Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.jenkins-ci.plugins/git@4.11.4
Typemaven
Namespaceorg.jenkins-ci.plugins
Namegit
Version4.11.4
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version4.11.5
Latest_non_vulnerable_version4.11.5
Affected_by_vulnerabilities
0
url VCID-f9ts-ya3x-t3bu
vulnerability_id VCID-f9ts-ya3x-t3bu
summary
Improper masking of credentials Jenkins in Git Plugin
Jenkins Git Plugin 4.11.4 and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log provided by the Git Username and Password (`gitUsernamePassword`) credentials binding.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38663.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38663.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38663
reference_id
reference_type
scores
0
value 0.02048
scoring_system epss
scoring_elements 0.83927
published_at 2026-04-29T12:55:00Z
1
value 0.02048
scoring_system epss
scoring_elements 0.83805
published_at 2026-04-02T12:55:00Z
2
value 0.02048
scoring_system epss
scoring_elements 0.83819
published_at 2026-04-04T12:55:00Z
3
value 0.02048
scoring_system epss
scoring_elements 0.83821
published_at 2026-04-07T12:55:00Z
4
value 0.02048
scoring_system epss
scoring_elements 0.83845
published_at 2026-04-08T12:55:00Z
5
value 0.02048
scoring_system epss
scoring_elements 0.83851
published_at 2026-04-09T12:55:00Z
6
value 0.02048
scoring_system epss
scoring_elements 0.83867
published_at 2026-04-11T12:55:00Z
7
value 0.02048
scoring_system epss
scoring_elements 0.83861
published_at 2026-04-12T12:55:00Z
8
value 0.02048
scoring_system epss
scoring_elements 0.83857
published_at 2026-04-13T12:55:00Z
9
value 0.02048
scoring_system epss
scoring_elements 0.8389
published_at 2026-04-21T12:55:00Z
10
value 0.02048
scoring_system epss
scoring_elements 0.83916
published_at 2026-04-24T12:55:00Z
11
value 0.02048
scoring_system epss
scoring_elements 0.83923
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38663
2
reference_url https://github.com/jenkinsci/git-plugin
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/git-plugin
3
reference_url https://github.com/jenkinsci/git-plugin/commit/3241db9cc696711c871d4e78b3c3c0daad0740c3
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/git-plugin/commit/3241db9cc696711c871d4e78b3c3c0daad0740c3
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-38663
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-38663
5
reference_url https://www.jenkins.io/security/advisory/2022-08-23/#SECURITY-2796
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-08-23/#SECURITY-2796
6
reference_url http://www.openwall.com/lists/oss-security/2022/08/23/2
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/08/23/2
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2120945
reference_id 2120945
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2120945
8
reference_url https://github.com/advisories/GHSA-jxmw-3gxf-fprh
reference_id GHSA-jxmw-3gxf-fprh
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-jxmw-3gxf-fprh
fixed_packages
0
url pkg:maven/org.jenkins-ci.plugins/git@4.11.5
purl pkg:maven/org.jenkins-ci.plugins/git@4.11.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/git@4.11.5
aliases CVE-2022-38663, GHSA-jxmw-3gxf-fprh
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f9ts-ya3x-t3bu
Fixing_vulnerabilities
0
url VCID-ca7m-fb38-kfe2
vulnerability_id VCID-ca7m-fb38-kfe2
summary
Lack of authentication mechanism in Jenkins Git Plugin webhook
Git Plugin provides a webhook endpoint at `/git/notifyCommit` that can be used to notify Jenkins of changes to an SCM repository. For its most basic functionality, this endpoint receives a repository URL, and Jenkins will schedule polling for all jobs configured with the specified repository. In Git Plugin 4.11.3 and earlier, this endpoint can be accessed with GET requests and without authentication. In addition to this basic functionality, the endpoint also accept a `sha1` parameter specifying a commit ID. If this parameter is specified, jobs configured with the specified repo will be triggered immediately, and the build will check out the specified commit. Additionally, the output of the webhook endpoint will provide information about which jobs were triggered or scheduled for polling, including jobs the user has no permission to access. This allows attackers with knowledge of Git repository URLs to trigger builds of jobs using a specified Git repository and to cause them to check out an attacker-specified commit, and to obtain information about the existence of jobs configured with this Git repository. Git Plugin 4.11.4 requires a `token` parameter which will act as an authentication for the webhook endpoint. While GET requests remain allowed, attackers would need to be able to provide a webhook token. For more information see [the plugin documentation](https://github.com/jenkinsci/git-plugin/#push-notification-from-repository).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36883.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36883.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36883
reference_id
reference_type
scores
0
value 0.78584
scoring_system epss
scoring_elements 0.99048
published_at 2026-04-29T12:55:00Z
1
value 0.78584
scoring_system epss
scoring_elements 0.99031
published_at 2026-04-02T12:55:00Z
2
value 0.78584
scoring_system epss
scoring_elements 0.99034
published_at 2026-04-04T12:55:00Z
3
value 0.78584
scoring_system epss
scoring_elements 0.99036
published_at 2026-04-07T12:55:00Z
4
value 0.78584
scoring_system epss
scoring_elements 0.99037
published_at 2026-04-08T12:55:00Z
5
value 0.78584
