Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/openshift-origin-cartridge-jenkins@1.20.3.5-1?arch=el6op
Typerpm
Namespaceredhat
Nameopenshift-origin-cartridge-jenkins
Version1.20.3.5-1
Qualifiers
arch el6op
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1zas-w8w2-4ydr
vulnerability_id VCID-1zas-w8w2-4ydr
summary
Jenkins Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in Jenkins before 1.583 and LTS before 1.565.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
references
0
reference_url https://access.redhat.com/errata/RHBA-2014:1630
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHBA-2014:1630
1
reference_url https://access.redhat.com/errata/RHSA-2016:0070
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:0070
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3681.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3681.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3681
reference_id
reference_type
scores
0
value 0.00249
scoring_system epss
scoring_elements 0.48199
published_at 2026-04-21T12:55:00Z
1
value 0.00249
scoring_system epss
scoring_elements 0.48188
published_at 2026-04-09T12:55:00Z
2
value 0.00249
scoring_system epss
scoring_elements 0.48212
published_at 2026-04-11T12:55:00Z
3
value 0.00249
scoring_system epss
scoring_elements 0.48186
published_at 2026-04-12T12:55:00Z
4
value 0.00249
scoring_system epss
scoring_elements 0.48197
published_at 2026-04-13T12:55:00Z
5
value 0.00249
scoring_system epss
scoring_elements 0.48248
published_at 2026-04-16T12:55:00Z
6
value 0.00249
scoring_system epss
scoring_elements 0.48243
published_at 2026-04-18T12:55:00Z
7
value 0.00249
scoring_system epss
scoring_elements 0.48133
published_at 2026-04-01T12:55:00Z
8
value 0.00249
scoring_system epss
scoring_elements 0.4817
published_at 2026-04-02T12:55:00Z
9
value 0.00249
scoring_system epss
scoring_elements 0.4819
published_at 2026-04-04T12:55:00Z
10
value 0.00249
scoring_system epss
scoring_elements 0.4814
published_at 2026-04-07T12:55:00Z
11
value 0.00249
scoring_system epss
scoring_elements 0.48194
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3681
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1147766
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1147766
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/96975
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/96975
6
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*
10
reference_url https://access.redhat.com/security/cve/CVE-2014-3681
reference_id CVE-2014-3681
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2014-3681
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3681
reference_id CVE-2014-3681
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-3681
12
reference_url https://github.com/advisories/GHSA-cwh9-f8m6-6r63
reference_id GHSA-cwh9-f8m6-6r63
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-cwh9-f8m6-6r63
fixed_packages
aliases CVE-2014-3681, GHSA-cwh9-f8m6-6r63
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1zas-w8w2-4ydr
1
url VCID-28y2-gqhb-k7ak
vulnerability_id VCID-28y2-gqhb-k7ak
summary Cross-site scripting (XSS) vulnerability in the Monitoring plugin before 1.53.0 for Jenkins allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
references
0
reference_url https://access.redhat.com/errata/RHBA-2014:1630
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHBA-2014:1630
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3678.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3678.json
2
reference_url https://access.redhat.com/security/cve/CVE-2014-3678
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2014-3678
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3678
reference_id
reference_type
scores
0
value 0.00254
scoring_system epss
scoring_elements 0.48795
published_at 2026-04-13T12:55:00Z
1
value 0.00254
scoring_system epss
scoring_elements 0.4884
published_at 2026-04-18T12:55:00Z
2
value 0.00254
scoring_system epss
scoring_elements 0.48844
published_at 2026-04-16T12:55:00Z
3
value 0.00254
scoring_system epss
scoring_elements 0.48726
published_at 2026-04-01T12:55:00Z
4
value 0.00254
scoring_system epss
scoring_elements 0.48765
published_at 2026-04-02T12:55:00Z
5
value 0.00254
scoring_system epss
scoring_elements 0.48791
published_at 2026-04-04T12:55:00Z
6
value 0.00254
scoring_system epss
scoring_elements 0.48745
published_at 2026-04-07T12:55:00Z
7
value 0.00254
scoring_system epss
scoring_elements 0.48799
published_at 2026-04-21T12:55:00Z
8
value 0.00254
scoring_system epss
scoring_elements 0.48796
published_at 2026-04-09T12:55:00Z
9
value 0.00254
scoring_system epss
scoring_elements 0.48814
published_at 2026-04-11T12:55:00Z
10
value 0.00254
scoring_system epss
scoring_elements 0.48788
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3678
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1147760
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1147760
5
reference_url http://secunia.com/advisories/59122
reference_id
reference_type
scores
url http://secunia.com/advisories/59122
6
reference_url https://github.com/jenkinsci/monitoring-plugin
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/monitoring-plugin
7
reference_url https://github.com/jenkinsci/monitoring-plugin/commit/f0f6aeef2032696c97d4b015dd51fa2b841b0473
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/monitoring-plugin/commit/f0f6aeef2032696c97d4b015dd51fa2b841b0473
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3678
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-3678
9
reference_url https://wiki.jenkins-ci.org/display/JENKINS/Monitoring
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/JENKINS/Monitoring
10
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.40.0:*:*:*:*:cloudbees_jenkins:*:*
reference_id cpe:2.3:a:jenkins-ci:monitoring_plugin:1.40.0:*:*:*:*:cloudbees_jenkins:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.40.0:*:*:*:*:cloudbees_jenkins:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.41.0:*:*:*:*:cloudbees_jenkins:*:*
reference_id cpe:2.3:a:jenkins-ci:monitoring_plugin:1.41.0:*:*:*:*:cloudbees_jenkins:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.41.0:*:*:*:*:cloudbees_jenkins:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.42.0:*:*:*:*:cloudbees_jenkins:*:*
reference_id cpe:2.3:a:jenkins-ci:monitoring_plugin:1.42.0:*:*:*:*:cloudbees_jenkins:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.42.0:*:*:*:*:cloudbees_jenkins:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.43.0:*:*:*:*:cloudbees_jenkins:*:*
reference_id cpe:2.3:a:jenkins-ci:monitoring_plugin:1.43.0:*:*:*:*:cloudbees_jenkins:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.43.0:*:*:*:*:cloudbees_jenkins:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.44.0:*:*:*:*:cloudbees_jenkins:*:*
reference_id cpe:2.3:a:jenkins-ci:monitoring_plugin:1.44.0:*:*:*:*:cloudbees_jenkins:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.44.0:*:*:*:*:cloudbees_jenkins:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.45.0:*:*:*:*:cloudbees_jenkins:*:*
reference_id cpe:2.3:a:jenkins-ci:monitoring_plugin:1.45.0:*:*:*:*:cloudbees_jenkins:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.45.0:*:*:*:*:cloudbees_jenkins:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.46.0:*:*:*:*:cloudbees_jenkins:*:*
reference_id cpe:2.3:a:jenkins-ci:monitoring_plugin:1.46.0:*:*:*:*:cloudbees_jenkins:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.46.0:*:*:*:*:cloudbees_jenkins:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.47.0:*:*:*:*:cloudbees_jenkins:*:*
