{"vulnerability": "CVE-2019-0863", "sightings": [{"uuid": "2d07f1e4-2f90-46b5-bb4e-cbb6c79d2e50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0863", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "7d35825e-3c45-4e54-951e-3b13c0355b30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0863", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:19.000000Z"}, {"uuid": "b9f6bace-25f3-431c-aee9-22705777ab94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0863", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2970972", "content": "", "creation_timestamp": "2024-12-24T20:22:30.305992Z"}, {"uuid": "2ccb4a72-8d64-4d34-ad76-43f8d5010688", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2019-0863", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=391", "content": "", "creation_timestamp": "2019-05-15T04:00:00.000000Z"}, {"uuid": "964c3dd2-72b9-45aa-a9a2-766be45a68d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0863", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:41.000000Z"}, {"uuid": "7663fbf4-7654-4e70-9987-2ebfedf445ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0863", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:01:06.000000Z"}, {"uuid": "3b83daba-ca62-4d6d-a4ed-7f796fb5d140", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2019-0863", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/8e46e728-d57d-4715-90f4-1d5272088e9e", "content": "", "creation_timestamp": "2026-02-02T12:28:57.949781Z"}, {"uuid": "3e8b1b58-cd2b-4f7f-b013-9a2761432067", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0863", "type": "published-proof-of-concept", "source": "https://t.me/antichat/5714", "content": "https://unit42.paloaltonetworks.com/tale-of-a-windows-error-reporting-zero-day-cve-2019-0863/", "creation_timestamp": "2019-07-04T06:07:15.000000Z"}, {"uuid": "9b26d72a-dfd0-4dc8-9dd4-110ea0062f19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0863", "type": "exploited", "source": "https://t.me/CyberGovIL/451", "content": "\u05d1-14 \u05dc\u05d7\u05d5\u05d3\u05e9 \u05e4\u05e8\u05e1\u05de\u05d4 \u05de\u05d9\u05e7\u05e8\u05d5\u05e1\u05d5\u05e4\u05d8 \u05db- 79 \u05e2\u05d3\u05db\u05d5\u05e0\u05d9 \u05d0\u05d1\u05d8\u05d7\u05d4 \u05dc\u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea \u05d1\u05ea\u05d5\u05db\u05e0\u05d5\u05ea \u05e0\u05ea\u05de\u05db\u05d5\u05ea, 23 \u05de\u05e1\u05d5\u05d5\u05d2\u05d5\u05ea \u05db\u05e7\u05e8\u05d9\u05d8\u05d9\u05d5\u05ea.\n\u05d0\u05d7\u05ea \u05de\u05d4\u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea (CVE-2019-0863) \u05de\u05e0\u05d5\u05e6\u05dc\u05ea \u05d1\u05e4\u05d5\u05e2\u05dc \u05dc\u05ea\u05e7\u05d9\u05e4\u05d5\u05ea \u05d5\u05e2\u05dc\u05d5\u05dc\u05d4 \u05dc\u05d0\u05e4\u05e9\u05e8 \u05dc\u05ea\u05d5\u05e7\u05e3 \u05de\u05e7\u05d5\u05de\u05d9 \u05d4\u05e2\u05dc\u05d0\u05ea \u05d4\u05e8\u05e9\u05d0\u05d5\u05ea \u05d5\u05d4\u05e8\u05e6\u05ea \u05e7\u05d5\u05d3 \u05d1\u05e8\u05de\u05ea \u05d4- Kernel.\n\u05d4\u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea \u05d4\u05d7\u05de\u05d5\u05e8\u05d5\u05ea \u05d1\u05d9\u05d5\u05ea\u05e8 \u05e2\u05dc\u05d5\u05dc\u05d5\u05ea \u05dc\u05d0\u05e4\u05e9\u05e8 \u05dc\u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05d4\u05e4\u05e2\u05dc\u05ea \u05e7\u05d5\u05d3 \u05de\u05e8\u05d7\u05d5\u05e7 (RCE).", "creation_timestamp": "2019-05-15T15:45:13.000000Z"}, {"uuid": "509cddc4-e3a0-4ea1-8322-26637a8367f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0863", "type": "seen", "source": "https://t.me/ctinow/11701", "content": "Article updated to mention that the Windows Error Reporting privilege escalation vuln was already patched by Microsoft as CVE-2019-0863.  This vulnerability was credited to both @galdeleon of Palo Alto Networks and SandboxEscaper (as PolarBear). \nhttps://t.co/4osVRy5REg http://twitter.com/BleepinComputer/status/1131549333197926400", "creation_timestamp": "2019-05-23T15:16:05.000000Z"}]}