Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.jenkins-ci.main/jenkins-core@2.415
Typemaven
Namespaceorg.jenkins-ci.main
Namejenkins-core
Version2.415
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.416
Latest_non_vulnerable_version2.555
Affected_by_vulnerabilities
0
url VCID-3vtx-uz1q-vqc6
vulnerability_id VCID-3vtx-uz1q-vqc6
summary
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Jenkins 2.415 and earlier, LTS 2.401.2 and earlier does not sanitize or properly encode URLs in build logs when transforming them into hyperlinks, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control build log contents.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39151.json
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39151.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39151
reference_id
reference_type
scores
0
value 0.0106
scoring_system epss
scoring_elements 0.77677
published_at 2026-04-18T12:55:00Z
1
value 0.0106
scoring_system epss
scoring_elements 0.77679
published_at 2026-04-16T12:55:00Z
2
value 0.0106
scoring_system epss
scoring_elements 0.77642
published_at 2026-04-13T12:55:00Z
3
value 0.0106
scoring_system epss
scoring_elements 0.77643
published_at 2026-04-12T12:55:00Z
4
value 0.0106
scoring_system epss
scoring_elements 0.7766
published_at 2026-04-11T12:55:00Z
5
value 0.0106
scoring_system epss
scoring_elements 0.77633
published_at 2026-04-09T12:55:00Z
6
value 0.0106
scoring_system epss
scoring_elements 0.77627
published_at 2026-04-08T12:55:00Z
7
value 0.0106
scoring_system epss
scoring_elements 0.77598
published_at 2026-04-07T12:55:00Z
8
value 0.0106
scoring_system epss
scoring_elements 0.77617
published_at 2026-04-04T12:55:00Z
9
value 0.0106
scoring_system epss
scoring_elements 0.7759
published_at 2026-04-02T12:55:00Z
10
value 0.01207
scoring_system epss
scoring_elements 0.79023
published_at 2026-04-24T12:55:00Z
11
value 0.01207
scoring_system epss
scoring_elements 0.78993
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39151
2
reference_url https://github.com/CVEProject/cvelist/blob/975222d6e43b5b1296dbc8a67d03704a1d2554e8/2023/39xxx/CVE-2023-39151.json
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/CVEProject/cvelist/blob/975222d6e43b5b1296dbc8a67d03704a1d2554e8/2023/39xxx/CVE-2023-39151.json
3
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
4
reference_url https://github.com/jenkinsci/jenkins/commit/1b9f1ccdbb7d00705b036d1332908fe52c2cd7ae
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/1b9f1ccdbb7d00705b036d1332908fe52c2cd7ae
5
reference_url https://www.jenkins.io/security/advisory/2023-07-26/#SECURITY-3188
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T21:06:38Z/
url https://www.jenkins.io/security/advisory/2023-07-26/#SECURITY-3188
6
reference_url http://www.openwall.com/lists/oss-security/2023/07/26/2
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T21:06:38Z/
url http://www.openwall.com/lists/oss-security/2023/07/26/2
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2226895
reference_id 2226895
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2226895
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-39151
reference_id CVE-2023-39151
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-39151
9
reference_url https://github.com/advisories/GHSA-69vw-3pcm-84rw
reference_id GHSA-69vw-3pcm-84rw
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-69vw-3pcm-84rw
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@2.416
purl pkg:maven/org.jenkins-ci.main/jenkins-core@2.416
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.416
aliases CVE-2023-39151, GHSA-69vw-3pcm-84rw
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3vtx-uz1q-vqc6
1
url VCID-4cy9-1z3y-ekba
vulnerability_id VCID-4cy9-1z3y-ekba
summary
Jenkins temporary uploaded file created with insecure permissions
In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, uploaded files processed via the Stapler web framework and the Jenkins API `MultipartFormDataParser` create temporary files in the system temporary directory with the default permissions for newly created files.

If these permissions are overly permissive, attackers with access to the system temporary directory may be able to read and write the file before it is used.

This vulnerability only affects operating systems using a shared temporary directory for all users (typically Linux). Additionally, the default permissions for newly created files generally only allow attackers to read the temporary file, but not write to it.
Jenkins 2.424, LTS 2.414.2 creates the temporary files in a subdirectory with more restrictive permissions.

