cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-23106,https://securityvulnerability.io/vulnerability/CVE-2022-23106,Authentication Token Vulnerability in Jenkins Configuration as Code Plugin,"The Jenkins Configuration as Code Plugin prior to version 1.56 employs a flawed token validation method, utilizing a non-constant time comparison function. This weakness permits attackers to leverage statistical techniques to derive a valid authentication token, potentially compromising security by gaining unauthorized access. Administrators are advised to review their installed versions and apply necessary updates to mitigate this risk.",Jenkins,Jenkins Configuration As Code Plugin,5.3,MEDIUM,0.0007099999929778278,false,,false,false,false,,,false,false,,2022-01-12T00:00:00.000Z,0 CVE-2019-10367,https://securityvulnerability.io/vulnerability/CVE-2019-10367,,"Due to an incomplete fix of CVE-2019-10343, Jenkins Configuration as Code Plugin 1.26 and earlier did not properly apply masking to some values expected to be hidden when logging the configuration being applied.",Jenkins,Jenkins Configuration As Code Plugin,5.5,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2019-08-07T14:20:23.000Z,0 CVE-2019-10363,https://securityvulnerability.io/vulnerability/CVE-2019-10363,,Jenkins Configuration as Code Plugin 1.24 and earlier did not reliably identify sensitive values expected to be exported in their encrypted form.,Jenkins,Jenkins Configuration As Code Plugin,4.9,MEDIUM,0.000699999975040555,false,,false,false,false,,,false,false,,2019-07-31T12:45:21.000Z,0 CVE-2019-10362,https://securityvulnerability.io/vulnerability/CVE-2019-10362,,"Jenkins Configuration as Code Plugin 1.24 and earlier did not escape values resulting in variable interpolation during configuration import when exporting, allowing attackers with permission to change Jenkins system configuration to obtain the values of environment variables.",Jenkins,Jenkins Configuration As Code Plugin,5.4,MEDIUM,0.0005699999746866524,false,,false,false,false,,,false,false,,2019-07-31T12:45:21.000Z,0 CVE-2019-10344,https://securityvulnerability.io/vulnerability/CVE-2019-10344,,Missing permission checks in Jenkins Configuration as Code Plugin 1.24 and earlier in various HTTP endpoints allowed users with Overall/Read access to access the generated schema and documentation for this plugin containing detailed information about installed plugins.,Jenkins,Jenkins Configuration As Code Plugin,4.3,MEDIUM,0.0005600000149570405,false,,false,false,false,,,false,false,,2019-07-31T12:45:21.000Z,0 CVE-2019-10345,https://securityvulnerability.io/vulnerability/CVE-2019-10345,,Jenkins Configuration as Code Plugin 1.20 and earlier did not treat the proxy password as a secret to be masked when logging or encrypted for export.,Jenkins,Jenkins Configuration As Code Plugin,5.5,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2019-07-31T12:45:21.000Z,0 CVE-2019-10343,https://securityvulnerability.io/vulnerability/CVE-2019-10343,,Jenkins Configuration as Code Plugin 1.24 and earlier did not properly apply masking to values expected to be hidden when logging the configuration being applied.,Jenkins,Jenkins Configuration As Code Plugin,3.3,LOW,0.0004400000034365803,false,,false,false,false,,,false,false,,2019-07-31T12:45:20.000Z,0