cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-30951,https://securityvulnerability.io/vulnerability/CVE-2022-30951,Access Control Flaw in Jenkins WMI Windows Agents Plugin,"The Jenkins WMI Windows Agents Plugin, specifically versions 1.8 and earlier, is affected by an access control vulnerability that allows unauthorized users to initiate processes through the Windows Remote Command library. This flaw may pose significant risks as it enables users to execute commands despite lacking proper login credentials, leading to potential misuse or unauthorized actions within the system. Addressing this vulnerability is crucial for maintaining the integrity and security of Jenkins environments.",Jenkins,Jenkins Wmi Windows Agents Plugin,8.8,HIGH,0.0009299999801442027,false,,false,false,false,,,false,false,,2022-05-17T14:06:14.000Z,0 CVE-2022-30950,https://securityvulnerability.io/vulnerability/CVE-2022-30950,Buffer Overflow Vulnerability in Jenkins WMI Windows Agents Plugin,"The Jenkins WMI Windows Agents Plugin, specifically versions 1.8 and earlier, is susceptible to a buffer overflow vulnerability through the Windows Remote Command library. This flaw potentially allows unauthorized users with access to connect to a named pipe to execute arbitrary commands on the targeted Windows agent machine, posing significant security risks for environments utilizing Jenkins for automation. It is crucial for users to review their plugin versions and implement necessary updates to mitigate this vulnerability.",Jenkins,Jenkins Wmi Windows Agents Plugin,8.8,HIGH,0.0007699999841861427,false,,false,false,false,,,false,false,,2022-05-17T14:06:12.000Z,0