cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-34813,https://securityvulnerability.io/vulnerability/CVE-2022-34813,XPath Configuration Viewer Plugin Vulnerability in Jenkins,"The Jenkins XPath Configuration Viewer Plugin suffers from a vulnerability which allows users with Overall/Read permissions to create and delete XPath expressions without proper authorization. This flaw can lead to unauthorized modifications of sensitive configurations, posing a risk to the integrity of the Jenkins environment. Users are urged to evaluate their use of the affected plugin and apply any necessary updates to mitigate this risk.",Jenkins,Jenkins Xpath Configuration Viewer Plugin,4.3,MEDIUM,0.000539999979082495,false,,false,false,false,,,false,false,,2022-06-30T17:49:15.000Z,0 CVE-2022-34812,https://securityvulnerability.io/vulnerability/CVE-2022-34812,Cross-Site Request Forgery Vulnerability in Jenkins XPath Configuration Viewer Plugin,"A cross-site request forgery (CSRF) vulnerability exists in Jenkins XPath Configuration Viewer Plugin versions 1.1.1 and earlier. This flaw allows unauthorized attackers to create and delete XPath expressions on behalf of authenticated users, potentially impacting user data and system integrity. As a result, it is crucial for users to assess their installations and apply necessary security measures to mitigate potential exploitation. More details are provided in the Jenkins security advisory.",Jenkins,Jenkins Xpath Configuration Viewer Plugin,4.3,MEDIUM,0.0005300000193528831,false,,false,false,false,,,false,false,,2022-06-30T17:49:10.000Z,0 CVE-2022-34811,https://securityvulnerability.io/vulnerability/CVE-2022-34811,Missing Permission Check in Jenkins XPath Configuration Viewer Plugin,"A vulnerability exists in the Jenkins XPath Configuration Viewer Plugin prior to version 1.1.1, allowing users with Overall/Read permissions to gain unauthorized access to the XPath Configuration Viewer page. This lack of a proper permission check can lead to the exposure of sensitive configuration details, posing a risk to the integrity and security of the Jenkins environment. It is imperative for users to review their plugin versions and apply necessary updates to mitigate the risk.",Jenkins,Jenkins Xpath Configuration Viewer Plugin,4.3,MEDIUM,0.000539999979082495,false,,false,false,false,,,false,false,,2022-06-30T17:49:05.000Z,0