Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
Typemaven
Namespaceorg.jenkins-ci.main
Namejenkins-core
Version1.532.2
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.551
Latest_non_vulnerable_version2.555
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-4hfu-spf7-a3hw
vulnerability_id VCID-4hfu-spf7-a3hw
summary The loadUserByUsername function in hudson/security/HudsonPrivateSecurityRealm.java in Jenkins before 1.551 and LTS before 1.532.2 allows remote attackers to determine whether a user exists via vectors related to failed login attempts.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2064.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2064.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2064
reference_id
reference_type
scores
0
value 0.00389
scoring_system epss
scoring_elements 0.59989
published_at 2026-04-24T12:55:00Z
1
value 0.00389
scoring_system epss
scoring_elements 0.59999
published_at 2026-04-09T12:55:00Z
2
value 0.00389
scoring_system epss
scoring_elements 0.6002
published_at 2026-04-11T12:55:00Z
3
value 0.00389
scoring_system epss
scoring_elements 0.60004
published_at 2026-04-12T12:55:00Z
4
value 0.00389
scoring_system epss
scoring_elements 0.59987
published_at 2026-04-13T12:55:00Z
5
value 0.00389
scoring_system epss
scoring_elements 0.60026
published_at 2026-04-16T12:55:00Z
6
value 0.00389
scoring_system epss
scoring_elements 0.60033
published_at 2026-04-18T12:55:00Z
7
value 0.00389
scoring_system epss
scoring_elements 0.60018
published_at 2026-04-21T12:55:00Z
8
value 0.00389
scoring_system epss
scoring_elements 0.59863
published_at 2026-04-01T12:55:00Z
9
value 0.00389
scoring_system epss
scoring_elements 0.5994
published_at 2026-04-02T12:55:00Z
10
value 0.00389
scoring_system epss
scoring_elements 0.59966
published_at 2026-04-04T12:55:00Z
11
value 0.00389
scoring_system epss
scoring_elements 0.59935
published_at 2026-04-07T12:55:00Z
12
value 0.00389
scoring_system epss
scoring_elements 0.59985
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2064
2
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
3
reference_url https://github.com/jenkinsci/jenkins/commit/fbf96734470caba9364f04e0b77b0bae7293a1ec
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/fbf96734470caba9364f04e0b77b0bae7293a1ec
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-2064
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-2064
5
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
6
reference_url http://www.openwall.com/lists/oss-security/2014/02/21/2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/02/21/2
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1067817
reference_id 1067817
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1067817
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
10
reference_url https://github.com/advisories/GHSA-9vg9-x38g-9hfx
reference_id GHSA-9vg9-x38g-9hfx
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9vg9-x38g-9hfx
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
1
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
aliases CVE-2014-2064, GHSA-9vg9-x38g-9hfx
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4hfu-spf7-a3hw
1
url VCID-52sp-kv9t-gye3
vulnerability_id VCID-52sp-kv9t-gye3
summary Jenkins before 1.551 and LTS before 1.532.2 does not invalidate the API token when a user is deleted, which allows remote authenticated users to retain access via the token.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2062.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2062.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2062
reference_id
reference_type
scores
0
value 0.00186
scoring_system epss
scoring_elements 0.40275
published_at 2026-04-24T12:55:00Z
1
value 0.00186
scoring_system epss
scoring_elements 0.4048
published_at 2026-04-09T12:55:00Z
2
value 0.00186
scoring_system epss
scoring_elements 0.405
published_at 2026-04-11T12:55:00Z
3
value 0.00186
scoring_system epss
scoring_elements 0.40464
published_at 2026-04-12T12:55:00Z
4
value 0.00186
scoring_system epss
scoring_elements 0.40444
published_at 2026-04-13T12:55:00Z
5
value 0.00186
scoring_system epss
scoring_elements 0.40491
published_at 2026-04-16T12:55:00Z
6
value 0.00186
scoring_system epss
scoring_elements 0.4046
published_at 2026-04-18T12:55:00Z
7
value 0.00186
scoring_system epss
scoring_elements 0.40385
published_at 2026-04-21T12:55:00Z
8
value 0.00186
scoring_system epss
scoring_elements 0.40382
published_at 2026-04-01T12:55:00Z
9
value 0.00186
scoring_system epss
scoring_elements 0.4047
published_at 2026-04-02T12:55:00Z
10
value 0.00186
scoring_system epss
scoring_elements 0.40496
published_at 2026-04-04T12:55:00Z
11
value 0.00186
scoring_system epss
scoring_elements 0.40418
published_at 2026-04-07T12:55:00Z
12
value 0.00186
