{"vulnerability": "cve-2019-1010", "sightings": [{"uuid": "2969138a-54ef-41bf-83dc-89654ab246b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1010083", "type": "seen", "source": "https://gist.github.com/Ottapiens/e20fd8a5b3d73cb0ffa38013f25292e1", "content": "", "creation_timestamp": "2025-11-22T10:05:19.000000Z"}, {"uuid": "901aa405-50f6-4090-afdc-2261276c70c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1010174", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lizr4f7ixx2d", "content": "", "creation_timestamp": "2025-02-25T21:02:03.544416Z"}, {"uuid": "1ab3b420-75dd-47c5-885b-b33de8fc9d3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1010218", "type": "seen", "source": "https://gist.github.com/MPIsaac-Syn/7dafe102db9467259483d32875347831", "content": "", "creation_timestamp": "2025-09-17T21:34:35.000000Z"}, {"uuid": "744bc4e2-5079-4192-9505-73492b1fc946", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1010083", "type": "seen", "source": "https://gist.github.com/Ottapiens/eec03543750502c92edc81d7c568d88c", "content": "", "creation_timestamp": "2025-11-22T10:06:48.000000Z"}, {"uuid": "98e5e8b1-89b3-4984-883c-2179030adee6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-10104", "type": "seen", "source": "https://t.me/cveNotify/198", "content": "\ud83d\udea8 #CVE-2019-10104\nIn several JetBrains IntelliJ IDEA Ultimate versions, an Application Server run configuration (for Tomcat, Jetty, Resin, or CloudBees) with the default setting allowed a remote attacker to execute code when the configuration is running, b... https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10104\n\n\ud83c\udf96@cveNotify", "creation_timestamp": "2019-07-04T18:00:17.000000Z"}, {"uuid": "8f423cfb-5146-4d72-978f-a38f9fa7ccd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2019-1010204", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "885a0cd3-a36d-4ac1-8799-77bed763a2e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1010266", "type": "seen", "source": "https://t.me/arpsyndicate/1614", "content": "#ExploitObserverAlert\n\nCVE-2019-1010266\n\nDESCRIPTION: Exploit Observer has 15 entries related to CVE-2019-1010266. lodash prior to 4.17.11 is affected by: CWE-400: Uncontrolled Resource Consumption. The impact is: Denial of service. The component is: Date handler. The attack vector is: Attacker provides very long strings, which the library attempts to match using a regular expression. The fixed version is: 4.17.11.\n\nFIRST-EPSS: 0.003170000\nNVD-IS: 3.6\nNVD-ES: 2.8", "creation_timestamp": "2023-12-10T12:14:50.000000Z"}, {"uuid": "82ccaeaa-9476-436a-8c5f-fbd17f40ce06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-10100", "type": "seen", "source": "https://t.me/cveNotify/253", "content": "\ud83d\udea8 #CVE-2019-10100\nIn JetBrains YouTrack Confluence plugin versions before 1.8.1.3, it was possible to achieve Server Side Template Injection. The attacker could add an Issue macro to the page in Confluence, and use a combination of a valid id field and spe... https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10100\n\n\ud83c\udf96@cveNotify", "creation_timestamp": "2019-07-05T17:00:31.000000Z"}, {"uuid": "6a9e0904-dd2f-4a1d-bbda-aebaf94bd95b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-10100", "type": "seen", "source": "https://t.me/cveNotify/197", "content": "\ud83d\udea8 #CVE-2019-10100\nIn JetBrains YouTrack Confluence plugin versions before 1.8.1.3, it was possible to achieve Server Side Template Injection. The attacker could add an Issue macro to the page in Confluence, and use a combination of a valid id field and spe... https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10100\n\n\ud83c\udf96@cveNotify", "creation_timestamp": "2019-07-04T18:00:16.000000Z"}, {"uuid": "e60adea5-0155-4298-9cd7-96446be44f10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-10104", "type": "seen", "source": "https://t.me/cveNotify/254", "content": "\ud83d\udea8 #CVE-2019-10104\nIn several JetBrains IntelliJ IDEA Ultimate versions, an Application Server run configuration (for Tomcat, Jetty, Resin, or CloudBees) with the default setting allowed a remote attacker to execute code when the configuration is running, b... https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10104\n\n\ud83c\udf96@cveNotify", "creation_timestamp": "2019-07-05T17:00:32.000000Z"}]}