Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.jenkins-ci.main/jenkins-core@2.50
Typemaven
Namespaceorg.jenkins-ci.main
Namejenkins-core
Version2.50
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.57
Latest_non_vulnerable_version2.555
Affected_by_vulnerabilities
0
url VCID-4cy9-1z3y-ekba
vulnerability_id VCID-4cy9-1z3y-ekba
summary
Jenkins temporary uploaded file created with insecure permissions
In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, uploaded files processed via the Stapler web framework and the Jenkins API `MultipartFormDataParser` create temporary files in the system temporary directory with the default permissions for newly created files.

If these permissions are overly permissive, attackers with access to the system temporary directory may be able to read and write the file before it is used.

This vulnerability only affects operating systems using a shared temporary directory for all users (typically Linux). Additionally, the default permissions for newly created files generally only allow attackers to read the temporary file, but not write to it.
Jenkins 2.424, LTS 2.414.2 creates the temporary files in a subdirectory with more restrictive permissions.

As a workaround, you can change your default temporary-file directory using the Java system property `java.io.tmpdir`, if you’re concerned about this issue but unable to immediately update Jenkins.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43498.json
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43498.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43498
reference_id
reference_type
scores
0
value 0.00141
scoring_system epss
scoring_elements 0.33884
published_at 2026-04-26T12:55:00Z
1
value 0.00141
scoring_system epss
scoring_elements 0.34323
published_at 2026-04-08T12:55:00Z
2
value 0.00141
scoring_system epss
scoring_elements 0.34354
published_at 2026-04-09T12:55:00Z
3
value 0.00141
scoring_system epss
scoring_elements 0.34356
published_at 2026-04-11T12:55:00Z
4
value 0.00141
scoring_system epss
scoring_elements 0.34316
published_at 2026-04-12T12:55:00Z
5
value 0.00141
scoring_system epss
scoring_elements 0.34292
published_at 2026-04-13T12:55:00Z
6
value 0.00141
scoring_system epss
scoring_elements 0.34328
published_at 2026-04-16T12:55:00Z
7
value 0.00141
scoring_system epss
scoring_elements 0.34315
published_at 2026-04-18T12:55:00Z
8
value 0.00141
scoring_system epss
scoring_elements 0.34276
published_at 2026-04-21T12:55:00Z
9
value 0.00141
scoring_system epss
scoring_elements 0.33905
published_at 2026-04-24T12:55:00Z
10
value 0.00141
scoring_system epss
scoring_elements 0.34385
published_at 2026-04-02T12:55:00Z
11
value 0.00141
scoring_system epss
scoring_elements 0.34413
published_at 2026-04-04T12:55:00Z
12
value 0.00141
scoring_system epss
scoring_elements 0.3428
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43498
2
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-43498
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-43498
3
reference_url https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3073
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-24T18:51:41Z/
url https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3073
4
reference_url http://www.openwall.com/lists/oss-security/2023/09/20/5
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-24T18:51:41Z/
url http://www.openwall.com/lists/oss-security/2023/09/20/5
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2240096
reference_id 2240096
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2240096
6
reference_url https://github.com/advisories/GHSA-hq87-h4jg-vxfw
reference_id GHSA-hq87-h4jg-vxfw
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-hq87-h4jg-vxfw
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@2.414.2
purl pkg:maven/org.jenkins-ci.main/jenkins-core@2.414.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5781-s1ny-q7ey
1
vulnerability VCID-s1wm-h4xx-tfh9
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.414.2
1
url pkg:maven/org.jenkins-ci.main/jenkins-core@2.424
purl pkg:maven/org.jenkins-ci.main/jenkins-core@2.424
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.424
aliases CVE-2023-43498, GHSA-hq87-h4jg-vxfw
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4cy9-1z3y-ekba
1
url VCID-dyka-xcrq-8fds
vulnerability_id VCID-dyka-xcrq-8fds
summary
Jenkins temporary plugin file created with insecure permissions
Jenkins creates a temporary file when a plugin is deployed directly from a URL.

Jenkins 2.423 and earlier, LTS 2.414.1 and earlier creates this temporary file in the system temporary directory with the default permissions for newly created files.

If these permissions are overly permissive, they may allow attackers with access to the Jenkins controller file system to read and write the file before it is installed in Jenkins, potentially resulting in arbitrary code execution.

