{"vulnerability": "CVE-2019-1485", "sightings": [{"uuid": "8b960cf4-4cdd-477b-a1a7-02f5f4249cff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-14854", "type": "seen", "source": "https://t.me/ctinow/211921", "content": "https://ift.tt/IJs9OYz\nCVE-2019-14854 | Openshift Container Platform 4 Static Pod Log neutralization for logs (RHSA-2019:4075)", "creation_timestamp": "2024-03-19T20:46:59.000000Z"}, {"uuid": "ff930e11-65bd-4908-a524-74ba7f47e4d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-14853", "type": "seen", "source": "https://t.me/ctinow/195349", "content": "https://ift.tt/QkVI2LX\nCVE-2019-14853 | python-ecdsa Signature Decoding DER Signature error condition", "creation_timestamp": "2024-02-28T11:41:59.000000Z"}, {"uuid": "8470852c-fc10-4306-aacb-b7ec512c8982", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1485", "type": "seen", "source": "https://t.me/ctinow/203937", "content": "https://ift.tt/x6G5RH0\nCVE-2019-1485 | Microsoft Internet Explorer 9/10/11 VBScript memory corruption", "creation_timestamp": "2024-03-09T14:16:48.000000Z"}, {"uuid": "15d8638d-3f88-43b4-9368-5b7abcfe806b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-14857", "type": "seen", "source": "https://t.me/ctinow/195252", "content": "https://ift.tt/PZbJRr5\nCVE-2019-14857 | mod_auth_openidc up to 2.4.0.0 redirect", "creation_timestamp": "2024-02-28T10:11:32.000000Z"}, {"uuid": "13698562-cb6a-49dc-ba75-4b9fa4a84371", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-14850", "type": "seen", "source": "https://t.me/cibsecurity/25136", "content": "\u203c CVE-2019-14850 \u203c\n\nA denial of service vulnerability was discovered in nbdkit 1.12.7, 1.14.1 and 1.15.1. An attacker could connect to the nbdkit service and cause it to perform a large amount of work in initializing backend plugins, by simply opening a connection to the service. This vulnerability could cause resource consumption and degradation of service in nbdkit, depending on the plugins configured on the server-side.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-18T21:32:22.000000Z"}, {"uuid": "cc19c8f2-a9d4-4cd2-bda0-e3bf880f73df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-14859", "type": "seen", "source": "https://t.me/ctinow/211270", "content": "https://ift.tt/y8Ck3Wf\nCVE-2019-14859 | python-ecdsa up to 0.13.2 DER Encoding signature verification (Bug 114)", "creation_timestamp": "2024-03-19T09:07:04.000000Z"}, {"uuid": "dcf0cbc3-750c-4fb8-9bf8-5143dd11847c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-14852", "type": "seen", "source": "https://t.me/cibsecurity/25152", "content": "\u203c CVE-2019-14852 \u203c\n\nA flaw was found in 3scale\u00e2\u20ac\u2122s APIcast gateway that enabled the TLS 1.0 protocol. An attacker could target traffic using this weaker protocol and break its encryption, gaining access to unauthorized information. Version shipped in Red Hat 3scale API Management Platform is vulnerable to this issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-18T23:37:32.000000Z"}]}