<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 15:54:41 +0000</lastBuildDate>
    <item>
      <title>652d105f-421d-47a9-a20e-b1f148edaa6a</title>
      <link>https://vulnerability.circl.lu/sighting/652d105f-421d-47a9-a20e-b1f148edaa6a/export</link>
      <description>{"uuid": "652d105f-421d-47a9-a20e-b1f148edaa6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34199", "type": "seen", "source": "https://t.me/cibsecurity/44989", "content": "\u203c CVE-2022-34199 \u203c\n\nJenkins Convertigo Mobile Platform Plugin 1.1 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-23T20:29:46.000000Z"}</description>
      <content:encoded>{"uuid": "652d105f-421d-47a9-a20e-b1f148edaa6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34199", "type": "seen", "source": "https://t.me/cibsecurity/44989", "content": "\u203c CVE-2022-34199 \u203c\n\nJenkins Convertigo Mobile Platform Plugin 1.1 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-23T20:29:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/652d105f-421d-47a9-a20e-b1f148edaa6a/export</guid>
      <pubDate>Thu, 23 Jun 2022 20:29:46 +0000</pubDate>
    </item>
    <item>
      <title>488d7337-a5fa-41e5-b6ba-c2fbe2f13e8e</title>
      <link>https://vulnerability.circl.lu/sighting/488d7337-a5fa-41e5-b6ba-c2fbe2f13e8e/export</link>
      <description>{"uuid": "488d7337-a5fa-41e5-b6ba-c2fbe2f13e8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34195", "type": "seen", "source": "https://t.me/cibsecurity/45004", "content": "\u203c CVE-2022-34195 \u203c\n\nJenkins Repository Connector Plugin 2.2.0 and earlier does not escape the name and description of Maven Repository Artifact parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-23T20:35:43.000000Z"}</description>
      <content:encoded>{"uuid": "488d7337-a5fa-41e5-b6ba-c2fbe2f13e8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34195", "type": "seen", "source": "https://t.me/cibsecurity/45004", "content": "\u203c CVE-2022-34195 \u203c\n\nJenkins Repository Connector Plugin 2.2.0 and earlier does not escape the name and description of Maven Repository Artifact parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-23T20:35:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/488d7337-a5fa-41e5-b6ba-c2fbe2f13e8e/export</guid>
      <pubDate>Thu, 23 Jun 2022 20:35:43 +0000</pubDate>
    </item>
    <item>
      <title>92b173b6-c52e-4da2-b8c6-d0783265adb6</title>
      <link>https://vulnerability.circl.lu/sighting/92b173b6-c52e-4da2-b8c6-d0783265adb6/export</link>
      <description>{"uuid": "92b173b6-c52e-4da2-b8c6-d0783265adb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34192", "type": "seen", "source": "https://t.me/cibsecurity/45005", "content": "\u203c CVE-2022-34192 \u203c\n\nJenkins ontrack Jenkins Plugin 4.0.0 and earlier does not escape the name of Ontrack: Multi Parameter choice, Ontrack: Parameter choice, and Ontrack: SingleParameter parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-23T20:35:44.000000Z"}</description>
      <content:encoded>{"uuid": "92b173b6-c52e-4da2-b8c6-d0783265adb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34192", "type": "seen", "source": "https://t.me/cibsecurity/45005", "content": "\u203c CVE-2022-34192 \u203c\n\nJenkins ontrack Jenkins Plugin 4.0.0 and earlier does not escape the name of Ontrack: Multi Parameter choice, Ontrack: Parameter choice, and Ontrack: SingleParameter parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-23T20:35:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/92b173b6-c52e-4da2-b8c6-d0783265adb6/export</guid>
      <pubDate>Thu, 23 Jun 2022 20:35:44 +0000</pubDate>
    </item>
    <item>
      <title>9552814e-264a-4085-b579-b994264c192e</title>
      <link>https://vulnerability.circl.lu/sighting/9552814e-264a-4085-b579-b994264c192e/export</link>
      <description>{"uuid": "9552814e-264a-4085-b579-b994264c192e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34191", "type": "seen", "source": "https://t.me/cibsecurity/45015", "content": "\u203c CVE-2022-34191 \u203c\n\nJenkins NS-ND Integration Performance Publisher Plugin 4.8.0.77 and earlier does not escape the name of NetStorm Test parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-23T20:35:59.000000Z"}</description>
