<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 16:17:54 +0000</lastBuildDate>
    <item>
      <title>fdc23fa0-bd5b-40ae-828a-aac1bc360af6</title>
      <link>https://vulnerability.circl.lu/sighting/fdc23fa0-bd5b-40ae-828a-aac1bc360af6/export</link>
      <description>{"uuid": "fdc23fa0-bd5b-40ae-828a-aac1bc360af6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-13022", "type": "seen", "source": "https://t.me/cibsecurity/12075", "content": "ATENTION\u203c New - CVE-2019-13022\n\nBond JetSelect (all versions) has an issue in the Java class (ENCtool.jar) and corresponding password generation algorithm (used to set initial passwords upon first installation). It XORs the plaintext into the 'encrypted' password that is then stored within the database. These steps are able to be trivially reversed, allowing for escalation of privilege within the JetSelect application through obtaining the passwords of JetSelect administrators. JetSelect administrators have the ability to modify and delete all networking configuration across a vessel, as well as altering network configuration of all managed network devices (switches, routers).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-05-14T20:34:31.000000Z"}</description>
      <content:encoded>{"uuid": "fdc23fa0-bd5b-40ae-828a-aac1bc360af6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-13022", "type": "seen", "source": "https://t.me/cibsecurity/12075", "content": "ATENTION\u203c New - CVE-2019-13022\n\nBond JetSelect (all versions) has an issue in the Java class (ENCtool.jar) and corresponding password generation algorithm (used to set initial passwords upon first installation). It XORs the plaintext into the 'encrypted' password that is then stored within the database. These steps are able to be trivially reversed, allowing for escalation of privilege within the JetSelect application through obtaining the passwords of JetSelect administrators. JetSelect administrators have the ability to modify and delete all networking configuration across a vessel, as well as altering network configuration of all managed network devices (switches, routers).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-05-14T20:34:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fdc23fa0-bd5b-40ae-828a-aac1bc360af6/export</guid>
      <pubDate>Thu, 14 May 2020 20:34:31 +0000</pubDate>
    </item>
    <item>
      <title>2f0b71a8-e887-4d44-9ebe-a1530cce55bb</title>
      <link>https://vulnerability.circl.lu/sighting/2f0b71a8-e887-4d44-9ebe-a1530cce55bb/export</link>
      <description>{"uuid": "2f0b71a8-e887-4d44-9ebe-a1530cce55bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-13022", "type": "seen", "source": "https://t.me/cibsecurity/12077", "content": "ATENTION\u203c New - CVE-2019-13021\n\nThe administrative passwords for all versions of Bond JetSelect are stored within an unprotected file on the filesystem, rather than encrypted within the MySQL database. This backup copy of the passwords is made as part of the installation script, after the administrator has generated a password using ENCtool.jar (see CVE-2019-13022). This allows any low-privilege user who can read this file to trivially obtain the passwords for the administrative accounts of the JetSelect application. The path to the file containing the encoded password hash is /opt/JetSelect/SFC/resources/sfc-general-properties.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-05-14T21:04:25.000000Z"}</description>
      <content:encoded>{"uuid": "2f0b71a8-e887-4d44-9ebe-a1530cce55bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-13022", "type": "seen", "source": "https://t.me/cibsecurity/12077", "content": "ATENTION\u203c New - CVE-2019-13021\n\nThe administrative passwords for all versions of Bond JetSelect are stored within an unprotected file on the filesystem, rather than encrypted within the MySQL database. This backup copy of the passwords is made as part of the installation script, after the administrator has generated a password using ENCtool.jar (see CVE-2019-13022). This allows any low-privilege user who can read this file to trivially obtain the passwords for the administrative accounts of the JetSelect application. The path to the file containing the encoded password hash is /opt/JetSelect/SFC/resources/sfc-general-properties.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-05-14T21:04:25.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2f0b71a8-e887-4d44-9ebe-a1530cce55bb/export</guid>
      <pubDate>Thu, 14 May 2020 21:04:25 +0000</pubDate>
    </item>
    <item>
      <title>708a3d87-7224-4c03-bd83-8c3c2feb4556</title>
      <link>https://vulnerability.circl.lu/sighting/708a3d87-7224-4c03-bd83-8c3c2feb4556/export</link>
      <description>{"uuid": "708a3d87-7224-4c03-bd83-8c3c2feb4556", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-13022", "type": "seen", "source": "https://t.me/VulnerabilityNews/14583", "content": "The administrative passwords for all versions of Bond JetSelect are stored within an unprotected file on the filesystem, rather than encrypted within the MySQL database. This backup copy of the passwords is made as part of the installation script, after the administrator has generated a password using ENCtool.jar (see CVE-2019-13022). This allows any low-privilege user who can read this file to trivially obtain the passwords for the administrative accounts of the JetSelect application. The path to the file containing the encoded password hash is /opt/JetSelect/SFC/resources/sfc-general-properties.\nPublished at: May 14, 2020 at 07:15PM\nView on website", "creation_timestamp": "2020-05-14T23:29:29.000000Z"}</description>
      <content:encoded>{"uuid": "708a3d87-7224-4c03-bd83-8c3c2feb4556", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-13022", "type": "seen", "source": "https://t.me/VulnerabilityNews/14583", "content": "The administrative passwords for all versions of Bond JetSelect are stored within an unprotected file on the filesystem, rather than encrypted within the MySQL database. This backup copy of the passwords is made as part of the installation script, after the administrator has generated a password using ENCtool.jar (see CVE-2019-13022). This allows any low-privilege user who can read this file to trivially obtain the passwords for the administrative accounts of the JetSelect application. The path to the file containing the encoded password hash is /opt/JetSelect/SFC/resources/sfc-general-properties.\nPublished at: May 14, 2020 at 07:15PM\nView on website", "creation_timestamp": "2020-05-14T23:29:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/708a3d87-7224-4c03-bd83-8c3c2feb4556/export</guid>
      <pubDate>Thu, 14 May 2020 23:29:29 +0000</pubDate>
    </item>
  </channel>
</rss>
