{"vulnerability": "CVE-2019-2507", "sightings": [{"uuid": "e71b10f5-6ec6-48d3-8b08-9db3cd9af315", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-25076", "type": "seen", "source": "https://gist.github.com/oilbeater/39496a6123f3db4bab290adc9417ae01", "content": "", "creation_timestamp": "2025-11-03T06:19:06.000000Z"}, {"uuid": "6b0672e6-fe4b-4cd9-b9af-ce006aeee050", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-2507", "type": "published-proof-of-concept", "source": "https://t.me/BABATATASASA/5991", "content": "PRION:CVE-2019-2510     4.0     https://vulners.com/prion/PRION:CVE-2019-2510               |       PRION:CVE-2019-2507     4.0     https://vulners.com/prion/PRION:CVE-2019-2507               |       PRION:CVE-2019-2502     4.0     https://vulners.com/prion/PRION:CVE-2019-2502               |       PRION:CVE-2019-2495     4.0     https://vulners.com/prion/PRION:CVE-2019-2495               |       PRION:CVE-2019-2494     4.0     https://vulners.com/prion/PRION:CVE-2019-2494               |       PRION:CVE-2019-2486     4.0     https://vulners.com/prion/PRION:CVE-2019-2486               |       PRION:CVE-2019-2482     4.0     https://vulners.com/prion/PRION:CVE-2019-2482               |       PRION:CVE-2019-2481     4.0     https://vulners.com/prion/PRION:CVE-2019-2481               |       PRION:CVE-2019-2455     4.0     https://vulners.com/prion/PRION:CVE-2019-2455               |       PRION:CVE-2019-2434     4.0     https://vulners.com/prion/PRION:CVE-2019-2434               |       PRION:CVE-2019-2420     4.0     https://vulners.com/prion/PRION:CVE-2019-2420               |       PRION:CVE-2018-3286     4.0     https://vulners.com/prion/PRION:CVE-2018-3286               |       PRION:CVE-2018-3285     4.0     https://vulners.com/prion/PRION:CVE-2018-3285               |       PRION:CVE-2018-3282     4.0     https://vulners.com/prion/PRION:CVE-2018-3282               |       PRION:CVE-2018-3280     4.0     https://vulners.com/prion/PRION:CVE-2018-3280               |       PRION:CVE-2018-3279     4.0     https://vulners.com/prion/PRION:CVE-2018-3279               |       PRION:CVE-2018-3278     4.0     https://vulners.com/prion/PRION:CVE-2018-3278\n|       PRION:CVE-2018-3277     4.0     https://vulners.com/prion/PRION:CVE-2018-3277               |       PRION:CVE-2018-3276     4.0     https://vulners.com/prion/PRION:CVE-2018-3276               |       PRION:CVE-2018-3251     4.0     https://vulners.com/prion/PRION:CVE-2018-3251\n|       PRION:CVE-2018-3212     4.0     https://vulners.com/prion/PRION:CVE-2018-3212               |       PRION:CVE-2018-3203     4.0     https://vulners.com/prion/PRION:CVE-2018-3203               |       PRION:CVE-2018-3200     4.0     https://vulners.com/prion/PRION:CVE-2018-3200               |       PRION:CVE-2018-3186     4.0     https://vulners.com/prion/PRION:CVE-2018-3186               |       PRION:CVE-2018-3182     4.0     https://vulners.com/prion/PRION:CVE-2018-3182               |       PRION:CVE-2018-3173     4.0     https://vulners.com/prion/PRION:CVE-2018-3173\n|       PRION:CVE-2018-3170     4.0     https://vulners.com/prion/PRION:CVE-2018-3170\n|       PRION:CVE-2018-3162     4.0     https://vulners.com/prion/PRION:CVE-2018-3162\n|       PRION:CVE-2018-3161     4.0     https://vulners.com/prion/PRION:CVE-2018-3161               |       PRION:CVE-2018-3156     4.0     https://vulners.com/prion/PRION:CVE-2018-3156               |       PRION:CVE-2018-3155     4.0     https://vulners.com/prion/PRION:CVE-2018-3155               |       PRION:CVE-2018-3145     4.0     https://vulners.com/prion/PRION:CVE-2018-3145               |       