{"vulnerability": "CVE-2018-19953", "sightings": [{"uuid": "3c7ed23c-93b6-464d-a337-627a00b5e275", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-19953", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/33d11f8c-d2fc-4463-8571-d590f55ce540", "content": "", "creation_timestamp": "2026-02-02T12:27:39.128278Z"}, {"uuid": "524d9279-6f21-4a6b-8be6-2149caf2bc5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-19953", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971586", "content": "", "creation_timestamp": "2024-12-24T20:31:30.043964Z"}, {"uuid": "ae691989-3a6b-40fb-9b09-bfff68cbe102", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-19953", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:19.000000Z"}, {"uuid": "2abd43cd-ebcf-41b5-9835-185b0919673a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-19953", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/33d11f8c-d2fc-4463-8571-d590f55ce540", "content": "", "creation_timestamp": "2026-02-02T12:27:39.128278Z"}, {"uuid": "689045c0-c43e-4fab-929c-cc2cf0b5120b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-19953", "type": "seen", "source": "https://t.me/arpsyndicate/1027", "content": "#ExploitObserverAlert\n\nCVE-2018-19953\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2018-19953. If exploited, this cross-site scripting vulnerability could allow remote attackers to inject malicious code. QNAP has already fixed the issue in the following QTS versions. QTS 4.4.2.1231 on build 20200302; QTS 4.4.1.1201 on build 20200130; QTS 4.3.6.1218 on build 20200214; QTS 4.3.4.1190 on build 20200107; QTS 4.3.3.1161 on build 20200109; QTS 4.2.6 on build 20200109.\n\nFIRST-EPSS: 0.003790000\nNVD-IS: 2.7\nNVD-ES: 2.8", "creation_timestamp": "2023-12-03T20:58:35.000000Z"}, {"uuid": "7d86970a-92a0-406e-be09-fe5bf7736812", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-19953", "type": "exploited", "source": "https://t.me/SecLabNews/7783", "content": "\u041e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u044b \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u043e\u0433\u043e \u041f\u041e eCh0raix \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u043e\u0432\u0430\u043b\u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0443\u044e \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u044e, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u0443\u044e \u043d\u0430 \u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u0445\u0440\u0430\u043d\u0438\u043b\u0438\u0449\u0430 (NAS) QNAP. \u0412\u0440\u0435\u0434\u043e\u043d\u043e\u0441 \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u0443\u0435\u0442 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u043f\u0443\u0442\u0435\u043c \u0431\u0440\u0443\u0442\u0444\u043e\u0440\u0441\u0430 \u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u0445\u0440\u0430\u043d\u0438\u043b\u0438\u0449\u0430\u0445 (CVE-2018-19943, CVE-2018-19949 \u0438 CVE-2018-19953), \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u0432\u043d\u0435\u0434\u0440\u0438\u0442\u044c \u0438\u043b\u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043a\u043e\u0434.    \n\u041e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u044b \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044f eCh0raix \u0430\u0442\u0430\u043a\u043e\u0432\u0430\u043b\u0438 \u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u0445\u0440\u0430\u043d\u0438\u043b\u0438\u0449\u0430 QNAP", "creation_timestamp": "2020-06-08T08:30:02.000000Z"}, {"uuid": "2bb59498-29b9-4c34-a696-007d78b22c2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-19953", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:03.000000Z"}]}