| 0 |
| url |
VCID-1gnc-b5tg-3fhe |
| vulnerability_id |
VCID-1gnc-b5tg-3fhe |
| summary |
Inadequate Encryption Strength
Jenkins uses `AES ECB` block cipher mode without an `IV` for encrypting secrets, which makes Jenkins and the stored secrets vulnerable to unnecessary risks. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2598 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18412 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18429 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18532 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18512 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18503 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18522 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18654 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.1875 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18804 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18601 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.1856 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18611 |
| published_at |
2026-04-12T12:55:00Z |
|
| 12 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18659 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2598 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2598 |
| reference_id |
CVE-2017-2598 |
| reference_type |
|
| scores |
| 0 |
| value |
4.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:P/I:N/A:N |
|
| 1 |
| value |
4.3 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
|
| 2 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2598 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-2598, GHSA-r9q2-3r6x-qmgp
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1gnc-b5tg-3fhe |
|
| 1 |
| url |
VCID-2zwg-a71p-r7hs |
| vulnerability_id |
VCID-2zwg-a71p-r7hs |
| summary |
Improper Privilege Management
Jenkins is vulnerable to an insufficient permission check for periodic processes. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2611 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52613 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52602 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52653 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52564 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.5259 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52557 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52608 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52603 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52636 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52651 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52667 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52518 |
| published_at |
2026-04-01T12:55:00Z |
|
| 12 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.5266 |
| published_at |
2026-04-16T12:55:00Z |
|
| 13 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52622 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2611 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2611 |
| reference_id |
CVE-2017-2611 |
| reference_type |
|
| scores |
| 0 |
| value |
4.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:N/I:N/A:P |
|
| 1 |
| value |
4.3 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L |
|
| 2 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2611 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-2611, GHSA-3297-944x-j7x7
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2zwg-a71p-r7hs |
|
| 2 |
| url |
VCID-6cw8-67c2-1ugk |
| vulnerability_id |
VCID-6cw8-67c2-1ugk |
| summary |
Information Exposure
Jenkins is vulnerable to an information exposure in the internal API that allows access to item names that should not be visible. This only affects anonymous users (other users legitimately have access) that were able to get a list of items via an `UnprotectedRootAction`. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2606 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.2369 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23701 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23819 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23839 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.2385 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23838 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23807 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.2392 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23874 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23983 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.24023 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23893 |
| published_at |
2026-04-12T12:55:00Z |
|
| 12 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23937 |
| published_at |
2026-04-11T12:55:00Z |
|
| 13 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23864 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2606 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2606 |
| reference_id |
CVE-2017-2606 |
| reference_type |
|
| scores |
| 0 |
| value |
4.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:P/I:N/A:N |
|
| 1 |
| value |
4.3 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
|
| 2 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2606 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-2606, GHSA-6967-9vvv-4cmm
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6cw8-67c2-1ugk |
|
| 3 |
| url |
VCID-8u35-jee9-5qes |
| vulnerability_id |
VCID-8u35-jee9-5qes |
| summary |
Information Exposure
In Jenkins, monitor data could be viewed by low privilege users via the remote API. These included system configuration and runtime information of these nodes. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2600 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10086 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10106 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10131 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10002 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10025 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10152 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10171 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10077 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10137 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10035 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10111 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09952 |
| published_at |
2026-04-01T12:55:00Z |
|
| 12 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10172 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10211 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2600 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2600 |
| reference_id |
CVE-2017-2600 |
| reference_type |
|
| scores |
| 0 |
| value |
4.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:P/I:N/A:N |
|
| 1 |
| value |
4.3 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
|
| 2 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2600 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-2600, GHSA-wj5c-j656-h5fw
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8u35-jee9-5qes |
|
| 4 |
| url |
VCID-fndu-scdw-jueh |
| vulnerability_id |
VCID-fndu-scdw-jueh |
| summary |
Improper Authentication
