{"vulnerability": "CVE-2022-3480", "sightings": [{"uuid": "c4a1cc57-1260-4894-be71-c13a9e9184f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34805", "type": "seen", "source": "https://t.me/cibsecurity/45456", "content": "\u203c CVE-2022-34805 \u203c\n\nJenkins Skype notifier Plugin 1.1.0 and earlier stores a password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-30T22:44:05.000000Z"}, {"uuid": "917a112b-c237-4537-a42d-06f7d99904a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3480", "type": "seen", "source": "https://t.me/cibsecurity/52989", "content": "\u203c CVE-2022-3480 \u203c\n\nA remote, unauthenticated attacker could cause a denial-of-service of PHOENIX CONTACT FL MGUARD and TC MGUARD devices below version 8.9.0 by sending a larger number of unauthenticated HTTPS connections originating from different source IP\u00e2\u20ac\u2122s. Configuring firewall limits for incoming connections cannot prevent the issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-11-16T07:54:40.000000Z"}, {"uuid": "9bb99508-f01a-44cc-9bab-064cc53321f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34809", "type": "seen", "source": "https://t.me/cibsecurity/45455", "content": "\u203c CVE-2022-34809 \u203c\n\nJenkins RQM Plugin 2.8 and earlier stores a password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-30T22:44:03.000000Z"}, {"uuid": "37501776-6d91-4d2c-9238-75ba5e0aebc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34800", "type": "seen", "source": "https://t.me/cibsecurity/45453", "content": "\u203c CVE-2022-34800 \u203c\n\nJenkins Build Notifications Plugin 1.5.0 and earlier stores tokens unencrypted in its global configuration files on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-01T05:47:19.000000Z"}, {"uuid": "f0d020d6-83f8-4b58-88ce-4678d6cd84d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-34804", "type": "seen", "source": "https://t.me/cibsecurity/45444", "content": "\u203c CVE-2022-34804 \u203c\n\nJenkins OpsGenie Plugin 1.9 and earlier transmits API keys in plain text as part of the global Jenkins configuration form and job configuration forms, potentially resulting in their exposure.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-30T22:43:50.000000Z"}]}