{"vulnerability": "CVE-2019-1168", "sightings": [{"uuid": "124320b9-a673-42dd-8aae-65a13caeb759", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-11689", "type": "seen", "source": "https://t.me/cibsecurity/10574", "content": "ATENTION\u203c New - CVE-2019-11689\n\nAn issue was discovered in ASUSTOR exFAT Driver through 1.0.0.r20. When conducting license validation, exfat.cgi and exfatctl fail to properly validate server responses and pass unsanitized text to the system shell, resulting in code execution as root.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-03-18T17:31:05.000000Z"}, {"uuid": "b6b06884-5dee-4fbf-87ee-4465707a1675", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-11688", "type": "seen", "source": "https://t.me/cibsecurity/10575", "content": "ATENTION\u203c New - CVE-2019-11688\n\nAn issue was discovered in ASUSTOR exFAT Driver through 1.0.0.r20. When conducting license validation, exfat.cgi and exfatctl accept any certificate for asustornasapi.asustor.com. In other words, there is Missing SSL Certificate Validation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-03-18T17:31:06.000000Z"}, {"uuid": "ed7af8d5-1733-4f9b-9c97-451f973e601b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-11687", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:01:28.000000Z"}, {"uuid": "e1ab1955-2273-491d-b356-d72b8b472582", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-11684", "type": "seen", "source": "https://t.me/cibsecurity/24219", "content": "\u203c CVE-2019-11684 \u203c\n\nImproper Access Control in the RCP+ server of the Bosch Video Recording Manager (VRM) component allows arbitrary and unauthenticated access to a limited subset of certificates, stored in the underlying Microsoft Windows operating system. The fixed versions implement modified authentication checks. Prior releases of VRM software version 3.70 are considered unaffected. This vulnerability affects VRM v3.70.x, v3.71 &lt; v3.71.0034 and v3.81 &lt; 3.81.0050; DIVAR IP 5000 3.80 &lt; 3.80.0039; BVMS all versions using VRM.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-26T18:38:57.000000Z"}]}