{"vulnerability": "CVE-2019-1950", "sightings": [{"uuid": "127732bc-a001-4f3f-9dbb-653bb5e949bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19509", "type": "exploited", "source": "https://www.exploit-db.com/exploits/47982", "content": "", "creation_timestamp": "2020-01-30T00:00:00.000000Z"}, {"uuid": "20966d52-bd35-4724-8338-5ed1226fc5e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19509", "type": "exploited", "source": "https://www.exploit-db.com/exploits/48223", "content": "", "creation_timestamp": "2020-03-17T00:00:00.000000Z"}, {"uuid": "141b2c9a-c8e3-45da-a34c-3276b4fc7c8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19507", "type": "seen", "source": "https://t.me/ctinow/200316", "content": "https://ift.tt/NIW5veu\nCVE-2019-19507 | jpv up to 2.1.0 Type Detection compareCommon Attribute improper authentication", "creation_timestamp": "2024-03-05T15:16:28.000000Z"}, {"uuid": "cff7e544-e836-4a11-89e4-845a2c4e1983", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19509", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:15.000000Z"}, {"uuid": "a081f667-8473-49ea-a1f7-ed7b4d38b6b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19509", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/rconfig_ajaxarchivefiles_rce.rb", "content": "", "creation_timestamp": "2020-03-16T11:28:40.000000Z"}, {"uuid": "9e6e5556-7667-43ed-b226-6fa5083f9a4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19509", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:44.000000Z"}, {"uuid": "0712d319-f908-4e4c-9d15-7b1b1f206a12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19509", "type": "seen", "source": "https://t.me/ctinow/211751", "content": "https://ift.tt/CRM8tv2\nCVE-2019-19509 | rConfig System ajaxArchiveFiles.php exec path os command injection (ID 156146)", "creation_timestamp": "2024-03-19T17:41:23.000000Z"}, {"uuid": "1c23a6a7-8ad7-4038-b8fd-8651a8ae922a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19506", "type": "seen", "source": "https://t.me/cibsecurity/13072", "content": "ATENTION\u203c New - CVE-2019-19506\n\nTenda PA6 Wi-Fi Powerline extender 1.0.1.21 is vulnerable to a denial of service, caused by an error in the \"homeplugd\" process. By sending a specially crafted UDP packet, an attacker could exploit this vulnerability to cause the device to reboot.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-06-26T00:55:02.000000Z"}, {"uuid": "b6737205-384e-44e4-810f-9cb2ed2b73c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19502", "type": "seen", "source": "https://t.me/ctinow/200315", "content": "https://ift.tt/wfzBp0A\nCVE-2019-19502 | Image Uploader/Browser plugin up to 4.1.8 on CKEditor Pathname pluginconfig.php input validation", "creation_timestamp": "2024-03-05T15:16:27.000000Z"}, {"uuid": "5f9dfe08-6335-472c-b919-62ab6a9d52e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19501", "type": "seen", "source": "https://t.me/ctinow/205373", "content": "https://ift.tt/b2xO3iT\nCVE-2019-19501 | VeraCrypt 1.24 VeraCryptExpander.exe privileges management", "creation_timestamp": "2024-03-12T08:41:47.000000Z"}, {"uuid": "fe824b73-7c4f-4f38-944f-fd6ff400c69e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19505", "type": "seen", "source": "https://t.me/cibsecurity/13073", "content": "ATENTION\u203c New - CVE-2019-19505\n\nTenda PA6 Wi-Fi Powerline extender 1.0.1.21 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the \"Wireless\" section in the web-UI. By sending a specially crafted hostname, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-06-26T00:55:03.000000Z"}, {"uuid": "c2bdf82d-102c-4ab5-9dec-a5a1dea203ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19500", "type": "seen", "source": "https://t.me/cibsecurity/11294", "content": "ATENTION\u203c New - CVE-2019-19500\n\nMatrix42 Workspace Management 9.1.2.2765 and below allows stored XSS via unfiltered description parameters, as demonstrated by the comment field of a special order for individual software.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-04-15T21:14:16.000000Z"}, {"uuid": "913e83e6-f56f-4d2e-bde0-7c48921c5e4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19505", "type": "seen", "source": "https://t.me/cibsecurity/13174", "content": "ATENTION\u203c New - CVE-2019-19505\n\nTenda PA6 Wi-Fi Powerline extender 1.0.1.21 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the \"Wireless\" section in the web-UI. By sending a specially crafted hostname, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-07-01T14:55:29.000000Z"}, {"uuid": "07a7054e-0d5a-4d39-bb89-569809d943fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19506", "type": "seen", "source": "https://t.me/cibsecurity/13173", "content": "ATENTION\u203c New - CVE-2019-19506\n\nTenda PA6 Wi-Fi Powerline extender 1.0.1.21 is vulnerable to a denial of service, caused by an error in the \"homeplugd\" process. By sending a specially crafted UDP packet, an attacker could exploit this vulnerability to cause the device to reboot.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-07-01T14:55:25.000000Z"}, {"uuid": "cf223b80-39a9-41a0-93fc-484ff665c1ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19506", "type": "seen", "source": "https://t.me/cibsecurity/13162", "content": "ATENTION\u203c New - CVE-2019-19506\n\nTenda PA6 Wi-Fi Powerline extender 1.0.1.21 is vulnerable to a denial of service, caused by an error in the \"homeplugd\" process. By sending a specially crafted UDP packet, an attacker could exploit this vulnerability to cause the device to reboot.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-07-01T11:55:30.000000Z"}, {"uuid": "3fb43a56-88a7-4460-a11d-ab8b931cd039", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19505", "type": "seen", "source": "https://t.me/cibsecurity/13163", "content": "ATENTION\u203c New - CVE-2019-19505\n\nTenda PA6 Wi-Fi Powerline extender 1.0.1.21 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the \"Wireless\" section in the web-UI. By sending a specially crafted hostname, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-07-01T11:55:35.000000Z"}]}