This vulnerability only affects operating systems using a shared temporary directory for all users (typically Linux). Additionally, the default permissions for newly created files generally only allow attackers to read the temporary file, but not write to it.

This issue complements SECURITY-2823, which affected plugins uploaded from an administrator’s computer.
Jenkins 2.424, LTS 2.414.2 creates the temporary file in a subdirectory with more restrictive permissions.

As a workaround, you can change your default temporary-file directory using the Java system property java.io.tmpdir, if you’re concerned about this issue but unable to immediately update Jenkins.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43496.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43496.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43496
reference_id
reference_type
scores
0
value 0.0025
scoring_system epss
scoring_elements 0.48294
published_at 2026-04-26T12:55:00Z
1
value 0.0025
scoring_system epss
scoring_elements 0.48237
published_at 2026-04-07T12:55:00Z
2
value 0.0025
scoring_system epss
scoring_elements 0.48287
published_at 2026-04-09T12:55:00Z
3
value 0.0025
scoring_system epss
scoring_elements 0.48286
published_at 2026-04-04T12:55:00Z
4
value 0.0025
scoring_system epss
scoring_elements 0.48293
published_at 2026-04-08T12:55:00Z
5
value 0.0025
scoring_system epss
scoring_elements 0.48283
published_at 2026-04-24T12:55:00Z
6
value 0.0025
scoring_system epss
scoring_elements 0.48297
published_at 2026-04-21T12:55:00Z
7
value 0.0025
scoring_system epss
scoring_elements 0.48342
published_at 2026-04-18T12:55:00Z
8
value 0.0025
scoring_system epss
scoring_elements 0.48348
published_at 2026-04-16T12:55:00Z
9
value 0.0025
scoring_system epss
scoring_elements 0.48265
published_at 2026-04-02T12:55:00Z
10
value 0.0025
scoring_system epss
scoring_elements 0.48296
published_at 2026-04-13T12:55:00Z
11
value 0.0025
scoring_system epss
scoring_elements 0.48285
published_at 2026-04-12T12:55:00Z
12
value 0.0025
scoring_system epss
scoring_elements 0.48311
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43496
2
reference_url https://github.com/jenkinsci/jenkins/commit/df7c4ccda8976c06bf31b8fb9938f26fc38501ca
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/df7c4ccda8976c06bf31b8fb9938f26fc38501ca
3
reference_url https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3072
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:57Z/
url https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3072
4
reference_url http://www.openwall.com/lists/oss-security/2023/09/20/5
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:57Z/
url http://www.openwall.com/lists/oss-security/2023/09/20/5
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2239939
reference_id 2239939
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2239939
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-43496
reference_id CVE-2023-43496
reference_type
scores
0
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-43496
7
reference_url https://github.com/advisories/GHSA-55wp-3pq4-w8p9
reference_id GHSA-55wp-3pq4-w8p9
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-55wp-3pq4-w8p9
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@2.414.2
purl pkg:maven/org.jenkins-ci.main/jenkins-core@2.414.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5781-s1ny-q7ey
1
vulnerability VCID-s1wm-h4xx-tfh9
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.414.2
1
url pkg:maven/org.jenkins-ci.main/jenkins-core@2.424
purl pkg:maven/org.jenkins-ci.main/jenkins-core@2.424
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.424
aliases CVE-2023-43496, GHSA-55wp-3pq4-w8p9
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dyka-xcrq-8fds
2
url VCID-npms-7xaw-mye9
vulnerability_id VCID-npms-7xaw-mye9
summary
Jenkins temporary uploaded file created with insecure permissions
In Jenkins 2.423 and earlier, LTS 2.414.1 and earlier, uploaded files processed via the Stapler web framework and the Jenkins API `MultipartFormDataParser` create temporary files in the system temporary directory with the default permissions for newly created files.

If these permissions are overly permissive, attackers with access to the system temporary directory may be able to read and write the file before it is used.

This vulnerability only affects operating systems using a shared temporary directory for all users (typically Linux). Additionally, the default permissions for newly created files generally only allow attackers to read the temporary file, but not write to it.
Jenkins 2.424, LTS 2.414.2 creates the temporary files in a subdirectory with more restrictive permissions.

