Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/jenkins@2.228-r0?arch=armv7&distroversion=v3.16&reponame=community
Typeapk
Namespacealpine
Namejenkins
Version2.228-r0
Qualifiers
arch armv7
distroversion v3.16
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.245-r0
Latest_non_vulnerable_version2.346.2-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-9c49-hb3u-n7dq
vulnerability_id VCID-9c49-hb3u-n7dq
summary
Cross-Site Request Forgery in Jenkins
An extension point in Jenkins allows selectively disabling cross-site request forgery (CSRF) protection for specific URLs.

Implementations of that extension point received a different representation of the URL path than the Stapler web framework uses to dispatch requests in Jenkins 2.227 and earlier, LTS 2.204.5 and earlier. This discrepancy allowed attackers to craft URLs that would bypass the CSRF protection of any target URL.

Jenkins now uses the same representation of the URL path to decide whether CSRF protection is needed for a given URL as the Stapler web framework uses.

In case of problems, administrators can disable this security fix by setting the system property `hudson.security.csrf.CrumbFilter.UNPROCESSED_PATHINFO` to `true`.

As an additional safeguard, semicolon (`;`) characters in the path part of a URL are now banned by default. Administrators can disable this protection by setting the system property `jenkins.security.SuspiciousRequestFilter.allowSemicolonsInPath` to `true`.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2160.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2160.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2160
reference_id
reference_type
scores
0
value 0.00197
scoring_system epss
scoring_elements 0.41564
published_at 2026-04-21T12:55:00Z
1
value 0.00197
scoring_system epss
scoring_elements 0.4154
published_at 2026-04-01T12:55:00Z
2
value 0.00197
scoring_system epss
scoring_elements 0.41628
published_at 2026-04-02T12:55:00Z
3
value 0.00197
scoring_system epss
scoring_elements 0.41656
published_at 2026-04-04T12:55:00Z
4
value 0.00197
scoring_system epss
scoring_elements 0.41583
published_at 2026-04-07T12:55:00Z
5
value 0.00197
scoring_system epss
scoring_elements 0.41633
published_at 2026-04-08T12:55:00Z
6
value 0.00197
scoring_system epss
scoring_elements 0.41642
published_at 2026-04-09T12:55:00Z
7
value 0.00197
scoring_system epss
scoring_elements 0.41665
published_at 2026-04-11T12:55:00Z
8
value 0.00197
scoring_system epss
scoring_elements 0.41632
published_at 2026-04-12T12:55:00Z
9
value 0.00197
scoring_system epss
scoring_elements 0.41618
published_at 2026-04-13T12:55:00Z
10
value 0.00197
scoring_system epss
scoring_elements 0.41666
published_at 2026-04-16T12:55:00Z
11
value 0.00197
scoring_system epss
scoring_elements 0.41639
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2160
2
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
3
reference_url https://github.com/jenkinsci/jenkins/commit/f479652171f4ab854747de64b22bf59adb35fb8f
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/f479652171f4ab854747de64b22bf59adb35fb8f
4
reference_url https://github.com/jenkinsci/jenkins/commit/f7cf28355973df1ca6eb19066370bf70b10742f7
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/f7cf28355973df1ca6eb19066370bf70b10742f7
5
reference_url https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1774
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1774
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2160
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-2160
7
reference_url http://www.openwall.com/lists/oss-security/2020/03/25/2
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2020/03/25/2
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1819190
reference_id 1819190
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1819190
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
11
reference_url https://github.com/advisories/GHSA-c735-g9f2-2mvp
reference_id GHSA-c735-g9f2-2mvp
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-c735-g9f2-2mvp
fixed_packages
0
url pkg:apk/alpine/jenkins@2.228-r0?arch=armv7&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/jenkins@2.228-r0?arch=armv7&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/jenkins@2.228-r0%3Farch=armv7&distroversion=v3.16&reponame=community
aliases CVE-2020-2160, GHSA-c735-g9f2-2mvp
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9c49-hb3u-n7dq
1
url VCID-np2j-5nvn-3fcv
vulnerability_id VCID-np2j-5nvn-3fcv
summary jenkins: XSS in job configuration pages
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2161.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2161.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2161
reference_id
reference_type
scores
0
value 0.00303
scoring_system epss
scoring_elements 0.53504
published_at 2026-04-01T12:55:00Z
1
value 0.00303
scoring_system epss
scoring_elements 0.5361
