Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/atomic-enterprise-service-catalog@1:3.11.117-1.git.1.376e432?arch=el7
Typerpm
Namespaceredhat
Nameatomic-enterprise-service-catalog
Version1:3.11.117-1.git.1.376e432
Qualifiers
arch el7
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-6wmw-rn4w-vqf5
vulnerability_id VCID-6wmw-rn4w-vqf5
summary
Cross-site Scripting
The `f:validateButton` form control for the Jenkins UI did not properly escape job URLs resulting in a cross-site scripting (XSS) vulnerability exploitable by users with the ability to control job names.
references
0
reference_url https://access.redhat.com/errata/RHBA-2019:1605
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHBA-2019:1605
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1003050.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1003050.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-1003050
reference_id
reference_type
scores
0
value 0.0093
scoring_system epss
scoring_elements 0.76163
published_at 2026-04-24T12:55:00Z
1
value 0.0093
scoring_system epss
scoring_elements 0.76034
published_at 2026-04-01T12:55:00Z
2
value 0.0093
scoring_system epss
scoring_elements 0.76036
published_at 2026-04-02T12:55:00Z
3
value 0.0093
scoring_system epss
scoring_elements 0.76069
published_at 2026-04-04T12:55:00Z
4
value 0.0093
scoring_system epss
scoring_elements 0.76049
published_at 2026-04-07T12:55:00Z
5
value 0.0093
scoring_system epss
scoring_elements 0.76082
published_at 2026-04-08T12:55:00Z
6
value 0.0093
scoring_system epss
scoring_elements 0.76096
published_at 2026-04-09T12:55:00Z
7
value 0.0093
scoring_system epss
scoring_elements 0.76121
published_at 2026-04-11T12:55:00Z
8
value 0.0093
scoring_system epss
scoring_elements 0.76098
published_at 2026-04-12T12:55:00Z
9
value 0.0093
scoring_system epss
scoring_elements 0.76095
published_at 2026-04-13T12:55:00Z
10
value 0.0093
scoring_system epss
scoring_elements 0.76136
published_at 2026-04-16T12:55:00Z
11
value 0.0093
scoring_system epss
scoring_elements 0.7614
published_at 2026-04-18T12:55:00Z
12
value 0.0093
scoring_system epss
scoring_elements 0.76123
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-1003050
3
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
4
reference_url https://github.com/jenkinsci/jenkins/commit/8eb632dda219ec8796420ce58d9564cddf8f8f93
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/8eb632dda219ec8796420ce58d9564cddf8f8f93
5
reference_url https://github.com/jenkinsci/jenkins/commit/d393c7e9ba3ec44953ef1f8b11839421e2649ee7
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/d393c7e9ba3ec44953ef1f8b11839421e2649ee7
6
reference_url https://jenkins.io/security/advisory/2019-04-10/#SECURITY-1327
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://jenkins.io/security/advisory/2019-04-10/#SECURITY-1327
7
reference_url https://www.oracle.com/security-alerts/cpuapr2022.html
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuapr2022.html
8
reference_url http://www.securityfocus.com/bid/107889
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/107889
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1699333
reference_id 1699333
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1699333
10
reference_url https://security.archlinux.org/ASA-201904-7
reference_id ASA-201904-7
reference_type
scores
url https://security.archlinux.org/ASA-201904-7
11
reference_url https://security.archlinux.org/AVG-948
reference_id AVG-948
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-948
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-1003050
reference_id CVE-2019-1003050
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
1
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-1003050
17
reference_url https://github.com/advisories/GHSA-qpg9-83fv-x9ch
reference_id GHSA-qpg9-83fv-x9ch
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-qpg9-83fv-x9ch
fixed_packages
aliases CVE-2019-1003050, GHSA-qpg9-83fv-x9ch
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6wmw-rn4w-vqf5
1
url VCID-ftky-shfy-bufk
vulnerability_id VCID-ftky-shfy-bufk
summary
Unsafe entry in Script Security list of approved signatures in Pipeline Remote Loader Plugin
Jenkins Pipeline Remote Loader Plugin before 1.5 provided a custom whitelist for script security that allowed attackers to invoke arbitrary methods, bypassing typical sandbox protection.