      <content:encoded>{"uuid": "9552814e-264a-4085-b579-b994264c192e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34191", "type": "seen", "source": "https://t.me/cibsecurity/45015", "content": "\u203c CVE-2022-34191 \u203c\n\nJenkins NS-ND Integration Performance Publisher Plugin 4.8.0.77 and earlier does not escape the name of NetStorm Test parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-23T20:35:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9552814e-264a-4085-b579-b994264c192e/export</guid>
      <pubDate>Thu, 23 Jun 2022 20:35:59 +0000</pubDate>
    </item>
    <item>
      <title>ee427e94-1d8c-474a-8531-de1b62602074</title>
      <link>https://vulnerability.circl.lu/sighting/ee427e94-1d8c-474a-8531-de1b62602074/export</link>
      <description>{"uuid": "ee427e94-1d8c-474a-8531-de1b62602074", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34190", "type": "seen", "source": "https://t.me/cibsecurity/45026", "content": "\u203c CVE-2022-34190 \u203c\n\nJenkins Maven Metadata Plugin for Jenkins CI server Plugin 2.1 and earlier does not escape the name and description of List maven artifact versions parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-23T20:39:49.000000Z"}</description>
      <content:encoded>{"uuid": "ee427e94-1d8c-474a-8531-de1b62602074", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34190", "type": "seen", "source": "https://t.me/cibsecurity/45026", "content": "\u203c CVE-2022-34190 \u203c\n\nJenkins Maven Metadata Plugin for Jenkins CI server Plugin 2.1 and earlier does not escape the name and description of List maven artifact versions parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-23T20:39:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ee427e94-1d8c-474a-8531-de1b62602074/export</guid>
      <pubDate>Thu, 23 Jun 2022 20:39:49 +0000</pubDate>
    </item>
    <item>
      <title>6bf9bab4-a4db-4086-bd8e-612d5092b4e7</title>
      <link>https://vulnerability.circl.lu/sighting/6bf9bab4-a4db-4086-bd8e-612d5092b4e7/export</link>
      <description>{"uuid": "6bf9bab4-a4db-4086-bd8e-612d5092b4e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3419", "type": "seen", "source": "https://t.me/cibsecurity/52302", "content": "\u203c CVE-2022-3419 \u203c\n\nThe Automatic User Roles Switcher WordPress plugin before 1.1.2 does not have authorisation and proper CSRF checks, allowing any authenticated users like subscriber to add any role to themselves, such as administrator\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-31T19:38:18.000000Z"}</description>
      <content:encoded>{"uuid": "6bf9bab4-a4db-4086-bd8e-612d5092b4e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-3419", "type": "seen", "source": "https://t.me/cibsecurity/52302", "content": "\u203c CVE-2022-3419 \u203c\n\nThe Automatic User Roles Switcher WordPress plugin before 1.1.2 does not have authorisation and proper CSRF checks, allowing any authenticated users like subscriber to add any role to themselves, such as administrator\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-31T19:38:18.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6bf9bab4-a4db-4086-bd8e-612d5092b4e7/export</guid>
      <pubDate>Mon, 31 Oct 2022 19:38:18 +0000</pubDate>
    </item>
    <item>
      <title>797a528a-58fa-47f0-9035-52060beb0980</title>
      <link>https://vulnerability.circl.lu/sighting/797a528a-58fa-47f0-9035-52060beb0980/export</link>
      <description>{"uuid": "797a528a-58fa-47f0-9035-52060beb0980", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34191", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3m4amtxzqrr32", "content": "", "creation_timestamp": "2025-10-28T09:33:13.048967Z"}</description>
      <content:encoded>{"uuid": "797a528a-58fa-47f0-9035-52060beb0980", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-34191", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3m4amtxzqrr32", "content": "", "creation_timestamp": "2025-10-28T09:33:13.048967Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/797a528a-58fa-47f0-9035-52060beb0980/export</guid>
      <pubDate>Tue, 28 Oct 2025 09:33:13 +0000</pubDate>
    </item>
  </channel>
</rss>