As a workaround, you can change your default temporary-file directory using the Java system property `java.io.tmpdir`, if you’re concerned about this issue but unable to immediately update Jenkins.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43497.json
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43497.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43497
reference_id
reference_type
scores
0
value 0.00089
scoring_system epss
scoring_elements 0.25254
published_at 2026-04-26T12:55:00Z
1
value 0.00089
scoring_system epss
scoring_elements 0.25374
published_at 2026-04-08T12:55:00Z
2
value 0.00089
scoring_system epss
scoring_elements 0.25418
published_at 2026-04-09T12:55:00Z
3
value 0.00089
scoring_system epss
scoring_elements 0.2543
published_at 2026-04-11T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.25388
published_at 2026-04-12T12:55:00Z
5
value 0.00089
scoring_system epss
scoring_elements 0.25335
published_at 2026-04-13T12:55:00Z
6
value 0.00089
scoring_system epss
scoring_elements 0.25342
published_at 2026-04-16T12:55:00Z
7
value 0.00089
scoring_system epss
scoring_elements 0.25332
published_at 2026-04-18T12:55:00Z
8
value 0.00089
scoring_system epss
scoring_elements 0.25302
published_at 2026-04-21T12:55:00Z
9
value 0.00089
scoring_system epss
scoring_elements 0.25263
published_at 2026-04-24T12:55:00Z
10
value 0.00089
scoring_system epss
scoring_elements 0.25496
published_at 2026-04-02T12:55:00Z
11
value 0.00089
scoring_system epss
scoring_elements 0.25533
published_at 2026-04-04T12:55:00Z
12
value 0.00089
scoring_system epss
scoring_elements 0.25305
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43497
2
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-43497
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-43497
3
reference_url https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3073
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-24T17:01:04Z/
url https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3073
4
reference_url http://www.openwall.com/lists/oss-security/2023/09/20/5
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-24T17:01:04Z/
url http://www.openwall.com/lists/oss-security/2023/09/20/5
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2240095
reference_id 2240095
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2240095
6
reference_url https://github.com/advisories/GHSA-qv64-w99c-qcr9
reference_id GHSA-qv64-w99c-qcr9
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-qv64-w99c-qcr9
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@2.414.2
purl pkg:maven/org.jenkins-ci.main/jenkins-core@2.414.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5781-s1ny-q7ey
1
vulnerability VCID-s1wm-h4xx-tfh9
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.414.2
1
url pkg:maven/org.jenkins-ci.main/jenkins-core@2.424
purl pkg:maven/org.jenkins-ci.main/jenkins-core@2.424
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.424
aliases CVE-2023-43497, GHSA-qv64-w99c-qcr9
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-npms-7xaw-mye9
3
url VCID-s1wm-h4xx-tfh9
vulnerability_id VCID-s1wm-h4xx-tfh9
summary
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Jenkins 2.423 and earlier, LTS 2.414.1 and earlier does not escape the value of the 'caption' constructor parameter of 'ExpandableDetailsNote', resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control this parameter.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43495.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43495.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43495
reference_id
reference_type
scores
0
value 0.0078
scoring_system epss
scoring_elements 0.73687
published_at 2026-04-12T12:55:00Z
1
value 0.0078
scoring_system epss
scoring_elements 0.73704
published_at 2026-04-11T12:55:00Z
2
value 0.0078
scoring_system epss
scoring_elements 0.73682
published_at 2026-04-09T12:55:00Z
3
value 0.0078
scoring_system epss
scoring_elements 0.73669
published_at 2026-04-08T12:55:00Z
4
value 0.0078
scoring_system epss
scoring_elements 0.73634
published_at 2026-04-07T12:55:00Z
5
value 0.0078
scoring_system epss
scoring_elements 0.73637
published_at 2026-04-02T12:55:00Z
6
value 0.0078
scoring_system epss
scoring_elements 0.73661
published_at 2026-04-04T12:55:00Z
7
value 0.00783
scoring_system epss
scoring_elements 0.7382
published_at 2026-04-26T12:55:00Z
8
value 0.00783
scoring_system epss
scoring_elements 0.73735
published_at 2026-04-13T12:55:00Z
9
value 0.00783
scoring_system epss
scoring_elements 0.73778
published_at 2026-04-16T12:55:00Z
10
value 0.00783
scoring_system epss
scoring_elements 0.73786
published_at 2026-04-18T12:55:00Z
11
value 0.00783
scoring_system epss
scoring_elements 0.73777
published_at 2026-04-21T12:55:00Z
12
value 0.00783
scoring_system epss
scoring_elements 0.73811
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43495
2
reference_url https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3245
