Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-0684 | jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common. |
Github GHSA |
GHSA-2pqj-h3vj-pqgw | Cross-Site Scripting in jquery |
Ubuntu USN |
USN-7622-1 | jQuery vulnerabilities |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T21:36:02.207Z
Reserved: 2018-01-18T00:00:00.000Z
Link: CVE-2012-6708
No data.
Status : Modified
Published: 2018-01-18T23:29:00.213
Modified: 2024-11-21T01:46:43.460
Link: CVE-2012-6708
OpenCVE Enrichment
No data.
EUVD
Github GHSA
Ubuntu USN