cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2022-23107,https://securityvulnerability.io/vulnerability/CVE-2022-23107,,"Jenkins Warnings Next Generation Plugin 9.10.2 and earlier does not restrict the name of a file when configuring custom ID, allowing attackers with Item/Configure permission to write and read specific files with a hard-coded suffix on the Jenkins controller file system.",Jenkins,Jenkins Warnings Next Generation Plugin,8.1,HIGH,0.0010100000072270632,false,false,false,false,,false,false,2022-01-12T19:06:06.000Z,0 CVE-2021-21626,https://securityvulnerability.io/vulnerability/CVE-2021-21626,,"Jenkins Warnings Next Generation Plugin 8.4.4 and earlier does not perform a permission check in methods implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether attacker-specified file patterns match workspace contents.",Jenkins,Jenkins Warnings Next Generation Plugin,4.3,MEDIUM,0.0005000000237487257,false,false,false,false,,false,false,2021-03-18T13:35:24.000Z,0 CVE-2019-1003008,https://securityvulnerability.io/vulnerability/CVE-2019-1003008,,A cross-site request forgery vulnerability exists in Jenkins Warnings Next Generation Plugin 2.1.1 and earlier in src/main/java/io/jenkins/plugins/analysis/warnings/groovy/GroovyParser.java that allows attackers to execute arbitrary code via a form validation HTTP endpoint.,Jenkins,Jenkins Warnings Next Generation Plugin,8.8,HIGH,0.0009800000116229057,false,false,false,false,,false,false,2019-02-06T16:29:00.000Z,0 CVE-2019-1003023,https://securityvulnerability.io/vulnerability/CVE-2019-1003023,,"A cross-site scripting vulnerability exists in Jenkins Warnings Next Generation Plugin 1.0.1 and earlier in src/main/java/io/jenkins/plugins/analysis/core/model/DetailsTableModel.java, src/main/java/io/jenkins/plugins/analysis/core/model/SourceDetail.java, src/main/java/io/jenkins/plugins/analysis/core/model/SourcePrinter.java, src/main/java/io/jenkins/plugins/analysis/core/util/Sanitizer.java, src/main/java/io/jenkins/plugins/analysis/warnings/DuplicateCodeScanner.java that allows attackers with the ability to control warnings parser input to have Jenkins render arbitrary HTML.",Jenkins,Jenkins Warnings Next Generation Plugin,6.1,MEDIUM,0.0007900000200606883,false,false,false,false,,false,false,2019-02-06T16:29:00.000Z,0