In Jenkins, low privilege users were able to act on administrative monitors due to them not being consistently protected by permission checks. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2604 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.24882 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.24893 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.2495 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.24978 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.24986 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.25009 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.25128 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.25168 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.24941 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.25054 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.24974 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.25051 |
| published_at |
2026-04-01T12:55:00Z |
|
| 12 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.25028 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.25068 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2604 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2604 |
| reference_id |
CVE-2017-2604 |
| reference_type |
|
| scores |
| 0 |
| value |
4.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:N/I:P/A:N |
|
| 1 |
| value |
4.3 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 2 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2604 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-2604, GHSA-m93h-5qmx-pphg
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fndu-scdw-jueh |
|
| 5 |
| url |
VCID-h23h-s8t3-byhr |
| vulnerability_id |
VCID-h23h-s8t3-byhr |
| summary |
Cross-site Scripting
Jenkins is vulnerable to a persisted cross-site scripting in search suggestions due to improperly escaping users with less-than and greater-than characters in their names. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2610 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19026 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19037 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19268 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19361 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19412 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19129 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19209 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19262 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19221 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19144 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19136 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19227 |
| published_at |
2026-04-01T12:55:00Z |
|
| 12 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19127 |
| published_at |
2026-04-16T12:55:00Z |
|
| 13 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19167 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2610 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2610 |
| reference_id |
CVE-2017-2610 |
| reference_type |
|
| scores |
| 0 |
| value |
3.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:N/I:P/A:N |
|
| 1 |
| value |
5.4 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
|
| 2 |
| value |
5.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2610 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-2610, GHSA-jff5-55xj-4jcq
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h23h-s8t3-byhr |
|
| 6 |
| url |
VCID-hgy1-h6aj-dbbu |
| vulnerability_id |
VCID-hgy1-h6aj-dbbu |
| summary |
Information Exposure
Jenkins is vulnerable to an information disclosure vulnerability in search suggestions. The `autocomplete` feature on the search box discloses the names of the views in its suggestions, including the ones for which the current user does not have access to. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2609 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24383 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24398 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24457 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24482 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24445 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24573 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24635 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24672 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24513 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24487 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24473 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24557 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.2453 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2609 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2609 |
| reference_id |
CVE-2017-2609 |
| reference_type |
|
| scores |
| 0 |
| value |
4.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:P/I:N/A:N |
|
| 1 |
| value |
4.3 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
|
| 2 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2609 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-2609, GHSA-v222-w2mw-xjc6
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hgy1-h6aj-dbbu |
|
| 7 |
| url |
VCID-kbj2-ymsz-5qe8 |
| vulnerability_id |
VCID-kbj2-ymsz-5qe8 |
| summary |
Information Exposure
Jenkins is vulnerable to a user data leak in disconnected agents' `config.xml` API. This could leak sensitive data such as API tokens. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2603 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06426 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06402 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06388 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06239 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06209 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06292 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06196 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06228 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06251 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06227 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06268 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06162 |
| published_at |
2026-04-01T12:55:00Z |
|
| 12 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06279 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06283 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2603 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2603 |
| reference_id |
CVE-2017-2603 |
| reference_type |
|
| scores |
| 0 |
| value |
3.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:P/I:N/A:N |
|
| 1 |
| value |
2.6 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N |
|
| 2 |
| value |
3.5 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N |
|
| 3 |
| value |
3.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N |
|
| 4 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2603 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-2603, GHSA-x55p-6526-xmmp
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kbj2-ymsz-5qe8 |
|
| 8 |
| url |
VCID-kzfk-8p92-3bgs |
| vulnerability_id |
VCID-kzfk-8p92-3bgs |
| summary |
Cross-site Scripting
Jenkins is vulnerable to a persisted cross-site scripting vulnerability in console notes. Jenkins allows plugins to annotate build logs, adding new content or changing the presentation of existing content while the build is running. Malicious Jenkins users, or users with SCM access, could configure jobs or modify build scripts such that they print serialized console notes that perform cross-site scripting attacks on Jenkins users viewing the build logs. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2607 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14614 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14616 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14715 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14801 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14607 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14696 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14755 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14586 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.1452 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14676 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14513 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14622 |
