Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2410 | Jenkins TAP Plugin 2.3 and earlier does not escape TAP file contents, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control TAP file contents. |
Github GHSA |
GHSA-3vcr-579j-4x48 | Stored XSS vulnerability in Jenkins TAP Plugin |
Fri, 27 Sep 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-09-27T19:48:04.346Z
Reserved: 2023-09-05T16:39:57.394Z
Link: CVE-2023-41940
Updated: 2024-08-02T19:09:49.272Z
Status : Modified
Published: 2023-09-06T13:15:11.027
Modified: 2024-11-21T08:21:57.853
Link: CVE-2023-41940
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA