{"vulnerability": "CVE-2019-13377", "sightings": [{"uuid": "8da21bbc-7a5b-4247-8bdc-a192097f71c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-13377", "type": "seen", "source": "https://t.me/MajorHacker/221", "content": "CVE-2019-13377 \u27a4 Timing-based side-channel attack against Dragonfly handshake when using Brainpool curves,\n\nCVE-2019-13456 \u27a4 Information leak bug in FreeRADIUS' EAP-pwd implementation.\n\nhttps://xpshort.com/r6NZ8", "creation_timestamp": "2020-02-18T06:54:15.000000Z"}, {"uuid": "da0527e6-d06e-430c-b525-280f858b58df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-13377", "type": "seen", "source": "https://t.me/MajorHacker/174", "content": "CVE-2019-13377 \u27a4 Timing-based side-channel attack against Dragonfly handshake when using Brainpool curves,\n\nCVE-2019-13456 \u27a4 Information leak bug in FreeRADIUS' EAP-pwd implementation.\n\nhttps://amp.thehackernews.com/thn/2019/08/hack-wpa3-wifi-password.html", "creation_timestamp": "2019-08-03T16:18:21.000000Z"}, {"uuid": "947d017a-d33d-4f99-b3dc-74942dd97205", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-13377", "type": "seen", "source": "https://t.me/antichat/6113", "content": "Researchers Discover New Ways to Hack WPA3 Protected WiFi Passwords\n\nhttps://thehackernews.com/2019/08/hack-wpa3-wifi-password.html\n\nCVE-2019-13377 \u27a4 Timing-based side-channel attack against Dragonfly handshake when using Brainpool curves,\n\nCVE-2019-13456 \u27a4 Information leak bug in FreeRADIUS' EAP-pwd implementation.", "creation_timestamp": "2019-08-03T15:15:09.000000Z"}, {"uuid": "106cb75f-79c2-4b8f-8bdf-b7e574a88a4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-13377", "type": "seen", "source": "https://t.me/thehackernews/410", "content": "Researchers Discover New Ways to Hack WPA3 Protected WiFi Passwords\n\nhttps://thehackernews.com/2019/08/hack-wpa3-wifi-password.html\n\nCVE-2019-13377 \u27a4 Timing-based side-channel attack against Dragonfly handshake when using Brainpool curves,\n\nCVE-2019-13456 \u27a4 Information leak bug in FreeRADIUS' EAP-pwd implementation.", "creation_timestamp": "2019-08-03T11:32:53.000000Z"}, {"uuid": "3f580d3a-c542-45f9-9091-d339d9d2d42b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-13377", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/334", "content": "#exploit\n#WLAN_Security\nCVE-2019-13377/CVE-2019-13456:\nNew Dragonblood vulnerabilities found in WiFi WPA3 standard\nhttps://www.zdnet.com/article/new-dragonblood-vulnerabilities-found-in-wifi-wpa3-standard", "creation_timestamp": "2023-09-22T09:04:29.000000Z"}]}