{"vulnerability": "CVE-2019-15239", "sightings": [{"uuid": "ce792e99-7fd7-4a6a-8089-61510c6815a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15239", "type": "seen", "source": "https://bsky.app/profile/alleleintel.com/post/3m4dmwu5tqs2x", "content": "", "creation_timestamp": "2025-10-29T14:12:43.663554Z"}, {"uuid": "feab159a-61a3-40e3-b1d0-868a969eeb3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15239", "type": "seen", "source": "https://bsky.app/profile/alleleintel.com/post/3m4dmwu63kt2x", "content": "", "creation_timestamp": "2025-10-29T14:12:48.387385Z"}, {"uuid": "62d88023-cf83-4912-af98-29107ecd3125", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15239", "type": "seen", "source": "https://bsky.app/profile/alleleintel.com/post/3m4dmwu5zmc2x", "content": "", "creation_timestamp": "2025-10-29T14:12:44.910002Z"}, {"uuid": "8325621a-1637-44c1-af6d-e7c3a1e2eb24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15239", "type": "seen", "source": "https://bsky.app/profile/alleleintel.com/post/3m4dmwu65je2x", "content": "", "creation_timestamp": "2025-10-29T14:12:51.957260Z"}, {"uuid": "e7278843-b54e-4fed-9e77-d7a247526240", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15239", "type": "seen", "source": "https://bsky.app/profile/alleleintel.com/post/3m4dmwu62lk2x", "content": "", "creation_timestamp": "2025-10-29T14:12:46.065178Z"}, {"uuid": "fcf15422-5525-4f99-9743-3804d560ac4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15239", "type": "seen", "source": "https://bsky.app/profile/alleleintel.com/post/3m4dmwu66im2x", "content": "", "creation_timestamp": "2025-10-29T14:12:53.144729Z"}, {"uuid": "45606b19-4503-4343-bb52-9e16701c1fc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15239", "type": "seen", "source": "https://bsky.app/profile/alleleintel.com/post/3m4dmwu62ll2x", "content": "", "creation_timestamp": "2025-10-29T14:12:47.230555Z"}, {"uuid": "1a731dc5-c2d6-438a-8a94-4a54db0ad482", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15239", "type": "seen", "source": "https://bsky.app/profile/alleleintel.com/post/3m4dmwu64k32x", "content": "", "creation_timestamp": "2025-10-29T14:12:49.572359Z"}, {"uuid": "95d0ec2a-445f-4181-99ce-822c413df55b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15239", "type": "seen", "source": "https://bsky.app/profile/alleleintel.com/post/3m4dmwu64k42x", "content": "", "creation_timestamp": "2025-10-29T14:12:50.768356Z"}, {"uuid": "3b426ad8-9765-4f2a-ad56-d654f02cc4e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15239", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3m4evhjkaky2v", "content": "", "creation_timestamp": "2025-10-30T02:17:49.579025Z"}, {"uuid": "c018fa11-3cc7-402f-acb5-398b3e35d03d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15239", "type": "seen", "source": "Telegram/hHnUO3JZazxaDFSlcvhpOKOiZt6eEIvuGQrcrKvPgHXG", "content": "", "creation_timestamp": "2019-12-14T01:31:35.000000Z"}, {"uuid": "c902242f-e8e3-4bf9-870e-7e51c2d7e21a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15239", "type": "seen", "source": "Telegram/iQUZE2pIByE4vkwExY2sw7tjReCcmi36nOFNFwktNW4", "content": "", "creation_timestamp": "2019-12-13T11:21:12.000000Z"}, {"uuid": "1a4c449d-6134-401a-afbf-def5d1773d7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15239", "type": "seen", "source": "https://t.me/indoghostsec/731", "content": "INDONESIAN GHOST SECURITY\n\nBY Gh05t999include\n\n2019 ANDROID BUG\n\n\nYook gas:v\n\n1) This is a summary of the mitigations provided by the Android security platform and service protections such as Google Play Protect. These capabilities reduce the likelihood that security vulnerabilities could be successfully exploited on Android.\n\n2) Exploitation for many issues on Android is made more difficult by enhancements in newer versions of the Android platform. We encourage all users to update to the latest version of Android where possible.\n    \n3) The Android security team actively monitors for abuse through Google Play Protect and warns users about Potentially Harmful Applications.\n\n4)  Google Play Protect is enabled by default on devices with Google Mobile Services, and is especially important for users who install apps from outside of Google Play.