| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-432r-ukuw-4bgt |
| vulnerability_id |
VCID-432r-ukuw-4bgt |
| summary |
Incorrect Authorization
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier creates a temporary file in the default temporary directory with the default permissions for newly created files when uploading a file parameter through the CLI, potentially allowing attackers with access to the Jenkins controller file system to read and write the file before it is used. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-27903 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.20524 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.20622 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.206 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.20766 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.20486 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.20563 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.20642 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.20529 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.20532 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.20706 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.20547 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-27903 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-27903, GHSA-584m-7r4m-8j6v
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-432r-ukuw-4bgt |
|
| 1 |
| url |
VCID-6925-fwf4-f7df |
| vulnerability_id |
VCID-6925-fwf4-f7df |
| summary |
Generation of Error Message Containing Sensitive Information
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier prints an error stack trace on agent-related pages when agent connections are broken, potentially revealing information about Jenkins configuration that is otherwise inaccessible to attackers. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-27904 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00495 |
| scoring_system |
epss |
| scoring_elements |
0.65795 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00495 |
| scoring_system |
epss |
| scoring_elements |
0.65783 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00495 |
| scoring_system |
epss |
| scoring_elements |
0.6579 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00495 |
| scoring_system |
epss |
| scoring_elements |
0.65753 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00495 |
| scoring_system |
epss |
| scoring_elements |
0.65719 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00495 |
| scoring_system |
epss |
| scoring_elements |
0.65772 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00495 |
| scoring_system |
epss |
| scoring_elements |
0.65804 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00495 |
| scoring_system |
epss |
| scoring_elements |
0.65809 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00495 |
| scoring_system |
epss |
| scoring_elements |
0.65794 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00495 |
| scoring_system |
epss |
| scoring_elements |
0.65723 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00495 |
| scoring_system |
epss |
| scoring_elements |
0.6576 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-27904 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-27904, GHSA-rrgp-c2w8-6vg6
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6925-fwf4-f7df |
|
| 2 |
| url |
VCID-9442-1vwr-5fbt |
| vulnerability_id |
VCID-9442-1vwr-5fbt |
| summary |
XStream can cause Denial of Service via stack overflow
### Impact
The vulnerability may allow a remote attacker to terminate the application with a stack overflow error resulting in a denial of service only by manipulating the processed input stream.
### Patches
XStream 1.4.20 handles the stack overflow and raises an InputManipulationException instead.
### Workarounds
The attack uses the hash code implementation for collections and maps to force recursive hash calculation causing a stack overflow. Following types of the Java runtime are affected:
- java.util.HashMap
- java.util.HashSet
- java.util.Hashtable
- java.util.LinkedHashMap
- java.util.LinkedHashSet
- Other third party collection implementations that use their element's hash code may also be affected
A simple solution is to catch the StackOverflowError in the client code calling XStream.
If your object graph does not use referenced elements at all, you may simply set the NO_REFERENCE mode:
```Java
XStream xstream = new XStream();
xstream.setMode(XStream.NO_REFERENCES);
```
If your object graph contains neither a Hashtable, HashMap nor a HashSet (or one of the linked variants of it) then you can use the security framework to deny the usage of these types:
```Java
XStream xstream = new XStream();
xstream.denyTypes(new Class[]{
java.util.HashMap.class, java.util.HashSet.class, java.util.Hashtable.class, java.util.LinkedHashMap.class, java.util.LinkedHashSet.class
});
```
Unfortunately these types are very common. If you only use HashMap or HashSet and your XML refers these only as default map or set, you may additionally change the default implementation of java.util.Map and java.util.Set at unmarshalling time::
```Java
xstream.addDefaultImplementation(java.util.TreeMap.class, java.util.Map.class);
xstream.addDefaultImplementation(java.util.TreeSet.class, java.util.Set.class);
```
However, this implies that your application does not care about the implementation of the map and all elements are comparable.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2022-41966](https://x-stream.github.io/CVE-2022-41966.html).
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-41966 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02376 |
| scoring_system |
epss |
| scoring_elements |
0.84993 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.02376 |
| scoring_system |
epss |
| scoring_elements |
0.84911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02376 |
| scoring_system |
epss |
| scoring_elements |
0.84929 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02376 |
| scoring_system |
epss |
| scoring_elements |
0.84934 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02376 |
| scoring_system |
epss |
| scoring_elements |
0.84957 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02376 |
| scoring_system |
epss |
| scoring_elements |
0.84963 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02376 |
| scoring_system |
epss |
| scoring_elements |
0.84979 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02376 |
| scoring_system |
epss |
| scoring_elements |
0.84978 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02376 |
| scoring_system |
epss |
| scoring_elements |
0.84973 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02376 |
| scoring_system |
epss |
| scoring_elements |
0.84994 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.02376 |
| scoring_system |
epss |
| scoring_elements |
0.84996 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-41966 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-41966, GHSA-j563-grx4-pjpv
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9442-1vwr-5fbt |
|
| 3 |
| url |
VCID-afh4-nhxq-y3he |
| vulnerability_id |
VCID-afh4-nhxq-y3he |
| summary |
Spring Framework is vulnerable to security bypass via mvcRequestMatcher pattern mismatch
Spring Framework running version 6.0.0 - 6.0.6 or 5.3.0 - 5.3.25 using "**" as a pattern in Spring Security configuration with the mvcRequestMatcher creates a mismatch in pattern matching between Spring Security and Spring MVC, and the potential for a security bypass. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-20860 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.56284 |
| scoring_system |
epss |
| scoring_elements |
0.98118 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.56284 |
| scoring_system |
epss |
| scoring_elements |
0.98099 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.56284 |
| scoring_system |
epss |
| scoring_elements |
0.98103 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.56284 |
| scoring_system |
epss |
| scoring_elements |
0.98108 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.56284 |
| scoring_system |
epss |
| scoring_elements |
0.98113 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.56284 |
| scoring_system |
epss |
| scoring_elements |
