BundleBot 解析

IOB - Indicator of Behavior (44)

タイムライン

言語

en44

国・地域

us40
cn2

アクター

アクティビティ

関心

タイムライン

タイプ

ベンダー

製品

NVIDIA Windows GPU Display Driver6
Apple iOS6
Apple iPadOS4
Microweber2
Extreme Networks Extreme Management Center2

脆弱性

#脆弱性BaseTemp0day本日修復EPSSCTICVE
1AnyMacro AnyMacro Mail System ディレクトリトラバーサル5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.001790.02CVE-2011-2468
2Microsoft Windows KernelStream 情報の漏洩5.14.6$25k-$100k$0-$5kProof-of-ConceptOfficial Fix0.000430.00CVE-2020-16889
3Apple iOS/iPadOS WebKit 特権昇格7.57.2$100k 以上$5k-$25kNot DefinedOfficial Fix0.021080.00CVE-2020-3897
4Liferay Portal JSONWS 特権昇格8.58.4$0-$5k$0-$5kHighOfficial Fix0.974700.00CVE-2020-7961
5Liferay Portal 特権昇格9.88.8$0-$5k$0-$5kProof-of-ConceptOfficial Fix0.005780.00CVE-2011-1571
6CKFinder File Name 特権昇格7.47.4$0-$5k$0-$5kNot DefinedNot Defined0.001550.04CVE-2019-15862
7CKeditor Paste クロスサイトスクリプティング5.25.1$0-$5k$0-$5kNot DefinedOfficial Fix0.001230.00CVE-2018-17960
8Juniper Junos Veriexec 特権昇格7.07.0$0-$5k$0-$5kNot DefinedNot Defined0.000440.02CVE-2019-0071
9JunosOS J-Web 特権昇格7.87.8$0-$5k$0-$5kNot DefinedOfficial Fix0.002750.02CVE-2022-22241
10phpMyAdmin tbl_export.php クロスサイトスクリプティング4.34.1$5k-$25k$0-$5kProof-of-ConceptNot Defined0.002200.03CVE-2007-4306
11Microweber Backup/Restore 特権昇格5.95.8$0-$5k$0-$5kNot DefinedOfficial Fix0.001030.00CVE-2022-0921
12GitLab Community Edition/Enterprise Edition GitHub API Endpoint 特権昇格8.17.9$0-$5k$0-$5kNot DefinedOfficial Fix0.006200.02CVE-2022-2884
13Apple iOS/iPadOS Kernel 特権昇格7.87.5$25k-$100k$5k-$25kHighOfficial Fix0.001920.00CVE-2020-27932
14Apple watchOS Kernel 特権昇格7.87.5$0-$5k$0-$5kHighOfficial Fix0.001920.00CVE-2020-27932
15Apple iOS Photos ディレクトリトラバーサル7.37.0$25k-$100k$5k-$25kNot DefinedOfficial Fix0.001760.03CVE-2015-7037
16NVIDIA Windows GPU Display Driver Kernel Mode Layer nvlddmkm.sys DxgkDdiEscape 特権昇格6.26.2$0-$5k$0-$5kNot DefinedNot Defined0.000440.00CVE-2019-5687
17NVIDIA Windows GPU Display Driver Kernel Mode Layer nvlddmkm.sys DxgkDdiEscape サービス拒否6.56.5$0-$5k$0-$5kNot DefinedNot Defined0.000440.00CVE-2019-5691
18NVIDIA Windows GPU Display Driver Kernel Mode Layer nvlddmkm.sys DxgkDdiEscape サービス拒否5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.000440.02CVE-2020-5966
19NVIDIA Windows GPU Display Driver Kernel Mode Layer nvlddmkm.sys メモリ破損5.45.4$0-$5k$0-$5kNot DefinedNot Defined0.000440.00CVE-2019-5677
20NVIDIA Windows GPU Display Driver Kernel Mode Layer nvlddmkm.sys Local Privilege Escalation6.56.5$0-$5k$0-$5kNot DefinedNot Defined0.000440.00CVE-2019-5675

IOC - Indicator of Compromise (4)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (10)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (9)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDクラスIndicatorタイプ信頼度
1Filetbl_export.phppredictive
2FileViewLog.asppredictive
3Library/_xxx_xxx/xxxxx.xxxpredictive
4Libraryxxxxxxxx.xxxpredictive
5Libraryxxxxxx/xxxxxxxxx/xxxxx.xxxpredictive
6Argumentxxxxx->xxxxpredictive
7Argumentxxxxxx_xxxxpredictive
8Argumentxxx_xxxxxpredictive
9Input Value%xxxxxx+-x+x+xx.x.xx.xxx%xx%xxpredictive

参考 (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you know our Splunk app?

Download it now for free!