{"vulnerability": "CVE-2019-1388", "sightings": [{"uuid": "41bd9fa9-73d1-4449-b530-9d926f57dfb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1388", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:03.000000Z"}, {"uuid": "a0a29856-74a4-49bb-a150-60d1e3dd210b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1388", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971792", "content": "", "creation_timestamp": "2024-12-24T20:34:07.299965Z"}, {"uuid": "e982cb21-9a74-4547-9f62-e2086c57d8c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1388", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:23.000000Z"}, {"uuid": "a5e644ca-645b-48c0-a184-b7e1540866c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1388", "type": "seen", "source": "https://gist.github.com/garagon/85a72cafb243e1a793677270ca7fad6d", "content": "", "creation_timestamp": "2026-02-17T13:27:58.000000Z"}, {"uuid": "7623c84c-f19a-4983-aee1-a6adb5705f09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1388", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/482", "content": "#exploit\n1. CVE-2019-11157:\nPlundervolt - Software-based Fault injection attacks against Intel SGX\nhttps://www.plundervolt.com\nhttps://github.com/KitMurdock/plundervolt\n\n2. CVE-2019-1388:\nWindows Certificate Dialog\u00a0EoP\nhttps://github.com/jas502n/CVE-2019-1388\n\n3. CVE-2019-10149:\nA flaw was found in Exim 4.87 - 4.91. Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to RCE\nhttps://github.com/Diefunction/CVE-2019-10149", "creation_timestamp": "2024-10-14T20:57:38.000000Z"}, {"uuid": "86df30b6-be1d-45fd-be0d-3f2ba1176df6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2019-1388", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/bd82096b-94ab-4aea-8f81-d10e1e70c410", "content": "", "creation_timestamp": "2026-02-02T12:27:02.036381Z"}, {"uuid": "256018be-26e5-4332-9f5f-d1c2f4b9c65c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1388", "type": "published-proof-of-concept", "source": "https://t.me/pt_soft/270", "content": "\ud83d\uddbc\ufe0f \ud83d\udd04 Moriarty v1.2\n\n\u0427\u0435\u043a\u0435\u0440 CVEs \u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043d\u0430\u043f\u0438\u0441\u0430\u043d\u043d\u044b\u0439 \u043d\u0430 C# \u0434\u043b\u044f \u041e\u0421 \ud83c\udfe0 Windows\n\n\u041f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438:\nWindows 10 (Versions: 1507, 1511, 1607, 1703, 1709, 1803, 1809, 1903, 1909, 2004, 20H2, 21H1, 21H2, 22H1, 22H2)\nWindows 11 (Versions: 21H2, 22H1, 22H2, 23H1)\nWindows Server 2016, 2019, 2022\n\n\u0421\u043f\u0438\u0441\u043e\u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 (35):\nMS10-015\nMS10-092\nMS13-053\nMS13-081\nMS14-058\nMS15-051\nMS15-078\nMS16-016\nMS16-032\nMS16-034\nMS16-135\nCVE-2017-7199\nCVE-2019-0836\nCVE-2019-0836\nCVE-2019-1064\nCVE-2019-1130\nCVE-2019-1253\nCVE-2019-1315\nCVE-2019-1385\nCVE-2019-1388\nCVE-2019-1405\nCVE-2020-0668\nCVE-2020-0683\nCVE-2020-0796\nCVE-2020-1013\nCVE-2020-1013\nCVE-2021-26855\nCVE-2021-26857\nCVE-2021-26858\nCVE-2021-27065\nCVE-2021-44228\nCVE-2021-36934\nCVE-2022-40140\nCVE-2022-22965\nCVE-2023-36664\n\n1.2 added:\n2023-23397\n2022-34718\n\n\ud83d\udc49 \u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439\n\n\u0422\u0430\u043a\u0436\u0435 \u0431\u043e\u0442 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u0442 \u043f\u043e\u0438\u0441\u043a \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u043e\u0432 \u043f\u043e CVE\n\n!poc CVE-2019-1064\n\n\ud83d\udcbb Home\n\n\u0414\u043b\u044f \u0441\u0431\u043e\u0440\u043a\u0438 \u043f\u043e\u043d\u0430\u0434\u043e\u0431\u0438\u0442\u0441\u044f Visual Studio \u0438 .NET Framework 4.8 Developer Pack\n\n#moriarty #checker #csharp\n\n\u2708\ufe0f // Pentest HaT \ud83c\udfa9", "creation_timestamp": "2024-05-03T09:04:40.000000Z"}, {"uuid": "e88f38b5-780b-42a9-8c20-4d36fe5120dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1388", "type": "seen", "source": "https://t.me/arpsyndicate/1468", "content": "#ExploitObserverAlert\n\nCVE-2019-1388\n\nDESCRIPTION: Exploit Observer has 78 entries related to CVE-2019-1388. An elevation of privilege vulnerability exists in the Windows Certificate Dialog when it does not properly enforce user privileges, aka 'Windows Certificate Dialog Elevation of Privilege Vulnerability'.