cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-2148,https://securityvulnerability.io/vulnerability/CVE-2020-2148,,A missing permission check in Jenkins Mac Plugin 1.1.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials.,Jenkins,Jenkins Mac Plugin,4.3,MEDIUM,0.0005000000237487257,false,,false,false,false,,,false,false,,2020-03-09T15:01:02.000Z,0 CVE-2020-2146,https://securityvulnerability.io/vulnerability/CVE-2020-2146,,"Jenkins Mac Plugin 1.1.0 and earlier does not validate SSH host keys when connecting agents created by the plugin, enabling man-in-the-middle attacks.",Jenkins,Jenkins Mac Plugin,7.4,HIGH,0.00107999995816499,false,,false,false,false,,,false,false,,2020-03-09T15:01:01.000Z,0 CVE-2020-2147,https://securityvulnerability.io/vulnerability/CVE-2020-2147,,A cross-site request forgery vulnerability in Jenkins Mac Plugin 1.1.0 and earlier allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials.,Jenkins,Jenkins Mac Plugin,4.3,MEDIUM,0.0005300000193528831,false,,false,false,false,,,false,false,,2020-03-09T15:01:01.000Z,0