Internet Explorer CVE-2019–1367 Exploitation — part 1
Tags
maec-delivery-vectors: | Watering Hole |
attack-pattern: | Data Javascript - T1059.007 Malware - T1587.001 Malware - T1588.001 Tool - T1588.002 Vulnerabilities - T1588.006 |
Common Information
Type | Value |
---|---|
UUID | b25a5bc4-fc91-425b-b5a2-2c58c2772c57 |
Fingerprint | 9e193d11b85693a3 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | July 13, 2020, 12:59 p.m. |
Added to db | Sept. 26, 2022, 9:34 a.m. |
Last updated | Nov. 15, 2024, 7:44 a.m. |
Headline | Internet Explorer CVE-2019–1367 Exploitation — part 1 |
Title | Internet Explorer CVE-2019–1367 Exploitation — part 1 |
Detected Hints/Tags/Attributes | 32/2/8 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 27 | cve-2019-1367 |
|
Details | CVE | 2 | cve-2020-9674 |
|
Details | Domain | 1 | b6883l0bak.pophot.website |
|
Details | Domain | 219 | gist.github.com |
|
Details | File | 29 | jscript9.dll |
|
Details | File | 27 | jscript.dll |
|
Details | Github username | 2 | bcse |
|
Details | Url | 1 | https://gist.github.com/bcse/1834878 |