PRION:CVE-2018-3143     4.0     https://vulners.com/prion/PRION:CVE-2018-3143               |       PRION:CVE-2018-3137     4.0     https://vulners.com/prion/PRION:CVE-2018-3137               |       PRION:CVE-2018-3133     4.0     https://vulners.com/prion/PRION:CVE-2018-3133               |       PRION:CVE-2018-3082     4.0     https://vulners.com/prion/PRION:CVE-2018-3082               |       PRION:CVE-2018-3080     4.0     https://vulners.com/prion/PRION:CVE-2018-3080\n|       PRION:CVE-2018-3079     4.0     https://vulners.com/prion/PRION:CVE-2018-3079               |       PRION:CVE-2018-3078     4.0     https://vulners.com/prion/PRION:CVE-2018-3078               |       PRION:CVE-2018-3077     4.0     https://vulners.com/prion/PRION:CVE-2018-3077               |       PRION:CVE-2018-3075     4.0     https://vulners.com/prion/PRION:CVE-2018-3075               |       PRION:CVE-2018-3073     4.0     https://vulners.com/prion/PRION:CVE-2018-3073", "creation_timestamp": "2023-11-15T16:53:23.000000Z"}, {"uuid": "175cd59e-cfd0-4422-b74d-490c1824a9e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-25072", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11449", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2019-25072\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Due to support of Gzip compression in request bodies, as well as a lack of limiting response body sizes, a malicious server can cause a client to consume a significant amount of system resources, which may be used as a denial of service vector.\n\ud83d\udccf Published: 2022-12-27T21:13:24.222Z\n\ud83d\udccf Modified: 2025-04-11T16:40:25.817Z\n\ud83d\udd17 References:\n1. https://github.com/tendermint/tendermint/pull/3430\n2. https://github.com/tendermint/tendermint/commit/03085c2da23b179c4a51f59a03cb40aa4e85a613\n3. https://pkg.go.dev/vuln/GO-2020-0037", "creation_timestamp": "2025-04-11T16:50:56.000000Z"}, {"uuid": "691071c6-cbf8-46ad-a29f-9b90f1f0cbb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-25072", "type": "seen", "source": "https://t.me/cibsecurity/55455", "content": "\u203c CVE-2019-25072 \u203c\n\nDue to support of Gzip compression in request bodies, as well as a lack of limiting response body sizes, a malicious server can cause a client to consume a significant amount of system resources, which may be used as a denial of service vector.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-28T00:12:07.000000Z"}, {"uuid": "74dac7a3-ee5a-497d-a934-e6c8b294073c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-25078", "type": "seen", "source": "https://t.me/cibsecurity/54447", "content": "\u203c CVE-2019-25078 \u203c\n\nA vulnerability classified as problematic was found in pacparser up to 1.3.x. Affected by this vulnerability is the function pacparser_find_proxy of the file src/pacparser.c. The manipulation of the argument url leads to buffer overflow. Attacking locally is a requirement. Upgrading to version 1.4.0 is able to address this issue. The name of the patch is 853e8f45607cb07b877ffd270c63dbcdd5201ad9. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-215443.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-13T20:21:52.000000Z"}, {"uuid": "23e4d687-6def-4e1e-8f61-604082468cf7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-25075", "type": "seen", "source": "https://t.me/cibsecurity/48564", "content": "\u203c CVE-2019-25075 \u203c\n\nHTML injection combined with path traversal in the Email service in Gravitee API Management before 1.25.3 allows anonymous users to read arbitrary files via a /management/users/register request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-23T07:21:04.000000Z"}]}