{"vulnerability": "CVE-2022-3688", "sightings": [{"uuid": "5fab7159-ba8e-4833-b9d9-66b42c481877", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3688", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13869", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-3688\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The WPQA Builder WordPress plugin before 5.9 does not have CSRF check when following and unfollowing users, which could allow attackers to make logged in users perform such actions via CSRF attacks\n\ud83d\udccf Published: 2022-11-21T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-29T16:21:06.953Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/03b2c6e6-b86e-4143-a84a-7a99060c4848", "creation_timestamp": "2025-04-29T17:12:01.000000Z"}, {"uuid": "5f4fb2bf-16bd-44f2-a7d8-90948fa6edc9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36884", "type": "seen", "source": "https://t.me/arpsyndicate/2014", "content": "#ExploitObserverAlert\n\nCVE-2022-36884\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2022-36884. The webhook endpoint in Jenkins Git Plugin 4.11.3 and earlier provide unauthenticated attackers information about the existence of jobs configured to use an attacker-specified Git repository.\n\nFIRST-EPSS: 0.000750000\nNVD-IS: 1.4\nNVD-ES: 3.9", "creation_timestamp": "2023-12-18T15:38:36.000000Z"}, {"uuid": "dabb161e-9fea-4ebb-b49d-e083991d23b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36883", "type": "seen", "source": "https://t.me/arpsyndicate/2831", "content": "#ExploitObserverAlert\n\nCVE-2022-36883\n\nDESCRIPTION: Exploit Observer has 5 entries in 3 file formats related to CVE-2022-36883. A missing permission check in Jenkins Git Plugin 4.11.3 and earlier allows unauthenticated attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit.\n\nFIRST-EPSS: 0.013280000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2024-01-16T06:27:36.000000Z"}, {"uuid": "3a491c51-45bc-4876-9121-ea4f7d120381", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36887", "type": "seen", "source": "https://t.me/cibsecurity/47109", "content": "\u203c CVE-2022-36887 \u203c\n\nA cross-site request forgery (CSRF) vulnerability in Jenkins Job Configuration History Plugin 1155.v28a_46a_cc06a_5 and earlier allows attackers to delete entries from job, agent, and system configuration history, or restore older versions of job, agent, and system configurations.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-27T18:52:44.000000Z"}, {"uuid": "fcd4702d-0f1d-4b27-8399-76a7750d9d8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36884", "type": "seen", "source": "https://t.me/cibsecurity/47083", "content": "\u203c CVE-2022-36884 \u203c\n\nThe webhook endpoint in Jenkins Git Plugin 4.11.3 and earlier provide unauthenticated attackers information about the existence of jobs configured to use an attacker-specified Git repository.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-27T18:46:56.000000Z"}, {"uuid": "8877b4fe-ab75-4ece-9aa1-69d62126143b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36888", "type": "seen", "source": "https://t.me/cibsecurity/47075", "content": "\u203c CVE-2022-36888 \u203c\n\nA missing permission check in Jenkins HashiCorp Vault Plugin 354.vdb_858fd6b_f48 and earlier allows attackers with Overall/Read permission to obtain credentials stored in Vault with attacker-specified path and keys.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-27T18:46:45.000000Z"}, {"uuid": "7252dde9-b92e-4f51-b7c0-8f138e3a2f35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36885", "type": "seen", "source": "https://t.me/cibsecurity/47074", "content": "\u203c CVE-2022-36885 \u203c\n\nJenkins GitHub Plugin 1.34.4 and earlier uses a non-constant time comparison function when checking whether the provided and computed webhook signatures are equal, allowing attackers to use statistical methods to obtain a valid webhook signature.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-27T18:46:44.000000Z"}, {"uuid": "54029b95-d2cd-4ff3-8ecb-d63649793301", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36880", "type": "seen", "source": "https://t.me/cibsecurity/47057", "content": "\u203c CVE-2022-36880 \u203c\n\nThe Read Mail module in Webmin 1.995 and Usermin through 1.850 allows XSS via a crafted HTML e-mail message.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-27T07:35:50.000000Z"}, {"uuid": "9e039623-b504-4f80-84a4-20c8ec2b2261", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36889", "type": "seen", "source": "https://t.me/cibsecurity/47095", "content": "\u203c CVE-2022-36889 \u203c\n\nJenkins Deployer Framework Plugin 85.v1d1888e8c021 and earlier does not restrict the application path of the applications when configuring a deployment, allowing attackers with Item/Configure permission to upload arbitrary files from the Jenkins controller file system to the selected service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-27T18:49:52.000000Z"}, {"uuid": "b245b0f4-147a-4e21-b73d-7de1b25cf8d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-36886", "type": "seen", "source": "https://t.me/cibsecurity/47071", "content": "\u203c CVE-2022-36886 \u203c\n\nA cross-site request forgery (CSRF) vulnerability in Jenkins External Monitor Job Type Plugin 191.v363d0d1efdf8 and earlier allows attackers to create runs of an external job.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-07-27T18:46:38.000000Z"}]}