{"vulnerability": "CVE-2023-50765", "sightings": [{"uuid": "886da144-5f02-4fd6-a28f-832ff97538cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50765", "type": "seen", "source": "https://t.me/arpsyndicate/2429", "content": "#ExploitObserverAlert\n\nCVE-2023-50765\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-50765. A missing permission check in Jenkins Scriptler Plugin 342.v6a_89fd40f466 and earlier allows attackers with Overall/Read permission to read the contents of a Groovy script by knowing its ID.\n\nFIRST-EPSS: 0.000440000\nNVD-IS: 1.4\nNVD-ES: 2.8", "creation_timestamp": "2024-01-04T04:25:47.000000Z"}, {"uuid": "56103733-106b-46d6-a659-d4e1e2e91cbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-50765", "type": "seen", "source": "https://t.me/ctinow/165762", "content": "https://ift.tt/uaTBQ8D\nCVE-2023-50765 | Scriptler Plugin up to 342.v6a_89fd40f466 on Jenkins Groovy Script permission", "creation_timestamp": "2024-01-10T13:07:43.000000Z"}]}