cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-34198,https://securityvulnerability.io/vulnerability/CVE-2022-34198,Stored Cross-Site Scripting Vulnerability in Jenkins Stash Branch Parameter Plugin,"The Jenkins Stash Branch Parameter Plugin versions 0.3.0 and prior allow an attacker with Item/Configure permission to exploit a stored cross-site scripting (XSS) vulnerability. This is due to the plugin's failure to properly escape the name and description of Stash Branch parameters when rendering them in views. Consequently, malicious users can inject scripts that will execute in the context of users visiting affected views, potentially leading to unauthorized actions and data exposure.",Jenkins,Jenkins Stash Branch Parameter Plugin,5.4,MEDIUM,0.000539999979082495,false,,false,false,false,,,false,false,,2022-06-23T17:15:00.000Z,0 CVE-2020-2210,https://securityvulnerability.io/vulnerability/CVE-2020-2210,,"Jenkins Stash Branch Parameter Plugin 0.3.0 and earlier transmits configured passwords in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure.",Jenkins,Jenkins Stash Branch Parameter Plugin,4.3,MEDIUM,0.0006600000197067857,false,,false,false,false,,,false,false,,2020-07-02T14:55:36.000Z,0