{"url":"http://public2.vulnerablecode.io/api/packages/23973?format=json","purl":"pkg:npm/jquery@1.7.1","type":"npm","namespace":"","name":"jquery","version":"1.7.1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"3.5.0","latest_non_vulnerable_version":"3.5.0","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/8692?format=json","vulnerability_id":"VCID-xdph-4cg9-6qah","summary":"The jQuery library, which is included in rdoc, is vulnerable to Cross-site Scripting (XSS) attacks. jQuery only deems the input to be HTML if it explicitly starts with the `<` character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html"},{"reference_url":"http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html"},{"reference_url":"http://packetstormsecurity.com/files/161972/Linksys-EA7500-2.0.8.194281-Cross-Site-Scripting.html","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://packetstormsecurity.com/files/161972/Linksys-EA7500-2.0.8.194281-Cross-Site-Scripting.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6708.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6708.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6708","reference_id":"","reference_type":"","scores":[{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75807","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75723","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75685","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75686","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75675","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75641","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75661","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.7563","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75628","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75778","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00919","scoring_system":"epss","scoring_elements":"0.75954","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00919","scoring_system":"epss","scoring_elements":"0.75977","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00927","scoring_system":"epss","scoring_elements":"0.76129","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00927","scoring_system":"epss","scoring_elements":"0.76085","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00927","scoring_system":"epss","scoring_elements":"0.76069","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00927","scoring_system":"epss","scoring_elements":"0.76108","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00927","scoring_system":"epss","scoring_elements":"0.76118","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6708"},{"reference_url":"https://bugs.jquery.com/ticket/11290","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://bugs.jquery.com/ticket/11290"},{"reference_url":"https://bugs.jquery.com/ticket/12531","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://bugs.jquery.com/ticket/12531"},{"reference_url":"https://bugs.jquery.com/ticket/6429","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://bugs.jquery.com/ticket/6429"},{"reference_url":"https://bugs.jquery.com/ticket/9521","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://bugs.jquery.com/ticket/9521"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/jquery/jquery","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/jquery/jquery"},{"reference_url":"https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d"},{"reference_url":"https://github.com/rails/jquery-rails/blob/v2.1.4/vendor/assets/javascripts/jquery.js#L59","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rails/jquery-rails/blob/v2.1.4/vendor/assets/javascripts/jquery.js#L59"},{"reference_url":"https://github.com/rails/jquery-rails/blob/v2.2.0/vendor/assets/javascripts/jquery.js#L67","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rails/jquery-rails/blob/v2.2.0/vendor/assets/javascripts/jquery.js#L67"},{"reference_url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-rails/CVE-2012-6708.yml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-rails/CVE-2012-6708.yml"},{"reference_url":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"},{"reference_url":"https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E"},{"reference_url":"https://nvd.nist.gov/vuln/detail/cve-2012-6708","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/cve-2012-6708"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6708","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6708"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-16011","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-16011"},{"reference_url":"https://research.insecurelabs.org/jquery/test","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://research.insecurelabs.org/jquery/test"},{"reference_url":"https://research.insecurelabs.org/jquery/test/","reference_id":"","reference_type":"","scores":[],"url":"https://research.insecurelabs.org/jquery/test/"},{"reference_url":"https://security.snyk.io/vuln/SNYK-DOTNET-JQUERY-450223","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.snyk.io/vuln/SNYK-DOTNET-JQUERY-450223"},{"reference_url":"https://snyk.io/vuln/npm:jquery:20120206","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://snyk.io/vuln/npm:jquery:20120206"},{"reference_url":"https://web.archive.org/web/20200227132049/http://www.securityfocus.com/bid/102792","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20200227132049/http://www.securityfocus.com/bid/102792"},{"reference_url":"https://www.npmjs.com/advisories/329","reference_id":"","reference_type":"","scores":[],"url":"https://www.npmjs.com/advisories/329"},{"reference_url":"https://www.ruby-lang.org/en/news/2019/08/28/multiple-jquery-vulnerabilities-in-rdoc/","reference_id":"","reference_type":"","scores":[],"url":"https://www.ruby-lang.org/en/news/2019/08/28/multiple-jquery-vulnerabilities-in-rdoc/"},{"reference_url":"http://www.securityfocus.com/bid/102792","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/102792"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1591840","reference_id":"1591840","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1591840"},{"reference_url":"https://security.archlinux.org/ASA-201910-4","reference_id":"ASA-201910-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201910-4"},{"reference_url":"https://security.archlinux.org/AVG-1041","reference_id":"AVG-1041","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1041"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/hardware/webapps/49708.txt","reference_id":"CVE-2012-6708","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/hardware/webapps/49708.txt"},{"reference_url":"https://github.com/advisories/GHSA-2pqj-h3vj-pqgw","reference_id":"GHSA-2pqj-h3vj-pqgw","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-2pqj-h3vj-pqgw"},{"reference_url":"https://usn.ubuntu.com/7622-1/","reference_id":"USN-7622-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7622-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72803?format=json","purl":"pkg:npm/jquery@1.9.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/jquery@1.9.0"},{"url":"http://public2.vulnerablecode.io/api/packages/23975?format=json","purl":"pkg:npm/jquery@1.9.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3s9f-prpy-hbcx"},{"vulnerability":"VCID-5618-53yg-8qh4"},{"vulnerability":"VCID-7efr-3g5x-ryfv"},{"vulnerability":"VCID-8mpx-4ueh-qqfv"},{"vulnerability":"VCID-cvxp-ctj9-guej"},{"vulnerability":"VCID-tmjp-8edk-nyh3"},{"vulnerability":"VCID-tvcp-hyc5-57eq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/jquery@1.9.1"}],"aliases":["CVE-2012-6708","GHSA-2pqj-h3vj-pqgw"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xdph-4cg9-6qah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7857?format=json","vulnerability_id":"VCID-zkj3-gw4w-mybq","summary":"XSS via improper selector detection\njQuery's main method in affected versions contains an unreliable way of detecting whether the input to the `jQuery(strInput)` function is intended to be a selector or HTML.","references":[{"reference_url":"https://bugs.jquery.com/ticket/11290","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.jquery.com/ticket/11290"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/23975?format=json","purl":"pkg:npm/jquery@1.9.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3s9f-prpy-hbcx"},{"vulnerability":"VCID-5618-53yg-8qh4"},{"vulnerability":"VCID-7efr-3g5x-ryfv"},{"vulnerability":"VCID-8mpx-4ueh-qqfv"},{"vulnerability":"VCID-cvxp-ctj9-guej"},{"vulnerability":"VCID-tmjp-8edk-nyh3"},{"vulnerability":"VCID-tvcp-hyc5-57eq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/jquery@1.9.1"}],"aliases":["GMS-2017-121"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zkj3-gw4w-mybq"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:npm/jquery@1.7.1"}