{"vulnerability": "cve-2019-2000", "sightings": [{"uuid": "1fc62f7a-757e-457a-88d5-814abb691c6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-2000", "type": "exploited", "source": "https://www.exploit-db.com/exploits/46356", "content": "", "creation_timestamp": "2019-02-12T00:00:00.000000Z"}, {"uuid": "97109263-f91e-4980-8674-e083c33ac39e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-20004", "type": "seen", "source": "https://t.me/ctinow/211552", "content": "https://ift.tt/I60KZ2X\nCVE-2019-20004 | Intelbras IWR 3000N 1.8.7 IP Address password recovery", "creation_timestamp": "2024-03-19T14:46:36.000000Z"}, {"uuid": "d553fa65-9e62-40e2-993f-245d3d70af30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-20009", "type": "seen", "source": "https://t.me/ctinow/209906", "content": "https://ift.tt/4ZCtq2w\nCVE-2019-20009 | GNU LibreDWG up to 0.92 dwg.spec dwg_decode_SPLINE_private resource consumption (ID 176)", "creation_timestamp": "2024-03-17T13:16:43.000000Z"}, {"uuid": "efadfe21-38b9-426c-9a12-dfe78efbe6e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-20008", "type": "seen", "source": "https://t.me/ctinow/209905", "content": "https://ift.tt/08v53Be\nCVE-2019-20008 | Archery up to 1.2 Project Name Stored cross site scripting (ID 338)", "creation_timestamp": "2024-03-17T13:16:42.000000Z"}, {"uuid": "604770c2-9b61-44a2-84c9-4fe3c5bce6e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-20005", "type": "seen", "source": "https://t.me/ctinow/209898", "content": "https://ift.tt/2PlOQJs\nCVE-2019-20005 | ezXML 0.8.3/0.8.4/0.8.5/0.8.6 XML File strchr out-of-bounds", "creation_timestamp": "2024-03-17T12:46:25.000000Z"}, {"uuid": "44f5a86a-3811-4515-9cc0-3109bf0c6faf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-20000", "type": "seen", "source": "https://t.me/ctinow/209807", "content": "https://ift.tt/Rdujfr9\nCVE-2019-20000 | BullGuard Premium Protection 20.0.371.8 Symlink toctou", "creation_timestamp": "2024-03-17T09:16:58.000000Z"}, {"uuid": "079f2983-a8ad-4372-aaad-f3988c2a18a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-20007", "type": "seen", "source": "https://t.me/ctinow/209900", "content": "https://ift.tt/Kdw0PkU\nCVE-2019-20007 | ezXML 0.8.3/0.8.4/0.8.5/0.8.6 ezxml.c ezxml_parse_str XML File null pointer dereference", "creation_timestamp": "2024-03-17T12:46:28.000000Z"}, {"uuid": "cfe57e4f-a0a3-4cc6-a5c8-0527effe062c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-20006", "type": "seen", "source": "https://t.me/ctinow/209899", "content": "https://ift.tt/p5s0cFt\nCVE-2019-20006 | ezXML 0.8.3/0.8.4/0.8.5/0.8.6 ezxml_char_content use after free", "creation_timestamp": "2024-03-17T12:46:26.000000Z"}, {"uuid": "8404afcc-3876-415b-9fa1-35cf116ded9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-20001", "type": "seen", "source": "https://t.me/cibsecurity/13858", "content": "ATENTION\u203c New - CVE-2019-20001\n\nAn issue was discovered in RICOH Streamline NX Client Tool and RICOH Streamline NX PC Client that allows attackers to escalate local privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-08-04T16:55:27.000000Z"}]}