Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2011-4344 First vendor Publication 2011-12-01
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:H/Au:N/C:N/I:P/A:N)
Cvss Base Score 2.6 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity High
Cvss Expoit Score 4.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Cross-site scripting (XSS) vulnerability in Jenkins Core in Jenkins before 1.438, and 1.409 LTS before 1.409.3 LTS, when a stand-alone container is used, allows remote attackers to inject arbitrary web script or HTML via vectors related to error messages.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4344

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 473

Open Source Vulnerability Database (OSVDB)

Id Description
77314 Jenkins winstone Servlet Container Error Message XSS

Sources (Detail)

http://groups.google.com/group/jenkinsci-advisories/msg/1b94588f90f876b5?dmod...
http://openwall.com/lists/oss-security/2011/11/23/5
http://openwall.com/lists/oss-security/2011/11/23/6
http://secunia.com/advisories/46911
http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2011-11-0...
http://www.securityfocus.com/bid/50786
https://github.com/jenkinsci/winstone/commit/410ed3001d51c689cf59085b7417466c...
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
Date Informations
2024-11-28 23:03:27
  • Multiple Updates
2024-11-28 12:27:47
  • Multiple Updates
2023-08-12 12:20:13
  • Multiple Updates
2023-08-12 01:05:11
  • Multiple Updates
2023-08-11 12:16:43
  • Multiple Updates
2023-08-11 01:05:21
  • Multiple Updates
2023-08-06 12:16:04
  • Multiple Updates
2023-08-06 01:05:11
  • Multiple Updates
2023-08-04 12:16:08
  • Multiple Updates
2023-08-04 01:05:12
  • Multiple Updates
2023-07-14 12:16:07
  • Multiple Updates
2023-07-14 01:05:09
  • Multiple Updates
2023-03-29 01:18:01
  • Multiple Updates
2023-03-28 12:05:17
  • Multiple Updates
2021-05-04 12:17:51
  • Multiple Updates
2021-04-22 01:21:09
  • Multiple Updates
2020-09-05 01:07:02
  • Multiple Updates
2020-05-23 01:47:31
  • Multiple Updates
2020-05-23 00:32:12
  • Multiple Updates
2019-07-09 12:04:13
  • Multiple Updates
2019-05-09 12:04:20
  • Multiple Updates
2019-04-26 12:04:12
  • Multiple Updates
2018-10-31 01:04:03
  • Multiple Updates
2018-04-07 12:04:18
  • Multiple Updates
2018-03-21 12:01:47
  • Multiple Updates
2016-06-29 00:23:35
  • Multiple Updates
2016-06-13 21:26:33
  • Multiple Updates
2016-06-11 09:25:29
  • Multiple Updates
2016-04-26 21:14:00
  • Multiple Updates
2013-05-10 23:10:32
  • Multiple Updates