FakeAlert Analysis

IOB - Indicator of Behavior (54)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en42
ru4
de4
fr2
es2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

TP-LINK TL-WR740N2
TP-LINK TL-WR741N2
Moodle2
Iptanus File Upload Plugin2
Intel Computing Improvement Program2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1Netgear ProSAFE Network Management System getNodesByTopologyMapSearch sql injection6.36.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.000000.00CVE-2023-38099
2Samsung UWB Stack memory corruption6.05.9$0-$5k$0-$5kNot DefinedOfficial Fix0.001700.00CVE-2022-25818
3Cisco Linksys EA2700 URL information disclosure4.34.1$5k-$25k$0-$5kProof-of-ConceptUnavailable0.000000.00
4Basti2web Book Panel books.php sql injection7.37.0$0-$5k$0-$5kHighOfficial Fix0.000640.05CVE-2009-4889
5HotScripts Clone Script software-description.php sql injection7.36.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.001600.00CVE-2007-6084
6gopeak MasterLab User.php update unrestricted upload6.46.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.000630.04CVE-2023-7159
77-card Fakabao notify.php sql injection6.66.4$0-$5k$0-$5kProof-of-ConceptNot Defined0.000640.06CVE-2023-7184
8SourceCodester Free and Open Source Inventory Management System edit_product.php sql injection7.16.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.000610.03CVE-2023-7155
9Linux Kernel Spectre Mitigation bugs.c spectre_v2_user_select_mitigation information exposure5.45.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000450.03CVE-2023-1998
10WordPress path traversal5.75.6$5k-$25k$0-$5kNot DefinedOfficial Fix0.003260.05CVE-2023-2745
11nginx request smuggling6.96.9$0-$5k$0-$5kNot DefinedNot Defined0.002412.39CVE-2020-12440
12Nagios XI command_test.php Privilege Escalation8.07.9$0-$5k$0-$5kNot DefinedOfficial Fix0.285430.06CVE-2023-48085
13Moment.js path traversal6.96.7$0-$5k$0-$5kNot DefinedOfficial Fix0.003300.16CVE-2022-24785
14Moodle LTI Module cross site scripting4.84.7$0-$5k$0-$5kNot DefinedOfficial Fix0.011470.02CVE-2022-35653
15ZoneMinder Language Privilege Escalation6.36.0$0-$5k$0-$5kNot DefinedOfficial Fix0.384010.03CVE-2022-29806
16ZoneMinder Snapshot Action shell_exec authorization8.18.0$0-$5k$0-$5kNot DefinedOfficial Fix0.969280.03CVE-2023-26035
17Microsoft IIS cross site scripting5.24.7$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.005480.08CVE-2017-0055
18Redis Lua Script heap-based overflow7.47.3$0-$5k$0-$5kNot DefinedOfficial Fix0.003290.08CVE-2022-24834
19Apple iOS/iPadOS Kernel Coldtro out-of-bounds write7.87.6$25k-$100k$5k-$25kHighOfficial Fix0.001490.00CVE-2022-32894
20Asana Desktop information disclosure4.34.1$0-$5k$0-$5kNot DefinedOfficial Fix0.002180.00CVE-2022-26877

IOC - Indicator of Compromise (13)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (8)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (37)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/ample/app/action/edit_product.phppredictiveHigh
2File/getcfg.phppredictiveMedium
3File/uncpath/predictiveMedium
4Fileapp/ctrl/admin/User.phppredictiveHigh
5Filearch/x86/kernel/cpu/bugs.cpredictiveHigh
6Filexxxxx.xxxpredictiveMedium
7Filexxxxxx/xxxx.xpredictiveHigh
8Filexxxxxxx_xxxx.xxxpredictiveHigh
9Filexxxxxxx.xxxpredictiveMedium
10Filexxxxxx.xxxpredictiveMedium
11Filexxxxxxx.xxxpredictiveMedium
12Filexxxxxxxxxx.xxxpredictiveHigh
13Filexxxxx.xxxxxxx.xxxpredictiveHigh
14Filexxxx_xxxx.xxxpredictiveHigh
15Filexxxxxxxxxxxxxxxxxx.xxxxpredictiveHigh
16Filexxxx.xxxpredictiveMedium
17Filexxxxxxxx.xxxpredictiveMedium
18Filexxxxxxxxxx.xxxpredictiveHigh
19Filexxxx/xxxxxx.xxxpredictiveHigh
20Filexxxx_xxxxxxx_xxxxxxxx.xxxpredictiveHigh
21Filexxxxxxxx-xxxxxxxxxxx.xxxpredictiveHigh
22Filexxxxxxxxx.xxpredictiveMedium
23Filexxxxx-xxxxxx.xxxpredictiveHigh
24Libraryxxxxxx.xxxpredictiveMedium
25ArgumentxxxxxxpredictiveLow
26ArgumentxxxxxxpredictiveLow
27ArgumentxxxpredictiveLow
28Argumentxxx_xxpredictiveLow
29ArgumentxxxpredictiveLow
30Argumentxxxx_xxpredictiveLow
31ArgumentxxpredictiveLow
32Argumentxxxx_xxpredictiveLow
33Argumentxxx_xxxxx_xxpredictiveMedium
34ArgumentxxxxxxxxpredictiveMedium
35Input Valuexxxx -x xxxxxxxx=xxxxxx.xxxxxxx xxxx://xxx.xxx.x.x/xxxxxx.xxxpredictiveHigh
36Pattern|xx|xx|xx|predictiveMedium
37Network Portxxx xxxxxx xxxxpredictiveHigh

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you want to use VulDB in your project?

Use the official API to access entries easily!