cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2021-21651,https://securityvulnerability.io/vulnerability/CVE-2021-21651,,"Jenkins S3 publisher Plugin 0.11.6 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to obtain the list of configured profiles.",Jenkins,Jenkins S3 Publisher Plugin,4.3,MEDIUM,0.000539999979082495,false,,false,false,false,,,false,false,,2021-05-11T14:15:22.000Z,0 CVE-2021-21650,https://securityvulnerability.io/vulnerability/CVE-2021-21650,,"Jenkins S3 publisher Plugin 0.11.6 and earlier does not perform Run/Artifacts permission checks in various HTTP endpoints and API models, allowing attackers with Item/Read permission to obtain information about artifacts uploaded to S3, if the optional Run/Artifacts permission is enabled.",Jenkins,Jenkins S3 Publisher Plugin,4.3,MEDIUM,0.000539999979082495,false,,false,false,false,,,false,false,,2021-05-11T14:15:21.000Z,0 CVE-2020-2114,https://securityvulnerability.io/vulnerability/CVE-2020-2114,,"Jenkins S3 publisher Plugin 0.11.4 and earlier transmits configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.",Jenkins,Jenkins S3 Publisher Plugin,7.5,HIGH,0.0014900000533089042,false,,false,false,false,,,false,false,,2020-02-12T14:35:42.000Z,0