reference_id cpe:2.3:a:jenkins-ci:monitoring_plugin:1.47.0:*:*:*:*:cloudbees_jenkins:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.47.0:*:*:*:*:cloudbees_jenkins:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.48.0:*:*:*:*:cloudbees_jenkins:*:*
reference_id cpe:2.3:a:jenkins-ci:monitoring_plugin:1.48.0:*:*:*:*:cloudbees_jenkins:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.48.0:*:*:*:*:cloudbees_jenkins:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.49.0:*:*:*:*:cloudbees_jenkins:*:*
reference_id cpe:2.3:a:jenkins-ci:monitoring_plugin:1.49.0:*:*:*:*:cloudbees_jenkins:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.49.0:*:*:*:*:cloudbees_jenkins:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.50.0:*:*:*:*:cloudbees_jenkins:*:*
reference_id cpe:2.3:a:jenkins-ci:monitoring_plugin:1.50.0:*:*:*:*:cloudbees_jenkins:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.50.0:*:*:*:*:cloudbees_jenkins:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.51.0:*:*:*:*:cloudbees_jenkins:*:*
reference_id cpe:2.3:a:jenkins-ci:monitoring_plugin:1.51.0:*:*:*:*:cloudbees_jenkins:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.51.0:*:*:*:*:cloudbees_jenkins:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.52.0:*:*:*:*:cloudbees_jenkins:*:*
reference_id cpe:2.3:a:jenkins-ci:monitoring_plugin:1.52.0:*:*:*:*:cloudbees_jenkins:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.52.0:*:*:*:*:cloudbees_jenkins:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:*:*:*:*:*:cloudbees_jenkins:*:*
reference_id cpe:2.3:a:jenkins-ci:monitoring_plugin:*:*:*:*:*:cloudbees_jenkins:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:*:*:*:*:*:cloudbees_jenkins:*:*
25
reference_url https://github.com/advisories/GHSA-ghjw-fc9q-jj8c
reference_id GHSA-ghjw-fc9q-jj8c
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-ghjw-fc9q-jj8c
fixed_packages
aliases CVE-2014-3678, GHSA-ghjw-fc9q-jj8c
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-28y2-gqhb-k7ak
2
url VCID-2vbv-gzfv-83ae
vulnerability_id VCID-2vbv-gzfv-83ae
summary
Jenkins allows remote authenticated users to bypass intended restrictions and create or destroy arbitrary jobs
Jenkins before 1.583 and LTS before 1.565.3 allows remote authenticated users with the Job/CONFIGURE permission to bypass intended restrictions and create or destroy arbitrary jobs via unspecified vectors.
references
0
reference_url https://access.redhat.com/errata/RHBA-2014:1630
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHBA-2014:1630
1
reference_url https://access.redhat.com/errata/RHSA-2016:0070
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:0070
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3663.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3663.json
3
reference_url https://access.redhat.com/security/cve/CVE-2014-3663
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2014-3663
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3663
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20242
published_at 2026-04-21T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20354
published_at 2026-04-11T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20309
published_at 2026-04-12T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.2025
published_at 2026-04-13T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20239
published_at 2026-04-16T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20244
published_at 2026-04-18T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20255
published_at 2026-04-01T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20399
published_at 2026-04-02T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20459
published_at 2026-04-04T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20184
published_at 2026-04-07T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.20265
published_at 2026-04-08T12:55:00Z
11
value 0.00065
scoring_system epss
scoring_elements 0.20324
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3663
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1147764
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1147764
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3663
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-3663
7
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*
11
reference_url https://github.com/advisories/GHSA-64mc-2m9p-23c8
reference_id GHSA-64mc-2m9p-23c8
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-64mc-2m9p-23c8
fixed_packages
aliases CVE-2014-3663, GHSA-64mc-2m9p-23c8
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2vbv-gzfv-83ae
3
url VCID-4hfu-spf7-a3hw
vulnerability_id VCID-4hfu-spf7-a3hw
summary The loadUserByUsername function in hudson/security/HudsonPrivateSecurityRealm.java in Jenkins before 1.551 and LTS before 1.532.2 allows remote attackers to determine whether a user exists via vectors related to failed login attempts.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2064.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2064.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2064
reference_id
reference_type
scores
0
value 0.00389
scoring_system epss
scoring_elements 0.60018
published_at 2026-04-21T12:55:00Z
1
value 0.00389
scoring_system epss
scoring_elements 0.59985
published_at 2026-04-08T12:55:00Z
2
value 0.00389
scoring_system epss
scoring_elements 0.59999
published_at 2026-04-09T12:55:00Z
3
value 0.00389
scoring_system epss
scoring_elements 0.6002
published_at 2026-04-11T12:55:00Z
4
value 0.00389
scoring_system epss
scoring_elements 0.60004
published_at 2026-04-12T12:55:00Z
5
value 0.00389
scoring_system epss
scoring_elements 0.59987
published_at 2026-04-13T12:55:00Z
6
value 0.00389
scoring_system epss
scoring_elements 0.60026
published_at 2026-04-16T12:55:00Z
7
value 0.00389
scoring_system epss
scoring_elements 0.60033
published_at 2026-04-18T12:55:00Z
8
value 0.00389
scoring_system epss
scoring_elements 0.59863
published_at 2026-04-01T12:55:00Z
9
value 0.00389
scoring_system epss
scoring_elements 0.5994
published_at 2026-04-02T12:55:00Z
10
value 0.00389
scoring_system epss
scoring_elements 0.59966
published_at 2026-04-04T12:55:00Z
11
value 0.00389
scoring_system epss
scoring_elements 0.59935
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2064
2
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
3
reference_url https://github.com/jenkinsci/jenkins/commit/fbf96734470caba9364f04e0b77b0bae7293a1ec
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/fbf96734470caba9364f04e0b77b0bae7293a1ec
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-2064
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-2064
5
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
6
reference_url http://www.openwall.com/lists/oss-security/2014/02/21/2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/02/21/2
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1067817
reference_id 1067817
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1067817
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
10
reference_url https://github.com/advisories/GHSA-9vg9-x38g-9hfx
reference_id GHSA-9vg9-x38g-9hfx
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9vg9-x38g-9hfx
fixed_packages
aliases CVE-2014-2064, GHSA-9vg9-x38g-9hfx
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4hfu-spf7-a3hw
4
url VCID-52sp-kv9t-gye3
vulnerability_id VCID-52sp-kv9t-gye3
summary Jenkins before 1.551 and LTS before 1.532.2 does not invalidate the API token when a user is deleted, which allows remote authenticated users to retain access via the token.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2062.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2062.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2062
reference_id
reference_type
