cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2019-10462,https://securityvulnerability.io/vulnerability/CVE-2019-10462,,A cross-site request forgery vulnerability in Jenkins Dynatrace Application Monitoring Plugin 2.1.3 and earlier allowed attackers to connect to an attacker-specified URL using attacker-specified credentials.,Jenkins,Jenkins Dynatrace Application Monitoring Plugin,8.1,HIGH,0.0007099999929778278,false,,false,false,false,,,false,false,,2019-10-23T12:45:39.000Z,0 CVE-2019-10463,https://securityvulnerability.io/vulnerability/CVE-2019-10463,,A missing permission check in Jenkins Dynatrace Application Monitoring Plugin allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.,Jenkins,Jenkins Dynatrace Application Monitoring Plugin,6.5,MEDIUM,0.0006300000241026282,false,,false,false,false,,,false,false,,2019-10-23T12:45:39.000Z,0 CVE-2019-10461,https://securityvulnerability.io/vulnerability/CVE-2019-10461,,Jenkins Dynatrace Application Monitoring Plugin 2.1.3 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.,Jenkins,Jenkins Dynatrace Application Monitoring Plugin,7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2019-10-23T12:45:38.000Z,0