Sector Agriculture

Timeframe: -28 days

Default Categories (49): Accounting Software, Anti-Malware Software, Anti-Spam Software, Appointment Software, Automation Software, Backup Software, Calendar Software, Chip Software, Communications System, Content Management System, Customer Relationship Management System, Database Software, Document Management Software, Document Processing Software, Document Reader Software, Enterprise Resource Planning Software, File Compression Software, File Transfer Software, Financial Software, Firewall Software, Firmware Software, Hardware Driver Software, Image Processing Software, Information Management Software, Mail Client Software, Mail Server Software, Network Attached Storage Software, Network Camera Software, Network Encryption Software, Network Routing Software, Office Suite Software, Operating System, Photo Gallery Software, Presentation Software, Printing Software, Project Management Software, Router Operating System, SCADA Software, Server Management Software, Service Management Software, Spreadsheet Software, Supplier Relationship Management Software, Supply Chain Management Software, Transport Management Software, Video Surveillance Software, Warehouse Management System Software, Web Browser, Web Server, Word Processing Software

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Linux Kernel904
Microsoft Windows42
HDF534
Apple macOS28
Adobe Acrobat Reader28

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Remediation

Official Fix1230
Temporary Fix0
Workaround2
Unavailable0
Not Defined172

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Exploitability

High6
Functional2
Proof-of-Concept18
Unproven38
Not Defined1340

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Access Vector

Not Defined0
Physical14
Local118
Adjacent952
Network320

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Authentication

Not Defined0
High50
Low1114
None240

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

User Interaction

Not Defined0
Required184
None1220

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

C3BM Index

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

CVSSv3 Base

≤10
≤20
≤354
≤4166
≤5258
≤6622
≤7156
≤8122
≤920
≤106

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

CVSSv3 Temp

≤10
≤20
≤358
≤4186
≤5240
≤6678
≤7136
≤894
≤98
≤104

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

VulDB

≤10
≤20
≤364
≤4168
≤5274
≤6606
≤7146
≤8132
≤910
≤104

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

NVD

≤11404
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

CNA

≤11212
≤20
≤30
≤414
≤58
≤642
≤732
≤858
≤922
≤1016

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

≤11362
≤20
≤30
≤40
≤50
≤66
≤718
≤812
≤96
≤100

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Exploit 0-day

<1k40
<2k216
<5k42
<10k888
<25k172
<50k38
<100k8
≥100k0

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Exploit Today

<1k490
<2k502
<5k260
<10k100
<25k50
<50k2
<100k0
≥100k0

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Exploit Market Volume

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

IOB - Indicator of Behavior (1000)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en818
de44
ja44
fr34
zh16

