Search for packages
| purl | pkg:maven/org.jenkins-ci.plugins/junit@1166.1168.vd6b_8042a_06de |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-quvj-3tpk-qug1 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Jenkins JUnit Plugin 1166.va_436e268e972 and earlier does not escape test case class names in JavaScript expressions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control test case class names in the JUnit resources processed by the plugin. |
CVE-2023-25761
GHSA-ph74-8rgx-64c5 |
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-02T16:58:57.609992+00:00 | GHSA Importer | Fixing | VCID-quvj-3tpk-qug1 | https://github.com/advisories/GHSA-ph74-8rgx-64c5 | 38.1.0 |
| 2026-04-01T12:58:21.656998+00:00 | GithubOSV Importer | Fixing | VCID-quvj-3tpk-qug1 | https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/02/GHSA-ph74-8rgx-64c5/GHSA-ph74-8rgx-64c5.json | 38.0.0 |