{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T15:44:53.596","vulnerabilities":[{"cve":{"id":"CVE-2019-16564","sourceIdentifier":"jenkinsci-cert@googlegroups.com","published":"2019-12-17T15:15:20.193","lastModified":"2024-11-21T04:30:50.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Jenkins Pipeline Aggregator View Plugin 1.8 and earlier does not escape information shown on its view, resulting in a stored XSS vulnerability exploitable by attackers able to affects view content such as job display name or pipeline stage names."},{"lang":"es","value":"Jenkins Pipeline Aggregator View Plugin versión 1.8 y anteriores, no escapan a la información mostrada en su vista, resultando en una vulnerabilidad de tipo XSS almacenado explotable por parte de los atacantes capaces de afectar el contenido de la vista, tales como el nombre a desplegar del trabajo o los nombres de etapa de la tubería."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jenkins:pipeline_aggregator_view:*:*:*:*:*:jenkins:*:*","versionEndIncluding":"1.8","matchCriteriaId":"D14A6FB7-4679-458B-A375-817E188B9D91"}]}]}],"references":[{"url":"http://www.openwall.com/lists/oss-security/2019/12/17/1","source":"jenkinsci-cert@googlegroups.com","tags":["Mailing List","Third Party Advisory"]},{"url":"https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1593","source":"jenkinsci-cert@googlegroups.com","tags":["Vendor Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2019/12/17/1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1593","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}