{"vulnerability": "CVE-2019-1132", "sightings": [{"uuid": "eb84b341-991d-4edb-8a70-b902a6f2f0f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1132", "type": "seen", "source": "MISP/fbff27c0-f30f-445c-92af-76781df1856d", "content": "", "creation_timestamp": "2020-10-09T13:20:00.000000Z"}, {"uuid": "a12c353c-844d-403d-a707-1584b130f2ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1132", "type": "seen", "source": "MISP/50442178-7ca3-46dc-b651-a44602eba2f9", "content": "", "creation_timestamp": "2020-10-09T14:48:50.000000Z"}, {"uuid": "beb2a819-f363-4c5d-9fb4-626e9665261e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1132", "type": "seen", "source": "MISP/f299f6e0-f80f-4c16-9812-b49640ed46c1", "content": "", "creation_timestamp": "2020-10-09T14:48:28.000000Z"}, {"uuid": "c5f255a5-3731-4b12-969f-abd36a2a0d2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1132", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:03.000000Z"}, {"uuid": "b2690680-945e-4e2f-91bb-67d56c0e6cde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1132", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971383", "content": "", "creation_timestamp": "2024-12-24T20:28:31.305483Z"}, {"uuid": "6b2b76ab-5970-426d-8821-9b9aedce3585", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2019-1132", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=405", "content": "", "creation_timestamp": "2019-07-10T04:00:00.000000Z"}, {"uuid": "6cd12f0f-4589-4d6a-b513-3939304ee627", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1132", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:01:06.000000Z"}, {"uuid": "22b38e60-af66-44e1-8f4c-6aa1464ccec3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1132", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:22.000000Z"}, {"uuid": "eb7899e3-d6b9-4421-bb50-2d154a5e2012", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1132", "type": "published-proof-of-concept", "source": "https://t.me/antichat/6016", "content": "https://pwnrip.com/exploiting-cve-2019-1132-another-null-pointer-dereference-in-windows-kernel/", "creation_timestamp": "2019-07-26T08:42:31.000000Z"}, {"uuid": "08b6ace7-6e04-4175-862d-4bcb8b0b8a3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2019-11324", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0395/", "content": "", "creation_timestamp": "2026-04-02T17:00:00.000000Z"}, {"uuid": "c873b446-a6e4-4c01-b6af-53ff07d52cd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2019-1132", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/4da15750-30de-4a99-9909-22faf04c9c42", "content": "", "creation_timestamp": "2026-02-02T12:28:08.897791Z"}, {"uuid": "5ed98761-cb4f-405f-bef8-c11b46e850eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1132", "type": "seen", "source": "https://t.me/CyberGovIL/526", "content": "\u05d1-9 \u05dc\u05d7\u05d5\u05d3\u05e9 \u05e4\u05e8\u05e1\u05de\u05d4 \u05de\u05d9\u05e7\u05e8\u05d5\u05e1\u05d5\u05e4\u05d8 \u05db- 77 \u05e2\u05d3\u05db\u05d5\u05e0\u05d9 \u05d0\u05d1\u05d8\u05d7\u05d4 \u05dc\u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea \u05d1\u05ea\u05d5\u05db\u05e0\u05d5\u05ea \u05e0\u05ea\u05de\u05db\u05d5\u05ea, 16 \u05de\u05e1\u05d5\u05d5\u05d2\u05d5\u05ea \u05db\u05e7\u05e8\u05d9\u05d8\u05d9\u05d5\u05ea.