Lookup for vulnerable packages by Package URL.

GET /api/packages/97535?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/97535?format=api",
    "purl": "pkg:rpm/redhat/jenkins-2-plugins@4.10.1675144701-1?arch=el8",
    "type": "rpm",
    "namespace": "redhat",
    "name": "jenkins-2-plugins",
    "version": "4.10.1675144701-1",
    "qualifiers": {
        "arch": "el8"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/53636?format=api",
            "vulnerability_id": "VCID-13zs-2sn8-3yey",
            "summary": "Jenkins JUnit Plugin subject to Cross-site Scripting via URL conversion\nJUnit Plugin 1159.v0b_396e1e07dd and earlier converts HTTP(S) URLs in test report output to clickable links.\n\nThis is done in an unsafe manner, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nJUnit Plugin 1160.vf1f01a_a_ea_b_7f no longer converts URLs to clickable links.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45380.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45380.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-45380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83495",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8346",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83464",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8347",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83456",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83446",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01951",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83422",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83902",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83886",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-45380"
                },
                {
                    "reference_url": "https://github.com/jenkinsci/junit-plugin",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jenkinsci/junit-plugin"
                },
                {
                    "reference_url": "https://github.com/jenkinsci/junit-plugin/commit/f1f01aaeab7fa35017112f6163b89283390f5da8",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jenkinsci/junit-plugin/commit/f1f01aaeab7fa35017112f6163b89283390f5da8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45380"
                },
                {
                    "reference_url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2888",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-30T14:11:41Z/"
                        }
                    ],
                    "url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2888"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-30T14:11:41Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143086",
                    "reference_id": "2143086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143086"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-298r-5c48-7q2r",
                    "reference_id": "GHSA-298r-5c48-7q2r",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-298r-5c48-7q2r"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0560",
                    "reference_id": "RHSA-2023:0560",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0560"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0777",
                    "reference_id": "RHSA-2023:0777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0777"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-45380",
                "GHSA-298r-5c48-7q2r"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-13zs-2sn8-3yey"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51668?format=api",
            "vulnerability_id": "VCID-1tha-u7dt-tfc9",
            "summary": "Sandbox bypass vulnerability in Jenkins Pipeline: Deprecated Groovy Libraries Plugin\nPipeline: Groovy Libraries Plugin and older releases of the Pipeline: Deprecated Groovy Libraries Plugin (formerly Pipeline: Shared Groovy Libraries Plugin) define the l`ibrary` Pipeline step, which allows Pipeline authors to dynamically load Pipeline libraries. The return value of this step can be used to instantiate classes defined in the loaded library.\n\nIn Pipeline: Groovy Libraries Plugin 612.v84da_9c54906d and earlier and in Pipeline: Deprecated Groovy Libraries Plugin 583.vf3b_454e43966 and earlier, the `library` step can be used to invoke sandbox-generated synthetic constructors in crafted untrusted libraries and construct any subclassable type. This is similar to SECURITY-582 in the [2017-08-07 security advisory](https://www.jenkins.io/security/advisory/2017-08-07/#multiple-groovy-language-features-allowed-script-security-plugin-sandbox-bypass), but in a different plugin.\n\nThis vulnerability allows attackers with permission to define untrusted Pipeline libraries and to define and run sandboxed Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.\n\nPipeline: Groovy Libraries Plugin 613.v9c41a_160233f rejects improper calls to sandbox-generated synthetic constructors when using the `library` step.\n\nPipeline: Deprecated Groovy Libraries Plugin 588.v576c103a_ff86 no longer contains the `library` step. It has been moved into the Pipeline: Groovy Libraries Plugin.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43406.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43406.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-43406",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40168",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40152",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40178",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.401",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40165",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40175",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40137",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40118",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-43406"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43406",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43406"
                },
                {
                    "reference_url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(2)",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(2)"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/10/19/3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/10/19/3"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136370",
                    "reference_id": "2136370",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136370"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-7qw2-h9gj-hcvh",
                    "reference_id": "GHSA-7qw2-h9gj-hcvh",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-7qw2-h9gj-hcvh"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0560",
                    "reference_id": "RHSA-2023:0560",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0560"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0777",
                    "reference_id": "RHSA-2023:0777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0777"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:1064",
                    "reference_id": "RHSA-2023:1064",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:1064"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3198",
                    "reference_id": "RHSA-2023:3198",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3198"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-43406",
                "GHSA-7qw2-h9gj-hcvh"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "8.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1tha-u7dt-tfc9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52008?format=api",
            "vulnerability_id": "VCID-2zhb-qfhq-xkdp",
            "summary": "Sandbox bypass vulnerability in Jenkins Pipeline: Groovy Libraries Plugin and Pipeline: Deprecated Groovy Libraries Plugin\nPipeline: Groovy Libraries Plugin and older releases of the Pipeline: Deprecated Groovy Libraries Plugin (formerly Pipeline: Shared Groovy Libraries Plugin) define the l`ibrary` Pipeline step, which allows Pipeline authors to dynamically load Pipeline libraries. The return value of this step can be used to instantiate classes defined in the loaded library.\n\nIn Pipeline: Groovy Libraries Plugin 612.v84da_9c54906d and earlier and in Pipeline: Deprecated Groovy Libraries Plugin 583.vf3b_454e43966 and earlier, the `library` step can be used to invoke sandbox-generated synthetic constructors in crafted untrusted libraries and construct any subclassable type. This is similar to SECURITY-582 in the [2017-08-07 security advisory](https://www.jenkins.io/security/advisory/2017-08-07/#multiple-groovy-language-features-allowed-script-security-plugin-sandbox-bypass), but in a different plugin.\n\nThis vulnerability allows attackers with permission to define untrusted Pipeline libraries and to define and run sandboxed Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.\n\nPipeline: Groovy Libraries Plugin 613.v9c41a_160233f rejects improper calls to sandbox-generated synthetic constructors when using the `library` step.\n\nPipeline: Deprecated Groovy Libraries Plugin 588.v576c103a_ff86 no longer contains the `library` step. It has been moved into the Pipeline: Groovy Libraries Plugin.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43405.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43405.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-43405",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40168",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40152",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40178",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.401",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40165",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40175",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40137",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40118",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-43405"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43405",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43405"
                },
                {
                    "reference_url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(2)",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(2)"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/10/19/3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/10/19/3"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136374",
                    "reference_id": "2136374",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136374"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-4hjj-9gp7-4frg",
                    "reference_id": "GHSA-4hjj-9gp7-4frg",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-4hjj-9gp7-4frg"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0560",
                    "reference_id": "RHSA-2023:0560",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0560"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0777",
                    "reference_id": "RHSA-2023:0777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0777"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:1064",
                    "reference_id": "RHSA-2023:1064",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:1064"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3198",
                    "reference_id": "RHSA-2023:3198",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3198"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-43405",
                "GHSA-4hjj-9gp7-4frg"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "8.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2zhb-qfhq-xkdp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/15957?format=api",
            "vulnerability_id": "VCID-4qvq-xv22-xbed",
            "summary": "Missing Authorization\nJenkins Blue Ocean Plugin 1.25.3 and earlier does not perform a permission check in several HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified HTTP server.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30954.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30954.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-30954",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40224",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.402",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41826",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4174",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4179",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.418",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41823",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41777",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-30954"
