Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.webjars.npm/jquery@1.7.1
Typemaven
Namespaceorg.webjars.npm
Namejquery
Version1.7.1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version3.5.0
Latest_non_vulnerable_version3.5.0
Affected_by_vulnerabilities
0
url VCID-xdph-4cg9-6qah
vulnerability_id VCID-xdph-4cg9-6qah
summary The jQuery library, which is included in rdoc, is vulnerable to Cross-site Scripting (XSS) attacks. jQuery only deems the input to be HTML if it explicitly starts with the `<` character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html
1
reference_url http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html
2
reference_url http://packetstormsecurity.com/files/161972/Linksys-EA7500-2.0.8.194281-Cross-Site-Scripting.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://packetstormsecurity.com/files/161972/Linksys-EA7500-2.0.8.194281-Cross-Site-Scripting.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6708.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6708.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6708
reference_id
reference_type
scores
0
value 0.00902
scoring_system epss
scoring_elements 0.75641
published_at 2026-04-07T12:55:00Z
1
value 0.00902
scoring_system epss
scoring_elements 0.75661
published_at 2026-04-04T12:55:00Z
2
value 0.00902
scoring_system epss
scoring_elements 0.7563
published_at 2026-04-02T12:55:00Z
3
value 0.00902
scoring_system epss
scoring_elements 0.75628
published_at 2026-04-01T12:55:00Z
4
value 0.00902
scoring_system epss
scoring_elements 0.75723
published_at 2026-04-16T12:55:00Z
5
value 0.00902
scoring_system epss
scoring_elements 0.75686
published_at 2026-04-09T12:55:00Z
6
value 0.00902
scoring_system epss
scoring_elements 0.75675
published_at 2026-04-08T12:55:00Z
7
value 0.00902
scoring_system epss
scoring_elements 0.75685
published_at 2026-04-13T12:55:00Z
8
value 0.00919
scoring_system epss
scoring_elements 0.75954
published_at 2026-04-12T12:55:00Z
9
value 0.00919
scoring_system epss
scoring_elements 0.75977
published_at 2026-04-11T12:55:00Z
10
value 0.00927
scoring_system epss
scoring_elements 0.76069
published_at 2026-04-21T12:55:00Z
11
value 0.00927
scoring_system epss
scoring_elements 0.76085
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6708
5
reference_url https://bugs.jquery.com/ticket/11290
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugs.jquery.com/ticket/11290
6
reference_url https://bugs.jquery.com/ticket/12531
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugs.jquery.com/ticket/12531
7
reference_url https://bugs.jquery.com/ticket/6429
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugs.jquery.com/ticket/6429
8
reference_url https://bugs.jquery.com/ticket/9521
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugs.jquery.com/ticket/9521
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://github.com/jquery/jquery
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jquery/jquery
11
reference_url https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d
12
reference_url https://github.com/rails/jquery-rails/blob/v2.1.4/vendor/assets/javascripts/jquery.js#L59
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/jquery-rails/blob/v2.1.4/vendor/assets/javascripts/jquery.js#L59
13
reference_url https://github.com/rails/jquery-rails/blob/v2.2.0/vendor/assets/javascripts/jquery.js#L67
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/jquery-rails/blob/v2.2.0/vendor/assets/javascripts/jquery.js#L67
14
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-rails/CVE-2012-6708.yml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-rails/CVE-2012-6708.yml
15
reference_url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
16
reference_url https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E
19
reference_url https://nvd.nist.gov/vuln/detail/cve-2012-6708
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements
url https://nvd.nist.gov/vuln/detail/cve-2012-6708
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-6708
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2012-6708
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-16011
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-16011
22
reference_url https://research.insecurelabs.org/jquery/test
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://research.insecurelabs.org/jquery/test
23
reference_url https://research.insecurelabs.org/jquery/test/
reference_id
reference_type
scores
url https://research.insecurelabs.org/jquery/test/
24
reference_url https://security.snyk.io/vuln/SNYK-DOTNET-JQUERY-450223
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.snyk.io/vuln/SNYK-DOTNET-JQUERY-450223
25
reference_url https://snyk.io/vuln/npm:jquery:20120206
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://snyk.io/vuln/npm:jquery:20120206
26
reference_url https://web.archive.org/web/20200227132049/http://www.securityfocus.com/bid/102792
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20200227132049/http://www.securityfocus.com/bid/102792
27
reference_url https://www.npmjs.com/advisories/329
reference_id
reference_type
scores
url https://www.npmjs.com/advisories/329
28
reference_url https://www.ruby-lang.org/en/news/2019/08/28/multiple-jquery-vulnerabilities-in-rdoc/
reference_id
reference_type
scores
url https://www.ruby-lang.org/en/news/2019/08/28/multiple-jquery-vulnerabilities-in-rdoc/
29
reference_url http://www.securityfocus.com/bid/102792
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102792
30
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1591840
reference_id 1591840
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1591840
31
reference_url https://security.archlinux.org/ASA-201910-4
reference_id ASA-201910-4
reference_type
scores
url https://security.archlinux.org/ASA-201910-4
32
reference_url https://security.archlinux.org/AVG-1041
reference_id AVG-1041
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1041
33
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/hardware/webapps/49708.txt
reference_id CVE-2012-6708
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/hardware/webapps/49708.txt
34
reference_url https://github.com/advisories/GHSA-2pqj-h3vj-pqgw
reference_id GHSA-2pqj-h3vj-pqgw
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-2pqj-h3vj-pqgw
35
reference_url https://usn.ubuntu.com/7622-1/
reference_id USN-7622-1
reference_type
scores
url https://usn.ubuntu.com/7622-1/
fixed_packages
0
url pkg:maven/org.webjars.npm/jquery@1.9.0
purl pkg:maven/org.webjars.npm/jquery@1.9.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.webjars.npm/jquery@1.9.0
1
url pkg:maven/org.webjars.npm/jquery@1.9.1
purl pkg:maven/org.webjars.npm/jquery@1.9.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3s9f-prpy-hbcx
1
vulnerability VCID-5618-53yg-8qh4
2
vulnerability VCID-8mpx-4ueh-qqfv
3
vulnerability VCID-cvxp-ctj9-guej
4
vulnerability VCID-tmjp-8edk-nyh3
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.webjars.npm/jquery@1.9.1
aliases CVE-2012-6708, GHSA-2pqj-h3vj-pqgw
risk_score 10.0
exploitability 2.0
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xdph-4cg9-6qah
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.webjars.npm/jquery@1.7.1