Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-dx1r-55e3-8kes
Summary
Jenkins Monitoring Plugin Reveals Sensitive Information via Unspecified Pages
The Monitoring plugin before 1.53.0 for Jenkins allows remote attackers to obtain sensitive information by accessing unspecified pages.
Aliases
0
alias CVE-2014-3679
1
alias GHSA-qwc3-p5pc-q93h
Fixed_packages
Affected_packages
0
url pkg:maven/org.jvnet.hudson.plugins/monitoring@1.8.1
purl pkg:maven/org.jvnet.hudson.plugins/monitoring@1.8.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28y2-gqhb-k7ak
1
vulnerability VCID-dx1r-55e3-8kes
2
vulnerability VCID-p6uj-ac1z-nqe1
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jvnet.hudson.plugins/monitoring@1.8.1
1
url pkg:maven/org.jvnet.hudson.plugins/monitoring@1.8.2
purl pkg:maven/org.jvnet.hudson.plugins/monitoring@1.8.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28y2-gqhb-k7ak
1
vulnerability VCID-dx1r-55e3-8kes
2
vulnerability VCID-p6uj-ac1z-nqe1
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jvnet.hudson.plugins/monitoring@1.8.2
2
url pkg:maven/org.jvnet.hudson.plugins/monitoring@1.9.0
purl pkg:maven/org.jvnet.hudson.plugins/monitoring@1.9.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28y2-gqhb-k7ak
1
vulnerability VCID-dx1r-55e3-8kes
2
vulnerability VCID-p6uj-ac1z-nqe1
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jvnet.hudson.plugins/monitoring@1.9.0
3
url pkg:maven/org.jvnet.hudson.plugins/monitoring@1.10.0
purl pkg:maven/org.jvnet.hudson.plugins/monitoring@1.10.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28y2-gqhb-k7ak
1
vulnerability VCID-dx1r-55e3-8kes
2
vulnerability VCID-p6uj-ac1z-nqe1
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jvnet.hudson.plugins/monitoring@1.10.0
4
url pkg:maven/org.jvnet.hudson.plugins/monitoring@1.12.0
purl pkg:maven/org.jvnet.hudson.plugins/monitoring@1.12.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28y2-gqhb-k7ak
1
vulnerability VCID-dx1r-55e3-8kes
2
vulnerability VCID-p6uj-ac1z-nqe1
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jvnet.hudson.plugins/monitoring@1.12.0
5
url pkg:maven/org.jvnet.hudson.plugins/monitoring@1.13.0
purl pkg:maven/org.jvnet.hudson.plugins/monitoring@1.13.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28y2-gqhb-k7ak
1
vulnerability VCID-dx1r-55e3-8kes
2
vulnerability VCID-p6uj-ac1z-nqe1
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jvnet.hudson.plugins/monitoring@1.13.0
6
url pkg:maven/org.jvnet.hudson.plugins/monitoring@1.14.0
purl pkg:maven/org.jvnet.hudson.plugins/monitoring@1.14.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28y2-gqhb-k7ak
1
vulnerability VCID-dx1r-55e3-8kes
2
vulnerability VCID-p6uj-ac1z-nqe1
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jvnet.hudson.plugins/monitoring@1.14.0
7
url pkg:maven/org.jvnet.hudson.plugins/monitoring@1.15.0
purl pkg:maven/org.jvnet.hudson.plugins/monitoring@1.15.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28y2-gqhb-k7ak
1
vulnerability VCID-dx1r-55e3-8kes
2
vulnerability VCID-p6uj-ac1z-nqe1
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jvnet.hudson.plugins/monitoring@1.15.0
8
url pkg:maven/org.jvnet.hudson.plugins/monitoring@1.15.1
purl pkg:maven/org.jvnet.hudson.plugins/monitoring@1.15.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28y2-gqhb-k7ak
1
vulnerability VCID-dx1r-55e3-8kes
2
vulnerability VCID-p6uj-ac1z-nqe1
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jvnet.hudson.plugins/monitoring@1.15.1
9
url pkg:maven/org.jvnet.hudson.plugins/monitoring@1.17.0
purl pkg:maven/org.jvnet.hudson.plugins/monitoring@1.17.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28y2-gqhb-k7ak
1
vulnerability VCID-dx1r-55e3-8kes
2
vulnerability VCID-p6uj-ac1z-nqe1
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jvnet.hudson.plugins/monitoring@1.17.0
10
url pkg:maven/org.jvnet.hudson.plugins/monitoring@1.18.0
purl pkg:maven/org.jvnet.hudson.plugins/monitoring@1.18.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28y2-gqhb-k7ak
1
vulnerability VCID-dx1r-55e3-8kes
2
vulnerability VCID-p6uj-ac1z-nqe1
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jvnet.hudson.plugins/monitoring@1.18.0
