Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.jenkins-ci.main/jenkins-core@1.596.2
Typemaven
Namespaceorg.jenkins-ci.main
Namejenkins-core
Version1.596.2
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.625
Latest_non_vulnerable_version2.555
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-9bjm-e9zm-dqck
vulnerability_id VCID-9bjm-e9zm-dqck
summary
Jenkins allows for Privilege Escalation by Remote Authenticated Users
The API token-issuing service in Jenkins before 1.606 and LTS before 1.596.2 allows remote attackers to gain privileges via a "forced API token change" involving anonymous users.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2015-1844.html
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2015-1844.html
1
reference_url https://access.redhat.com/errata/RHSA-2016:0070
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:0070
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1814.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1814.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-1814
reference_id
reference_type
scores
0
value 0.00239
scoring_system epss
scoring_elements 0.47063
published_at 2026-04-11T12:55:00Z
1
value 0.00239
scoring_system epss
scoring_elements 0.46988
published_at 2026-04-07T12:55:00Z
2
value 0.00239
scoring_system epss
scoring_elements 0.47094
published_at 2026-04-18T12:55:00Z
3
value 0.00239
scoring_system epss
scoring_elements 0.47099
published_at 2026-04-16T12:55:00Z
4
value 0.00239
scoring_system epss
scoring_elements 0.47037
published_at 2026-04-12T12:55:00Z
5
value 0.00239
scoring_system epss
scoring_elements 0.47043
published_at 2026-04-21T12:55:00Z
6
value 0.00239
scoring_system epss
scoring_elements 0.46985
published_at 2026-04-01T12:55:00Z
7
value 0.00239
scoring_system epss
scoring_elements 0.47022
published_at 2026-04-02T12:55:00Z
8
value 0.00239
scoring_system epss
scoring_elements 0.4704
published_at 2026-04-04T12:55:00Z
9
value 0.00239
scoring_system epss
scoring_elements 0.47039
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-1814
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1205616
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1205616
5
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
6
reference_url https://github.com/jenkinsci/jenkins/commit/57e78880cc035874bda916ef4d8d7fd7642af9db
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/57e78880cc035874bda916ef4d8d7fd7642af9db
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-1814
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2015-1814
8
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-03-23
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-03-23
9
reference_url https://github.com/advisories/GHSA-3269-jqp5-v8c9
reference_id GHSA-3269-jqp5-v8c9
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3269-jqp5-v8c9
10
reference_url https://access.redhat.com/errata/RHSA-2015:1844
reference_id RHSA-2015:1844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1844
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.596.2
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.596.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.596.2
1
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.606
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.606
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5jqb-k5g9-6bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.606
aliases CVE-2015-1814, GHSA-3269-jqp5-v8c9
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9bjm-e9zm-dqck
1
url VCID-d967-j6gn-j7cq
vulnerability_id VCID-d967-j6gn-j7cq
summary
Jenkins Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in Jenkins before 1.606 and LTS before 1.596.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2015-1813.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2015-1844.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2015-1844.html
1
reference_url https://access.redhat.com/errata/RHSA-2016:0070
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:0070
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1812.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1812.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-1812
reference_id
reference_type
scores
0
value 0.00215
scoring_system epss
scoring_elements 0.44054
published_at 2026-04-18T12:55:00Z
1
value 0.00215
scoring_system epss
scoring_elements 0.44064
published_at 2026-04-16T12:55:00Z
2
value 0.00215
scoring_system epss
scoring_elements 0.44002
published_at 2026-04-13T12:55:00Z
3
value 0.00215
scoring_system epss
scoring_elements 0.44018
published_at 2026-04-12T12:55:00Z
4
value 0.00215
scoring_system epss
scoring_elements 0.44033
published_at 2026-04-08T12:55:00Z
5
value 0.00215
scoring_system epss
scoring_elements 0.43989
published_at 2026-04-21T12:55:00Z
6
value 0.00215
scoring_system epss
scoring_elements 0.44035
published_at 2026-04-09T12:55:00Z
7
value 0.00215
scoring_system epss
scoring_elements 0.4398
published_at 2026-04-01T12:55:00Z
8
value 0.00215
scoring_system epss
scoring_elements 0.44029
published_at 2026-04-02T12:55:00Z
9
value 0.00215
scoring_system epss
scoring_elements 0.44051
published_at 2026-04-11T12:55:00Z
10
value 0.00215
scoring_system epss
scoring_elements 0.44052
published_at 2026-04-04T12:55:00Z
11
value 0.00215
scoring_system epss
scoring_elements 0.43982
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-1812