scoring_system epss
scoring_elements 0.40469
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2062
2
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
3
reference_url https://github.com/jenkinsci/jenkins/commit/5548b5220cfd496831b5721124189ff18fbb12a3
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/5548b5220cfd496831b5721124189ff18fbb12a3
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-2062
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-2062
5
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
6
reference_url http://www.openwall.com/lists/oss-security/2014/02/21/2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/02/21/2
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1067811
reference_id 1067811
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1067811
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
10
reference_url https://github.com/advisories/GHSA-vxc6-wvh8-fpxw
reference_id GHSA-vxc6-wvh8-fpxw
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-vxc6-wvh8-fpxw
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
1
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
aliases CVE-2014-2062, GHSA-vxc6-wvh8-fpxw
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-52sp-kv9t-gye3
2
url VCID-6avm-s2zj-5qex
vulnerability_id VCID-6avm-s2zj-5qex
summary Session fixation vulnerability in Jenkins before 1.551 and LTS before 1.532.2 allows remote attackers to hijack web sessions via vectors involving the "override" of Jenkins cookies.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2066.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2066.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2066
reference_id
reference_type
scores
0
value 0.00138
scoring_system epss
scoring_elements 0.33565
published_at 2026-04-24T12:55:00Z
1
value 0.00138
scoring_system epss
scoring_elements 0.33944
published_at 2026-04-07T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33986
published_at 2026-04-16T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.34017
published_at 2026-04-11T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.33974
published_at 2026-04-12T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.3395
published_at 2026-04-13T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.33972
published_at 2026-04-18T12:55:00Z
7
value 0.00138
scoring_system epss
scoring_elements 0.33939
published_at 2026-04-21T12:55:00Z
8
value 0.00138
scoring_system epss
scoring_elements 0.33712
published_at 2026-04-01T12:55:00Z
9
value 0.00138
scoring_system epss
scoring_elements 0.34056
published_at 2026-04-02T12:55:00Z
10
value 0.00138
scoring_system epss
scoring_elements 0.34086
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2066
2
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
3
reference_url https://github.com/jenkinsci/jenkins/commit/8ac74c350779921598f9d5edfed39dd35de8842a
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/8ac74c350779921598f9d5edfed39dd35de8842a
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-2066
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-2066
5
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
6
reference_url http://www.openwall.com/lists/oss-security/2014/02/21/2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/02/21/2
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1067827
reference_id 1067827
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1067827
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
10
reference_url https://github.com/advisories/GHSA-8jfx-h6q2-v4g3
reference_id GHSA-8jfx-h6q2-v4g3
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-8jfx-h6q2-v4g3
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
1
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
aliases CVE-2014-2066, GHSA-8jfx-h6q2-v4g3
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6avm-s2zj-5qex
3
url VCID-b5mh-28pd-fbe3
vulnerability_id VCID-b5mh-28pd-fbe3
summary BuildTrigger in Jenkins before 1.551 and LTS before 1.532.2 allows remote authenticated users to bypass access restrictions and execute arbitrary jobs by configuring a job to trigger another job. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7330.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2058
reference_id
reference_type
scores
0
value 0.00056
scoring_system epss
scoring_elements 0.17583
published_at 2026-04-24T12:55:00Z
1
value 0.00056
scoring_system epss
scoring_elements 0.17755
published_at 2026-04-09T12:55:00Z
2
value 0.00056
scoring_system epss
scoring_elements 0.17774
published_at 2026-04-11T12:55:00Z
3
value 0.00056
scoring_system epss
scoring_elements 0.17728
published_at 2026-04-12T12:55:00Z
4
value 0.00056
scoring_system epss
scoring_elements 0.17681
published_at 2026-04-13T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17627