                },
                {
                    "reference_url": "https://github.com/jenkinsci/blueocean-plugin",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jenkinsci/blueocean-plugin"
                },
                {
                    "reference_url": "https://github.com/jenkinsci/blueocean-plugin/commit/ffd89b675b172c86613459935fe220dc2bba0c57",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jenkinsci/blueocean-plugin/commit/ffd89b675b172c86613459935fe220dc2bba0c57"
                },
                {
                    "reference_url": "https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2502",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2502"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/05/17/8",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/05/17/8"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119647",
                    "reference_id": "2119647",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119647"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30954",
                    "reference_id": "CVE-2022-30954",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30954"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-5m4q-x28v-q6wp",
                    "reference_id": "GHSA-5m4q-x28v-q6wp",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-5m4q-x28v-q6wp"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0017",
                    "reference_id": "RHSA-2023:0017",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0017"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0560",
                    "reference_id": "RHSA-2023:0560",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0560"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0777",
                    "reference_id": "RHSA-2023:0777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0777"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3198",
                    "reference_id": "RHSA-2023:3198",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3198"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3610",
                    "reference_id": "RHSA-2023:3610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3622",
                    "reference_id": "RHSA-2023:3622",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3622"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-30954",
                "GHSA-5m4q-x28v-q6wp"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4qvq-xv22-xbed"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/53692?format=api",
            "vulnerability_id": "VCID-5jjh-qcnz-mye7",
            "summary": "Arbitrary file read vulnerability in Jenkins Pipeline Utility Steps Plugin\nPipeline Utility Steps Plugin implements a `readProperties` Pipeline step that supports interpolation of variables using the Apache Commons Configuration library.\n\nPipeline Utility Steps Plugin 2.13.1 and earlier does not restrict the set of enabled prefix interpolators and bundles versions of this library that enable the `file:` prefix interpolator by default.\n\nThis allows attackers able to configure Pipelines to read arbitrary files from the Jenkins controller file system.\n\nPipeline Utility Steps Plugin 2.13.2 restricts the set of prefix interpolators enabled by default to `base64Decoder:`, `base64Encoder:`, `date:`, `urlDecoder:`, and `urlEncoder:`.\n\nAdministrators can set the [Java system property](https://www.jenkins.io/doc/book/managing/system-properties/) `org.jenkinsci.plugins.pipeline.utility.steps.conf.ReadPropertiesStepExecution.CUSTOM_PREFIX_INTERPOLATOR_LOOKUPS` to customize which prefix interpolators are enabled.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45381.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45381.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-45381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50811",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50788",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50812",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50768",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50772",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50716",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52415",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52443",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-45381"
                },
                {
                    "reference_url": "https://github.com/jenkinsci/pipeline-utility-steps-plugin",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jenkinsci/pipeline-utility-steps-plugin"
                },
                {
                    "reference_url": "https://github.com/jenkinsci/pipeline-utility-steps-plugin/commit/01be8ac0045027128fc1e9cf3a8b0709d08291ea",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jenkinsci/pipeline-utility-steps-plugin/commit/01be8ac0045027128fc1e9cf3a8b0709d08291ea"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45381"
                },
                {
                    "reference_url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2949",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-30T14:10:21Z/"
                        }
                    ],
                    "url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2949"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-30T14:10:21Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143089",
                    "reference_id": "2143089",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143089"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-3g9q-cmgv-g4p6",
                    "reference_id": "GHSA-3g9q-cmgv-g4p6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-3g9q-cmgv-g4p6"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0560",
                    "reference_id": "RHSA-2023:0560",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0560"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0777",
                    "reference_id": "RHSA-2023:0777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0777"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-45381",
                "GHSA-3g9q-cmgv-g4p6"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5jjh-qcnz-mye7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51996?format=api",
            "vulnerability_id": "VCID-73th-g3mx-dqf1",
            "summary": "Stored XSS vulnerability in Jenkins Pipeline: Supporting APIs Plugin\nPipeline: Supporting APIs Plugin provides a feature to add hyperlinks, that send POST requests when clicked, to build logs. These links are used by Pipeline: Input Step Plugin to allow users to proceed or abort the build, or by Pipeline: Job Plugin to allow users to forcibly terminate the build after aborting it.\n\nPipeline: Supporting APIs Plugin 838.va_3a_087b_4055b and earlier does not sanitize or properly encode URLs of these hyperlinks in build logs.\n\nThis results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create Pipelines.\n\nPipeline: Supporting APIs Plugin 839.v35e2736cfd5c properly encodes URLs of these hyperlinks in build logs.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43409.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43409.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-43409",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04168",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88705",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04168",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88645",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04168",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88661",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04168",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88662",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04168",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8868",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04168",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88685",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04168",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88698",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04168",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88691",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-43409"
                },
                {
                    "reference_url": "https://github.com/jenkinsci/workflow-support-plugin",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jenkinsci/workflow-support-plugin"
                },
                {
                    "reference_url": "https://github.com/jenkinsci/workflow-support-plugin/commit/35e2736cfd5c56799eece176328906d92b6a0dd1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jenkinsci/workflow-support-plugin/commit/35e2736cfd5c56799eece176328906d92b6a0dd1"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43409",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43409"
                },
                {
                    "reference_url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T19:24:01Z/"
                        }
                    ],
                    "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2881"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/10/19/3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T19:24:01Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/10/19/3"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136391",
                    "reference_id": "2136391",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136391"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-64r9-x74q-wxmh",
                    "reference_id": "GHSA-64r9-x74q-wxmh",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-64r9-x74q-wxmh"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0560",
                    "reference_id": "RHSA-2023:0560",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0560"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0777",
                    "reference_id": "RHSA-2023:0777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0777"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:1064",
                    "reference_id": "RHSA-2023:1064",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:1064"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3198",
                    "reference_id": "RHSA-2023:3198",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3198"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-43409",
                "GHSA-64r9-x74q-wxmh"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-73th-g3mx-dqf1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/53688?format=api",
            "vulnerability_id": "VCID-892e-957y-4yc8",
            "summary": "Whole-script approval in Jenkins Script Security Plugin vulnerable to SHA-1 collisions\nScript Security Plugin 1189.vb_a_b_7c8fd5fde and earlier stores whole-script approvals as the [SHA-1 hash](https://en.wikipedia.org/wiki/SHA-1) of the approved script. SHA-1 no longer meets the security standards for producing a cryptographically secure message digest.\n\nScript Security Plugin 1190.v65867a_a_47126 uses SHA-512 for new whole-script approvals. Previously approved scripts will have their SHA-1 based whole-script approval replaced with a corresponding SHA-512 whole-script approval when the script is next used.\n\nWhole-script approval only stores the SHA-1 or SHA-512 hash, so it is not possible to migrate all previously approved scripts automatically on startup.\n\nAdministrators concerned about SHA-1 collision attacks on the whole-script approval feature are able to revoke all previous (SHA-1) script approvals on the In-Process Script Approval page.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45379.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45379.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-45379",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55099",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55036",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55085",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55097",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55078",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5506",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56729",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56708",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-45379"
                },
                {
                    "reference_url": "https://github.com/jenkinsci/script-security-plugin",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jenkinsci/script-security-plugin"