As a workaround, you can change your default temporary-file directory using the Java system property `java.io.tmpdir`, if you’re concerned about this issue but unable to immediately update Jenkins.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43498.json
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43498.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43498
reference_id
reference_type
scores
0
value 0.00141
scoring_system epss
scoring_elements 0.33905
published_at 2026-04-24T12:55:00Z
1
value 0.00141
scoring_system epss
scoring_elements 0.3428
published_at 2026-04-07T12:55:00Z
2
value 0.00141
scoring_system epss
scoring_elements 0.34323
published_at 2026-04-08T12:55:00Z
3
value 0.00141
scoring_system epss
scoring_elements 0.34354
published_at 2026-04-09T12:55:00Z
4
value 0.00141
scoring_system epss
scoring_elements 0.34356
published_at 2026-04-11T12:55:00Z
5
value 0.00141
scoring_system epss
scoring_elements 0.34316
published_at 2026-04-12T12:55:00Z
6
value 0.00141
scoring_system epss
scoring_elements 0.34292
published_at 2026-04-13T12:55:00Z
7
value 0.00141
scoring_system epss
scoring_elements 0.34328
published_at 2026-04-16T12:55:00Z
8
value 0.00141
scoring_system epss
scoring_elements 0.34315
published_at 2026-04-18T12:55:00Z
9
value 0.00141
scoring_system epss
scoring_elements 0.34276
published_at 2026-04-21T12:55:00Z
10
value 0.00141
scoring_system epss
scoring_elements 0.34385
published_at 2026-04-02T12:55:00Z
11
value 0.00141
scoring_system epss
scoring_elements 0.34413
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43498
2
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-43498
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-43498
3
reference_url https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3073
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-24T18:51:41Z/
url https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3073
4
reference_url http://www.openwall.com/lists/oss-security/2023/09/20/5
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-24T18:51:41Z/
url http://www.openwall.com/lists/oss-security/2023/09/20/5
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2240096
reference_id 2240096
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2240096
6
reference_url https://github.com/advisories/GHSA-hq87-h4jg-vxfw
reference_id GHSA-hq87-h4jg-vxfw
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-hq87-h4jg-vxfw
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@2.424
purl pkg:maven/org.jenkins-ci.main/jenkins-core@2.424
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.424
aliases CVE-2023-43498, GHSA-hq87-h4jg-vxfw
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4cy9-1z3y-ekba
2
url VCID-dyka-xcrq-8fds
vulnerability_id VCID-dyka-xcrq-8fds
summary
Jenkins temporary plugin file created with insecure permissions
Jenkins creates a temporary file when a plugin is deployed directly from a URL.

Jenkins 2.423 and earlier, LTS 2.414.1 and earlier creates this temporary file in the system temporary directory with the default permissions for newly created files.

If these permissions are overly permissive, they may allow attackers with access to the Jenkins controller file system to read and write the file before it is installed in Jenkins, potentially resulting in arbitrary code execution.

This vulnerability only affects operating systems using a shared temporary directory for all users (typically Linux). Additionally, the default permissions for newly created files generally only allow attackers to read the temporary file, but not write to it.

This issue complements SECURITY-2823, which affected plugins uploaded from an administrator’s computer.
Jenkins 2.424, LTS 2.414.2 creates the temporary file in a subdirectory with more restrictive permissions.

As a workaround, you can change your default temporary-file directory using the Java system property java.io.tmpdir, if you’re concerned about this issue but unable to immediately update Jenkins.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43496.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43496.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43496
reference_id
reference_type
scores
0
value 0.0025
scoring_system epss
scoring_elements 0.48283
published_at 2026-04-24T12:55:00Z
1
value 0.0025
scoring_system epss
scoring_elements 0.48286
published_at 2026-04-04T12:55:00Z
2
value 0.0025
scoring_system epss
scoring_elements 0.48287
published_at 2026-04-09T12:55:00Z
3
value 0.0025
scoring_system epss
scoring_elements 0.48293
published_at 2026-04-08T12:55:00Z
4
value 0.0025
scoring_system epss
scoring_elements 0.48237
published_at 2026-04-07T12:55:00Z
5
value 0.0025
scoring_system epss
scoring_elements 0.48297
published_at 2026-04-21T12:55:00Z
6
value 0.0025
scoring_system epss
scoring_elements 0.48342
published_at 2026-04-18T12:55:00Z
7
value 0.0025
scoring_system epss
scoring_elements 0.48348
published_at 2026-04-16T12:55:00Z
8
value 0.0025
scoring_system epss
scoring_elements 0.48296
published_at 2026-04-13T12:55:00Z
9
value 0.0025
scoring_system epss
scoring_elements 0.48265
published_at 2026-04-02T12:55:00Z
10
value 0.0025
scoring_system epss
scoring_elements 0.48285
published_at 2026-04-12T12:55:00Z
11
value 0.0025
scoring_system epss
scoring_elements 0.48311
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43496
2
reference_url https://github.com/jenkinsci/jenkins/commit/df7c4ccda8976c06bf31b8fb9938f26fc38501ca
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/df7c4ccda8976c06bf31b8fb9938f26fc38501ca
3
reference_url https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3072
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:57Z/
url https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3072
4
reference_url http://www.openwall.com/lists/oss-security/2023/09/20/5
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:57Z/
url http://www.openwall.com/lists/oss-security/2023/09/20/5
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2239939
reference_id 2239939
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2239939
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-43496
reference_id CVE-2023-43496
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-43496
7
reference_url https://github.com/advisories/GHSA-55wp-3pq4-w8p9
reference_id GHSA-55wp-3pq4-w8p9
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-55wp-3pq4-w8p9
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@2.424
purl pkg:maven/org.jenkins-ci.main/jenkins-core@2.424
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.424
aliases CVE-2023-43496, GHSA-55wp-3pq4-w8p9
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dyka-xcrq-8fds
3
url VCID-npms-7xaw-mye9
vulnerability_id VCID-npms-7xaw-mye9
summary
Jenkins temporary uploaded file created with insecure permissions
In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, uploaded files processed via the Stapler web framework and the Jenkins API `MultipartFormDataParser` create temporary files in the system temporary directory with the default permissions for newly created files.

