cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-28160,https://securityvulnerability.io/vulnerability/CVE-2024-28160,Jenkins iceScrum Plugin vulnerable to XSS exploitation,"Jenkins iceScrum Plugin 1.1.6 and earlier does not sanitize iceScrum project URLs on build views, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure jobs.",Jenkins,Jenkins Icescrum Plugin,,,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-03-06T17:02:01.368Z,0 CVE-2019-10442,https://securityvulnerability.io/vulnerability/CVE-2019-10442,,A missing permission check in Jenkins iceScrum Plugin 1.1.5 and earlier allowed attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.,Jenkins,Jenkins Icescrum Plugin,4.3,MEDIUM,0.0005000000237487257,false,,false,false,false,,,false,false,,2019-10-16T13:00:47.000Z,0 CVE-2019-10443,https://securityvulnerability.io/vulnerability/CVE-2019-10443,,"Jenkins iceScrum Plugin 1.1.4 and earlier stored credentials unencrypted in job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system.",Jenkins,Jenkins Icescrum Plugin,8.8,HIGH,0.00913000013679266,false,,false,false,false,,,false,false,,2019-10-16T13:00:47.000Z,0 CVE-2019-10441,https://securityvulnerability.io/vulnerability/CVE-2019-10441,,A cross-site request forgery vulnerability in Jenkins iceScrum Plugin 1.1.5 and earlier allowed attackers to connect to an attacker-specified URL using attacker-specified credentials.,Jenkins,Jenkins Icescrum Plugin,4.3,MEDIUM,0.0005300000193528831,false,,false,false,false,,,false,false,,2019-10-16T13:00:46.000Z,0