Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/jenkins-2-plugins@4.6.1601368321-1?arch=el8
Typerpm
Namespaceredhat
Namejenkins-2-plugins
Version4.6.1601368321-1
Qualifiers
arch el8
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1uad-jqyh-zqgq
vulnerability_id VCID-1uad-jqyh-zqgq
summary
Improper Validation of Certificate with Host Mismatch in Jenkins Mailer Plugin
Jenkins Mailer Plugin prior to 1.32.1, 1.31.1, and 1.29.1 does not perform hostname validation when connecting to the configured SMTP server. This lack of validation could be abused using a man-in-the-middle attack to intercept these connections.

Mailer Plugin 1.32.1, 1.31.1, and 1.29.1 validates the SMTP hostname when connecting via TLS by default. In Mailer Plugin 1.32 and earlier, administrators can set the Java system property mail.smtp.ssl.checkserveridentity to true on startup to enable this protection.

In case of problems, this protection can be disabled again by setting the Java system property mail.smtp.ssl.checkserveridentity to false on startup.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2252.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2252.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2252
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10508
published_at 2026-04-24T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10495
published_at 2026-04-02T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10565
published_at 2026-04-04T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10429
published_at 2026-04-07T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10504
published_at 2026-04-08T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.1057
published_at 2026-04-09T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10599
published_at 2026-04-11T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10567
published_at 2026-04-12T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10544
published_at 2026-04-13T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.1041
published_at 2026-04-16T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10393
published_at 2026-04-18T12:55:00Z
11
value 0.00036
scoring_system epss
scoring_elements 0.10522
published_at 2026-04-21T12:55:00Z
12
value 0.00036
scoring_system epss
scoring_elements 0.10384
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2252
2
reference_url https://github.com/CVEProject/cvelist/blob/16860a328d970faa6e4350b0fa446f64a52e52ca/2020/2xxx/CVE-2020-2252.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/CVEProject/cvelist/blob/16860a328d970faa6e4350b0fa446f64a52e52ca/2020/2xxx/CVE-2020-2252.json
3
reference_url https://github.com/jenkinsci/mailer-plugin/commit/e1893c6d105669f134ee5c5212ef9f3944d7d00d
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/mailer-plugin/commit/e1893c6d105669f134ee5c5212ef9f3944d7d00d
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2252
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-2252
5
reference_url https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1813
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1813
6
reference_url http://www.openwall.com/lists/oss-security/2020/09/16/3
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2020/09/16/3
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1880454
reference_id 1880454
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1880454
8
reference_url https://github.com/advisories/GHSA-6fr3-286q-q3cr
reference_id GHSA-6fr3-286q-q3cr
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-6fr3-286q-q3cr
9
reference_url https://access.redhat.com/errata/RHSA-2020:4297
reference_id RHSA-2020:4297
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4297
10
reference_url https://access.redhat.com/errata/RHSA-2020:5102
reference_id RHSA-2020:5102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5102
fixed_packages
aliases CVE-2020-2252, GHSA-6fr3-286q-q3cr
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1uad-jqyh-zqgq
1
url VCID-jj88-rbff-4ygb
vulnerability_id VCID-jj88-rbff-4ygb
summary
Missing permission check in Blue Ocean Plugin
### Updated 2020-09-16
This entry previously misidentified the problematic behavior. The HTTP request itself is legitimate, but only authorized users should be able to perform it.

### Original Description
Blue Ocean Plugin 1.23.2 and earlier does not perform permission checks in several HTTP endpoints implementing connection tests.

This allows attackers with Overall/Read permission to connect to an attacker-specified URL.

