6.1

CVE-2017-1000109

The custom Details view of the Static Analysis Utilities based OWASP Dependency-Check Plugin, was vulnerable to a persisted cross-site scripting vulnerability: Malicious users able to influence the input to this plugin could insert arbitrary HTML into this view.

Data is provided by the National Vulnerability Database (NVD)
JenkinsOwasp Dependency-check Version1.0.1 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.0.1.1 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.0.2 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.0.3 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.0.4 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.0.4.1 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.0.5 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.0.7 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.0.8 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.1.0 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.1.1 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.1.1.1 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.1.1.2 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.1.2 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.1.3 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.1.4 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.1.4.1 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.2.0 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.2.1 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.2.2 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.2.3 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.2.3.1 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.2.3.2 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.2.4 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.2.5 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.2.6 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.2.7 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.2.7.1 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.2.8 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.2.9 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.2.10 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.2.11 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.2.11.1 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.3.0 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.3.1 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.3.1.1 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.3.1.2 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.3.2 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.3.3 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.3.4 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.3.5 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.3.6 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.4.0 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.4.1 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.4.2 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.4.3 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.4.4 SwPlatformjenkins
JenkinsOwasp Dependency-check Version1.4.5 SwPlatformjenkins
JenkinsOwasp Dependency-check Version2.0.0 SwPlatformjenkins
JenkinsOwasp Dependency-check Version2.0.1 SwPlatformjenkins
JenkinsOwasp Dependency-check Version2.0.1.1 SwPlatformjenkins
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.05% 0.137
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.1 2.8 2.7
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:P/A:N
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.