{"vulnerability": "CVE-2019-17026", "sightings": [{"uuid": "60896001-66fc-4fb1-88e8-23be2677215a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-17026", "type": "seen", "source": "MISP/5e859e26-25d0-4621-83f0-23049de67855", "content": "", "creation_timestamp": "2020-04-02T08:13:05.000000Z"}, {"uuid": "5880d071-5718-4e29-aa87-7e50ee7486c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-17026", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "c35defe6-80c7-44b5-a89f-7ce160a8868e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-17026", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:19.000000Z"}, {"uuid": "ed6c3c5c-9205-46e6-b6f4-1a9184f87fa5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-17026", "type": "seen", "source": "MISP/d541ae91-410e-46d6-9682-c9fb721e51a7", "content": "", "creation_timestamp": "2020-10-09T14:03:13.000000Z"}, {"uuid": "0cf3eb71-590d-4e55-8328-23cba7290590", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-17026", "type": "seen", "source": "MISP/3c4dcab9-5926-45f9-b998-194e51be8479", "content": "", "creation_timestamp": "2024-11-14T06:08:52.000000Z"}, {"uuid": "f638e43e-1c47-4efe-84a8-cf98a4126903", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-17026", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2970967", "content": "", "creation_timestamp": "2024-12-24T20:22:26.250839Z"}, {"uuid": "79085338-e371-4d7c-98ba-f2f2c64e2fe6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-17026", "type": "exploited", "source": "https://t.me/true_secator/417", "content": "\"\u042f \u0447\u0443\u0432\u0441\u0442\u0432\u0443\u044e \u0441\u0435\u0431\u044f \u0432\u0441\u0435 \u0447\u0443\u0434\u0435\u0441\u0430\u0442\u0435\u0435 \u0438 \u0447\u0443\u0434\u0435\u0441\u0430\u0442\u0435\u0435\" (\u0410\u043b\u0438\u0441\u0430 \u0432 \u0441\u0442\u0440\u0430\u043d\u0435 \u0447\u0443\u0434\u0435\u0441)\n\n\u041d\u0435 \u0443\u0441\u043f\u0435\u043b\u0438 \u043c\u044b \u0440\u0430\u0437\u0432\u0435\u0441\u0442\u0438 \u043a\u043e\u043d\u0441\u043f\u0438\u0440\u043e\u043b\u043e\u0433\u0438\u044e \u0441 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0439 \u043f\u0440\u0438\u0447\u0430\u0441\u0442\u043d\u043e\u0441\u0442\u044c\u044e \u0418\u0440\u0430\u043d\u0430 \u043a \u043a\u0438\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0435 \u043d\u0430 \u0412\u041e\u0417, \u043a\u0430\u043a \u043f\u043e\u0434\u0432\u0435\u0437\u043b\u0438 \u043d\u043e\u0432\u044b\u0445 \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u044b\u0445 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0435\u0439.\n\n\u041a\u0438\u0442\u0430\u0439\u0441\u043a\u0438\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438\u0437 Qihoo 360 (\u043e\u043d\u0438, \u043a\u0441\u0442\u0430\u0442\u0438, \u0447\u0430\u0441\u0442\u043e \u0443 \u043d\u0430\u0441 \u043c\u0435\u043b\u044c\u043a\u0430\u044e\u0442) \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0438 \u043e \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u043d\u043e\u0439 \u0440\u0430\u043d\u0435\u0435 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438 \u043f\u043e \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 CVE-2019-17026 \u0434\u043b\u044f Firefox \u0438 CVE-2020-0674 \u0434\u043b\u044f Internet Explorer. \n\n\u0426\u0435\u043b\u044c\u044e \u043a\u0438\u0431\u0435\u0440\u0430\u0442\u0430\u043a \u0431\u044b\u043b\u0438 \u043a\u0438\u0442\u0430\u0439\u0441\u043a\u0438\u0435 \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b \u0438 \u044f\u043f\u043e\u043d\u0441\u043a\u0438\u0435 \u043f\u0440\u0435\u0434\u043f\u0440\u0438\u044f\u0442\u0438\u044f. \u041f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0439 \u0444\u0430\u043a\u0442 \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0430\u0435\u0442\u0441\u044f JPCERT. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430\u0445 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0445\u0430\u043a\u0435\u0440\u0430\u043c\u0438 \u0434\u043b\u044f \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0432 \u0430\u0442\u0430\u043a\u043e\u0432\u0430\u043d\u043d\u0443\u044e \u0441\u0438\u0441\u0442\u0435\u043c\u0443 \u0442\u0440\u043e\u044f\u043d\u0430 Gh0st RAT.