scores
0
value 0.00186
scoring_system epss
scoring_elements 0.40385
published_at 2026-04-21T12:55:00Z
1
value 0.00186
scoring_system epss
scoring_elements 0.40469
published_at 2026-04-08T12:55:00Z
2
value 0.00186
scoring_system epss
scoring_elements 0.4048
published_at 2026-04-09T12:55:00Z
3
value 0.00186
scoring_system epss
scoring_elements 0.405
published_at 2026-04-11T12:55:00Z
4
value 0.00186
scoring_system epss
scoring_elements 0.40464
published_at 2026-04-12T12:55:00Z
5
value 0.00186
scoring_system epss
scoring_elements 0.40444
published_at 2026-04-13T12:55:00Z
6
value 0.00186
scoring_system epss
scoring_elements 0.40491
published_at 2026-04-16T12:55:00Z
7
value 0.00186
scoring_system epss
scoring_elements 0.4046
published_at 2026-04-18T12:55:00Z
8
value 0.00186
scoring_system epss
scoring_elements 0.40382
published_at 2026-04-01T12:55:00Z
9
value 0.00186
scoring_system epss
scoring_elements 0.4047
published_at 2026-04-02T12:55:00Z
10
value 0.00186
scoring_system epss
scoring_elements 0.40496
published_at 2026-04-04T12:55:00Z
11
value 0.00186
scoring_system epss
scoring_elements 0.40418
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2062
2
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
3
reference_url https://github.com/jenkinsci/jenkins/commit/5548b5220cfd496831b5721124189ff18fbb12a3
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/5548b5220cfd496831b5721124189ff18fbb12a3
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-2062
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-2062
5
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
6
reference_url http://www.openwall.com/lists/oss-security/2014/02/21/2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/02/21/2
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1067811
reference_id 1067811
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1067811
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
10
reference_url https://github.com/advisories/GHSA-vxc6-wvh8-fpxw
reference_id GHSA-vxc6-wvh8-fpxw
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-vxc6-wvh8-fpxw
fixed_packages
aliases CVE-2014-2062, GHSA-vxc6-wvh8-fpxw
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-52sp-kv9t-gye3
5
url VCID-6avm-s2zj-5qex
vulnerability_id VCID-6avm-s2zj-5qex
summary Session fixation vulnerability in Jenkins before 1.551 and LTS before 1.532.2 allows remote attackers to hijack web sessions via vectors involving the "override" of Jenkins cookies.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2066.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2066.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2066
reference_id
reference_type
scores
0
value 0.00138
scoring_system epss
scoring_elements 0.33944
published_at 2026-04-07T12:55:00Z
1
value 0.00138
scoring_system epss
scoring_elements 0.33939
published_at 2026-04-21T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33972
published_at 2026-04-18T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.3395
published_at 2026-04-13T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.33974
published_at 2026-04-12T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.33712
published_at 2026-04-01T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.34017
published_at 2026-04-11T12:55:00Z
7
value 0.00138
scoring_system epss
scoring_elements 0.34056
published_at 2026-04-02T12:55:00Z
8
value 0.00138
scoring_system epss
scoring_elements 0.33986
published_at 2026-04-16T12:55:00Z
9
value 0.00138
scoring_system epss
scoring_elements 0.34086
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2066
2
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
3
reference_url https://github.com/jenkinsci/jenkins/commit/8ac74c350779921598f9d5edfed39dd35de8842a
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/8ac74c350779921598f9d5edfed39dd35de8842a
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-2066
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-2066
5
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
6
reference_url http://www.openwall.com/lists/oss-security/2014/02/21/2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/02/21/2
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1067827
reference_id 1067827
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1067827
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
10
reference_url https://github.com/advisories/GHSA-8jfx-h6q2-v4g3
reference_id GHSA-8jfx-h6q2-v4g3
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-8jfx-h6q2-v4g3
fixed_packages
aliases CVE-2014-2066, GHSA-8jfx-h6q2-v4g3
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6avm-s2zj-5qex
6
url VCID-6qdw-fvzm-4kdx
vulnerability_id VCID-6qdw-fvzm-4kdx
summary
Jenkins Exposure of Sensitive Information to an Unauthorized Actor vulnerability
Jenkins before 1.583 and LTS before 1.565.3 allows remote attackers to enumerate user names via vectors related to login attempts.
references
0
reference_url https://access.redhat.com/errata/RHBA-2014:1630
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHBA-2014:1630
1
reference_url https://access.redhat.com/errata/RHSA-2016:0070
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:0070
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3662.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3662.json
3
reference_url https://access.redhat.com/security/cve/CVE-2014-3662
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2014-3662
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3662
reference_id
reference_type
scores
0
value 0.00107
scoring_system epss
scoring_elements 0.28772
published_at 2026-04-21T12:55:00Z
1
value 0.00107
scoring_system epss
scoring_elements 0.28916
published_at 2026-04-11T12:55:00Z
2
value 0.00107
scoring_system epss
scoring_elements 0.28873
published_at 2026-04-12T12:55:00Z
3
value 0.00107
scoring_system epss
scoring_elements 0.28823
published_at 2026-04-13T12:55:00Z
4
value 0.00107
scoring_system epss
scoring_elements 0.28845
published_at 2026-04-16T12:55:00Z
5
value 0.00107
scoring_system epss
scoring_elements 0.28822
published_at 2026-04-18T12:55:00Z
6
value 0.00107
scoring_system epss
scoring_elements 0.28869
published_at 2026-04-01T12:55:00Z
7
value 0.00107
scoring_system epss
scoring_elements 0.28946
published_at 2026-04-02T12:55:00Z
8
value 0.00107
scoring_system epss
scoring_elements 0.28996
published_at 2026-04-04T12:55:00Z
9
value 0.00107
scoring_system epss
scoring_elements 0.28803
published_at 2026-04-07T12:55:00Z
10
value 0.00107
scoring_system epss
scoring_elements 0.2887
published_at 2026-04-08T12:55:00Z
11
value 0.00107
scoring_system epss
scoring_elements 0.28912
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3662
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1147759
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1147759
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3662
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-3662
7
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*
11
reference_url https://github.com/advisories/GHSA-fxqr-px2m-fvc2
reference_id GHSA-fxqr-px2m-fvc2
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-fxqr-px2m-fvc2
fixed_packages
aliases CVE-2014-3662, GHSA-fxqr-px2m-fvc2
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6qdw-fvzm-4kdx
7
url VCID-7p5d-b885-sycx
vulnerability_id VCID-7p5d-b885-sycx
summary
Jenkins allows Remote Users to Obtain Sensitive Information from a Plugin Code
Jenkins before 1.583 and LTS before 1.565.3 does not properly prevent downloading of plugins, which allows remote authenticated users with the Overall/READ permission to obtain sensitive information by reading the plugin code.
