{"vulnerability": "CVE-2019-20469", "sightings": [{"uuid": "58e24c00-08ee-4029-88c3-23946208cc14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-20469", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113443600687965969", "content": "", "creation_timestamp": "2024-11-07T20:39:33.809692Z"}, {"uuid": "1c3ba3db-7508-4691-8ef7-d8ae524434f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-20469", "type": "seen", "source": "https://t.me/cvedetector/10134", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2019-20469 - One2Track Physical Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2019-20469 \nPublished : Nov. 7, 2024, 9:15 p.m. | 22\u00a0minutes ago \nDescription : An issue was discovered on One2Track 2019-12-08 devices. Confidential information is needlessly stored on the smartwatch. Audio files are stored in .amr format, in the audior directory. An attacker who has physical access can retrieve all audio files by connecting via a USB cable. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-07T22:47:44.000000Z"}]}