| 0 |
| url |
VCID-1s7q-drqn-4bhd |
| vulnerability_id |
VCID-1s7q-drqn-4bhd |
| summary |
Withdrawn Advisory: Prometheus XSS Vulnerability
## Withdrawn Advisory
This advisory has been withdrawn because the vulnerability does not apply to the Prometheus golang package. This link is maintained to preserve external references.
## Original Description
A stored, DOM based, cross-site scripting (XSS) flaw was found in Prometheus before version 2.7.1. An attacker could exploit this by convincing an authenticated user to visit a crafted URL on a Prometheus server, allowing for the execution and persistent storage of arbitrary scripts. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-3826 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01462 |
| scoring_system |
epss |
| scoring_elements |
0.80827 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.01462 |
| scoring_system |
epss |
| scoring_elements |
0.80899 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.01462 |
| scoring_system |
epss |
| scoring_elements |
0.80897 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.01462 |
| scoring_system |
epss |
| scoring_elements |
0.80895 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.01462 |
| scoring_system |
epss |
| scoring_elements |
0.80858 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.01462 |
| scoring_system |
epss |
| scoring_elements |
0.80866 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.01462 |
| scoring_system |
epss |
| scoring_elements |
0.8088 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01462 |
| scoring_system |
epss |
| scoring_elements |
0.80801 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.01462 |
| scoring_system |
epss |
| scoring_elements |
0.80864 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.01462 |
| scoring_system |
epss |
| scoring_elements |
0.80855 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.01462 |
| scoring_system |
epss |
| scoring_elements |
0.80811 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.01462 |
| scoring_system |
epss |
| scoring_elements |
0.80831 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-3826 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2019-3826 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:N/I:P/A:N |
|
| 1 |
| value |
6.1 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 2 |
| value |
5.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2019-3826 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-3826, GHSA-3m87-5598-2v4f
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1s7q-drqn-4bhd |
|
| 1 |
| url |
VCID-2hfm-g99a-67de |
| vulnerability_id |
VCID-2hfm-g99a-67de |
| summary |
A sandbox bypass vulnerability exists in Script Security Plugin 1.47 and earlier in groovy-sandbox/src/main/java/org/kohsuke/groovy/sandbox/SandboxTransformer.java that allows attackers with Job/Configure permission to execute arbitrary code on the Jenkins master JVM, if plugins using the Groovy sandbox are installed. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1000865 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69917 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69891 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69914 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69899 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69885 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69926 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69935 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69823 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69835 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.6985 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69827 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1000865 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-1000865, GHSA-p4p5-3v2j-w5rv
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2hfm-g99a-67de |
|
| 2 |
| url |
VCID-2qhb-fu9x-k7bd |
| vulnerability_id |
VCID-2qhb-fu9x-k7bd |
| summary |
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.61 and earlier in src/main/java/org/jenkinsci/plugins/workflow/cps/CpsFlowDefinition.java, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShellFactory.java that allows attackers with Overall/Read permission to provide a pipeline script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003001 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.93935 |
| scoring_system |
epss |
| scoring_elements |
0.99882 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.93935 |
| scoring_system |
epss |
| scoring_elements |
0.99878 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.93935 |
| scoring_system |
epss |
| scoring_elements |
0.99879 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.93935 |
| scoring_system |
epss |
| scoring_elements |
0.9988 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.93935 |
| scoring_system |
epss |
| scoring_elements |
0.99881 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003001 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-1003001, GHSA-6q78-6xvr-26fg
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2qhb-fu9x-k7bd |
|
| 3 |
| url |
VCID-31wf-mpnt-dycm |
| vulnerability_id |
VCID-31wf-mpnt-dycm |
| summary |
haproxy: Out-of-bounds read in dns.c:dns_validate_dns_response() allows for memory disclosure |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20102 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09068 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09141 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09005 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.08985 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09074 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09126 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09046 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09156 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09157 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09124 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.0911 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20102 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-20102
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-31wf-mpnt-dycm |
|
| 4 |
| url |
VCID-48er-rqvk-nyhg |
| vulnerability_id |
VCID-48er-rqvk-nyhg |
| summary |