references
0
reference_url https://access.redhat.com/errata/RHBA-2014:1630
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHBA-2014:1630
1
reference_url https://access.redhat.com/errata/RHSA-2016:0070
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:0070
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3667.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3667.json
3
reference_url https://access.redhat.com/security/cve/CVE-2014-3667
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2014-3667
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3667
reference_id
reference_type
scores
0
value 0.00056
scoring_system epss
scoring_elements 0.17569
published_at 2026-04-04T12:55:00Z
1
value 0.00056
scoring_system epss
scoring_elements 0.17398
published_at 2026-04-21T12:55:00Z
2
value 0.00056
scoring_system epss
scoring_elements 0.17364
published_at 2026-04-18T12:55:00Z
3
value 0.00056
scoring_system epss
scoring_elements 0.17414
published_at 2026-04-13T12:55:00Z
4
value 0.00056
scoring_system epss
scoring_elements 0.17466
published_at 2026-04-12T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17515
published_at 2026-04-11T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.17356
published_at 2026-04-16T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.1735
published_at 2026-04-07T12:55:00Z
8
value 0.00056
scoring_system epss
scoring_elements 0.17524
published_at 2026-04-02T12:55:00Z
9
value 0.00056
scoring_system epss
scoring_elements 0.17502
published_at 2026-04-09T12:55:00Z
10
value 0.00056
scoring_system epss
scoring_elements 0.17442
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3667
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1147770
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1147770
6
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
7
reference_url https://github.com/jenkinsci/jenkins/commit/f0a29b562e14d837912c6b35fa4e81478563813a
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/f0a29b562e14d837912c6b35fa4e81478563813a
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3667
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-3667
9
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*
13
reference_url https://github.com/advisories/GHSA-5xm3-48v5-6h7v
reference_id GHSA-5xm3-48v5-6h7v
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5xm3-48v5-6h7v
fixed_packages
aliases CVE-2014-3667, GHSA-5xm3-48v5-6h7v
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7p5d-b885-sycx
8
url VCID-bkyy-edpd-m3cy
vulnerability_id VCID-bkyy-edpd-m3cy
summary
Jenkins Vulnerable to Clickjacking
Jenkins before 1.551 and LTS before 1.532.2 allows remote attackers to conduct clickjacking attacks via unspecified vectors.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2063.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2063.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2063
reference_id
reference_type
scores
0
value 0.00428
scoring_system epss
scoring_elements 0.62506
published_at 2026-04-21T12:55:00Z
1
value 0.00428
scoring_system epss
scoring_elements 0.62365
published_at 2026-04-01T12:55:00Z
2
value 0.00428
scoring_system epss
scoring_elements 0.62424
published_at 2026-04-02T12:55:00Z
3
value 0.00428
scoring_system epss
scoring_elements 0.62454
published_at 2026-04-04T12:55:00Z
4
value 0.00428
scoring_system epss
scoring_elements 0.62421
published_at 2026-04-07T12:55:00Z
5
value 0.00428
scoring_system epss
scoring_elements 0.62472
published_at 2026-04-08T12:55:00Z
6
value 0.00428
scoring_system epss
scoring_elements 0.62488
published_at 2026-04-09T12:55:00Z
7
value 0.00428
scoring_system epss
scoring_elements 0.62507
published_at 2026-04-11T12:55:00Z
8
value 0.00428
scoring_system epss
scoring_elements 0.62496
published_at 2026-04-12T12:55:00Z
9
value 0.00428
scoring_system epss
scoring_elements 0.62474
published_at 2026-04-13T12:55:00Z
10
value 0.00428
scoring_system epss
scoring_elements 0.62516
published_at 2026-04-16T12:55:00Z
11
value 0.00428
scoring_system epss
scoring_elements 0.62522
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2063
2
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
3
reference_url https://github.com/jenkinsci/jenkins/commit/16931bd7bf7560e26ef98328b8e95e803d0e90f6
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/16931bd7bf7560e26ef98328b8e95e803d0e90f6
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-2063
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-2063
5
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
6
reference_url http://www.openwall.com/lists/oss-security/2014/02/21/2
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/02/21/2
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1067812
reference_id 1067812
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1067812
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
10
reference_url https://github.com/advisories/GHSA-w3f5-gq7j-m797
reference_id GHSA-w3f5-gq7j-m797
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-w3f5-gq7j-m797
fixed_packages
aliases CVE-2014-2063, GHSA-w3f5-gq7j-m797
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bkyy-edpd-m3cy
9
url VCID-bn9w-mr5k-ufen
vulnerability_id VCID-bn9w-mr5k-ufen
summary Cross-site scripting (XSS) vulnerability in java/hudson/model/Cause.java in Jenkins before 1.551 and LTS before 1.532.2 allows remote authenticated users to inject arbitrary web script or HTML via a "remote cause note."
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2067.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2067.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2067
reference_id
reference_type
scores
0
value 0.00109
scoring_system epss
scoring_elements 0.29211
published_at 2026-04-21T12:55:00Z
1
value 0.00109
scoring_system epss
scoring_elements 0.29246
published_at 2026-04-07T12:55:00Z
2
value 0.00109
scoring_system epss
scoring_elements 0.29311
published_at 2026-04-08T12:55:00Z
3
value 0.00109
scoring_system epss
scoring_elements 0.29351
published_at 2026-04-09T12:55:00Z
4
value 0.00109
scoring_system epss
scoring_elements 0.29354
published_at 2026-04-11T12:55:00Z
5
value 0.00109
scoring_system epss
scoring_elements 0.29308
published_at 2026-04-12T12:55:00Z
6
value 0.00109
scoring_system epss
scoring_elements 0.29256
published_at 2026-04-18T12:55:00Z
7
value 0.00109
scoring_system epss
scoring_elements 0.29281
published_at 2026-04-16T12:55:00Z
8
value 0.00109
scoring_system epss
scoring_elements 0.29313
published_at 2026-04-01T12:55:00Z
9
value 0.00109
scoring_system epss
scoring_elements 0.29384
published_at 2026-04-02T12:55:00Z
10
value 0.00109
scoring_system epss
scoring_elements 0.29434
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2067
2
reference_url http://seclists.org/oss-sec/2014/q1/421
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://seclists.org/oss-sec/2014/q1/421
3
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/91354
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/91354
4
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
5
reference_url https://github.com/jenkinsci/jenkins/commit/5d57c855f3147bfc5e7fda9252317b428a700014
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/5d57c855f3147bfc5e7fda9252317b428a700014
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-2067
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-2067
7
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1067832
reference_id 1067832
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1067832
9
reference_url https://github.com/advisories/GHSA-vj6q-v2h7-6q5m
reference_id GHSA-vj6q-v2h7-6q5m
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-vj6q-v2h7-6q5m
fixed_packages
aliases CVE-2014-2067, GHSA-vj6q-v2h7-6q5m
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bn9w-mr5k-ufen
10
url VCID-c43n-xyfr-aqbe
vulnerability_id VCID-c43n-xyfr-aqbe
summary
Jenkins Path Traversal vulnerability
Directory traversal vulnerability in Jenkins before 1.583 and LTS before 1.565.3 allows remote authenticated users with the Overall/READ permission to read arbitrary files via unspecified vectors.
