{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T14:47:56.745","vulnerabilities":[{"cve":{"id":"CVE-2020-2125","sourceIdentifier":"jenkinsci-cert@googlegroups.com","published":"2020-02-12T15:15:13.977","lastModified":"2024-11-21T05:24:43.327","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Jenkins Debian Package Builder Plugin 1.6.11 and earlier stores a GPG passphrase unencrypted in its global configuration file on the Jenkins master where it can be viewed by users with access to the master file system."},{"lang":"es","value":"Jenkins Debian Package Builder Plugin versiones 1.6.11 y anteriores, almacenan una frase de contraseña GPG sin cifrar en su archivo de configuración global en el maestro Jenkins, donde puede ser visualizada por parte de usuarios con acceso al sistema de archivos maestro."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-522"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jenkins:debian_package_builder:*:*:*:*:*:jenkins:*:*","versionEndIncluding":"1.6.11","matchCriteriaId":"F440EA12-51A6-4874-AC77-2D0F215C76D5"}]}]}],"references":[{"url":"http://www.openwall.com/lists/oss-security/2020/02/12/3","source":"jenkinsci-cert@googlegroups.com","tags":["Mailing List","Third Party Advisory"]},{"url":"https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1558","source":"jenkinsci-cert@googlegroups.com","tags":["Vendor Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2020/02/12/3","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1558","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}