                },
                {
                    "reference_url": "https://github.com/jenkinsci/script-security-plugin/commit/65867aa471265a16198b92fb439782ba3554da66",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jenkinsci/script-security-plugin/commit/65867aa471265a16198b92fb439782ba3554da66"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45379",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45379"
                },
                {
                    "reference_url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2564",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2564"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143090",
                    "reference_id": "2143090",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143090"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-fv42-mx39-6fpw",
                    "reference_id": "GHSA-fv42-mx39-6fpw",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-fv42-mx39-6fpw"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0560",
                    "reference_id": "RHSA-2023:0560",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0560"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0777",
                    "reference_id": "RHSA-2023:0777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0777"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-45379",
                "GHSA-fv42-mx39-6fpw"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-892e-957y-4yc8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/53867?format=api",
            "vulnerability_id": "VCID-9h4k-xjx5-afc8",
            "summary": "Jenkins GitHub plugin uses weak webhook signature function\nJenkins GitHub Plugin 1.34.4 and earlier uses a non-constant time comparison function when checking whether the provided and computed webhook signatures are equal, allowing attackers to use statistical methods to obtain a valid webhook signature. GitHub Plugin 1.34.5 uses a constant-time comparison when validating the webhook signature.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36885.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36885.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36885",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56678",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56633",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56654",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56614",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56635",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56613",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56664",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5667",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36885"
                },
                {
                    "reference_url": "https://github.com/jenkinsci/github-plugin",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jenkinsci/github-plugin"
                },
                {
                    "reference_url": "https://github.com/jenkinsci/github-plugin/commit/11d1d79ebf85248dc43432389746c1ecc3452b6a",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jenkinsci/github-plugin/commit/11d1d79ebf85248dc43432389746c1ecc3452b6a"
                },
                {
                    "reference_url": "https://github.com/jenkinsci/github-plugin/releases/tag/v1.34.5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jenkinsci/github-plugin/releases/tag/v1.34.5"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36885",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36885"
                },
                {
                    "reference_url": "https://plugins.jenkins.io/github-issues",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://plugins.jenkins.io/github-issues"
                },
                {
                    "reference_url": "https://plugins.jenkins.io/github-issues/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://plugins.jenkins.io/github-issues/"
                },
                {
                    "reference_url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-1849",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-1849"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/07/27/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/07/27/1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119658",
                    "reference_id": "2119658",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119658"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-mxcc-7h5m-x57r",
                    "reference_id": "GHSA-mxcc-7h5m-x57r",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-mxcc-7h5m-x57r"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0017",
                    "reference_id": "RHSA-2023:0017",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0017"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0560",
                    "reference_id": "RHSA-2023:0560",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0560"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0777",
                    "reference_id": "RHSA-2023:0777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0777"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-36885",
                "GHSA-mxcc-7h5m-x57r"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9h4k-xjx5-afc8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52004?format=api",
            "vulnerability_id": "VCID-atqg-nfz6-zyfs",
            "summary": "CSRF protection for any URL can be bypassed in Jenkins Pipeline: Input Step Plugin\nPipeline: Input Step Plugin 451.vf1a_a_4f405289 and earlier does not restrict or sanitize the optionally specified ID of the `input` step. This ID is used for the URLs that process user interactions for the given `input` step (proceed or abort) and is not correctly encoded.\n\nThis allows attackers able to configure Pipelines to have Jenkins build URLs from `input` step IDs that would bypass the CSRF protection of any target URL in Jenkins when the `input` step is interacted with.\n\nPipeline: Input Step Plugin 456.vd8a_957db_5b_e9 limits the characters that can be used for the ID of `input` steps in Pipelines to alphanumeric characters and URL-safe punctuation. Pipelines with `input` steps having IDs with prohibited characters will fail with an error.\n\nThis includes Pipelines that have already been started but not finished before Jenkins is restarted to apply this update.\n\n[Pipeline: Declarative Plugin](https://plugins.jenkins.io/pipeline-model-definition/) provides an `input` directive that is internally using the `input` step, and specifies a non-default ID if not user-defined. Pipeline: Declarative Plugin 2.2114.v2654ca_721309 and earlier may specify values incompatible with this new restriction on legal values: `input` directives in a `stage` use the stage name (which may include prohibited characters) and `input` directives in a `matrix` will use a value generated from the matrix axis values (which always includes prohibited characters). Administrators are advised to update Pipeline: Input Step Plugin and Pipeline: Declarative Plugin at the same time, ideally while no Pipelines are running.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43407.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43407.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-43407",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04474",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04502",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0452",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04534",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04544",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04528",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04493",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04481",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04455",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-43407"
                },
                {
                    "reference_url": "https://github.com/jenkinsci/pipeline-input-step-plugin",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jenkinsci/pipeline-input-step-plugin"
                },
                {
                    "reference_url": "https://github.com/jenkinsci/pipeline-input-step-plugin/commit/d8a957db5be95ddfbf81f41a60b2f034000314b5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jenkinsci/pipeline-input-step-plugin/commit/d8a957db5be95ddfbf81f41a60b2f034000314b5"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43407",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43407"
                },
                {
                    "reference_url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2880",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T19:25:07Z/"
                        }
                    ],
                    "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2880"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/10/19/3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T19:25:07Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/10/19/3"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136386",
                    "reference_id": "2136386",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136386"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-g66m-fqxf-3w35",
                    "reference_id": "GHSA-g66m-fqxf-3w35",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-g66m-fqxf-3w35"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0560",
                    "reference_id": "RHSA-2023:0560",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0560"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0777",
                    "reference_id": "RHSA-2023:0777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0777"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:1064",
                    "reference_id": "RHSA-2023:1064",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:1064"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3198",
                    "reference_id": "RHSA-2023:3198",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3198"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-43407",
                "GHSA-g66m-fqxf-3w35"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-atqg-nfz6-zyfs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/53949?format=api",
            "vulnerability_id": "VCID-ca7m-fb38-kfe2",
            "summary": "Lack of authentication mechanism in Jenkins Git Plugin webhook\nGit Plugin provides a webhook endpoint at `/git/notifyCommit` that can be used to notify Jenkins of changes to an SCM repository. For its most basic functionality, this endpoint receives a repository URL, and Jenkins will schedule polling for all jobs configured with the specified repository. In Git Plugin 4.11.3 and earlier, this endpoint can be accessed with GET requests and without authentication. In addition to this basic functionality, the endpoint also accept a `sha1` parameter specifying a commit ID. If this parameter is specified, jobs configured with the specified repo will be triggered immediately, and the build will check out the specified commit. Additionally, the output of the webhook endpoint will provide information about which jobs were triggered or scheduled for polling, including jobs the user has no permission to access. This allows attackers with knowledge of Git repository URLs to trigger builds of jobs using a specified Git repository and to cause them to check out an attacker-specified commit, and to obtain information about the existence of jobs configured with this Git repository. Git Plugin 4.11.4 requires a `token` parameter which will act as an authentication for the webhook endpoint. While GET requests remain allowed, attackers would need to be able to provide a webhook token. For more information see [the plugin documentation](https://github.com/jenkinsci/git-plugin/#push-notification-from-repository).",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36883.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36883.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.78584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99041",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.78584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99031",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.78584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99034",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.78584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99036",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.78584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99037",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.78584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99038",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.78584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99039",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.78584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9904",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36883"