references
0
reference_url https://access.redhat.com/errata/RHBA-2014:1630
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHBA-2014:1630
1
reference_url https://access.redhat.com/errata/RHSA-2016:0070
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:0070
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3664.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3664.json
3
reference_url https://access.redhat.com/security/cve/CVE-2014-3664
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2014-3664
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3664
reference_id
reference_type
scores
0
value 0.00193
scoring_system epss
scoring_elements 0.41185
published_at 2026-04-21T12:55:00Z
1
value 0.00193
scoring_system epss
scoring_elements 0.41258
published_at 2026-04-18T12:55:00Z
2
value 0.00193
scoring_system epss
scoring_elements 0.41266
published_at 2026-04-09T12:55:00Z
3
value 0.00193
scoring_system epss
scoring_elements 0.41288
published_at 2026-04-11T12:55:00Z
4
value 0.00193
scoring_system epss
scoring_elements 0.41256
published_at 2026-04-12T12:55:00Z
5
value 0.00193
scoring_system epss
scoring_elements 0.41243
published_at 2026-04-13T12:55:00Z
6
value 0.00193
scoring_system epss
scoring_elements 0.41287
published_at 2026-04-16T12:55:00Z
7
value 0.00193
scoring_system epss
scoring_elements 0.41162
published_at 2026-04-01T12:55:00Z
8
value 0.00193
scoring_system epss
scoring_elements 0.41254
published_at 2026-04-02T12:55:00Z
9
value 0.00193
scoring_system epss
scoring_elements 0.41284
published_at 2026-04-04T12:55:00Z
10
value 0.00193
scoring_system epss
scoring_elements 0.41208
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3664
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1147765
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1147765
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/96973
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/96973
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3664
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-3664
8
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*
12
reference_url https://github.com/advisories/GHSA-3gp5-92h5-h855
reference_id GHSA-3gp5-92h5-h855
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3gp5-92h5-h855
fixed_packages
aliases CVE-2014-3664, GHSA-3gp5-92h5-h855
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c43n-xyfr-aqbe
11
url VCID-ds2c-vfv9-1yhf
vulnerability_id VCID-ds2c-vfv9-1yhf
summary Cross-site scripting (XSS) vulnerability in Jenkins before 1.551 and LTS before 1.532.2 allows remote attackers to inject arbitrary web script or HTML via the iconSize cookie.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2065.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2065.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2065
reference_id
reference_type
scores
0
value 0.00137
scoring_system epss
scoring_elements 0.33525
published_at 2026-04-21T12:55:00Z
1
value 0.00137
scoring_system epss
scoring_elements 0.33584
published_at 2026-04-08T12:55:00Z
2
value 0.00137
scoring_system epss
scoring_elements 0.33617
published_at 2026-04-09T12:55:00Z
3
value 0.00137
scoring_system epss
scoring_elements 0.33612
published_at 2026-04-11T12:55:00Z
4
value 0.00137
scoring_system epss
scoring_elements 0.33571
published_at 2026-04-12T12:55:00Z
5
value 0.00137
scoring_system epss
scoring_elements 0.33548
published_at 2026-04-13T12:55:00Z
6
value 0.00137
scoring_system epss
scoring_elements 0.33581
published_at 2026-04-16T12:55:00Z
7
value 0.00137
scoring_system epss
scoring_elements 0.33558
published_at 2026-04-18T12:55:00Z
8
value 0.00137
scoring_system epss
scoring_elements 0.33515
published_at 2026-04-01T12:55:00Z
9
value 0.00137
scoring_system epss
scoring_elements 0.33669
published_at 2026-04-02T12:55:00Z
10
value 0.00137
scoring_system epss
scoring_elements 0.33701
published_at 2026-04-04T12:55:00Z
11
value 0.00137
scoring_system epss
scoring_elements 0.3354
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2065
2
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
3
reference_url https://github.com/jenkinsci/jenkins/commit/a0b00508eeb74d7033dc4100eb382df4e8fa72e7
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/a0b00508eeb74d7033dc4100eb382df4e8fa72e7
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-2065
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-2065
5
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
6
reference_url http://www.openwall.com/lists/oss-security/2014/02/21/2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/02/21/2
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1067820
reference_id 1067820
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1067820
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
10
reference_url https://github.com/advisories/GHSA-fxj8-cqcp-3vgq
reference_id GHSA-fxj8-cqcp-3vgq
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-fxj8-cqcp-3vgq
fixed_packages
aliases CVE-2014-2065, GHSA-fxj8-cqcp-3vgq
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ds2c-vfv9-1yhf
12
url VCID-fnh5-jm4p-6yc8
vulnerability_id VCID-fnh5-jm4p-6yc8
summary
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2014-3665 jenkins: remote code execution from slaves (SECURITY-144)
references
0
reference_url https://access.redhat.com/errata/RHBA-2014:1630
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHBA-2014:1630
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3665.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3665.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3665
reference_id
reference_type
scores
0
value 0.00353
scoring_system epss
scoring_elements 0.57699
published_at 2026-04-21T12:55:00Z
1
value 0.00353
scoring_system epss
scoring_elements 0.57719
published_at 2026-04-09T12:55:00Z
2
value 0.00353
scoring_system epss
scoring_elements 0.57734
published_at 2026-04-11T12:55:00Z
3
value 0.00353
scoring_system epss
scoring_elements 0.57713
published_at 2026-04-12T12:55:00Z
4
value 0.00353
scoring_system epss
scoring_elements 0.57694
published_at 2026-04-13T12:55:00Z
5
value 0.00353
scoring_system epss
scoring_elements 0.57723
published_at 2026-04-16T12:55:00Z
6
value 0.00353
scoring_system epss
scoring_elements 0.5772
published_at 2026-04-18T12:55:00Z
7
value 0.00353
scoring_system epss
scoring_elements 0.5758
published_at 2026-04-01T12:55:00Z
8
value 0.00353
scoring_system epss
scoring_elements 0.57665
published_at 2026-04-02T12:55:00Z
9
value 0.00353
scoring_system epss
scoring_elements 0.57686
published_at 2026-04-04T12:55:00Z
10
value 0.00353
scoring_system epss
scoring_elements 0.57661
published_at 2026-04-07T12:55:00Z
11
value 0.00353
scoring_system epss
scoring_elements 0.57716
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3665
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1147767
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1147767
4
reference_url https://wiki.jenkins-ci.org/display/JENKINS/Slave+To+Master+Access+Control
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/JENKINS/Slave+To+Master+Access+Control
5
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-30
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-30
6
reference_url https://www.cloudbees.com/jenkins-security-advisory-2014-10-30
reference_id
reference_type
scores
url https://www.cloudbees.com/jenkins-security-advisory-2014-10-30
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
9
reference_url https://access.redhat.com/security/cve/CVE-2014-3665
reference_id CVE-2014-3665
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2014-3665
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3665
reference_id CVE-2014-3665
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-3665
11
reference_url https://github.com/advisories/GHSA-66cr-6whx-732p
reference_id GHSA-66cr-6whx-732p
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-66cr-6whx-732p
fixed_packages
aliases CVE-2014-3665, GHSA-66cr-6whx-732p
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fnh5-jm4p-6yc8
