{"vulnerability": "CVE-2019-19921", "sightings": [{"uuid": "bc6701af-f753-4c5e-9be2-0a4661c076e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19921", "type": "seen", "source": "https://mstdn.social/users/jschauma/statuses/115497683553103053", "content": "", "creation_timestamp": "2025-11-05T14:59:52.524440Z"}, {"uuid": "7cc17173-6695-4353-b071-3f9798e4f080", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19921", "type": "seen", "source": "https://bsky.app/profile/msbiro.net/post/3m4zu5wywvk2q", "content": "", "creation_timestamp": "2025-11-07T10:20:32.028936Z"}, {"uuid": "dbe709fc-3096-406f-bb03-bb732e3cf44c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19921", "type": "seen", "source": "https://t.me/arpsyndicate/781", "content": "#ExploitObserverAlert\n\nCVE-2023-27561\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-27561. runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.\n\nFIRST-EPSS: 0.000420000\nNVD-IS: 5.9\nNVD-ES: 1.0", "creation_timestamp": "2023-11-29T17:39:00.000000Z"}, {"uuid": "4995c878-bd95-492a-84ac-9d1daad4fd2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19921", "type": "seen", "source": "https://t.me/arpsyndicate/772", "content": "#ExploitObserverAlert\n\nCVE-2019-19921\n\nDESCRIPTION: Exploit Observer has 18 entries related to CVE-2019-19921. runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.)\n\nFIRST-EPSS: 0.000460000\nNVD-IS: 5.9\nNVD-ES: 1.0", "creation_timestamp": "2023-11-29T16:54:31.000000Z"}, {"uuid": "0272eb4f-49f3-4d86-b444-7d36bb7f9d80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19921", "type": "seen", "source": "https://t.me/cibsecurity/59395", "content": "\u203c CVE-2023-27561 \u203c\n\nrunc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-04T09:04:54.000000Z"}]}