{"vulnerability": "cve-2019-1181", "sightings": [{"uuid": "4b1c1980-6575-4e5a-b500-207acaf28944", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-11815", "type": "published-proof-of-concept", "source": "https://t.me/antichat/5037", "content": "https://securityaffairs.co/wordpress/85892/security/cve-2019-11815-linux-flaws.html", "creation_timestamp": "2019-05-21T17:10:42.000000Z"}, {"uuid": "2ea2e393-1e75-49fe-ab4c-51cf902eedb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1181", "type": "seen", "source": "Telegram/yxw_Qmms97U0a96QVcyS0kqAzck8vJuI6ECdzMg45RQdO6OK", "content": "", "creation_timestamp": "2021-08-12T05:29:43.000000Z"}, {"uuid": "6b822190-6862-440a-be24-9b0be7e518b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1181", "type": "seen", "source": "https://t.me/cybershit/558", "content": "\u041d\u0435 \u0443\u0441\u043f\u0435\u043b\u0438 \u043e\u0442\u043e\u0439\u0442\u0438 \u043e\u0442 \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0435\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 RDS (BlueKeep), \u043f\u043e\u043b\u0443\u0447\u0430\u0439\u0442\u0435 \u043d\u043e\u0432\u044b\u0435 \u2014 CVE-2019-1181, CVE-2019-1182, CVE-2019-1222, CVE-2019-1226, \u0432 \u044d\u0442\u043e\u0442 \u0440\u0430\u0437 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0435 \u0441\u0430\u043c\u043e\u0439 \u043a\u043e\u043c\u0430\u043d\u0434\u043e\u0439 Microsoft.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u044b: \n*7SP1\n*Server 2008 R2 SP1\n*Server 2012 &amp; R2\n*8.1\n*\u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Windows 10, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0441\u0435\u0440\u0432\u0435\u0440\u043d\u044b\u0435\n\n\u041d\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u044b:\n*XP\n*Server 2003, 2008\n\n[RU] https://habr.com/ru/post/463591\n\n\u041f\u0430\u0442\u0447\u0438:\nhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1181\nhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1182\nhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1222\nhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1226\n\n\u0421\u043e\u043d \u0434\u043b\u044f \u0441\u043b\u0430\u0431\u0430\u043a\u043e\u0432, \u0432\u043f\u0435\u0440\u0435\u0434 \u043f\u0430\u0442\u0447\u0438\u0442\u044c!", "creation_timestamp": "2019-08-13T23:12:13.000000Z"}, {"uuid": "0002f6d8-1365-40d9-892f-7c75c0eb05e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1181", "type": "seen", "source": "https://t.me/ctinow/14804", "content": "RT @ChristiaanBeek: 1. For those who want to investigate what is patched with eg #CVE-2019-1181 or 1182: start with downloading the patch file, in my case for Win10 a 266MB file. Next use", "creation_timestamp": "2019-08-16T21:08:08.000000Z"}, {"uuid": "fd9fe02c-8e1c-4884-94c0-47923c6fa8b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-11815", "type": "seen", "source": "https://t.me/information_security_channel/27680", "content": "Linux Kernel Privilege Escalation Vulnerability Found in RDS Over TCP\nhttp://feedproxy.google.com/~r/Securityweek/~3/46iBnMY1Xmw/linux-kernel-privilege-escalation-vulnerability-found-rds-over-tcp\n\nA memory corruption vulnerability recently found in Linux Kernel\u2019s implementation of RDS over TCP could lead to privilege escalation.\u00a0\nTracked as CVE-2019-11815 and featuring a CVSS base score of 8.1, the flaw impacts Linux kernels prior to 5.0.8, but only systems that use the Reliable Datagram Sockets (RDS) for the TCP module.