                },
                {
                    "reference_url": "https://github.com/jenkinsci/git-plugin",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jenkinsci/git-plugin"
                },
                {
                    "reference_url": "https://github.com/jenkinsci/git-plugin/commit/b46165c74a0bf15e08763de2e506005624d5d238",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jenkinsci/git-plugin/commit/b46165c74a0bf15e08763de2e506005624d5d238"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36883"
                },
                {
                    "reference_url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/07/27/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/07/27/1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119656",
                    "reference_id": "2119656",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119656"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-v878-67xw-grw2",
                    "reference_id": "GHSA-v878-67xw-grw2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-v878-67xw-grw2"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0017",
                    "reference_id": "RHSA-2023:0017",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0017"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0560",
                    "reference_id": "RHSA-2023:0560",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0560"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0777",
                    "reference_id": "RHSA-2023:0777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0777"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-36883",
                "GHSA-v878-67xw-grw2"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ca7m-fb38-kfe2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/15976?format=api",
            "vulnerability_id": "VCID-fzvq-dpvh-v7eu",
            "summary": "Cross-Site Request Forgery (CSRF)\nA cross-site request forgery (CSRF) vulnerability in Jenkins Script Security Plugin 1158.v7c1b_73a_69a_08 and earlier allows attackers to have Jenkins send an HTTP request to an attacker-specified webserver.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30946.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30946.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-30946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25607",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25762",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25804",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25575",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25647",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25693",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25703",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25662",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25605",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-30946"
                },
                {
                    "reference_url": "https://github.com/jenkinsci/script-security-plugin",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jenkinsci/script-security-plugin"
                },
                {
                    "reference_url": "https://github.com/jenkinsci/script-security-plugin/commit/35f6a0b8207ed3a32a85f27c1312da6cd738eeaa",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jenkinsci/script-security-plugin/commit/35f6a0b8207ed3a32a85f27c1312da6cd738eeaa"
                },
                {
                    "reference_url": "https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2116"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/05/17/8",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/05/17/8"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119643",
                    "reference_id": "2119643",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119643"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30946",
                    "reference_id": "CVE-2022-30946",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30946"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-qwgx-mrv5-87j8",
                    "reference_id": "GHSA-qwgx-mrv5-87j8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-qwgx-mrv5-87j8"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0017",
                    "reference_id": "RHSA-2023:0017",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0017"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0560",
                    "reference_id": "RHSA-2023:0560",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0560"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0777",
                    "reference_id": "RHSA-2023:0777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0777"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-30946",
                "GHSA-qwgx-mrv5-87j8"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fzvq-dpvh-v7eu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/53854?format=api",
            "vulnerability_id": "VCID-gxu6-51zm-sfh7",
            "summary": "Lack of authentication mechanism in Jenkins Git Plugin webhook\nGit Plugin provides a webhook endpoint at `/git/notifyCommit` that can be used to notify Jenkins of changes to an SCM repository. For its most basic functionality, this endpoint receives a repository URL, and Jenkins will schedule polling for all jobs configured with the specified repository. In Git Plugin 4.11.3 and earlier, this endpoint can be accessed with GET requests and without authentication.\n\nThis webhook endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.\n\nGit Plugin 4.11.4 requires a `token` parameter which will act as an authentication for the webhook endpoint. While GET requests remain allowed, attackers would need to be able to provide a webhook token. For more information see [the plugin documentation](https://github.com/jenkinsci/git-plugin/#push-notification-from-repository).",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36882.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36882.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51815",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51773",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51789",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5181",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5176",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51764",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51709",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51723",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51749",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36882"
                },
                {
                    "reference_url": "https://github.com/jenkinsci/git-plugin/commit/b46165c74a0bf15e08763de2e506005624d5d238",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jenkinsci/git-plugin/commit/b46165c74a0bf15e08763de2e506005624d5d238"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36882"
                },
                {
                    "reference_url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/07/27/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/07/27/1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2116840",
                    "reference_id": "2116840",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2116840"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-8xwj-2wgh-gprh",
                    "reference_id": "GHSA-8xwj-2wgh-gprh",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-8xwj-2wgh-gprh"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0017",
                    "reference_id": "RHSA-2023:0017",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0017"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0560",
                    "reference_id": "RHSA-2023:0560",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0560"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0777",
                    "reference_id": "RHSA-2023:0777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0777"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-36882",
                "GHSA-8xwj-2wgh-gprh"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gxu6-51zm-sfh7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/53284?format=api",
            "vulnerability_id": "VCID-mm3e-4pej-byed",
            "summary": "Uncontrolled Resource Consumption in snakeyaml\nThe package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25857.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-25857.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-25857",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00869",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7521",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00869",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75162",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00869",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75207",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00869",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75185",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00869",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75173",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00869",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75139",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00869",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75132",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-25857"
                },
                {
                    "reference_url": "https://bitbucket.org/snakeyaml/snakeyaml/commits/fc300780da21f4bb92c148bc90257201220cf174",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bitbucket.org/snakeyaml/snakeyaml/commits/fc300780da21f4bb92c148bc90257201220cf174"
                },
                {
                    "reference_url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/525",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/525"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25857",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25857"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/jruby/jruby/issues/7342",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jruby/jruby/issues/7342"
                },
                {
                    "reference_url": "https://github.com/snakeyaml/snakeyaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/snakeyaml/snakeyaml"
                },
                {
                    "reference_url": "https://github.com/snakeyaml/snakeyaml/commit/fc300780da21f4bb92c148bc90257201220cf174",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/snakeyaml/snakeyaml/commit/fc300780da21f4bb92c148bc90257201220cf174"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00001.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25857",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25857"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240315-0010",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240315-0010"
                },
                {
                    "reference_url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-2806360",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-2806360"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1019218",
                    "reference_id": "1019218",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1019218"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126789",
                    "reference_id": "2126789",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126789"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-3mc7-4q67-w48m",
                    "reference_id": "GHSA-3mc7-4q67-w48m",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-3mc7-4q67-w48m"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6757",
                    "reference_id": "RHSA-2022:6757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6757"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6820",
