cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-2121,https://securityvulnerability.io/vulnerability/CVE-2020-2121,,"Jenkins Google Kubernetes Engine Plugin 0.8.0 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.",Jenkins,Jenkins Google Kubernetes Engine Plugin,8.8,HIGH,0.0018700000364333391,false,,false,false,false,,,false,false,,2020-02-12T14:35:45.000Z,0 CVE-2019-10445,https://securityvulnerability.io/vulnerability/CVE-2019-10445,,A missing permission check in Jenkins Google Kubernetes Engine Plugin 0.7.0 and earlier allowed attackers with Overall/Read permission to obtain limited information about the scope of a credential with an attacker-specified credentials ID.,Jenkins,Jenkins Google Kubernetes Engine Plugin,4.3,MEDIUM,0.0005000000237487257,false,,false,false,false,,,false,false,,2019-10-16T13:00:48.000Z,0 CVE-2019-10365,https://securityvulnerability.io/vulnerability/CVE-2019-10365,,"Jenkins Google Kubernetes Engine Plugin 0.6.2 and earlier created a temporary file containing a temporary access token in the project workspace, where it could be accessed by users with Job/Read permission.",Jenkins,Jenkins Google Kubernetes Engine Plugin,4.3,MEDIUM,0.0005600000149570405,false,,false,false,false,,,false,false,,2019-07-31T12:45:21.000Z,0