{"vulnerability": "CVE-2019-6693", "sightings": [{"uuid": "b2946c4e-c42d-412a-a795-422cf86ebc1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-6693", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lsjzkcttxo26", "content": "", "creation_timestamp": "2025-06-26T21:02:24.128203Z"}, {"uuid": "cd51aca9-4c22-465f-ad41-ab6c3e6f6625", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-6693", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3lsjfvlidms2g", "content": "", "creation_timestamp": "2025-06-26T15:10:48.426343Z"}, {"uuid": "5d6987ce-166d-4da7-b4d1-8f6142037149", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-6693", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3lskbwyrqys2j", "content": "", "creation_timestamp": "2025-06-26T23:32:36.949851Z"}, {"uuid": "4e405e28-7c5f-4f2e-bc01-5e43817ed61e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-6693", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lsh62yowky2p", "content": "", "creation_timestamp": "2025-06-25T17:45:15.823273Z"}, {"uuid": "7c556db2-cf4d-4038-825d-11a4be32eef4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-6693", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/4289350", "content": "", "creation_timestamp": "2025-06-25T17:24:14.930297Z"}, {"uuid": "a6dd2f5c-061d-4c60-aa51-8aa0695a560c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-6693", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3lshfuhub222e", "content": "", "creation_timestamp": "2025-06-25T20:04:47.657337Z"}, {"uuid": "52de13f3-1b99-42a1-8fce-3339890345de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-6693", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lsrka2wx7c2c", "content": "", "creation_timestamp": "2025-06-29T20:49:29.369085Z"}, {"uuid": "79366feb-6ac3-43be-a44f-f4338d51cc39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-6693", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lss4ycd7ki26", "content": "", "creation_timestamp": "2025-06-30T02:25:09.210753Z"}, {"uuid": "54d8b06b-3f13-44fa-becb-def9fd9bd4f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-6693", "type": "seen", "source": "MISP/e0a0042d-e47b-4875-b781-99d4428af3c2", "content": "", "creation_timestamp": "2025-09-09T20:51:37.000000Z"}, {"uuid": "e97352aa-90d4-4e0c-925a-8a95d9b6f8ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-6693", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-09-28T08:23:30.000000Z"}, {"uuid": "e9d2c186-61c2-417f-a16d-fe84ba6a2c7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-6693", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-09-29T03:12:13.000000Z"}, {"uuid": "6b33e434-4b09-4f1f-9f72-1ff6a2048161", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-6693", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19307", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2019-6693\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Use of a hard-coded cryptographic key to cipher sensitive data in FortiOS configuration backup file may allow an attacker with access to the backup file to decipher the sensitive data, via knowledge of the hard-coded key. The aforementioned sensitive data includes users' passwords (except the administrator's password), private keys' passphrases and High Availability password (when set).\n\ud83d\udccf Published: 2019-11-21T15:08:05.000Z\n\ud83d\udccf Modified: 2025-06-24T03:55:37.681Z\n\ud83d\udd17 References:\n1. https://fortiguard.com/advisory/FG-IR-19-007", "creation_timestamp": "2025-06-24T04:48:47.000000Z"}, {"uuid": "db8dac45-2453-48f8-95d1-d33fab2f8745", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2019-6693", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/723f03e2-76cf-4b15-ae1e-5360603acedb", "content": "", "creation_timestamp": "2026-02-02T12:25:58.357768Z"}, {"uuid": "0ca6d478-faac-468d-afb1-b37b020f76da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-6693", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3103", "content": "Tools \ud83d\udd27 \ud83d\udd28 \ud83d\udd27  - Hackers Factory \n\n\u200b\u200bNosey Parker\n\nA command-line program that finds secrets and sensitive information in textual data and Git history.