| published_at |
2026-04-13T12:55:00Z |
|
| 12 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14677 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14727 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2607 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2607 |
| reference_id |
CVE-2017-2607 |
| reference_type |
|
| scores |
| 0 |
| value |
3.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:N/I:P/A:N |
|
| 1 |
| value |
4.2 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N |
|
| 2 |
| value |
5.4 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
|
| 3 |
| value |
5.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
|
| 4 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2607 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-2607, GHSA-42m6-7xff-9v9m
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kzfk-8p92-3bgs |
|
| 9 |
| url |
VCID-q58h-d9w2-8yez |
| vulnerability_id |
VCID-q58h-d9w2-8yez |
| summary |
Information Exposure
Jenkins is vulnerable to an improper exclusion of the Pipeline metadata files in the agent-to-master security subsystem. This could allow metadata files to be written to by malicious agents. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2602 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37247 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37268 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37488 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37553 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37572 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37525 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37558 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37571 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37606 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37629 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37507 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.3744 |
| published_at |
2026-04-01T12:55:00Z |
|
| 12 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37551 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37585 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2602 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2602 |
| reference_id |
CVE-2017-2602 |
| reference_type |
|
| scores |
| 0 |
| value |
4.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:N/I:P/A:N |
|
| 1 |
| value |
3.1 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 2 |
| value |
4.3 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 3 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 4 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2602 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-2602, GHSA-ffgg-vphh-v273
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q58h-d9w2-8yez |
|
| 10 |
| url |
VCID-rhrm-caa2-9kae |
| vulnerability_id |
VCID-rhrm-caa2-9kae |
| summary |
Improper Privilege Management
Jenkins is vulnerable to an insufficient permission check. This allows users with permissions to create new items to overwrite existing items they don't have access to. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2599 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00164 |
| scoring_system |
epss |
| scoring_elements |
0.37106 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00164 |
| scoring_system |
epss |
| scoring_elements |
0.37542 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00164 |
| scoring_system |
epss |
| scoring_elements |
0.3737 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00164 |
| scoring_system |
epss |
| scoring_elements |
0.37421 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00164 |
| scoring_system |
epss |
| scoring_elements |
0.37433 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00164 |
| scoring_system |
epss |
| scoring_elements |
0.37446 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00164 |
| scoring_system |
epss |
| scoring_elements |
0.37411 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00164 |
| scoring_system |
epss |
| scoring_elements |
0.37384 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00164 |
| scoring_system |
epss |
| scoring_elements |
0.3743 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00164 |
| scoring_system |
epss |
| scoring_elements |
0.37412 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00164 |
| scoring_system |
epss |
| scoring_elements |
0.37357 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00164 |
| scoring_system |
epss |
| scoring_elements |
0.37138 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00164 |
| scoring_system |
epss |
| scoring_elements |
0.37354 |
| published_at |
2026-04-01T12:55:00Z |
|
| 13 |
| value |
0.00164 |
| scoring_system |
epss |
| scoring_elements |
0.37518 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2599 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-2599, GHSA-7r4h-2h23-6jq9
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rhrm-caa2-9kae |
|
| 11 |
| url |
VCID-sanw-xj8r-1kbb |
| vulnerability_id |
VCID-sanw-xj8r-1kbb |
| summary |
Information Exposure
The re-key admin monitor in Jenkins re-encrypts all secrets in `JENKINS_HOME` with a new key. It also created a backup directory with all old secrets, and the key used to encrypt them. These backups are world-readable and not removed. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-1000362 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01234 |
| scoring_system |
epss |
| scoring_elements |
0.79259 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.01234 |
| scoring_system |
epss |
| scoring_elements |
0.79145 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01234 |
| scoring_system |
epss |
| scoring_elements |
0.79151 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01234 |
| scoring_system |
epss |
| scoring_elements |
0.79176 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01234 |
| scoring_system |
epss |
| scoring_elements |
0.79162 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01234 |
| scoring_system |
epss |
| scoring_elements |
0.79187 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01234 |
| scoring_system |
epss |
| scoring_elements |
0.79195 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.01234 |
| scoring_system |
epss |
| scoring_elements |
0.79219 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.01234 |
| scoring_system |
epss |
| scoring_elements |
0.79204 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01234 |
| scoring_system |
epss |
| scoring_elements |
0.79221 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01234 |
| scoring_system |
epss |
| scoring_elements |
0.79218 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01234 |
| scoring_system |
epss |
| scoring_elements |
0.79253 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-1000362 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-1000362, GHSA-92mr-4w2q-4578
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sanw-xj8r-1kbb |
|
| 12 |
| url |
VCID-v2ky-wpb2-6qhk |
| vulnerability_id |
VCID-v2ky-wpb2-6qhk |
| summary |
Cross-site Scripting