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T18:51:47Z/
url https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3245
3
reference_url http://www.openwall.com/lists/oss-security/2023/09/20/5
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T18:51:47Z/
url http://www.openwall.com/lists/oss-security/2023/09/20/5
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2239937
reference_id 2239937
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2239937
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-43495
reference_id CVE-2023-43495
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-43495
6
reference_url https://github.com/advisories/GHSA-5j46-5hwq-gwh7
reference_id GHSA-5j46-5hwq-gwh7
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5j46-5hwq-gwh7
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@2.414.2
purl pkg:maven/org.jenkins-ci.main/jenkins-core@2.414.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5781-s1ny-q7ey
1
vulnerability VCID-s1wm-h4xx-tfh9
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.414.2
1
url pkg:maven/org.jenkins-ci.main/jenkins-core@2.424
purl pkg:maven/org.jenkins-ci.main/jenkins-core@2.424
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.424
aliases CVE-2023-43495, GHSA-5j46-5hwq-gwh7
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s1wm-h4xx-tfh9
4
url VCID-syz5-rzv5-ukhb
vulnerability_id VCID-syz5-rzv5-ukhb
summary
Cross-Site Request Forgery (CSRF)
Jenkins is vulnerable to an issue in the Jenkins user database authentication realm.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000356.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000356.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000356
reference_id
reference_type
scores
0
value 0.08667
scoring_system epss
scoring_elements 0.92475
published_at 2026-04-26T12:55:00Z
1
value 0.08667
scoring_system epss
scoring_elements 0.92418
published_at 2026-04-01T12:55:00Z
2
value 0.08667
scoring_system epss
scoring_elements 0.92424
published_at 2026-04-02T12:55:00Z
3
value 0.08667
scoring_system epss
scoring_elements 0.92433
published_at 2026-04-04T12:55:00Z
4
value 0.08667
scoring_system epss
scoring_elements 0.92436
published_at 2026-04-07T12:55:00Z
5
value 0.08667
scoring_system epss
scoring_elements 0.92447
published_at 2026-04-08T12:55:00Z
6
value 0.08667
scoring_system epss
scoring_elements 0.92452
published_at 2026-04-09T12:55:00Z
7
value 0.08667
scoring_system epss
scoring_elements 0.92458
published_at 2026-04-13T12:55:00Z
8
value 0.08667
scoring_system epss
scoring_elements 0.9246
published_at 2026-04-12T12:55:00Z
9
value 0.08667
scoring_system epss
scoring_elements 0.92469
published_at 2026-04-16T12:55:00Z
10
value 0.08667
scoring_system epss
scoring_elements 0.92468
published_at 2026-04-18T12:55:00Z
11
value 0.08667
scoring_system epss
scoring_elements 0.92471
published_at 2026-04-21T12:55:00Z
12
value 0.08667
scoring_system epss
scoring_elements 0.92474
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000356
2
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
3
reference_url https://github.com/jenkinsci/jenkins/commit/23f4809e6c10a221e9d67f2e841536845387b42d
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/23f4809e6c10a221e9d67f2e841536845387b42d
4
reference_url https://github.com/jenkinsci/jenkins/commit/3c5e5ca63d9a1ac1c4087682dc0d426625eafed8
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/3c5e5ca63d9a1ac1c4087682dc0d426625eafed8
5
reference_url https://github.com/jenkinsci/jenkins/commit/e69c28e44dae41322112471e1c80f840bde314d4
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/e69c28e44dae41322112471e1c80f840bde314d4
6
reference_url https://jenkins.io/security/advisory/2017-04-26
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://jenkins.io/security/advisory/2017-04-26
7
reference_url https://jenkins.io/security/advisory/2017-04-26/
reference_id
reference_type
scores
url https://jenkins.io/security/advisory/2017-04-26/
8
reference_url http://www.securityfocus.com/bid/98062
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/98062
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1446110
reference_id 1446110
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1446110
10
reference_url https://security.archlinux.org/ASA-201704-8
reference_id ASA-201704-8
reference_type
scores
url https://security.archlinux.org/ASA-201704-8
11
reference_url https://security.archlinux.org/AVG-255
reference_id AVG-255
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-255
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-1000356
reference_id CVE-2017-1000356
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-1000356
13
reference_url https://github.com/advisories/GHSA-85wq-pqhp-hmq6
reference_id GHSA-85wq-pqhp-hmq6
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-85wq-pqhp-hmq6
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@2.57
purl pkg:maven/org.jenkins-ci.main/jenkins-core@2.57
