Lookup for vulnerabilities affecting packages.
| Vulnerability_id | VCID-q58h-d9w2-8yez |
| Summary | Information Exposure
Jenkins is vulnerable to an improper exclusion of the Pipeline metadata files in the agent-to-master security subsystem. This could allow metadata files to be written to by malicious agents. |
| Aliases |
| 0 |
|
| 1 |
| alias |
GHSA-ffgg-vphh-v273 |
|
|
| Fixed_packages |
|
| Affected_packages |
|
| References |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2602 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37155 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37247 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37268 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37488 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37553 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37572 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37558 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37606 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37629 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37507 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37571 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.3744 |
| published_at |
2026-04-01T12:55:00Z |
|
| 12 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37525 |
| published_at |
2026-04-13T12:55:00Z |
|
| 13 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37551 |
| published_at |
2026-04-12T12:55:00Z |
|
| 14 |
| value |
0.00165 |
| scoring_system |
epss |
| scoring_elements |
0.37585 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2602 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2602 |
| reference_id |
CVE-2017-2602 |
| reference_type |
|
| scores |
| 0 |
| value |
4.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:N/I:P/A:N |
|
| 1 |
| value |
3.1 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 2 |
| value |
4.3 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 3 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 4 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2602 |
|
| 12 |
|
|
| Weaknesses |
| 0 |
| cwe_id |
1035 |
| name |
OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities |
| description |
Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017. |
|
| 1 |
| cwe_id |
937 |
| name |
OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities |
| description |
Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013. |
|
| 2 |
| cwe_id |
184 |
| name |
Incomplete List of Disallowed Inputs |
| description |
The product implements a protection mechanism that relies on a list of inputs (or properties of inputs) that are not allowed by policy or otherwise require other action to neutralize before additional processing takes place, but the list is incomplete, leading to resultant weaknesses. |
|
|
| Exploits |
|
| Severity_range_score | 3.1 - 6.9 |
| Exploitability | 0.5 |
| Weighted_severity | 6.2 |
| Risk_score | 3.1 |
| Resource_url | http://public2.vulnerablecode.io/vulnerabilities/VCID-q58h-d9w2-8yez |