scoring_system epss
scoring_elements 0.99038
published_at 2026-04-09T12:55:00Z
6
value 0.78584
scoring_system epss
scoring_elements 0.99039
published_at 2026-04-11T12:55:00Z
7
value 0.78584
scoring_system epss
scoring_elements 0.9904
published_at 2026-04-13T12:55:00Z
8
value 0.78584
scoring_system epss
scoring_elements 0.99041
published_at 2026-04-18T12:55:00Z
9
value 0.78584
scoring_system epss
scoring_elements 0.99043
published_at 2026-04-21T12:55:00Z
10
value 0.78584
scoring_system epss
scoring_elements 0.99045
published_at 2026-04-24T12:55:00Z
11
value 0.78584
scoring_system epss
scoring_elements 0.99047
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36883
2
reference_url https://github.com/jenkinsci/git-plugin
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/git-plugin
3
reference_url https://github.com/jenkinsci/git-plugin/commit/b46165c74a0bf15e08763de2e506005624d5d238
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/git-plugin/commit/b46165c74a0bf15e08763de2e506005624d5d238
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-36883
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-36883
5
reference_url https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284
6
reference_url http://www.openwall.com/lists/oss-security/2022/07/27/1
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/07/27/1
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2119656
reference_id 2119656
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2119656
8
reference_url https://github.com/advisories/GHSA-v878-67xw-grw2
reference_id GHSA-v878-67xw-grw2
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-v878-67xw-grw2
9
reference_url https://access.redhat.com/errata/RHSA-2023:0017
reference_id RHSA-2023:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0017
10
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
11
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
fixed_packages
0
url pkg:maven/org.jenkins-ci.plugins/git@4.11.4
purl pkg:maven/org.jenkins-ci.plugins/git@4.11.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-f9ts-ya3x-t3bu
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/git@4.11.4
aliases CVE-2022-36883, GHSA-v878-67xw-grw2
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ca7m-fb38-kfe2
1
url VCID-gxu6-51zm-sfh7
vulnerability_id VCID-gxu6-51zm-sfh7
summary
Lack of authentication mechanism in Jenkins Git Plugin webhook
Git Plugin provides a webhook endpoint at `/git/notifyCommit` that can be used to notify Jenkins of changes to an SCM repository. For its most basic functionality, this endpoint receives a repository URL, and Jenkins will schedule polling for all jobs configured with the specified repository. In Git Plugin 4.11.3 and earlier, this endpoint can be accessed with GET requests and without authentication.

This webhook endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.

Git Plugin 4.11.4 requires a `token` parameter which will act as an authentication for the webhook endpoint. While GET requests remain allowed, attackers would need to be able to provide a webhook token. For more information see [the plugin documentation](https://github.com/jenkinsci/git-plugin/#push-notification-from-repository).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36882.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36882.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36882
reference_id
reference_type
scores
0
value 0.00284
scoring_system epss
scoring_elements 0.51717
published_at 2026-04-29T12:55:00Z
1
value 0.00284
scoring_system epss
scoring_elements 0.5176
published_at 2026-04-09T12:55:00Z
2
value 0.00284
scoring_system epss
scoring_elements 0.5181
published_at 2026-04-11T12:55:00Z
3
value 0.00284
scoring_system epss
scoring_elements 0.51789
published_at 2026-04-12T12:55:00Z
4
value 0.00284
scoring_system epss
scoring_elements 0.51773
published_at 2026-04-13T12:55:00Z
5
value 0.00284
scoring_system epss
scoring_elements 0.51815
published_at 2026-04-16T12:55:00Z
6
value 0.00284
scoring_system epss
scoring_elements 0.51821
published_at 2026-04-18T12:55:00Z
7
value 0.00284
scoring_system epss
scoring_elements 0.51803
published_at 2026-04-21T12:55:00Z
8
value 0.00284
scoring_system epss
scoring_elements 0.51753
published_at 2026-04-24T12:55:00Z
9
value 0.00284
scoring_system epss
scoring_elements 0.51758
published_at 2026-04-26T12:55:00Z
10
value 0.00284
scoring_system epss
scoring_elements 0.51723
published_at 2026-04-02T12:55:00Z
11
value 0.00284
scoring_system epss
scoring_elements 0.51749
published_at 2026-04-04T12:55:00Z
12
value 0.00284
scoring_system epss
scoring_elements 0.51709
published_at 2026-04-07T12:55:00Z
13
value 0.00284
scoring_system epss
scoring_elements 0.51764
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36882
2
reference_url https://github.com/jenkinsci/git-plugin/commit/b46165c74a0bf15e08763de2e506005624d5d238
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/git-plugin/commit/b46165c74a0bf15e08763de2e506005624d5d238
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-36882
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-36882
4
reference_url https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284
5
reference_url http://www.openwall.com/lists/oss-security/2022/07/27/1
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/07/27/1
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2116840
reference_id 2116840
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2116840
7
reference_url https://github.com/advisories/GHSA-8xwj-2wgh-gprh
reference_id GHSA-8xwj-2wgh-gprh
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-8xwj-2wgh-gprh