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.57
aliases CVE-2017-1000356, GHSA-85wq-pqhp-hmq6
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-syz5-rzv5-ukhb
5
url VCID-vv6x-yj68-cqas
vulnerability_id VCID-vv6x-yj68-cqas
summary
Jenkins does not exclude sensitive build variables from search
Jenkins 2.50 through 2.423 (both inclusive), LTS 2.60.1 through 2.414.1 (both inclusive) does not exclude sensitive build variables (e.g., password parameter values) from the search in the build history widget, allowing attackers with Item/Read permission to obtain values of sensitive variables used in builds by iteratively testing different characters until the correct sequence is discovered.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43494.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43494.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43494
reference_id
reference_type
scores
0
value 0.51053
scoring_system epss
scoring_elements 0.97871
published_at 2026-04-12T12:55:00Z
1
value 0.51053
scoring_system epss
scoring_elements 0.9787
published_at 2026-04-11T12:55:00Z
2
value 0.51053
scoring_system epss
scoring_elements 0.97866
published_at 2026-04-09T12:55:00Z
3
value 0.51053
scoring_system epss
scoring_elements 0.97864
published_at 2026-04-08T12:55:00Z
4
value 0.51053
scoring_system epss
scoring_elements 0.9786
published_at 2026-04-07T12:55:00Z
5
value 0.51053
scoring_system epss
scoring_elements 0.97856
published_at 2026-04-04T12:55:00Z
6
value 0.51053
scoring_system epss
scoring_elements 0.97855
published_at 2026-04-02T12:55:00Z
7
value 0.53272
scoring_system epss
scoring_elements 0.97984
published_at 2026-04-26T12:55:00Z
8
value 0.53272
scoring_system epss
scoring_elements 0.97978
published_at 2026-04-13T12:55:00Z
9
value 0.53272
scoring_system epss
scoring_elements 0.97983
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43494
2
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
3
reference_url https://github.com/jenkinsci/jenkins/commit/b8ac8cd4c51511b9f844846ba80a8aed054288c5
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/b8ac8cd4c51511b9f844846ba80a8aed054288c5
4
reference_url https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3261
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T18:52:18Z/
url https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3261
5
reference_url http://www.openwall.com/lists/oss-security/2023/09/20/5
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T18:52:18Z/
url http://www.openwall.com/lists/oss-security/2023/09/20/5
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2239934
reference_id 2239934
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2239934
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-43494
reference_id CVE-2023-43494
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-43494
8
reference_url https://github.com/advisories/GHSA-279f-qwgh-h5mp
reference_id GHSA-279f-qwgh-h5mp
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-279f-qwgh-h5mp
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@2.414.2
purl pkg:maven/org.jenkins-ci.main/jenkins-core@2.414.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5781-s1ny-q7ey
1
vulnerability VCID-s1wm-h4xx-tfh9
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.414.2
1
url pkg:maven/org.jenkins-ci.main/jenkins-core@2.424
purl pkg:maven/org.jenkins-ci.main/jenkins-core@2.424
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.424
aliases CVE-2023-43494, GHSA-279f-qwgh-h5mp
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vv6x-yj68-cqas
6
url VCID-yq9y-tdnu-2uc3
vulnerability_id VCID-yq9y-tdnu-2uc3
summary Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an XStream: Java crash when trying to instantiate void/Void.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000355.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000355.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000355
reference_id
reference_type
scores
0
value 0.00429
scoring_system epss
scoring_elements 0.62564
published_at 2026-04-26T12:55:00Z
1
value 0.00429
scoring_system epss
scoring_elements 0.62548
published_at 2026-04-24T12:55:00Z
2
value 0.00429
scoring_system epss
scoring_elements 0.62538
published_at 2026-04-21T12:55:00Z
3
value 0.00429
scoring_system epss
scoring_elements 0.62556
published_at 2026-04-18T12:55:00Z
4
value 0.00429
scoring_system epss
scoring_elements 0.6255
published_at 2026-04-16T12:55:00Z
5
value 0.00429
scoring_system epss
scoring_elements 0.62531
published_at 2026-04-12T12:55:00Z
6
value 0.00429
scoring_system epss
scoring_elements 0.62542
published_at 2026-04-11T12:55:00Z
7
value 0.00429
scoring_system epss
scoring_elements 0.62524
published_at 2026-04-09T12:55:00Z
8
value 0.00429
scoring_system epss
scoring_elements 0.62508
published_at 2026-04-13T12:55:00Z
9
value 0.00429
scoring_system epss
scoring_elements 0.62456
published_at 2026-04-07T12:55:00Z
10
value 0.00429
scoring_system epss