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1205615
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1205615
5
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
6
reference_url https://github.com/jenkinsci/jenkins/commit/f58ba6e72f978e2f73299e38a1b54ff70fc73fd8
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/f58ba6e72f978e2f73299e38a1b54ff70fc73fd8
7
reference_url https://github.com/jenkinsci/jenkins/commit/f880d8d2cd9d46987ee3630fa04f77b17784f4e8
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/f880d8d2cd9d46987ee3630fa04f77b17784f4e8
8
reference_url https://github.com/jenkinsci/jenkins/commit/feb2703adb0c121705e5c8e9ddf8f663b6481cbd
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/feb2703adb0c121705e5c8e9ddf8f663b6481cbd
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-1812
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2015-1812
10
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-03-23
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-03-23
11
reference_url https://github.com/advisories/GHSA-w5v7-q2j4-fvpf
reference_id GHSA-w5v7-q2j4-fvpf
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-w5v7-q2j4-fvpf
12
reference_url https://access.redhat.com/errata/RHSA-2015:1844
reference_id RHSA-2015:1844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1844
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.596.2
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.596.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.596.2
1
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.606
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.606
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5jqb-k5g9-6bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.606
aliases CVE-2015-1812, GHSA-w5v7-q2j4-fvpf
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d967-j6gn-j7cq
2
url VCID-wu44-bxb4-2uf1
vulnerability_id VCID-wu44-bxb4-2uf1
summary
Jenkins allows Cross-Site Scripting (XSS)
Cross-site scripting (XSS) vulnerability in Jenkins before 1.606 and LTS before 1.596.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2015-1812.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2015-1844.html
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2015-1844.html
1
reference_url https://access.redhat.com/errata/RHSA-2016:0070
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:0070
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1813.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1813.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-1813
reference_id
reference_type
scores
0
value 0.00215
scoring_system epss
scoring_elements 0.43989
published_at 2026-04-21T12:55:00Z
1
value 0.00215
scoring_system epss
scoring_elements 0.4398
published_at 2026-04-01T12:55:00Z
2
value 0.00215
scoring_system epss
scoring_elements 0.44029
published_at 2026-04-02T12:55:00Z
3
value 0.00215
scoring_system epss
scoring_elements 0.44052
published_at 2026-04-04T12:55:00Z
4
value 0.00215
scoring_system epss
scoring_elements 0.43982
published_at 2026-04-07T12:55:00Z
5
value 0.00215
scoring_system epss
scoring_elements 0.44033
published_at 2026-04-08T12:55:00Z
6
value 0.00215
scoring_system epss
scoring_elements 0.44035
published_at 2026-04-09T12:55:00Z
7
value 0.00215
scoring_system epss
scoring_elements 0.44051
published_at 2026-04-11T12:55:00Z
8
value 0.00215
scoring_system epss
scoring_elements 0.44018
published_at 2026-04-12T12:55:00Z
9
value 0.00215
scoring_system epss
scoring_elements 0.44002
published_at 2026-04-13T12:55:00Z
10
value 0.00215
scoring_system epss
scoring_elements 0.44064
published_at 2026-04-16T12:55:00Z
11
value 0.00215
scoring_system epss
scoring_elements 0.44054
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-1813
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1205615
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1205615
5
reference_url https://github.com/jenkinsci/jenkins
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins
6
reference_url https://github.com/jenkinsci/jenkins/commit/feb2703adb0c121705e5c8e9ddf8f663b6481cbd
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/feb2703adb0c121705e5c8e9ddf8f663b6481cbd
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-1813
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2015-1813
8
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-03-23
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-03-23
9
reference_url https://github.com/advisories/GHSA-9h85-v6xf-h26q
reference_id GHSA-9h85-v6xf-h26q
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9h85-v6xf-h26q
10
reference_url https://access.redhat.com/errata/RHSA-2015:1844
reference_id RHSA-2015:1844
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1844
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.596.2
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.596.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.596.2
1
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.606
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.606
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5jqb-k5g9-6bb4
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.606
aliases CVE-2015-1813, GHSA-9h85-v6xf-h26q
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wu44-bxb4-2uf1
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.596.2