Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.jenkins-ci.plugins/junit@1166.1168.vd6b_8042a_06de
purl pkg:maven/org.jenkins-ci.plugins/junit@1166.1168.vd6b_8042a_06de
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-quvj-3tpk-qug1 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Jenkins JUnit Plugin 1166.va_436e268e972 and earlier does not escape test case class names in JavaScript expressions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control test case class names in the JUnit resources processed by the plugin. CVE-2023-25761
GHSA-ph74-8rgx-64c5

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-02T16:58:57.609992+00:00 GHSA Importer Fixing VCID-quvj-3tpk-qug1 https://github.com/advisories/GHSA-ph74-8rgx-64c5 38.1.0
2026-04-01T12:58:21.656998+00:00 GithubOSV Importer Fixing VCID-quvj-3tpk-qug1 https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/02/GHSA-ph74-8rgx-64c5/GHSA-ph74-8rgx-64c5.json 38.0.0