CVE-2011-4969
 
Severity Score
4.3
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Cross-site scripting (XSS) vulnerability in jQuery before 1.6.3, when using location.hash to select elements, allows remote attackers to inject arbitrary web script or HTML via a crafted tag.
Una vulnerabilidad de ejecución de comandos en sitios cruzados (XSS) en jQuery antes de v1.6.3, cuando se seleccionan elementos location.hash, permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de una etiqueta hecha a mano.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2011-12-23 CVE Reserved
- 2013-02-13 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-07 CVE Updated
- 2024-08-07 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (14)
URL | Tag | Source |
---|---|---|
http://blog.jquery.com/2011/09/01/jquery-1-6-3-released | X_refsource_confirm | |
http://blog.mindedsecurity.com/2011/07/jquery-is-sink.html | X_refsource_misc | |
http://bugs.jquery.com/ticket/9521 | X_refsource_confirm | |
http://www.openwall.com/lists/oss-security/2013/01/31/3 | Mailing List | |
http://www.osvdb.org/80056 | Vdb Entry | |
http://www.securityfocus.com/bid/58458 | Vdb Entry | |
http://www.securitytracker.com/id/1036620 | Vdb Entry | |
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017 | X_refsource_confirm | |
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380 | X_refsource_confirm | |
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05232730 | X_refsource_confirm | |
https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E | Mailing List | |
https://security.netapp.com/advisory/ntap-20190416-0007 | X_refsource_confirm |
URL | Date | SRC |
---|---|---|
https://github.com/jquery/jquery/commit/db9e023e62c1ff5d8f21ed9868ab6878da2005e9 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.ubuntu.com/usn/USN-1722-1 | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Jquery Search vendor "Jquery" | Jquery Search vendor "Jquery" for product "Jquery" | <= 1.6.2 Search vendor "Jquery" for product "Jquery" and version " <= 1.6.2" | - |
Affected
| ||||||
Jquery Search vendor "Jquery" | Jquery Search vendor "Jquery" for product "Jquery" | 1.6 Search vendor "Jquery" for product "Jquery" and version "1.6" | - |
Affected
| ||||||
Jquery Search vendor "Jquery" | Jquery Search vendor "Jquery" for product "Jquery" | 1.6.1 Search vendor "Jquery" for product "Jquery" and version "1.6.1" | - |
Affected
|