{"vulnerability": "CVE-2019-1128", "sightings": [{"uuid": "8f0aa784-98b2-4358-a2cb-0e6f1f717f27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1128", "type": "exploited", "source": "https://www.exploit-db.com/exploits/47095", "content": "", "creation_timestamp": "2019-07-10T00:00:00.000000Z"}, {"uuid": "7e51f682-bf24-437f-b6a2-466c292b320d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-11283", "type": "published-proof-of-concept", "source": "https://t.me/ctinow/174665", "content": "https://vuldb.com/?id.144091\nCVE-2019-11283 | Cloud Foundry SMB Volume up to 2.0.2 Log Credentials log file", "creation_timestamp": "2024-01-27T07:36:24.000000Z"}, {"uuid": "fb53c521-2536-4a23-8902-fbc90bc43cff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-11287", "type": "seen", "source": "https://t.me/ctinow/193377", "content": "https://ift.tt/dbCKExi\nCVE-2019-11287 | Pivotal RabbitMQ up to 3.7.20/3.8.0 Web Management Plugin HTTP Header resource consumption (RHSA-2020:0078)", "creation_timestamp": "2024-02-26T14:42:11.000000Z"}, {"uuid": "71a59d82-6369-4ea8-b28c-75ec6c45672a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-11287", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lvjlb6sgti25", "content": "", "creation_timestamp": "2025-08-03T21:02:22.942245Z"}, {"uuid": "98bf4d4f-e2eb-444e-b8bb-1f377598348b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-11289", "type": "seen", "source": "https://t.me/ctinow/192037", "content": "https://ift.tt/ealE2jn\nCVE-2019-11289 | Cloud Foundry Routing up to 0.192.x Nonce Request input validation", "creation_timestamp": "2024-02-23T18:52:03.000000Z"}, {"uuid": "1b8052da-fcd7-4242-a936-39ba44946c32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-11282", "type": "seen", "source": "https://t.me/ctinow/174664", "content": "https://ift.tt/jTc7xLC\nCVE-2019-11282 | Cloud Foundry UAA up to 74.2.x SCIM Request information disclosure", "creation_timestamp": "2024-01-27T07:36:23.000000Z"}, {"uuid": "735129f3-de36-4d33-bfe5-82c7c88689eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-11281", "type": "seen", "source": "https://t.me/ctinow/168419", "content": "https://ift.tt/iGCSOEb\nCVE-2019-11281 | Pivotal RabbitMQ up to 3.7.17 Host Limits Page/Federation Management UI cross site scripting (RHSA-2020:0078)", "creation_timestamp": "2024-01-15T15:41:36.000000Z"}, {"uuid": "976447d8-ec62-4507-a239-cfa7beeb571a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-11288", "type": "seen", "source": "https://t.me/cveNotify/474", "content": "\ud83d\udea8 CVE-2019-11288\nIn Pivotal tc Server, 3.x versions prior to 3.2.19 and 4.x versions prior to 4.0.10, and Pivotal tc Runtimes, 7.x versions prior to 7.0.99.B, 8.x versions prior to 8.5.47.A, and 9.x versions prior to 9.0.27.A, when a tc Runtime instance is configured with the JMX Socket Listener, a local attacker without access to the tc Runtime process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and gain complete control over the tc Runtime instance.\n\n\ud83c\udf96@cveNotify", "creation_timestamp": "2020-01-27T23:37:40.000000Z"}, {"uuid": "28cc559d-9edc-4a23-beb0-4e180be07681", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-11284", "type": "seen", "source": "https://t.me/ctinow/168777", "content": "https://ift.tt/ZbswWYO\nCVE-2019-11284 | Pivotal Reactor Netty up to 0.8.11 Header Credentials insufficiently protected credentials", "creation_timestamp": "2024-01-16T12:37:02.000000Z"}, {"uuid": "6f7af475-7c06-4a1c-a84d-dd7679e970c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-11286", "type": "seen", "source": "https://t.me/cibsecurity/13814", "content": "ATENTION\u203c New - CVE-2019-11286\n\nVMware GemFire versions prior to 9.10.0, 9.9.1, 9.8.5, and 9.7.5, and VMware Tanzu GemFire for VMs versions prior to 1.11.0, 1.10.1, 1.9.2, and 1.8.2, contain a JMX service available to the network which does not properly restrict input. A remote authenticated malicious user may request against the service with a crafted set of credentials leading to remote code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-08-01T00:55:12.000000Z"}]}