{"vulnerability": "CVE-2022-43413", "sightings": [{"uuid": "7cb50fb3-adb7-4996-b5f2-f71c1495d030", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43413", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3m2h7ashr75o2", "content": "", "creation_timestamp": "2025-10-05T13:28:14.237619Z"}, {"uuid": "eb4c5da7-cc01-4b27-8d0f-0510c100f6d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43413", "type": "seen", "source": "https://t.me/cibsecurity/51809", "content": "\u203c CVE-2022-43413 \u203c\n\nJenkins Job Import Plugin 3.5 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-19T20:15:34.000000Z"}]}