8
reference_url https://access.redhat.com/errata/RHSA-2023:0017
reference_id RHSA-2023:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0017
9
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
10
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
fixed_packages
0
url pkg:maven/org.jenkins-ci.plugins/git@4.11.4
purl pkg:maven/org.jenkins-ci.plugins/git@4.11.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-f9ts-ya3x-t3bu
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/git@4.11.4
aliases CVE-2022-36882, GHSA-8xwj-2wgh-gprh
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gxu6-51zm-sfh7
2
url VCID-ubq1-gzr6-x3fu
vulnerability_id VCID-ubq1-gzr6-x3fu
summary
Lack of authentication mechanism in Jenkins Git Plugin webhook
Git Plugin provides a webhook endpoint at `/git/notifyCommit` that can be used to notify Jenkins of changes to an SCM repository. For its most basic functionality, this endpoint receives a repository URL, and Jenkins will schedule polling for all jobs configured with the specified repository. In Git Plugin 4.11.3 and earlier, this endpoint can be accessed with GET requests and without authentication. In addition to this basic functionality, the endpoint also accept a `sha1` parameter specifying a commit ID. If this parameter is specified, jobs configured with the specified repo will be triggered immediately, and the build will check out the specified commit. Additionally, the output of the webhook endpoint will provide information about which jobs were triggered or scheduled for polling, including jobs the user has no permission to access. This allows attackers with knowledge of Git repository URLs to trigger builds of jobs using a specified Git repository and to cause them to check out an attacker-specified commit, and to obtain information about the existence of jobs configured with this Git repository. Additionally, this webhook endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability. Git Plugin 4.11.4 requires a `token` parameter which will act as an authentication for the webhook endpoint. While GET requests remain allowed, attackers would need to be able to provide a webhook token. For more information see [the plugin documentation](https://github.com/jenkinsci/git-plugin/#push-notification-from-repository).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36884.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36884.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36884
reference_id
reference_type
scores
0
value 0.00512
scoring_system epss
scoring_elements 0.66548
published_at 2026-04-29T12:55:00Z
1
value 0.00512
scoring_system epss
scoring_elements 0.66493
published_at 2026-04-09T12:55:00Z
2
value 0.00512
scoring_system epss
scoring_elements 0.66512
published_at 2026-04-11T12:55:00Z
3
value 0.00512
scoring_system epss
scoring_elements 0.665
published_at 2026-04-12T12:55:00Z
4
value 0.00512
scoring_system epss
scoring_elements 0.66469
published_at 2026-04-13T12:55:00Z
5
value 0.00512
scoring_system epss
scoring_elements 0.66504
published_at 2026-04-16T12:55:00Z
6
value 0.00512
scoring_system epss
scoring_elements 0.66522
published_at 2026-04-18T12:55:00Z
7
value 0.00512
scoring_system epss
scoring_elements 0.66506
published_at 2026-04-21T12:55:00Z
8
value 0.00512
scoring_system epss
scoring_elements 0.66531
published_at 2026-04-24T12:55:00Z
9
value 0.00512
scoring_system epss
scoring_elements 0.66547
published_at 2026-04-26T12:55:00Z
10
value 0.00512
scoring_system epss
scoring_elements 0.66433
published_at 2026-04-02T12:55:00Z
11
value 0.00512
scoring_system epss
scoring_elements 0.6646
published_at 2026-04-04T12:55:00Z
12
value 0.00512
scoring_system epss
scoring_elements 0.66431
published_at 2026-04-07T12:55:00Z
13
value 0.00512
scoring_system epss
scoring_elements 0.66479
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36884
2
reference_url https://github.com/jenkinsci/git-plugin/commit/b46165c74a0bf15e08763de2e506005624d5d238
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/git-plugin/commit/b46165c74a0bf15e08763de2e506005624d5d238
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-36884
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-36884
4
reference_url https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284
5
reference_url http://www.openwall.com/lists/oss-security/2022/07/27/1
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2022/07/27/1
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2119657
reference_id 2119657
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2119657
7
reference_url https://github.com/advisories/GHSA-449w-c77c-vmf6
reference_id GHSA-449w-c77c-vmf6
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-449w-c77c-vmf6
8
reference_url https://access.redhat.com/errata/RHSA-2023:0017
reference_id RHSA-2023:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0017
9
reference_url https://access.redhat.com/errata/RHSA-2023:0560
reference_id RHSA-2023:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0560
10
reference_url https://access.redhat.com/errata/RHSA-2023:0777
reference_id RHSA-2023:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0777
fixed_packages
0
url pkg:maven/org.jenkins-ci.plugins/git@4.11.4
purl pkg:maven/org.jenkins-ci.plugins/git@4.11.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-f9ts-ya3x-t3bu
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/git@4.11.4
aliases CVE-2022-36884, GHSA-449w-c77c-vmf6
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ubq1-gzr6-x3fu
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.plugins/git@4.11.4