Lookup for vulnerable packages by Package URL.
| Purl | pkg:rpm/redhat/jenkins-2-plugins@4.10.1685679861-1?arch=el8 |
| Type | rpm |
| Namespace | redhat |
| Name | jenkins-2-plugins |
| Version | 4.10.1685679861-1 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | null |
| Latest_non_vulnerable_version | null |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-bv8m-gtj8-d3eq |
| vulnerability_id |
VCID-bv8m-gtj8-d3eq |
| summary |
Cross-Site Request Forgery (CSRF)
A cross-site request forgery (CSRF) vulnerability in Jenkins Email Extension Plugin allows attackers to make another user stop watching an attacker-specified job. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-32980 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22152 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22302 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22358 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22352 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.2214 |
| published_at |
2026-04-26T12:55:00Z |
|
| 5 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22342 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.2704 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.27143 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.2718 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.26971 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.27085 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.27088 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.27044 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-32980 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-32980, GHSA-2f89-66v2-9p53
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bv8m-gtj8-d3eq |
|
| 1 |
| url |
VCID-v9jp-s75d-zffs |
| vulnerability_id |
VCID-v9jp-s75d-zffs |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Jenkins Pipeline: Job Plugin does not escape the display name of the build that caused an earlier build to be aborted, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to set build display names immediately. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-32977 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03706 |
| scoring_system |
epss |
| scoring_elements |
0.87998 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.03706 |
| scoring_system |
epss |
| scoring_elements |
0.87932 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.03706 |
| scoring_system |
epss |
| scoring_elements |
0.87952 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.03706 |
| scoring_system |
epss |
| scoring_elements |
0.87959 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.03706 |
| scoring_system |
epss |
| scoring_elements |
0.8797 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.03706 |
| scoring_system |
epss |
| scoring_elements |
0.87962 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.03706 |
| scoring_system |
epss |
| scoring_elements |
0.87961 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.03706 |
| scoring_system |
epss |
| scoring_elements |
0.87975 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.03706 |
| scoring_system |
epss |
| scoring_elements |
0.87974 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.03706 |
| scoring_system |
epss |
| scoring_elements |
0.87991 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.03706 |
| scoring_system |
epss |
| scoring_elements |
0.87915 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.03706 |
| scoring_system |
epss |
| scoring_elements |
0.87928 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-32977 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-32977, GHSA-2wvv-phhw-qvmc
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v9jp-s75d-zffs |
|
| 2 |
| url |
VCID-vjar-udts-v7cg |
| vulnerability_id |
VCID-vjar-udts-v7cg |
| summary |
Jenkins Email Extension Plugin missing permission check
Jenkins Email Extension Plugin does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of files in the email-templates/ directory in the Jenkins home directory on the controller file system. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-32979 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17635 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17726 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17677 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17686 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17612 |
| published_at |
2026-04-26T12:55:00Z |
|
| 5 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17731 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22269 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22356 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.224 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22185 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22323 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22343 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22302 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-32979 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-32979, GHSA-6gp4-2f92-j2w5
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vjar-udts-v7cg |
|
| 3 |
| url |
VCID-yph7-zq7p-j3hz |
| vulnerability_id |
VCID-yph7-zq7p-j3hz |
| summary |
Jenkins Pipeline Utility Steps Plugin arbitrary file write vulnerability
An arbitrary file write vulnerability in Jenkins Pipeline Utility Steps Plugin 2.15.2 and earlier allows attackers able to provide crafted archives as parameters to create or replace arbitrary files on the agent file system with attacker-specified content. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-32981 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01044 |
| scoring_system |
epss |
| scoring_elements |
0.77478 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.01044 |
| scoring_system |
epss |
| scoring_elements |
0.77497 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.01044 |
| scoring_system |
epss |
| scoring_elements |
0.77471 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.01044 |
| scoring_system |
epss |
| scoring_elements |
0.77462 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.01044 |
| scoring_system |
epss |
| scoring_elements |
0.77432 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01044 |
| scoring_system |
epss |
| scoring_elements |
0.77427 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.01044 |
| scoring_system |
epss |
| scoring_elements |
0.77452 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.02338 |
| scoring_system |
epss |
| scoring_elements |
0.8491 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.02338 |
| scoring_system |
epss |
| scoring_elements |
0.84854 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02338 |
| scoring_system |
epss |
| scoring_elements |
0.84876 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.02338 |
| scoring_system |
epss |
| scoring_elements |
0.84877 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.02338 |
| scoring_system |
epss |
| scoring_elements |
0.84874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.02338 |
| scoring_system |
epss |
| scoring_elements |
0.849 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-32981 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-32981, GHSA-6987-xccv-fhjp
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
7.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yph7-zq7p-j3hz |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 4.0 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins-2-plugins@4.10.1685679861-1%3Farch=el8 |