Blue Ocean Plugin 1.23.3 requires Item/Create permission to perform these connection tests.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2255.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2255.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2255
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.18965
published_at 2026-04-24T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19058
published_at 2026-04-07T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19138
published_at 2026-04-08T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19191
published_at 2026-04-09T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19197
published_at 2026-04-11T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.19151
published_at 2026-04-12T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19097
published_at 2026-04-13T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.19055
published_at 2026-04-16T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.19067
published_at 2026-04-18T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19076
published_at 2026-04-21T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.19155
published_at 2026-04-01T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.19289
published_at 2026-04-02T12:55:00Z
12
value 0.00061
scoring_system epss
scoring_elements 0.19342
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2255
2
reference_url https://github.com/jenkinsci/blueocean-plugin/commit/659a66aff0d0ad693eab9d2807985d591e102aab
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/blueocean-plugin/commit/659a66aff0d0ad693eab9d2807985d591e102aab
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2255
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-2255
4
reference_url https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1961
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1961
5
reference_url http://www.openwall.com/lists/oss-security/2020/09/16/3
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2020/09/16/3
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1880460
reference_id 1880460
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1880460
7
reference_url https://github.com/advisories/GHSA-vc7g-4269-f7hw
reference_id GHSA-vc7g-4269-f7hw
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-vc7g-4269-f7hw
8
reference_url https://access.redhat.com/errata/RHSA-2020:4297
reference_id RHSA-2020:4297
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4297
9
reference_url https://access.redhat.com/errata/RHSA-2020:5102
reference_id RHSA-2020:5102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5102
fixed_packages
aliases CVE-2020-2255, GHSA-vc7g-4269-f7hw
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jj88-rbff-4ygb
2
url VCID-sa11-2uur-8ybd
vulnerability_id VCID-sa11-2uur-8ybd
summary
Path traversal vulnerability in Blue Ocean Plugin
Blue Ocean Plugin 1.23.2 and earlier provides an undocumented feature flag, `blueocean.features.GIT_READ_SAVE_TYPE`, that when set to the value `clone` allows an attacker with Item/Configure or Item/Create permission to read arbitrary files on the Jenkins controller file system.