                    "reference_id": "RHSA-2022:6820",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6820"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6821",
                    "reference_id": "RHSA-2022:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6821"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6822",
                    "reference_id": "RHSA-2022:6822",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6822"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6823",
                    "reference_id": "RHSA-2022:6823",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6823"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6825",
                    "reference_id": "RHSA-2022:6825",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6825"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6835",
                    "reference_id": "RHSA-2022:6835",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6835"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6941",
                    "reference_id": "RHSA-2022:6941",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6941"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8524",
                    "reference_id": "RHSA-2022:8524",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8524"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8652",
                    "reference_id": "RHSA-2022:8652",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8652"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8876",
                    "reference_id": "RHSA-2022:8876",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8876"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0560",
                    "reference_id": "RHSA-2023:0560",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0560"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0777",
                    "reference_id": "RHSA-2023:0777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0777"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2097",
                    "reference_id": "RHSA-2023:2097",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2097"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2100",
                    "reference_id": "RHSA-2023:2100",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3198",
                    "reference_id": "RHSA-2023:3198",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3198"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3641",
                    "reference_id": "RHSA-2023:3641",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3641"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4983",
                    "reference_id": "RHSA-2023:4983",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4983"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6172",
                    "reference_id": "RHSA-2023:6172",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6172"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6179",
                    "reference_id": "RHSA-2023:6179",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6179"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7288",
                    "reference_id": "RHSA-2023:7288",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7288"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7697",
                    "reference_id": "RHSA-2023:7697",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7697"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0776",
                    "reference_id": "RHSA-2024:0776",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0776"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0777",
                    "reference_id": "RHSA-2024:0777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0777"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0778",
                    "reference_id": "RHSA-2024:0778",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0778"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:4437",
                    "reference_id": "RHSA-2025:4437",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:4437"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5944-1/",
                    "reference_id": "USN-5944-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5944-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-25857",
                "GHSA-3mc7-4q67-w48m"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mm3e-4pej-byed"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51787?format=api",
            "vulnerability_id": "VCID-n5vc-ggjg-kfc1",
            "summary": "Jenkins Script Security Plugin sandbox bypass vulnerability\nA sandbox bypass vulnerability involving casting an array-like value to an array type in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM. Script Security Plugin 1184.v85d16b_d851b_3 intercepts per-element casts when casting array-like values to array types.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43403.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43403.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-43403",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00283",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51734",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00283",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51693",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00283",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5171",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00283",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51732",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00283",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51683",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00283",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51687",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00283",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51632",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00283",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51647",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00283",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51672",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-43403"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43403",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43403"
                },
                {
                    "reference_url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)"
                },
                {
                    "reference_url": "https://www.secpod.com/blog/oracle-releases-critical-security-updates-january-2023-patch-now",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.secpod.com/blog/oracle-releases-critical-security-updates-january-2023-patch-now"
                },
                {
                    "reference_url": "https://www.secpod.com/blog/oracle-releases-critical-security-updates-january-2023-patch-now/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.secpod.com/blog/oracle-releases-critical-security-updates-january-2023-patch-now/"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/10/19/3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/10/19/3"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136382",
                    "reference_id": "2136382",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136382"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-f6mq-6fx5-w2ch",
                    "reference_id": "GHSA-f6mq-6fx5-w2ch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "CRITICAL",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-f6mq-6fx5-w2ch"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0560",
                    "reference_id": "RHSA-2023:0560",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0560"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0777",
                    "reference_id": "RHSA-2023:0777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0777"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:1064",
                    "reference_id": "RHSA-2023:1064",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:1064"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3198",
                    "reference_id": "RHSA-2023:3198",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3198"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-43403",
                "GHSA-f6mq-6fx5-w2ch"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n5vc-ggjg-kfc1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/53506?format=api",
            "vulnerability_id": "VCID-netd-rr9e-wbg5",
            "summary": "Unsafe deserialization in Apache MINA SSHD\nClass org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider in Apache MINA SSHD <= 2.9.1 uses Java deserialization to load a serialized java.security.PrivateKey. The class is one of several implementations that an implementor using Apache MINA SSHD can choose for loading the host keys of an SSH server.\n\nUntil version 2.1.0, the code affected by this vulnerability appeared in `org.apache.sshd:sshd-core`. Version 2.1.0 contains a [commit](https://github.com/apache/mina-sshd/commit/10de190e7d3f9189deb76b8d08c72334a1fe2df0) where the code was moved to the package `org.apache.sshd:sshd-common`, which did not exist until version 2.1.0.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45047.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45047.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-45047",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8982",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.05083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89815",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89806",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89813",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89785",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89802",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89809",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90075",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90064",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-45047"
                },
                {
                    "reference_url": "https://github.com/apache/mina-sshd",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/mina-sshd"
                },
                {
                    "reference_url": "https://github.com/apache/mina-sshd/commit/03238d51586f6b3c0bdbb1a23cf16799344d6c32",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/mina-sshd/commit/03238d51586f6b3c0bdbb1a23cf16799344d6c32"
                },
                {
                    "reference_url": "https://github.com/apache/mina-sshd/commit/10de190e7d3f9189deb76b8d08c72334a1fe2df0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/mina-sshd/commit/10de190e7d3f9189deb76b8d08c72334a1fe2df0"
                },
                {
                    "reference_url": "https://github.com/apache/mina-sshd/commit/5a8fe830b2a2308a2b24ac8115a391af477f64f5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/mina-sshd/commit/5a8fe830b2a2308a2b24ac8115a391af477f64f5"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45047",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45047"
                },
                {
                    "reference_url": "https://www.mail-archive.com/dev@mina.apache.org/msg39312.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mail-archive.com/dev@mina.apache.org/msg39312.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145194",
                    "reference_id": "2145194",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145194"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-fhw8-8j55-vwgq",
                    "reference_id": "GHSA-fhw8-8j55-vwgq",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "CRITICAL",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-fhw8-8j55-vwgq"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8957",
                    "reference_id": "RHSA-2022:8957",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8957"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0074",
                    "reference_id": "RHSA-2023:0074",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0074"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0552",
                    "reference_id": "RHSA-2023:0552",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0552"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0553",
                    "reference_id": "RHSA-2023:0553",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0553"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0554",