\n\nFIRST-EPSS: 0.171910000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2023-12-05T11:45:30.000000Z"}, {"uuid": "d51bcaa0-aa2f-418b-b037-f86e40b5f334", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1388", "type": "seen", "source": "https://t.me/RAT070/597", "content": "Windows Privilege Escalation For Beginners\n\nThis course focuses on Windows privilege escalation tactics and techniques to help you improve your skills in attacking Windows systems. Improvement\n\n\ud83d\udccd  Kernel Exploits\n\ud83d\udccd  Password Hunting\n\ud83d\udccd  Impersonation Attacks\n\ud83d\udccd  Registry Attacks\n\ud83d\udccd  Executable Files\n\ud83d\udccd  Schedule Tasks\n\ud83d\udccd  Startup Applications\n\ud83d\udccd  DLL Hijacking  Service Permissions\n\ud83d\udccd  Windows Subsystem for Linux\n\ud83d\udccd  CVE-2019-1388", "creation_timestamp": "2023-05-12T09:54:57.000000Z"}, {"uuid": "7d59bd5e-946f-4306-b262-9794a779242c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1388", "type": "published-proof-of-concept", "source": "Telegram/9EewWGivPEadUZwJZS1FdIkYKAoiejsifhi1Dxh8-JW-", "content": "", "creation_timestamp": "2021-10-03T15:10:30.000000Z"}, {"uuid": "deeecdcc-5fb3-4e9b-aa0f-171dc7368c4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1388", "type": "published-proof-of-concept", "source": "https://t.me/ethicalhackx/675", "content": "Windows privesec\n\n\nIntroduction\nFuzzy Security Guide: https://www.fuzzysecurity.com/tutorials/16.html\n\nPayloadAllTheThings: https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Privilege%20Escalation.md\n\nAbsoloom's Guide: https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/\n\nSushant 747's Guide: https://sushant747.gitbooks.io/total-oscp-guide/privilege_escalation_windows.html\n\nGaining a Foothold\nmsfvenom: https://netsec.ws/?p=331\n\nExploring Automated Tools\nwinpeas: https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS\n\nWindows Priv Esc Checklist: https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation\n\nSherlock: https://github.com/rasta-mouse/Sherlock\n\nWatson: https://github.com/rasta-mouse/Watson\n\nPowerUp: https://github.com/PowerShellMafia/PowerSploit/tree/master/Privesc\n\nJAWS: https://github.com/411Hall/JAWS\n\nWindows Exploit Suggester: https://github.com/AonCyberLabs/Windows-Exploit-Suggester\n\nMetasploit Local Exploit Suggester: https://blog.rapid7.com/2015/08/11/metasploit-local-exploit-suggester-do-less-get-more/\n\nSeatbelt: https://github.com/GhostPack/Seatbelt\n\nSharpUp: https://github.com/GhostPack/SharpUp\n\nEscalation Path: Kernel Exploits\nWindows Kernel Exploits: https://github.com/SecWiki/windows-kernel-exploits\n\nKitrap0d Info: https://seclists.org/fulldisclosure/2010/Jan/341\n\nMS10-059: https://github.com/SecWiki/windows-kernel-exploits/tree/master/MS10-059\n\nEscalation Path: Passwords and Port Forwarding\nAchat Exploit: https://www.exploit-db.com/exploits/36025\n\nAchat Exploit (Metasploit): https://www.rapid7.com/db/modules/exploit/windows/misc/achat_bof\n\nPlink Download: https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html\n\nEscalation Path: Windows Subsystem for Linux\nSpawning TTY Shell: https://netsec.ws/?p=337\n\nImpacket Toolkit: https://github.com/SecureAuthCorp/impacket\n\nImpersonation and Potato Attacks\nRotten Potato: https://foxglovesecurity.com/2016/09/26/rotten-potato-privilege-escalation-from-service-accounts-to-system/\n\nJuicy Potato: https://github.com/ohpe/juicy-potato\n\nGroovy Reverse Shell: https://gist.github.com/frohoff/fed1ffaab9b9beeb1c76\n\nAlternative Data Streams: https://blog.malwarebytes.com/101/2015/07/introduction-to-alternate-data-streams/\n\nEscalation Path: getsystem\ngetsystem Explained: https://blog.cobaltstrike.com/2014/04/02/what-happens-when-i-type-getsystem/\n\nEscalation Path: Startup Applications\nicacls Docs: https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/icacls\n\nEscalation Path: CVE-2019-1388\nZeroDayInitiative CVE-2019-1388: https://www.youtube.com/watch?v=3BQKpPNlTSo\n\nRapid7 CVE-2019-1388: https://www.rapid7.com/db/vulnerabilities/msft-cve-2019-1388\n\nCapstone Challenge\nBasic Powershell for Pentesters: https://book.hacktricks.xyz/windows/basic-powershell-for-pentesters\n\nMounting VHD Files: \n\nCapturing MSSQL Creds: \n\nSursa: https://github.com/Gr1mmie/Windows-Privilege-Escalation-Resources/blob/master/README.md", "creation_timestamp": "2022-04-19T05:40:03.000000Z"}, {"uuid": "bbdee769-82ee-4962-a119-be04fee77f3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1388", "type": "published-proof-of-concept", "source": "https://t.me/reverse_dungeon/2258", "content": "https://github.com/jas502n/CVE-2019-1388", "creation_timestamp": "2022-08-02T13:36:46.000000Z"}, {"uuid": "945af7ea-0167-4d46-bc4d-87abc4649fc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1388", "type": "seen", "source": "https://gist.github.com/josephb4224/1d49fcfaa37fb1523b5451314f37b669", "content": "", "creation_timestamp": "2026-03-16T13:31:31.000000Z"}, {"uuid": "62df9a58-6c00-46c5-9125-89fa1459d664", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1388", "type": "seen", "source": "https://t.me/cKure/4908", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 #Exclusive | Zero-Day: Privilege Escalation in Nvidia Control Panel.\n\nAs per the researcher, the vulnerability was identified using alert \ud83d\udce2 mechanism based on an earlier UAC bypass (CVE-2019-1388).\n\nhttps://twitter.com/_M_Shahnawaz/status/1383686714087010311", "creation_timestamp": "2021-04-18T08:00:13.000000Z"}, {"uuid": "1238b68a-d4a5-402d-b54e-ec89294864ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1388", "type": "published-proof-of-concept", "source": "https://t.me/toolslounge/599", "content": "Windows privesec\n\n\nIntroduction\nFuzzy Security Guide: https://www.fuzzysecurity.com/tutorials/16.html\n\nPayloadAllTheThings: https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Privilege%20Escalation.md\n\nAbsoloom's Guide: https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/\n\nSushant 747's Guide: https://sushant747.gitbooks.io/total-oscp-guide/privilege_escalation_windows.html\n\nGaining a Foothold\nmsfvenom: https://netsec.ws/?p=331\n\nExploring Automated Tools\nwinpeas: https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/winPEAS\n\nWindows Priv Esc Checklist: https://book.hacktricks.xyz/windows/checklist-windows-privilege-escalation\n\nSherlock: https://github.com/rasta-mouse/Sherlock\n\nWatson: https://github.com/rasta-mouse/Watson\n\nPowerUp: https://github.com/PowerShellMafia/PowerSploit/tree/master/Privesc\n\nJAWS: https://github.com/411Hall/JAWS\n\nWindows Exploit Suggester: https://github.com/AonCyberLabs/Windows-Exploit-Suggester\n\nMetasploit Local Exploit Suggester: https://blog.rapid7.com/2015/08/11/metasploit-local-exploit-suggester-do-less-get-more/\n\nSeatbelt: https://github.com/GhostPack/Seatbelt\n\nSharpUp: https://github.com/GhostPack/SharpUp\n\nEscalation Path: Kernel Exploits\nWindows Kernel Exploits: https://github.com/SecWiki/windows-kernel-exploits\n\nKitrap0d Info: https://seclists.org/fulldisclosure/2010/Jan/341\n\nMS10-059: https://github.com/SecWiki/windows-kernel-exploits/tree/master/MS10-059\n\nEscalation Path: Passwords and Port Forwarding\nAchat Exploit: https://www.exploit-db.com/exploits/36025\n\nAchat Exploit (Metasploit): https://www.rapid7.com/db/modules/exploit/windows/misc/achat_bof\n\nPlink Download: https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html\n\nEscalation Path: Windows Subsystem for Linux\nSpawning TTY Shell: https://netsec.ws/?p=337\n\nImpacket Toolkit: https://github.com/SecureAuthCorp/impacket\n\nImpersonation and Potato Attacks\nRotten Potato: https://foxglovesecurity.com/2016/09/26/rotten-potato-privilege-escalation-from-service-accounts-to-system/\n\nJuicy Potato: https://github.com/ohpe/juicy-potato\n\nGroovy Reverse Shell: https://gist.github.com/frohoff/fed1ffaab9b9beeb1c76\n\nAlternative