cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-36902,https://securityvulnerability.io/vulnerability/CVE-2022-36902,Stored Cross-Site Scripting Vulnerability in Jenkins Dynamic Extended Choice Parameter Plugin by Jenkins,"The Jenkins Dynamic Extended Choice Parameter Plugin versions up to 1.0.1 contain a vulnerability that allows for stored cross-site scripting. This issue arises because the plugin does not properly escape multiple fields associated with Moded Extended Choice parameters. An attacker with Item/Configure permissions can exploit this vulnerability to execute arbitrary JavaScript in the context of the users interacting with the affected system, potentially leading to unauthorized actions and data exposure.",Jenkins,Jenkins Dynamic Extended Choice Parameter Plugin,5.4,MEDIUM,0.0005000000237487257,false,,false,false,false,,,false,false,,2022-07-27T14:25:15.000Z,0 CVE-2022-34186,https://securityvulnerability.io/vulnerability/CVE-2022-34186,Stored Cross-Site Scripting Vulnerability in Jenkins Dynamic Extended Choice Parameter Plugin,"The Dynamic Extended Choice Parameter Plugin for Jenkins has a vulnerability that allows attackers with Item/Configure permissions to inject malicious scripts. This occurs because the plugin does not properly escape the name and description of Moded Extended Choice parameters when displayed on views, leading to potential exploitation via stored cross-site scripting (XSS) attacks. Users are advised to upgrade to the latest versions to mitigate this security risk.",Jenkins,Jenkins Dynamic Extended Choice Parameter Plugin,5.4,MEDIUM,0.000539999979082495,false,,false,false,false,,,false,false,,2022-06-23T17:15:00.000Z,0 CVE-2020-2124,https://securityvulnerability.io/vulnerability/CVE-2020-2124,,"Jenkins Dynamic Extended Choice Parameter Plugin 1.0.1 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system.",Jenkins,Jenkins Dynamic Extended Choice Parameter Plugin,4.3,MEDIUM,0.0005000000237487257,false,,false,false,false,,,false,false,,2020-02-12T14:35:46.000Z,0