Blue Ocean Plugin 1.23.3 no longer includes this feature and redirects existing usage to a safer alternative.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2254.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2254.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2254
reference_id
reference_type
scores
0
value 0.02419
scoring_system epss
scoring_elements 0.85166
published_at 2026-04-24T12:55:00Z
1
value 0.02419
scoring_system epss
scoring_elements 0.85048
published_at 2026-04-01T12:55:00Z
2
value 0.02419
scoring_system epss
scoring_elements 0.85061
published_at 2026-04-02T12:55:00Z
3
value 0.02419
scoring_system epss
scoring_elements 0.85078
published_at 2026-04-04T12:55:00Z
4
value 0.02419
scoring_system epss
scoring_elements 0.85082
published_at 2026-04-07T12:55:00Z
5
value 0.02419
scoring_system epss
scoring_elements 0.85103
published_at 2026-04-08T12:55:00Z
6
value 0.02419
scoring_system epss
scoring_elements 0.85111
published_at 2026-04-09T12:55:00Z
7
value 0.02419
scoring_system epss
scoring_elements 0.85127
published_at 2026-04-11T12:55:00Z
8
value 0.02419
scoring_system epss
scoring_elements 0.85124
published_at 2026-04-12T12:55:00Z
9
value 0.02419
scoring_system epss
scoring_elements 0.85121
published_at 2026-04-13T12:55:00Z
10
value 0.02419
scoring_system epss
scoring_elements 0.85142
published_at 2026-04-21T12:55:00Z
11
value 0.02419
scoring_system epss
scoring_elements 0.85145
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2254
2
reference_url https://github.com/jenkinsci/blueocean-plugin
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/blueocean-plugin
3
reference_url https://github.com/jenkinsci/blueocean-plugin/commit/f0dd4b68d62ac3c3c85012d6eb0c92bcebf85e12
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/blueocean-plugin/commit/f0dd4b68d62ac3c3c85012d6eb0c92bcebf85e12
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2254
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-2254
5
reference_url https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1956
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1956
6
reference_url http://www.openwall.com/lists/oss-security/2020/09/16/3
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2020/09/16/3
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1880456
reference_id 1880456
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1880456
8
reference_url https://github.com/advisories/GHSA-vq7j-6pcq-f48p
reference_id GHSA-vq7j-6pcq-f48p
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-vq7j-6pcq-f48p
9
reference_url https://access.redhat.com/errata/RHSA-2020:4297
reference_id RHSA-2020:4297
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4297
10
reference_url https://access.redhat.com/errata/RHSA-2020:5102
reference_id RHSA-2020:5102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5102
fixed_packages
aliases CVE-2020-2254, GHSA-vq7j-6pcq-f48p
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sa11-2uur-8ybd
3
url VCID-sprz-dww1-vufr
vulnerability_id VCID-sprz-dww1-vufr
summary
Jenkins JIRA Plugin allows users to select and use credentials with System scope
Jenkins JIRA Plugin 3.0.10 and earlier does not declare the correct (folder) scope for per-folder Jira site definitions, allowing users to select and use credentials with System scope. Jira Plugin 3.0.11 defines the appropriate folder context for credential lookup. As a side effect, existing per-folder Jira sites may lose access to already configured System-scoped credentials, as if no credential was specified in the first place.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16541.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16541.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-16541
reference_id
reference_type
scores
0
value 0.00475
scoring_system epss
scoring_elements 0.64844
published_at 2026-04-24T12:55:00Z
1
value 0.00475
scoring_system epss
scoring_elements 0.64826
published_at 2026-04-21T12:55:00Z
2
value 0.00475
scoring_system epss
scoring_elements 0.64838
published_at 2026-04-18T12:55:00Z
3
value 0.00475
scoring_system epss
scoring_elements 0.64828
published_at 2026-04-16T12:55:00Z
4
value 0.00475
scoring_system epss
scoring_elements 0.6479
published_at 2026-04-13T12:55:00Z
5
value 0.00475
scoring_system epss
scoring_elements 0.64819
published_at 2026-04-12T12:55:00Z
6
value 0.00475
scoring_system epss
scoring_elements 0.6483
published_at 2026-04-11T12:55:00Z
7
value 0.00475
scoring_system epss
scoring_elements 0.64813
published_at 2026-04-09T12:55:00Z
8
value 0.00475
scoring_system epss
scoring_elements 0.64786
published_at 2026-04-04T12:55:00Z
9
value 0.00475
scoring_system epss
scoring_elements 0.64748
published_at 2026-04-07T12:55:00Z
10
value 0.00475
scoring_system epss
scoring_elements 0.64757
published_at 2026-04-02T12:55:00Z
11
value 0.00475
scoring_system epss
scoring_elements 0.64705
published_at 2026-04-01T12:55:00Z
12
value 0.00475
scoring_system epss
scoring_elements 0.64798
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-16541
2
reference_url https://github.com/jenkinsci/jira-plugin
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jira-plugin
3
reference_url https://github.com/jenkinsci/jira-plugin/commit/3214a54b6871d82cb34a26949aad93b0fa78d1a8
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jira-plugin/commit/3214a54b6871d82cb34a26949aad93b0fa78d1a8
4
reference_url https://jenkins.io/security/advisory/2019-11-21/#SECURITY-1106
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://jenkins.io/security/advisory/2019-11-21/#SECURITY-1106
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-16541
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
2
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
3
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-16541
6
reference_url http://www.openwall.com/lists/oss-security/2019/11/21/1
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2019/11/21/1
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1819663
reference_id 1819663
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1819663
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jira:*:*:*:*:*:jenkins:*:*
reference_id cpe:2.3:a:jenkins:jira:*:*:*:*:*:jenkins:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jira:*:*:*:*:*:jenkins:*:*
9
reference_url https://github.com/advisories/GHSA-98m4-m2c3-qxgq
reference_id GHSA-98m4-m2c3-qxgq
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-98m4-m2c3-qxgq
10
reference_url https://access.redhat.com/errata/RHSA-2020:3541
reference_id RHSA-2020:3541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3541
11
reference_url https://access.redhat.com/errata/RHSA-2020:4297
reference_id RHSA-2020:4297
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4297
fixed_packages
aliases CVE-2019-16541, GHSA-98m4-m2c3-qxgq
risk_score 4.5
exploitability 0.5
weighted_severity 8.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sprz-dww1-vufr
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins-2-plugins@4.6.1601368321-1%3Farch=el8