Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/rubygem-fluent-plugin-viaq_data_model@0.0.5-1?arch=el7
purl pkg:rpm/redhat/rubygem-fluent-plugin-viaq_data_model@0.0.5-1?arch=el7
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 4.0
Vulnerabilities affecting this package (4)
Vulnerability Summary Fixed by
VCID-1xxf-tjs3-zydm
Aliases:
CVE-2017-1000089
GHSA-8jx9-7j5m-79x4
Incorrect Default Permissions Builds in Jenkins are associated with an authentication that controls the permissions that the build has to interact with other elements in Jenkins. There are no reported fixed by versions.
VCID-9s6y-pk9b-5uef
Aliases:
CVE-2017-1000085
GHSA-hrwc-pqfm-g6qf
Cross-Site Request Forgery (CSRF) Subversion Plugin connects to a user-specified Subversion repository as part of form validation. This functionality improperly checked permissions, allowing any user with `Item/Build` permission (but not `Item/Configure`) to connect to any web server or Subversion server and send credentials with a known ID, thereby possibly capturing them. Additionally, this functionality did not require POST requests be used, thereby allowing the above to be performed without direct access to Jenkins via Cross-Site Request Forgery attacks. There are no reported fixed by versions.
VCID-rkm8-dspy-byfm
Aliases:
CVE-2017-1000092
GHSA-rf5q-8gx3-xqfc
Cross-Site Request Forgery (CSRF) The Git plugin connects to a user-specified Git repository as part of form validation. An attacker with no direct access to Jenkins but able to guess at a username password credentials ID could trick a developer with job configuration permissions into following a link with a maliciously crafted Jenkins URL which would result in the Jenkins Git client sending the username and password to an attacker-controlled server. There are no reported fixed by versions.
VCID-vnwr-bpsd-fff7
Aliases:
CVE-2017-1000096
GHSA-mhwq-4mh7-fv7c
Incorrect Permission Assignment for Critical Resource Arbitrary code execution due to incomplete sandbox protection: Constructors, instance variable initializers, and instance initializers in Pipeline scripts were not subject to sandbox protection, and could therefore execute arbitrary code. This could be exploited e.g. by regular Jenkins users with the permission to configure Pipelines in Jenkins, or by trusted committers to repositories containing Jenkinsfiles. There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T14:30:02.489404+00:00 RedHat Importer Affected by VCID-vnwr-bpsd-fff7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000096.json 38.0.0
2026-04-01T14:30:02.290135+00:00 RedHat Importer Affected by VCID-rkm8-dspy-byfm https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000092.json 38.0.0
2026-04-01T14:30:02.115085+00:00 RedHat Importer Affected by VCID-1xxf-tjs3-zydm https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000089.json 38.0.0
2026-04-01T14:30:01.938311+00:00 RedHat Importer Affected by VCID-9s6y-pk9b-5uef https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000085.json 38.0.0