{"vulnerability": "cve-2019-1935", "sightings": [{"uuid": "f874ac4f-6f81-4d2d-b622-05de3675ef08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-19356", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/f590bb0b-4d72-4156-a05f-1fbd6092f927", "content": "", "creation_timestamp": "2026-02-02T12:28:58.799648Z"}, {"uuid": "ecc7f7b4-f685-403d-ba75-38ba1da5b358", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-19356", "type": "seen", "source": "MISP/25aef508-b116-4d75-84b2-b6ceff906e44", "content": "", "creation_timestamp": "2020-10-16T06:56:57.000000Z"}, {"uuid": "c79d30f7-4672-49fb-a348-46ada58a829e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1935", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:14.000000Z"}, {"uuid": "8ffc3250-f30a-4aa0-92fc-b231667d9ac5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1935", "type": "exploited", "source": "https://www.exploit-db.com/exploits/47346", "content": "", "creation_timestamp": "2019-09-03T00:00:00.000000Z"}, {"uuid": "ad357747-dce3-4321-8ad6-52050aa56e0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-19356", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2970964", "content": "", "creation_timestamp": "2024-12-24T20:22:23.257240Z"}, {"uuid": "1cf8fbf2-5b10-4aa3-bfd0-98d6d92b2a50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-19351", "type": "seen", "source": "https://gist.github.com/nogueiraanderson/f839e1e164a5a7efe124f825abe1b3bc", "content": "", "creation_timestamp": "2025-07-12T09:57:35.000000Z"}, {"uuid": "d5bebaee-9053-4768-94e7-3141fd601dd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1935", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/ssh/cisco_ucs_scpuser.rb", "content": "", "creation_timestamp": "2019-09-02T15:56:25.000000Z"}, {"uuid": "4a1ebf80-618c-4f95-bc0e-97bf8ee4710c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-19356", "type": "seen", "source": "https://t.me/arpsyndicate/934", "content": "#ExploitObserverAlert\n\nCVE-2019-19356\n\nDESCRIPTION: Exploit Observer has 6 entries related to CVE-2019-19356. Netis WF2419 is vulnerable to authenticated Remote Code Execution (RCE) as root through the router Web management page. The vulnerability has been found in firmware version V1.2.31805 and V2.2.36123. After one is connected to this page, it is possible to execute system commands as root through the tracert diagnostic tool because of lack of user input sanitizing.\n\nFIRST-EPSS: 0.959690000\nNVD-IS: 5.9\nNVD-ES: 1.6", "creation_timestamp": "2023-12-03T12:44:27.000000Z"}, {"uuid": "0c9123f5-ab3a-4b28-88ea-a74e4fc65a1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-19356", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "7f652c0f-dca1-4695-9cb8-4c20f5db5873", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-19356", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:19.000000Z"}, {"uuid": "a5fb306a-3a14-4a29-976d-323bf94228ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-19356", "type": "seen", "source": "MISP/cbd9bbb3-3f53-4610-9d91-9191ff0a9ca8", "content": "", "creation_timestamp": "2020-10-15T15:07:06.000000Z"}, {"uuid": "8bcfeaaa-ab29-4d3d-9335-64fd9ddd6aa3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1935", "type": "seen", "source": "MISP/4fa9ef9a-ee83-4788-9a23-00109122c595", "content": "", "creation_timestamp": "2024-11-14T06:09:55.000000Z"}, {"uuid": "2efc1dad-2956-4bf4-bd73-19b4584bea96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1935", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:44.000000Z"}, {"uuid": "1abf5f95-e4cb-4a9f-9135-d7b622adca39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-19356", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:43.000000Z"}, {"uuid": "c8f285ee-b989-45cf-a53e-a8fd93b41d5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-19356", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/f590bb0b-4d72-4156-a05f-1fbd6092f927", "content": "", "creation_timestamp": "2026-02-02T12:28:58.799648Z"}]}