| 0 |
| url |
VCID-1s7q-drqn-4bhd |
| vulnerability_id |
VCID-1s7q-drqn-4bhd |
| summary |
Withdrawn Advisory: Prometheus XSS Vulnerability
## Withdrawn Advisory
This advisory has been withdrawn because the vulnerability does not apply to the Prometheus golang package. This link is maintained to preserve external references.
## Original Description
A stored, DOM based, cross-site scripting (XSS) flaw was found in Prometheus before version 2.7.1. An attacker could exploit this by convincing an authenticated user to visit a crafted URL on a Prometheus server, allowing for the execution and persistent storage of arbitrary scripts. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-3826 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01462 |
| scoring_system |
epss |
| scoring_elements |
0.80831 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.01462 |
| scoring_system |
epss |
| scoring_elements |
0.80897 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.01462 |
| scoring_system |
epss |
| scoring_elements |
0.80895 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.01462 |
| scoring_system |
epss |
| scoring_elements |
0.80858 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.01462 |
| scoring_system |
epss |
| scoring_elements |
0.80866 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.01462 |
| scoring_system |
epss |
| scoring_elements |
0.8088 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.01462 |
| scoring_system |
epss |
| scoring_elements |
0.80864 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01462 |
| scoring_system |
epss |
| scoring_elements |
0.80801 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.01462 |
| scoring_system |
epss |
| scoring_elements |
0.80855 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.01462 |
| scoring_system |
epss |
| scoring_elements |
0.80827 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.01462 |
| scoring_system |
epss |
| scoring_elements |
0.80811 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-3826 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2019-3826 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:N/I:P/A:N |
|
| 1 |
| value |
6.1 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 2 |
| value |
5.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2019-3826 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-3826, GHSA-3m87-5598-2v4f
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1s7q-drqn-4bhd |
|
| 1 |
| url |
VCID-2hfm-g99a-67de |
| vulnerability_id |
VCID-2hfm-g99a-67de |
| summary |
A sandbox bypass vulnerability exists in Script Security Plugin 1.47 and earlier in groovy-sandbox/src/main/java/org/kohsuke/groovy/sandbox/SandboxTransformer.java that allows attackers with Job/Configure permission to execute arbitrary code on the Jenkins master JVM, if plugins using the Groovy sandbox are installed. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1000865 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69935 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69827 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69891 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69914 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69899 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69885 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69926 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69823 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69835 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.6985 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1000865 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-1000865, GHSA-p4p5-3v2j-w5rv
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2hfm-g99a-67de |
|
| 2 |
| url |
VCID-2qhb-fu9x-k7bd |
| vulnerability_id |
VCID-2qhb-fu9x-k7bd |
| summary |
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.61 and earlier in src/main/java/org/jenkinsci/plugins/workflow/cps/CpsFlowDefinition.java, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShellFactory.java that allows attackers with Overall/Read permission to provide a pipeline script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003001 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.93935 |
| scoring_system |
epss |
| scoring_elements |
0.99882 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.93935 |
| scoring_system |
epss |
| scoring_elements |
0.99878 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.93935 |
| scoring_system |
epss |
| scoring_elements |
0.99879 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.93935 |
| scoring_system |
epss |
| scoring_elements |
0.9988 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.93935 |
| scoring_system |
epss |
| scoring_elements |
0.99881 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003001 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-1003001, GHSA-6q78-6xvr-26fg
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2qhb-fu9x-k7bd |
|
| 3 |
| url |
VCID-31wf-mpnt-dycm |
| vulnerability_id |
VCID-31wf-mpnt-dycm |
| summary |
haproxy: Out-of-bounds read in dns.c:dns_validate_dns_response() allows for memory disclosure |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20102 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09068 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.08985 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.0911 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09005 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09074 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09126 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09046 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09156 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09157 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09124 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20102 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-20102
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-31wf-mpnt-dycm |
|
| 4 |
| url |
VCID-48er-rqvk-nyhg |
| vulnerability_id |
VCID-48er-rqvk-nyhg |
| summary |
haproxy: Infinite recursion via crafted packet allows stack exhaustion and denial of service |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20103 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27737 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.276 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27617 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27626 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27774 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27813 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27605 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27671 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27715 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27719 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27676 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20103 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-20103
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-48er-rqvk-nyhg |
|
| 5 |
| url |
VCID-537v-ugyf-17e2 |
| vulnerability_id |
VCID-537v-ugyf-17e2 |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
An cross-site scripting vulnerability exists in Jenkins Config File Provider Plugin 3.4.1 and earlier in src/main/resources/lib/configfiles/configfiles.jelly that allows attackers with permission to define shared configuration files to execute arbitrary JavaScript when a user attempts to delete the shared configuration file. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003014 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19765 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19818 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19964 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20022 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19749 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19829 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19882 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19891 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19847 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.1979 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19762 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003014 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2019-1003014 |