Jenkins is vulnerable to a persisted cross-site scripting in parameter names and descriptions. Users with the permission to configure jobs were able to inject JavaScript into parameter names and descriptions. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2601 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55762 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55745 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55843 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55801 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55819 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55839 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.5583 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55662 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55774 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55827 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55796 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55776 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2601 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2601 |
| reference_id |
CVE-2017-2601 |
| reference_type |
|
| scores |
| 0 |
| value |
3.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:N/I:P/A:N |
|
| 1 |
| value |
6.1 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 2 |
| value |
5.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
|
| 3 |
| value |
5.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
|
| 4 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2601 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-2601, GHSA-r69c-5j7c-vm6q
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v2ky-wpb2-6qhk |
|
| 13 |
| url |
VCID-wb3y-k94s-eyb4 |
| vulnerability_id |
VCID-wb3y-k94s-eyb4 |
| summary |
Deserialization of Untrusted Data
Jenkins is vulnerable to a remote code execution vulnerability involving the deserialization of various types in `javax.imageio` in XStream-based APIs. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2608 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02976 |
| scoring_system |
epss |
| scoring_elements |
0.86555 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.02976 |
| scoring_system |
epss |
| scoring_elements |
0.8645 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.02976 |
| scoring_system |
epss |
| scoring_elements |
0.8646 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02976 |
| scoring_system |
epss |
| scoring_elements |
0.86478 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02976 |
| scoring_system |
epss |
| scoring_elements |
0.86497 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02976 |
| scoring_system |
epss |
| scoring_elements |
0.86507 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02976 |
| scoring_system |
epss |
| scoring_elements |
0.86522 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02976 |
| scoring_system |
epss |
| scoring_elements |
0.86519 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02976 |
| scoring_system |
epss |
| scoring_elements |
0.86514 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02976 |
| scoring_system |
epss |
| scoring_elements |
0.86529 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.02976 |
| scoring_system |
epss |
| scoring_elements |
0.86535 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.02976 |
| scoring_system |
epss |
| scoring_elements |
0.86527 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.02976 |
| scoring_system |
epss |
| scoring_elements |
0.86546 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2608 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2608 |
| reference_id |
CVE-2017-2608 |
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:P/I:P/A:P |
|
| 1 |
| value |
8.8 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2608 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-2608, GHSA-fwqr-3pvp-pjwq
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wb3y-k94s-eyb4 |
|
| 14 |
| url |
VCID-yw8v-fqar-z7b5 |
| vulnerability_id |
VCID-yw8v-fqar-z7b5 |
| summary |
Incorrect Permission Assignment for Critical Resource
In Jenkins low privilege users were able to override JDK download credentials, resulting in future builds possibly failing to download a JDK. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2612 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30557 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30674 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30837 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30871 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30891 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30913 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30989 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.31037 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30855 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30943 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.3086 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30863 |
| published_at |
2026-04-01T12:55:00Z |
|
| 12 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30904 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30947 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2612 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2612 |
| reference_id |
CVE-2017-2612 |
| reference_type |
|
| scores |
| 0 |
| value |
5.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:N/I:P/A:P |
|
| 1 |
| value |
5.4 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L |
|
| 2 |
| value |
5.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2612 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-2612, GHSA-wf9g-rh76-6jvr
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yw8v-fqar-z7b5 |
|
| 15 |
| url |
VCID-zb9r-zjt8-wqae |
| vulnerability_id |
VCID-zb9r-zjt8-wqae |
| summary |
Cross-Site Request Forgery (CSRF)
Jenkins is vulnerable to a user creation CSRF using GET by admins. While this user record was only retained until restart in most cases, administrators' web browsers could be manipulated to create user records. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2613 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.186 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18995 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18718 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18798 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.1885 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18855 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18808 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18756 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18706 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18719 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18736 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18622 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18803 |
| published_at |
2026-04-01T12:55:00Z |
|
| 13 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18942 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2613 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2613 |
| reference_id |
CVE-2017-2613 |
| reference_type |
|
| scores |
| 0 |
| value |
5.8 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:N/I:P/A:P |
|
| 1 |
| value |
5.4 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L |
|
| 2 |
| value |
5.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2613 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-2613, GHSA-pwv6-872c-gcg6
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zb9r-zjt8-wqae |
|