Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2013-0328 First vendor Publication 2013-03-19
Vendor Cve Last vendor Modification 2023-02-13

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Cross-site scripting (XSS) vulnerability in Jenkins before 1.502 and LTS before 1.480.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0328

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-352 Cross-Site Request Forgery (CSRF) (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 555

Nessus® Vulnerability Scanner

Date Description
2013-03-06 Name : The remote web server hosts a job scheduling / management system that is affe...
File : jenkins_1_502.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/57994
CONFIRM http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-02-1...
https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-0...
MISC https://bugzilla.redhat.com/show_bug.cgi?id=914876
MLIST http://www.openwall.com/lists/oss-security/2013/02/21/7
REDHAT http://rhn.redhat.com/errata/RHSA-2013-0638.html

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
Date Informations
2024-02-02 01:21:41
  • Multiple Updates
2024-02-01 12:06:21
  • Multiple Updates
2023-09-05 12:20:29
  • Multiple Updates
2023-09-05 01:06:16
  • Multiple Updates
2023-09-02 12:20:30
  • Multiple Updates
2023-09-02 01:06:21
  • Multiple Updates
2023-08-12 12:24:32
  • Multiple Updates
2023-08-12 01:06:23
  • Multiple Updates
2023-08-11 12:20:39
  • Multiple Updates
2023-08-11 01:06:33
  • Multiple Updates
2023-08-06 12:19:52
  • Multiple Updates
2023-08-06 01:06:23
  • Multiple Updates
2023-08-04 12:19:56
  • Multiple Updates
2023-08-04 01:06:26
  • Multiple Updates
2023-07-14 12:19:55
  • Multiple Updates
2023-07-14 01:06:20
  • Multiple Updates
2023-03-29 01:21:53
  • Multiple Updates
2023-03-28 12:06:28
  • Multiple Updates
2023-02-13 09:28:31
  • Multiple Updates
2023-02-02 17:28:11
  • Multiple Updates
2022-10-11 12:17:48
  • Multiple Updates
2022-10-11 01:06:03
  • Multiple Updates
2021-05-04 12:23:21
  • Multiple Updates
2021-04-22 01:27:54
  • Multiple Updates
2020-09-05 01:08:35
  • Multiple Updates
2020-05-24 01:10:11
  • Multiple Updates
2020-05-23 00:35:44
  • Multiple Updates
2019-07-09 12:04:56
  • Multiple Updates
2019-05-09 12:05:03
  • Multiple Updates
2019-04-26 12:04:52
  • Multiple Updates
2018-10-31 01:04:41
  • Multiple Updates
2018-04-07 12:04:57
  • Multiple Updates
2018-03-20 01:02:26
  • Multiple Updates
2017-08-05 12:04:59
  • Multiple Updates
2016-06-28 19:16:11
  • Multiple Updates
2016-06-13 21:26:36
  • Multiple Updates
2016-06-11 09:25:37
  • Multiple Updates
2016-03-24 17:22:59
  • Multiple Updates
2014-02-17 11:15:35
  • Multiple Updates
2013-05-10 22:28:07
  • Multiple Updates
2013-03-21 17:18:30
  • Multiple Updates
2013-03-19 17:19:27
  • First insertion