{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-25T17:27:22.892","vulnerabilities":[{"cve":{"id":"CVE-2013-0327","sourceIdentifier":"secalert@redhat.com","published":"2013-03-19T14:55:02.763","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site request forgery (CSRF) vulnerability in Jenkins master in Jenkins before 1.502 and LTS before 1.480.3 allows remote attackers to hijack the authentication of users via unknown vectors."},{"lang":"es","value":"Vulnerabilidad de CSRF en el maestro de Jenkins en Jenkins en versiones anteriores a 1.502 y LTS en versiones anteriores a 1.480.3 permite a atacantes remotos secuestra la autenticación de usuarios a través de vectores desconocidos."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-352"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*","versionEndIncluding":"1.501","matchCriteriaId":"5815F006-F668-40CD-B26C-AF3F9AD2C7F9"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*","versionEndIncluding":"1.480.2","matchCriteriaId":"BE5658A1-4CC2-4F73-BBD9-63B7A82CD78C"}]}]}],"references":[{"url":"http://rhn.redhat.com/errata/RHSA-2013-0638.html","source":"secalert@redhat.com"},{"url":"http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-02-16.cb","source":"secalert@redhat.com"},{"url":"http://www.openwall.com/lists/oss-security/2013/02/21/7","source":"secalert@redhat.com"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=914875","source":"secalert@redhat.com"},{"url":"https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-02-16","source":"secalert@redhat.com"},{"url":"http://rhn.redhat.com/errata/RHSA-2013-0638.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-02-16.cb","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2013/02/21/7","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=914875","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-02-16","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}