{"vulnerability": "CVE-2019-2045", "sightings": [{"uuid": "4f0076e3-c3e3-4675-9926-36d67e9e7ea6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-20457", "type": "seen", "source": "https://t.me/cvedetector/10123", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2019-20457 - Brother MFC-J491DW MD5 Hash Retrieval Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2019-20457 \nPublished : Nov. 7, 2024, 6:15 p.m. | 45\u00a0minutes ago \nDescription : An issue was discovered on Brother MFC-J491DW C1806180757 devices. The printer's web-interface password hash can be retrieved without authentication, because the response header of any failed login attempt returns an incomplete authorization cookie. The value of the authorization cookie is the MD5 hash of the password in hexadecimal. An attacker can easily derive the true MD5 hash from this, and use offline cracking attacks to obtain administrative access to the device. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-07T20:17:13.000000Z"}, {"uuid": "03b8a055-9493-44f9-b659-4fee281d48fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-20459", "type": "seen", "source": "https://t.me/cvedetector/10119", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2019-20459 - Epson Expression Home XP255 SNMP Remote Code Execution and Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2019-20459 \nPublished : Nov. 7, 2024, 6:15 p.m. | 45\u00a0minutes ago \nDescription : An issue was discovered on Epson Expression Home XP255 20.08.FM10I8 devices. With the SNMPv1 public community, all values can be read, and with the epson community, all the changeable values can be written/updated, as demonstrated by permanently disabling the network card or changing the DNS servers. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-07T20:17:06.000000Z"}, {"uuid": "09319f50-1ef5-4868-a1af-f7b334aa1da7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-20458", "type": "seen", "source": "https://t.me/cvedetector/10117", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2019-20458 - Epson Expression Home XP255 Default Password Vulnerability ( Authentication Bypass)\", \n  \"Content\": \"CVE ID : CVE-2019-20458 \nPublished : Nov. 7, 2024, 6:15 p.m. | 45\u00a0minutes ago \nDescription : An issue was discovered on Epson Expression Home XP255 20.08.FM10I8 devices. By default, the device comes (and functions) without a password. The user is at no point prompted to set up a password on the device (leaving a number of devices without a password). In this case, anyone connecting to the web admin panel is capable of becoming admin without using any credentials. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-07T20:17:05.000000Z"}, {"uuid": "761b4eba-011f-4341-84fa-8f75c38dfe1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-20454", "type": "seen", "source": "https://t.me/VulnerabilityNews/15221", "content": "libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \\X or \\R has more than one fixed quantifier, a related issue to CVE-2019-20454.\nPublished at: June 15, 2020 at 07:15PM\nView on website", "creation_timestamp": "2020-06-15T20:46:03.000000Z"}, {"uuid": "795c10f0-33b1-4a56-bc89-90db51b241a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-20454", "type": "seen", "source": "https://t.me/cibsecurity/12748", "content": "ATENTION\u203c New - CVE-2019-20838\n\nlibpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \\X or \\R has more than one fixed quantifier, a related issue to CVE-2019-20454.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-06-15T20:55:15.000000Z"}]}