cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-30530,https://securityvulnerability.io/vulnerability/CVE-2023-30530,Unencrypted Storage Vulnerability in Jenkins Consul KV Builder Plugin by Jenkins,"The Jenkins Consul KV Builder Plugin versions 2.0.13 and earlier contain a serious vulnerability where the HashiCorp Consul ACL Token is stored unencrypted in the global configuration file on the Jenkins controller. This allows unauthorized users with file system access to view sensitive information, compromising the security integrity of the Jenkins environment. Proper security measures must be implemented to protect sensitive data and prevent unauthorized access.",Jenkins,Jenkins Consul KV Builder Plugin,4.3,MEDIUM,0.0006500000017695129,false,,false,false,false,,,false,false,,2023-04-12T18:15:00.000Z,0 CVE-2023-30531,https://securityvulnerability.io/vulnerability/CVE-2023-30531,Information Disclosure Vulnerability in Jenkins Consul KV Builder Plugin,"The Jenkins Consul KV Builder Plugin, up to version 2.0.13, contains a vulnerability that fails to adequately mask the HashiCorp Consul ACL Token within the global configuration form. This oversight increases the risk of attackers observing and capturing sensitive token information, potentially compromising the security of systems utilizing this plugin.",Jenkins,Jenkins Consul KV Builder Plugin,6.5,MEDIUM,0.0008099999977275729,false,,false,false,false,,,false,false,,2023-04-12T18:15:00.000Z,0