{"vulnerability": "CVE-2019-19522", "sightings": [{"uuid": "7d51d672-3108-461e-b3cc-452c819f8e9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19522", "type": "published-proof-of-concept", "source": "https://t.me/antichat/7241", "content": "New \ud83d\udc47\n\nA critical remote Authentication Bypass (smtpd, ldapd, and radiusd) and 3 other Local Privilege Escalation flaws disclosed in OpenBSD operating system.\n\nDetails and PoC \u2014 https://thehackernews.com/2019/12/openbsd-authentication-vulnerability.html\n \n\u27a1\ufe0f CVE-2019-19521\n\u27a1\ufe0f CVE-2019-19520\n\u27a1\ufe0f CVE-2019-19522\n\u27a1\ufe0f CVE-2019-19519", "creation_timestamp": "2019-12-05T11:44:38.000000Z"}, {"uuid": "0d1b8991-fd25-4854-927a-7e103f4028f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19522", "type": "seen", "source": "https://t.me/ctinow/202414", "content": "https://ift.tt/TRFgQfp\nCVE-2019-19522 | OpenBSD 6.6 S-Key/Yubikey improper authentication (ID 155572)", "creation_timestamp": "2024-03-07T14:11:58.000000Z"}, {"uuid": "5d5c653c-ce7e-4e00-a2fc-be15005c5648", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19522", "type": "published-proof-of-concept", "source": "https://t.me/thehackernews/550", "content": "New \ud83d\udc47\n\nA critical remote Authentication Bypass (smtpd, ldapd, and radiusd) and 3 other Local Privilege Escalation flaws disclosed in OpenBSD operating system.\n\nDetails and PoC \u2014 https://thehackernews.com/2019/12/openbsd-authentication-vulnerability.html\n \n\u27a1\ufe0f CVE-2019-19521\n\u27a1\ufe0f CVE-2019-19520\n\u27a1\ufe0f CVE-2019-19522\n\u27a1\ufe0f CVE-2019-19519", "creation_timestamp": "2019-12-05T12:42:53.000000Z"}]}