cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-30967,https://securityvulnerability.io/vulnerability/CVE-2022-30967,Stored Cross-Site Scripting in Jenkins Selection Tasks Plugin,"The Jenkins Selection Tasks Plugin prior to version 1.0 is susceptible to a stored cross-site scripting (XSS) vulnerability. This issue arises from the failure to properly escape the name and description of Script Selection task variable parameters when rendered in views that display these parameters. Attackers possessing Item/Configure permissions may exploit this vulnerability to inject malicious scripts into the application's interface, potentially compromising user sessions or executing unauthorized actions.",Jenkins,Jenkins Selection Tasks Plugin,5.4,MEDIUM,0.000539999979082495,false,,false,false,false,,,false,false,,2022-05-17T14:06:50.000Z,0 CVE-2020-2276,https://securityvulnerability.io/vulnerability/CVE-2020-2276,,"Jenkins Selection tasks Plugin 1.0 and earlier executes a user-specified program on the Jenkins controller, allowing attackers with Job/Configure permission to execute an arbitrary system command on the Jenkins controller as the OS user that the Jenkins process is running as.",Jenkins,Jenkins Selection Tasks Plugin,8.8,HIGH,0.0015200000489130616,false,,false,false,false,,,false,false,,2020-09-16T13:20:49.000Z,0