haproxy: Infinite recursion via crafted packet allows stack exhaustion and denial of service |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20103 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27737 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27562 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27626 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.276 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27774 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27813 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27605 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27671 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27715 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27719 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27676 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27617 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20103 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-20103
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-48er-rqvk-nyhg |
|
| 5 |
| url |
VCID-537v-ugyf-17e2 |
| vulnerability_id |
VCID-537v-ugyf-17e2 |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
An cross-site scripting vulnerability exists in Jenkins Config File Provider Plugin 3.4.1 and earlier in src/main/resources/lib/configfiles/configfiles.jelly that allows attackers with permission to define shared configuration files to execute arbitrary JavaScript when a user attempts to delete the shared configuration file. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003014 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19777 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19818 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19964 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20022 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19749 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19829 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19882 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19891 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19847 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.1979 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19762 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19765 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003014 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2019-1003014 |
| reference_id |
CVE-2019-1003014 |
| reference_type |
|
| scores |
| 0 |
| value |
3.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:N/I:P/A:N |
|
| 1 |
| value |
4.8 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N |
|
| 2 |
| value |
4.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2019-1003014 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-1003014, GHSA-pmc5-74w3-78mw
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-537v-ugyf-17e2 |
|
| 6 |
| url |
VCID-6ncw-2m21-t3bg |
| vulnerability_id |
VCID-6ncw-2m21-t3bg |
| summary |
A sandbox bypass vulnerability exists in Pipeline: Groovy Plugin 2.59 and earlier in groovy-sandbox/src/main/java/org/kohsuke/groovy/sandbox/SandboxTransformer.java, groovy-cps/lib/src/main/java/com/cloudbees/groovy/cps/SandboxCpsTransformer.java that allows attackers with Job/Configure permission, or unauthorized attackers with SCM commit privileges and corresponding pipelines based on Jenkinsfiles set up in Jenkins, to execute arbitrary code on the Jenkins master JVM |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1000866 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69917 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69823 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69835 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.6985 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69827 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69876 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69891 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69914 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69899 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69885 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69926 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00615 |
| scoring_system |
epss |
| scoring_elements |
0.69935 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1000866 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-1000866, GHSA-gqhm-4h93-rrhg
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6ncw-2m21-t3bg |
|
| 7 |
| url |
VCID-8575-gsc8-xkd6 |
| vulnerability_id |
VCID-8575-gsc8-xkd6 |
| summary |
Cross-Site Request Forgery (CSRF)
A cross-site request forgery vulnerability exists in Jenkins Git Plugin in `src/main/java/hudson/plugins/git/GitTagAction.java` allowing attackers to create a Git tag in a workspace and attach corresponding metadata to a build record. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003010 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70877 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70819 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70794 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70837 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70853 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70876 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.7086 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70845 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70891 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70897 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70786 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.708 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003010 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2019-1003010 |
| reference_id |
CVE-2019-1003010 |
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:N/I:P/A:N |
|
| 1 |
| value |
4.3 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N |
|
| 2 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2019-1003010 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-1003010, GHSA-r8rw-xx57-m64q
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8575-gsc8-xkd6 |
|
| 8 |
| url |
VCID-8e1s-dgj6-vyfq |
| vulnerability_id |
VCID-8e1s-dgj6-vyfq |
| summary |
