cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-28668,https://securityvulnerability.io/vulnerability/CVE-2023-28668,Authorization Flaw in Jenkins Role-based Authorization Strategy Plugin,"The Role-based Authorization Strategy Plugin for Jenkins contains a significant vulnerability that permits permissions to remain active even if they have been explicitly disabled. This flaw could lead to unauthorized access to restricted areas of a Jenkins instance, posing serious security risks. Users and administrators are advised to review their configurations and apply the appropriate updates as recommended in the latest security advisory.",Jenkins,Jenkins Role-based Authorization Strategy Plugin,9.8,CRITICAL,0.0020099999383091927,false,,false,false,false,,,false,false,,2023-04-02T21:15:00.000Z,0 CVE-2021-21624,https://securityvulnerability.io/vulnerability/CVE-2021-21624,,"An incorrect permission check in Jenkins Role-based Authorization Strategy Plugin 3.1 and earlier allows attackers with Item/Read permission on nested items to access them, even if they lack Item/Read permission for parent folders.",Jenkins,Jenkins Role-based Authorization Strategy Plugin,4.3,MEDIUM,0.0005000000237487257,false,,false,false,false,,,false,false,,2021-03-18T13:35:22.000Z,0 CVE-2020-2286,https://securityvulnerability.io/vulnerability/CVE-2020-2286,,"Jenkins Role-based Authorization Strategy Plugin 3.0 and earlier does not properly invalidate a permission cache when the configuration is changed, resulting in permissions being granted based on an outdated configuration.",Jenkins,Jenkins Role-based Authorization Strategy Plugin,8.8,HIGH,0.002940000034868717,false,,false,false,false,,,false,false,,2020-10-08T12:40:24.000Z,0