\n\nQihoo 360 \u0441\u0447\u0438\u0442\u0430\u0435\u0442, \u0447\u0442\u043e \u0434\u0430\u043d\u043d\u0430\u044f \u0430\u0442\u0430\u043a\u0430 \u0431\u044b\u043b\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u0435\u0434\u0435\u043d\u0430 \u0433\u0440\u0443\u043f\u043f\u043e\u0439 DarkHotel, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u043e\u043d\u0438 \u043d\u0430\u0437\u044b\u0432\u0430\u044e\u0442 APT-C-06 \u0438 \u0441\u0432\u044f\u0437\u044b\u0432\u0430\u044e\u0442 \u0441 \u042e\u0436\u043d\u043e\u0439 \u041a\u043e\u0440\u0435\u0435\u0439 (\u0430 \u043c\u044b \u0434\u043e\u0431\u0430\u0432\u0438\u043c - \u0442\u043e\u0433\u0434\u0430 \u0443\u0436 \u0441 \u044e\u0436\u043d\u043e\u043a\u043e\u0440\u0435\u0439\u0441\u043a\u043e\u0439 \u0440\u0430\u0437\u0432\u0435\u0434\u043a\u043e\u0439).\n\n\u0410 \u0442\u0435\u043f\u0435\u0440\u044c, \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435, \u0432\u043e\u043f\u0440\u043e\u0441. \u0415\u0441\u043b\u0438 \u043f\u0435\u0440\u0432\u043e\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u044b\u0435 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438 Reuters \u043f\u0440\u0430\u0432\u044b \u0438 \u043a\u0438\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0430 \u043d\u0430 \u0412\u041e\u0417 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u043b\u0430\u0441\u044c DarkHotel, \u0442\u043e \u0447\u0442\u043e \u0436\u0435 \u0432\u043d\u0443\u0442\u0440\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 \u0412\u0441\u0435\u043c\u0438\u0440\u043d\u043e\u0439 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0437\u0434\u0440\u0430\u0432\u043e\u043e\u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0437\u0430\u043a\u043e\u043f\u0430\u043d\u043e \u0442\u0430\u043a\u043e\u0433\u043e, \u0447\u0442\u043e \u042e\u0436\u043d\u0430\u044f \u041a\u043e\u0440\u0435\u044f \u0440\u0435\u0448\u0438\u043b\u0430 \u0438\u0445 \u043b\u043e\u043c\u0430\u043d\u0443\u0442\u044c (\u0435\u0441\u043b\u0438, \u043a\u043e\u043d\u0435\u0447\u043d\u043e, \u043a\u0438\u0442\u0430\u0439\u0446\u044b \u043f\u0440\u0430\u0432\u044b \u0432 \u0447\u0430\u0441\u0442\u0438 \u0441\u0432\u044f\u0437\u0438 \u0445\u0430\u043a\u0435\u0440\u0441\u043a\u043e\u0439 \u0433\u0440\u0443\u043f\u043f\u044b \u0441 \u043f\u043e\u043b\u0443\u043e\u0441\u0442\u0440\u043e\u0432\u043d\u044b\u043c \u0433\u043e\u0441\u0443\u0434\u0430\u0440\u0441\u0442\u0432\u043e\u043c)?", "creation_timestamp": "2020-04-02T18:55:19.000000Z"}, {"uuid": "b36a7d90-d5c7-4da4-8d60-e378342b099a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-17026", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:42.000000Z"}, {"uuid": "94b18619-fe8f-4ada-88ea-32d18ddab391", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2019-17026", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=443", "content": "", "creation_timestamp": "2020-01-08T04:00:00.000000Z"}, {"uuid": "289ef61c-4dd6-4bda-b807-84875a5aeab4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2019-17026", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/0ef2039c-2e7f-4f92-9fed-d54b894faa7c", "content": "", "creation_timestamp": "2026-02-02T12:28:58.484135Z"}, {"uuid": "6d6df203-234a-4f11-9473-f0cc22e82592", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-17026", "type": "seen", "source": "https://t.me/pwnwiki_zhchannel/415", "content": "CVE-2019-17026 Firefox 72 IonMonkey JIT\u985e\u578b\u6df7\u6dc6\u6f0f\u6d1e\nhttps://www.pwnwiki.org/index.php?title=CVE-2019-17026_Firefox_72_IonMonkey_JIT%E9%A1%9E%E5%9E%8B%E6%B7%B7%E6%B7%86%E6%BC%8F%E6%B4%9E", "creation_timestamp": "2021-05-13T09:29:18.000000Z"}, {"uuid": "311ee73c-b699-416d-b247-dcd2946a9b53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-17026", "type": "exploited", "source": "https://t.me/thehackernews/574", "content": "Attention! Hackers actively exploiting a new critical 0-day bug (CVE-2019-17026) in Firefox that could let remote attackers take complete control over your computers just by tricking you into visiting a malicious site.