Worksoft Execution Manager Plugin up to 10.0.3.503 on Jenkins cross-site request forgery

A vulnerability was found in Worksoft Execution Manager Plugin up to 10.0.3.503 on Jenkins (Jenkins Plugin). It has been declared as problematic. Affected by this vulnerability is some unknown functionality. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

127

Field

exploit_price_0day1
vulnerability_cvss3_meta_tempscore1
vulnerability_cvss3_meta_basescore1
vulnerability_cvss3_vuldb_tempscore1
vulnerability_cvss3_vuldb_basescore1

Commit Conf

90%37
50%11

Approve Conf

90%37
80%11
IDCommitedUserFieldChangeRemarksAcceptedReasonC
1302428209/23/2022VulD...price_0day$0-$5ksee exploit price documentation09/23/2022accepted
90
1302428109/23/2022VulD...cvss3_meta_tempscore6.5see CVSS documentation09/23/2022accepted
90
1302428009/23/2022VulD...cvss3_meta_basescore6.5see CVSS documentation09/23/2022accepted
90
1302427909/23/2022VulD...cvss3_vuldb_tempscore4.3see CVSS documentation09/23/2022accepted
90
1302427809/23/2022VulD...cvss3_vuldb_basescore4.3see CVSS documentation09/23/2022accepted
90
1302427709/23/2022VulD...cvss2_vuldb_tempscore5.0see CVSS documentation09/23/2022accepted
90
1302427609/23/2022VulD...cvss2_vuldb_basescore5.0see CVSS documentation09/23/2022accepted
90
1302427509/23/2022VulD...cvss3_nvd_basescore8.8nist.gov09/23/2022accepted
90
1302427409/23/2022VulD...cvss3_vuldb_rlXderived from historical data09/23/2022accepted
80
1302427309/23/2022VulD...cvss3_vuldb_eXderived from historical data09/23/2022accepted
80
1302427209/23/2022VulD...cvss2_vuldb_rlNDderived from historical data09/23/2022accepted
80
1302427109/23/2022VulD...cvss2_vuldb_eNDderived from historical data09/23/2022accepted
80
1302427009/23/2022VulD...cvss2_vuldb_rcCderived from vuldb v3 vector09/23/2022accepted
80
1302426909/23/2022VulD...cvss2_vuldb_aiNderived from vuldb v3 vector09/23/2022accepted
80
1302426809/23/2022VulD...cvss2_vuldb_iiPderived from vuldb v3 vector09/23/2022accepted
80
1302426709/23/2022VulD...cvss2_vuldb_ciNderived from vuldb v3 vector09/23/2022accepted
80
1302426609/23/2022VulD...cvss2_vuldb_auNderived from vuldb v3 vector09/23/2022accepted
80
1302426509/23/2022VulD...cvss2_vuldb_acLderived from vuldb v3 vector09/23/2022accepted
80
1302426409/23/2022VulD...cvss2_vuldb_avNderived from vuldb v3 vector09/23/2022accepted
80
1302426309/23/2022VulD...typeJenkins Plugin09/23/2022accepted
90

28 more entries are not shown

Interested in the pricing of exploits?

See the underground prices here!