\n\u05d9\u05d3\u05d5\u05e2 \u05e2\u05dc 2 \u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea (CVE-2019-1132 \u05d5- CVE-2019-0880) \u05d4\u05de\u05e0\u05d5\u05e6\u05dc\u05d5\u05ea \u05d1\u05e4\u05d5\u05e2\u05dc \u05dc\u05ea\u05e7\u05d9\u05e4\u05d5\u05ea.\n\u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea \u05d0\u05dc\u05d5 \u05de\u05d0\u05e4\u05e9\u05e8\u05d5\u05ea \u05d4\u05e2\u05dc\u05d0\u05ea \u05d4\u05e8\u05e9\u05d0\u05d5\u05ea \u05de\u05e7\u05d5\u05de\u05d9\u05ea.\n\n\u05d4\u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05d4\u05e8\u05d0\u05e9\u05d5\u05e0\u05d4 (CVE-2019-1132) \u05e2\u05dc\u05d5\u05dc\u05d4 \u05dc\u05d0\u05e4\u05e9\u05e8 \u05dc\u05ea\u05d5\u05e7\u05e3 \u05de\u05e7\u05d5\u05de\u05d9 \u05d4\u05e2\u05dc\u05d0\u05ea \u05d4\u05e8\u05e9\u05d0\u05d5\u05ea \u05d5\u05d4\u05e8\u05e6\u05ea \u05e7\u05d5\u05d3 \u05d1\u05e8\u05de\u05ea \u05d4- Kernel.\n\n6 \u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea \u05d4\u05d9\u05d5 \u05de\u05d5\u05db\u05e8\u05d5\u05ea \u05dc\u05e4\u05e0\u05d9 \u05e4\u05e8\u05e1\u05d5\u05dd \u05d4\u05d3\u05d5\"\u05d7, \u05d0\u05da \u05dc\u05d0 \u05d9\u05d3\u05d5\u05e2 \u05e2\u05dc \u05e0\u05d9\u05e6\u05d5\u05dc \u05e9\u05dc\u05d4\u05df \u05d1\u05e4\u05d5\u05e2\u05dc \u05dc\u05d1\u05d9\u05e6\u05d5\u05e2 \u05ea\u05e7\u05d9\u05e4\u05d5\u05ea.\n\u05d4\u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea \u05d4\u05d7\u05de\u05d5\u05e8\u05d5\u05ea \u05d1\u05d9\u05d5\u05ea\u05e8 \u05e2\u05dc\u05d5\u05dc\u05d5\u05ea \u05dc\u05d0\u05e4\u05e9\u05e8 \u05dc\u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05d4\u05e4\u05e2\u05dc\u05ea \u05e7\u05d5\u05d3 \u05de\u05e8\u05d7\u05d5\u05e7 (RCE).", "creation_timestamp": "2019-07-10T15:25:57.000000Z"}, {"uuid": "a816900e-258f-4f31-9f13-9b15eb69092c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1132", "type": "exploited", "source": "https://t.me/CyberGovIL/528", "content": "\u05e2\u05d3\u05db\u05d5\u05df \u05d4\u05d0\u05d1\u05d8\u05d7\u05d4 \u05d4\u05d7\u05d5\u05d3\u05e9\u05d9 \u05e9\u05dc \u05de\u05d9\u05e7\u05e8\u05d5\u05e1\u05d5\u05e4\u05d8 \u2013 \u05d9\u05d5\u05dc\u05d9 19\nhttps://www.gov.il/he/departments/publications/reports/microsoft-update-july19\n\n\u05d1-9 \u05dc\u05d7\u05d5\u05d3\u05e9 \u05e4\u05e8\u05e1\u05de\u05d4 \u05de\u05d9\u05e7\u05e8\u05d5\u05e1\u05d5\u05e4\u05d8 \u05db- 77 \u05e2\u05d3\u05db\u05d5\u05e0\u05d9 \u05d0\u05d1\u05d8\u05d7\u05d4 \u05dc\u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea \u05d1\u05ea\u05d5\u05db\u05e0\u05d5\u05ea \u05e0\u05ea\u05de\u05db\u05d5\u05ea, 16 \u05de\u05e1\u05d5\u05d5\u05d2\u05d5\u05ea \u05db\u05e7\u05e8\u05d9\u05d8\u05d9\u05d5\u05ea.