cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-2316,https://securityvulnerability.io/vulnerability/CVE-2020-2316,,"Jenkins Static Analysis Utilities Plugin 1.96 and earlier does not escape the annotation message in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.",Jenkins,Jenkins Static Analysis Utilities Plugin,5.4,MEDIUM,0.000539999979082495,false,,false,false,false,,,false,false,,2020-11-04T14:35:44.000Z,0 CVE-2019-10307,https://securityvulnerability.io/vulnerability/CVE-2019-10307,,A cross-site request forgery vulnerability in Jenkins Static Analysis Utilities Plugin 1.95 and earlier in the DefaultGraphConfigurationView#doSave form handler method allowed attackers to change the per-job default graph configuration for all users.,Jenkins,Jenkins Static Analysis Utilities Plugin,6.5,MEDIUM,0.0016700000269338489,false,,false,false,false,,,false,false,,2019-04-30T12:25:17.000Z,0 CVE-2019-10308,https://securityvulnerability.io/vulnerability/CVE-2019-10308,,A missing permission check in Jenkins Static Analysis Utilities Plugin 1.95 and earlier in the DefaultGraphConfigurationView#doSave form handler method allowed attackers with Overall/Read permission to change the per-job default graph configuration for all users.,Jenkins,Jenkins Static Analysis Utilities Plugin,6.5,MEDIUM,0.0010900000343099236,false,,false,false,false,,,false,false,,2019-04-30T12:25:17.000Z,0