{"id":"CVE-2019-10410","details":"Jenkins Log Parser Plugin 2.0 and earlier did not escape an error message, resulting in a cross-site scripting vulnerability exploitable by users able to define log parsing rules.","aliases":["GHSA-xqqw-cqjp-52xm"],"modified":"2026-03-14T00:45:00.001880Z","published":"2019-09-25T16:15:11.040Z","references":[{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2019/09/25/3"},{"type":"ADVISORY","url":"https://jenkins.io/security/advisory/2019-09-25/#SECURITY-732"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jenkinsci/log-parser-plugin","events":[{"introduced":"0"},{"last_affected":"f97a92d01c7dc3b71160497d71645bd0a7ddb25a"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.0"}]}}],"versions":["log-parser-2.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-10410.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}]}