{"vulnerability": "CVE-2019-6225", "sightings": [{"uuid": "b7449aa5-e53c-417d-8342-528c725c608b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-6225", "type": "seen", "source": "MISP/5c49e6e0-a794-4c2f-afe2-4c8e0a021402", "content": "", "creation_timestamp": "2019-01-24T16:28:00.000000Z"}, {"uuid": "f0e7e4a7-c6de-45dd-a50a-fc05cdd56244", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-6225", "type": "seen", "source": "MISP/5c4f1a2e-1300-4391-87cf-19c50a021402", "content": "", "creation_timestamp": "2019-01-28T15:10:00.000000Z"}, {"uuid": "d91fe9c6-02ee-4dc4-a116-4d7b34199912", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-6225", "type": "seen", "source": "MISP/6d574aa3-3f1c-4275-acc4-bf5bc91f11b6", "content": "", "creation_timestamp": "2020-10-09T14:05:37.000000Z"}, {"uuid": "0eab753d-1f2f-4709-bf7d-ca97ebf348cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-6225", "type": "exploited", "source": "https://www.exploit-db.com/exploits/46248", "content": "", "creation_timestamp": "2019-01-25T00:00:00.000000Z"}, {"uuid": "0ad7af08-4a16-4818-959a-a4bfe2f0ae39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-6225", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:00:59.000000Z"}, {"uuid": "66c5f9bf-6fff-429e-9729-0afe50a05f91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-6225", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/168", "content": "#exploit\n1. PoC for CVE-2019-5736:\nhttps://github.com/Frichetten/CVE-2019-5736-PoC\n\n2. CVE-2019-6111:\nOpenSSH 7.9 - scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server/MiTM attacker can overwrite arbitrary files in the scp client target directory\nhttps://github.com/53n7hu/SNP\n\n3. CVE-2019-6225:\nvoucher_swap - Exploiting MIG reference counting in iOS 12\nhttps://googleprojectzero.blogspot.com/2019/01/voucherswap-exploiting-mig-reference.html\n\n4. Exploiting Malwarebytes Anti-Exploit\nhttps://acru3l.github.io/2019/02/02/exploiting-mb-anti-exploit", "creation_timestamp": "2024-10-08T14:36:45.000000Z"}]}