| reference_id |
CVE-2019-1003014 |
| reference_type |
|
| scores |
| 0 |
| value |
3.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:N/I:P/A:N |
|
| 1 |
| value |
4.8 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N |
|
| 2 |
| value |
4.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2019-1003014 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-1003014, GHSA-pmc5-74w3-78mw
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-537v-ugyf-17e2 |
|
| 6 |
| url |
VCID-6ncw-2m21-t3bg |
| vulnerability_id |
VCID-6ncw-2m21-t3bg |
| summary |
A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.59 and earlier in groovy-sandbox/src/main/java/org/kohsuke/groovy/sandbox/SandboxTransformer.java, groovy-cps/lib/src/main/java/com/cloudbees/groovy/cps/SandboxCpsTransformer.java that allows attackers with Job/Configure permission, or unauthorized attackers with SCM commit privileges and corresponding pipelines based on Jenkinsfiles set up in Jenkins, to execute arbitrary code on the Jenkins master JVM |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1000866 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69914 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69891 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69827 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.6985 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69823 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69835 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69935 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69926 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69885 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69899 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1000866 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-1000866, GHSA-gqhm-4h93-rrhg
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6ncw-2m21-t3bg |
|
| 7 |
| url |
VCID-8575-gsc8-xkd6 |
| vulnerability_id |
VCID-8575-gsc8-xkd6 |
| summary |
Cross-Site Request Forgery (CSRF)
A cross-site request forgery vulnerability exists in Jenkins Git Plugin in `src/main/java/hudson/plugins/git/GitTagAction.java` allowing attackers to create a Git tag in a workspace and attach corresponding metadata to a build record. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003010 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70897 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.708 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70819 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70794 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70837 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70853 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70876 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.7086 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70845 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70891 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70786 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003010 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2019-1003010 |
| reference_id |
CVE-2019-1003010 |
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:N/I:P/A:N |
|
| 1 |
| value |
4.3 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N |
|
| 2 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2019-1003010 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-1003010, GHSA-r8rw-xx57-m64q
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8575-gsc8-xkd6 |
|
| 8 |
| url |
VCID-8e1s-dgj6-vyfq |
| vulnerability_id |
VCID-8e1s-dgj6-vyfq |
| summary |
haproxy: Mishandling of priority flag in short HEADERS frame by HTTP/2 decoder allows for crash |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20615 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37523 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37654 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37653 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37625 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37672 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37705 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.3773 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37609 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.3766 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37673 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37687 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20615 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-20615
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8e1s-dgj6-vyfq |
|
| 9 |
| url |
VCID-a6ur-dzqs-hfge |
| vulnerability_id |
VCID-a6ur-dzqs-hfge |
| summary |
Code Injection
A sandbox bypass vulnerability exists in Script Security Plugin that allows attackers with the ability to provide sandboxed scripts to execute arbitrary code on the Jenkins master JVM. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-1003000, GHSA-784j-h234-m56x
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a6ur-dzqs-hfge |
|
| 10 |
| url |
VCID-bmfa-vgay-2fbt |
| vulnerability_id |
VCID-bmfa-vgay-2fbt |
| summary |
Cross-Site Request Forgery (CSRF)
A data modification vulnerability exists in Jenkins Blue Ocean Plugins in `blueocean-core-js/src/js/bundleStartup.js`, `blueocean-core-js/src/js/fetch.ts`, `blueocean-core-js/src/js/i18n/i18n.js`, `blueocean-core-js/src/js/urlconfig.js`, `blueocean-rest/src/main/java/io/jenkins/blueocean/rest/APICrumbExclusion.java`, `blueocean-web/src/main/java/io/jenkins/blueocean/BlueOceanUI.java`, `blueocean-web/src/main/resources/io/jenkins/blueocean/BlueOceanUI/index.jelly` that allows attackers to bypass all cross-site request forgery protection in Blue Ocean API. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003012 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.36167 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.36261 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.36295 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.3613 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.36179 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.36197 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.36203 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.36166 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.3614 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.36182 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.36066 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003012 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2019-1003012 |
| reference_id |
CVE-2019-1003012 |
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:N/I:P/A:N |
|
| 1 |
| value |
6.5 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N |
|
| 2 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2019-1003012 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-1003012, GHSA-qxh5-5r5p-5gvf
|
| risk_score |
3.3 |
| exploitability |
0.5 |
| weighted_severity |
6.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bmfa-vgay-2fbt |
|
| 11 |
| url |
VCID-cf29-8rvn-kfbd |
| vulnerability_id |
VCID-cf29-8rvn-kfbd |
| summary |
Insufficient Session Expiration
