{"vulnerability": "cve-2023-24453", "sightings": [{"uuid": "4ef63f4c-6a6d-4e33-9a7e-dbfed3d1b666", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24453", "type": "seen", "source": "https://t.me/arpsyndicate/3087", "content": "#ExploitObserverAlert\n\nCVE-2023-24453\n\nDESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2023-24453. A missing check in Jenkins TestQuality Updater Plugin 1.3 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified username and password.\n\nFIRST-EPSS: 0.000480000\nNVD-IS: 3.6\nNVD-ES: 2.8", "creation_timestamp": "2024-01-26T21:58:22.000000Z"}]}