published_at 2026-04-16T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.17635
published_at 2026-04-18T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.17672
published_at 2026-04-21T12:55:00Z
8
value 0.00056
scoring_system epss
scoring_elements 0.17691
published_at 2026-04-01T12:55:00Z
9
value 0.00056
scoring_system epss
scoring_elements 0.17851
published_at 2026-04-02T12:55:00Z
10
value 0.00056
scoring_system epss
scoring_elements 0.17905
published_at 2026-04-04T12:55:00Z
11
value 0.00056
scoring_system epss
scoring_elements 0.17606
published_at 2026-04-07T12:55:00Z
12
value 0.00056
scoring_system epss
scoring_elements 0.17694
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2058
1
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
2
reference_url https://github.com/jenkinsci/jenkins/commit/b6b2a367a7976be80a799c6a49fa6c58d778b50e
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/b6b2a367a7976be80a799c6a49fa6c58d778b50e
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-2058
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-2058
4
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
5
reference_url http://www.openwall.com/lists/oss-security/2014/02/21/2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/02/21/2
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
8
reference_url https://github.com/advisories/GHSA-7fpg-pp3m-h22f
reference_id GHSA-7fpg-pp3m-h22f
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-7fpg-pp3m-h22f
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
1
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
aliases CVE-2014-2058, GHSA-7fpg-pp3m-h22f
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b5mh-28pd-fbe3
4
url VCID-bkyy-edpd-m3cy
vulnerability_id VCID-bkyy-edpd-m3cy
summary
Jenkins Vulnerable to Clickjacking
Jenkins before 1.551 and LTS before 1.532.2 allows remote attackers to conduct clickjacking attacks via unspecified vectors.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2063.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2063.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2063
reference_id
reference_type
scores
0
value 0.00428
scoring_system epss
scoring_elements 0.62506
published_at 2026-04-21T12:55:00Z
1
value 0.00428
scoring_system epss
scoring_elements 0.62365
published_at 2026-04-01T12:55:00Z
2
value 0.00428
scoring_system epss
scoring_elements 0.62424
published_at 2026-04-02T12:55:00Z
3
value 0.00428
scoring_system epss
scoring_elements 0.62454
published_at 2026-04-04T12:55:00Z
4
value 0.00428
scoring_system epss
scoring_elements 0.62421
published_at 2026-04-07T12:55:00Z
5
value 0.00428
scoring_system epss
scoring_elements 0.62472
published_at 2026-04-08T12:55:00Z
6
value 0.00428
scoring_system epss
scoring_elements 0.62488
published_at 2026-04-09T12:55:00Z
7
value 0.00428
scoring_system epss
scoring_elements 0.62507
published_at 2026-04-11T12:55:00Z
8
value 0.00428
scoring_system epss
scoring_elements 0.62496
published_at 2026-04-12T12:55:00Z
9
value 0.00428
scoring_system epss
scoring_elements 0.62474
published_at 2026-04-13T12:55:00Z
10
value 0.00428
scoring_system epss
scoring_elements 0.62516
published_at 2026-04-24T12:55:00Z
11
value 0.00428
scoring_system epss
scoring_elements 0.62522
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2063
2
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
3
reference_url https://github.com/jenkinsci/jenkins/commit/16931bd7bf7560e26ef98328b8e95e803d0e90f6
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/16931bd7bf7560e26ef98328b8e95e803d0e90f6
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-2063
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-2063
5
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
6
reference_url http://www.openwall.com/lists/oss-security/2014/02/21/2
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/02/21/2
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1067812
reference_id 1067812
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1067812
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
10
reference_url https://github.com/advisories/GHSA-w3f5-gq7j-m797
reference_id GHSA-w3f5-gq7j-m797
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-w3f5-gq7j-m797
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
1
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
aliases CVE-2014-2063, GHSA-w3f5-gq7j-m797
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bkyy-edpd-m3cy
5
url VCID-bn9w-mr5k-ufen
vulnerability_id VCID-bn9w-mr5k-ufen
summary Cross-site scripting (XSS) vulnerability in java/hudson/model/Cause.java in Jenkins before 1.551 and LTS before 1.532.2 allows remote authenticated users to inject arbitrary web script or HTML via a "remote cause note."
