cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-2242,https://securityvulnerability.io/vulnerability/CVE-2020-2242,,A missing permission check in Jenkins database Plugin 1.6 and earlier allows attackers with Overall/Read access to Jenkins to connect to an attacker-specified database server using attacker-specified credentials.,Jenkins,Jenkins Database Plugin,6.5,MEDIUM,0.0005000000237487257,false,,false,false,false,,,false,false,,2020-09-01T13:50:32.000Z,0 CVE-2020-2241,https://securityvulnerability.io/vulnerability/CVE-2020-2241,,A cross-site request forgery (CSRF) vulnerability in Jenkins database Plugin 1.6 and earlier allows attackers to connect to an attacker-specified database server using attacker-specified credentials.,Jenkins,Jenkins Database Plugin,8.8,HIGH,0.0008800000068731606,false,,false,false,false,,,false,false,,2020-09-01T13:50:31.000Z,0 CVE-2020-2240,https://securityvulnerability.io/vulnerability/CVE-2020-2240,,A cross-site request forgery (CSRF) vulnerability in Jenkins database Plugin 1.6 and earlier allows attackers to execute arbitrary SQL scripts.,Jenkins,Jenkins Database Plugin,8.8,HIGH,0.0008800000068731606,false,,false,false,false,,,false,false,,2020-09-01T13:50:31.000Z,0 CVE-2019-1003076,https://securityvulnerability.io/vulnerability/CVE-2019-1003076,,A cross-site request forgery vulnerability in Jenkins Audit to Database Plugin in the DbAuditPublisherDescriptorImpl#doTestJdbcConnection form validation method allows attackers to initiate a connection to an attacker-specified server.,Jenkins,Jenkins Audit To Database Plugin,6.5,MEDIUM,0.0016299999551847577,false,,false,false,false,,,false,false,,2019-04-04T15:38:48.000Z,0 CVE-2019-1003077,https://securityvulnerability.io/vulnerability/CVE-2019-1003077,,A missing permission check in Jenkins Audit to Database Plugin in the DbAuditPublisherDescriptorImpl#doTestJdbcConnection form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.,Jenkins,Jenkins Audit To Database Plugin,6.5,MEDIUM,0.0010900000343099236,false,,false,false,false,,,false,false,,2019-04-04T15:38:48.000Z,0 CVE-2019-1003075,https://securityvulnerability.io/vulnerability/CVE-2019-1003075,,Jenkins Audit to Database Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.,Jenkins,Jenkins Audit To Database Plugin,8.8,HIGH,0.0031799999997019768,false,,false,false,false,,,false,false,,2019-04-04T15:38:48.000Z,0