Data Streams: https://blog.malwarebytes.com/101/2015/07/introduction-to-alternate-data-streams/\n\nEscalation Path: getsystem\ngetsystem Explained: https://blog.cobaltstrike.com/2014/04/02/what-happens-when-i-type-getsystem/\n\nEscalation Path: Startup Applications\nicacls Docs: https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/icacls\n\nEscalation Path: CVE-2019-1388\nZeroDayInitiative CVE-2019-1388: https://www.youtube.com/watch?v=3BQKpPNlTSo\n\nRapid7 CVE-2019-1388: https://www.rapid7.com/db/vulnerabilities/msft-cve-2019-1388\n\nCapstone Challenge\nBasic Powershell for Pentesters: https://book.hacktricks.xyz/windows/basic-powershell-for-pentesters\n\nMounting VHD Files: \n\nCapturing MSSQL Creds: \n\nSursa: https://github.com/Gr1mmie/Windows-Privilege-Escalation-Resources/blob/master/README.md", "creation_timestamp": "2021-09-28T02:31:01.000000Z"}, {"uuid": "1959112e-603f-489d-96c8-a3331d98cf35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1388", "type": "seen", "source": "https://t.me/pt_soft/243", "content": "\ud83d\uddbc\ufe0f Moriarty v1.1\n\n\u0427\u0435\u043a\u0435\u0440 CVEs \u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043d\u0430\u043f\u0438\u0441\u0430\u043d\u043d\u044b\u0439 \u043d\u0430 C# \u0434\u043b\u044f \u041e\u0421 \ud83c\udfe0 Windows\n\n\u041f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438:\nWindows 10 (Versions: 1507, 1511, 1607, 1703, 1709, 1803, 1809, 1903, 1909, 2004, 20H2, 21H1, 21H2, 22H1, 22H2)\nWindows 11 (Versions: 21H2, 22H1, 22H2, 23H1)\nWindows Server 2016, 2019, 2022\n\n\u0421\u043f\u0438\u0441\u043e\u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 (35):\nMS10-015\nMS10-092\nMS13-053\nMS13-081\nMS14-058\nMS15-051\nMS15-078\nMS16-016\nMS16-032\nMS16-034\nMS16-135\nCVE-2017-7199\nCVE-2019-0836\nCVE-2019-0836\nCVE-2019-1064\nCVE-2019-1130\nCVE-2019-1253\nCVE-2019-1315\nCVE-2019-1385\nCVE-2019-1388\nCVE-2019-1405\nCVE-2020-0668\nCVE-2020-0683\nCVE-2020-0796\nCVE-2020-1013\nCVE-2020-1013\nCVE-2021-26855\nCVE-2021-26857\nCVE-2021-26858\nCVE-2021-27065\nCVE-2021-44228\nCVE-2021-36934\nCVE-2022-40140\nCVE-2022-22965\nCVE-2023-36664\n\n\ud83d\udc49 \u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439\n\n\u0422\u0430\u043a\u0436\u0435 \u0431\u043e\u0442 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u0442 \u043f\u043e\u0438\u0441\u043a \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u043e\u0432 \u043f\u043e CVE\n\n!poc CVE-2019-1064\n\n\ud83d\udcbb Home\n\n\u0414\u043b\u044f \u0441\u0431\u043e\u0440\u043a\u0438 \u043f\u043e\u043d\u0430\u0434\u043e\u0431\u0438\u0442\u0441\u044f Visual Studio \u0438 .NET Framework 4.8 Developer Pack\n\n#moriarty #checker #csharp\n\n\u2708\ufe0f // Pentest HaT \ud83c\udfa9", "creation_timestamp": "2024-03-15T08:58:02.000000Z"}, {"uuid": "fafdc713-18f5-4618-997f-b774a003ea6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1388", "type": "seen", "source": "https://t.me/ctinow/182810", "content": "https://ift.tt/0NsKpa6\nCVE-2019-1388 | Microsoft Windows up to Server 2019 Certificate Dialog privileges management", "creation_timestamp": "2024-02-11T15:06:54.000000Z"}, {"uuid": "70e5c205-ec5f-4f79-b7a7-511424d3543c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1388", "type": "seen", "source": "https://t.me/haccking/101419", "content": "#\u041e\u0431\u0443\u0447\u0435\u043d\u0438\u0435\n\u0417\u0430\u0447\u0435\u043c \u043d\u0443\u0436\u043d\u043e \u043d\u0430\u043a\u0430\u0442\u044b\u0432\u0430\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f Windows (CVE-2019-1388)", "creation_timestamp": "2021-09-15T12:00:20.000000Z"}, {"uuid": "e64db1cb-9094-4454-b1a6-35d4613ee1ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1388", "type": "seen", "source": "https://t.me/haccking/6724", "content": "#\u041e\u0431\u0443\u0447\u0435\u043d\u0438\u0435\n\u0417\u0430\u0447\u0435\u043c \u043d\u0443\u0436\u043d\u043e \u043d\u0430\u043a\u0430\u0442\u044b\u0432\u0430\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f Windows (CVE-2019-1388)", "creation_timestamp": "2022-11-03T10:24:43.000000Z"}]}