\n\n2019-12-01 security patch level vulnerability details:\n\n\nCVE-2019-2232   A-140632678   DoS   Critical   8.0, 8.1, 9, 10\nCVE-2019-9464   A-141028068 [2] [3] [4]   EoP   High   10\nCVE-2019-2217   A-141003796   EoP   High   10\nCVE-2019-2218   A-141169173   EoP   High   10\nCVE-2019-2220   A-138636979 [2]   ID   High   9, 10\nCVE-2019-2221   A-138583650 [2]   EoP   Moderate   10\n\nIn Kernel Also !!!!\n\nCVE-2018-20961   A-139522588\nUpstream kernel   EoP   High   USB MIDI class function driver\nCVE-2019-15220   A-140329469\nUpstream kernel   EoP   High   Prism54 WiFi USB Driver\nCVE-2019-15239   A-140328996\nUpstream kernel   EoP   High   TCP Stack\n\nIn Qualcomm components\n\nCVE-2019-10557   A-78657016\nQC-CR#2255369\nQC-CR#2259707   N/A   High   WLAN host\nCVE-2018-11980   A-140423440\nQC-CR#2270117   N/A   High   WLAN host\nCVE-2019-10480   A-140423811\nQC-CR#2309399   N/A   High   WLAN host\nCVE-2019-10481   A-140423794\nQC-CR#2304610\nQC-CR#2318632   N/A   High   WLAN host\nCVE-2019-10536   A-140423334\nQC-CR#2433802   N/A   High   WLAN host\nCVE-2019-10537   A-140423693\nQC-CR#2436502   N/A   High   WLAN host\nCVE-2019-10595   A-140423810\nQC-CR#2148184   N/A   High   WLAN host\nCVE-2019-10598   A-140423155\nQC-CR#2324139   N/A   High   WLAN host\nCVE-2019-10601   A-140423156\nQC-CR#2428798   N/A   High   WLAN host\nCVE-2019-10605   A-140424124\nQC-CR#2187441   N/A   High   WLAN host\nCVE-2019-10607   A-140423690\nQC-CR#2211711   N/A   High   Security\nCVE-2019-2304   A-123238115\nQC-CR#2331868\nQC-CR#2335530\nQC-CR#2348299\nQC-CR#2203904*   N/A   High   WLAN host", "creation_timestamp": "2019-12-11T03:00:17.000000Z"}, {"uuid": "ddad21db-8624-46d5-b407-152c1795d570", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15239", "type": "seen", "source": "https://t.me/indoghostsec/751", "content": "INDONESIAN GHOST SECURITY/INDOGHOSTSEC\n\n2019 ANDROID BUG\n\n\nLet's start\n\n1) This is a summary of the mitigations provided by the Android security platform and service protections such as Google Play Protect. These capabilities reduce the likelihood that security vulnerabilities could be successfully exploited on Android.\n\n2) Exploitation for many issues on Android is made more difficult by enhancements in newer versions of the Android platform. We encourage all users to update to the latest version of Android where possible.\n    \n3) The Android security team actively monitors for abuse through Google Play Protect and warns users about Potentially Harmful Applications.\n\n4)  Google Play Protect is enabled by default on devices with Google Mobile Services, and is especially important for users who install apps from outside of Google Play.\n\n_2019-12-01 security patch level vulnerability details:\n\n\nCVE-2019-2232   A-140632678   DoS   Critical   8.0, 8.1, 9, 10\nCVE-2019-9464   A-141028068 [2] [3] [4]   EoP   High   10\nCVE-2019-2217   A-141003796   EoP   High   10\nCVE-2019-2218   A-141169173   EoP   High   10\nCVE-2019-2220   A-138636979 [2]   ID   High   9, 10\nCVE-2019-2221   A-138583650 [2]   EoP   Moderate   10\n\n_In Kernel Also !!!!\n\nCVE-2018-20961   A-139522588\nUpstream kernel   EoP   High   USB MIDI class function driver\nCVE-2019-15220   A-140329469\nUpstream kernel   EoP   High   Prism54 WiFi USB Driver\nCVE-2019-15239   A-140328996\nUpstream kernel   EoP   High   TCP Stack\n\n_In Qualcomm components\n\nCVE-2019-10557   A-78657016\nQC-CR#2255369\nQC-CR#2259707   N/A   High   WLAN host\nCVE-2018-11980   A-140423440\nQC-CR#2270117   N/A   High   WLAN host\nCVE-2019-10480   A-140423811\nQC-CR#2309399   N/A   High   WLAN host\nCVE-2019-10481   A-140423794\nQC-CR#2304610\nQC-CR#2318632   N/A   High   WLAN host\nCVE-2019-10536   A-140423334\nQC-CR#2433802   N/A   High   WLAN host\nCVE-2019-10537   A-140423693\nQC-CR#2436502   N/A   High   WLAN host\nCVE-2019-10595   A-140423810\nQC-CR#2148184   N/A   High   WLAN host\nCVE-2019-10598   A-140423155\nQC-CR#2324139   N/A   High   WLAN host\nCVE-2019-10601   A-140423156\nQC-CR#2428798   N/A   High   WLAN host\nCVE-2019-10605   A-140424124\nQC-CR#2187441   N/A   High   WLAN host\nCVE-2019-10607   A-140423690\nQC-CR#2211711   N/A   High   Security\nCVE-2019-2304   A-123238115\nQC-CR#2331868\nQC-CR#2335530\nQC-CR#2348299\nQC-CR#2203904*   N/A   High   WLAN host \n\n\nBy indoghostsec 4x3ll999gh05t", "creation_timestamp": "2019-12-11T16:24:35.000000Z"}]}