Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.jenkins-ci.plugins/junit@1119.va_a_5e9068da_d7
purl pkg:maven/org.jenkins-ci.plugins/junit@1119.va_a_5e9068da_d7
Next non-vulnerable version 1119.1121.vc43d0fc45561
Latest non-vulnerable version 1166.1168.vd6b_8042a_06de
Risk 4.0
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-tt48-pfzv-mkgt
Aliases:
CVE-2022-34176
GHSA-64mj-3p92-589v
Cross-site Scripting in Jenkins JUnit Plugin JUnit Plugin 1119.va_a_5e9068da_d7 and earlier does not escape descriptions of test results. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Run/Update permission. JUnit Plugin 1119.1121.vc43d0fc45561 applies the configured markup formatter to descriptions of test results.
1119.1121.vc43d0fc45561
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-03T21:27:13.852773+00:00 GitLab Importer Affected by VCID-tt48-pfzv-mkgt https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.jenkins-ci.plugins/junit/CVE-2022-34176.yml 38.1.0