cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-29040,https://securityvulnerability.io/vulnerability/CVE-2022-29040,Stored Cross-Site Scripting in Git Parameter Plugin for Jenkins,"The Git Parameter Plugin for Jenkins contains a stored cross-site scripting vulnerability where the name and description of Git parameters are not properly escaped. This oversight can allow attackers with Item/Configure permission to inject malicious scripts into views that display these parameters, potentially compromising user interactions with the application.",Jenkins,Jenkins Git Parameter Plugin,5.4,MEDIUM,0.000539999979082495,false,,false,false,false,,,false,false,,2022-04-12T19:50:35.000Z,0 CVE-2022-27212,https://securityvulnerability.io/vulnerability/CVE-2022-27212,Stored Cross-Site Scripting Vulnerability in Jenkins List Git Branches Parameter Plugin,"The List Git Branches Parameter Plugin in Jenkins versions 0.0.9 and earlier has a security issue where the 'List Git branches (and more)' parameter name is not properly escaped. This oversight allows attackers with Item/Configure permissions to execute malicious scripts stored within the parameter's input, leading to a persistent cross-site scripting vulnerability. As a result, it could potentially compromise the integrity of the Jenkins environment and expose sensitive information to unauthorized users.",Jenkins,Jenkins List Git Branches Parameter Plugin,5.4,MEDIUM,0.0005000000237487257,false,,false,false,false,,,false,false,,2022-03-15T16:46:03.000Z,0 CVE-2020-2238,https://securityvulnerability.io/vulnerability/CVE-2020-2238,,"Jenkins Git Parameter Plugin 0.9.12 and earlier does not escape the repository field on the 'Build with Parameters' page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.",Jenkins,Jenkins Git Parameter Plugin,5.4,MEDIUM,0.0005000000237487257,false,,false,false,false,,,false,false,,2020-09-01T13:50:30.000Z,0 CVE-2020-2112,https://securityvulnerability.io/vulnerability/CVE-2020-2112,,"Jenkins Git Parameter Plugin 0.9.11 and earlier does not escape the parameter name shown on the UI, resulting in a stored cross-site scripting vulnerability exploitable by users with Job/Configure permission.",Jenkins,Jenkins Git Parameter Plugin,5.4,MEDIUM,0.0005000000237487257,false,,false,false,false,,,false,false,,2020-02-12T14:35:41.000Z,0 CVE-2020-2113,https://securityvulnerability.io/vulnerability/CVE-2020-2113,,"Jenkins Git Parameter Plugin 0.9.11 and earlier does not escape the default value shown on the UI, resulting in a stored cross-site scripting vulnerability exploitable by users with Job/Configure permission.",Jenkins,Jenkins Git Parameter Plugin,5.4,MEDIUM,0.0005000000237487257,false,,false,false,false,,,false,false,,2020-02-12T14:35:41.000Z,0