Lookup for vulnerable packages by Package URL.
| Purl | pkg:rpm/redhat/jenkins-2-plugins@4.6.1601368321-1?arch=el8 |
| Type | rpm |
| Namespace | redhat |
| Name | jenkins-2-plugins |
| Version | 4.6.1601368321-1 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | null |
| Latest_non_vulnerable_version | null |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-1uad-jqyh-zqgq |
| vulnerability_id |
VCID-1uad-jqyh-zqgq |
| summary |
Improper Validation of Certificate with Host Mismatch in Jenkins Mailer Plugin
Jenkins Mailer Plugin prior to 1.32.1, 1.31.1, and 1.29.1 does not perform hostname validation when connecting to the configured SMTP server. This lack of validation could be abused using a man-in-the-middle attack to intercept these connections.
Mailer Plugin 1.32.1, 1.31.1, and 1.29.1 validates the SMTP hostname when connecting via TLS by default. In Mailer Plugin 1.32 and earlier, administrators can set the Java system property mail.smtp.ssl.checkserveridentity to true on startup to enable this protection.
In case of problems, this protection can be disabled again by setting the Java system property mail.smtp.ssl.checkserveridentity to false on startup. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-2252 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10508 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10495 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10565 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10429 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10504 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1057 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10599 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10567 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10544 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1041 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10393 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10522 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10384 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-2252 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-2252, GHSA-6fr3-286q-q3cr
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1uad-jqyh-zqgq |
|
| 1 |
| url |
VCID-jj88-rbff-4ygb |
| vulnerability_id |
VCID-jj88-rbff-4ygb |
| summary |
Missing permission check in Blue Ocean Plugin
### Updated 2020-09-16
This entry previously misidentified the problematic behavior. The HTTP request itself is legitimate, but only authorized users should be able to perform it.
### Original Description
Blue Ocean Plugin 1.23.2 and earlier does not perform permission checks in several HTTP endpoints implementing connection tests.
This allows attackers with Overall/Read permission to connect to an attacker-specified URL.
Blue Ocean Plugin 1.23.3 requires Item/Create permission to perform these connection tests. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-2255 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18965 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19058 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19138 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19191 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19197 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19151 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19097 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19055 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19067 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19076 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19155 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19289 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19342 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-2255 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-2255, GHSA-vc7g-4269-f7hw
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jj88-rbff-4ygb |
|
| 2 |
| url |
VCID-sa11-2uur-8ybd |
| vulnerability_id |
VCID-sa11-2uur-8ybd |
| summary |
Path traversal vulnerability in Blue Ocean Plugin
Blue Ocean Plugin 1.23.2 and earlier provides an undocumented feature flag, `blueocean.features.GIT_READ_SAVE_TYPE`, that when set to the value `clone` allows an attacker with Item/Configure or Item/Create permission to read arbitrary files on the Jenkins controller file system.
Blue Ocean Plugin 1.23.3 no longer includes this feature and redirects existing usage to a safer alternative. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-2254 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02419 |
| scoring_system |
epss |
| scoring_elements |
0.85166 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.02419 |
| scoring_system |
epss |
| scoring_elements |
0.85048 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.02419 |
| scoring_system |
epss |
| scoring_elements |
0.85061 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02419 |
| scoring_system |
epss |
| scoring_elements |
0.85078 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.02419 |
| scoring_system |
epss |
| scoring_elements |
0.85082 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.02419 |
| scoring_system |
epss |
| scoring_elements |
0.85103 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02419 |
| scoring_system |
epss |
| scoring_elements |
0.85111 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02419 |
| scoring_system |
epss |
| scoring_elements |
0.85127 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.02419 |
| scoring_system |
epss |
| scoring_elements |
0.85124 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.02419 |
| scoring_system |
epss |
| scoring_elements |
0.85121 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.02419 |
| scoring_system |
epss |
| scoring_elements |
0.85142 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.02419 |
| scoring_system |
epss |
| scoring_elements |
0.85145 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-2254 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-2254, GHSA-vq7j-6pcq-f48p
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sa11-2uur-8ybd |
|
| 3 |
| url |
VCID-sprz-dww1-vufr |
| vulnerability_id |
VCID-sprz-dww1-vufr |
| summary |
Jenkins JIRA Plugin allows users to select and use credentials with System scope
Jenkins JIRA Plugin 3.0.10 and earlier does not declare the correct (folder) scope for per-folder Jira site definitions, allowing users to select and use credentials with System scope. Jira Plugin 3.0.11 defines the appropriate folder context for credential lookup. As a side effect, existing per-folder Jira sites may lose access to already configured System-scoped credentials, as if no credential was specified in the first place. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-16541 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64844 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64826 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64838 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64828 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.6479 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64819 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.6483 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64813 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64786 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64748 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64757 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64705 |
| published_at |
2026-04-01T12:55:00Z |
|
| 12 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64798 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-16541 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2019-16541 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:P/I:P/A:P |
|
| 1 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 2 |
| value |
9.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2019-16541 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-16541, GHSA-98m4-m2c3-qxgq
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
8.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sprz-dww1-vufr |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 4.5 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins-2-plugins@4.6.1601368321-1%3Farch=el8 |