                    "reference_id": "RHSA-2023:0554",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0554"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0556",
                    "reference_id": "RHSA-2023:0556",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0556"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0560",
                    "reference_id": "RHSA-2023:0560",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0560"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0713",
                    "reference_id": "RHSA-2023:0713",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0713"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0758",
                    "reference_id": "RHSA-2023:0758",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0758"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0777",
                    "reference_id": "RHSA-2023:0777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0777"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:1064",
                    "reference_id": "RHSA-2023:1064",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:1064"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3198",
                    "reference_id": "RHSA-2023:3198",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3198"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3641",
                    "reference_id": "RHSA-2023:3641",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3641"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4983",
                    "reference_id": "RHSA-2023:4983",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4983"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:1746",
                    "reference_id": "RHSA-2025:1746",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:1746"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:1747",
                    "reference_id": "RHSA-2025:1747",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:1747"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-45047",
                "GHSA-fhw8-8j55-vwgq"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-netd-rr9e-wbg5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51812?format=api",
            "vulnerability_id": "VCID-pnge-tumu-v7e2",
            "summary": "Sandbox bypass vulnerabilities in Jenkins Script Security Plugin and in Pipeline: Groovy Plugin\nScript Security Plugin provides a sandbox feature that allows low privileged users to define scripts, including Pipelines, that are generally safe to execute. Calls to code defined inside a sandboxed script are intercepted, and various allowlists are checked to determine whether the call is to be allowed.\n\nMultiple sandbox bypass vulnerabilities exist in Script Security Plugin and Pipeline: Groovy Plugin:\n\n- In Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier and in Pipeline: Groovy Plugin 2802.v5ea_628154b_c2 and earlier, various casts performed implicitly by the Groovy language runtime were not intercepted by the sandbox. This includes casts performed when returning values from methods, when assigning local variables, fields, properties, and when defining default arguments for closure, constructor, and method parameters (CVE-2022-43401 in Script Security Plugin and CVE-2022-43402 in Pipeline: Groovy Plugin).\n- In Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier, when casting an array-like value to an array type, per-element casts to the component type of the array are not intercepted by the sandbox (CVE-2022-43403).\n- In Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier, crafted constructor bodies and calls to sandbox-generated synthetic constructors can be used to construct any subclassable type (due to an incomplete fix for SECURITY-1754 in the [2020-03-09 security advisory](https://www.jenkins.io/security/advisory/2020-03-09/#SECURITY-1754)) (CVE-2022-43404).\n\nThese vulnerabilities allow attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.\n\nThese vulnerabilities have been fixed:\n\n- Script Security Plugin 1184.v85d16b_d851b_3 and Pipeline: Groovy Plugin 2803.v1a_f77ffcc773 intercept Groovy casts performed implicitly by the Groovy language runtime (CVE-2022-43401 in Script Security Plugin and CVE-2022-43402 in Pipeline: Groovy Plugin).\n- Script Security Plugin 1184.v85d16b_d851b_3 intercepts per-element casts when casting array-like values to array types (CVE-2022-43403).\n- Script Security Plugin 1184.v85d16b_d851b_3 rejects improper calls to sandbox-generated synthetic constructors (CVE-2022-43404).\n\nBoth plugins, Script Security Plugin and Pipeline: Groovy Plugin must be updated simultaneously. While Script Security Plugin could be updated independently, doing so would cause errors in Pipeline: Groovy Plugin due to an incompatible API change.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43404.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43404.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-43404",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35487",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3555",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35432",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35478",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35503",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35513",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3547",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35447",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35525",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-43404"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43404",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43404"
                },
                {
                    "reference_url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/10/19/3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/10/19/3"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136383",
                    "reference_id": "2136383",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136383"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-27rf-8mjp-r363",
                    "reference_id": "GHSA-27rf-8mjp-r363",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-27rf-8mjp-r363"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0560",
                    "reference_id": "RHSA-2023:0560",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0560"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0777",
                    "reference_id": "RHSA-2023:0777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0777"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:1064",
                    "reference_id": "RHSA-2023:1064",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:1064"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3198",
                    "reference_id": "RHSA-2023:3198",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3198"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-43404",
                "GHSA-27rf-8mjp-r363"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "8.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pnge-tumu-v7e2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35815?format=api",
            "vulnerability_id": "VCID-pwtj-az3g-zka3",
            "summary": "Improper Authorization in Google OAuth Client\nPKCE support is not implemented in accordance with the RFC for OAuth 2.0 for Native Apps. Without the use of PKCE, the authorization code returned by an authorization server is not enough to guarantee that the client that issued the initial authorization request is the one that will be authorized. An attacker is able to obtain the authorization code using a malicious app on the client-side and use it to gain authorization to the protected resource. This affects the package com.google.oauth-client:google-oauth-client before 1.31.0.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7692.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7692.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-7692",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24465",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2445",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24508",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24552",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24536",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24493",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24424",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24649",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24612",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24494",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-7692"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7692",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7692"
                },
                {
                    "reference_url": "https://github.com/googleapis/google-oauth-java-client",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/googleapis/google-oauth-java-client"
                },
                {
                    "reference_url": "https://github.com/googleapis/google-oauth-java-client/commit/13433cd7dd06267fc261f0b1d4764f8e3432c824",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/googleapis/google-oauth-java-client/commit/13433cd7dd06267fc261f0b1d4764f8e3432c824"
                },
                {
                    "reference_url": "https://github.com/googleapis/google-oauth-java-client/issues/469",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/googleapis/google-oauth-java-client/issues/469"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r3db6ac73e0558d64f0b664f2fa4ef0a865e57c5de20f8321d3b48678@%3Ccommits.druid.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r3db6ac73e0558d64f0b664f2fa4ef0a865e57c5de20f8321d3b48678@%3Ccommits.druid.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/reae8909b264d1103f321b9ce1623c10c1ddc77dba9790247f2c0c90f@%3Ccommits.druid.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/reae8909b264d1103f321b9ce1623c10c1ddc77dba9790247f2c0c90f@%3Ccommits.druid.apache.org%3E"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7692",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7692"
                },
                {
                    "reference_url": "https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEOAUTHCLIENT-575276",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://snyk.io/vuln/SNYK-JAVA-COMGOOGLEOAUTHCLIENT-575276"
                },
                {
                    "reference_url": "https://tools.ietf.org/html/rfc7636%23section-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tools.ietf.org/html/rfc7636%23section-1"
                },
                {
                    "reference_url": "https://tools.ietf.org/html/rfc8252%23section-8.1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tools.ietf.org/html/rfc8252%23section-8.1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856376",
                    "reference_id": "1856376",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856376"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988944",
                    "reference_id": "988944",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988944"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-f263-c949-w85g",
                    "reference_id": "GHSA-f263-c949-w85g",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-f263-c949-w85g"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0560",
                    "reference_id": "RHSA-2023:0560",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0560"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0777",
                    "reference_id": "RHSA-2023:0777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0777"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3299",
                    "reference_id": "RHSA-2023:3299",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3299"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6172",
                    "reference_id": "RHSA-2023:6172",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6172"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0778",
                    "reference_id": "RHSA-2024:0778",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0778"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2020-7692",
                "GHSA-f263-c949-w85g"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pwtj-az3g-zka3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54737?format=api",
