cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-2260,https://securityvulnerability.io/vulnerability/CVE-2020-2260,,A missing permission check in Jenkins Perfecto Plugin 1.17 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP URL using attacker-specified credentials.,Jenkins,Jenkins Perfecto Plugin,4.3,MEDIUM,0.0005000000237487257,false,,false,false,false,,,false,false,,2020-09-16T13:20:42.000Z,0 CVE-2020-2261,https://securityvulnerability.io/vulnerability/CVE-2020-2261,,"Jenkins Perfecto Plugin 1.17 and earlier executes a command on the Jenkins controller, allowing attackers with Job/Configure permission to run arbitrary commands on the Jenkins controller",Jenkins,Jenkins Perfecto Plugin,8.8,HIGH,0.0015200000489130616,false,,false,false,false,,,false,false,,2020-09-16T13:20:42.000Z,0 CVE-2019-1003095,https://securityvulnerability.io/vulnerability/CVE-2019-1003095,,Jenkins Perfecto Mobile Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.,Jenkins,Jenkins Perfecto Mobile Plugin,6.5,MEDIUM,0.0017099999822676182,false,,false,false,false,,,false,false,,2019-04-04T15:38:49.000Z,0