references
0
reference_url https://access.redhat.com/errata/RHBA-2019:1605
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHBA-2019:1605
1
reference_url https://access.redhat.com/errata/RHSA-2019:1636
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:1636
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10328.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10328.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10328
reference_id
reference_type
scores
0
value 0.00276
scoring_system epss
scoring_elements 0.51121
published_at 2026-04-11T12:55:00Z
1
value 0.00276
scoring_system epss
scoring_elements 0.51053
published_at 2026-04-24T12:55:00Z
2
value 0.00276
scoring_system epss
scoring_elements 0.50988
published_at 2026-04-01T12:55:00Z
3
value 0.00276
scoring_system epss
scoring_elements 0.51042
published_at 2026-04-02T12:55:00Z
4
value 0.00276
scoring_system epss
scoring_elements 0.51066
published_at 2026-04-04T12:55:00Z
5
value 0.00276
scoring_system epss
scoring_elements 0.51024
published_at 2026-04-07T12:55:00Z
6
value 0.00276
scoring_system epss
scoring_elements 0.51081
published_at 2026-04-08T12:55:00Z
7
value 0.00276
scoring_system epss
scoring_elements 0.51077
published_at 2026-04-09T12:55:00Z
8
value 0.00276
scoring_system epss
scoring_elements 0.51099
published_at 2026-04-12T12:55:00Z
9
value 0.00276
scoring_system epss
scoring_elements 0.51105
published_at 2026-04-21T12:55:00Z
10
value 0.00276
scoring_system epss
scoring_elements 0.51128
published_at 2026-04-18T12:55:00Z
11
value 0.00276
scoring_system epss
scoring_elements 0.51122
published_at 2026-04-16T12:55:00Z
12
value 0.00276
scoring_system epss
scoring_elements 0.51083
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10328
4
reference_url https://github.com/jenkinsci/workflow-remote-loader-plugin
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/workflow-remote-loader-plugin
5
reference_url https://github.com/jenkinsci/workflow-remote-loader-plugin/commit/6f9d60f614359720ec98e22b80ba15e8bf88e712
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/workflow-remote-loader-plugin/commit/6f9d60f614359720ec98e22b80ba15e8bf88e712
6
reference_url https://jenkins.io/security/advisory/2019-05-31/#SECURITY-921
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://jenkins.io/security/advisory/2019-05-31/#SECURITY-921
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-10328
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-10328
8
reference_url http://www.openwall.com/lists/oss-security/2019/05/31/2
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2019/05/31/2
9
reference_url http://www.securityfocus.com/bid/108540
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/108540
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1716794
reference_id 1716794
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1716794
11
reference_url https://github.com/advisories/GHSA-v558-fhw2-v46w
reference_id GHSA-v558-fhw2-v46w
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-v558-fhw2-v46w
fixed_packages
aliases CVE-2019-10328, GHSA-v558-fhw2-v46w
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ftky-shfy-bufk
2
url VCID-s5qz-aqj7-6uhz
vulnerability_id VCID-s5qz-aqj7-6uhz
summary
File and Directory Information Exposure
Jenkins Credentials Plugin allows users with permission to create or update credentials to confirm the existence of files on the Jenkins master with an attacker-specified path, and obtain the certificate content of files containing a PKCS#12 certificate.
references
0
reference_url https://access.redhat.com/errata/RHBA-2019:1605
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHBA-2019:1605
1
reference_url https://access.redhat.com/errata/RHSA-2019:1636
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:1636
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10320.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10320.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10320
reference_id
reference_type
scores
0
value 0.00111
scoring_system epss
scoring_elements 0.29495
published_at 2026-04-21T12:55:00Z
1
value 0.00111
scoring_system epss
scoring_elements 0.29382
published_at 2026-04-24T12:55:00Z
2
value 0.00116
scoring_system epss
scoring_elements 0.30308
published_at 2026-04-09T12:55:00Z
3
value 0.00116
scoring_system epss
scoring_elements 0.30267
published_at 2026-04-12T12:55:00Z
4
value 0.00116
scoring_system epss
scoring_elements 0.30312
published_at 2026-04-11T12:55:00Z
5
value 0.00116
scoring_system epss
scoring_elements 0.3032
published_at 2026-04-01T12:55:00Z
6
value 0.00116
scoring_system epss
scoring_elements 0.30351
published_at 2026-04-02T12:55:00Z
7
value 0.00116
scoring_system epss
scoring_elements 0.30398
published_at 2026-04-04T12:55:00Z
8
value 0.00116
scoring_system epss
scoring_elements 0.30213
published_at 2026-04-07T12:55:00Z
9
value 0.00116
scoring_system epss
scoring_elements 0.30273
published_at 2026-04-08T12:55:00Z
10
value 0.00116
scoring_system epss
scoring_elements 0.30217
published_at 2026-04-18T12:55:00Z
11
value 0.00116
scoring_system epss
scoring_elements 0.30235
published_at 2026-04-16T12:55:00Z
12
value 0.00116
scoring_system epss
scoring_elements 0.30221
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10320
4
reference_url http://seclists.org/fulldisclosure/2019/May/39
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2019/May/39
5
reference_url https://github.com/jenkinsci/credentials-plugin/commit/40d0b5cc53c265b601ffaa4469310fad390a80fb