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2067.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2067.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2067
reference_id
reference_type
scores
0
value 0.00109
scoring_system epss
scoring_elements 0.29092
published_at 2026-04-24T12:55:00Z
1
value 0.00109
scoring_system epss
scoring_elements 0.29311
published_at 2026-04-08T12:55:00Z
2
value 0.00109
scoring_system epss
scoring_elements 0.29351
published_at 2026-04-09T12:55:00Z
3
value 0.00109
scoring_system epss
scoring_elements 0.29354
published_at 2026-04-11T12:55:00Z
4
value 0.00109
scoring_system epss
scoring_elements 0.29308
published_at 2026-04-12T12:55:00Z
5
value 0.00109
scoring_system epss
scoring_elements 0.29256
published_at 2026-04-18T12:55:00Z
6
value 0.00109
scoring_system epss
scoring_elements 0.29281
published_at 2026-04-16T12:55:00Z
7
value 0.00109
scoring_system epss
scoring_elements 0.29211
published_at 2026-04-21T12:55:00Z
8
value 0.00109
scoring_system epss
scoring_elements 0.29313
published_at 2026-04-01T12:55:00Z
9
value 0.00109
scoring_system epss
scoring_elements 0.29384
published_at 2026-04-02T12:55:00Z
10
value 0.00109
scoring_system epss
scoring_elements 0.29434
published_at 2026-04-04T12:55:00Z
11
value 0.00109
scoring_system epss
scoring_elements 0.29246
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2067
2
reference_url http://seclists.org/oss-sec/2014/q1/421
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://seclists.org/oss-sec/2014/q1/421
3
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/91354
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/91354
4
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
5
reference_url https://github.com/jenkinsci/jenkins/commit/5d57c855f3147bfc5e7fda9252317b428a700014
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/5d57c855f3147bfc5e7fda9252317b428a700014
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-2067
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-2067
7
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1067832
reference_id 1067832
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1067832
9
reference_url https://github.com/advisories/GHSA-vj6q-v2h7-6q5m
reference_id GHSA-vj6q-v2h7-6q5m
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-vj6q-v2h7-6q5m
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
1
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
aliases CVE-2014-2067, GHSA-vj6q-v2h7-6q5m
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bn9w-mr5k-ufen
6
url VCID-ds2c-vfv9-1yhf
vulnerability_id VCID-ds2c-vfv9-1yhf
summary Cross-site scripting (XSS) vulnerability in Jenkins before 1.551 and LTS before 1.532.2 allows remote attackers to inject arbitrary web script or HTML via the iconSize cookie.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2065.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2065.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2065
reference_id
reference_type
scores
0
value 0.00137
scoring_system epss
scoring_elements 0.33366
published_at 2026-04-24T12:55:00Z
1
value 0.00137
scoring_system epss
scoring_elements 0.33617
published_at 2026-04-09T12:55:00Z
2
value 0.00137
scoring_system epss
scoring_elements 0.33612
published_at 2026-04-11T12:55:00Z
3
value 0.00137
scoring_system epss
scoring_elements 0.33571
published_at 2026-04-12T12:55:00Z
4
value 0.00137
scoring_system epss
scoring_elements 0.33548
published_at 2026-04-13T12:55:00Z
5
value 0.00137
scoring_system epss
scoring_elements 0.33581
published_at 2026-04-16T12:55:00Z
6
value 0.00137
scoring_system epss
scoring_elements 0.33558
published_at 2026-04-18T12:55:00Z
7
value 0.00137
scoring_system epss
scoring_elements 0.33525
published_at 2026-04-21T12:55:00Z
8
value 0.00137
scoring_system epss
scoring_elements 0.33515
published_at 2026-04-01T12:55:00Z
9
value 0.00137
scoring_system epss
scoring_elements 0.33669
published_at 2026-04-02T12:55:00Z
10
value 0.00137
scoring_system epss
scoring_elements 0.33701
published_at 2026-04-04T12:55:00Z
11
value 0.00137
scoring_system epss
scoring_elements 0.3354
published_at 2026-04-07T12:55:00Z
12
value 0.00137
scoring_system epss
