{"vulnerability": "CVE-2019-8761", "sightings": [{"uuid": "e34408cf-561b-4b82-9a04-e75a17e350d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-8761", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/3057", "content": "#Analytics\n10 most exploited vulnerabilities of the week (March 29 - April 4)\nCVE-2021-26855 - ProxyLogon MS Exchange Server RCE\nhttps://t.me/cybersecuritytechnologies/2835\nCVE-2021-3449/3450 - OpenSSL DoS/certificate validation\nhttps://t.me/cybersecuritytechnologies/2993\nhttps://thehackernews.com/2021/03/openssl-releases-patches-for-2-high.html\nCVE-2021-21975/CVE-2021-21983 - SSRF in VMWare vRealize Operations Manager API\nhttps://t.me/cybersecuritytechnologies/3039\nCVE-2019-8761 - macOS bug that lets attackers execute HTML within a TXT file\nhttps://www.paulosyibelo.com/2021/04/this-man-thought-opening-txt-file-is.html\nCVE-2021-26411 - IE mshtml UAF\nhttps://t.me/cybersecuritytechnologies/2908\nCVE-2021-28918 - SSRF in Netmask package\nhttps://t.me/cybersecuritytechnologies/3014\nCVE-2020-25078 - D-Link psw disclosure\nhttps://t.me/cybersecuritytechnologies/3055\nCVE-2021-1656 - Windows tpm.sys Device Driver Information Disclosure\nhttps://t.me/cybersecuritytechnologies/3028", "creation_timestamp": "2022-06-01T02:32:51.000000Z"}, {"uuid": "f0f07997-70cd-43c3-8751-a14bab4f88e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-8761", "type": "published-proof-of-concept", "source": "https://t.me/alexmakus/4003", "content": "\u041a\u0430\u0437\u0430\u043b\u043e\u0441\u044c \u0431\u044b, \u043d\u0443 txt \u0444\u0430\u0439\u043b\u044b \u0442\u043e \u0434\u043e\u043b\u0436\u043d\u044b \u0431\u044b\u0442\u044c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u043c\u0438? \u0414\u0430\u0436\u0435 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b \u043f\u043e \u0438\u0445 \u043f\u043e\u0432\u043e\u0434\u0443 \u043d\u0435 \u043d\u0430\u043f\u0440\u044f\u0433\u0430\u044e\u0442\u0441\u044f. \u0410 \u043d\u0435\u0442, CVE-2019-8761 \u0432 macOS \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u043b\u0430 \u0438\u0441\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0432\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u044b\u0439 \u0432 txt \u0444\u0430\u0439\u043b html-\u043a\u043e\u0434 \u0438 \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u043c \u0444\u0430\u0439\u043b\u0430\u043c \u0438 \u043f\u0440\u043e\u0441\u043c\u0430\u0442\u0440\u0438\u0432\u0430\u0442\u044c \u0438\u0445, \u043a\u0440\u0435\u0448\u043d\u0443\u0442\u044c \u041c\u0430\u043a \u0438\u043b\u0438 \u0443\u0437\u043d\u0430\u0442\u044c IP-\u0430\u0434\u0440\u0435\u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u0432 2020 \u0433\u043e\u0434\u0443.\n\nhttps://www.paulosyibelo.com/2021/04/this-man-thought-opening-txt-file-is.html", "creation_timestamp": "2021-04-03T11:15:29.000000Z"}, {"uuid": "da57fcc9-8493-4c6b-bead-c1147ca7f4ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-8761", "type": "seen", "source": "https://t.me/ctinow/176832", "content": "https://ift.tt/jleDav1\nCVE-2019-8761 | Apple macOS up to 10.15.0 UIFoundation information disclosure (HT210722)", "creation_timestamp": "2024-01-31T15:41:37.000000Z"}, {"uuid": "d64065fe-0286-40bb-b94a-4cc0fbeafaa9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-8761", "type": "seen", "source": "https://t.me/tarnkappe/3389", "content": "\u200b\u200b\u200b\u200b\u200bCVE-2019-8761: macOS gehackt mittels verfremdeter Textdatei\n#Hacking #Cure53 #CVE20198761 #HTTPLeaks #macOSCatalina #PaulosYibelo #Textedit\n\nDer Programmierer Paulos Yibelo beschreibt auf seinem privaten Blog wie es ihm gelang, macOS mittels des Bugs CVE-2019-8761 und einer pr\u00e4parierten Textdatei zu infizieren\u2024\u2024\u2024\u2024", "creation_timestamp": "2021-04-04T07:02:44.000000Z"}, {"uuid": "f9478083-f586-41d5-a9b9-4000135ea797", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-8761", "type": "seen", "source": "https://t.me/cibsecurity/15630", "content": "\u203c CVE-2019-8761 \u203c\n\nThis issue was addressed with improved checks. This issue is fixed in macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, macOS Catalina 10.15. Parsing a maliciously crafted text file may lead to disclosure of user information.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-10-27T23:30:42.000000Z"}]}