{"uuid": "853f5908-17e2-44e8-b921-c3cc367cc554", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1579", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/538", "content": "#exploit\n1. CVE-2019-16758:\nLexmark Services Monitor 2.27.x - Directory Traversal\nhttps://seclists.org/fulldisclosure/2019/Nov/17\n\n2. CVE-2019-1579:\nRCE in PAN-OS &lt;=7.1.18, &lt;=8.0.11-h1, &lt;=8.1.2 with GlobalProtect Portal/Gateway Interface enabled may allow an unauthenticated remote attacker to execute arbitrary code\nhttps://github.com/securifera/CVE-2019-1579\n\n3. CVE-2019-19697:\nTrend Micro Maximum Security is vulnerable to arbitrary code execution as it allows for creation of registry key to target a process running as SYSTEM\nhttps://seclists.org/fulldisclosure/2020/Jan/22", "creation_timestamp": "2024-10-14T22:12:13.000000Z"}