\n\nRead \u27a4 https://thehackernews.com/2020/01/firefox-cyberattack.html\n\nUpdate your browser now!", "creation_timestamp": "2020-01-09T11:49:16.000000Z"}, {"uuid": "92b6bc35-1346-4fa1-9b73-83214c6ee849", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-17026", "type": "exploited", "source": "https://t.me/arvin_club/1418", "content": "Attention! Hackers actively exploiting a new critical 0-day bug (CVE-2019-17026) in Firefox that could let remote attackers take complete control over your computers just by tricking you into visiting a malicious site.\n\nRead \u27a4 https://thehackernews.com/2020/01/firefox-cyberattack.html\n\nUpdate your browser now!", "creation_timestamp": "2020-01-09T18:38:37.000000Z"}, {"uuid": "377e6a20-7d78-41c4-b2f1-17237d512534", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-17026", "type": "exploited", "source": "https://t.me/secinfosex/31", "content": "\u26a0\ufe0f\u041e\u0431\u043d\u043e\u0432\u043b\u044f\u0439\u0442\u0435 Firefox\n\nCVE-2019-17026: IonMonkey type confusion with StoreElementHole and FallibleStoreElement\n\nIncorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion. \n\n\u2b55\ufe0f We are aware of targeted attacks in the wild abusing this flaw.\n\n\u0421\u0445\u043e\u0436\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043f\u0440\u043e\u0448\u043b\u043e\u043c \u0433\u043e\u0434\u0443 \u0431\u044b\u043b\u0430 \u043d\u0430 \u043d\u0430 pwn2own:\nhttps://www.thezdi.com/blog/2019/4/18/the-story-of-two-winning-pwn2own-jit-vulnerabilities-in-mozilla-firefox\n\n\u0414\u0430\u0436\u0435 \u043f\u0430\u0442\u0447\u0438 \u0438\u0434\u0435\u043d\u0442\u0438\u0447\u043d\u044b:\n1. https://github.com/mozilla/gecko-dev/commit/369406707f9fef96ac8405fb9cbb58da4bcc4f1d\n2. https://github.com/mozilla/gecko-dev/commit/2e7bcc8dfa4fce5c8f3d8b224abde0627e1dee0e\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u044b\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 \u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442:\nhttps://doar-e.github.io/blog/2019/06/17/a-journey-into-ionmonkey-root-causing-cve-2019-9810/\n\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2020-03/", "creation_timestamp": "2020-01-09T07:14:27.000000Z"}, {"uuid": "272d691d-25cf-4f2b-8000-71db7b0bb9f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-17026", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2358", "content": "#Analytics\nTop-10 exploited vulnerabilities in July-December 2020:\n1. CVE-2020-0601 - CurveBall CryptoAPI\nhttps://t.me/cybersecuritytechnologies/628\n2. CVE-2019-17026/CVE-2020-0674 - 0-Day Vulnerability in Mozilla Firefox\nhttps://t.me/cybersecuritytechnologies/914\n3. CVE-2020-0796 - Windows SMBv3 LPE exploit\nhttps://t.me/cybersecuritytechnologies/874\n4. CVE-2020-1472 - Microsoft Zerologon\nhttps://t.me/cybersecuritytechnologies/1742\n5. CVE-2020-5902/5903 - F5 BigIP TMUI Critical RCE\nhttps://t.me/cybersecuritytechnologies/1378\n6. CVE-2018-10561 - Dasan GPON Router Auth. Bypass\nhttps://t.me/cybersecuritytechnologies/51\n7. CVE-2020-1350 - Exploit SIGRed\nhttps://t.me/cybersecuritytechnologies/1422\n8. CVE-2020-15999 + CVE-2020-17087 = Win Kernel cng.sys buffer overflow 0-Day\nhttps://t.me/cybersecuritytechnologies/1960\nhttps://t.me/cybersecuritytechnologies/2010\n9. CVE-2020-16898 - \"Bad Neighbor\" RCE Vulnerability\nhttps://t.me/cybersecuritytechnologies/1912\n10. CVE-2020-1938 - \"Ghostcat\" Apache Tomcat\nhttps://t.me/cybersecuritytechnologies/705", "creation_timestamp": "2025-01-04T20:00:34.000000Z"}, {"uuid": "97a636d6-7dc2-4536-9fec-96521a3afd83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-17026", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/914", "content": "#exploit\nAttacks Simultaneously Exploiting Vulnerability in IE 11 (CVE-2020-0674) and Firefox (CVE-2019-17026)\nhttps://blogs.jpcert.or.jp/en/2020/04/ie-firefox-0day.html\nIE 11 PoC Exploit:\nhttps://www.exploit-db.com/exploits/48806", "creation_timestamp": "2024-10-18T17:24:00.000000Z"}, {"uuid": "0809a344-8cc0-42d2-86bf-18a2f2f5145c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-17026", "type": "exploited", "source": "https://t.me/cibsecurity/10199", "content": "ATENTION\u203c New - CVE-2019-17026\n\nIncorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR &lt; 68.4.1, Thunderbird &lt; 68.4.1, and Firefox &lt; 72.0.1.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-03-02T07:53:22.000000Z"}]}