\n\u05d9\u05d3\u05d5\u05e2 \u05e2\u05dc 2 \u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea (CVE-2019-1132 \u05d5- CVE-2019-0880) \u05d4\u05de\u05e0\u05d5\u05e6\u05dc\u05d5\u05ea \u05d1\u05e4\u05d5\u05e2\u05dc \u05dc\u05ea\u05e7\u05d9\u05e4\u05d5\u05ea. \u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea \u05d0\u05dc\u05d5 \u05de\u05d0\u05e4\u05e9\u05e8\u05d5\u05ea \u05d4\u05e2\u05dc\u05d0\u05ea \u05d4\u05e8\u05e9\u05d0\u05d5\u05ea \u05de\u05e7\u05d5\u05de\u05d9\u05ea. \u05d4\u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05d4\u05e8\u05d0\u05e9\u05d5\u05e0\u05d4\n(CVE-2019-1132) \u05e2\u05dc\u05d5\u05dc\u05d4 \u05dc\u05d0\u05e4\u05e9\u05e8 \u05dc\u05ea\u05d5\u05e7\u05e3 \u05de\u05e7\u05d5\u05de\u05d9 \u05d4\u05e2\u05dc\u05d0\u05ea \u05d4\u05e8\u05e9\u05d0\u05d5\u05ea \u05d5\u05d4\u05e8\u05e6\u05ea \u05e7\u05d5\u05d3 \u05d1\u05e8\u05de\u05ea \u05d4- Kernel. \n6 \u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea \u05d4\u05d9\u05d5 \u05de\u05d5\u05db\u05e8\u05d5\u05ea \u05dc\u05e4\u05e0\u05d9 \u05e4\u05e8\u05e1\u05d5\u05dd \u05d4\u05d3\u05d5\"\u05d7, \u05d0\u05da \u05dc\u05d0 \u05d9\u05d3\u05d5\u05e2 \u05e2\u05dc \u05e0\u05d9\u05e6\u05d5\u05dc \u05e9\u05dc\u05d4\u05df \u05d1\u05e4\u05d5\u05e2\u05dc \u05dc\u05d1\u05d9\u05e6\u05d5\u05e2 \u05ea\u05e7\u05d9\u05e4\u05d5\u05ea.\n\u05d4\u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea \u05d4\u05d7\u05de\u05d5\u05e8\u05d5\u05ea \u05d1\u05d9\u05d5\u05ea\u05e8 \u05e2\u05dc\u05d5\u05dc\u05d5\u05ea \u05dc\u05d0\u05e4\u05e9\u05e8 \u05dc\u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05d4\u05e4\u05e2\u05dc\u05ea \u05e7\u05d5\u05d3 \u05de\u05e8\u05d7\u05d5\u05e7 (RCE).", "creation_timestamp": "2019-07-11T04:20:57.000000Z"}, {"uuid": "db585c1f-c465-4758-b052-e3b29581381a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-11325", "type": "seen", "source": "https://t.me/ctinow/193192", "content": "https://ift.tt/Tq56AUO\nCVE-2019-11325 | Symfony up to 4.2.11/4.3.7 VarExport symfony/var-exporter input validation", "creation_timestamp": "2024-02-26T09:41:28.000000Z"}, {"uuid": "916a9faa-597e-41a4-98a8-73f0ba38465e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1132", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/531", "content": "#exploit\n1. CVE-2019-1132:\nWin32k EoP Vulnerability (Win7 7601)\nhttps://github.com/Vlad-tri/CVE-2019-1132\nhttps://github.com/petercc/CVE-2019-1132\n\n2. CVE-2019-1215:\nEoP vulnerability exists in the way that ws2ifsl.sys (Winsock) handles objects in memory\nhttps://github.com/bluefrostsecurity/CVE-2019-1215 \n\n3. CVE-2019-1218:\nA spoofing vulnerability exists in the way MS Outlook iOS software parses specifically crafted email messages (Outlook iOS Spoofing)\nhttps://github.com/d0gukank/CVE-2019-1218", "creation_timestamp": "2024-10-08T20:48:11.000000Z"}, {"uuid": "d1c1bf0b-e23f-468d-b9c3-65292020e0ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1132", "type": "seen", "source": "https://t.me/arpsyndicate/180", "content": "#ExploitObserverAlert\n\nCVE-2019-1132\n\nDESCRIPTION: Exploit Observer has 15 entries related to CVE-2019-1132. An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.\n\nFIRST-EPSS: 0.000420000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2023-11-17T02:32:43.000000Z"}]}