cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-34196,https://securityvulnerability.io/vulnerability/CVE-2022-34196,Stored Cross-Site Scripting Vulnerability in Jenkins REST List Parameter Plugin,"The Jenkins REST List Parameter Plugin prior to version 1.5.2 is susceptible to stored cross-site scripting (XSS) attacks. This vulnerability arises due to inadequate escaping of names and descriptions for REST list parameters displayed on views. Attackers with Item/Configure permissions can exploit this flaw, allowing them to execute malicious scripts in the context of users viewing such parameters. As a result, unauthorized actions or data exposure may occur, posing significant security risks for Jenkins installations.",Jenkins,Jenkins Rest List Parameter Plugin,5.4,MEDIUM,0.000539999979082495,false,,false,false,false,,,false,false,,2022-06-22T14:41:30.000Z,0 CVE-2021-21635,https://securityvulnerability.io/vulnerability/CVE-2021-21635,,"Jenkins REST List Parameter Plugin 1.3.0 and earlier does not escape a parameter name reference in embedded JavaScript, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.",Jenkins,Jenkins Rest List Parameter Plugin,5.4,MEDIUM,0.0005000000237487257,false,,false,false,false,,,false,false,,2021-03-30T11:10:38.000Z,0