\nread more (https://www.securityweek.com/linux-kernel-privilege-escalation-vulnerability-found-rds-over-tcp)", "creation_timestamp": "2019-05-20T19:22:48.000000Z"}, {"uuid": "1c117602-a263-4091-a8cb-218880abac99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-11815", "type": "seen", "source": "https://t.me/information_security_channel/27920", "content": "CVE-2019-11815: Experts discovered a privilege escalation vulnerability in the Linux Kernel\nhttps://blogs.quickheal.com/cve-2019-11815-experts-discovered-privilege-escalation-vulnerability-linux-kernel/\n\nRed Hat engineers and experts discovered a memory corruption vulnerability in Linux kernel, which is basically a flaw while implementation of RDS (Remote desktop Protocol) over TCP. This flaw has affected Red Hat, Ubuntu, Debian and SUSE and security advisories have been issued for all. This flaw could enable an\u2026", "creation_timestamp": "2019-05-27T09:03:55.000000Z"}, {"uuid": "548283e3-9028-46c5-ac29-16ff7aa9408f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1181", "type": "seen", "source": "https://t.me/SecLabNews/5590", "content": "\u0421\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Microsoft \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0432 Remote Desktop Services (RDS) \u0447\u0435\u0442\u044b\u0440\u0435 \u043d\u043e\u0432\u044b\u0435 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0430\u043f\u043e\u0434\u043e\u0431\u0438\u0435 \u043d\u0435\u0434\u0430\u0432\u043d\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 BlueKeep. \u041a\u0430\u043a \u0441\u043e\u043e\u0431\u0449\u0430\u044e\u0442 \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b, CVE-2019-1181, CVE-2019-1182, CVE-2019-1222 \u0438 CVE-2019-1226 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u043d\u0435\u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u043c\u0443 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u0441\u0438\u0441\u0442\u0435\u043c\u043e\u0439 \u0431\u0435\u0437 \u043a\u0430\u043a\u043e\u0433\u043e-\u043b\u0438\u0431\u043e \u0443\u0447\u0430\u0441\u0442\u0438\u044f \u0441\u043e \u0441\u0442\u043e\u0440\u043e\u043d\u044b \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f.    \n\u041d\u043e\u0432\u044b\u0435 \u0447\u0435\u0440\u0432\u0435\u043e\u0431\u0440\u0430\u0437\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0442 \u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Windows 10", "creation_timestamp": "2019-08-14T08:12:32.000000Z"}, {"uuid": "04223229-daf2-41ed-ab80-6359d806bde7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2019-1181", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/microsoftin-etatyopoyta-sovelluksen-haavoittuvuuksia-hyodynnetaan-tietomurroissa", "content": "", "creation_timestamp": "2026-03-17T14:42:27.156911Z"}, {"uuid": "739dc1bb-0596-4c51-b587-e427c74f1d96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2019-1181", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=410", "content": "", "creation_timestamp": "2026-03-17T14:42:20.390081Z"}, {"uuid": "58b04347-66b1-48a9-a736-795faaed502f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1181", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=410", "content": "", "creation_timestamp": "2019-08-14T04:00:00.000000Z"}, {"uuid": "9382f1c8-3b81-45df-8c36-cf92d265f765", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1181", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/microsoftin-etatyopoyta-sovelluksen-haavoittuvuuksia-hyodynnetaan-tietomurroissa", "content": "", "creation_timestamp": "2019-08-14T13:17:22.000000Z"}, {"uuid": "c6ca029c-253f-41ed-b22f-d11caace8b8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1181", "type": "published-proof-of-concept", "source": "https://t.me/srv_admin/149", "content": "\u041d\u0430\u0434\u0435\u044e\u0441\u044c \u0432\u0441\u0435 \u043e\u0431\u043d\u043e\u0432\u0438\u043b\u0438\u0441\u044c? \u041b\u0443\u0447\u0448\u0435 \u043d\u0435 \u0437\u0430\u0442\u044f\u0433\u0438\u0432\u0430\u0442\u044c. \u0412\u0447\u0435\u0440\u0430 \u0432\u0435\u0441\u044c \u0432\u0435\u0447\u0435\u0440 \u043f\u0440\u043e\u0432\u0435\u0440\u044f\u043b \u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u043b \u0432\u0441\u0435, \u0447\u0442\u043e \u043f\u043e\u043f\u0430\u0434\u0430\u0435\u0442 \u043f\u043e\u0434 \u044d\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c. \u041e\u0447\u0435\u0440\u0435\u0434\u043d\u0430\u044f RCE-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0434 \u043d\u043e\u043c\u0435\u0440\u043e\u043c CVE-2019-1181/1182 \u041f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u043d\u0430 \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u0435 \u0436\u0435\u0440\u0442\u0432\u044b, \u0438\u043c\u0435\u044f \u0442\u043e\u043b\u044c\u043a\u043e \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u0439 \u043f\u043e\u0440\u0442 rdp. \n\n\u0422\u043e, \u0447\u0442\u043e \u044d\u0442\u0438 \u0434\u044b\u0440\u043a\u0438 \u043f\u043e\u0441\u0442\u043e\u044f\u043d\u043d\u043e \u043d\u0430\u0445\u043e\u0434\u044f\u0442, \u044f \u0443\u0436\u0435 \u0441\u043c\u0438\u0440\u0438\u043b\u0441\u044f. \u041d\u043e \u0432\u043e\u0442 \u0447\u0442\u043e \u044f \u043d\u0435 \u043f\u043e\u043d\u0438\u043c\u0430\u044e, \u0442\u0430\u043a \u044d\u0442\u043e \u043f\u043e\u0447\u0435\u043c\u0443 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043d\u0430 windows \u0441\u0442\u0430\u0432\u044f\u0442\u0441\u044f \u0442\u0430\u043a \u043c\u0435\u0434\u043b\u0435\u043d\u043d\u043e. \u041a\u0430\u043a\u043e\u0435-\u0442\u043e \u043d\u0435\u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u043e\u0435 \u0432\u0440\u0435\u043c\u044f \u043f\u043e\u0438\u0441\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439, \u043f\u043e\u0442\u043e\u043c \u0441\u043a\u0430\u0447\u0438\u0432\u0430\u043d\u0438\u0435, \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430. \u0418 \u0432\u0435\u0437\u0434\u0435 \u043f\u043e\u043b\u043e\u0441\u044b \u043f\u0440\u043e\u0433\u0440\u0435\u0441\u0441\u0430 \u043d\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0442\u0438\u0432\u043d\u044b, \u0442\u043e \u0435\u0441\u0442\u044c \u043d\u0435 \u043e\u0442\u0440\u0430\u0436\u0430\u044e\u0442 \u0440\u0435\u0430\u043b\u044c\u043d\u0443\u044e \u0441\u043a\u043e\u0440\u043e\u0441\u0442\u044c \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430 \u0432\u043e\u043e\u0431\u0449\u0435 \u043d\u0438\u043a\u0430\u043a. \u041d\u0435\u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e \u043f\u0440\u0435\u0434\u0443\u0433\u0430\u0434\u0430\u0442\u044c, \u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0431\u0443\u0434\u0435\u0442 \u0441\u0442\u0430\u0432\u0438\u0442\u044c\u0441\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435. \u041c\u043e\u0436\u0435\u0442 15 \u043c\u0438\u043d\u0443\u0442, \u0430 \u043c\u043e\u0436\u0435\u0442 2 \u0447\u0430\u0441\u0430.\n\n\u041f\u043e\u0447\u0435\u043c\u0443 \u0432 \u043b\u044e\u0431\u043e\u043c linux \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0441\u0442\u0430\u0432\u0438\u0442\u0441\u044f \u0431\u044b\u0441\u0442\u0440\u043e \u0438 \u043f\u0440\u0435\u0434\u0441\u043a\u0430\u0437\u0443\u0435\u043c\u043e \u043f\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u0438, \u0430 Microsoft \u043d\u0438\u043a\u0430\u043a \u043d\u0435 \u043c\u043e\u0436\u0435\u0442 \u043a\u0430\u043a\u0438\u043c-\u0442\u043e \u043e\u0431\u0440\u0430\u0437\u043e\u043c \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u043e\u0432\u0430\u0442\u044c \u044d\u0442\u043e\u0442 \u043f\u0440\u043e\u0446\u0435\u0441\u0441 \u0442\u0430\u043a, \u0447\u0442\u043e\u0431\u044b \u043e\u043d \u0431\u044b\u043b \u0443\u0434\u043e\u0431\u0435\u043d \u0438 \u0431\u044b\u0441\u0442\u0440?