Vollgar Analysis

IOB - Indicator of Behavior (56)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en48
zh8

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

us42
cn12
gb2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Alt-N MDaemon4
Trend Micro Apex One4
ownCloud4
Apple watchOS2
Apache Tomcat2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1All in One SEO Best WordPress SEO Plugin Import/Export code injection5.55.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000920.00CVE-2021-24307
2Odoo Database Anonymization data processing5.65.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.002140.05CVE-2017-10803
3Libbitcoin Explorer Milk Sad entropy5.35.3$0-$5k$0-$5kHighNot Defined0.001160.05CVE-2023-39910
4tagDiv Composer Plugin Facebook Login improper authentication7.77.6$0-$5k$0-$5kNot DefinedOfficial Fix0.004090.05CVE-2022-3477
5Trend Micro Apex One out-of-bounds7.67.5$5k-$25k$0-$5kNot DefinedOfficial Fix0.000450.00CVE-2022-44649
6Sophos Mobile Managed On-Premises XML server-side request forgery8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.352510.00CVE-2022-3980
7iPXE TLS tls.c tls_new_ciphertext information exposure3.23.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000480.03CVE-2022-4087
8Dolibarr sql injection7.87.8$0-$5k$0-$5kNot DefinedOfficial Fix0.001370.03CVE-2022-4093
9nginx request smuggling6.96.9$0-$5k$0-$5kNot DefinedNot Defined0.002411.85CVE-2020-12440
10Insyde Kernel UEFI Variable stack-based overflow7.87.8$0-$5k$0-$5kNot DefinedNot Defined0.000650.00CVE-2022-35897
11Trend Micro Apex One Change Prevention Service memory corruption7.67.5$5k-$25k$0-$5kNot DefinedOfficial Fix0.000450.00CVE-2022-44650
12Atlassian Bitbucket Server and Data Center Environment Variable command injection7.47.4$0-$5k$0-$5kNot DefinedNot Defined0.521360.00CVE-2022-43781
13Trend Micro Apex One Security Agent toctou7.57.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.000450.00CVE-2022-44651
14LG SmartShare uncontrolled search path7.07.0$5k-$25k$5k-$25kNot DefinedNot Defined0.000540.07CVE-2022-45422
15WP-Polls Plugin HTTP Header authorization6.36.0$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.000600.00CVE-2022-1581
16Apple watchOS ImageIO out-of-bounds5.45.3$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.007540.03CVE-2016-3619
17D-Link G integrated Access Device4 Web Interface login.asp authorization5.75.7$5k-$25k$5k-$25kNot DefinedNot Defined0.001330.02CVE-2022-36785
18Trend Micro Apex One exceptional condition8.38.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.000450.00CVE-2022-44652
19Trend Micro Apex One Security Agent pathname traversal8.38.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.000480.00CVE-2022-44653
20Apple tvOS ImageIO out-of-bounds5.45.3$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.007540.00CVE-2016-3619

IOC - Indicator of Compromise (21)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (12)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (25)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1File/rest/api/2/user/pickerpredictiveHigh
2File/wp-content/plugins/emag-marketplace-connector/templates/order/awb-meta-box.phppredictiveHigh
3Fileafr.phppredictiveLow
4Filedata/gbconfiguration.datpredictiveHigh
5Filexxxx.xxxpredictiveMedium
6Filexxx/xxxxxx.xxxpredictiveHigh
7Filexxxxx.xxx/xxxx/xxxxx/xxxx/xxxx.xxxpredictiveHigh
8Filexxx/xxx.xpredictiveMedium
9Filexxxxx.xxxpredictiveMedium
10Filexxx.xxxpredictiveLow
11Filexxx/xxx/xxx.xpredictiveHigh
12Filexxxxxx.xxxpredictiveMedium
13Libraryxxx/xx.xxxpredictiveMedium
14Libraryxxxxxxx/xxxxxxx/xxxxxx/xxx/xxxxx.xxxxxxx.xxxpredictiveHigh
15ArgumentxxxxxxxxpredictiveMedium
16ArgumentxxxxxpredictiveLow
17ArgumentxxxxxpredictiveLow
18ArgumentxxpredictiveLow
19Argumentxxx_xxxpredictiveLow
20ArgumentxxxxpredictiveLow
21Argumentxxxxxx_xxxxpredictiveMedium
22ArgumentxxxxpredictiveLow
23ArgumentxxxpredictiveLow
24ArgumentxxxpredictiveLow
25ArgumentxxxxxxxxpredictiveMedium

References (4)

The following list contains external sources which discuss the actor and the associated activities:

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!