{"vulnerability": "cve-2019-0547", "sightings": [{"uuid": "84591fcd-764f-45de-a67e-fc597d2727e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0547", "type": "seen", "source": "MISP/5c360a14-9018-4d13-b6c9-714c0a021402", "content": "", "creation_timestamp": "2019-01-09T14:53:48.000000Z"}, {"uuid": "08e384d8-5014-4afe-a2ff-0ae3412764a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0547", "type": "published-proof-of-concept", "source": "https://t.me/antichat/5156", "content": "Analysis of a 1day (CVE-2019-0547) and discovery of a forgotten condition in the patch (CVE-2019-0726) \u2013 Part 1 of 2\nhttps://sensepost.com/blog/2019/analysis-of-a-1day-cve-2019-0547-and-discovery-of-a-forgotten-condition-in-the-patch-cve-2019-0726-part-1-of-2/", "creation_timestamp": "2019-05-29T12:02:43.000000Z"}, {"uuid": "31cd46dc-30ad-4707-9da1-8777e4c0a719", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0547", "type": "published-proof-of-concept", "source": "https://t.me/R0_Crew/1100", "content": "Analysis of a 1day (CVE-2019-0547) and discovery of a forgotten condition in the patch (CVE-2019-0726) \u2013 Part 1 of 2  https://sensepost.com/blog/2019/analysis-of-a-1day-cve-2019-0547-and-discovery-of-a-forgotten-condition-in-the-patch-cve-2019-0726-part-1-of-2/ #exploitation #reverse #dukeBarman", "creation_timestamp": "2019-06-03T12:10:47.000000Z"}, {"uuid": "c41c8344-8b2a-44c1-a2b7-e3c62d4c2a49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0547", "type": "published-proof-of-concept", "source": "https://t.me/news4hack/131", "content": "Running Server 2016 with \"DHCP Client\" enabled (= default)? - Consider an urgent patch then:\n\"CVE-2019-0547 | Windows DHCP Client Remote Code Execution Vulnerability\" (CVSS Base 9.8)\nhttps://t.co/IBbMGoDAPS", "creation_timestamp": "2019-01-10T05:56:51.000000Z"}, {"uuid": "9a5717fb-63f8-4f2e-b6e6-ba834734f050", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0547", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/267", "content": "#Threat_Research\nAnalysis of a 1-day (CVE-2019-0547) and discovery of a forgotten condition in the patch (CVE-2019-0726)\nhttps://sensepost.com/blog/2019/analysis-of-a-1day-cve-2019-0547-and-discovery-of-a-forgotten-condition-in-the-patch-cve-2019-0726-part-1-of-2", "creation_timestamp": "2022-02-07T13:42:54.000000Z"}, {"uuid": "816e93de-ba98-4b46-9489-7d0d3d2ac4c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0547", "type": "seen", "source": "https://t.me/canyoupwnme/5558", "content": "Analysis of a 1day (CVE-2019-0547) and discovery of a forgotten condition in the patch (CVE-2019-0726) \u2013 Part 1 of 2\nhttps://sensepost.com/blog/2019/analysis-of-a-1day-cve-2019-0547-and-discovery-of-a-forgotten-condition-in-the-patch-cve-2019-0726-part-1-of-2/", "creation_timestamp": "2019-05-29T13:57:26.000000Z"}]}