scoring_elements 0.33584
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2065
2
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
3
reference_url https://github.com/jenkinsci/jenkins/commit/a0b00508eeb74d7033dc4100eb382df4e8fa72e7
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/a0b00508eeb74d7033dc4100eb382df4e8fa72e7
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-2065
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-2065
5
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
6
reference_url http://www.openwall.com/lists/oss-security/2014/02/21/2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/02/21/2
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1067820
reference_id 1067820
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1067820
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
10
reference_url https://github.com/advisories/GHSA-fxj8-cqcp-3vgq
reference_id GHSA-fxj8-cqcp-3vgq
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-fxj8-cqcp-3vgq
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
1
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
aliases CVE-2014-2065, GHSA-fxj8-cqcp-3vgq
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ds2c-vfv9-1yhf
7
url VCID-hvd6-bj7t-q7fj
vulnerability_id VCID-hvd6-bj7t-q7fj
summary Directory traversal vulnerability in the CLI job creation (hudson/cli/CreateJobCommand.java) in Jenkins before 1.551 and LTS before 1.532.2 allows remote authenticated users to overwrite arbitrary files via the job name.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2059.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2059.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2059
reference_id
reference_type
scores
0
value 0.01968
scoring_system epss
scoring_elements 0.83587
published_at 2026-04-24T12:55:00Z
1
value 0.01968
scoring_system epss
scoring_elements 0.83522
published_at 2026-04-09T12:55:00Z
2
value 0.01968
scoring_system epss
scoring_elements 0.83537
published_at 2026-04-11T12:55:00Z
3
value 0.01968
scoring_system epss
scoring_elements 0.83531
published_at 2026-04-12T12:55:00Z
4
value 0.01968
scoring_system epss
scoring_elements 0.83527
published_at 2026-04-13T12:55:00Z
5
value 0.01968
scoring_system epss
scoring_elements 0.83561
published_at 2026-04-16T12:55:00Z
6
value 0.01968
scoring_system epss
scoring_elements 0.83562
published_at 2026-04-18T12:55:00Z
7
value 0.01968
scoring_system epss
scoring_elements 0.83563
published_at 2026-04-21T12:55:00Z
8
value 0.01968
scoring_system epss
scoring_elements 0.83462
published_at 2026-04-01T12:55:00Z
9
value 0.01968
scoring_system epss
scoring_elements 0.83475
published_at 2026-04-02T12:55:00Z
10
value 0.01968
scoring_system epss
scoring_elements 0.83489
published_at 2026-04-04T12:55:00Z
11
value 0.01968
scoring_system epss
scoring_elements 0.83488
published_at 2026-04-07T12:55:00Z
12
value 0.01968
scoring_system epss
scoring_elements 0.83512
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2059
2
reference_url http://seclists.org/oss-sec/2014/q1/421
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://seclists.org/oss-sec/2014/q1/421
3
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/91346
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/91346
4
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
5
reference_url https://github.com/jenkinsci/jenkins/commit/ad38d8480f20ce3cbf8fec3e2003bc83efda4f7d
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/ad38d8480f20ce3cbf8fec3e2003bc83efda4f7d
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-2059
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-2059
7
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1067801
reference_id 1067801
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1067801
9
reference_url https://github.com/advisories/GHSA-v759-3fh9-84mx
reference_id GHSA-v759-3fh9-84mx
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-v759-3fh9-84mx
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
1
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
aliases CVE-2014-2059, GHSA-v759-3fh9-84mx
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hvd6-bj7t-q7fj
8
url VCID-u21t-wbdr-auez
