{"uuid": "886da144-5f02-4fd6-a28f-832ff97538cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50765", "type": "seen", "source": "https://t.me/arpsyndicate/2429", "content": "#ExploitObserverAlert\n\nCVE-2023-50765\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-50765. A missing permission check in Jenkins Scriptler Plugin 342.v6a_89fd40f466 and earlier allows attackers with Overall/Read permission to read the contents of a Groovy script by knowing its ID.\n\nFIRST-EPSS: 0.000440000\nNVD-IS: 1.4\nNVD-ES: 2.8", "creation_timestamp": "2024-01-04T04:25:47.000000Z"}