{"vulnerability": "CVE-2023-4033", "sightings": [{"uuid": "a43701bb-2856-4a1c-b657-33c814766386", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40331", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113647345751945858", "content": "", "creation_timestamp": "2024-12-13T20:14:36.732134Z"}, {"uuid": "77790d96-bf35-4703-82fe-3f2fca6b6af3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40334", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113647345765413560", "content": "", "creation_timestamp": "2024-12-13T20:14:37.089382Z"}, {"uuid": "1044f8b1-eab8-4ce7-a12b-274991e70668", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40338", "type": "seen", "source": "https://t.me/cibsecurity/68668", "content": "\u203c CVE-2023-40338 \u203c\n\nJenkins Folders Plugin 6.846.v23698686f0f6 and earlier displays an error message that includes an absolute path of a log file when attempting to access the Scan Organization Folder Log if no logs are available, exposing information about the Jenkins controller file system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-16T18:52:45.000000Z"}, {"uuid": "15b789fb-b610-4207-8b1c-32da32c82e8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40330", "type": "seen", "source": "https://t.me/cibsecurity/71060", "content": "\u203c CVE-2023-40330 \u203c\n\nUnauth. Reflected Cross-Site Scripting (XSS) vulnerability in Milan Petrovic GD Security Headers plugin &lt;=\u00c2\u00a01.6.1 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-27T18:35:59.000000Z"}, {"uuid": "29f3792e-6491-4764-827d-a4867d087471", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40339", "type": "seen", "source": "https://t.me/cibsecurity/68660", "content": "\u203c CVE-2023-40339 \u203c\n\nJenkins Config File Provider Plugin 952.va_544a_6234b_46 and earlier does not mask (i.e., replace with asterisks) credentials specified in configuration files when they're written to the build log.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-16T18:49:53.000000Z"}, {"uuid": "4ca5de91-92c9-4a4e-89eb-c86a0c4492f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-40337", "type": "seen", "source": "https://t.me/cibsecurity/68657", "content": "\u203c CVE-2023-40337 \u203c\n\nA cross-site request forgery (CSRF) vulnerability in Jenkins Folders Plugin 6.846.v23698686f0f6 and earlier allows attackers to copy a view inside a folder.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-16T18:49:47.000000Z"}]}