Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-4m6t-zty2-b3d6
Summary
Improper Encoding or Escaping of Output
Jenkins accepts names of jobs and other entities with a trailing dot character, potentially replacing the configuration and data of other entities on Windows.
Aliases
0
alias CVE-2021-21682
1
alias GHSA-6q4g-84f3-mw74
Fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@2.303.2
purl pkg:maven/org.jenkins-ci.main/jenkins-core@2.303.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-53km-desw-w7d6
1
vulnerability VCID-7w87-bm8n-bbbr
2
vulnerability VCID-b4zg-38x9-23dn
3
vulnerability VCID-fvza-3rhj-8kbp
4
vulnerability VCID-h3nf-gwsr-5qf3
5
vulnerability VCID-kf3a-yce1-auh4
6
vulnerability VCID-remx-jas5-1bfm
7
vulnerability VCID-zgtd-8mf6-ruc9
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.303.2
1
url pkg:maven/org.jenkins-ci.main/jenkins-core@2.315
purl pkg:maven/org.jenkins-ci.main/jenkins-core@2.315
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.315
Affected_packages
0
url pkg:alpm/archlinux/jenkins@2.314-1
purl pkg:alpm/archlinux/jenkins@2.314-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3bxq-vmjj-kqfe
1
vulnerability VCID-4m6t-zty2-b3d6
2
vulnerability VCID-tdb7-6gx7-1ucr
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/jenkins@2.314-1
1
url pkg:maven/org.jenkins-ci.main/jenkins-core@2.303.1
purl pkg:maven/org.jenkins-ci.main/jenkins-core@2.303.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4m6t-zty2-b3d6
1
vulnerability VCID-tdb7-6gx7-1ucr
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.303.1
2
url pkg:maven/org.jenkins-ci.main/jenkins-core@2.304
purl pkg:maven/org.jenkins-ci.main/jenkins-core@2.304
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1kf2-8j67-7kg3
1
vulnerability VCID-4m6t-zty2-b3d6
2
vulnerability VCID-53km-desw-w7d6
3
vulnerability VCID-7w87-bm8n-bbbr
4
vulnerability VCID-b4zg-38x9-23dn
5
vulnerability VCID-fvza-3rhj-8kbp
6
vulnerability VCID-h3nf-gwsr-5qf3
7
vulnerability VCID-kf3a-yce1-auh4
8
vulnerability VCID-nq1x-s9hz-a7fb
9
vulnerability VCID-r3ry-745m-zuh1
10
vulnerability VCID-r3v1-qkky-dqcq
11
vulnerability VCID-remx-jas5-1bfm
12
vulnerability VCID-tdb7-6gx7-1ucr
13
vulnerability VCID-wuvf-kdtu-tkc2
14
vulnerability VCID-zgtd-8mf6-ruc9
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.304
3
url pkg:maven/org.jenkins-ci.main/jenkins-core@2.314
purl pkg:maven/org.jenkins-ci.main/jenkins-core@2.314
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4m6t-zty2-b3d6
1
vulnerability VCID-tdb7-6gx7-1ucr
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.314
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-21682
reference_id
reference_type
scores
0
value 0.00222
scoring_system epss
scoring_elements 0.44655
published_at 2026-05-09T12:55:00Z
1
value 0.00222
scoring_system epss
scoring_elements 0.44859
published_at 2026-04-12T12:55:00Z
2
value 0.00222
scoring_system epss
scoring_elements 0.44861
published_at 2026-04-13T12:55:00Z
3
value 0.00222
scoring_system epss
scoring_elements 0.44913
published_at 2026-04-16T12:55:00Z
4
value 0.00222
scoring_system epss
scoring_elements 0.44907
published_at 2026-04-18T12:55:00Z
5
value 0.00222
scoring_system epss
scoring_elements 0.44842
published_at 2026-04-21T12:55:00Z
6
value 0.00222
scoring_system epss
scoring_elements 0.44755
published_at 2026-04-24T12:55:00Z
7
value 0.00222
scoring_system epss
scoring_elements 0.44762
published_at 2026-04-26T12:55:00Z
8
value 0.00222
scoring_system epss
scoring_elements 0.44685
published_at 2026-04-29T12:55:00Z
9
value 0.00222
scoring_system epss
scoring_elements 0.4457
published_at 2026-05-05T12:55:00Z
10
value 0.00222
scoring_system epss
scoring_elements 0.44641
published_at 2026-05-07T12:55:00Z
11
value 0.00222
scoring_system epss
scoring_elements 0.44777
published_at 2026-04-01T12:55:00Z
12
value 0.00222
scoring_system epss
scoring_elements 0.44857
published_at 2026-04-02T12:55:00Z
13
value 0.00222
scoring_system epss
scoring_elements 0.44879
published_at 2026-04-04T12:55:00Z
14
value 0.00222
scoring_system epss
scoring_elements 0.4482
published_at 2026-04-07T12:55:00Z
15
value 0.00222
scoring_system epss
scoring_elements 0.44872
published_at 2026-04-08T12:55:00Z
16
value 0.00222
scoring_system epss
scoring_elements 0.44874
published_at 2026-04-09T12:55:00Z
17
value 0.00222
scoring_system epss
scoring_elements 0.44891
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-21682
1
reference_url https://github.com/jenkinsci/jenkins/commit/c2c2b59071265aea07f88d5e95297c0a433921c3
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/c2c2b59071265aea07f88d5e95297c0a433921c3
2
reference_url https://www.jenkins.io/security/advisory/2021-10-06/#SECURITY-2424
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.jenkins.io/security/advisory/2021-10-06/#SECURITY-2424
3
reference_url http://www.openwall.com/lists/oss-security/2021/10/06/1
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2021/10/06/1
4
reference_url https://security.archlinux.org/AVG-2449
reference_id AVG-2449
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2449
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-21682
reference_id CVE-2021-21682
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-21682
6
reference_url https://github.com/advisories/GHSA-6q4g-84f3-mw74
reference_id GHSA-6q4g-84f3-mw74
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-6q4g-84f3-mw74
Weaknesses
0
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
1
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
2
cwe_id 42
name Path Equivalence: 'filename.' (Trailing Dot)
description The product accepts path input in the form of trailing dot ('filedir.') without appropriate validation, which can lead to ambiguous path resolution and allow an attacker to traverse the file system to unintended locations or access arbitrary files.
Exploits
Severity_range_score4.0 - 6.9
Exploitability0.5
Weighted_severity6.2
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-4m6t-zty2-b3d6