cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2021-21681,https://securityvulnerability.io/vulnerability/CVE-2021-21681,Unencrypted Password Storage in Jenkins Nomad Plugin by CloudBees,"The Jenkins Nomad Plugin versions 0.7.4 and earlier expose a significant vulnerability by storing Docker passwords in an unencrypted format within the global config.xml file on the Jenkins controller. This practice allows users with file system access to the controller to easily view sensitive information like Docker credentials, potentially compromising system integrity and security. It is crucial for users of this plugin to upgrade to a version that addresses this vulnerability to safeguard their environments.",Jenkins,Jenkins Nomad Plugin,5.5,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2021-08-31T13:50:20.000Z,0 CVE-2019-1003093,https://securityvulnerability.io/vulnerability/CVE-2019-1003093,,A missing permission check in Jenkins Nomad Plugin in the NomadCloud.DescriptorImpl#doTestConnection form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server.,Jenkins,Jenkins Nomad Plugin,6.5,MEDIUM,0.0010900000343099236,false,,false,false,false,,,false,false,,2019-04-04T15:38:49.000Z,0 CVE-2019-1003092,https://securityvulnerability.io/vulnerability/CVE-2019-1003092,,A cross-site request forgery vulnerability in Jenkins Nomad Plugin in the NomadCloud.DescriptorImpl#doTestConnection form validation method allows attackers to initiate a connection to an attacker-specified server.,Jenkins,Jenkins Nomad Plugin,6.5,MEDIUM,0.0016299999551847577,false,,false,false,false,,,false,false,,2019-04-04T15:38:49.000Z,0