cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-2108,https://securityvulnerability.io/vulnerability/CVE-2020-2108,,Jenkins WebSphere Deployer Plugin 1.6.1 and earlier does not configure the XML parser to prevent XXE attacks which can be exploited by a user with Job/Configure permissions.,Jenkins,Jenkins Websphere Deployer Plugin,7.6,HIGH,0.0009299999801442027,false,,false,false,false,,,false,false,,2020-01-29T15:15:31.000Z,0 CVE-2019-16560,https://securityvulnerability.io/vulnerability/CVE-2019-16560,,A cross-site request forgery vulnerability in Jenkins WebSphere Deployer Plugin 1.6.1 and earlier allows attackers to perform connection tests and determine whether files with an attacker-specified path exist on the Jenkins master file system.,Jenkins,Jenkins Websphere Deployer Plugin,8.8,HIGH,0.0008800000068731606,false,,false,false,false,,,false,false,,2019-12-17T14:40:50.000Z,0 CVE-2019-16561,https://securityvulnerability.io/vulnerability/CVE-2019-16561,,Jenkins WebSphere Deployer Plugin 1.6.1 and earlier allows users with Overall/Read access to disable SSL/TLS certificate and hostname validation for the entire Jenkins master JVM.,Jenkins,Jenkins Websphere Deployer Plugin,7.1,HIGH,0.0006300000241026282,false,,false,false,false,,,false,false,,2019-12-17T14:40:50.000Z,0 CVE-2019-16559,https://securityvulnerability.io/vulnerability/CVE-2019-16559,,A missing permission check in Jenkins WebSphere Deployer Plugin 1.6.1 and earlier allows attackers with Overall/Read permission to perform connection tests and determine whether files with an attacker-specified path exist on the Jenkins master file system.,Jenkins,Jenkins Websphere Deployer Plugin,5.4,MEDIUM,0.0005000000237487257,false,,false,false,false,,,false,false,,2019-12-17T14:40:49.000Z,0 CVE-2019-1003056,https://securityvulnerability.io/vulnerability/CVE-2019-1003056,,"Jenkins WebSphere Deployer Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.",Jenkins,Jenkins Websphere Deployer Plugin,8.8,HIGH,0.0031799999997019768,false,,false,false,false,,,false,false,,2019-04-04T15:38:48.000Z,0