Логотип exploitDog
bind:"GHSA-2pqj-h3vj-pqgw" OR bind:"CVE-2012-6708"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-2pqj-h3vj-pqgw" OR bind:"CVE-2012-6708"

Количество 9

Количество 9

github логотип

GHSA-2pqj-h3vj-pqgw

почти 5 лет назад

Cross-Site Scripting in jquery

CVSS3: 6.1
EPSS: Низкий
ubuntu логотип

CVE-2012-6708

больше 7 лет назад

jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.

CVSS3: 6.1
EPSS: Низкий
redhat логотип

CVE-2012-6708

около 8 лет назад

jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.

CVSS3: 6.8
EPSS: Низкий
nvd логотип

CVE-2012-6708

больше 7 лет назад

jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.

CVSS3: 6.1
EPSS: Низкий
msrc логотип

CVE-2012-6708

5 месяцев назад

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2012-6708

больше 7 лет назад

jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attack ...

CVSS3: 6.1
EPSS: Низкий
fstec логотип

BDU:2023-07702

больше 13 лет назад

Уязвимость библиотеки jQuery, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю выполнить межсайтовй скриптинг

CVSS3: 6.1
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:0395-1

около 5 лет назад

Recommended update for ruby2.5

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0737-1

около 5 лет назад

Recommended update for ruby2.5

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-2pqj-h3vj-pqgw

Cross-Site Scripting in jquery

CVSS3: 6.1
1%
Низкий
почти 5 лет назад
ubuntu логотип
CVE-2012-6708

jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.

CVSS3: 6.1
1%
Низкий
больше 7 лет назад
redhat логотип
CVE-2012-6708

jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.

CVSS3: 6.8
1%
Низкий
около 8 лет назад
nvd логотип
CVE-2012-6708

jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.

CVSS3: 6.1
1%
Низкий
больше 7 лет назад
msrc логотип
CVSS3: 6.1
1%
Низкий
5 месяцев назад
debian логотип
CVE-2012-6708

jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attack ...

CVSS3: 6.1
1%
Низкий
больше 7 лет назад
fstec логотип
BDU:2023-07702

Уязвимость библиотеки jQuery, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю выполнить межсайтовй скриптинг

CVSS3: 6.1
1%
Низкий
больше 13 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0395-1

Recommended update for ruby2.5

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:0737-1

Recommended update for ruby2.5

около 5 лет назад

Уязвимостей на страницу