\nhttps://habr.com/ru/company/solarsecurity/blog/463591/\n\n#\u0437\u0430\u043c\u0435\u0442\u043a\u0430 #\u0432\u0438\u0440\u0443\u0441", "creation_timestamp": "2023-05-05T05:27:09.000000Z"}, {"uuid": "3d0dad19-1d67-42db-b9eb-3f8a310a211d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1181", "type": "published-proof-of-concept", "source": "https://t.me/alexmakus/2993", "content": "\u043f\u043e \u043d\u0430\u0432\u043e\u0434\u043a\u0435 \u0447\u0438\u0442\u0430\u0442\u0435\u043b\u044f: \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Windows, \u0430\u043d\u0430\u043b\u043e\u0433\u0438\u0447\u043d\u0430\u044f \u043d\u0430\u0448\u0443\u043c\u0435\u0432\u0448\u0435\u0439 BlueKeep (CVE-2019-0708), \u0442\u043e\u043b\u044c\u043a\u043e \u044d\u0442\u043e\u0442 \u0440\u0430\u0437 \u043d\u0435 \u043d\u0430\u0434\u043e \u0432\u044b\u043f\u0443\u0441\u043a\u0430\u0442\u044c \u043f\u0430\u0442\u0447 \u0434\u043b\u044f Windows XP. \u0417\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b \u0432\u0435\u0440\u0441\u0438\u0438 \u043e\u0442 Windows 7 SP1 \u0434\u043e Windows 10, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0435 \u0441\u0435\u0440\u0432\u0435\u0440\u043d\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043a\u0430\u043a \u043f\u0438\u0448\u0435\u0442 Microsoft, \"wormable\", \u0442\u043e \u0435\u0441\u0442\u044c \u0438\u043c\u0435\u044e\u0442 \u0441\u0432\u043e\u0439\u0441\u0442\u0432\u043e \u0440\u0430\u0437\u043c\u043d\u043e\u0436\u0430\u0442\u044c\u0441\u044f \u043c\u0435\u0436\u0434\u0443 \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u0430\u043c\u0438 \u0431\u0435\u0437 \u043f\u043e\u043c\u043e\u0449\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439. \n\nhttps://msrc-blog.microsoft.com/2019/08/13/patch-new-wormable-vulnerabilities-in-remote-desktop-services-cve-2019-1181-1182/\n\n\u0430\u043f\u0434\u0435\u0439\u0442\u044b \u0431\u0440\u0430\u0442\u044c \u0442\u0443\u0442 \nhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1182\n\n\u041a\u0442\u043e \u043d\u0435 \u043f\u0440\u043e\u0430\u043f\u0434\u0435\u0439\u0442\u0438\u043b\u0441\u044f, \u0442\u043e\u0442 \u0441\u0430\u043c \u0441\u0435\u0431\u0435 \u041a\u0435\u0432\u0438\u043d \u041c\u0438\u0442\u043d\u0438\u043a.", "creation_timestamp": "2019-08-14T11:53:58.000000Z"}, {"uuid": "d5afb701-57e9-456d-b247-6186b3778be3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1181", "type": "exploited", "source": "https://t.me/information_security_channel/30178", "content": "Microsoft released new security updates under Patch Tuesday for August and fixed more than 90 vulnerabilities including 2 Bluekep based \u201cwormable \u201cremote code execution vulnerabilities that reside in the windows remote desktop services. Same as Bluekeep RDP flaw, newly discovered two RCE vulnerabilities (CVE-2019-1181\u00a0and\u00a0CVE-2019-1182) in remote desktop services are \u201cWormable\u201d that means attackers propagate the [\u2026]\nThe post 2 \u201cWormable\u201d Bluekeep Based RCE Bugs in Windows Remote Desktop Services let Hackers Control Your System Remotely (https://gbhackers.com/wormable-rce-bugs/) appeared first on GBHackers On Security (https://gbhackers.com/).", "creation_timestamp": "2019-08-14T06:05:15.000000Z"}, {"uuid": "08cc12a0-f96d-45f2-b4fc-4ff655054fe5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1181", "type": "seen", "source": "MISP/5dc3d86a-32a4-41c7-90f7-4ca0950d210f", "content": "", "creation_timestamp": "2019-11-08T10:29:26.000000Z"}, {"uuid": "3ee05941-b36c-46f4-95e8-01d81ea1b48a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-1181", "type": "seen", "source": "https://msrc.microsoft.com/blog/2019/08/patch-new-wormable-vulnerabilities-in-remote-desktop-services-cve-2019-1181-1182/", "content": "", "creation_timestamp": "2019-08-13T05:00:00.000000Z"}]}