{"uuid": "2deaee56-32b9-4f2a-9c7a-6243c455acef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-6111", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/168", "content": "#exploit\n1. PoC for CVE-2019-5736:\nhttps://github.com/Frichetten/CVE-2019-5736-PoC\n\n2. CVE-2019-6111:\nOpenSSH 7.9 - scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server/MiTM attacker can overwrite arbitrary files in the scp client target directory\nhttps://github.com/53n7hu/SNP\n\n3. CVE-2019-6225:\nvoucher_swap - Exploiting MIG reference counting in iOS 12\nhttps://googleprojectzero.blogspot.com/2019/01/voucherswap-exploiting-mig-reference.html\n\n4. Exploiting Malwarebytes Anti-Exploit\nhttps://acru3l.github.io/2019/02/02/exploiting-mb-anti-exploit", "creation_timestamp": "2024-10-08T14:36:45.000000Z"}