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

us404
de56
jp54
ru30
cn26

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

Linux Kernel270
DedeCMS12
Apple macOS10
Adobe Acrobat Reader8
Microsoft Windows8

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1Contemporary Control System BASrouter BACnet BASRT-B Application Protocol Data Unit denial of service7.56.6$0-$5k$0-$5kProof-of-ConceptWorkaround0.0004510.00CVE-2024-4791
2SourceCodester Online Art Gallery Management System adminHome.php unrestricted upload6.35.7$0-$5k$0-$5kProof-of-ConceptNot Defined0.000451.25CVE-2024-4946
3Mozilla Firefox PDF.js type conversion6.36.0$5k-$25k$5k-$25kNot DefinedOfficial Fix0.000450.75CVE-2024-4367
4Ritlabs TinyWeb Server Request crlf injection5.34.8$0-$5k$0-$5kProof-of-ConceptNot Defined0.000000.64+CVE-2024-5193
5code-projects Budget Management index.php sql injection6.35.7$0-$5k$0-$5kProof-of-ConceptNot Defined0.000450.79CVE-2024-5048
6LCDS LAquis SCADA path traversal7.06.9$0-$5k$0-$5kNot DefinedNot Defined0.000000.43CVE-2024-5040
7Campcodes Online Examination System addCourseExe.php sql injection6.35.7$0-$5k$0-$5kProof-of-ConceptNot Defined0.000450.57CVE-2024-4919
8Google Chrome Scheduling use after free6.36.0$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000000.39CVE-2024-5157
9Linux Kernel riscv stack-based overflow8.07.6$5k-$25k$0-$5kNot DefinedOfficial Fix0.000000.39-CVE-2023-52761
10VMware vCenter Server/Cloud Foundation information disclosure3.83.7$5k-$25k$0-$5kNot DefinedOfficial Fix0.000000.29CVE-2024-22275
11VMware vCenter Server/Cloud Foundation Shell Privilege Escalation7.27.0$5k-$25k$0-$5kNot DefinedOfficial Fix0.000000.32CVE-2024-22274
12DedeCMS path traversal4.33.9$0-$5k$0-$5kProof-of-ConceptNot Defined0.000450.36CVE-2024-4790
13MarvinTest Solutions Hardware Access Driver Hw65.sys Local Privilege Escalation5.35.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000000.32CVE-2024-31756
14Umbraco CMS cross site scripting3.33.2$0-$5k$0-$5kNot DefinedOfficial Fix0.000000.32-CVE-2024-35218
15Google Chrome ANGLE heap-based overflow6.36.0$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000000.29CVE-2024-5159
16Google Chrome Dawn heap-based overflow6.36.0$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000000.25CVE-2024-5160
17Fortinet FortiProxy/FortiOS SSL-VPN Tunnel Mode data authenticity4.64.5$0-$5k$0-$5kNot DefinedOfficial Fix0.000430.43CVE-2023-45586
18Mozilla Thunderbird PDF.js type conversion6.36.0$5k-$25k$5k-$25kNot DefinedOfficial Fix0.000450.25CVE-2024-4367
19Google Chrome V8 type confusion6.36.0$25k-$100k$5k-$25kHighOfficial Fix0.019720.47CVE-2024-4947
20Google Chrome V8 type confusion6.36.0$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000000.25CVE-2024-5158

IOC - Indicator of Compromise (30)

These indicators of compromise highlight associated network ranges which are known to be part of research and attack activities.

IDIP rangeActorTypeConfidence
123.239.16.0/24NSO GrouppredictiveHigh
231.171.154.0/24MuddyWaterpredictiveHigh
345.195.198.0/24Quasar RATpredictiveHigh
4XX.XXX.X.X/XXXxxxxpredictiveHigh
5XX.XXX.XXX.X/XXXxxxxxxpredictiveHigh
6XX.XX.XXX.X/XXXxxxxxxxpredictiveHigh
7XX.XX.XXX.X/XXXxxxxxxpredictiveHigh
8XX.XXX.XXX.X/XXXxxxxxxxxxpredictiveHigh
9XX.XXX.XX.X/XXXxxxxxxxxpredictiveHigh
10XX.XXX.XX.X/XXXxxxxx XxxxxxpredictiveHigh
11XXX.XX.XXX.X/XXXxxxxxpredictiveHigh
12XXX.XXX.XXX.X/XXXxxxxx XxxxxxpredictiveHigh
13XXX.XXX.XXX.X/XXXxxxxpredictiveHigh
14XXX.XXX.X.X/XXXxxxxxxxxpredictiveHigh
15XXX.XXX.XXX.X/XXXxxxxxxxxxxxxpredictiveHigh
16XXX.XXX.XXX.X/XXXxxxxx XxxxxxpredictiveHigh
17XXX.X.XXX.X/XXXxxxxxxpredictiveHigh
18XXX.XXX.XXX.X/XXXxxxxxxpredictiveHigh
19XXX.XXX.XXX.X/XXXxxxpredictiveHigh
20XXX.XXX.XXX.X/XXXxxxxxx XxxxxxxpredictiveHigh
21XXX.XX.XXX.X/XXXxxxxpredictiveHigh
22XXX.XXX.XXX.X/XXXxxxxxpredictiveHigh
23XXX.XXX.XXX.X/XXXxxxxpredictiveHigh
24XXX.XXX.XXX.X/XXXxxxpredictiveHigh
25XXX.XX.XX.X/XXXxxxxpredictiveHigh
26XXX.XXX.XXX.X/XXXxxxxx XxxxxxpredictiveHigh
27XXX.XXX.XXX.X/XXXxxxxxx XxxxxxxpredictiveHigh
28XXX.XXX.XX.X/XXXxxxpredictiveHigh
29XXX.XX.XXX.X/XXXxxxxpredictiveHigh
30XXX.XXX.XX.X/XXXxxxxxpredictiveHigh

