cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-37942,https://securityvulnerability.io/vulnerability/CVE-2023-37942,XXE Vulnerability in Jenkins External Monitor Job Type Plugin,"The External Monitor Job Type Plugin for Jenkins prior to version 206.v9a_94ff0b_4a_10 is susceptible to XML External Entity (XXE) attacks due to improper XML parser configuration. This oversight allows attackers to manipulate XML data and potentially exploit sensitive information, posing risks to data integrity and confidentiality within Jenkins environments.",Jenkins,Jenkins External Monitor Job Type Plugin,6.5,MEDIUM,0.0005000000237487257,false,,false,false,false,,,false,false,,2023-07-12T16:15:00.000Z,0 CVE-2022-36886,https://securityvulnerability.io/vulnerability/CVE-2022-36886,Cross-Site Request Forgery Vulnerability in Jenkins External Monitor Job Type Plugin,"A cross-site request forgery vulnerability has been identified in the Jenkins External Monitor Job Type Plugin, allowing attackers to craft requests that can create runs of external jobs without proper authentication. This could lead to unauthorized actions being executed within the Jenkins environment, compromising the integrity and security of the CI/CD pipeline. Users of affected plugin versions are urged to review their security configurations and apply necessary precautions.",Jenkins,Jenkins External Monitor Job Type Plugin,4.3,MEDIUM,0.0010600000387057662,false,,false,false,false,,,false,false,,2022-07-27T14:21:51.000Z,0