0.98114 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.56284 |
| scoring_system |
epss |
| scoring_elements |
0.9812 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.56284 |
| scoring_system |
epss |
| scoring_elements |
0.98122 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-20860 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://spring.io/security/cve-2023-20860 |
| reference_id |
CVE-2023-20860 |
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
9.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
|
| 2 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-19T19:05:19Z/ |
|
|
| url |
https://spring.io/security/cve-2023-20860 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-20860, GHSA-7phw-cxx7-q9vq
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-afh4-nhxq-y3he |
|
| 4 |
| url |
VCID-betz-7kth-p3cr |
| vulnerability_id |
VCID-betz-7kth-p3cr |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Jenkins 2.270 through 2.393 (both inclusive), LTS 2.277.1 through 2.375.3 (both inclusive) does not escape the Jenkins version a plugin depends on when rendering the error message stating its incompatibility with the current version of Jenkins, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide plugins to the configured update sites and have this message shown by Jenkins instances. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-27898 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02778 |
| scoring_system |
epss |
| scoring_elements |
0.86072 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.02778 |
| scoring_system |
epss |
| scoring_elements |
0.86064 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.02778 |
| scoring_system |
epss |
| scoring_elements |
0.86021 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.02778 |
| scoring_system |
epss |
| scoring_elements |
0.86041 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.02778 |
| scoring_system |
epss |
| scoring_elements |
0.8605 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.02778 |
| scoring_system |
epss |
| scoring_elements |
0.8608 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.02778 |
| scoring_system |
epss |
| scoring_elements |
0.86075 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.02778 |
| scoring_system |
epss |
| scoring_elements |
0.86005 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.02778 |
| scoring_system |
epss |
| scoring_elements |
0.86057 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02778 |
| scoring_system |
epss |
| scoring_elements |
0.86062 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.02778 |
| scoring_system |
epss |
| scoring_elements |
0.86022 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-27898 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-27898, GHSA-j664-qhh4-hpf8
|
| risk_score |
4.3 |
| exploitability |
0.5 |
| weighted_severity |
8.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-betz-7kth-p3cr |
|
| 5 |
| url |
VCID-cden-3spy-pyhz |
| vulnerability_id |
VCID-cden-3spy-pyhz |
| summary |
Integer overflow in BCrypt class in Spring Security
Spring Security versions 5.5.x prior to 5.5.7, 5.6.x prior to 5.6.4, and earlier unsupported versions contain an integer overflow vulnerability. When using the BCrypt class with the maximum work factor (31), the encoder does not perform any salt rounds, due to an integer overflow error. The default settings are not affected by this CVE. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-22976 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58196 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58221 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58218 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58186 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58207 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.5823 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58213 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.5821 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58156 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58182 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.0036 |
| scoring_system |
epss |
| scoring_elements |
0.58161 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-22976 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-22976, GHSA-wx54-3278-m5g4
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cden-3spy-pyhz |
|
| 6 |
| url |
VCID-dvyn-8phs-a3a6 |
| vulnerability_id |
VCID-dvyn-8phs-a3a6 |
| summary |
Jetty vulnerable to Invalid HTTP/2 requests that can lead to denial of service
### Description
Invalid HTTP/2 requests (for example, invalid URIs) are incorrectly handled by writing a blocking error response directly from the selector thread.
If the client manages to exhaust the HTTP/2 flow control window, or TCP congest the connection, the selector thread will be blocked trying to write the error response.
If this is repeated for all the selector threads, the server becomes unresponsive, causing the denial of service.
### Impact
A malicious client may render the server unresponsive.
### Patches
The fix is available in Jetty versions 9.4.47. 10.0.10, 11.0.10.
### Workarounds
No workaround available within Jetty itself.
One possible workaround is to filter the requests before sending them to Jetty (for example in a proxy)
### For more information
If you have any questions or comments about this advisory:
* Email us at security@webtide.com. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-2048 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01287 |
| scoring_system |
epss |
| scoring_elements |
0.79667 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.01287 |
| scoring_system |
epss |
| scoring_elements |
0.79637 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.01287 |
| scoring_system |
epss |
| scoring_elements |
0.79644 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.01287 |
| scoring_system |
epss |
| scoring_elements |
0.7966 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.01287 |
| scoring_system |
epss |
| scoring_elements |
0.79639 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.01287 |
| scoring_system |
epss |
| scoring_elements |
0.79631 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01287 |
| scoring_system |
epss |
| scoring_elements |
0.79603 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.01287 |
| scoring_system |
epss |
| scoring_elements |
0.79616 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.01287 |
| scoring_system |
epss |
| scoring_elements |
0.79593 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.01288 |
| scoring_system |
epss |
| scoring_elements |
0.79677 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-2048 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-2048, GHSA-wgmr-mf83-7x4j
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dvyn-8phs-a3a6 |
|
| 7 |
| url |
VCID-wyec-gfgc-4yfw |
| vulnerability_id |
VCID-wyec-gfgc-4yfw |
| summary |
Incorrect Authorization
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier creates a temporary file in the default temporary directory with the default permissions for newly created files when uploading a plugin for installation, potentially allowing attackers with access to the Jenkins controller file system to read and write the file before it is used, potentially resulting in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-27899 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15284 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15454 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15376 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15516 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15316 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15404 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15416 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15232 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15228 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15447 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.1531 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-27899 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-27899, GHSA-hf9h-vv4m-2f33
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wyec-gfgc-4yfw |
|
|