{"vulnerability": "CVE-2019-13456", "sightings": [{"uuid": "dd8f0528-c4fe-4cc4-8c49-fb48b508c70c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-13456", "type": "seen", "source": "https://t.me/MajorHacker/221", "content": "CVE-2019-13377 \u27a4 Timing-based side-channel attack against Dragonfly handshake when using Brainpool curves,\n\nCVE-2019-13456 \u27a4 Information leak bug in FreeRADIUS' EAP-pwd implementation.\n\nhttps://xpshort.com/r6NZ8", "creation_timestamp": "2020-02-18T06:54:15.000000Z"}, {"uuid": "d84abeed-c468-4a07-99ec-80f5a42d9dc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-13456", "type": "seen", "source": "https://t.me/MajorHacker/174", "content": "CVE-2019-13377 \u27a4 Timing-based side-channel attack against Dragonfly handshake when using Brainpool curves,\n\nCVE-2019-13456 \u27a4 Information leak bug in FreeRADIUS' EAP-pwd implementation.\n\nhttps://amp.thehackernews.com/thn/2019/08/hack-wpa3-wifi-password.html", "creation_timestamp": "2019-08-03T16:18:21.000000Z"}, {"uuid": "ee947923-bc95-4d4d-bd8b-eb4fc1eff993", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-13456", "type": "seen", "source": "https://t.me/antichat/6113", "content": "Researchers Discover New Ways to Hack WPA3 Protected WiFi Passwords\n\nhttps://thehackernews.com/2019/08/hack-wpa3-wifi-password.html\n\nCVE-2019-13377 \u27a4 Timing-based side-channel attack against Dragonfly handshake when using Brainpool curves,\n\nCVE-2019-13456 \u27a4 Information leak bug in FreeRADIUS' EAP-pwd implementation.", "creation_timestamp": "2019-08-03T15:15:09.000000Z"}, {"uuid": "5026e994-1b80-44e3-b46b-1788e7d8611d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-13456", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/334", "content": "#exploit\n#WLAN_Security\nCVE-2019-13377/CVE-2019-13456:\nNew Dragonblood vulnerabilities found in WiFi WPA3 standard\nhttps://www.zdnet.com/article/new-dragonblood-vulnerabilities-found-in-wifi-wpa3-standard", "creation_timestamp": "2023-09-22T09:04:29.000000Z"}, {"uuid": "137e2881-8aa5-450f-8701-879ca7c6cdcc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-13456", "type": "seen", "source": "https://t.me/thehackernews/410", "content": "Researchers Discover New Ways to Hack WPA3 Protected WiFi Passwords\n\nhttps://thehackernews.com/2019/08/hack-wpa3-wifi-password.html\n\nCVE-2019-13377 \u27a4 Timing-based side-channel attack against Dragonfly handshake when using Brainpool curves,\n\nCVE-2019-13456 \u27a4 Information leak bug in FreeRADIUS' EAP-pwd implementation.", "creation_timestamp": "2019-08-03T11:32:53.000000Z"}]}