxx.xpredictiveHigh
19Filexxxxxxx/xxx/xxx/xxx/xxxxxx/xxxxxx_xxx.xpredictiveHigh
20Filexxxxxxx/xxx/xxxxxx/xxxxxx.xpredictiveHigh
21Filexxxxxxx/xxx/xxx/xxxx_xxxxxx.xpredictiveHigh
22Filexxxxxxx/xxxxx/xxxxx.xpredictiveHigh
23Filexxxxxxx/xxxxx/xxx/xxxxxxx/xxxxxxx-xx.xpredictiveHigh
24Filexxxxxxx/xxxxx/xxxxxxxx/xxxxxpredictiveHigh
25Filexxxxxxx/xxxxx/xxx/xxx-xxx/xxxxxx.xpredictiveHigh
26Filexxxxxxx/xxxxx/xxx/xxxxx/xxxxxxx_xxx.xpredictiveHigh
27Filexxxxxxx/xxx/xxx/xxx/xx_xxx.xpredictiveHigh
28Filexxxxxxx/xxx/xxxxxxxx/xxxxx/xxxx/xxxx_xxxx.xpredictiveHigh
29Filexxxxxxx/xxx/xxxxx/xxxxxx/xx-xxxxxx.xpredictiveHigh
30Filexxxxxxx/xxx/xxxxxxxx/xxx/xxxxx/xxx_xxx.xpredictiveHigh
31Filexxxxxxx/xxx/xxxxxxxx/xxxxxxx/xxxxxxx/xxxx.xpredictiveHigh
32Filexxxxxxx/xxx/xxxxxxxx/xxxxxxx/xxxxxxx/xxx.xpredictiveHigh
33Filexxxxxxx/xxx/xxxxxxxx/xxxxxxx/xxxxxxx/xx.xpredictiveHigh
34Filexxxxxxx/xx/xxxxxxxx.xpredictiveHigh
35Filexxxxxxx/xxx/xxx-xx.xpredictiveHigh
36Filexxxx/xxxxxxxxxx/xxxxxx-xxxxx.xpredictiveHigh
37Filexxxx/xxxxxxxxxx/xxxxxx-xxxxx.xpredictiveHigh
38Filexxxx_xxxxxxx.xxx.xxxpredictiveHigh
39Filexxxx\xxxxx\xxxxxxx\xxxxxxx\xxxxx\xxxx.xxxpredictiveHigh
40Filexxxxx.xxxxpredictiveMedium
41Filexxxxxxxxxxxxx.xxxpredictiveHigh
42Filexxxxxxx.xpredictiveMedium
43Filexxxxxxxxx/xxxxxxx/xxxxxxxxxxx/xxxxx/xxxxxxxxxxxxxxxxxxxxx.xxxpredictiveHigh
44Filexxxxxxxxx/xxxxxxx/xxxxxx/xxxxxxxxxx.xxxpredictiveHigh
45Filexxxxxxx.xxxpredictiveMedium
46Filexxx_xxxxx.xxxpredictiveHigh
47Filexxx/xxxx/xxxx_xxxxxxxxx.xpredictiveHigh
48Filexxx/xxxx/xxxxxx_xxx_xxxx.xpredictiveHigh
49Filexxx/xxx/xxx_xxxx.xpredictiveHigh
50Filexxxxxxxx.xxpredictiveMedium
51Filexxxxxx/?x=xxxxx/\xxxxx\xxx/xxxxxxxxxxxxxx&xxxxxxxx=xxxx_xxxx_xxxx_xxxxx&xxxx[x]=xxxxxx&xxxx[x][]predictiveHigh
52Filexxx.xpredictiveLow
53Filexxxxxxxx.xxxpredictiveMedium
54Filexxxxx/xxxx/xxxxx.xpredictiveHigh
55Filexxx_xxx_xxxxx.xxxpredictiveHigh
56Filexxxxxxx.xxxxpredictiveMedium
57Filexxxx.xpredictiveLow
58Filexxxxxxxxxxxxxx.xxxxpredictiveHigh
59Filexxxx/xxxxxx.xpredictiveHigh
60File~/xxxxxxxx/xxxxx/xxxxx-xx-xxxxxx-xxxxx-xxxx-xxxx.xxxpredictiveHigh
61File~/xxxxxxxx/xxxxx-xx-xxxxxxxxxx-xxxx.xxxpredictiveHigh
62Libraryxxx/xxxxxxxxx.xxxxxx.xxx.xxxpredictiveHigh
63ArgumentxxxxxxxxpredictiveMedium
64Argumentxxxxxxx_xxxx_xxxxpredictiveHigh
65Argumentxxxxxx[xxxxxxx]/xxxxxx[xxxxx]predictiveHigh
66ArgumentxxxxxxpredictiveLow
67Argumentxxx_xxxx_xxxxpredictiveHigh
68Argumentxxxxxxx_xxpredictiveMedium
69Argumentxxxxxxx/xxxxxxxxxpredictiveHigh
70ArgumentxxxxxpredictiveLow
71ArgumentxxxxxxpredictiveLow
72Argumentxxxxxxxx/xxxxxxxxpredictiveHigh
73Input Value"><xxxxxx>xxxxx(x)</xxxxxx>predictiveHigh

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you want to use VulDB in your project?

Use the official API to access entries easily!