\n\nhttps://github.com/praetorian-inc/noseyparker\n\n#infosec #pentesting #bugbounty\n\n\u200b\u200b\ud83d\udee1 eBPFShield\n\nA high-performance security tool that utilizes eBPF and Python to provide real-time IP-Intelligence and DNS monitoring. \n\nhttps://github.com/sagarbhure/eBPFShield\n\n#cybersecurity #infosec\n\n\u200b\u200bNetSoc #OSINT\n\nTool focused on extracting information from an account in various Social Networks.\n\nhttps://github.com/XDeadHackerX/NetSoc_OSINT\n\n#cybersecurity #infosec\n\n\u200b\u200bcloudtoolkit\n\nCloud Penetration Testing Toolkit\n\nhttps://github.com/404tk/cloudtoolkit\n\n#cybersecurity #infosec #pentesting\n\n\u200b\u200bTomcatBackdoorPoC\n\nTomcat backdoor based on CS blog.\n\nhttps://github.com/HackingLZ/TomcatBackdoorPoC\n\nDetails:\nhttps://bit.ly/437Myhb\n\n#infosec #pentesting #redteam\n\n\u200b\u200bNoMoreCookies\n\nBrowser Protector against various stealers, written in C# &amp; C/C++. Works by hooking NtCreateFile and prevent accessing browser files, in addition to prevent it's unhooking. compatible with various games and software.\n\nhttps://github.com/AdvDebug/NoMoreCookies\n\n#cybersecurity #infosec\n\n\u200b\u200bCVE-2023-28252\n\nUnderstanding the cve-2022-37969 windows common log file system driver local privilege escalation.\n\nhttps://github.com/fortra/CVE-2023-28252\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bCVE-2023-2982\n\nWordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) &lt;= 7.6.4 - Authentication Bypass.\n\nhttps://github.com/RandomRobbieBF/CVE-2023-2982\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bCVE-2023-3338\n\nPracticing different Linux kernel exploitation techniques with my DECnet vulnerability and null page mapping enabled.\n\nhttps://github.com/TurtleARM/CVE-2023-3338\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bCVE-2020-9289\n\nDecrypt reversible secrets encrypted using the default hardcoded key related to CVE-2020-9289 on FortiAnalyzer/FortiManager (the only difference with CVE-2019-6693 is the encryption routine).\n\nhttps://github.com/synacktiv/CVE-2020-9289\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bPDFator\n\nInfoSec project that consists of a Python script and a C application to generate an executable payload. The payload includes functionality to write and execute a PDF file and execute shellcode. Both the PDF file and shellcode are encrypted using XOR and decrypted at runtime.\n\nhttps://github.com/smokeme/PDFator\n\n#cybersecurity #infosec\n\n\u200b\u200bUscrapper \n\n#OSINT tool that allows users to extract various personal information from a website. It leverages web scraping techniques and regular expressions to extract email addresses, social media links, author names, geolocations, phone numbers, and usernames from both hyperlinked and non-hyperlinked sources on the webpage.\n\nhttps://github.com/z0m31en7/Uscrapper\n\n#cybersecurity #infosec\n\n\u200b\u200bGold Digger\n\nA simple tool used to help quickly discover sensitive information in files recursively. Originally written to assist in rapidly searching files obtained during a penetration test.\n\nhttps://github.com/ustayready/golddigger\n\n#infosec #pentesting #bugbounty\n\n\u200b\u200bLinux-Exploit-Detection\n\nLinux-based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Rego/Sigma.\n\nhttps://github.com/Loginsoft-Research/Linux-Exploit-Detection\n\n#cybersecurity #infosec\n\n\u200b\u200bdynmx \n\nSignature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces.\n\nhttps://github.com/0x534a/dynmx\n\n#cybersecurity #infosec\n\n\u200b\u200bjsluice\n\nExtract URLs, paths, secrets, and other interesting bits from JavaScript.\n\nhttps://github.com/BishopFox/jsluice\n\n#infosec #pentesting #bugbounty\n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-07-06T11:08:24.000000Z"}, {"uuid": "66452a36-4eb1-4dac-9255-1117243a5e47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-6693", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/827", "content": "Decrypt FortiManager configuration secrets ( CVE-2020-9289 &amp; CVE-2019-6693 )\nRepo : https://github.com/synacktiv/CVE-2020-9289", "creation_timestamp": "2023-08-16T06:30:09.000000Z"}, {"uuid": "10643a57-e045-4084-931b-f23c9b424a59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-6693", "type": "published-proof-of-concept", "source": "Telegram/FQgTqgAsC1BzgFQ3QhqXo3ZwrqpxzvjIHl33wB4sG5coLAQ", "content": "", "creation_timestamp": "2023-07-15T04:02:00.000000Z"}]}