TTP - Tactics, Techniques, Procedures (28)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueClassVulnerabilitiesAccess VectorTypeConfidence
1T1006CAPEC-126CWE-22, CWE-23, CWE-24, CWE-41Path TraversalpredictiveHigh
2T1040CAPEC-102CWE-319Authentication Bypass by Capture-replaypredictiveHigh
3T1055CAPEC-10CWE-74Improper Neutralization of Data within XPath ExpressionspredictiveHigh
4T1059CAPEC-242CWE-94Argument InjectionpredictiveHigh
5T1059.007CAPEC-209CWE-79, CWE-80Cross Site ScriptingpredictiveHigh
6T1068CAPEC-104CWE-250, CWE-266, CWE-269, CWE-284Execution with Unnecessary PrivilegespredictiveHigh
7TXXXX.XXXCAPEC-CWE-XXXXxx Xx Xxxx-xxxxx XxxxxxxxpredictiveHigh
8TXXXX.XXXCAPEC-16CWE-XXX, CWE-XXXXxxx-xxxxx XxxxxxxxxxxpredictiveHigh
9TXXXXCAPEC-136CWE-XX, CWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx XxxxxxxxxpredictiveHigh
10TXXXX.XXXCAPEC-178CWE-XXXXxxx XxxxxxxxpredictiveHigh
11TXXXXCAPEC-CWE-XXXXXxxxxxxx Xxxxxxxxxxxxxx Xx Xxxxxxx Xxxxxxxx Xxxx Xx X Xxxxxxxx XxxxxxpredictiveHigh
12TXXXXCAPEC-CWE-XXXXxxxxxxxxx XxxxxxpredictiveHigh
13TXXXXCAPEC-184CWE-XXXXxxxxxxx Xx Xxxx Xxxxxxx Xxxxxxxxx XxxxxpredictiveHigh
14TXXXXCAPEC-108CWE-XXXxx XxxxxxxxxpredictiveHigh
15TXXXX.XXXCAPEC-1CWE-XXXXxxxxxxx XxxxxxxxxxxxxpredictiveHigh
16TXXXXCAPEC-102CWE-XXX, CWE-XXXXxxxxxxxxxx XxxxxxxxxxpredictiveHigh
17TXXXX.XXXCAPEC-220CWE-XXXXxxxxxxxx XxxxxxxxxpredictiveHigh
18TXXXX.XXXCAPEC-154CWE-XXXXxxxxxxxxxxxpredictiveHigh
19TXXXXCAPEC-38CWE-XXX, CWE-XXXXxxxxxxxx Xxxxxx XxxxpredictiveHigh
20TXXXX.XXXCAPEC-CWE-XXXXxxxxxxx Xxxxxx XxxxpredictiveHigh
21TXXXX.XXXCAPEC-459CWE-XXXXxxxxxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveHigh
22TXXXX.XXXCAPEC-133CWE-XXXXxxxxxxxpredictiveHigh
23TXXXXCAPEC-464CWE-XXXXxxxxxxx Xx Xxxxxxx Xxxxxxxx Xxxxxxxxxxx Xx Xx Xxxxxxxxxxxx XxxxxpredictiveHigh
24TXXXXCAPEC-116CWE-XXX, CWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveHigh
25TXXXXCAPEC-CWE-XXXXxxxxxxxxxxxx XxxxxxpredictiveHigh
26TXXXX.XXXCAPEC-112CWE-XXX, CWE-XXX, CWE-XXXXxx Xxxxxxxxxx XxxxxpredictiveHigh
27TXXXX.XXXCAPEC-1CWE-XXXXxxxxxxxxx Xxxxxxxxxxxxxx Xx Xxxxxxxx Xxxx XxxxxxxxxpredictiveHigh
28TXXXXCAPEC-CWE-XXXXxxxxxxxxxx XxxxxxpredictiveHigh

Interested in the pricing of exploits?

See the underground prices here!