vulnerability_id VCID-u21t-wbdr-auez
summary The input control in PasswordParameterDefinition in Jenkins before 1.551 and LTS before 1.532.2 allows remote attackers to obtain passwords by reading the HTML source code, related to the default value.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2061.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2061.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2061
reference_id
reference_type
scores
0
value 0.00284
scoring_system epss
scoring_elements 0.51768
published_at 2026-04-24T12:55:00Z
1
value 0.00284
scoring_system epss
scoring_elements 0.51774
published_at 2026-04-09T12:55:00Z
2
value 0.00284
scoring_system epss
scoring_elements 0.51824
published_at 2026-04-11T12:55:00Z
3
value 0.00284
scoring_system epss
scoring_elements 0.51803
published_at 2026-04-12T12:55:00Z
4
value 0.00284
scoring_system epss
scoring_elements 0.51788
published_at 2026-04-13T12:55:00Z
5
value 0.00284
scoring_system epss
scoring_elements 0.5183
published_at 2026-04-16T12:55:00Z
6
value 0.00284
scoring_system epss
scoring_elements 0.51837
published_at 2026-04-18T12:55:00Z
7
value 0.00284
scoring_system epss
scoring_elements 0.51818
published_at 2026-04-21T12:55:00Z
8
value 0.00284
scoring_system epss
scoring_elements 0.51686
published_at 2026-04-01T12:55:00Z
9
value 0.00284
scoring_system epss
scoring_elements 0.51736
published_at 2026-04-02T12:55:00Z
10
value 0.00284
scoring_system epss
scoring_elements 0.51762
published_at 2026-04-04T12:55:00Z
11
value 0.00284
scoring_system epss
scoring_elements 0.51723
published_at 2026-04-07T12:55:00Z
12
value 0.00284
scoring_system epss
scoring_elements 0.51778
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2061
2
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
3
reference_url https://github.com/jenkinsci/jenkins/commit/bf539198564a1108b7b71a973bf7de963a6213ef
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/bf539198564a1108b7b71a973bf7de963a6213ef
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-2061
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-2061
5
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
6
reference_url http://www.openwall.com/lists/oss-security/2014/02/21/2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/02/21/2
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1067808
reference_id 1067808
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1067808
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
10
reference_url https://github.com/advisories/GHSA-rxfv-gm5x-9wqj
reference_id GHSA-rxfv-gm5x-9wqj
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rxfv-gm5x-9wqj
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
1
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
aliases CVE-2014-2061, GHSA-rxfv-gm5x-9wqj
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u21t-wbdr-auez
9
url VCID-u321-xdwe-gfdp
vulnerability_id VCID-u321-xdwe-gfdp
summary
Jenkins allows Remote Attackers to Hijack Sessions
The Winstone servlet container in Jenkins before 1.551 and LTS before 1.532.2 allows remote attackers to hijack sessions via unspecified vectors.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2060.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2060.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2060
reference_id
reference_type
scores
0
value 0.00145
scoring_system epss
scoring_elements 0.34945
published_at 2026-04-04T12:55:00Z
1
value 0.00145
scoring_system epss
scoring_elements 0.34582
published_at 2026-04-24T12:55:00Z
2
value 0.00145
scoring_system epss
scoring_elements 0.34818
published_at 2026-04-21T12:55:00Z
3
value 0.00145
scoring_system epss
scoring_elements 0.34879
published_at 2026-04-16T12:55:00Z
4
value 0.00145
scoring_system epss
scoring_elements 0.3484
published_at 2026-04-13T12:55:00Z
5
value 0.00145
scoring_system epss
scoring_elements 0.34863
published_at 2026-04-18T12:55:00Z
6
value 0.00145
scoring_system epss
scoring_elements 0.349
published_at 2026-04-11T12:55:00Z
7
value 0.00145
scoring_system epss
scoring_elements 0.34896
published_at 2026-04-09T12:55:00Z
8
value 0.00145
scoring_system epss
scoring_elements 0.34711
published_at 2026-04-01T12:55:00Z
9
value 0.00145
