{"vulnerability": "cve-2019-1003030", "sightings": [{"uuid": "4e654d53-9e03-4a6b-bdb2-fc437f2b5fcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1003030", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lvjlb6nise2a", "content": "", "creation_timestamp": "2025-08-03T21:02:21.743968Z"}, {"uuid": "09a41ba8-c59b-4c2f-8523-8d90b7b241a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1003030", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/7e5ef2ef-e79e-4431-be33-4443bd8bbc7e", "content": "", "creation_timestamp": "2026-02-02T12:28:01.788416Z"}, {"uuid": "64caad2b-b70e-43c4-8469-a8b71d20271a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1003030", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/7e5ef2ef-e79e-4431-be33-4443bd8bbc7e", "content": "", "creation_timestamp": "2026-02-02T12:28:01.788416Z"}, {"uuid": "826a166d-a000-47a8-a336-cfacc5dc43d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1003030", "type": "seen", "source": "Telegram/hNIhMNqEodPMH5o8iI4r8bf20jVazffIQoXfnAAwyaQsY78_", "content": "", "creation_timestamp": "2025-02-20T23:26:56.000000Z"}, {"uuid": "ecad9504-35b3-46ee-bd87-7e316b48c75c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1003030", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:03.000000Z"}, {"uuid": "97adeb3d-4c20-4995-bae6-66a26000f072", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1003030", "type": "seen", "source": "MISP/d1172703-3494-4390-8af8-e07d7db9aab8", "content": "", "creation_timestamp": "2024-11-14T06:07:06.000000Z"}, {"uuid": "39b11bb5-917e-4bde-aaf1-f0dd757b1137", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1003030", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:22.000000Z"}, {"uuid": "35cc036e-503d-4b7f-be19-4febaa1ba3eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1003030", "type": "seen", "source": "https://t.me/arpsyndicate/1064", "content": "#ExploitObserverAlert\n\nCVE-2019-1003030\n\nDESCRIPTION: Exploit Observer has 11 entries related to CVE-2019-1003030. A sandbox bypass vulnerability exists in Jenkins Pipeline: Groovy Plugin 2.63 and earlier in pom.xml, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShell.java that allows attackers able to control pipeline scripts to execute arbitrary code on the Jenkins master JVM.\n\nFIRST-EPSS: 0.006590000\nNVD-IS: 6.0\nNVD-ES: 3.1", "creation_timestamp": "2023-12-04T00:03:17.000000Z"}, {"uuid": "e7d4091f-a1c8-4156-967c-c639a42828eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1003030", "type": "seen", "source": "MISP/5ccf3134-ea64-43c1-a356-f9f3950d210f", "content": "", "creation_timestamp": "2019-05-05T19:20:03.000000Z"}, {"uuid": "631988b2-e57b-4e03-b45e-4ea8143ee437", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1003030", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971432", "content": "", "creation_timestamp": "2024-12-24T20:29:14.762556Z"}, {"uuid": "502f3a01-56fe-466b-80e8-6f0439d8551f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1003030", "type": "seen", "source": "https://t.me/arpsyndicate/1737", "content": "#ExploitObserverAlert\n\nCVE-2019-1003030\n\nDESCRIPTION: Exploit Observer has 12 entries related to CVE-2019-1003030. A sandbox bypass vulnerability exists in Jenkins Pipeline: Groovy Plugin 2.63 and earlier in pom.xml, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShell.java that allows attackers able to control pipeline scripts to execute arbitrary code on the Jenkins master JVM.\n\nFIRST-EPSS: 0.006590000\nNVD-IS: 6.0\nNVD-ES: 3.1", "creation_timestamp": "2023-12-11T12:54:13.000000Z"}]}