cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-2294,https://securityvulnerability.io/vulnerability/CVE-2020-2294,,"Jenkins Maven Cascade Release Plugin 1.3.2 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to start cascade builds and layout builds, and reconfigure the plugin.",Jenkins,Jenkins Maven Cascade Release Plugin,6.5,MEDIUM,0.0005000000237487257,false,,false,false,false,,,false,false,,2020-10-08T12:40:28.000Z,0 CVE-2020-2295,https://securityvulnerability.io/vulnerability/CVE-2020-2295,,"A cross-site request forgery (CSRF) vulnerability in Jenkins Maven Cascade Release Plugin 1.3.2 and earlier allows attackers to start cascade builds and layout builds, and reconfigure the plugin.",Jenkins,Jenkins Maven Cascade Release Plugin,6.5,MEDIUM,0.0005300000193528831,false,,false,false,false,,,false,false,,2020-10-08T12:40:28.000Z,0 CVE-2019-16549,https://securityvulnerability.io/vulnerability/CVE-2019-16549,,"Jenkins Maven Release Plugin 0.16.1 and earlier does not configure the XML parser to prevent XML external entity (XXE) attacks, allowing man-in-the-middle attackers to have Jenkins parse crafted XML documents.",Jenkins,Jenkins Maven Release Plugin,8.1,HIGH,0.0013699999544769526,false,,false,false,false,,,false,false,,2019-12-17T14:40:45.000Z,0 CVE-2019-16550,https://securityvulnerability.io/vulnerability/CVE-2019-16550,,A cross-site request forgery vulnerability in a connection test form method in Jenkins Maven Release Plugin 0.16.1 and earlier allows attackers to have Jenkins connect to an attacker specified web server and parse XML documents.,Jenkins,Jenkins Maven Release Plugin,8.8,HIGH,0.0008800000068731606,false,,false,false,false,,,false,false,,2019-12-17T14:40:45.000Z,0 CVE-2019-10361,https://securityvulnerability.io/vulnerability/CVE-2019-10361,,Jenkins Maven Release Plugin 0.14.0 and earlier stored credentials unencrypted on the Jenkins master where they could be viewed by users with access to the master file system.,Jenkins,Jenkins Maven Release Plugin,5.5,MEDIUM,0.0009200000204145908,false,,false,false,false,,,false,false,,2019-07-31T12:45:21.000Z,0 CVE-2019-10360,https://securityvulnerability.io/vulnerability/CVE-2019-10360,,A stored cross site scripting vulnerability in Jenkins Maven Release Plugin 0.14.0 and earlier allowed attackers to inject arbitrary HTML and JavaScript in the plugin-provided web pages in Jenkins.,Jenkins,Jenkins Maven Release Plugin,5.4,MEDIUM,0.0005000000237487257,false,,false,false,false,,,false,false,,2019-07-31T12:45:21.000Z,0 CVE-2019-10359,https://securityvulnerability.io/vulnerability/CVE-2019-10359,,A cross-site request forgery vulnerability in Jenkins Maven Release Plugin 0.14.0 and earlier in the M2ReleaseAction#doSubmit method allowed attackers to perform releases with attacker-specified options.,Jenkins,Jenkins Maven Release Plugin,6.3,MEDIUM,0.0006799999973736703,false,,false,false,false,,,false,false,,2019-07-31T12:45:21.000Z,0