scoring_system epss
scoring_elements 0.34869
published_at 2026-04-08T12:55:00Z
10
value 0.00145
scoring_system epss
scoring_elements 0.34918
published_at 2026-04-02T12:55:00Z
11
value 0.00145
scoring_system epss
scoring_elements 0.34824
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2060
2
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-2060
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-2060
4
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
5
reference_url http://www.openwall.com/lists/oss-security/2014/02/21/2
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/02/21/2
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1067806
reference_id 1067806
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1067806
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
9
reference_url https://github.com/advisories/GHSA-9c26-cf8c-mw43
reference_id GHSA-9c26-cf8c-mw43
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9c26-cf8c-mw43
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
1
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
aliases CVE-2014-2060, GHSA-9c26-cf8c-mw43
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u321-xdwe-gfdp
10
url VCID-w6we-64uv-d3h7
vulnerability_id VCID-w6we-64uv-d3h7
summary The doIndex function in hudson/util/RemotingDiagnostics.java in CloudBees Jenkins before 1.551 and LTS before 1.532.2 allows remote authenticated users with the ADMINISTER permission to obtain sensitive information via vectors related to heapDump.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2068.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2068.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2068
reference_id
reference_type
scores
0
value 0.00085
scoring_system epss
scoring_elements 0.24553
published_at 2026-04-24T12:55:00Z
1
value 0.00085
scoring_system epss
scoring_elements 0.24715
published_at 2026-04-09T12:55:00Z
2
value 0.00085
scoring_system epss
scoring_elements 0.24728
published_at 2026-04-11T12:55:00Z
3
value 0.00085
scoring_system epss
scoring_elements 0.24687
published_at 2026-04-12T12:55:00Z
4
value 0.00085
scoring_system epss
scoring_elements 0.2463
published_at 2026-04-13T12:55:00Z
5
value 0.00085
scoring_system epss
scoring_elements 0.24643
published_at 2026-04-16T12:55:00Z
6
value 0.00085
scoring_system epss
scoring_elements 0.24633
published_at 2026-04-18T12:55:00Z
7
value 0.00085
scoring_system epss
scoring_elements 0.2461
published_at 2026-04-21T12:55:00Z
8
value 0.00085
scoring_system epss
scoring_elements 0.24708
published_at 2026-04-01T12:55:00Z
9
value 0.00085
scoring_system epss
scoring_elements 0.24786
published_at 2026-04-02T12:55:00Z
10
value 0.00085
scoring_system epss
scoring_elements 0.24824
published_at 2026-04-04T12:55:00Z
11
value 0.00085
scoring_system epss
scoring_elements 0.24598
published_at 2026-04-07T12:55:00Z
12
value 0.00085
scoring_system epss
scoring_elements 0.24667
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2068
2
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
3
reference_url https://github.com/jenkinsci/jenkins/commit/0530a6645aac10fec005614211660e98db44b5eb
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/0530a6645aac10fec005614211660e98db44b5eb
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-2068
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-2068
5
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14
6
reference_url http://www.openwall.com/lists/oss-security/2014/02/21/2
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/02/21/2
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1067835
reference_id 1067835
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1067835
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
10
reference_url https://github.com/advisories/GHSA-pv88-j6rg-r56p
reference_id GHSA-pv88-j6rg-r56p
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-pv88-j6rg-r56p
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2
1
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.551
aliases CVE-2014-2068, GHSA-pv88-j6rg-r56p
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w6we-64uv-d3h7
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.532.2