An improper authorization vulnerability exists in Jenkins in `core/src/main/java/hudson/security/TokenBasedRememberMeServices2.java` that allows attackers with `Overall/RunScripts` permission to craft Remember Me cookies that would never expire, allowing to persist access to temporarily compromised user accounts. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003003 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01946 |
| scoring_system |
epss |
| scoring_elements |
0.83446 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.01946 |
| scoring_system |
epss |
| scoring_elements |
0.8345 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.01946 |
| scoring_system |
epss |
| scoring_elements |
0.83457 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.01946 |
| scoring_system |
epss |
| scoring_elements |
0.83442 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.01946 |
| scoring_system |
epss |
| scoring_elements |
0.83432 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01946 |
| scoring_system |
epss |
| scoring_elements |
0.83408 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.01946 |
| scoring_system |
epss |
| scoring_elements |
0.83409 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.01946 |
| scoring_system |
epss |
| scoring_elements |
0.83381 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.01946 |
| scoring_system |
epss |
| scoring_elements |
0.83394 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.01946 |
| scoring_system |
epss |
| scoring_elements |
0.83483 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.01946 |
| scoring_system |
epss |
| scoring_elements |
0.83481 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003003 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-1003003, GHSA-6rh5-23hx-j452
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cf29-8rvn-kfbd |
|
| 12 |
| url |
VCID-gmw4-qd6z-aqht |
| vulnerability_id |
VCID-gmw4-qd6z-aqht |
| summary |
Cross-site Scripting
An cross-site scripting vulnerability exists in Jenkins Blue Ocean Plugins in `blueocean-commons/src/main/java/io/jenkins/blueocean/commons/stapler/Export.java`, `blueocean-commons/src/main/java/io/jenkins/blueocean/commons/stapler/Export/ExportConfig.java`, `blueocean-commons/src/main/java/io/jenkins/blueocean/commons/stapler/export/JSONDataWriter.java`, `blueocean-rest-impl/src/main/java/io/jenkins/blueocean/service/embedded/UserStatePreloader.java`, `blueocean-web/src/main/resources/io/jenkins/blueocean/PageStatePreloadDecorator/header.jelly' that allows attackers with permission to edit a user's description in Jenkins to have Blue Ocean render arbitrary HTML when using it as that user. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003013 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18946 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.1917 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19222 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18938 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19017 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19071 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19077 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.1903 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18978 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18932 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19035 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003013 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2019-1003013 |
| reference_id |
CVE-2019-1003013 |
| reference_type |
|
| scores |
| 0 |
| value |
3.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:N/I:P/A:N |
|
| 1 |
| value |
5.4 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
|
| 2 |
| value |
5.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2019-1003013 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-1003013, GHSA-7fjr-5hph-c2mh
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gmw4-qd6z-aqht |
|
| 13 |
| url |
VCID-qdk1-p4qg-p3ar |
| vulnerability_id |
VCID-qdk1-p4qg-p3ar |
| summary |
Improper Input Validation
An information exposure and denial of service vulnerability exists in Jenkins Token Macro Plugin which allows attackers with the ability to control token macro input (such as SCM changelogs) to define recursive input that results in unexpected macro evaluation. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003011 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68177 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68087 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68106 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68084 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68135 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.6815 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68175 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68161 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68128 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68165 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68065 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003011 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2019-1003011 |
| reference_id |
CVE-2019-1003011 |
| reference_type |
|
| scores |
| 0 |
| value |
5.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:P/I:N/A:P |
|
| 1 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
|
| 2 |
| value |
8.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2019-1003011 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-1003011, GHSA-23h9-m55m-c5jp
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qdk1-p4qg-p3ar |
|
| 14 |
| url |
VCID-uyuv-7nbj-zfcp |
| vulnerability_id |
VCID-uyuv-7nbj-zfcp |
| summary |
Insufficient Session Expiration
An improper authorization vulnerability exists in Jenkins in `core/src/main/java/hudson/security/AuthenticationProcessingFilter2.java` that allows attackers to extend the duration of active HTTP sessions indefinitely even though the user account may have been deleted in the mean time. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003004 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01743 |
| scoring_system |
epss |
| scoring_elements |
0.82557 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.01743 |
| scoring_system |
epss |
| scoring_elements |
0.82462 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01743 |
| scoring_system |
epss |
| scoring_elements |
0.82479 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01743 |
| scoring_system |
epss |
| scoring_elements |
0.82476 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01743 |
| scoring_system |
epss |
| scoring_elements |
0.82503 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01743 |
| scoring_system |
epss |
| scoring_elements |
0.8251 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01743 |
| scoring_system |
epss |
| scoring_elements |
0.82529 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01743 |
| scoring_system |
epss |
| scoring_elements |
0.82525 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01743 |
| scoring_system |
epss |
| scoring_elements |
0.8252 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01743 |
| scoring_system |
epss |
| scoring_elements |
0.82447 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003004 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-1003004, GHSA-8qxp-g8jv-p37x
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uyuv-7nbj-zfcp |
|
| 15 |
| url |
VCID-ygq7-sv7h-7fax |
| vulnerability_id |
VCID-ygq7-sv7h-7fax |
| summary |
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
A sandbox bypass vulnerability exists in Pipeline: Declarative Plugin 1.3.3 and earlier in pipeline-model-definition/src/main/groovy/org/jenkinsci/plugins/pipeline/modeldefinition/parser/Converter.groovy that allows attackers with Overall/Read permission to provide a pipeline script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-1003002, GHSA-x6jx-cxg3-mggh
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ygq7-sv7h-7fax |
|