{"vulnerability": "CVE-2019-1598", "sightings": [{"uuid": "09a0e549-86d8-49c9-8f79-986f6216c5ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15984", "type": "exploited", "source": "https://www.exploit-db.com/exploits/48019", "content": "", "creation_timestamp": "2020-02-06T00:00:00.000000Z"}, {"uuid": "e04282e9-3cec-40cb-abe8-29783deb7e90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15983", "type": "seen", "source": "https://t.me/ctinow/211636", "content": "https://ift.tt/wpoJtg9\nCVE-2019-15983 | Cisco Data Center Network Manager SOAP API API Request xml external entity reference (cisco-sa-20200102-dcnm-xml-ext)", "creation_timestamp": "2024-03-19T15:46:10.000000Z"}, {"uuid": "94cf036f-4a19-41f8-9f2c-a8008952fd77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15984", "type": "seen", "source": "https://t.me/ctinow/211637", "content": "https://ift.tt/CulGDKj\nCVE-2019-15984 | Cisco Data Center Network Manager REST/SOAP sql injection (cisco-sa-20200102-dcnm-sql-inj)", "creation_timestamp": "2024-03-19T15:46:11.000000Z"}, {"uuid": "999a8e76-1a43-48a1-91e0-b5a02d37e3f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15981", "type": "seen", "source": "https://t.me/ctinow/211581", "content": "https://ift.tt/FUyiN2L\nCVE-2019-15981 | Cisco Data Center Network Manager REST/SOAP path traversal (cisco-sa-20200102-dcnm-path-tr)", "creation_timestamp": "2024-03-19T15:16:53.000000Z"}, {"uuid": "f22cce75-6ca0-46af-910f-93597e48a6c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15980", "type": "seen", "source": "https://t.me/ctinow/211580", "content": "https://ift.tt/5uaDqgO\nCVE-2019-15980 | Cisco Data Center Network Manager REST/SOAP path traversal (cisco-sa-20200102-dcnm-path-tr)", "creation_timestamp": "2024-03-19T15:16:51.000000Z"}, {"uuid": "8af79b9f-8a5a-4475-916b-afb230a71110", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15985", "type": "seen", "source": "https://t.me/ctinow/211638", "content": "https://ift.tt/wcH9OGz\nCVE-2019-15985 | Cisco Data Center Network Manager REST/SOAP sql injection (cisco-sa-20200102-dcnm-sql-inj)", "creation_timestamp": "2024-03-19T15:46:12.000000Z"}, {"uuid": "297b77ec-7124-4195-95ed-6d32232fa7d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15987", "type": "seen", "source": "https://t.me/ctinow/195201", "content": "https://ift.tt/ceiMOah\nCVE-2019-15987 | Cisco Webex Event Center Web Interface improper authentication (cisco-sa-20191120-webex-center)", "creation_timestamp": "2024-02-28T09:06:32.000000Z"}, {"uuid": "f983fcdc-3b10-4f5b-8f26-b94a8829e580", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15982", "type": "seen", "source": "https://t.me/ctinow/211582", "content": "https://ift.tt/Obk8mhY\nCVE-2019-15982 | Cisco Data Center Network Manager REST/SOAP path traversal (cisco-sa-20200102-dcnm-path-tr)", "creation_timestamp": "2024-03-19T15:16:54.000000Z"}, {"uuid": "58d233c3-642c-4b91-89d3-eaf7e4ed3e0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15986", "type": "seen", "source": "https://t.me/ctinow/195200", "content": "https://ift.tt/Gv4tiHm\nCVE-2019-15986 | Cisco Unity Express CLI os command injection (cisco-sa-20191120-unity-exp-co)", "creation_timestamp": "2024-02-28T09:06:31.000000Z"}, {"uuid": "c89368c6-b548-433b-9564-4207ea8ad1c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15988", "type": "seen", "source": "https://t.me/ctinow/195202", "content": "https://ift.tt/058ycPs\nCVE-2019-15988 | Cisco Email Security Appliance Antispam Protection Mechanism input validation (cisco-sa-20191120-esa-url-bypa)", "creation_timestamp": "2024-02-28T09:06:33.000000Z"}, {"uuid": "cba05111-9846-4c18-9a22-1f7ce97b2d72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-15989", "type": "seen", "source": "https://t.me/cveNotify/406", "content": "\ud83d\udea8 CVE-2019-15989\nA vulnerability in the implementation of the Border Gateway Protocol (BGP) functionality in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to incorrect processing of a BGP update message that contains a specific BGP attribute. An attacker could exploit this vulnerability by sending BGP update messages that include a specific, malformed attribute to be processed by an affected system. A successful exploit could allow the attacker to cause the BGP process to restart unexpectedly, resulting in a DoS condition. The Cisco implementation of BGP accepts incoming BGP traffic only from explicitly defined peers. To exploit this vulnerability, the malicious BGP update message would need to come from a configured, valid BGP peer or would need to be injected by the attacker into the victim&rsquo;s BGP network on an existing, valid TCP connection to a BGP peer.\n\n\ud83c\udf96@cveNotify", "creation_timestamp": "2020-01-26T12:37:49.000000Z"}]}