published_at 2026-04-21T12:55:00Z
2
value 0.00303
scoring_system epss
scoring_elements 0.53584
published_at 2026-04-13T12:55:00Z
3
value 0.00303
scoring_system epss
scoring_elements 0.53621
published_at 2026-04-16T12:55:00Z
4
value 0.00303
scoring_system epss
scoring_elements 0.53626
published_at 2026-04-18T12:55:00Z
5
value 0.00303
scoring_system epss
scoring_elements 0.53528
published_at 2026-04-02T12:55:00Z
6
value 0.00303
scoring_system epss
scoring_elements 0.53554
published_at 2026-04-04T12:55:00Z
7
value 0.00303
scoring_system epss
scoring_elements 0.53523
published_at 2026-04-07T12:55:00Z
8
value 0.00303
scoring_system epss
scoring_elements 0.53573
published_at 2026-04-08T12:55:00Z
9
value 0.00303
scoring_system epss
scoring_elements 0.53569
published_at 2026-04-09T12:55:00Z
10
value 0.00303
scoring_system epss
scoring_elements 0.53619
published_at 2026-04-11T12:55:00Z
11
value 0.00303
scoring_system epss
scoring_elements 0.53601
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2161
2
reference_url https://github.com/jenkinsci/jenkins/commit/dbff6fdcf8c4bc00729ace66c33208ae7aa18ac0
reference_id
reference_type
scores
url https://github.com/jenkinsci/jenkins/commit/dbff6fdcf8c4bc00729ace66c33208ae7aa18ac0
3
reference_url https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1781
reference_id
reference_type
scores
url https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1781
4
reference_url http://www.openwall.com/lists/oss-security/2020/03/25/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2020/03/25/2
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1819198
reference_id 1819198
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1819198
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2161
reference_id CVE-2020-2161
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
1
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2020-2161
9
reference_url https://github.com/advisories/GHSA-g8pg-qrvm-wgh2
reference_id GHSA-g8pg-qrvm-wgh2
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-g8pg-qrvm-wgh2
fixed_packages
0
url pkg:apk/alpine/jenkins@2.228-r0?arch=armv7&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/jenkins@2.228-r0?arch=armv7&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/jenkins@2.228-r0%3Farch=armv7&distroversion=v3.16&reponame=community
aliases CVE-2020-2161, GHSA-g8pg-qrvm-wgh2
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-np2j-5nvn-3fcv
2
url VCID-ttg3-j174-8yev
vulnerability_id VCID-ttg3-j174-8yev
summary
Improper Neutralization of Input During Web Page Generation in Jenkins
Jenkins 2.227 and earlier, LTS 2.204.5 and earlier served files uploaded as file parameters to a build without specifying appropriate `Content-Security-Policy HTTP` headers. This resulted in a stored cross-site scripting (XSS) vulnerability exploitable by users with permissions to build a job with file parameters.\n\nJenkins now sets `Content-Security-Policy` HTTP headers when serving files uploaded via a file parameter to the same value as used for files in workspaces and archived artifacts not served using the Resource Root URL.\n\nThe system property `hudson.model.DirectoryBrowserSupport.CSP` can be set to override the value of `Content-Security-Policy` headers sent when serving these files. This is the same system property used for files in workspaces and archived artifacts unless those are served via the [Resource Root URL](https://www.jenkins.io/doc/upgrade-guide/2.204/#resource-domain-support) and works the same way for file parameters. See [Configuring Content Security Policy](https://www.jenkins.io/doc/book/security/configuring-content-security-policy) to learn more.\n\nEven when Jenkins is configured to serve files in workspaces and archived artifacts using the Resource Root URL (introduced in Jenkins 2.200), file parameters are not, and therefore still subject to `Content-Security-Policy` restrictions.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2162.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2162.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2162
reference_id
reference_type
scores
0
value 0.00427
scoring_system epss
scoring_elements 0.62329
published_at 2026-04-21T12:55:00Z
1
value 0.00427
scoring_system epss
scoring_elements 0.62345
published_at 2026-04-18T12:55:00Z
2
value 0.00427
scoring_system epss
scoring_elements 0.62338
published_at 2026-04-16T12:55:00Z
3
value 0.00427
scoring_system epss
scoring_elements 0.62292
published_at 2026-04-13T12:55:00Z
4
value 0.00427
scoring_system epss
scoring_elements 0.62314
published_at 2026-04-12T12:55:00Z
5
value 0.00427
scoring_system epss
scoring_elements 0.62324
published_at 2026-04-11T12:55:00Z
6
value 0.00427
scoring_system epss
scoring_elements 0.62305
published_at 2026-04-09T12:55:00Z
7
value 0.00427
scoring_system epss
scoring_elements 0.62287
published_at 2026-04-08T12:55:00Z
8
value 0.00427
