cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-50771,https://securityvulnerability.io/vulnerability/CVE-2023-50771,,"Jenkins OpenId Connect Authentication Plugin 2.6 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins, allowing attackers to perform phishing attacks.",Jenkins,Jenkins OpenId Connect Authentication Plugin,6.1,MEDIUM,0.0006799999973736703,false,false,false,false,,false,false,2023-12-13T18:15:00.000Z,0 CVE-2023-50770,https://securityvulnerability.io/vulnerability/CVE-2023-50770,,"Jenkins OpenId Connect Authentication Plugin 2.6 and earlier stores a password of a local user account used as an anti-lockout feature in a recoverable format, allowing attackers with access to the Jenkins controller file system to recover the plain text password of that account, likely gaining administrator access to Jenkins.",Jenkins,Jenkins OpenId Connect Authentication Plugin,6.7,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2023-12-13T18:15:00.000Z,0 CVE-2023-24424,https://securityvulnerability.io/vulnerability/CVE-2023-24424,Session Management Flaw in Jenkins OpenId Connect Authentication Plugin,"The Jenkins OpenId Connect Authentication Plugin versions 2.4 and earlier suffer from a session management vulnerability where the application does not properly invalidate the previous session upon user login. This flaw allows an attacker to potentially exploit existing session tokens, which can lead to unauthorized access to user accounts and sensitive information. It is critical for users to ensure that their installations of this plugin are updated to mitigate this risk and enhance their overall security posture.",Jenkins,Jenkins OpenId Connect Authentication Plugin,8.8,HIGH,0.0020099999383091927,false,false,false,false,,false,false,2023-01-26T21:18:00.000Z,0 CVE-2019-1003021,https://securityvulnerability.io/vulnerability/CVE-2019-1003021,,"An exposure of sensitive information vulnerability exists in Jenkins OpenId Connect Authentication Plugin 1.4 and earlier in OicSecurityRealm/config.jelly that allows attackers able to view a Jenkins administrator's web browser output, or control the browser (e.g. malicious extension) to retrieve the configured client secret.",Jenkins,Jenkins Openid Connect Authentication Plugin,4.3,MEDIUM,0.0007900000200606883,false,false,false,false,,false,false,2019-02-06T16:29:00.000Z,0