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/credentials-plugin/commit/40d0b5cc53c265b601ffaa4469310fad390a80fb
6
reference_url https://jenkins.io/security/advisory/2019-05-21/#SECURITY-1322
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://jenkins.io/security/advisory/2019-05-21/#SECURITY-1322
7
reference_url https://wwws.nightwatchcybersecurity.com/2019/05/23/exploring-the-file-system-via-jenkins-credentials-plugin-vulnerability-cve-2019-10320
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wwws.nightwatchcybersecurity.com/2019/05/23/exploring-the-file-system-via-jenkins-credentials-plugin-vulnerability-cve-2019-10320
8
reference_url https://wwws.nightwatchcybersecurity.com/2019/05/23/exploring-the-file-system-via-jenkins-credentials-plugin-vulnerability-cve-2019-10320/
reference_id
reference_type
scores
url https://wwws.nightwatchcybersecurity.com/2019/05/23/exploring-the-file-system-via-jenkins-credentials-plugin-vulnerability-cve-2019-10320/
9
reference_url http://www.openwall.com/lists/oss-security/2019/05/21/1
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2019/05/21/1
10
reference_url http://www.securityfocus.com/bid/108462
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/108462
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1714054
reference_id 1714054
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1714054
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-10320
reference_id CVE-2019-10320
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-10320
13
reference_url https://github.com/advisories/GHSA-xm94-9jw8-p6hw
reference_id GHSA-xm94-9jw8-p6hw
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-xm94-9jw8-p6hw
fixed_packages
aliases CVE-2019-10320, GHSA-xm94-9jw8-p6hw
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s5qz-aqj7-6uhz
3
url VCID-zftt-hmv8-judu
vulnerability_id VCID-zftt-hmv8-judu
summary
Improper Authentication
Users who cached their CLI authentication would remain authenticated because the fix for CVE-2019-1003004 in these releases did not reject existing remoting-based CLI authentication caches.
references
0
reference_url https://access.redhat.com/errata/RHBA-2019:1605
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHBA-2019:1605
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1003049.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1003049.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-1003049
reference_id
reference_type
scores
0
value 0.00474
scoring_system epss
scoring_elements 0.64806
published_at 2026-04-18T12:55:00Z
1
value 0.00474
scoring_system epss
scoring_elements 0.64796
published_at 2026-04-16T12:55:00Z
2
value 0.00474
scoring_system epss
scoring_elements 0.64758
published_at 2026-04-13T12:55:00Z
3
value 0.00474
scoring_system epss
scoring_elements 0.64785
published_at 2026-04-12T12:55:00Z
4
value 0.00474
scoring_system epss
scoring_elements 0.64797
published_at 2026-04-11T12:55:00Z
5
value 0.00474
scoring_system epss
scoring_elements 0.6478
published_at 2026-04-09T12:55:00Z
6
value 0.00474
scoring_system epss
scoring_elements 0.64765
published_at 2026-04-08T12:55:00Z
7
value 0.00474
scoring_system epss
scoring_elements 0.64717
published_at 2026-04-07T12:55:00Z
8
value 0.00474
scoring_system epss
scoring_elements 0.64755
published_at 2026-04-04T12:55:00Z
9
value 0.00474
scoring_system epss
scoring_elements 0.64674
published_at 2026-04-01T12:55:00Z
10
value 0.00474
scoring_system epss
scoring_elements 0.64726
published_at 2026-04-02T12:55:00Z
11
value 0.00474
scoring_system epss
scoring_elements 0.64811
published_at 2026-04-24T12:55:00Z
12
value 0.00474
scoring_system epss
scoring_elements 0.64794
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-1003049
3
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
4
reference_url https://github.com/jenkinsci/jenkins/commit/0eeaa087aac192fb39f52928be5a5bbf16627ea6
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/0eeaa087aac192fb39f52928be5a5bbf16627ea6
5
reference_url https://jenkins.io/security/advisory/2019-04-10/#SECURITY-1289
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://jenkins.io/security/advisory/2019-04-10/#SECURITY-1289
6
reference_url https://www.oracle.com/security-alerts/cpuapr2022.html
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuapr2022.html
7
reference_url http://www.securityfocus.com/bid/107901
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/107901
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1699701
reference_id 1699701
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1699701
9
reference_url https://security.archlinux.org/ASA-201904-7
reference_id ASA-201904-7
reference_type
scores
url https://security.archlinux.org/ASA-201904-7
10
reference_url https://security.archlinux.org/AVG-948
reference_id AVG-948
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-948
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-1003049
reference_id CVE-2019-1003049
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-1003049
16
reference_url https://github.com/advisories/GHSA-742j-jcfr-23w3
reference_id GHSA-742j-jcfr-23w3
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-742j-jcfr-23w3
fixed_packages
aliases CVE-2019-1003049, GHSA-742j-jcfr-23w3
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zftt-hmv8-judu
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/atomic-enterprise-service-catalog@1:3.11.117-1.git.1.376e432%3Farch=el7