{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-09T07:38:47.647","vulnerabilities":[{"cve":{"id":"CVE-2012-0785","sourceIdentifier":"secalert@redhat.com","published":"2020-02-24T17:15:13.590","lastModified":"2024-11-21T01:35:43.290","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Hash collision attack vulnerability in Jenkins before 1.447, Jenkins LTS before 1.424.2, and Jenkins Enterprise by CloudBees 1.424.x before 1.424.2.1 and 1.400.x before 1.400.0.11 could allow remote attackers to cause a considerable CPU load, aka \"the Hash DoS attack.\""},{"lang":"es","value":"Una vulnerabilidad de ataque de colisión de hash en Jenkins versiones anteriores a 1.447, Jenkins LTS versiones anteriores a 1.424.2 y Jenkins Enterprise de CloudBees versiones 1.424.x anteriores a 1.424.2.1 y versiones 1.400.x anteriores a 1.400.0.11, podría permitir a atacantes remotos causar una carga de la CPU considerable, también se conoce como \"the Hash DoS attack\"."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-400"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cloudbees:jenkins:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"1.400.0","versionEndExcluding":"1.400.0.11","matchCriteriaId":"A2BD5920-1705-491C-B23A-AD4929B0902F"},{"vulnerable":true,"criteria":"cpe:2.3:a:cloudbees:jenkins:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"1.424.0","versionEndExcluding":"1.424.2.1","matchCriteriaId":"6EFD9076-D5DE-45D3-A8B7-6F30FD144D22"},{"vulnerable":true,"criteria":"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*","versionEndExcluding":"1.424.2","matchCriteriaId":"B5173CE5-0232-424F-ACB6-DF2F3A42C293"},{"vulnerable":true,"criteria":"cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*","versionEndExcluding":"1.447","matchCriteriaId":"0A27C3A8-57F9-4D0B-A027-F035641F1AB1"}]}]}],"references":[{"url":"http://www.openwall.com/lists/oss-security/2012/01/20/8","source":"secalert@redhat.com","tags":["Mailing List","Third Party Advisory"]},{"url":"https://access.redhat.com/security/cve/cve-2012-0785","source":"secalert@redhat.com","tags":["Broken Link"]},{"url":"https://jenkins.io/security/advisory/2012-01-12/","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"https://security-tracker.debian.org/tracker/CVE-2012-0785","source":"secalert@redhat.com","tags":["Third Party Advisory"]},{"url":"https://www.cloudbees.com/jenkins-security-advisory-2012-01-12","source":"secalert@redhat.com","tags":["Third Party Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2012/01/20/8","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://access.redhat.com/security/cve/cve-2012-0785","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"https://jenkins.io/security/advisory/2012-01-12/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://security-tracker.debian.org/tracker/CVE-2012-0785","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.cloudbees.com/jenkins-security-advisory-2012-01-12","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}