11
url pkg:maven/org.jvnet.hudson.plugins/monitoring@1.19.0
purl pkg:maven/org.jvnet.hudson.plugins/monitoring@1.19.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28y2-gqhb-k7ak
1
vulnerability VCID-dx1r-55e3-8kes
2
vulnerability VCID-p6uj-ac1z-nqe1
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jvnet.hudson.plugins/monitoring@1.19.0
12
url pkg:maven/org.jvnet.hudson.plugins/monitoring@1.20.0
purl pkg:maven/org.jvnet.hudson.plugins/monitoring@1.20.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28y2-gqhb-k7ak
1
vulnerability VCID-dx1r-55e3-8kes
2
vulnerability VCID-p6uj-ac1z-nqe1
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jvnet.hudson.plugins/monitoring@1.20.0
13
url pkg:maven/org.jvnet.hudson.plugins/monitoring@1.21.0
purl pkg:maven/org.jvnet.hudson.plugins/monitoring@1.21.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28y2-gqhb-k7ak
1
vulnerability VCID-dx1r-55e3-8kes
2
vulnerability VCID-p6uj-ac1z-nqe1
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jvnet.hudson.plugins/monitoring@1.21.0
14
url pkg:maven/org.jvnet.hudson.plugins/monitoring@1.22.0
purl pkg:maven/org.jvnet.hudson.plugins/monitoring@1.22.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28y2-gqhb-k7ak
1
vulnerability VCID-dx1r-55e3-8kes
2
vulnerability VCID-p6uj-ac1z-nqe1
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jvnet.hudson.plugins/monitoring@1.22.0
15
url pkg:maven/org.jvnet.hudson.plugins/monitoring@1.23.0
purl pkg:maven/org.jvnet.hudson.plugins/monitoring@1.23.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28y2-gqhb-k7ak
1
vulnerability VCID-dx1r-55e3-8kes
2
vulnerability VCID-p6uj-ac1z-nqe1
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jvnet.hudson.plugins/monitoring@1.23.0
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3679.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3679.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3679
reference_id
reference_type
scores
0
value 0.00236
scoring_system epss
scoring_elements 0.46563
published_at 2026-04-26T12:55:00Z
1
value 0.00236
scoring_system epss
scoring_elements 0.46503
published_at 2026-04-01T12:55:00Z
2
value 0.00236
scoring_system epss
scoring_elements 0.46542
published_at 2026-04-02T12:55:00Z
3
value 0.00236
scoring_system epss
scoring_elements 0.46561
published_at 2026-04-04T12:55:00Z
4
value 0.00236
scoring_system epss
scoring_elements 0.4651
published_at 2026-04-07T12:55:00Z
5
value 0.00236
scoring_system epss
scoring_elements 0.46565
published_at 2026-04-09T12:55:00Z
6
value 0.00236
scoring_system epss
scoring_elements 0.46588
published_at 2026-04-11T12:55:00Z
7
value 0.00236
scoring_system epss
scoring_elements 0.4656
published_at 2026-04-12T12:55:00Z
8
value 0.00236
scoring_system epss
scoring_elements 0.46569
published_at 2026-04-13T12:55:00Z
9
value 0.00236
scoring_system epss
scoring_elements 0.46625
published_at 2026-04-16T12:55:00Z
10
value 0.00236
scoring_system epss
scoring_elements 0.46623
published_at 2026-04-18T12:55:00Z
11
value 0.00236
scoring_system epss
scoring_elements 0.4657
published_at 2026-04-21T12:55:00Z
12
value 0.00236
scoring_system epss
scoring_elements 0.46552
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3679
2
reference_url https://github.com/jenkinsci/monitoring-plugin
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/monitoring-plugin
3
reference_url https://github.com/jenkinsci/monitoring-plugin/commit/f0f6aeef2032696c97d4b015dd51fa2b841b0473
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/monitoring-plugin/commit/f0f6aeef2032696c97d4b015dd51fa2b841b0473
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3679
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-3679
5
reference_url https://wiki.jenkins-ci.org/display/JENKINS/Monitoring
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/JENKINS/Monitoring
6
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1147761
reference_id 1147761
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1147761
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.40.0:*:*:*:*:cloudbees_jenkins:*:*