If these permissions are overly permissive, attackers with access to the system temporary directory may be able to read and write the file before it is used.

This vulnerability only affects operating systems using a shared temporary directory for all users (typically Linux). Additionally, the default permissions for newly created files generally only allow attackers to read the temporary file, but not write to it.
Jenkins 2.424, LTS 2.414.2 creates the temporary files in a subdirectory with more restrictive permissions.

As a workaround, you can change your default temporary-file directory using the Java system property `java.io.tmpdir`, if you’re concerned about this issue but unable to immediately update Jenkins.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43497.json
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43497.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43497
reference_id
reference_type
scores
0
value 0.00089
scoring_system epss
scoring_elements 0.25263
published_at 2026-04-24T12:55:00Z
1
value 0.00089
scoring_system epss
scoring_elements 0.25305
published_at 2026-04-07T12:55:00Z
2
value 0.00089
scoring_system epss
scoring_elements 0.25374
published_at 2026-04-08T12:55:00Z
3
value 0.00089
scoring_system epss
scoring_elements 0.25418
published_at 2026-04-09T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.2543
published_at 2026-04-11T12:55:00Z
5
value 0.00089
scoring_system epss
scoring_elements 0.25388
published_at 2026-04-12T12:55:00Z
6
value 0.00089
scoring_system epss
scoring_elements 0.25335
published_at 2026-04-13T12:55:00Z
7
value 0.00089
scoring_system epss
scoring_elements 0.25342
published_at 2026-04-16T12:55:00Z
8
value 0.00089
scoring_system epss
scoring_elements 0.25332
published_at 2026-04-18T12:55:00Z
9
value 0.00089
scoring_system epss
scoring_elements 0.25302
published_at 2026-04-21T12:55:00Z
10
value 0.00089
scoring_system epss
scoring_elements 0.25496
published_at 2026-04-02T12:55:00Z
11
value 0.00089
scoring_system epss
scoring_elements 0.25533
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43497
2
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-43497
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-43497
3
reference_url https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3073
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-24T17:01:04Z/
url https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3073
4
reference_url http://www.openwall.com/lists/oss-security/2023/09/20/5
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-24T17:01:04Z/
url http://www.openwall.com/lists/oss-security/2023/09/20/5
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2240095
reference_id 2240095
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2240095
6
reference_url https://github.com/advisories/GHSA-qv64-w99c-qcr9
reference_id GHSA-qv64-w99c-qcr9
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-qv64-w99c-qcr9
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@2.424
purl pkg:maven/org.jenkins-ci.main/jenkins-core@2.424
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.424
aliases CVE-2023-43497, GHSA-qv64-w99c-qcr9
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-npms-7xaw-mye9
4
url VCID-s1wm-h4xx-tfh9
vulnerability_id VCID-s1wm-h4xx-tfh9
summary
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Jenkins 2.423 and earlier, LTS 2.414.1 and earlier does not escape the value of the 'caption' constructor parameter of 'ExpandableDetailsNote', resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control this parameter.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43495.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43495.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43495
reference_id
reference_type
scores
0
value 0.0078
scoring_system epss
scoring_elements 0.73687
published_at 2026-04-12T12:55:00Z
1
value 0.0078
scoring_system epss
scoring_elements 0.73704
published_at 2026-04-11T12:55:00Z
2
value 0.0078
scoring_system epss
scoring_elements 0.73682
published_at 2026-04-09T12:55:00Z
3
value 0.0078
scoring_system epss
scoring_elements 0.73669
published_at 2026-04-08T12:55:00Z
4
value 0.0078
scoring_system epss
scoring_elements 0.73634
published_at 2026-04-07T12:55:00Z
5
value 0.0078
scoring_system epss
scoring_elements 0.73637
published_at 2026-04-02T12:55:00Z
6
value 0.0078
scoring_system epss
scoring_elements 0.73661
published_at 2026-04-04T12:55:00Z
7
value 0.00783
scoring_system epss
scoring_elements 0.73811
published_at 2026-04-24T12:55:00Z
8
value 0.00783
scoring_system epss
scoring_elements 0.73735
published_at 2026-04-13T12:55:00Z
