cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-45393,https://securityvulnerability.io/vulnerability/CVE-2022-45393,Cross-Site Request Forgery in Jenkins Delete Log Plugin by Jenkins,"A cross-site request forgery (CSRF) vulnerability exists in the Delete Log Plugin for Jenkins, affecting version 1.0 and earlier. This flaw allows attackers to manipulate the plugin, enabling them to delete build logs without proper authorization. If exploited, an attacker could execute unwanted actions on behalf of legitimate users, potentially leading to a loss of crucial build information and hindering development processes.",Jenkins,Jenkins Delete log Plugin,3.5,LOW,0.0004799999878741801,false,,false,false,false,,,false,false,,2022-11-15T00:00:00.000Z,0 CVE-2022-45394,https://securityvulnerability.io/vulnerability/CVE-2022-45394,Missing Permission Check in Jenkins Delete Log Plugin Exposes Build Logs to Deletion,"A security issue in the Jenkins Delete Log Plugin, particularly in versions 1.0 and earlier, allows any user with Item/Read permission to delete build logs without proper authorization. This vulnerability can lead to unauthorized users manipulating sensitive build data, potentially obscuring important development history and hindering project accountability. Organizations utilizing this plugin are advised to review their permissions carefully and apply necessary updates to secure their CI/CD pipelines.",Jenkins,Jenkins Delete Log Plugin,4.3,MEDIUM,0.0005000000237487257,false,,false,false,false,,,false,false,,2022-11-15T00:00:00.000Z,0 CVE-2022-34815,https://securityvulnerability.io/vulnerability/CVE-2022-34815,Cross-Site Request Forgery Vulnerability in Jenkins Request Rename Or Delete Plugin,"A cross-site request forgery (CSRF) vulnerability in the Jenkins Request Rename Or Delete Plugin enables attackers to manipulate pending requests. This flaw allows unauthorized users to rename or delete existing jobs without proper validation. By exploiting this vulnerability, an attacker could potentially disrupt essential workflows, posing a risk to the integrity of Jenkins-managed operations. For more information, refer to the Jenkins security advisory.",Jenkins,Jenkins Request Rename Or Delete Plugin,4.3,MEDIUM,0.0005300000193528831,false,,false,false,false,,,false,false,,2022-06-30T17:49:28.000Z,0 CVE-2022-34814,https://securityvulnerability.io/vulnerability/CVE-2022-34814,Unauthorized Access in Jenkins Request Rename Or Delete Plugin,"The Request Rename Or Delete Plugin for Jenkins versions 1.1.0 and earlier contains a vulnerability where it fails to adequately validate permissions for an HTTP endpoint. This oversight permits users with Overall/Read access to access restricted administrative configuration pages, potentially compromising sensitive information about pending requests.",Jenkins,Jenkins Request Rename Or Delete Plugin,4.3,MEDIUM,0.000539999979082495,false,,false,false,false,,,false,false,,2022-06-30T17:49:22.000Z,0