Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.jenkins-ci.main/jenkins-core@1.509.1
Typemaven
Namespaceorg.jenkins-ci.main
Namejenkins-core
Version1.509.1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.514
Latest_non_vulnerable_version2.555
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-rrwv-dzq7-9ybd
vulnerability_id VCID-rrwv-dzq7-9ybd
summary
Jenkins Cross-Site Request Forgery vulnerabilities
Multiple cross-site request forgery (CSRF) vulnerabilities in Jenkins before 1.514, LTS before 1.509.1, and Enterprise 1.466.x before 1.466.14.1 and 1.480.x before 1.480.4.1 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary code or (2) initiate deployment of binaries to a Maven repository via unspecified vectors.
references
0
reference_url https://access.redhat.com/errata/RHEA-2013:1032
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHEA-2013:1032
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2034.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2034.json
2
reference_url https://access.redhat.com/security/cve/CVE-2013-2034
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2013-2034
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2034
reference_id
reference_type
scores
0
value 0.00332
scoring_system epss
scoring_elements 0.561
published_at 2026-04-21T12:55:00Z
1
value 0.00332
scoring_system epss
scoring_elements 0.56117
published_at 2026-04-08T12:55:00Z
2
value 0.00332
scoring_system epss
scoring_elements 0.56122
published_at 2026-04-09T12:55:00Z
3
value 0.00332
scoring_system epss
scoring_elements 0.56133
published_at 2026-04-11T12:55:00Z
4
value 0.00332
scoring_system epss
scoring_elements 0.5611
published_at 2026-04-12T12:55:00Z
5
value 0.00332
scoring_system epss
scoring_elements 0.56093
published_at 2026-04-13T12:55:00Z
6
value 0.00332
scoring_system epss
scoring_elements 0.56128
published_at 2026-04-16T12:55:00Z
7
value 0.00332
scoring_system epss
scoring_elements 0.5613
published_at 2026-04-18T12:55:00Z
8
value 0.00332
scoring_system epss
scoring_elements 0.55955
published_at 2026-04-01T12:55:00Z
9
value 0.00332
scoring_system epss
scoring_elements 0.56066
published_at 2026-04-02T12:55:00Z
10
value 0.00332
scoring_system epss
scoring_elements 0.56086
published_at 2026-04-04T12:55:00Z
11
value 0.00332
scoring_system epss
scoring_elements 0.56065
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2034
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=958958
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=958958
5
reference_url https://issues.jenkins-ci.org/browse/SECURITY-63
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://issues.jenkins-ci.org/browse/SECURITY-63
6
reference_url https://issues.jenkins-ci.org/browse/SECURITY-69
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://issues.jenkins-ci.org/browse/SECURITY-69
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2034
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-2034
8
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-05-02
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-05-02
9
reference_url http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-05-02.cb
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-05-02.cb
10
reference_url https://github.com/advisories/GHSA-fg4r-f9j2-36mw
reference_id GHSA-fg4r-f9j2-36mw
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-fg4r-f9j2-36mw
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.509.1
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.509.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.509.1
1
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.514
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.514
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.514
aliases CVE-2013-2034, GHSA-fg4r-f9j2-36mw
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rrwv-dzq7-9ybd
1
url VCID-z46p-c93u-auav
vulnerability_id VCID-z46p-c93u-auav
summary
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2013-2033 Jenkins: Build Description XSS
references
0
reference_url https://access.redhat.com/errata/RHEA-2013:1032
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHEA-2013:1032
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2033.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2033.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2033
reference_id
reference_type
scores
0
value 0.00178
scoring_system epss
scoring_elements 0.39403
published_at 2026-04-11T12:55:00Z
1
value 0.00178
scoring_system epss
scoring_elements 0.39392
published_at 2026-04-09T12:55:00Z
2
value 0.00178
scoring_system epss
scoring_elements 0.39364
published_at 2026-04-12T12:55:00Z
3
value 0.00178
scoring_system epss
scoring_elements 0.39282
published_at 2026-04-21T12:55:00Z
4
value 0.00178
scoring_system epss
scoring_elements 0.39369
published_at 2026-04-18T12:55:00Z
5
value 0.00178
scoring_system epss
scoring_elements 0.39398
published_at 2026-04-16T12:55:00Z
6
value 0.00178
scoring_system epss
scoring_elements 0.39209
published_at 2026-04-01T12:55:00Z
7
value 0.00178
scoring_system epss
scoring_elements 0.39382
published_at 2026-04-02T12:55:00Z
8
value 0.00178
scoring_system epss
scoring_elements 0.39346
published_at 2026-04-13T12:55:00Z
9
value 0.00178
scoring_system epss
scoring_elements 0.39406
published_at 2026-04-04T12:55:00Z
10
value 0.00178
scoring_system epss
scoring_elements 0.3932
published_at 2026-04-07T12:55:00Z
11
value 0.00178
scoring_system epss
scoring_elements 0.39375
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2033
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=958957
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=958957
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/84004
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/84004
5
reference_url https://issues.jenkins-ci.org/browse/SECURITY-67
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://issues.jenkins-ci.org/browse/SECURITY-67
6
reference_url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-05-02
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-05-02
7
reference_url http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-05-02.cb
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-05-02.cb
8
reference_url https://access.redhat.com/security/cve/CVE-2013-2033
reference_id CVE-2013-2033
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2013-2033
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2033
reference_id CVE-2013-2033
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-2033
10
reference_url https://github.com/advisories/GHSA-826f-32qm-vm3j
reference_id GHSA-826f-32qm-vm3j
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-826f-32qm-vm3j
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.509.1
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.509.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.509.1
1
url pkg:maven/org.jenkins-ci.main/jenkins-core@1.514
purl pkg:maven/org.jenkins-ci.main/jenkins-core@1.514
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.514
aliases CVE-2013-2033, GHSA-826f-32qm-vm3j
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z46p-c93u-auav
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.509.1