haproxy: Mishandling of priority flag in short HEADERS frame by HTTP/2 decoder allows for crash |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20615 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37523 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.3759 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37625 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37672 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37654 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37705 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.3773 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37609 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.3766 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37673 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37687 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00166 |
| scoring_system |
epss |
| scoring_elements |
0.37653 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20615 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-20615
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8e1s-dgj6-vyfq |
|
| 9 |
| url |
VCID-a6ur-dzqs-hfge |
| vulnerability_id |
VCID-a6ur-dzqs-hfge |
| summary |
Code Injection
A sandbox bypass vulnerability exists in Script Security Plugin that allows attackers with the ability to provide sandboxed scripts to execute arbitrary code on the Jenkins master JVM. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-1003000, GHSA-784j-h234-m56x
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a6ur-dzqs-hfge |
|
| 10 |
| url |
VCID-bmfa-vgay-2fbt |
| vulnerability_id |
VCID-bmfa-vgay-2fbt |
| summary |
Cross-Site Request Forgery (CSRF)
A data modification vulnerability exists in Jenkins Blue Ocean Plugins in `blueocean-core-js/src/js/bundleStartup.js`, `blueocean-core-js/src/js/fetch.ts`, `blueocean-core-js/src/js/i18n/i18n.js`, `blueocean-core-js/src/js/urlconfig.js`, `blueocean-rest/src/main/java/io/jenkins/blueocean/rest/APICrumbExclusion.java`, `blueocean-web/src/main/java/io/jenkins/blueocean/BlueOceanUI.java`, `blueocean-web/src/main/resources/io/jenkins/blueocean/BlueOceanUI/index.jelly` that allows attackers to bypass all cross-site request forgery protection in Blue Ocean API. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003012 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.36116 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.36295 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.3613 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.36179 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.36197 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.36203 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.36166 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.3614 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.36182 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.36167 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.36066 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.00154 |
| scoring_system |
epss |
| scoring_elements |
0.36261 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003012 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2019-1003012 |
| reference_id |
CVE-2019-1003012 |
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:N/I:P/A:N |
|
| 1 |
| value |
6.5 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N |
|
| 2 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2019-1003012 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-1003012, GHSA-qxh5-5r5p-5gvf
|
| risk_score |
3.3 |
| exploitability |
0.5 |
| weighted_severity |
6.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bmfa-vgay-2fbt |
|
| 11 |
| url |
VCID-cf29-8rvn-kfbd |
| vulnerability_id |
VCID-cf29-8rvn-kfbd |
| summary |
Insufficient Session Expiration
An improper authorization vulnerability exists in Jenkins in `core/src/main/java/hudson/security/TokenBasedRememberMeServices2.java` that allows attackers with `Overall/RunScripts` permission to craft Remember Me cookies that would never expire, allowing to persist access to temporarily compromised user accounts. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003003 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01946 |
| scoring_system |
epss |
| scoring_elements |
0.83481 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.01946 |
| scoring_system |
epss |
| scoring_elements |
0.83446 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.01946 |
| scoring_system |
epss |
| scoring_elements |
0.8345 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.01946 |
| scoring_system |
epss |
| scoring_elements |
0.83457 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.01946 |
| scoring_system |
epss |
| scoring_elements |
0.83442 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.01946 |
| scoring_system |
epss |
| scoring_elements |
0.83432 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01946 |
| scoring_system |
epss |
| scoring_elements |
0.83408 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.01946 |
| scoring_system |
epss |
| scoring_elements |
0.83409 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.01946 |
| scoring_system |
epss |
| scoring_elements |
0.83394 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.01946 |
| scoring_system |
epss |
| scoring_elements |
0.83381 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.01946 |
| scoring_system |
epss |
| scoring_elements |
0.83484 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.01946 |
| scoring_system |
epss |
| scoring_elements |
0.83483 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003003 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-1003003, GHSA-6rh5-23hx-j452
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cf29-8rvn-kfbd |
|
| 12 |
| url |
VCID-gmw4-qd6z-aqht |
| vulnerability_id |
VCID-gmw4-qd6z-aqht |
| summary |
Cross-site Scripting
An cross-site scripting vulnerability exists in Jenkins Blue Ocean Plugins in `blueocean-commons/src/main/java/io/jenkins/blueocean/commons/stapler/Export.java`, `blueocean-commons/src/main/java/io/jenkins/blueocean/commons/stapler/Export/ExportConfig.java`, `blueocean-commons/src/main/java/io/jenkins/blueocean/commons/stapler/export/JSONDataWriter.java`, `blueocean-rest-impl/src/main/java/io/jenkins/blueocean/service/embedded/UserStatePreloader.java`, `blueocean-web/src/main/resources/io/jenkins/blueocean/PageStatePreloadDecorator/header.jelly' that allows attackers with permission to edit a user's description in Jenkins to have Blue Ocean render arbitrary HTML when using it as that user. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003013 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18955 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19222 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18938 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19017 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19071 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19077 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.1903 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18978 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18932 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18946 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19035 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.1917 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003013 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2019-1003013 |
| reference_id |
CVE-2019-1003013 |
| reference_type |
|
| scores |
| 0 |
| value |
3.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:N/I:P/A:N |
|
| 1 |
| value |
5.4 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
|
| 2 |
| value |
5.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2019-1003013 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-1003013, GHSA-7fjr-5hph-c2mh
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gmw4-qd6z-aqht |
|
| 13 |
| url |
VCID-qdk1-p4qg-p3ar |
| vulnerability_id |
VCID-qdk1-p4qg-p3ar |
| summary |
Improper Input Validation
An information exposure and denial of service vulnerability exists in Jenkins Token Macro Plugin which allows attackers with the ability to control token macro input (such as SCM changelogs) to define recursive input that results in unexpected macro evaluation. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003011 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68159 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68106 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68084 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68135 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.6815 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68175 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68161 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68128 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68165 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68177 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68065 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.00556 |
| scoring_system |
epss |
| scoring_elements |
0.68087 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003011 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2019-1003011 |
| reference_id |
CVE-2019-1003011 |
| reference_type |
|
| scores |
| 0 |
| value |
5.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:P/I:N/A:P |
|
| 1 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
|
| 2 |
| value |
8.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2019-1003011 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-1003011, GHSA-23h9-m55m-c5jp
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qdk1-p4qg-p3ar |
|
| 14 |
| url |
VCID-uyuv-7nbj-zfcp |
| vulnerability_id |
VCID-uyuv-7nbj-zfcp |
| summary |
Insufficient Session Expiration
An improper authorization vulnerability exists in Jenkins in `core/src/main/java/hudson/security/AuthenticationProcessingFilter2.java` that allows attackers to extend the duration of active HTTP sessions indefinitely even though the user account may have been deleted in the mean time. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003004 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01743 |
| scoring_system |
epss |
| scoring_elements |
0.82561 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01743 |
| scoring_system |
epss |
| scoring_elements |
0.82479 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.01743 |
| scoring_system |
epss |
| scoring_elements |
0.82476 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.01743 |
| scoring_system |
epss |
| scoring_elements |
0.82503 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.01743 |
| scoring_system |
epss |
| scoring_elements |
0.8251 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.01743 |
| scoring_system |
epss |
| scoring_elements |
0.82529 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.01743 |
| scoring_system |
epss |
| scoring_elements |
0.82525 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.01743 |
| scoring_system |
epss |
| scoring_elements |
0.8252 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.01743 |
| scoring_system |
epss |
| scoring_elements |
0.82557 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.01743 |
| scoring_system |
epss |
| scoring_elements |
0.82447 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.01743 |
| scoring_system |
epss |
| scoring_elements |
0.82462 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003004 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-1003004, GHSA-8qxp-g8jv-p37x
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uyuv-7nbj-zfcp |
|
| 15 |
| url |
VCID-ygq7-sv7h-7fax |
| vulnerability_id |
VCID-ygq7-sv7h-7fax |
| summary |
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
A sandbox bypass vulnerability exists in Pipeline: Declarative Plugin 1.3.3 and earlier in pipeline-model-definition/src/main/groovy/org/jenkinsci/plugins/pipeline/modeldefinition/parser/Converter.groovy that allows attackers with Overall/Read permission to provide a pipeline script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003002 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.93454 |
| scoring_system |
epss |
| scoring_elements |
0.99822 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.93454 |
| scoring_system |
epss |
| scoring_elements |
0.99818 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.93454 |
| scoring_system |
epss |
| scoring_elements |
0.99819 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.93454 |
| scoring_system |
epss |
| scoring_elements |
0.9982 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.93454 |
| scoring_system |
epss |
| scoring_elements |
0.99821 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-1003002 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-1003002, GHSA-x6jx-cxg3-mggh
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ygq7-sv7h-7fax |
|