{"vulnerability": "CVE-2019-2501", "sightings": [{"uuid": "7fc0cf75-d2b6-41d3-badc-142d0085139b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-25019", "type": "seen", "source": "https://t.me/cibsecurity/23575", "content": "\u203c CVE-2019-25019 \u203c\n\nLimeSurvey before 4.0.0-RC4 allows SQL injection via the participant model.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-14T07:45:09.000000Z"}, {"uuid": "c538109b-b4ea-48c7-8f5a-087ac8d71700", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-25013", "type": "seen", "source": "https://t.me/reconshell/683", "content": "CVE-2019-25013\n\nThe iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.\n\nhttps://cve.reconshell.com/cve/CVE-2019-25013", "creation_timestamp": "2021-04-23T17:20:56.000000Z"}, {"uuid": "264f85e5-20c2-4ddd-9ba0-b1ab34e4e640", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-25012", "type": "seen", "source": "https://t.me/cibsecurity/21494", "content": "\u203c CVE-2019-25012 \u203c\n\nThe Webform Report project 7.x-1.x-dev for Drupal allows remote attackers to view submissions by visiting the /rss.xml page. NOTE: This project is not covered by Drupal's security advisory policy.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-01T07:32:35.000000Z"}, {"uuid": "4b8dc2da-9be3-4f2a-97f0-8997ae74a8b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-25015", "type": "seen", "source": "https://t.me/cibsecurity/22658", "content": "\u203c CVE-2019-25015 \u203c\n\nLuCI in OpenWrt 18.06.0 through 18.06.4 allows stored XSS via a crafted SSID.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-26T20:49:35.000000Z"}, {"uuid": "d45fb776-2b8c-4f8f-89ce-c53fd7b4855a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-25017", "type": "seen", "source": "https://t.me/cibsecurity/22961", "content": "\u203c CVE-2019-25017 \u203c\n\nAn issue was discovered in rcp in MIT krb5-appl through 1.0.3. Due to the rcp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the rcp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious rcp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the rcp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file). This issue is similar to CVE-2019-6111 and CVE-2019-7283. NOTE: MIT krb5-appl is not supported upstream but is shipped by a few Linux distributions. The affected code was removed from the supported MIT Kerberos 5 (aka krb5) product many years ago, at version 1.8.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-02T20:33:53.000000Z"}, {"uuid": "d0310f6c-9149-4234-86d1-d26385d85a82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-25018", "type": "seen", "source": "https://t.me/cibsecurity/22957", "content": "\u203c CVE-2019-25018 \u203c\n\nIn the rcp client in MIT krb5-appl through 1.0.3, malicious servers could bypass intended access restrictions via the filename of . or an empty filename, similar to CVE-2018-20685 and CVE-2019-7282. The impact is modifying the permissions of the target directory on the client side. NOTE: MIT krb5-appl is not supported upstream but is shipped by a few Linux distributions. The affected code was removed from the supported MIT Kerberos 5 (aka krb5) product many years ago, at version 1.8.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-02T20:33:49.000000Z"}, {"uuid": "e43a1122-6f2c-48bf-96ca-a3a2553c8556", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-25016", "type": "seen", "source": "https://t.me/cibsecurity/22803", "content": "\u203c CVE-2019-25016 \u203c\n\nThere is an unsafe incomplete reset of PATH in OpenDoas 6.6 through 6.8 when changing the user context.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-28T22:39:05.000000Z"}, {"uuid": "b2ae7173-74c8-4c3a-998d-ccf6f5fda0f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-25011", "type": "seen", "source": "https://t.me/cibsecurity/21481", "content": "\u203c CVE-2019-25011 \u203c\n\nNetBox through 2.6.2 allows an Authenticated User to conduct an XSS attack against an admin via a GFM-rendered field, as demonstrated by /dcim/sites/add/ comments.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-31T22:31:48.000000Z"}]}