Stealth Falcon Analysis

IOB - Indicator of Behavior (50)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en42
de6
zh2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

us24
cn10
se4
tr4
ru4

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Linux Kernel4
Apache Mod Fcgid2
Procmail2
Wowza Streaming Engine2
Thales SafeNet Authentication Service2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1Archive_Tar Tar.php pathname traversal6.56.5$0-$5k$0-$5kHighNot Defined0.923680.00CVE-2020-36193
2Umbraco CMS File Upload unrestricted upload6.46.4$0-$5k$0-$5kNot DefinedNot Defined0.000770.09CVE-2020-9472
3ILIAS password recovery8.08.0$0-$5k$0-$5kNot DefinedNot Defined0.001480.00CVE-2023-36487
4JCK Editor links.php sql injection8.58.3$0-$5k$0-$5kHighNot Defined0.816230.03CVE-2018-17254
5ILIAS Email Verification integrity check8.08.0$0-$5k$0-$5kNot DefinedNot Defined0.003140.00CVE-2022-31266
6Microsoft Word wwlib Remote Code Execution8.07.1$5k-$25k$0-$5kProof-of-ConceptOfficial Fix0.453520.00CVE-2023-21716
7Joomla CMS LDAP Authentication Password ldap injection7.57.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.010390.04CVE-2017-14596
8Microsoft Exchange Server Privilege Escalation8.87.7$25k-$100k$5k-$25kUnprovenOfficial Fix0.011920.02CVE-2023-21529
9Thales SafeNet Authentication Service prng seed8.38.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000440.04CVE-2021-42810
10DZCP deV!L`z Clanportal config.php code injection7.36.6$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.009430.73CVE-2010-0966
11ZeroShell kerbynet os command injection8.08.0$0-$5k$0-$5kNot DefinedNot Defined0.956230.00CVE-2020-29390
12Backdoor.Win32.Hupigon.acio unquoted search path6.35.7$0-$5kCalculatingProof-of-ConceptNot Defined0.000000.00
13Yoast SEO Plugin Term Description input validation9.08.9$0-$5k$0-$5kNot DefinedOfficial Fix0.002440.02CVE-2019-13478
14phpMyAdmin Navigation Tree cross site scripting5.25.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.197610.02CVE-2018-19970
15Palo Alto PAN-OS SAML Authentication signature verification10.09.8$25k-$100k$5k-$25kHighOfficial Fix0.004510.05CVE-2020-2021
16Wowza Streaming Engine MBeans Server access control8.58.2$0-$5k$0-$5kNot DefinedOfficial Fix0.015330.03CVE-2018-7047
17PHPOffice PhpSpreadsheet XML Data std_table.php xml external entity reference7.56.6$0-$5k$0-$5kNot DefinedOfficial Fix0.002340.02CVE-2019-12331
18OpenSSL Bleichenbacher missing encryption4.74.6$5k-$25k$0-$5kNot DefinedOfficial Fix0.015080.02CVE-2019-1563
19Apache Mod Fcgid mod_fcgid fcgid_bucket.c fcgid_header_bucket_read memory corruption5.35.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.006390.04CVE-2013-4365
20Oracle HTTP Server Web Listener use after free7.57.4$5k-$25k$0-$5kHighOfficial Fix0.972400.05CVE-2017-9798

IOC - Indicator of Compromise (4)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (13)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (19)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File.procmailrcpredictiveMedium
2File/cgi-bin/kerbynetpredictiveHigh
3File/uncpath/predictiveMedium
4Filexxxx/xxxxxxxxxxxx.xxxpredictiveHigh
5Filexxx.xxx?xxx=xxxxx_xxxxpredictiveHigh
6Filexxxxx_xxxxxx.xpredictiveHigh
7Filexxx/xxxxxx.xxxpredictiveHigh
8Filexxxxxxxxx/xxxxxxx/xxxxx.xxxpredictiveHigh
9Filexxxxxx-xxxxxx/xxxxx/xxxxxxxxx/xxxxxxx/xxx_xxxxx.xxxpredictiveHigh
10Filexxx.xxxpredictiveLow
11ArgumentxxxxxxxxpredictiveMedium
12ArgumentxxxxxxxxxpredictiveMedium
13ArgumentxxxxxxpredictiveLow
14Argumentxxxxxx_xxpredictiveMedium
15ArgumentxxxpredictiveLow
16ArgumentxxxxxxxxxxxxxxxxxxpredictiveHigh
17Input Value?<!xxxxxx?predictiveMedium
18Pattern|xx|xx|xx|predictiveMedium
19Network Portxxx/xx (xxxxxx)predictiveHigh

References (3)

The following list contains external sources which discuss the actor and the associated activities:

Do you want to use VulDB in your project?

Use the official API to access entries easily!