            "vulnerability_id": "VCID-rs56-6qvx-vucg",
            "summary": "Insufficiently Protected Credentials in Jenkins Pipeline SCM API for Blue Ocean Plugin\nWhen pipelines are created using the pipeline creation wizard in Blue Ocean, the credentials used are stored in the per-user credentials store of the user creating the pipeline. To allow pipelines to use this credential to scan repositories and checkout from SCM, the Blue Ocean Credentials Provider allows pipelines to access a specific credential from the per-user credentials store in Pipeline SCM API for Blue Ocean Plugin 1.25.3 and earlier.\n\nAs a result, attackers with Job/Configure permission can rewrite job configurations in a way that lets them access and capture any attacker-specified credential from any user’s private credentials store.\n\nPipeline SCM API for Blue Ocean Plugin 1.25.4 deprecates the Blue Ocean Credentials Provider and disables it by default. As a result, all jobs initially set up using the Blue Ocean pipeline creation wizard and configured to use the credential specified at that time will no longer be able to access the credential, resulting in failures to scan repositories, checkout from SCM, etc. unless the repository is public and can be accessed without credentials.\n\nThis also applies to newly created pipelines after Pipeline SCM API for Blue Ocean Plugin has been updated to 1.25.4.\n\nAdministrators should reconfigure affected pipelines to use a credential from the Jenkins credential store or a folder credential store. See [this help page on cloudbees.com](https://cloudbees.com/r/blue-ocean-credentials-removal) to learn more.\n\nTo re-enable the Blue Ocean Credentials Provider, set the Java system property `io.jenkins.blueocean.rest.impl.pipeline.credential.BlueOceanCredentialsProvider.enabled` to `true`. Doing so is discouraged, as that will restore the unsafe behavior.\n\nWhile Credentials Plugin provides the _Configure Credential Providers_ UI to enable or disable certain credentials providers, enabling the Blue Ocean Credentials Provider there is not enough in Pipeline SCM API for Blue Ocean Plugin 1.25.4. Both the UI and system property need to enable the Blue Ocean Credentials Provider.\n\nAdministrators not immediately able to update Blue Ocean are advised to disable the Blue Ocean Credentials Provider through the UI at _Manage Jenkins_ » _Configure Credential Providers_ and to reconfigure affected pipelines to use a credential from the Jenkins credential store or a folder credential store.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30952.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30952.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-30952",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52338",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5231",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59377",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59296",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59347",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59359",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59379",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59362",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59344",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-30952"
                },
                {
                    "reference_url": "https://github.com/jenkinsci/blueocean-plugin/commit/c4beeda0b574c297ac664511029feed0a15abaf1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jenkinsci/blueocean-plugin/commit/c4beeda0b574c297ac664511029feed0a15abaf1"
                },
                {
                    "reference_url": "https://github.com/jenkinsci/blueocean-plugin/tree/master/blueocean-pipeline-scm-api",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jenkinsci/blueocean-plugin/tree/master/blueocean-pipeline-scm-api"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30952",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30952"
                },
                {
                    "reference_url": "https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-714"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/05/17/8",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/05/17/8"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119645",
                    "reference_id": "2119645",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119645"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-g74w-93cp-5p3p",
                    "reference_id": "GHSA-g74w-93cp-5p3p",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-g74w-93cp-5p3p"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0017",
                    "reference_id": "RHSA-2023:0017",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0017"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0560",
                    "reference_id": "RHSA-2023:0560",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0560"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0777",
                    "reference_id": "RHSA-2023:0777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0777"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:1064",
                    "reference_id": "RHSA-2023:1064",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:1064"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-30952",
                "GHSA-g74w-93cp-5p3p"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rs56-6qvx-vucg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51755?format=api",
            "vulnerability_id": "VCID-rxtr-936k-h3cc",
            "summary": "Jenkins Pipeline: Stage View Plugin allows CSRF protection bypass of any target URL in Jenkins\nJenkins Pipeline: Stage View Plugin provides a visualization of Pipeline builds. It also allows users to interact with `input` steps from Pipeline: Input Step Plugin.\n\nPipeline: Stage View Plugin 2.26 and earlier does not correctly encode the ID of `input` steps when using it to generate URLs to proceed or abort Pipeline builds.\n\nThis allows attackers able to configure Pipelines to specify `input` step IDs resulting in URLs that would bypass the CSRF protection of any target URL in Jenkins.\n\nPipeline: Stage View Plugin 2.27 correctly encodes the ID of `input` steps when using it to generate URLs to proceed or abort Pipeline builds.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43408.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43408.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-43408",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03284",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03374",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03347",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03357",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03399",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03378",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03359",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03307",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03328",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-43408"
                },
                {
                    "reference_url": "https://github.com/jenkinsci/pipeline-stage-view-plugin/commit/cee275109ee748fa9f599ec60159807a28a2933f",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jenkinsci/pipeline-stage-view-plugin/commit/cee275109ee748fa9f599ec60159807a28a2933f"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43408",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43408"
                },
                {
                    "reference_url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2828",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T19:24:25Z/"
                        }
                    ],
                    "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2828"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/10/19/3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T19:24:25Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/10/19/3"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136388",
                    "reference_id": "2136388",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136388"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-g975-f26h-93g8",
                    "reference_id": "GHSA-g975-f26h-93g8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-g975-f26h-93g8"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0560",
                    "reference_id": "RHSA-2023:0560",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0560"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0777",
                    "reference_id": "RHSA-2023:0777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0777"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:1064",
                    "reference_id": "RHSA-2023:1064",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:1064"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3198",
                    "reference_id": "RHSA-2023:3198",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3198"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-43408",
                "GHSA-g975-f26h-93g8"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rxtr-936k-h3cc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51876?format=api",
            "vulnerability_id": "VCID-s839-rpta-6bej",
            "summary": "Jenkins Pipeline: Groovy Plugin allows sandbox protection bypass and arbitrary code execution\nA sandbox bypass vulnerability involving various casts performed implicitly by the Groovy language runtime in Jenkins Pipeline: Groovy Plugin 2802.v5ea_628154b_c2 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM. Pipeline: Groovy Plugin 2803.v1a_f77ffcc773 intercepts Groovy casts performed implicitly by the Groovy language runtime",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43402.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43402.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-43402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25609",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25805",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25576",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25648",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25695",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25705",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25664",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25607",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25763",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-43402"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43402"
                },
                {
                    "reference_url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/10/19/3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/10/19/3"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136379",
                    "reference_id": "2136379",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136379"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-mqc2-w9r8-mmxm",
                    "reference_id": "GHSA-mqc2-w9r8-mmxm",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "CRITICAL",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-mqc2-w9r8-mmxm"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0560",
                    "reference_id": "RHSA-2023:0560",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0560"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0777",
                    "reference_id": "RHSA-2023:0777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0777"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:1064",
                    "reference_id": "RHSA-2023:1064",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:1064"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3198",
                    "reference_id": "RHSA-2023:3198",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3198"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-43402",
                "GHSA-mqc2-w9r8-mmxm"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s839-rpta-6bej"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51687?format=api",
            "vulnerability_id": "VCID-tx8n-nmhx-gqg1",
