{"vulnerability": "cve-2019-1019", "sightings": [{"uuid": "4e6f3dee-e13d-4709-bf85-4675d5a3dcfb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1019", "type": "exploited", "source": "https://www.exploit-db.com/exploits/47115", "content": "", "creation_timestamp": "2019-07-12T00:00:00.000000Z"}, {"uuid": "730be9c1-8fb6-4842-b1ba-b50abf56cc93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1019", "type": "published-proof-of-concept", "source": "https://t.me/YouPentest/5565", "content": "\u0421\u0435\u0442\u0435\u0432\u044b\u0435 \u0430\u0442\u0430\u043a\u0438. \u0421\u043f\u0443\u0444\u0444\u0438\u043d\u0433. MITM. Relay.\n\n02:24 \u0421\u043f\u0438\u0441\u043e\u043a \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u043e\u0432\n02:59 LLMNR \u0438 NetBIOS (NBT-NS)\n08:41 ARP\n13:37 DHCP\n17:36 IPv6\n32:56 WPAD, MS16-077\n36:49 NetNTLM authentication. Pass-the-Hash\n43:14 NTLM relay attack\n52:31 ntlmrelayx.py\n52:46 Relay to SMB\n01:07:00 Tsocks \u0432\u043c\u0435\u0441\u0442\u043e proxychains\n01:14:00 Relay to HTTP, CVE-2019-1019\n01:21:00 LDAP \u0438 resource-based constrained delegation\n01:32:10 DCSync\n01:41:47 ldapdomaindump\n01:43:40 \u041f\u0440\u043e\u0447\u0438\u0435 \u0444\u043b\u0430\u0433\u0438\n01:54:32 Responder\n\n(01:35:56 Resource-based constrained delegation \u0438 printer bug)\n\nhttps://www.youtube.com/watch?v=JdeE4TQ3OsM\n\n#video #infosec #cybersecurity #pentesting", "creation_timestamp": "2024-02-26T16:38:09.000000Z"}, {"uuid": "3dcf4c34-711e-40f7-8d97-7823fd7b842b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1019", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lppir3o4kx2n", "content": "", "creation_timestamp": "2025-05-21T21:02:19.480723Z"}, {"uuid": "7e822917-1fc8-47ab-9760-464d28485521", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-10196", "type": "seen", "source": "https://t.me/cibsecurity/25205", "content": "\u203c CVE-2019-10196 \u203c\n\nA flaw was found in http-proxy-agent, prior to version 2.1.0. It was discovered http-proxy-agent passes an auth option to the Buffer constructor without proper sanitization. This could result in a Denial of Service through the usage of all available CPU resources and data exposure through an uninitialized memory leak in setups where an attacker could submit typed input to the auth parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-19T23:33:40.000000Z"}, {"uuid": "0d63a9fd-96ca-435d-936a-d8bff420283c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-10195", "type": "seen", "source": "https://t.me/ctinow/195605", "content": "https://ift.tt/bqKwOWX\nCVE-2019-10195 | Ipa up to 4.6.6/4.7.3/4.8.2 Batch Processing Password information disclosure (RHSA-2020:0378)", "creation_timestamp": "2024-02-28T16:11:42.000000Z"}, {"uuid": "c7aab46d-e09e-4e4a-be3c-2b90b32b3dd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1019", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/797", "content": "#tools\n#Blue_Team_Techniques\nNTLM Scanner \u2060- tool to check servers/hosts for various known NTLM vulnerabilities over SMB:   CVE-2019-1019, CVE-2019-1040, CVE-2019-1166, CVE-2019-1338...\nhttps://github.com/preempt/ntlm-scanner", "creation_timestamp": "2024-10-10T02:52:34.000000Z"}]}