scoring_elements 0.62458
published_at 2026-04-02T12:55:00Z
11
value 0.00429
scoring_system epss
scoring_elements 0.624
published_at 2026-04-01T12:55:00Z
12
value 0.00429
scoring_system epss
scoring_elements 0.62489
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000355
2
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
3
reference_url https://github.com/jenkinsci/jenkins/commit/701ea95a52afe53bee28f76a3f96eb0e578852e9
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/701ea95a52afe53bee28f76a3f96eb0e578852e9
4
reference_url https://github.com/jenkinsci/jenkins/commit/f7075e60772bd2fa15bcc72450735641c168fed5
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/f7075e60772bd2fa15bcc72450735641c168fed5
5
reference_url https://jenkins.io/security/advisory/2017-04-26
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://jenkins.io/security/advisory/2017-04-26
6
reference_url https://jenkins.io/security/advisory/2017-04-26/
reference_id
reference_type
scores
url https://jenkins.io/security/advisory/2017-04-26/
7
reference_url http://www.securityfocus.com/bid/98066
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/98066
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1446128
reference_id 1446128
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1446128
9
reference_url https://security.archlinux.org/ASA-201704-8
reference_id ASA-201704-8
reference_type
scores
url https://security.archlinux.org/ASA-201704-8
10
reference_url https://security.archlinux.org/AVG-255
reference_id AVG-255
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-255
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-1000355
reference_id CVE-2017-1000355
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-1000355
12
reference_url https://github.com/advisories/GHSA-4466-8jm4-448p
reference_id GHSA-4466-8jm4-448p
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-4466-8jm4-448p
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@2.57
purl pkg:maven/org.jenkins-ci.main/jenkins-core@2.57
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.57
aliases CVE-2017-1000355, GHSA-4466-8jm4-448p
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yq9y-tdnu-2uc3
7
url VCID-ytyb-zk5y-6ub2
vulnerability_id VCID-ytyb-zk5y-6ub2
summary Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to a login command which allowed impersonating any Jenkins user. The `login` command available in the remoting-based CLI stored the encrypted user name of the successfully authenticated user in a cache file used to authenticate further commands. Users with sufficient permission to create secrets in Jenkins, and download their encrypted values (e.g. with Job/Configure permission), were able to impersonate any other Jenkins user on the same instance.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000354.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000354.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000354
reference_id
reference_type
scores
0
value 0.00364
scoring_system epss
scoring_elements 0.58464
published_at 2026-04-24T12:55:00Z
1
value 0.00364
scoring_system epss
scoring_elements 0.58372
published_at 2026-04-01T12:55:00Z
2
value 0.00364
scoring_system epss
scoring_elements 0.58457
published_at 2026-04-02T12:55:00Z
3
value 0.00364
scoring_system epss
scoring_elements 0.58477
published_at 2026-04-26T12:55:00Z
4
value 0.00364
scoring_system epss
scoring_elements 0.58448
published_at 2026-04-07T12:55:00Z
5
value 0.00364
scoring_system epss
scoring_elements 0.585
published_at 2026-04-08T12:55:00Z
6
value 0.00364
scoring_system epss
scoring_elements 0.58506
published_at 2026-04-09T12:55:00Z
7
value 0.00364
scoring_system epss
scoring_elements 0.58523
published_at 2026-04-11T12:55:00Z
8
value 0.00364
scoring_system epss
scoring_elements 0.58504
published_at 2026-04-12T12:55:00Z
9
value 0.00364
scoring_system epss
scoring_elements 0.58484
published_at 2026-04-13T12:55:00Z
10
value 0.00364
scoring_system epss
scoring_elements 0.58516
published_at 2026-04-16T12:55:00Z
11
value 0.00364
scoring_system epss
scoring_elements 0.5852
published_at 2026-04-18T12:55:00Z
12
value 0.00364
scoring_system epss
scoring_elements 0.58499
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000354
2
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
3
reference_url https://github.com/jenkinsci/jenkins/commit/02d24053bdfeb219d2387a19885a60bdab510479
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/02d24053bdfeb219d2387a19885a60bdab510479
4
reference_url https://jenkins.io/security/advisory/2017-04-26
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://jenkins.io/security/advisory/2017-04-26
5
reference_url https://jenkins.io/security/advisory/2017-04-26/
reference_id
reference_type
scores
url https://jenkins.io/security/advisory/2017-04-26/
6
reference_url https://web.archive.org/web/20200227174424/http://www.securityfocus.com/bid/98065
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20200227174424/http://www.securityfocus.com/bid/98065
