Threat Advisory
Common Information
Type | Value |
---|---|
UUID | aad77bb6-2222-43ec-b333-bfe94cf998da |
Fingerprint | 85fd0a1222b9790c300f34812d2bfc59bc02d333a1a3712dfd5bcef1db95fbab |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | Nov. 28, 2023, 4:20 p.m. |
Added to db | Feb. 7, 2024, 7:32 p.m. |
Last updated | Aug. 31, 2024, 2:24 a.m. |
Headline | Threat Advisory |
Title | Threat Advisory |
Detected Hints/Tags/Attributes | 74/2/31 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 35 | cve-2023-4911 |
|
Details | CVE | 33 | cve-2017-9841 |
|
Details | Domain | 9 | bc.pl |
|
Details | Domain | 5 | haxx.in |
|
Details | Domain | 157 | www.oracle.com |
|
Details | Domain | 15 | blog.aquasec.com |
|
Details | Domain | 435 | www.hivepro.com |
|
Details | File | 9 | bc.pl |
|
Details | File | 5 | cpuoct2021.html |
|
Details | md5 | 2 | ea685e738adedc02ca1a63ebe8ed939e |
|
Details | md5 | 2 | 9a868bb2456bcde27cde7985145ef6fc |
|
Details | md5 | 2 | 5dce322f5284213912012e7ba2440da0 |
|
Details | md5 | 2 | 5d3c00b79be956d4175d0d5fd1d4f1f9 |
|
Details | IPv4 | 2 | 194.233.65.92 |
|
Details | MITRE ATT&CK Techniques | 695 | T1059 |
|
Details | MITRE ATT&CK Techniques | 59 | T1059.006 |
|
Details | MITRE ATT&CK Techniques | 93 | T1059.007 |
|
Details | MITRE ATT&CK Techniques | 67 | T1505 |
|
Details | MITRE ATT&CK Techniques | 208 | T1068 |
|
Details | MITRE ATT&CK Techniques | 542 | T1190 |
|
Details | MITRE ATT&CK Techniques | 145 | T1588 |
|
Details | MITRE ATT&CK Techniques | 110 | T1588.006 |
|
Details | MITRE ATT&CK Techniques | 627 | T1027 |
|
Details | MITRE ATT&CK Techniques | 289 | T1003 |
|
Details | MITRE ATT&CK Techniques | 1006 | T1082 |
|
Details | MITRE ATT&CK Techniques | 585 | T1083 |
|
Details | MITRE ATT&CK Techniques | 504 | T1140 |
|
Details | MITRE ATT&CK Techniques | 107 | T1496 |
|
Details | Url | 5 | https://www.oracle.com/security-alerts/cpuoct2021.html |
|
Details | Url | 2 | https://blog.aquasec.com/loony-tunables-vulnerability-exploited-by-kinsing |
|
Details | Url | 1 | https://www.hivepro.com/looney-tunables-flaw-enables-local-privilege-escalation-in- |