{"vulnerability": "CVE-2019-1448", "sightings": [{"uuid": "e124953f-81f5-4360-8ce9-9c6393ac50ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-14481", "type": "seen", "source": "https://t.me/cibsecurity/20943", "content": "\u203c CVE-2019-14481 \u203c\n\nAdRem NetCrunch 10.6.0.4587 has a Cross-Site Request Forgery (CSRF) vulnerability in the NetCrunch web client. Successful exploitation requires a logged-in user to open a malicious page and leads to account takeover.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-16T20:41:45.000000Z"}, {"uuid": "5070bd1b-091b-4900-8699-6d80a512d972", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1448", "type": "seen", "source": "https://t.me/ctinow/183658", "content": "https://ift.tt/2Qkclg3\nCVE-2019-1448 | Microsoft Office up to 2019 Excel memory corruption", "creation_timestamp": "2024-02-13T08:56:18.000000Z"}, {"uuid": "93eb047e-9622-406c-9ca6-b5c969aadf4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-14480", "type": "seen", "source": "https://t.me/cibsecurity/20927", "content": "\u203c CVE-2019-14480 \u203c\n\nAdRem NetCrunch 10.6.0.4587 has an Improper Session Handling vulnerability in the NetCrunch web client, which can lead to an authentication bypass or escalation of privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-16T18:41:43.000000Z"}, {"uuid": "f98f5d58-d0cb-40e3-a409-7f56921e9a9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-14482", "type": "seen", "source": "https://t.me/cibsecurity/20926", "content": "\u203c CVE-2019-14482 \u203c\n\nAdRem NetCrunch 10.6.0.4587 has a hardcoded SSL private key vulnerability in the NetCrunch web client. The same hardcoded SSL private key is used across different customers' installations when no other SSL certificate is installed, which allows remote attackers to defeat cryptographic protection mechanisms by leveraging knowledge of this key from another installation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-16T18:41:42.000000Z"}, {"uuid": "b02568c9-7e08-4c1d-a0d4-720153bce7fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-14483", "type": "seen", "source": "https://t.me/cibsecurity/20924", "content": "\u203c CVE-2019-14483 \u203c\n\nAdRem NetCrunch 10.6.0.4587 allows Credentials Disclosure. Every user can read the BSD, Linux, MacOS and Solaris private keys, private keys' passwords, and root passwords stored in the credential manager. Every administrator can read the ESX and Windows passwords stored in the credential manager.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-16T18:41:40.000000Z"}]}