{"vulnerability": "CVE-2019-1825", "sightings": [{"uuid": "3b3f5ed4-b3c5-46d6-8a2e-6a7aa28c9f01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-18253", "type": "seen", "source": "https://t.me/ctinow/195820", "content": "https://ift.tt/4XEC0Ik\nCVE-2019-18253 | Relion 670 path traversal", "creation_timestamp": "2024-02-28T20:16:52.000000Z"}, {"uuid": "0f685987-6cdd-4cb4-861e-5b8dbb22a567", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-18257", "type": "seen", "source": "https://t.me/ctinow/206007", "content": "https://ift.tt/WE7BPdS\nCVE-2019-18257 | Advantech DiagAnywhere Server up to 3.07.11 stack-based overflow", "creation_timestamp": "2024-03-12T19:16:59.000000Z"}, {"uuid": "b7b191a8-9ebd-4f50-a12a-0c6343dafe5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-18259", "type": "seen", "source": "https://t.me/ctinow/205631", "content": "https://ift.tt/0a8Q3lC\nCVE-2019-18259 | Omron PLC CJ/PLC CS authentication spoofing", "creation_timestamp": "2024-03-12T13:11:42.000000Z"}, {"uuid": "b429e397-0895-406b-a8f6-dd333f90613d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-18251", "type": "seen", "source": "https://t.me/ctinow/195237", "content": "https://ift.tt/psNLJr1\nCVE-2019-18251 | Omron CX-Supervisor 3.5 Teamviewer obsolete function", "creation_timestamp": "2024-02-28T09:41:50.000000Z"}, {"uuid": "f72d26ef-c894-4361-9097-bcb2b7b282cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-18250", "type": "seen", "source": "https://t.me/ctinow/195236", "content": "https://ift.tt/gVUfoID\nCVE-2019-18250 | ABB Power Generation Information Manager/Plant Connect authentication bypass", "creation_timestamp": "2024-02-28T09:41:48.000000Z"}, {"uuid": "bc98ecea-3d2c-4ec5-96ed-74b8860f16f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-18254", "type": "seen", "source": "https://t.me/cibsecurity/13109", "content": "ATENTION\u203c New - CVE-2019-18254\n\nBIOTRONIK CardioMessenger II, The affected products do not encrypt sensitive information while at rest. An attacker with physical access to the CardioMessenger can disclose medical measurement data and the serial number from the implanted cardiac device the CardioMessenger is paired with.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-06-29T18:55:06.000000Z"}, {"uuid": "5a9cbc49-de61-49b5-9b9d-3662dc792540", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-18255", "type": "seen", "source": "https://t.me/cibsecurity/23805", "content": "\u203c CVE-2019-18255 \u203c\n\nHMI/SCADA iFIX (Versions 6.1 and prior) allows a local authenticated user to modify system-wide iFIX configurations through section objects. This may allow privilege escalation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-18T18:50:16.000000Z"}, {"uuid": "c9b1e8d8-470b-4095-ae6b-d9e91e6353cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-18252", "type": "seen", "source": "https://t.me/cibsecurity/13110", "content": "ATENTION\u203c New - CVE-2019-18252\n\nBIOTRONIK CardioMessenger II, The affected products allow credential reuse for multiple authentication purposes. An attacker with adjacent access to the CardioMessenger can disclose its credentials used for connecting to the BIOTRONIK Remote Communication infrastructure.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-06-29T18:55:07.000000Z"}, {"uuid": "748d73b9-92f3-43cf-9f14-fcc1411ca5d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-18256", "type": "seen", "source": "https://t.me/cibsecurity/13108", "content": "ATENTION\u203c New - CVE-2019-18256\n\nBIOTRONIK CardioMessenger II, The affected products use individual per-device credentials that are stored in a recoverable format. An attacker with physical access to the CardioMessenger can use these credentials for network authentication and decryption of local data in transit.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-06-29T18:55:04.000000Z"}]}