Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-6708

Опубликовано: 18 янв. 2018
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.3
CVSS3: 6.1

Описание

jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.

РелизСтатусПримечание
artful

not-affected

3.1.1-2
bionic

not-affected

cosmic

not-affected

devel

DNE

disco

not-affected

eoan

not-affected

esm-infra-legacy/trusty

needed

esm-infra/bionic

not-affected

esm-infra/focal

not-affected

esm-infra/xenial

not-affected

1.11.3+dfsg-4

Показывать по

EPSS

Процентиль: 79%
0.01354
Низкий

4.3 Medium

CVSS2

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.8
redhat
около 8 лет назад

jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.

CVSS3: 6.1
nvd
больше 7 лет назад

jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.

CVSS3: 6.1
msrc
5 месяцев назад

Описание отсутствует

CVSS3: 6.1
debian
больше 7 лет назад

jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attack ...

CVSS3: 6.1
github
почти 5 лет назад

Cross-Site Scripting in jquery

EPSS

Процентиль: 79%
0.01354
Низкий

4.3 Medium

CVSS2

6.1 Medium

CVSS3