13
url VCID-hvd6-bj7t-q7fj
vulnerability_id VCID-hvd6-bj7t-q7fj
summary Directory traversal vulnerability in the CLI job creation (hudson/cli/CreateJobCommand.java) in Jenkins before 1.551 and LTS before 1.532.2 allows remote authenticated users to overwrite arbitrary files via the job name.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2059.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2059.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2059
reference_id
reference_type
scores
0
value 0.01968
scoring_system epss
scoring_elements 0.83563
published_at 2026-04-21T12:55:00Z
1
value 0.01968
scoring_system epss
scoring_elements 0.83512
published_at 2026-04-08T12:55:00Z
2
value 0.01968
scoring_system epss
scoring_elements 0.83522
published_at 2026-04-09T12:55:00Z
3
value 0.01968
scoring_system epss
scoring_elements 0.83537
published_at 2026-04-11T12:55:00Z
4
value 0.01968
scoring_system epss
scoring_elements 0.83531
published_at 2026-04-12T12:55:00Z
5
value 0.01968
scoring_system epss
scoring_elements 0.83527
published_at 2026-04-13T12:55:00Z
6
value 0.01968
scoring_system epss
scoring_elements 0.83561
published_at 2026-04-16T12:55:00Z
7
value 0.01968
scoring_system epss
scoring_elements 0.83562
published_at 2026-04-18T12:55:00Z
8
value 0.01968
scoring_system epss
scoring_elements 0.83462
published_at 2026-04-01T12:55:00Z
9
value 0.01968
scoring_system epss
scoring_elements 0.83475
published_at 2026-04-02T12:55:00Z
10
value 0.01968
scoring_system epss
scoring_elements 0.83489
published_at 2026-04-04T12:55:00Z
11
value 0.01968
scoring_system epss
scoring_elements 0.83488
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2059
2
reference_url http://seclists.org/oss-sec/2014/q1/421
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://seclists.org/oss-sec/2014/q1/421
3
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/91346
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/91346
4
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
5
reference_url https://github.com/jenkinsci/jenkins/commit/ad38d8480f20ce3cbf8fec3e2003bc83efda4f7d
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/ad38d8480f20ce3cbf8fec3e2003bc83efda4f7d
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-2059
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-2059
7
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1067801
reference_id 1067801
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1067801
9
reference_url https://github.com/advisories/GHSA-v759-3fh9-84mx
reference_id GHSA-v759-3fh9-84mx
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-v759-3fh9-84mx
fixed_packages
aliases CVE-2014-2059, GHSA-v759-3fh9-84mx
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hvd6-bj7t-q7fj
14
url VCID-napq-s84t-dfct
vulnerability_id VCID-napq-s84t-dfct
summary Jenkins before 1.502 allows remote authenticated users to configure an otherwise restricted project via vectors related to post-build actions.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7330.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7330.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-7330
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.21016
published_at 2026-04-07T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.21051
published_at 2026-04-21T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.21064
published_at 2026-04-16T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.21073
published_at 2026-04-18T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.21124
published_at 2026-04-12T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.21167
published_at 2026-04-11T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.21057
published_at 2026-04-01T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.21157
published_at 2026-04-09T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.21212
published_at 2026-04-02T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.21096
published_at 2026-04-08T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.21266
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-7330
2
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
3
reference_url https://github.com/jenkinsci/jenkins/commit/36342d71e29e0620f803a7470ce96c61761648d8
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/36342d71e29e0620f803a7470ce96c61761648d8
4
reference_url https://github.com/jenkinsci/jenkins/commit/757bc8a53956e6fbab267214e6e0896f03c3c262
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/757bc8a53956e6fbab267214e6e0896f03c3c262
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-7330
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-7330
6
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
7
reference_url http://www.openwall.com/lists/oss-security/2014/02/21/2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/02/21/2
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1067799
reference_id 1067799
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1067799
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
10
reference_url https://github.com/advisories/GHSA-h5jv-hg68-mjhg
reference_id GHSA-h5jv-hg68-mjhg
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-h5jv-hg68-mjhg
fixed_packages
aliases CVE-2013-7330, GHSA-h5jv-hg68-mjhg
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-napq-s84t-dfct
15
url VCID-nwz6-6gd9-gyac
vulnerability_id VCID-nwz6-6gd9-gyac
summary The Subversion plugin before 1.54 for Jenkins stores credentials using base64 encoding, which allows local users to obtain passwords and SSH private keys by reading a subversion.credentials file.
references
0
reference_url https://access.redhat.com/errata/RHBA-2014:1630
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHBA-2014:1630
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6372.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6372.json
2
reference_url https://access.redhat.com/security/cve/CVE-2013-6372
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2013-6372
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6372
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19107
published_at 2026-04-13T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19201
published_at 2026-04-09T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19085
published_at 2026-04-21T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19077
published_at 2026-04-18T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19065
published_at 2026-04-16T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.19298
published_at 2026-04-02T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19351
published_at 2026-04-04T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.19068
published_at 2026-04-07T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.19148
published_at 2026-04-08T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19161
published_at 2026-04-12T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.19208
published_at 2026-04-11T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.19164
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6372
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1032391
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1032391
5
reference_url https://github.com/jenkinsci/subversion-plugin
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/subversion-plugin
6
reference_url https://github.com/jenkinsci/subversion-plugin/commit/7d4562d6f7e40de04bbe29577b51c79f07d05ba6
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/subversion-plugin/commit/7d4562d6f7e40de04bbe29577b51c79f07d05ba6
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-6372
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-6372
8
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-11-20
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-11-20
9
reference_url https://github.com/advisories/GHSA-c4fr-gx5w-8qf2
reference_id GHSA-c4fr-gx5w-8qf2
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-c4fr-gx5w-8qf2
fixed_packages