scoring_system epss
scoring_elements 0.62271
published_at 2026-04-04T12:55:00Z
9
value 0.00427
scoring_system epss
scoring_elements 0.62237
published_at 2026-04-07T12:55:00Z
10
value 0.00427
scoring_system epss
scoring_elements 0.62241
published_at 2026-04-02T12:55:00Z
11
value 0.00427
scoring_system epss
scoring_elements 0.62184
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2162
2
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
3
reference_url https://github.com/jenkinsci/jenkins/commit/c2d22b241eba718c62996e2ceeb5f2e0e9787f81
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/c2d22b241eba718c62996e2ceeb5f2e0e9787f81
4
reference_url https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1793
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1793
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2162
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
1
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-2162
6
reference_url http://www.openwall.com/lists/oss-security/2020/03/25/2
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2020/03/25/2
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1819211
reference_id 1819211
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1819211
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
10
reference_url https://github.com/advisories/GHSA-crg2-6xv3-qg5f
reference_id GHSA-crg2-6xv3-qg5f
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-crg2-6xv3-qg5f
fixed_packages
0
url pkg:apk/alpine/jenkins@2.228-r0?arch=armv7&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/jenkins@2.228-r0?arch=armv7&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/jenkins@2.228-r0%3Farch=armv7&distroversion=v3.16&reponame=community
aliases CVE-2020-2162, GHSA-crg2-6xv3-qg5f
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ttg3-j174-8yev
3
url VCID-znwy-pe3s-x3ay
vulnerability_id VCID-znwy-pe3s-x3ay
summary jenkins: improperly processes HTML content of list leads to XSS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2163.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2163.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2163
reference_id
reference_type
scores
0
value 0.00427
scoring_system epss
scoring_elements 0.62184
published_at 2026-04-01T12:55:00Z
1
value 0.00427
scoring_system epss
scoring_elements 0.62329
published_at 2026-04-21T12:55:00Z
2
value 0.00427
scoring_system epss
scoring_elements 0.62292
published_at 2026-04-13T12:55:00Z
3
value 0.00427
scoring_system epss
scoring_elements 0.62338
published_at 2026-04-16T12:55:00Z
4
value 0.00427
scoring_system epss
scoring_elements 0.62345
published_at 2026-04-18T12:55:00Z
5
value 0.00427
scoring_system epss
scoring_elements 0.62241
published_at 2026-04-02T12:55:00Z
6
value 0.00427
scoring_system epss
scoring_elements 0.62271
published_at 2026-04-04T12:55:00Z
7
value 0.00427
scoring_system epss
scoring_elements 0.62237
published_at 2026-04-07T12:55:00Z
8
value 0.00427
scoring_system epss
scoring_elements 0.62287
published_at 2026-04-08T12:55:00Z
9
value 0.00427
scoring_system epss
scoring_elements 0.62305
published_at 2026-04-09T12:55:00Z
10
value 0.00427
scoring_system epss
scoring_elements 0.62324
published_at 2026-04-11T12:55:00Z
11
value 0.00427
scoring_system epss
scoring_elements 0.62314
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2163
2
reference_url https://github.com/jenkinsci/jenkins/commit/a61d6a16dac524745a282b2f27ce54bc3b5c53a6
reference_id
reference_type
scores
url https://github.com/jenkinsci/jenkins/commit/a61d6a16dac524745a282b2f27ce54bc3b5c53a6
3
reference_url https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1796
reference_id
reference_type
scores
url https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1796
4
reference_url http://www.openwall.com/lists/oss-security/2020/03/25/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2020/03/25/2
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1819222
reference_id 1819222
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1819222
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2163
reference_id CVE-2020-2163
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:N
1
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2020-2163
9
reference_url https://github.com/advisories/GHSA-2xcm-h7vv-g8m9
reference_id GHSA-2xcm-h7vv-g8m9
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-2xcm-h7vv-g8m9
fixed_packages
0
url pkg:apk/alpine/jenkins@2.228-r0?arch=armv7&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/jenkins@2.228-r0?arch=armv7&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/jenkins@2.228-r0%3Farch=armv7&distroversion=v3.16&reponame=community
aliases CVE-2020-2163, GHSA-2xcm-h7vv-g8m9
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-znwy-pe3s-x3ay
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/jenkins@2.228-r0%3Farch=armv7&distroversion=v3.16&reponame=community