{"vulnerability": "CVE-2019-1596", "sightings": [{"uuid": "a882d06a-22ba-4e68-b72c-3a0fb1c9cb1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15968", "type": "seen", "source": "https://t.me/ctinow/195195", "content": "https://ift.tt/NZQDkFd\nCVE-2019-15968 | Cisco Unified Communications Domain Manager Web-based Management Interface cross site scripting (cisco-sa-20191120-ucdm-xss)", "creation_timestamp": "2024-02-28T08:36:54.000000Z"}, {"uuid": "9fa1b1e7-74e1-4008-aead-f8ea3afb7686", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15967", "type": "seen", "source": "https://t.me/ctinow/195194", "content": "https://ift.tt/NvcAb5a\nCVE-2019-15967 | Cisco TelePresence Collaboration Endpoint/RoomOS CLI access control (cisco-sa-20191106-telece-ros-e)", "creation_timestamp": "2024-02-28T08:36:53.000000Z"}, {"uuid": "6c68baf6-fdb7-418f-9766-5a7676847990", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15960", "type": "seen", "source": "https://t.me/ctinow/195193", "content": "https://ift.tt/3OZv1As\nCVE-2019-15960 | Cisco Webex Meeting WebEx Network Recording Admin Page Request access control (cisco-sa-20191106-wbs-privileg)", "creation_timestamp": "2024-02-28T08:36:52.000000Z"}, {"uuid": "8e0fed1f-c417-4249-bda1-7430842e8846", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15966", "type": "seen", "source": "https://t.me/ctinow/178767", "content": "https://ift.tt/uhqRGMN\nCVE-2019-15966 | Cisco TelePresence Advanced Media Gateway Web Application HTTP Request input validation", "creation_timestamp": "2024-02-04T10:11:36.000000Z"}, {"uuid": "c68edbfe-0805-4d71-922d-22379d8d7c33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15962", "type": "seen", "source": "https://t.me/ctinow/168700", "content": "https://ift.tt/6tZWCyr\nCVE-2019-15962 | Cisco TelePresence Collaboration Endpoint CLI /root default permission (cisco-sa-20191016-tele-ce-file)", "creation_timestamp": "2024-01-16T09:31:42.000000Z"}, {"uuid": "fd59086b-f113-4103-916f-31a02ce23f43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15969", "type": "seen", "source": "https://t.me/cibsecurity/14838", "content": "ATENTION\u203c New - CVE-2019-15969\n\nA vulnerability in the web-based management interface of Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script or HTML code in the context of the interface, which could allow the attacker to gain access to sensitive, browser-based information.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-09-23T07:55:40.000000Z"}, {"uuid": "c92c87e0-7837-4de0-9d68-8d8f888fc6ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15963", "type": "seen", "source": "https://t.me/cibsecurity/14839", "content": "ATENTION\u203c New - CVE-2019-15963\n\nA vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an authenticated, remote attacker to view sensitive information in the web-based management interface of the affected software. The vulnerability is due to insufficient protection of user-supplied input by the web-based management interface of the affected service. An attacker could exploit this vulnerability by accessing the interface and viewing restricted portions of the software configuration. A successful exploit could allow the attacker to gain access to sensitive information or conduct further attacks.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-09-23T07:55:41.000000Z"}]}