{"vulnerability": "CVE-2023-4302", "sightings": [{"uuid": "d8ea945f-7902-4e44-8b11-91f1864229af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43029", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ll4qlzcijk25", "content": "", "creation_timestamp": "2025-03-24T12:21:16.473644Z"}, {"uuid": "7e9d575c-2702-45f2-91e3-27fd044619a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43029", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114201465597945778", "content": "", "creation_timestamp": "2025-03-21T16:54:34.812471Z"}, {"uuid": "8ed6c864-89d0-4564-9dc1-caa43dc0881a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43029", "type": "seen", "source": "https://t.me/cvedetector/20815", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-43029 - IBM Storage Virtualize vSphere Remote Plug-in Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2023-43029 \nPublished : March 21, 2025, 4:15 p.m. | 28\u00a0minutes ago \nDescription : IBM Storage Virtualize vSphere Remote Plug-in 1.0 and 1.1 could allow a remote user to obtain sensitive credential information after deployment. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-21T18:29:02.000000Z"}, {"uuid": "5c98b4ba-0a4d-42cb-90ac-76b02e611973", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-43029", "type": "seen", "source": "MISP/3e4b778d-5810-4171-a915-f1d106684af4", "content": "", "creation_timestamp": "2025-08-11T18:27:49.000000Z"}, {"uuid": "60df3c63-4ae5-466b-8f3a-9caa9ace6a4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4302", "type": "seen", "source": "https://t.me/cibsecurity/68916", "content": "\u203c CVE-2023-4302 \u203c\n\nA missing permission check in Jenkins Fortify Plugin 22.1.38 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-22T02:33:36.000000Z"}]}