{"vulnerability": "CVE-2019-1218", "sightings": [{"uuid": "62609faf-c7eb-4df5-91ec-39a95fc89fda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-12181", "type": "exploited", "source": "https://www.exploit-db.com/exploits/47072", "content": "", "creation_timestamp": "2019-07-03T00:00:00.000000Z"}, {"uuid": "51f39734-52dd-482f-ac28-1c6bc28249ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-12181", "type": "exploited", "source": "https://www.exploit-db.com/exploits/47009", "content": "", "creation_timestamp": "2019-06-18T00:00:00.000000Z"}, {"uuid": "418dafec-7d38-4cc0-84f2-a8a2631645e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-12181", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:43.000000Z"}, {"uuid": "ef7b7be9-746c-4b86-a335-2edec2117aad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-12181", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:12.000000Z"}, {"uuid": "137d0c1e-436c-4923-adc9-c913ee6555e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-12185", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lwrspz2kru2z", "content": "", "creation_timestamp": "2025-08-19T21:02:21.852924Z"}, {"uuid": "f832f300-f09a-40f7-839a-1c22dcbff38a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-12181", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/servu_ftp_server_prepareinstallation_priv_esc.rb", "content": "", "creation_timestamp": "2019-07-01T21:16:38.000000Z"}, {"uuid": "94efd303-123d-4130-884a-1f78a81461f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-12185", "type": "published-proof-of-concept", "source": "Telegram/l5yGjY1hSiP3pTVFOwwMuZMDfoayAV8V9pI9TJkCuOyDVd0", "content": "", "creation_timestamp": "2025-08-17T09:00:04.000000Z"}, {"uuid": "9f477abc-af53-4c1a-9715-eb1da63acf1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-12180", "type": "published-proof-of-concept", "source": "https://t.me/canyoupwnme/6279", "content": "CVE-2019-12180 \u2013 ReadyAPI &amp; SoapUI command execution via malicous project file\nhttps://techblog.mediaservice.net/2020/02/cve-2019-12180-readyapi-soapui-command-execution-via-malicous-project-file/", "creation_timestamp": "2020-02-05T20:03:46.000000Z"}, {"uuid": "4adbe5df-26bf-4180-9592-303043672163", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1218", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/531", "content": "#exploit\n1. CVE-2019-1132:\nWin32k EoP Vulnerability (Win7 7601)\nhttps://github.com/Vlad-tri/CVE-2019-1132\nhttps://github.com/petercc/CVE-2019-1132\n\n2. CVE-2019-1215:\nEoP vulnerability exists in the way that ws2ifsl.sys (Winsock) handles objects in memory\nhttps://github.com/bluefrostsecurity/CVE-2019-1215 \n\n3. CVE-2019-1218:\nA spoofing vulnerability exists in the way MS Outlook iOS software parses specifically crafted email messages (Outlook iOS Spoofing)\nhttps://github.com/d0gukank/CVE-2019-1218", "creation_timestamp": "2024-10-08T20:48:11.000000Z"}, {"uuid": "ccee2934-8a7a-43a2-8fde-f4815d0e7939", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-12183", "type": "seen", "source": "https://t.me/cibsecurity/10214", "content": "ATENTION\u203c New - CVE-2019-12183\n\nIncorrect Access Control in Safescan Timemoto TM-616 and TA-8000 series allows remote attackers to read any file via the administrative API.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-03-02T19:23:13.000000Z"}]}