{"url":"http://public2.vulnerablecode.io/api/packages/54521?format=json","purl":"pkg:maven/org.jenkins-ci.main/jenkins-core@1.513","type":"maven","namespace":"org.jenkins-ci.main","name":"jenkins-core","version":"1.513","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"1.514","latest_non_vulnerable_version":"2.555","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57793?format=json","vulnerability_id":"VCID-rrwv-dzq7-9ybd","summary":"Jenkins Cross-Site Request Forgery vulnerabilities\nMultiple cross-site request forgery (CSRF) vulnerabilities in Jenkins before 1.514, LTS before 1.509.1, and Enterprise 1.466.x before 1.466.14.1 and 1.480.x before 1.480.4.1 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary code or (2) initiate deployment of binaries to a Maven repository via unspecified vectors.","references":[{"reference_url":"https://access.redhat.com/errata/RHEA-2013:1032","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHEA-2013:1032"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2034.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2034.json"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2013-2034","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/security/cve/CVE-2013-2034"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2034","reference_id":"","reference_type":"","scores":[{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.55976","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56093","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56128","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.5613","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.561","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56026","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56047","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56023","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.55955","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56066","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56086","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56065","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56117","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56122","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56133","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.5611","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2034"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=958958","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=958958"},{"reference_url":"https://issues.jenkins-ci.org/browse/SECURITY-63","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://issues.jenkins-ci.org/browse/SECURITY-63"},{"reference_url":"https://issues.jenkins-ci.org/browse/SECURITY-69","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://issues.jenkins-ci.org/browse/SECURITY-69"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2034","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2034"},{"reference_url":"https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-05-02","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-05-02"},{"reference_url":"http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-05-02.cb","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-05-02.cb"},{"reference_url":"https://github.com/advisories/GHSA-fg4r-f9j2-36mw","reference_id":"GHSA-fg4r-f9j2-36mw","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-fg4r-f9j2-36mw"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/54524?format=json","purl":"pkg:maven/org.jenkins-ci.main/jenkins-core@1.514","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.514"}],"aliases":["CVE-2013-2034","GHSA-fg4r-f9j2-36mw"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rrwv-dzq7-9ybd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/15472?format=json","vulnerability_id":"VCID-z46p-c93u-auav","summary":"Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nCVE-2013-2033 Jenkins: Build Description XSS","references":[{"reference_url":"https://access.redhat.com/errata/RHEA-2013:1032","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHEA-2013:1032"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2033.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2033.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2033","reference_id":"","reference_type":"","scores":[{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.38926","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39398","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39369","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39282","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.3908","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39061","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.3898","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.38854","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39209","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39382","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39406","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.3932","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39375","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39392","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39403","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39364","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39346","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2033"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=958957","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=958957"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/84004","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/84004"},{"reference_url":"https://issues.jenkins-ci.org/browse/SECURITY-67","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://issues.jenkins-ci.org/browse/SECURITY-67"},{"reference_url":"https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-05-02","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-05-02"},{"reference_url":"http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-05-02.cb","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-05-02.cb"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2013-2033","reference_id":"CVE-2013-2033","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/security/cve/CVE-2013-2033"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2033","reference_id":"CVE-2013-2033","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2033"},{"reference_url":"https://github.com/advisories/GHSA-826f-32qm-vm3j","reference_id":"GHSA-826f-32qm-vm3j","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-826f-32qm-vm3j"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/54524?format=json","purl":"pkg:maven/org.jenkins-ci.main/jenkins-core@1.514","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.514"}],"aliases":["CVE-2013-2033","GHSA-826f-32qm-vm3j"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z46p-c93u-auav"}],"fixing_vulnerabilities":[],"risk_score":"3.1","resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@1.513"}