aliases CVE-2013-6372, GHSA-c4fr-gx5w-8qf2
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nwz6-6gd9-gyac
16
url VCID-r79s-gp2g-13b7
vulnerability_id VCID-r79s-gp2g-13b7
summary
Jenkins Denial of Service vulnerability
CVE-2014-3661 jenkins: denial of service (SECURITY-87)
references
0
reference_url https://access.redhat.com/errata/RHBA-2014:1630
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHBA-2014:1630
1
reference_url https://access.redhat.com/errata/RHSA-2016:0070
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:0070
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3661.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3661.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3661
reference_id
reference_type
scores
0
value 0.00157
scoring_system epss
scoring_elements 0.36456
published_at 2026-04-21T12:55:00Z
1
value 0.00157
scoring_system epss
scoring_elements 0.36543
published_at 2026-04-11T12:55:00Z
2
value 0.00157
scoring_system epss
scoring_elements 0.36508
published_at 2026-04-12T12:55:00Z
3
value 0.00157
scoring_system epss
scoring_elements 0.36485
published_at 2026-04-13T12:55:00Z
4
value 0.00157
scoring_system epss
scoring_elements 0.36528
published_at 2026-04-16T12:55:00Z
5
value 0.00157
scoring_system epss
scoring_elements 0.36511
published_at 2026-04-18T12:55:00Z
6
value 0.00157
scoring_system epss
scoring_elements 0.36422
published_at 2026-04-01T12:55:00Z
7
value 0.00157
scoring_system epss
scoring_elements 0.36595
published_at 2026-04-02T12:55:00Z
8
value 0.00157
scoring_system epss
scoring_elements 0.36628
published_at 2026-04-04T12:55:00Z
9
value 0.00157
scoring_system epss
scoring_elements 0.36465
published_at 2026-04-07T12:55:00Z
10
value 0.00157
scoring_system epss
scoring_elements 0.36516
published_at 2026-04-08T12:55:00Z
11
value 0.00157
scoring_system epss
scoring_elements 0.36536
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3661
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1147758
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1147758
5
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*
9
reference_url https://access.redhat.com/security/cve/CVE-2014-3661
reference_id CVE-2014-3661
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2014-3661
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3661
reference_id CVE-2014-3661
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-3661
11
reference_url https://github.com/advisories/GHSA-r5m2-g5gc-q43r
reference_id GHSA-r5m2-g5gc-q43r
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-r5m2-g5gc-q43r
fixed_packages
aliases CVE-2014-3661, GHSA-r5m2-g5gc-q43r
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r79s-gp2g-13b7
17
url VCID-u21t-wbdr-auez
vulnerability_id VCID-u21t-wbdr-auez
summary The input control in PasswordParameterDefinition in Jenkins before 1.551 and LTS before 1.532.2 allows remote attackers to obtain passwords by reading the HTML source code, related to the default value.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2061.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2061.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2061
reference_id
reference_type
scores
0
value 0.00284
scoring_system epss
scoring_elements 0.51818
published_at 2026-04-21T12:55:00Z
1
value 0.00284
scoring_system epss
scoring_elements 0.51778
published_at 2026-04-08T12:55:00Z
2
value 0.00284
scoring_system epss
scoring_elements 0.51774
published_at 2026-04-09T12:55:00Z
3
value 0.00284
scoring_system epss
scoring_elements 0.51824
published_at 2026-04-11T12:55:00Z
4
value 0.00284
scoring_system epss
scoring_elements 0.51803
published_at 2026-04-12T12:55:00Z
5
value 0.00284
scoring_system epss
scoring_elements 0.51788
published_at 2026-04-13T12:55:00Z
6
value 0.00284
scoring_system epss
scoring_elements 0.5183
published_at 2026-04-16T12:55:00Z
7
value 0.00284
scoring_system epss
scoring_elements 0.51837
published_at 2026-04-18T12:55:00Z
8
value 0.00284
scoring_system epss
scoring_elements 0.51686
published_at 2026-04-01T12:55:00Z
9
value 0.00284
scoring_system epss
scoring_elements 0.51736
published_at 2026-04-02T12:55:00Z
10
value 0.00284
scoring_system epss
scoring_elements 0.51762
published_at 2026-04-04T12:55:00Z
11
value 0.00284
scoring_system epss
scoring_elements 0.51723
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2061
2
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
3
reference_url https://github.com/jenkinsci/jenkins/commit/bf539198564a1108b7b71a973bf7de963a6213ef
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/bf539198564a1108b7b71a973bf7de963a6213ef
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-2061
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-2061
5
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
6
reference_url http://www.openwall.com/lists/oss-security/2014/02/21/2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/02/21/2
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1067808
reference_id 1067808
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1067808
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
10
reference_url https://github.com/advisories/GHSA-rxfv-gm5x-9wqj
reference_id GHSA-rxfv-gm5x-9wqj
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rxfv-gm5x-9wqj
fixed_packages
aliases CVE-2014-2061, GHSA-rxfv-gm5x-9wqj
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u21t-wbdr-auez
18
url VCID-u321-xdwe-gfdp
vulnerability_id VCID-u321-xdwe-gfdp
summary
Jenkins allows Remote Attackers to Hijack Sessions
The Winstone servlet container in Jenkins before 1.551 and LTS before 1.532.2 allows remote attackers to hijack sessions via unspecified vectors.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2060.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2060.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2060
reference_id
reference_type
scores
0
value 0.00145
scoring_system epss
scoring_elements 0.34818
published_at 2026-04-21T12:55:00Z
1
value 0.00145
scoring_system epss
scoring_elements 0.34711
published_at 2026-04-01T12:55:00Z
2
value 0.00145
scoring_system epss
scoring_elements 0.34918
published_at 2026-04-02T12:55:00Z
3
value 0.00145
scoring_system epss
scoring_elements 0.34945
published_at 2026-04-04T12:55:00Z
4
value 0.00145
scoring_system epss
scoring_elements 0.34824
published_at 2026-04-07T12:55:00Z
5
value 0.00145
scoring_system epss
scoring_elements 0.34869
published_at 2026-04-08T12:55:00Z
6
value 0.00145
scoring_system epss
scoring_elements 0.34896
published_at 2026-04-09T12:55:00Z
7
value 0.00145
scoring_system epss
scoring_elements 0.349
published_at 2026-04-11T12:55:00Z
8
value 0.00145
scoring_system epss
scoring_elements 0.34863
published_at 2026-04-18T12:55:00Z
9
value 0.00145
scoring_system epss
scoring_elements 0.3484
published_at 2026-04-13T12:55:00Z
10
value 0.00145
scoring_system epss
scoring_elements 0.34879
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2060
2
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-2060
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-2060
4
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
5
reference_url http://www.openwall.com/lists/oss-security/2014/02/21/2
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/02/21/2
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1067806
reference_id 1067806
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1067806
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
9
reference_url https://github.com/advisories/GHSA-9c26-cf8c-mw43
reference_id GHSA-9c26-cf8c-mw43
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9c26-cf8c-mw43
fixed_packages
aliases CVE-2014-2060, GHSA-9c26-cf8c-mw43
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u321-xdwe-gfdp
19
url VCID-vznw-vuay-7bcg
vulnerability_id VCID-vznw-vuay-7bcg
summary
Jenkins allows for Code Execution via Crafted Packet to the CLI
Jenkins before 1.583 and LTS before 1.565.3 allows remote attackers to execute arbitrary code via a crafted packet to the CLI channel.
