cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2020-2204,https://securityvulnerability.io/vulnerability/CVE-2020-2204,,A missing permission check in Jenkins Fortify on Demand Plugin 5.0.1 and earlier allows attackers with Overall/Read permission to connect to the globally configured Fortify on Demand endpoint using attacker-specified credentials IDs.,Jenkins,Jenkins Fortify On Demand Plugin,5.4,MEDIUM,0.0005000000237487257,false,false,false,false,,false,false,2020-07-02T14:55:34.000Z,0 CVE-2020-2202,https://securityvulnerability.io/vulnerability/CVE-2020-2202,,A missing permission check in Jenkins Fortify on Demand Plugin 6.0.0 and earlier in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.,Jenkins,Jenkins Fortify On Demand Plugin,4.3,MEDIUM,0.0005000000237487257,false,false,false,false,,false,false,2020-07-02T14:55:33.000Z,0 CVE-2020-2203,https://securityvulnerability.io/vulnerability/CVE-2020-2203,,A cross-site request forgery vulnerability in Jenkins Fortify on Demand Plugin 5.0.1 and earlier allows attackers to connect to the globally configured Fortify on Demand endpoint using attacker-specified credentials IDs.,Jenkins,Jenkins Fortify On Demand Plugin,4.3,MEDIUM,0.0005600000149570405,false,false,false,false,,false,false,2020-07-02T14:55:33.000Z,0 CVE-2019-10449,https://securityvulnerability.io/vulnerability/CVE-2019-10449,,"Jenkins Fortify on Demand Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.",Jenkins,Jenkins Fortify On Demand Plugin,8.8,HIGH,0.0010400000028312206,false,false,false,false,,false,false,2019-10-16T13:00:50.000Z,0 CVE-2019-1003046,https://securityvulnerability.io/vulnerability/CVE-2019-1003046,,A cross-site request forgery vulnerability in Jenkins Fortify on Demand Uploader Plugin 3.0.10 and earlier allows attackers to initiate a connection to an attacker-specified server.,Jenkins,Jenkins Fortify On Demand Uploader Plugin,6.5,MEDIUM,0.0016299999551847577,false,false,false,false,,false,false,2019-03-28T17:59:29.000Z,0 CVE-2019-1003047,https://securityvulnerability.io/vulnerability/CVE-2019-1003047,,A missing permission check in Jenkins Fortify on Demand Uploader Plugin 3.0.10 and earlier allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.,Jenkins,Jenkins Fortify On Demand Uploader Plugin,6.5,MEDIUM,0.0010900000343099236,false,false,false,false,,false,false,2019-03-28T17:59:29.000Z,0