cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-34804,https://securityvulnerability.io/vulnerability/CVE-2022-34804,Exposure of API Keys in Jenkins OpsGenie Plugin from CloudBees,"The Jenkins OpsGenie Plugin versions 1.9 and earlier have a vulnerability where API keys are transmitted in plain text within the global Jenkins configuration form and job configuration forms. This exposure could allow malicious users to access sensitive information, potentially leading to unauthorized actions in connected systems. Users are encouraged to evaluate their configurations and consider upgrading to a secure version.",Jenkins,Jenkins Opsgenie Plugin,4.3,MEDIUM,0.000539999979082495,false,,false,false,false,,,false,false,,2022-06-30T17:48:29.000Z,0 CVE-2022-34803,https://securityvulnerability.io/vulnerability/CVE-2022-34803,API Key Exposure in Jenkins OpsGenie Plugin by CloudBees,"The Jenkins OpsGenie Plugin for Jenkins versions 1.9 and earlier insecurely stores API keys in an unencrypted format within its global configuration file and job config.xml files. This vulnerability allows users with Extended Read permissions or those with access to the Jenkins controller file system to view the sensitive API keys, potentially leading to unauthorized access and exploit of connected services.",Jenkins,Jenkins Opsgenie Plugin,4.3,MEDIUM,0.000539999979082495,false,,false,false,false,,,false,false,,2022-06-30T17:48:21.000Z,0