Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/53164?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/53164?format=api", "vulnerability_id": "VCID-f9ts-ya3x-t3bu", "summary": "Improper masking of credentials Jenkins in Git Plugin\nJenkins Git Plugin 4.11.4 and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log provided by the Git Username and Password (`gitUsernamePassword`) credentials binding.", "aliases": [ { "alias": "CVE-2022-38663" }, { "alias": "GHSA-jxmw-3gxf-fprh" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/80824?format=api", "purl": "pkg:maven/org.jenkins-ci.plugins/git@4.11.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/git@4.11.5" } ], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/81356?format=api", "purl": "pkg:maven/org.jenkins-ci.plugins/git@4.11.4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-f9ts-ya3x-t3bu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/git@4.11.4" } ], "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38663.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38663.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38663", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02048", "scoring_system": "epss", "scoring_elements": "0.83927", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02048", "scoring_system": "epss", "scoring_elements": "0.83805", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02048", "scoring_system": "epss", "scoring_elements": "0.83819", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02048", "scoring_system": "epss", "scoring_elements": "0.83821", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02048", "scoring_system": "epss", "scoring_elements": "0.83845", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02048", "scoring_system": "epss", "scoring_elements": "0.83851", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02048", "scoring_system": "epss", "scoring_elements": "0.83867", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02048", "scoring_system": "epss", "scoring_elements": "0.83861", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02048", "scoring_system": "epss", "scoring_elements": "0.83857", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02048", "scoring_system": "epss", "scoring_elements": "0.8389", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02048", "scoring_system": "epss", "scoring_elements": "0.83916", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02048", "scoring_system": "epss", "scoring_elements": "0.83923", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38663" }, { "reference_url": "https://github.com/jenkinsci/git-plugin", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/jenkinsci/git-plugin" }, { "reference_url": "https://github.com/jenkinsci/git-plugin/commit/3241db9cc696711c871d4e78b3c3c0daad0740c3", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/jenkinsci/git-plugin/commit/3241db9cc696711c871d4e78b3c3c0daad0740c3" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38663", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38663" }, { "reference_url": "https://www.jenkins.io/security/advisory/2022-08-23/#SECURITY-2796", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.jenkins.io/security/advisory/2022-08-23/#SECURITY-2796" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/08/23/2", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2022/08/23/2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2120945", "reference_id": "2120945", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2120945" }, { "reference_url": "https://github.com/advisories/GHSA-jxmw-3gxf-fprh", "reference_id": "GHSA-jxmw-3gxf-fprh", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-jxmw-3gxf-fprh" } ], "weaknesses": [ { "cwe_id": 522, "name": "Insufficiently Protected Credentials", "description": "The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval." }, { "cwe_id": 1035, "name": "OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities", "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017." }, { "cwe_id": 937, "name": "OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities", "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013." } ], "exploits": [], "severity_range_score": "4.0 - 6.9", "exploitability": "0.5", "weighted_severity": "6.2", "risk_score": 3.1, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f9ts-ya3x-t3bu" }