reference_id cpe:2.3:a:jenkins-ci:monitoring_plugin:1.40.0:*:*:*:*:cloudbees_jenkins:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.40.0:*:*:*:*:cloudbees_jenkins:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.41.0:*:*:*:*:cloudbees_jenkins:*:*
reference_id cpe:2.3:a:jenkins-ci:monitoring_plugin:1.41.0:*:*:*:*:cloudbees_jenkins:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.41.0:*:*:*:*:cloudbees_jenkins:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.42.0:*:*:*:*:cloudbees_jenkins:*:*
reference_id cpe:2.3:a:jenkins-ci:monitoring_plugin:1.42.0:*:*:*:*:cloudbees_jenkins:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.42.0:*:*:*:*:cloudbees_jenkins:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.43.0:*:*:*:*:cloudbees_jenkins:*:*
reference_id cpe:2.3:a:jenkins-ci:monitoring_plugin:1.43.0:*:*:*:*:cloudbees_jenkins:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.43.0:*:*:*:*:cloudbees_jenkins:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.44.0:*:*:*:*:cloudbees_jenkins:*:*
reference_id cpe:2.3:a:jenkins-ci:monitoring_plugin:1.44.0:*:*:*:*:cloudbees_jenkins:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.44.0:*:*:*:*:cloudbees_jenkins:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.45.0:*:*:*:*:cloudbees_jenkins:*:*
reference_id cpe:2.3:a:jenkins-ci:monitoring_plugin:1.45.0:*:*:*:*:cloudbees_jenkins:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.45.0:*:*:*:*:cloudbees_jenkins:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.46.0:*:*:*:*:cloudbees_jenkins:*:*
reference_id cpe:2.3:a:jenkins-ci:monitoring_plugin:1.46.0:*:*:*:*:cloudbees_jenkins:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.46.0:*:*:*:*:cloudbees_jenkins:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.47.0:*:*:*:*:cloudbees_jenkins:*:*
reference_id cpe:2.3:a:jenkins-ci:monitoring_plugin:1.47.0:*:*:*:*:cloudbees_jenkins:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.47.0:*:*:*:*:cloudbees_jenkins:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.48.0:*:*:*:*:cloudbees_jenkins:*:*
reference_id cpe:2.3:a:jenkins-ci:monitoring_plugin:1.48.0:*:*:*:*:cloudbees_jenkins:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.48.0:*:*:*:*:cloudbees_jenkins:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.49.0:*:*:*:*:cloudbees_jenkins:*:*
reference_id cpe:2.3:a:jenkins-ci:monitoring_plugin:1.49.0:*:*:*:*:cloudbees_jenkins:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.49.0:*:*:*:*:cloudbees_jenkins:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.50.0:*:*:*:*:cloudbees_jenkins:*:*
reference_id cpe:2.3:a:jenkins-ci:monitoring_plugin:1.50.0:*:*:*:*:cloudbees_jenkins:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.50.0:*:*:*:*:cloudbees_jenkins:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.51.0:*:*:*:*:cloudbees_jenkins:*:*
reference_id cpe:2.3:a:jenkins-ci:monitoring_plugin:1.51.0:*:*:*:*:cloudbees_jenkins:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.51.0:*:*:*:*:cloudbees_jenkins:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.52.0:*:*:*:*:cloudbees_jenkins:*:*
reference_id cpe:2.3:a:jenkins-ci:monitoring_plugin:1.52.0:*:*:*:*:cloudbees_jenkins:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:1.52.0:*:*:*:*:cloudbees_jenkins:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:*:*:*:*:*:cloudbees_jenkins:*:*
reference_id cpe:2.3:a:jenkins-ci:monitoring_plugin:*:*:*:*:*:cloudbees_jenkins:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jenkins-ci:monitoring_plugin:*:*:*:*:*:cloudbees_jenkins:*:*
22
reference_url https://github.com/advisories/GHSA-qwc3-p5pc-q93h
reference_id GHSA-qwc3-p5pc-q93h
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-qwc3-p5pc-q93h
Weaknesses
0
cwe_id 284
name Improper Access Control
description The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
1
cwe_id 200
name Exposure of Sensitive Information to an Unauthorized Actor
description The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
2
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
3
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
Exploits
Severity_range_score4.0 - 6.9
Exploitability0.5
Weighted_severity6.2
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-dx1r-55e3-8kes