9
value 0.00783
scoring_system epss
scoring_elements 0.73778
published_at 2026-04-16T12:55:00Z
10
value 0.00783
scoring_system epss
scoring_elements 0.73786
published_at 2026-04-18T12:55:00Z
11
value 0.00783
scoring_system epss
scoring_elements 0.73777
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43495
2
reference_url https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3245
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T18:51:47Z/
url https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3245
3
reference_url http://www.openwall.com/lists/oss-security/2023/09/20/5
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T18:51:47Z/
url http://www.openwall.com/lists/oss-security/2023/09/20/5
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2239937
reference_id 2239937
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2239937
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-43495
reference_id CVE-2023-43495
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-43495
6
reference_url https://github.com/advisories/GHSA-5j46-5hwq-gwh7
reference_id GHSA-5j46-5hwq-gwh7
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5j46-5hwq-gwh7
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@2.424
purl pkg:maven/org.jenkins-ci.main/jenkins-core@2.424
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.424
aliases CVE-2023-43495, GHSA-5j46-5hwq-gwh7
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s1wm-h4xx-tfh9
5
url VCID-vv6x-yj68-cqas
vulnerability_id VCID-vv6x-yj68-cqas
summary
Jenkins does not exclude sensitive build variables from search
Jenkins 2.50 through 2.423 (both inclusive), LTS 2.60.1 through 2.414.1 (both inclusive) does not exclude sensitive build variables (e.g., password parameter values) from the search in the build history widget, allowing attackers with Item/Read permission to obtain values of sensitive variables used in builds by iteratively testing different characters until the correct sequence is discovered.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43494.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43494.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43494
reference_id
reference_type
scores
0
value 0.51053
scoring_system epss
scoring_elements 0.97871
published_at 2026-04-12T12:55:00Z
1
value 0.51053
scoring_system epss
scoring_elements 0.9787
published_at 2026-04-11T12:55:00Z
2
value 0.51053
scoring_system epss
scoring_elements 0.97866
published_at 2026-04-09T12:55:00Z
3
value 0.51053
scoring_system epss
scoring_elements 0.97864
published_at 2026-04-08T12:55:00Z
4
value 0.51053
scoring_system epss
scoring_elements 0.9786
published_at 2026-04-07T12:55:00Z
5
value 0.51053
scoring_system epss
scoring_elements 0.97856
published_at 2026-04-04T12:55:00Z
6
value 0.51053
scoring_system epss
scoring_elements 0.97855
published_at 2026-04-02T12:55:00Z
7
value 0.53272
scoring_system epss
scoring_elements 0.97984
published_at 2026-04-18T12:55:00Z
8
value 0.53272
scoring_system epss
scoring_elements 0.97978
published_at 2026-04-13T12:55:00Z
9
value 0.53272
scoring_system epss
scoring_elements 0.97983
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43494
2
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
3
reference_url https://github.com/jenkinsci/jenkins/commit/b8ac8cd4c51511b9f844846ba80a8aed054288c5
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/b8ac8cd4c51511b9f844846ba80a8aed054288c5
4
reference_url https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3261
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T18:52:18Z/
url https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3261
5
reference_url http://www.openwall.com/lists/oss-security/2023/09/20/5
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T18:52:18Z/
url http://www.openwall.com/lists/oss-security/2023/09/20/5
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2239934
reference_id 2239934
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2239934
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-43494
reference_id CVE-2023-43494
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-43494
8
reference_url https://github.com/advisories/GHSA-279f-qwgh-h5mp
reference_id GHSA-279f-qwgh-h5mp
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-279f-qwgh-h5mp
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@2.424
purl pkg:maven/org.jenkins-ci.main/jenkins-core@2.424
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.424
aliases CVE-2023-43494, GHSA-279f-qwgh-h5mp
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vv6x-yj68-cqas
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.415