7
reference_url http://www.securityfocus.com/bid/98065
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/98065
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1446122
reference_id 1446122
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1446122
9
reference_url https://security.archlinux.org/ASA-201704-8
reference_id ASA-201704-8
reference_type
scores
url https://security.archlinux.org/ASA-201704-8
10
reference_url https://security.archlinux.org/AVG-255
reference_id AVG-255
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-255
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-1000354
reference_id CVE-2017-1000354
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-1000354
12
reference_url https://github.com/advisories/GHSA-r57f-7xw3-q2r9
reference_id GHSA-r57f-7xw3-q2r9
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-r57f-7xw3-q2r9
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@2.57
purl pkg:maven/org.jenkins-ci.main/jenkins-core@2.57
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.57
aliases CVE-2017-1000354, GHSA-r57f-7xw3-q2r9
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ytyb-zk5y-6ub2
8
url VCID-z5ns-74uq-4uef
vulnerability_id VCID-z5ns-74uq-4uef
summary
Deserialization of Untrusted Data in Jenkins
An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java `SignedObject` object to the Jenkins CLI, that would be deserialized using a new `ObjectInputStream`, bypassing the existing denylist-based protection mechanism.
references
0
reference_url http://packetstormsecurity.com/files/159266/Jenkins-2.56-CLI-Deserialization-Code-Execution.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-10-02T03:55:44Z/
url http://packetstormsecurity.com/files/159266/Jenkins-2.56-CLI-Deserialization-Code-Execution.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000353.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000353.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000353
reference_id
reference_type
scores
0
value 0.94482
scoring_system epss
scoring_elements 0.99999
published_at 2026-04-26T12:55:00Z
1
value 0.94493
scoring_system epss
scoring_elements 1.0
published_at 2026-04-18T12:55:00Z
2
value 0.94508
scoring_system epss
scoring_elements 1.0
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000353
3
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
4
reference_url https://github.com/jenkinsci/jenkins/commit/36b8285a41eb28333549e8d851f81fd80a184076
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/36b8285a41eb28333549e8d851f81fd80a184076
5
reference_url https://github.com/jenkinsci/jenkins/commit/f237601afd750a0eaaf961e8120b08de238f2c3f
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/f237601afd750a0eaaf961e8120b08de238f2c3f
6
reference_url https://jenkins.io/security/advisory/2017-04-26
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://jenkins.io/security/advisory/2017-04-26
7
reference_url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-1000353
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-1000353
8
reference_url https://www.exploit-db.com/exploits/41965
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.exploit-db.com/exploits/41965
9
reference_url https://www.oracle.com/security-alerts/cpuapr2022.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-10-02T03:55:44Z/
url https://www.oracle.com/security-alerts/cpuapr2022.html
10
reference_url http://www.securityfocus.com/bid/98056
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-10-02T03:55:44Z/
url http://www.securityfocus.com/bid/98056
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1446114
reference_id 1446114
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1446114
12
reference_url https://www.exploit-db.com/exploits/41965/
reference_id 41965
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-10-02T03:55:44Z/
url https://www.exploit-db.com/exploits/41965/
13
reference_url https://blogs.securiteam.com/index.php/archives/3171
reference_id CVE-2017-1000353
reference_type exploit
scores
url https://blogs.securiteam.com/index.php/archives/3171
14
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/java/dos/41965.txt
reference_id CVE-2017-1000353
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/java/dos/41965.txt
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-1000353
reference_id CVE-2017-1000353
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-1000353
16
reference_url https://github.com/advisories/GHSA-26wc-3wqp-g3rp
reference_id GHSA-26wc-3wqp-g3rp
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-26wc-3wqp-g3rp
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@2.57
purl pkg:maven/org.jenkins-ci.main/jenkins-core@2.57
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.57
aliases CVE-2017-1000353, GHSA-26wc-3wqp-g3rp
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z5ns-74uq-4uef
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.50