{"vulnerability": "CVE-2019-1936", "sightings": [{"uuid": "22590841-6f66-4492-8b6d-b984dbeb2812", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-19368", "type": "seen", "source": "https://t.me/arpsyndicate/2781", "content": "#ExploitObserverAlert\n\nCVE-2019-19368\n\nDESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2019-19368. A Reflected Cross Site Scripting was discovered in the Login page of Rumpus FTP Web File Manager 8.2.9.1. An attacker can exploit it by sending a crafted link to end users and can execute arbitrary Javascripts\n\nFIRST-EPSS: 0.006240000\nNVD-IS: 2.7\nNVD-ES: 2.8", "creation_timestamp": "2024-01-15T12:05:34.000000Z"}, {"uuid": "72eb2cb1-aa7d-4d29-8694-bbc5b45d555c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-19364", "type": "seen", "source": "https://t.me/ctinow/202388", "content": "https://ift.tt/C9tvrsW\nCVE-2019-19364 | Sony Catalyst Production Suite/Catalyst Browse up to 1.1.0.21 DLL Loader untrusted search path", "creation_timestamp": "2024-03-07T13:41:35.000000Z"}, {"uuid": "781f46ce-2453-4a28-abde-22dc0b03552c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-19363", "type": "exploited", "source": "https://www.exploit-db.com/exploits/48036", "content": "", "creation_timestamp": "2020-02-10T00:00:00.000000Z"}, {"uuid": "7d73d45c-86b9-4ac4-8e5e-f2597aff1e43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-19363", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:44.000000Z"}, {"uuid": "8be5304e-bfd4-42fb-b7da-183a83b42d4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1936", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/cisco_ucs_rce.rb", "content": "", "creation_timestamp": "2019-09-02T15:56:25.000000Z"}, {"uuid": "bd5efa72-fc91-4a9f-8495-d924abf978a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-19366", "type": "seen", "source": "https://t.me/ctinow/199980", "content": "https://ift.tt/PMmk0pA\nCVE-2019-19366 | FusionPBX 4.4.1 xml_cdr_search.php redirect cross site scripting", "creation_timestamp": "2024-03-05T07:38:10.000000Z"}, {"uuid": "25d01b59-39a7-409a-a38f-d07d99dad569", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-19362", "type": "seen", "source": "https://t.me/ctinow/200146", "content": "https://ift.tt/XKjTf4n\nCVE-2019-19362 | TeamViewer Desktop Application 14.3.4730 on Windows Chat information disclosure", "creation_timestamp": "2024-03-05T12:13:01.000000Z"}, {"uuid": "e9b44b3d-125a-4464-9fcd-8301ad9fcab1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-19367", "type": "seen", "source": "https://t.me/ctinow/199981", "content": "https://ift.tt/T2axGt4\nCVE-2019-19367 | FusionPBX 4.4.1 app/fax/fax_files.php id cross site scripting", "creation_timestamp": "2024-03-05T07:38:11.000000Z"}, {"uuid": "2f354b58-7abf-41f7-ab43-f533845a071c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-19368", "type": "seen", "source": "https://t.me/ctinow/205705", "content": "https://ift.tt/5JGb7RV\nCVE-2019-19368 | Rumpus FTP Web File Manager 8.2.9.1 Login Page Reflected cross site scripting (ID 155719)", "creation_timestamp": "2024-03-12T14:41:35.000000Z"}, {"uuid": "753e697a-80ef-4511-9d11-5e8a836c42b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1936", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:44.000000Z"}, {"uuid": "71aad276-dab3-4101-bed4-e18540c91a1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-19363", "type": "seen", "source": "https://t.me/canyoupwnme/6272", "content": "Local Privilege Escalation in many Ricoh Printer Drivers for Windows (CVE-2019-19363)\nhttps://www.pentagrid.ch/en/blog/local-privilege-escalation-in-ricoh-printer-drivers-for-windows-cve-2019-19363/", "creation_timestamp": "2020-01-24T09:04:52.000000Z"}, {"uuid": "c9b0a1f2-68b9-4697-81c6-f08c295bfcd2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1936", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:14.000000Z"}, {"uuid": "c18e2e8f-8567-4da7-beae-916ae08edd7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-19363", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:14.000000Z"}, {"uuid": "5878c366-5b20-4063-a6ed-db1ddf818607", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-19363", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/ricoh_driver_privesc.rb", "content": "", "creation_timestamp": "2020-02-06T21:30:19.000000Z"}]}