            "summary": "Sandbox bypass vulnerabilities in Jenkins Script Security Plugin and in Pipeline: Groovy Plugin\nScript Security Plugin provides a sandbox feature that allows low privileged users to define scripts, including Pipelines, that are generally safe to execute. Calls to code defined inside a sandboxed script are intercepted, and various allowlists are checked to determine whether the call is to be allowed.\n\nMultiple sandbox bypass vulnerabilities exist in Script Security Plugin and Pipeline: Groovy Plugin:\n\n- In Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier and in Pipeline: Groovy Plugin 2802.v5ea_628154b_c2 and earlier, various casts performed implicitly by the Groovy language runtime were not intercepted by the sandbox. This includes casts performed when returning values from methods, when assigning local variables, fields, properties, and when defining default arguments for closure, constructor, and method parameters (CVE-2022-43401 in Script Security Plugin and CVE-2022-43402 in Pipeline: Groovy Plugin).\n- In Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier, when casting an array-like value to an array type, per-element casts to the component type of the array are not intercepted by the sandbox (CVE-2022-43403).\n- In Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier, crafted constructor bodies and calls to sandbox-generated synthetic constructors can be used to construct any subclassable type (due to an incomplete fix for SECURITY-1754 in the [2020-03-09 security advisory](https://www.jenkins.io/security/advisory/2020-03-09/#SECURITY-1754)) (CVE-2022-43404).\n\nThese vulnerabilities allow attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.\\n\\nThese vulnerabilities have been fixed:\n\n- Script Security Plugin 1184.v85d16b_d851b_3 and Pipeline: Groovy Plugin 2803.v1a_f77ffcc773 intercept Groovy casts performed implicitly by the Groovy language runtime (CVE-2022-43401 in Script Security Plugin and CVE-2022-43402 in Pipeline: Groovy Plugin).\n- Script Security Plugin 1184.v85d16b_d851b_3 intercepts per-element casts when casting array-like values to array types (CVE-2022-43403).\n- Script Security Plugin 1184.v85d16b_d851b_3 rejects improper calls to sandbox-generated synthetic constructors (CVE-2022-43404).\n\nBoth plugins, Script Security Plugin and Pipeline: Groovy Plugin must be updated simultaneously. While Script Security Plugin could be updated independently, doing so would cause errors in Pipeline: Groovy Plugin due to an incompatible API change.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43401.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43401.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-43401",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40168",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40152",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40178",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.401",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40165",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40175",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40137",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00184",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40118",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-43401"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43401",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43401"
                },
                {
                    "reference_url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/10/19/3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/10/19/3"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136381",
                    "reference_id": "2136381",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136381"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-7vr5-72w7-q6jc",
                    "reference_id": "GHSA-7vr5-72w7-q6jc",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-7vr5-72w7-q6jc"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0560",
                    "reference_id": "RHSA-2023:0560",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0560"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0777",
                    "reference_id": "RHSA-2023:0777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0777"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:1064",
                    "reference_id": "RHSA-2023:1064",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:1064"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3198",
                    "reference_id": "RHSA-2023:3198",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3198"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-43401",
                "GHSA-7vr5-72w7-q6jc"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "8.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tx8n-nmhx-gqg1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/53816?format=api",
            "vulnerability_id": "VCID-ubq1-gzr6-x3fu",
            "summary": "Lack of authentication mechanism in Jenkins Git Plugin webhook\nGit Plugin provides a webhook endpoint at `/git/notifyCommit` that can be used to notify Jenkins of changes to an SCM repository. For its most basic functionality, this endpoint receives a repository URL, and Jenkins will schedule polling for all jobs configured with the specified repository. In Git Plugin 4.11.3 and earlier, this endpoint can be accessed with GET requests and without authentication. In addition to this basic functionality, the endpoint also accept a `sha1` parameter specifying a commit ID. If this parameter is specified, jobs configured with the specified repo will be triggered immediately, and the build will check out the specified commit. Additionally, the output of the webhook endpoint will provide information about which jobs were triggered or scheduled for polling, including jobs the user has no permission to access. This allows attackers with knowledge of Git repository URLs to trigger builds of jobs using a specified Git repository and to cause them to check out an attacker-specified commit, and to obtain information about the existence of jobs configured with this Git repository. Additionally, this webhook endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability. Git Plugin 4.11.4 requires a `token` parameter which will act as an authentication for the webhook endpoint. While GET requests remain allowed, attackers would need to be able to provide a webhook token. For more information see [the plugin documentation](https://github.com/jenkinsci/git-plugin/#push-notification-from-repository).",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36884.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36884.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36884",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66504",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66433",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6646",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66431",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66479",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66493",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66512",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.665",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66469",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36884"
                },
                {
                    "reference_url": "https://github.com/jenkinsci/git-plugin/commit/b46165c74a0bf15e08763de2e506005624d5d238",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jenkinsci/git-plugin/commit/b46165c74a0bf15e08763de2e506005624d5d238"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36884",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36884"
                },
                {
                    "reference_url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/07/27/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/07/27/1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119657",
                    "reference_id": "2119657",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119657"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-449w-c77c-vmf6",
                    "reference_id": "GHSA-449w-c77c-vmf6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-449w-c77c-vmf6"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0017",
                    "reference_id": "RHSA-2023:0017",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0017"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0560",
                    "reference_id": "RHSA-2023:0560",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0560"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0777",
                    "reference_id": "RHSA-2023:0777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0777"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-36884",
                "GHSA-449w-c77c-vmf6"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ubq1-gzr6-x3fu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57525?format=api",
            "vulnerability_id": "VCID-xq5k-dyk9-u3ct",
            "summary": "Cross Site Request Forgery in Jenkins Blue Ocean Plugin\nA cross-site request forgery (CSRF) vulnerability in Jenkins Blue Ocean Plugin 1.25.3 and earlier allows attackers to connect to an attacker-specified HTTP server. Blue Ocean Plugin 1.25.4 requires POST requests and the appropriate permissions for the affected HTTP endpoints.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30953.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30953.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-30953",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24133",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24093",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28824",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28782",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2885",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28891",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28897",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28853",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28803",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-30953"
                },
                {
                    "reference_url": "https://github.com/jenkinsci/blueocean-plugin",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jenkinsci/blueocean-plugin"
                },
                {
                    "reference_url": "https://github.com/jenkinsci/blueocean-plugin/commit/9f44b895d018c514d5dccc1f2190a2a029e58259",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jenkinsci/blueocean-plugin/commit/9f44b895d018c514d5dccc1f2190a2a029e58259"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30953",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30953"
                },
                {
                    "reference_url": "https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2502",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2502"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/05/17/8",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/05/17/8"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119646",
                    "reference_id": "2119646",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119646"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-hgpq-42pf-9vfq",
                    "reference_id": "GHSA-hgpq-42pf-9vfq",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-hgpq-42pf-9vfq"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0017",
                    "reference_id": "RHSA-2023:0017",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0017"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0560",
                    "reference_id": "RHSA-2023:0560",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0560"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0777",
                    "reference_id": "RHSA-2023:0777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0777"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3198",
                    "reference_id": "RHSA-2023:3198",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3198"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3610",
                    "reference_id": "RHSA-2023:3610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3622",
                    "reference_id": "RHSA-2023:3622",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3622"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-30953",
                "GHSA-hgpq-42pf-9vfq"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xq5k-dyk9-u3ct"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "4.5",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jenkins-2-plugins@4.10.1675144701-1%3Farch=el8"
}