{"vulnerability": "CVE-2022-45392", "sightings": [{"uuid": "97ff3171-2cd3-4e96-8cfb-978031d90277", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45392", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lzyk6ullnhq2", "content": "", "creation_timestamp": "2025-09-29T17:33:53.792975Z"}, {"uuid": "a65fe6b8-8dbc-4202-80b1-616adeb92aa1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45392", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14095", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-45392\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.143 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by attackers with Extended Read permission, or access to the Jenkins controller file system.\n\ud83d\udccf Published: 2022-11-15T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-30T16:23:23.329Z\n\ud83d\udd17 References:\n1. https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2912\n2. http://www.openwall.com/lists/oss-security/2022/11/15/4", "creation_timestamp": "2025-04-30T17:13:11.000000Z"}]}