cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-49653,https://securityvulnerability.io/vulnerability/CVE-2023-49653,,"Jenkins Jira Plugin 3.11 and earlier does not set the appropriate context for credentials lookup, allowing attackers with Item/Configure permission to access and capture credentials they are not entitled to.",Jenkins,Jenkins Jira Plugin,6.5,MEDIUM,0.0006099999882280827,false,false,false,false,,false,false,2023-11-29T14:15:00.000Z,0 CVE-2023-24439,https://securityvulnerability.io/vulnerability/CVE-2023-24439,,Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier stores the private keys unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.,Jenkins,Jenkins JIRA Pipeline Steps Plugin,5.5,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2023-01-26T21:18:00.000Z,0 CVE-2023-24437,https://securityvulnerability.io/vulnerability/CVE-2023-24437,Cross-Site Request Forgery in Jenkins JIRA Pipeline Plugin by Jenkins,"A cross-site request forgery vulnerability exists in the Jenkins JIRA Pipeline Steps Plugin, allowing attackers to exploit the system. By leveraging this flaw, an attacker can connect to a specified URL using credentials IDs that they have acquired through other means. This exploitation opens the door for confidential information to be compromised, as attackers can access credentials stored in Jenkins, thereby jeopardizing the security posture of affected installations.",Jenkins,Jenkins JIRA Pipeline Steps Plugin,8.8,HIGH,0.000750000006519258,false,false,false,false,,false,false,2023-01-26T21:18:00.000Z,0 CVE-2023-24440,https://securityvulnerability.io/vulnerability/CVE-2023-24440,,"Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier transmits the private key in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.",Jenkins,Jenkins JIRA Pipeline Steps Plugin,5.5,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2023-01-26T21:18:00.000Z,0 CVE-2023-24438,https://securityvulnerability.io/vulnerability/CVE-2023-24438,,"A missing permission check in Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.",Jenkins,Jenkins JIRA Pipeline Steps Plugin,6.5,MEDIUM,0.0006500000017695129,false,false,false,false,,false,false,2023-01-26T21:18:00.000Z,0 CVE-2022-29041,https://securityvulnerability.io/vulnerability/CVE-2022-29041,,"Jenkins Jira Plugin 3.7 and earlier, except 3.6.1, does not escape the name and description of Jira Issue and Jira Release Version parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.",Jenkins,Jenkins Jira Plugin,5.4,MEDIUM,0.000539999979082495,false,false,false,false,,false,false,2022-04-12T19:50:36.000Z,0 CVE-2021-21652,https://securityvulnerability.io/vulnerability/CVE-2021-21652,,"A cross-site request forgery (CSRF) vulnerability in Jenkins Xray - Test Management for Jira Plugin 2.4.0 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.",Jenkins,Jenkins Xray - Test Management For Jira Plugin,7.1,HIGH,0.0006799999973736703,false,false,false,false,,false,false,2021-05-11T14:15:23.000Z,0 CVE-2021-21653,https://securityvulnerability.io/vulnerability/CVE-2021-21653,,"Jenkins Xray - Test Management for Jira Plugin 2.4.0 and earlier does not perform a permission check in an HTTP endpoint, allowing with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.",Jenkins,Jenkins Xray - Test Management For Jira Plugin,4.3,MEDIUM,0.000539999979082495,false,false,false,false,,false,false,2021-05-11T14:15:23.000Z,0 CVE-2020-2216,https://securityvulnerability.io/vulnerability/CVE-2020-2216,,A missing permission check in Jenkins Zephyr for JIRA Test Management Plugin 1.5 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified username and password.,Jenkins,Jenkins Zephyr For Jira Test Management Plugin,4.3,MEDIUM,0.0005000000237487257,false,false,false,false,,false,false,2020-07-02T14:55:39.000Z,0 CVE-2020-2215,https://securityvulnerability.io/vulnerability/CVE-2020-2215,,A cross-site request forgery vulnerability in Jenkins Zephyr for JIRA Test Management Plugin 1.5 and earlier allows attackers to connect to an attacker-specified HTTP server using attacker-specified username and password.,Jenkins,Jenkins Zephyr For Jira Test Management Plugin,4.3,MEDIUM,0.0005300000193528831,false,false,false,false,,false,false,2020-07-02T14:55:38.000Z,0 CVE-2020-2154,https://securityvulnerability.io/vulnerability/CVE-2020-2154,,Jenkins Zephyr for JIRA Test Management Plugin 1.5 and earlier stores its credentials in plain text in a global configuration file on the Jenkins master file system.,Jenkins,Jenkins Zephyr For Jira Test Management Plugin,5.5,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2020-03-09T15:01:04.000Z,0 CVE-2019-16545,https://securityvulnerability.io/vulnerability/CVE-2019-16545,,"Jenkins QMetry for JIRA - Test Management Plugin transmits credentials in its configuration in plain text as part of job configuration forms, potentially resulting in their exposure.",Jenkins,Jenkins Qmetry For Jira - Test Management Plugin,6.5,MEDIUM,0.0006300000241026282,false,false,false,false,,false,false,2019-11-21T14:11:23.000Z,0 CVE-2019-16544,https://securityvulnerability.io/vulnerability/CVE-2019-16544,,"Jenkins QMetry for JIRA - Test Management Plugin 1.12 and earlier stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.",Jenkins,Jenkins Qmetry For Jira - Test Management Plugin,8.8,HIGH,0.0009299999801442027,false,false,false,false,,false,false,2019-11-21T14:11:22.000Z,0 CVE-2019-16541,https://securityvulnerability.io/vulnerability/CVE-2019-16541,,"Jenkins JIRA Plugin 3.0.10 and earlier does not declare the correct (folder) scope for per-folder Jira site definitions, allowing users to select and use credentials with System scope.",Jenkins,Jenkins Jira Plugin,9.9,CRITICAL,0.0009299999801442027,false,false,false,false,,false,false,2019-11-21T14:11:21.000Z,0 CVE-2019-10302,https://securityvulnerability.io/vulnerability/CVE-2019-10302,,Jenkins jira-ext Plugin 0.8 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.,Jenkins,Jenkins Jira-ext Plugin,8.8,HIGH,0.00171999994199723,false,false,false,false,,false,false,2019-04-18T16:54:18.000Z,0 CVE-2019-1003054,https://securityvulnerability.io/vulnerability/CVE-2019-1003054,,"Jenkins Jira Issue Updater Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.",Jenkins,Jenkins Jira Issue Updater Plugin,8.8,HIGH,0.0031799999997019768,false,false,false,false,,false,false,2019-04-04T15:38:47.000Z,0