{"vulnerability": "CVE-2019-1597", "sightings": [{"uuid": "64d7a7b0-4517-4ca3-a341-b9ebb131fa04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15978", "type": "exploited", "source": "https://www.exploit-db.com/exploits/48020", "content": "", "creation_timestamp": "2020-02-06T00:00:00.000000Z"}, {"uuid": "674a42b1-b1f8-4fbe-8221-0f96fe5a814f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15977", "type": "exploited", "source": "https://www.exploit-db.com/exploits/48020", "content": "", "creation_timestamp": "2020-02-06T00:00:00.000000Z"}, {"uuid": "cc053f56-1891-4db8-99c6-21ff13cbd5bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15976", "type": "exploited", "source": "https://www.exploit-db.com/exploits/48019", "content": "", "creation_timestamp": "2020-02-06T00:00:00.000000Z"}, {"uuid": "7ac152ef-71f1-435d-953f-6c3b140cf7c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15975", "type": "exploited", "source": "https://www.exploit-db.com/exploits/48018", "content": "", "creation_timestamp": "2020-02-06T00:00:00.000000Z"}, {"uuid": "c6e19704-3729-4f23-bd1a-ec5baeab171b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15975", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:44.000000Z"}, {"uuid": "6d5d10df-5fdc-4b45-8b52-68c85bc9616e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15975", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:13.000000Z"}, {"uuid": "49c57d54-b531-4ef3-91c4-53c07eb29523", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15975", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/networking/cisco_dcnm_auth_bypass.rb", "content": "", "creation_timestamp": "2021-06-24T16:07:15.000000Z"}, {"uuid": "cd43a6ff-8395-4b94-b012-f56d4aba3e84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15979", "type": "seen", "source": "https://t.me/ctinow/211579", "content": "https://ift.tt/aohBVk7\nCVE-2019-15979 | Cisco Data Center Network Manager REST/SOAP os command injection (cisco-sa-20200102-dcnm-comm-in)", "creation_timestamp": "2024-03-19T15:16:50.000000Z"}, {"uuid": "6839ef3e-2552-4fec-a4fe-5092ecc5d594", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15975", "type": "seen", "source": "https://t.me/ctinow/211575", "content": "https://ift.tt/30frvyF\nCVE-2019-15975 | Cisco Data Center Network Manager Authentication Mechanism hard-coded credentials (cisco-sa-20200102-dcnm-auth-by)", "creation_timestamp": "2024-03-19T15:16:46.000000Z"}, {"uuid": "f479912c-ce19-4676-a579-e4925da9b4e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15973", "type": "seen", "source": "https://t.me/ctinow/195199", "content": "https://ift.tt/G4jBTZ0\nCVE-2019-15973 | Cisco Industrial Network Director Web-based Management Interface cross site scripting (cisco-sa-20191106-idn-xss)", "creation_timestamp": "2024-02-28T09:06:29.000000Z"}, {"uuid": "08b57a9b-d120-493c-b016-5d8911e767dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15977", "type": "seen", "source": "https://t.me/ctinow/211577", "content": "https://ift.tt/NS97lWQ\nCVE-2019-15977 | Cisco Data Center Network Manager Authentication Mechanism hard-coded credentials (cisco-sa-20200102-dcnm-auth-by)", "creation_timestamp": "2024-03-19T15:16:48.000000Z"}, {"uuid": "1ee684ec-4d28-41b5-bafc-6a434bf6c379", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15978", "type": "seen", "source": "https://t.me/ctinow/211578", "content": "https://ift.tt/Qz7NC1a\nCVE-2019-15978 | Cisco Data Center Network Manager REST/SOAP os command injection (cisco-sa-20200102-dcnm-comm-in)", "creation_timestamp": "2024-03-19T15:16:49.000000Z"}, {"uuid": "a76e7c5a-2658-4caa-9367-f83de8760a00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15976", "type": "seen", "source": "https://t.me/ctinow/211576", "content": "https://ift.tt/6ZWjR0K\nCVE-2019-15976 | Cisco Data Center Network Manager Authentication Mechanism hard-coded credentials (cisco-sa-20200102-dcnm-auth-by)", "creation_timestamp": "2024-03-19T15:16:47.000000Z"}, {"uuid": "5f14748b-2e22-43e9-992d-57089e045172", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15972", "type": "seen", "source": "https://t.me/ctinow/195197", "content": "https://ift.tt/4kPVXFY\nCVE-2019-15972 | Cisco Unified Communications Manager Web-based Management Interface sql injection (cisco-sa-20191120-cucm-sql)", "creation_timestamp": "2024-02-28T08:36:56.000000Z"}, {"uuid": "5334b834-0530-444f-94d4-6bac2480b711", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15971", "type": "seen", "source": "https://t.me/ctinow/195196", "content": "https://ift.tt/AcdE0jZ\nCVE-2019-15971 | Cisco AsyncOS/Email Security Appliance MP3 Detection Engine MP3 File input validation (cisco-sa-20191120-esa-mp3-bypa)", "creation_timestamp": "2024-02-28T08:36:55.000000Z"}, {"uuid": "760f873a-bf31-4e58-a3fc-10f0b3800f8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15974", "type": "seen", "source": "https://t.me/cibsecurity/14837", "content": "ATENTION\u203c New - CVE-2019-15974\n\nA vulnerability in the web interface of Cisco Managed Services Accelerator (MSX) could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by intercepting a user's HTTP request and modifying it into a request that causes the web interface to redirect the user to a specific malicious URL. A successful exploit could allow the attacker to redirect a user to a malicious web page. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-09-23T07:55:39.000000Z"}]}