references
0
reference_url https://access.redhat.com/errata/RHSA-2016:0070
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:0070
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3666.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3666.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3666
reference_id
reference_type
scores
0
value 0.01213
scoring_system epss
scoring_elements 0.79027
published_at 2026-04-21T12:55:00Z
1
value 0.01213
scoring_system epss
scoring_elements 0.78962
published_at 2026-04-02T12:55:00Z
2
value 0.01213
scoring_system epss
scoring_elements 0.78989
published_at 2026-04-04T12:55:00Z
3
value 0.01213
scoring_system epss
scoring_elements 0.78974
published_at 2026-04-07T12:55:00Z
4
value 0.01213
scoring_system epss
scoring_elements 0.78998
published_at 2026-04-08T12:55:00Z
5
value 0.01213
scoring_system epss
scoring_elements 0.79005
published_at 2026-04-09T12:55:00Z
6
value 0.01213
scoring_system epss
scoring_elements 0.79029
published_at 2026-04-11T12:55:00Z
7
value 0.01213
scoring_system epss
scoring_elements 0.79013
published_at 2026-04-12T12:55:00Z
8
value 0.01213
scoring_system epss
scoring_elements 0.79003
published_at 2026-04-13T12:55:00Z
9
value 0.01213
scoring_system epss
scoring_elements 0.79031
published_at 2026-04-16T12:55:00Z
10
value 0.01213
scoring_system epss
scoring_elements 0.79028
published_at 2026-04-18T12:55:00Z
11
value 0.01213
scoring_system epss
scoring_elements 0.78956
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3666
3
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
4
reference_url https://github.com/jenkinsci/jenkins/commit/be195b0e19343bff6d966029d8eea99b2c039c32
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/be195b0e19343bff6d966029d8eea99b2c039c32
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3666
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-3666
6
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1147769
reference_id 1147769
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1147769
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*
11
reference_url https://github.com/advisories/GHSA-fvfh-8mj3-23xj
reference_id GHSA-fvfh-8mj3-23xj
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-fvfh-8mj3-23xj
fixed_packages
aliases CVE-2014-3666, GHSA-fvfh-8mj3-23xj
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vznw-vuay-7bcg
20
url VCID-w6we-64uv-d3h7
vulnerability_id VCID-w6we-64uv-d3h7
summary The doIndex function in hudson/util/RemotingDiagnostics.java in CloudBees Jenkins before 1.551 and LTS before 1.532.2 allows remote authenticated users with the ADMINISTER permission to obtain sensitive information via vectors related to heapDump.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2068.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2068.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2068
reference_id
reference_type
scores
0
value 0.00085
scoring_system epss
scoring_elements 0.2461
published_at 2026-04-21T12:55:00Z
1
value 0.00085
scoring_system epss
scoring_elements 0.24667
published_at 2026-04-08T12:55:00Z
2
value 0.00085
scoring_system epss
scoring_elements 0.24715
published_at 2026-04-09T12:55:00Z
3
value 0.00085
scoring_system epss
scoring_elements 0.24728
published_at 2026-04-11T12:55:00Z
4
value 0.00085
scoring_system epss
scoring_elements 0.24687
published_at 2026-04-12T12:55:00Z
5
value 0.00085
scoring_system epss
scoring_elements 0.2463
published_at 2026-04-13T12:55:00Z
6
value 0.00085
scoring_system epss
scoring_elements 0.24643
published_at 2026-04-16T12:55:00Z
7
value 0.00085
scoring_system epss
scoring_elements 0.24633
published_at 2026-04-18T12:55:00Z
8
value 0.00085
scoring_system epss
scoring_elements 0.24708
published_at 2026-04-01T12:55:00Z
9
value 0.00085
scoring_system epss
scoring_elements 0.24786
published_at 2026-04-02T12:55:00Z
10
value 0.00085
scoring_system epss
scoring_elements 0.24824
published_at 2026-04-04T12:55:00Z
11
value 0.00085
scoring_system epss
scoring_elements 0.24598
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2068
2
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
3
reference_url https://github.com/jenkinsci/jenkins/commit/0530a6645aac10fec005614211660e98db44b5eb
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/0530a6645aac10fec005614211660e98db44b5eb
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-2068
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-2068
5
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
6
reference_url http://www.openwall.com/lists/oss-security/2014/02/21/2
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/02/21/2
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1067835
reference_id 1067835
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1067835
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
10
reference_url https://github.com/advisories/GHSA-pv88-j6rg-r56p
reference_id GHSA-pv88-j6rg-r56p
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-pv88-j6rg-r56p
fixed_packages
aliases CVE-2014-2068, GHSA-pv88-j6rg-r56p
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w6we-64uv-d3h7
21
url VCID-y95w-2r5s-gufd
vulnerability_id VCID-y95w-2r5s-gufd
summary
Jenkins allows Cross-Site Scripting (XSS) in User Configuration
Cross-site scripting (XSS) vulnerability in the default markup formatter in Jenkins 1.523 allows remote attackers to inject arbitrary web script or HTML via the Description field in the user configuration.
references
0
reference_url http://packetstormsecurity.com/files/124513
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url http://packetstormsecurity.com/files/124513
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5573.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5573.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5573
reference_id
reference_type
scores
0
value 0.01627
scoring_system epss
scoring_elements 0.81908
published_at 2026-04-21T12:55:00Z
1
value 0.01627
scoring_system epss
scoring_elements 0.81906
published_at 2026-04-18T12:55:00Z
2
value 0.01627
scoring_system epss
scoring_elements 0.81867
published_at 2026-04-09T12:55:00Z
3
value 0.01627
scoring_system epss
scoring_elements 0.81886
published_at 2026-04-11T12:55:00Z
4
value 0.01627
scoring_system epss
scoring_elements 0.81869
published_at 2026-04-13T12:55:00Z
5
value 0.01627
scoring_system epss
scoring_elements 0.81874
published_at 2026-04-12T12:55:00Z
6
value 0.01627
scoring_system epss
scoring_elements 0.8186
published_at 2026-04-08T12:55:00Z
7
value 0.02425
scoring_system epss
scoring_elements 0.85105
published_at 2026-04-07T12:55:00Z
8
value 0.02425
scoring_system epss
scoring_elements 0.8507
published_at 2026-04-01T12:55:00Z
9
value 0.02425
scoring_system epss
scoring_elements 0.85083
published_at 2026-04-02T12:55:00Z
10
value 0.02425
scoring_system epss
scoring_elements 0.85101
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5573
3
reference_url http://seclists.org/bugtraq/2013/Dec/104
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url http://seclists.org/bugtraq/2013/Dec/104
4
reference_url http://seclists.org/fulldisclosure/2013/Dec/159
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2013/Dec/159
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/89872
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/89872
6
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
7
reference_url https://web.archive.org/web/20200229071540/http://www.securityfocus.com/bid/64414
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20200229071540/http://www.securityfocus.com/bid/64414
8
reference_url http://www.exploit-db.com/exploits/30408
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url http://www.exploit-db.com/exploits/30408
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1044976
reference_id 1044976
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1044976
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-5573
reference_id CVE-2013-5573
reference_type
scores
0
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-5573
11
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/30408.txt
reference_id CVE-2013-5573;OSVDB-101187
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/30408.txt
12
reference_url https://github.com/advisories/GHSA-52g6-pfrq-rxfv
reference_id GHSA-52g6-pfrq-rxfv
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-52g6-pfrq-rxfv
fixed_packages
aliases CVE-2013-5573, GHSA-52g6-pfrq-rxfv
risk_score 5.4
exploitability 2.0
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y95w-2r5s-gufd
Fixing_vulnerabilities
Risk_score5.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openshift-origin-cartridge-jenkins@1.20.3.5-1%3Farch=el6op