Search for packages
| purl | pkg:maven/org.jenkins-ci.plugins/junit@1119.va_a_5e9068da_d7 |
| Next non-vulnerable version | 1119.1121.vc43d0fc45561 |
| Latest non-vulnerable version | 1166.1168.vd6b_8042a_06de |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-tt48-pfzv-mkgt
Aliases: CVE-2022-34176 GHSA-64mj-3p92-589v |
Cross-site Scripting in Jenkins JUnit Plugin JUnit Plugin 1119.va_a_5e9068da_d7 and earlier does not escape descriptions of test results. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Run/Update permission. JUnit Plugin 1119.1121.vc43d0fc45561 applies the configured markup formatter to descriptions of test results. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-03T21:27:13.852773+00:00 | GitLab Importer | Affected by | VCID-tt48-pfzv-mkgt | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.jenkins-ci.plugins/junit/CVE-2022-34176.yml | 38.1.0 |