{"vulnerability": "CVE-2019-1003000", "sightings": [{"uuid": "6520a7cd-25f6-44cb-a37b-033c8fb3e244", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1003000", "type": "seen", "source": "MISP/5dad8c03-98b4-405a-a52d-30090a3b4631", "content": "", "creation_timestamp": "2019-10-21T10:44:41.000000Z"}, {"uuid": "206ec6ce-2e4d-44c0-b60a-a8eec0f6b840", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1003000", "type": "seen", "source": "MISP/d242633d-9d52-4527-ac05-95ce6550cfae", "content": "", "creation_timestamp": "2020-10-09T14:44:07.000000Z"}, {"uuid": "b3620225-8b09-46c1-8d63-be2153379a40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1003000", "type": "exploited", "source": "https://www.exploit-db.com/exploits/46427", "content": "", "creation_timestamp": "2019-02-19T00:00:00.000000Z"}, {"uuid": "616722e5-3560-4da6-a933-1e462befbcea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1003000", "type": "exploited", "source": "https://www.exploit-db.com/exploits/46572", "content": "", "creation_timestamp": "2019-03-19T00:00:00.000000Z"}, {"uuid": "039a1904-2b7e-4bb8-be78-45ff36601128", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1003000", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/jenkins_metaprogramming.rb", "content": "", "creation_timestamp": "2019-03-18T12:37:31.000000Z"}, {"uuid": "e3bf336c-e1fd-439c-83c9-33185fd055f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2019-1003000", "type": "seen", "source": "https://gist.github.com/Devball406/7c3257f2034c725588426e563837ad80", "content": "", "creation_timestamp": "2025-05-12T15:51:09.000000Z"}, {"uuid": "f6422fc5-03e0-4387-b939-a33d408e0efd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1003000", "type": "seen", "source": "https://t.me/arpsyndicate/1741", "content": "#ExploitObserverAlert\n\nCVE-2019-1003000\n\nDESCRIPTION: Exploit Observer has 36 entries related to CVE-2019-1003000. A sandbox bypass vulnerability exists in Script Security Plugin 1.49 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/GroovySandbox.java that allows attackers with the ability to provide sandboxed scripts to execute arbitrary code on the Jenkins master JVM.\n\nFIRST-EPSS: 0.836470000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2023-12-11T13:15:11.000000Z"}, {"uuid": "c0f3320a-e44e-45ed-b6db-73902c42dcf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1003000", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/2325", "content": "Jenkins RCE PoC. From unauthenticated user to remote code execution - it's a hacker's dream! (Chaining CVE-2019-1003000, CVE-2018-1999002, and more)  https://github.com/petercunha/jenkins_unauthenticated_remote_code_execution", "creation_timestamp": "2019-02-20T11:38:16.000000Z"}]}