The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of jQuery Core

vulnerability CVE-2019-11358

jQuery Core: privilege escalation via Object.prototype Pollution

Synthesis of the vulnerability

An attacker can bypass restrictions via Object.prototype Pollution of jQuery Core, in order to escalate his privileges.
Impacted products: Debian, Drupal Core, Fedora, jQuery Core, Red Hat SSO, Synology DSM, Telerik.Web.UI.
Severity: 2/4.
Consequences: user access/rights, data reading.
Provenance: document.
Creation date: 11/04/2019.
Identifiers: CVE-2019-11358, DLA-1797-1, DRUPAL-SA-CORE-2019-005, DRUPAL-SA-CORE-2019-006, DSA-4460-1, FEDORA-2019-2a0ce0c58c, FEDORA-2019-a06dffab1c, FEDORA-2019-f563e66380, RHSA-2019:1456-01, Synology-SA-19:19, VIGILANCE-VUL-29030.

Description of the vulnerability

An attacker can bypass restrictions via Object.prototype Pollution of jQuery Core, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2015-9251

jQuery: Cross Site Scripting

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting of jQuery, in order to run JavaScript code in the context of the web site.
Impacted products: Fedora, jQuery Core, Oracle Communications, Oracle Fusion Middleware, Oracle GlassFish Server, Oracle Identity Management, Solaris, Tuxedo, Oracle Virtual Directory, WebLogic, Zabbix.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Creation date: 29/12/2016.
Identifiers: bulletinjul2018, cpuapr2019, cpujan2019, cpuoct2018, CVE-2015-9251, FEDORA-2016-06e8a3f776, FEDORA-2016-3368a38282, FEDORA-2016-8516b7d6fb, FEDORA-2016-b6cb3e83fa, VIGILANCE-VUL-21468.

Description of the vulnerability

The jQuery product offers a web service.

However, it does not filter received data before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting of jQuery, in order to run JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2012-6662

jQuery: Cross Site Scripting

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting of jQuery, in order to run JavaScript code in the context of the web site.
Impacted products: Fedora, jQuery Core, RHEL.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Creation date: 22/07/2015.
Identifiers: CVE-2012-6662, FEDORA-2014-15515, FEDORA-2014-15519, RHSA-2015:0442-01, RHSA-2015:1462-01, VIGILANCE-VUL-17471.

Description of the vulnerability

An attacker can trigger a Cross Site Scripting of jQuery, in order to run JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2010-5312

jQuery: Cross Site Scripting

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting of jQuery, in order to execute JavaScript code in the context of the web site.
Impacted products: Debian, Fedora, jQuery Core, RHEL.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Creation date: 04/05/2015.
Identifiers: CVE-2010-5312, DSA-3249-1, DSA-3249-2, FEDORA-2014-15967, FEDORA-2014-16048, RHSA-2015:0442-01, RHSA-2015:1462-01, VIGILANCE-VUL-16795.

Description of the vulnerability

An attacker can trigger a Cross Site Scripting of jQuery, in order to execute JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about jQuery Core: