BundleBot Analysis

IOB - Indicator of Behavior (44)

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Lang

en44

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Country

us44

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Actors

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Activities

Interest

Timeline

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vendor

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Product

NVIDIA Windows GPU Display Driver8
Microsoft Windows6
phpMyAdmin4
Apple iOS4
DotNetNuke2

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need an additional purchase to unlock this view to get access to more details of real data.

Vulnerabilities

#VulnerabilityBaseTemp0dayTodayExpRemEPSSCTICVE
1AnyMacro AnyMacro Mail System path traversal5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.002480.02CVE-2011-2468
2Microsoft Windows KernelStream information disclosure5.14.6$25k-$100k$0-$5kProof-of-ConceptOfficial Fix0.000430.00CVE-2020-16889
3Apple iOS/iPadOS WebKit type confusion7.57.2$100k and more$5k-$25kNot DefinedOfficial Fix0.021080.00CVE-2020-3897
4Liferay Portal JSONWS deserialization8.58.4$0-$5k$0-$5kHighOfficial Fix0.974700.00CVE-2020-7961
5Liferay Portal privileges management9.88.8$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.006940.00CVE-2011-1571
6CKFinder File Name unrestricted upload7.47.4$0-$5k$0-$5kNot DefinedNot Defined0.001550.17CVE-2019-15862
7CKeditor Paste cross site scripting5.25.1$0-$5k$0-$5kNot DefinedOfficial Fix0.001230.03CVE-2018-17960
8Juniper Junos Veriexec privileges management7.07.0$0-$5k$0-$5kNot DefinedNot Defined0.000440.02CVE-2019-0071
9JunosOS J-Web input validation7.87.8$0-$5k$0-$5kNot DefinedOfficial Fix0.002760.00CVE-2022-22241
10phpMyAdmin tbl_export.php cross site scripting4.34.1$5k-$25k$0-$5kProof-of-ConceptNot Defined0.002290.03CVE-2007-4306
11Microweber Backup/Restore code injection5.95.8$0-$5k$0-$5kNot DefinedOfficial Fix0.001030.00CVE-2022-0921
12GitLab Community Edition/Enterprise Edition GitHub API Endpoint os command injection8.17.9$0-$5k$0-$5kNot DefinedOfficial Fix0.006020.00CVE-2022-2884
13Apple iOS/iPadOS Kernel type confusion7.87.5$25k-$100k$5k-$25kHighOfficial Fix0.001920.00CVE-2020-27932
14Apple watchOS Kernel type confusion7.87.5$0-$5k$0-$5kHighOfficial Fix0.001920.00CVE-2020-27932
15Apple iOS Photos path traversal7.37.0$25k-$100k$5k-$25kNot DefinedOfficial Fix0.001760.00CVE-2015-7037
16NVIDIA Windows GPU Display Driver Kernel Mode Layer nvlddmkm.sys DxgkDdiEscape permission6.26.2$0-$5k$0-$5kNot DefinedNot Defined0.000440.00CVE-2019-5687
17NVIDIA Windows GPU Display Driver Kernel Mode Layer nvlddmkm.sys DxgkDdiEscape null pointer dereference6.56.5$0-$5k$0-$5kNot DefinedNot Defined0.000440.00CVE-2019-5691
18NVIDIA Windows GPU Display Driver Kernel Mode Layer nvlddmkm.sys DxgkDdiEscape null pointer dereference5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.000440.02CVE-2020-5966
19NVIDIA Windows GPU Display Driver Kernel Mode Layer nvlddmkm.sys memory corruption5.45.4$0-$5k$0-$5kNot DefinedNot Defined0.000440.00CVE-2019-5677
20NVIDIA Windows GPU Display Driver Kernel Mode Layer nvlddmkm.sys data processing6.56.5$0-$5k$0-$5kNot DefinedNot Defined0.000440.00CVE-2019-5675

IOC - Indicator of Compromise (4)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (10)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (9)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClassIndicatorTypeConfidence
1Filetbl_export.phppredictiveHigh
2FileViewLog.asppredictiveMedium
3Library/_xxx_xxx/xxxxx.xxxpredictiveHigh
4Libraryxxxxxxxx.xxxpredictiveMedium
5Libraryxxxxxx/xxxxxxxxx/xxxxx.xxxpredictiveHigh
6Argumentxxxxx->xxxxpredictiveMedium
7Argumentxxxxxx_xxxxpredictiveMedium
8Argumentxxx_xxxxxpredictiveMedium
9Input Value%xxxxxx+-x+x+xx.x.xx.xxx%xx%xxpredictiveHigh

References (2)

The following list contains external sources which discuss the actor and the associated activities:

Interested in the pricing of exploits?

See the underground prices here!