Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1073 | Jenkins update-center2 3.13 and 3.14 renders the required Jenkins core version on plugin download index pages without sanitization, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide a plugin for hosting. |
Github GHSA |
GHSA-pqg3-xfx2-fmqp | Cross site scripting vulnerability in update-center2 |
Tue, 04 Mar 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-02-28T18:54:24.407Z
Reserved: 2023-03-07T09:35:48.507Z
Link: CVE-2023-27905
Updated: 2024-08-02T12:23:30.405Z
Status : Modified
Published: 2023-03-10T21:15:15.790
Modified: 2025-02-28T19:15:36.040
Link: CVE-2023-27905
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA