cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-46651,https://securityvulnerability.io/vulnerability/CVE-2023-46651,,"Jenkins Warnings Plugin 10.5.0 and earlier does not set the appropriate context for credentials lookup, allowing attackers with Item/Configure permission to access and capture credentials they are not entitled to. This fix has been backported to 10.4.1.",Jenkins,Jenkins Warnings Plugin,6.5,MEDIUM,0.0006099999882280827,false,false,false,false,,false,false,2023-10-25T18:17:00.000Z,0 CVE-2022-23107,https://securityvulnerability.io/vulnerability/CVE-2022-23107,,"Jenkins Warnings Next Generation Plugin 9.10.2 and earlier does not restrict the name of a file when configuring custom ID, allowing attackers with Item/Configure permission to write and read specific files with a hard-coded suffix on the Jenkins controller file system.",Jenkins,Jenkins Warnings Next Generation Plugin,8.1,HIGH,0.0010100000072270632,false,false,false,false,,false,false,2022-01-12T19:06:06.000Z,0 CVE-2021-21626,https://securityvulnerability.io/vulnerability/CVE-2021-21626,,"Jenkins Warnings Next Generation Plugin 8.4.4 and earlier does not perform a permission check in methods implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether attacker-specified file patterns match workspace contents.",Jenkins,Jenkins Warnings Next Generation Plugin,4.3,MEDIUM,0.0005000000237487257,false,false,false,false,,false,false,2021-03-18T13:35:24.000Z,0 CVE-2020-2280,https://securityvulnerability.io/vulnerability/CVE-2020-2280,,A cross-site request forgery (CSRF) vulnerability in Jenkins Warnings Plugin 5.0.1 and earlier allows attackers to execute arbitrary code.,Jenkins,Jenkins Warnings Plugin,8.8,HIGH,0.001180000021122396,false,false,false,false,,false,false,2020-09-23T13:10:18.000Z,0 CVE-2019-10326,https://securityvulnerability.io/vulnerability/CVE-2019-10326,,A cross-site request forgery vulnerability in Jenkins Warnings NG Plugin 5.0.0 and earlier allowed attackers to reset warning counts for future builds.,Jenkins,Jenkins Warnings Ng Plugin,4.3,MEDIUM,0.001560000004246831,false,false,false,false,,false,false,2019-05-31T14:20:19.000Z,0 CVE-2019-10325,https://securityvulnerability.io/vulnerability/CVE-2019-10325,,A cross-site scripting vulnerability in Jenkins Warnings NG Plugin 5.0.0 and earlier allowed attacker with Job/Configure permission to inject arbitrary JavaScript in build overview pages.,Jenkins,Jenkins Warnings Ng Plugin,5.4,MEDIUM,0.0006600000197067857,false,false,false,false,,false,false,2019-05-31T14:20:19.000Z,0 CVE-2019-1003007,https://securityvulnerability.io/vulnerability/CVE-2019-1003007,,A cross-site request forgery vulnerability exists in Jenkins Warnings Plugin 5.0.0 and earlier in src/main/java/hudson/plugins/warnings/GroovyParser.java that allows attackers to execute arbitrary code via a form validation HTTP endpoint.,Jenkins,Jenkins Warnings Plugin,8.8,HIGH,0.0009800000116229057,false,false,false,false,,false,false,2019-02-06T16:29:00.000Z,0 CVE-2019-1003023,https://securityvulnerability.io/vulnerability/CVE-2019-1003023,,"A cross-site scripting vulnerability exists in Jenkins Warnings Next Generation Plugin 1.0.1 and earlier in src/main/java/io/jenkins/plugins/analysis/core/model/DetailsTableModel.java, src/main/java/io/jenkins/plugins/analysis/core/model/SourceDetail.java, src/main/java/io/jenkins/plugins/analysis/core/model/SourcePrinter.java, src/main/java/io/jenkins/plugins/analysis/core/util/Sanitizer.java, src/main/java/io/jenkins/plugins/analysis/warnings/DuplicateCodeScanner.java that allows attackers with the ability to control warnings parser input to have Jenkins render arbitrary HTML.",Jenkins,Jenkins Warnings Next Generation Plugin,6.1,MEDIUM,0.0007900000200606883,false,false,false,false,,false,false,2019-02-06T16:29:00.000Z,0 CVE-2019-1003008,https://securityvulnerability.io/vulnerability/CVE-2019-1003008,,A cross-site request forgery vulnerability exists in Jenkins Warnings Next Generation Plugin 2.1.1 and earlier in src/main/java/io/jenkins/plugins/analysis/warnings/groovy/GroovyParser.java that allows attackers to execute arbitrary code via a form validation HTTP endpoint.,Jenkins,Jenkins Warnings Next Generation Plugin,8.8,HIGH,0.0009800000116229057,false,false,false,false,,false,false,2019-02-06T16:29:00.000Z,0