cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-28160,https://securityvulnerability.io/vulnerability/CVE-2022-28160,File Read Vulnerability in Jenkins Tests Selector Plugin by Jenkins,"The Jenkins Tests Selector Plugin versions 1.3.3 and earlier are susceptible to a file read vulnerability that allows users with Item/Configure permissions to access arbitrary files on the Jenkins controller. This may lead to exposure of sensitive information, potentially compromising the integrity and security of Jenkins environments.",Jenkins,Jenkins Tests Selector Plugin,6.5,MEDIUM,0.0006300000241026282,false,,false,false,false,,,false,false,,2022-03-29T12:31:27.000Z,0 CVE-2022-28159,https://securityvulnerability.io/vulnerability/CVE-2022-28159,Stored Cross-Site Scripting Vulnerability in Jenkins Tests Selector Plugin,"The Jenkins Tests Selector Plugin, versions 1.3.3 and earlier, contains a vulnerability due to inadequate escaping of the Properties File Path option in the Choosing Tests parameters. This flaw allows authenticated users with Item/Configure permissions to inject malicious scripts, which may execute when other users interact with the affected elements, leading to a stored cross-site scripting (XSS) attack. It is crucial for users of affected versions to apply the latest updates to mitigate these security risks.",Jenkins,Jenkins Tests Selector Plugin,5.4,MEDIUM,0.0005000000237487257,false,,false,false,false,,,false,false,,2022-03-29T12:31:25.000Z,0