cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-25195,https://securityvulnerability.io/vulnerability/CVE-2022-25195,Permission Check Flaw in Jenkins Autonomiq Plugin by Jenkins,A vulnerability exists in the Jenkins Autonomiq Plugin versions 1.15 and earlier due to a missing permission check. Attackers who have Overall/Read permissions can leverage this flaw to connect to arbitrary URLs using compromised credentials. This major security gap could lead to unauthorized access and potential exploitation if not addressed promptly. It is essential for users and administrators to take necessary actions to mitigate risks associated with this vulnerability.,Jenkins,Jenkins Autonomiq Plugin,4.3,MEDIUM,0.000539999979082495,false,,false,false,false,,,false,false,,2022-02-15T16:11:25.000Z,0 CVE-2022-25194,https://securityvulnerability.io/vulnerability/CVE-2022-25194,Cross-Site Request Forgery in Jenkins Autonomiq Plugin,"A vulnerability in the Jenkins Autonomiq Plugin allows attackers to initiate unauthorized actions by leveraging cross-site request forgery techniques. This flaw enables the manipulation of server connections using attacker-defined URLs and credentials, thereby posing a significant risk to affected systems. Users of Jenkins Autonomiq Plugin versions 1.15 and earlier should review their configurations and apply necessary security practices to mitigate potential exploitation.",Jenkins,Jenkins Autonomiq Plugin,8.8,HIGH,0.0007300000288523734,false,,false,false,false,,,false,false,,2022-02-15T16:11:23.000Z,0