Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2499 | Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not escape the queue name parameter passed to a form validation URL, when rendering an error message, resulting in an HTML injection vulnerability. |
Github GHSA |
GHSA-g4qf-5523-7wvf | HTML injection vulnerability in Jenkins AWS CodeCommit Trigger Plugin |
Fri, 27 Sep 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-09-27T19:43:56.443Z
Reserved: 2023-09-05T16:39:57.394Z
Link: CVE-2023-41944
Updated: 2024-08-02T19:09:49.271Z
Status : Modified
Published: 2023-09-06T13:15:11.553
Modified: 2024-11-21T08:21:58.337
Link: CVE-2023-41944
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA