{"vulnerability": "cve-2019-0232", "sightings": [{"uuid": "18e0a3f1-e9fc-488b-86e4-a0155eeb2ab4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0232", "type": "exploited", "source": "https://www.exploit-db.com/exploits/47073", "content": "", "creation_timestamp": "2019-07-03T00:00:00.000000Z"}, {"uuid": "44314463-f371-43d1-86cf-0579be79ea8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0232", "type": "seen", "source": "MISP/5e9a55a6-33e9-4850-adc1-c1007bf86e45", "content": "", "creation_timestamp": "2024-11-14T06:10:01.000000Z"}, {"uuid": "b55ce0a6-1f49-4579-8e4c-5aed6644c49a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0232", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:43.000000Z"}, {"uuid": "7d6db60d-bba4-47c8-8881-d0592328a329", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0232", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:10.000000Z"}, {"uuid": "faa52c7f-285c-4c58-b8f1-9a4d16af2c8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0232", "type": "published-proof-of-concept", "source": "https://t.me/antichat/4648", "content": "Uncovering CVE-2019-0232: A Remote Code Execution Vulnerability in Apache Tomcat\nhttps://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-cve-2019-0232-a-remote-code-execution-vulnerability-in-apache-tomcat/", "creation_timestamp": "2019-04-27T11:43:10.000000Z"}, {"uuid": "c87a2211-bacf-4e44-acba-48de3e16f138", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0232", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/tomcat_cgi_cmdlineargs.rb", "content": "", "creation_timestamp": "2019-07-01T21:39:07.000000Z"}, {"uuid": "b98c6da3-3b0f-4162-98f5-fdd1aeda5e07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0232", "type": "published-proof-of-concept", "source": "https://t.me/ExcreamOnSecurity/99", "content": "Remote Code Execution (RCE) in CGI Servlet \u2013 Apache Tomcat on Windows \u2013 CVE-2019-0232\n\nApache Tomcat has a vulnerability in the CGI Servlet which can be exploited to achieve remote code execution (RCE). This is only exploitable when running on Windows in a non-default configuration in conjunction with batch files.\nThe vendor released a fix in Tomcat versions 7.0.94, 8.5.40 and 9.0.19. Users are encouraged to upgrade as soon as possible. CVE-2019-0232 has been assigned to track this issue.\n\nhttps://wwws.nightwatchcybersecurity.com/2019/04/30/remote-code-execution-rce-in-cgi-servlet-apache-tomcat-on-windows-cve-2019-0232/\n\n#exploit #apache #tomcat #rce", "creation_timestamp": "2019-05-01T22:47:08.000000Z"}, {"uuid": "9c3e4a5a-3199-4948-be4c-3a85fab655a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0232", "type": "seen", "source": "https://t.me/ctinow/168291", "content": "https://ift.tt/foJF7ZW\nCVE-2019-0232 | Oracle MICROS Relate CRM Software 11.4 Apache Tomcat input validation (BID-107906)", "creation_timestamp": "2024-01-15T11:36:53.000000Z"}, {"uuid": "f4f5875f-4b3c-499b-bcd8-078c1bcbd215", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0232", "type": "seen", "source": "https://t.me/ctinow/168382", "content": "https://ift.tt/0ndW8OK\nCVE-2019-0232 | Oracle Agile PLM up to 9.3.6 Apache Tomcat input validation (BID-107906)", "creation_timestamp": "2024-01-15T14:41:14.000000Z"}, {"uuid": "5fe53c95-e3fc-40a9-8518-6ba5ef8e2022", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0232", "type": "seen", "source": "https://t.me/ctinow/164892", "content": "https://ift.tt/jRsNHXA\nCVE-2019-0232 | Oracle Instantis EnterpriseTrack 17.1/17.2/17.3 Apache Tomcat input validation (BID-107906)", "creation_timestamp": "2024-01-09T10:06:49.000000Z"}, {"uuid": "8f47c868-ad33-4220-8e99-6952c2d6916d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0232", "type": "seen", "source": "https://t.me/thehackernews/265", "content": "Apache releases security important updates to patch a new Remote Code Execution flaw (CVE-2019-0232) in Apache Tomcat\n\nhttps://thehackernews.com/2019/04/apache-tomcat-security-flaw.html", "creation_timestamp": "2019-04-15T10:02:01.000000Z"}, {"uuid": "6d75d102-9d60-4588-b097-6b82810f246f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0232", "type": "seen", "source": "https://t.me/canyoupwnme/5447", "content": "Uncovering CVE-2019-0232: A Remote Code Execution Vulnerability in Apache Tomcat\nhttps://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-cve-2019-0232-a-remote-code-execution-vulnerability-in-apache-tomcat/", "creation_timestamp": "2019-04-27T12:48:14.000000Z"}, {"uuid": "25580fc6-21f8-4ee5-ac1c-c3fcaedcc9bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0232", "type": "published-proof-of-concept", "source": "https://t.me/canyoupwnme/5466", "content": "Remote Code Execution (RCE) in CGI Servlet \u2013 Apache Tomcat on Windows \u2013 CVE-2019-0232\nhttps://wwws.nightwatchcybersecurity.com/2019/04/30/remote-code-execution-rce-in-cgi-servlet-apache-tomcat-on-windows-cve-2019-0232/", "creation_timestamp": "2019-05-01T14:16:54.000000Z"}, {"uuid": "314fe815-b75e-4621-83cc-787b34973153", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0232", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/418", "content": "#exploit\n1. CVE-2019-11604:\nQuest KACE Systems Management Appliance &lt;= 9.0 kbot_service_notsoap.php METHOD Reflected CSS\nhttps://seclist.org/fulldisclosure/2019/May/40\n\n2. CVE-2019-0232:\nRCE in CGI Servlet - Apache Tomcat on Windows\nhttps://wwws.nightwatchcybersecurity.com/2019/04/30/remote-code-execution-rce-in-cgi-servlet-apache-tomcat-on-windows-cve-2019-0232", "creation_timestamp": "2022-06-25T14:25:27.000000Z"}]}