cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-41246,https://securityvulnerability.io/vulnerability/CVE-2022-41246,Missing Permission Check in Jenkins Worksoft Execution Manager Plugin,"The Worksoft Execution Manager Plugin for Jenkins is susceptible to a missing permission check, which could allow users with Overall/Read permission to exploit the vulnerability. This enables attackers to connect to a URL specified by them, using credential IDs that can be acquired through other means. By doing so, they can capture sensitive credentials stored within Jenkins, posing significant risks to systems and data integrity.",Jenkins,Jenkins Worksoft Execution Manager Plugin,6.5,MEDIUM,0.0006500000017695129,false,,false,false,false,,,false,false,,2022-09-21T15:46:04.000Z,0 CVE-2022-41245,https://securityvulnerability.io/vulnerability/CVE-2022-41245,Cross-Site Request Forgery in Jenkins Worksoft Execution Manager Plugin,"A cross-site request forgery (CSRF) vulnerability in the Worksoft Execution Manager Plugin for Jenkins could allow attackers to connect to a malicious URL while utilizing credentials IDs that may have been obtained through other means. This security flaw compromises stored credentials within Jenkins, posing significant risks for organizations relying on this plugin.",Jenkins,Jenkins Worksoft Execution Manager Plugin,8.8,HIGH,0.0008500000112690032,false,,false,false,false,,,false,false,,2022-09-21T15:46:03.000Z,0