{"vulnerability": "CVE-2019-1345", "sightings": [{"uuid": "bc825946-40a7-41f6-998e-312e18e1b1b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1345", "type": "exploited", "source": "https://www.exploit-db.com/exploits/47487", "content": "", "creation_timestamp": "2019-10-10T00:00:00.000000Z"}, {"uuid": "d84abeed-c468-4a07-99ec-80f5a42d9dc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-13456", "type": "seen", "source": "https://t.me/MajorHacker/174", "content": "CVE-2019-13377 \u27a4 Timing-based side-channel attack against Dragonfly handshake when using Brainpool curves,\n\nCVE-2019-13456 \u27a4 Information leak bug in FreeRADIUS' EAP-pwd implementation.\n\nhttps://amp.thehackernews.com/thn/2019/08/hack-wpa3-wifi-password.html", "creation_timestamp": "2019-08-03T16:18:21.000000Z"}, {"uuid": "ee947923-bc95-4d4d-bd8b-eb4fc1eff993", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-13456", "type": "seen", "source": "https://t.me/antichat/6113", "content": "Researchers Discover New Ways to Hack WPA3 Protected WiFi Passwords\n\nhttps://thehackernews.com/2019/08/hack-wpa3-wifi-password.html\n\nCVE-2019-13377 \u27a4 Timing-based side-channel attack against Dragonfly handshake when using Brainpool curves,\n\nCVE-2019-13456 \u27a4 Information leak bug in FreeRADIUS' EAP-pwd implementation.", "creation_timestamp": "2019-08-03T15:15:09.000000Z"}, {"uuid": "dd8f0528-c4fe-4cc4-8c49-fb48b508c70c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-13456", "type": "seen", "source": "https://t.me/MajorHacker/221", "content": "CVE-2019-13377 \u27a4 Timing-based side-channel attack against Dragonfly handshake when using Brainpool curves,\n\nCVE-2019-13456 \u27a4 Information leak bug in FreeRADIUS' EAP-pwd implementation.\n\nhttps://xpshort.com/r6NZ8", "creation_timestamp": "2020-02-18T06:54:15.000000Z"}, {"uuid": "99e0ba65-a664-4eab-a3cb-978214ab209f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-13454", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6408", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2019-13454\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: ImageMagick 7.0.1-0 to 7.0.8-54 Q16 allows Division by Zero in RemoveDuplicateLayers in MagickCore/layer.c.\n\ud83d\udccf Published: 2019-07-09T16:07:30.000Z\n\ud83d\udccf Modified: 2025-03-04T18:54:17.832Z\n\ud83d\udd17 References:\n1. https://github.com/ImageMagick/ImageMagick/issues/1629\n2. https://github.com/ImageMagick/ImageMagick/commit/1ddcf2e4f28029a888cadef2e757509ef5047ad8\n3. https://github.com/ImageMagick/ImageMagick6/commit/4f31d78716ac94c85c244efcea368fea202e2ed4\n4. http://www.securityfocus.com/bid/109099\n5. http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html\n6. https://usn.ubuntu.com/4192-1/\n7. https://www.debian.org/security/2020/dsa-4712\n8. https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html\n9. https://github.com/ImageMagick/ImageMagick/blob/7.0.1-0/MagickCore/layer.c#L1618", "creation_timestamp": "2025-03-04T19:33:54.000000Z"}, {"uuid": "137e2881-8aa5-450f-8701-879ca7c6cdcc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-13456", "type": "seen", "source": "https://t.me/thehackernews/410", "content": "Researchers Discover New Ways to Hack WPA3 Protected WiFi Passwords\n\nhttps://thehackernews.com/2019/08/hack-wpa3-wifi-password.html\n\nCVE-2019-13377 \u27a4 Timing-based side-channel attack against Dragonfly handshake when using Brainpool curves,\n\nCVE-2019-13456 \u27a4 Information leak bug in FreeRADIUS' EAP-pwd implementation.", "creation_timestamp": "2019-08-03T11:32:53.000000Z"}, {"uuid": "5026e994-1b80-44e3-b46b-1788e7d8611d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-13456", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/334", "content": "#exploit\n#WLAN_Security\nCVE-2019-13377/CVE-2019-13456:\nNew Dragonblood vulnerabilities found in WiFi WPA3 standard\nhttps://www.zdnet.com/article/new-dragonblood-vulnerabilities-found-in-wifi-wpa3-standard", "creation_timestamp": "2023-09-22T09:04:29.000000Z"}]}