Description
jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
Published: 2018-01-18
Score: 6.1 Medium
EPSS: 27.2% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-rmxg-73gg-4p98 Cross-Site Scripting (XSS) in jquery
References
Link Providers
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html cve-icon cve-icon
http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html cve-icon cve-icon
http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html cve-icon cve-icon
http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html cve-icon cve-icon
http://seclists.org/fulldisclosure/2019/May/10 cve-icon cve-icon
http://seclists.org/fulldisclosure/2019/May/11 cve-icon cve-icon
http://seclists.org/fulldisclosure/2019/May/13 cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html cve-icon cve-icon
http://www.securityfocus.com/bid/105658 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2020:0481 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2020:0729 cve-icon cve-icon
https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc cve-icon cve-icon
https://github.com/jquery/jquery/issues/2432 cve-icon cve-icon
https://github.com/jquery/jquery/pull/2588 cve-icon cve-icon
https://github.com/jquery/jquery/pull/2588/commits/c254d308a7d3f1eac4d0b42837804cfffcba4bb2 cve-icon cve-icon
https://ics-cert.us-cert.gov/advisories/ICSA-18-212-04 cve-icon cve-icon
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 cve-icon cve-icon
https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731%40%3Cdev.flink.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49%40%3Cuser.flink.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2%40%3Cuser.flink.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854%40%3Cuser.flink.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6%40%3Ccommits.roller.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2015-9251 cve-icon
https://seclists.org/bugtraq/2019/May/18 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20210108-0004/ cve-icon cve-icon
https://snyk.io/vuln/npm:jquery:20150627 cve-icon cve-icon
https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec126.pdf cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2015-9251 cve-icon
https://www.oracle.com/security-alerts/cpuapr2020.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2020.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujul2020.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuoct2020.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html cve-icon cve-icon
https://www.tenable.com/security/tns-2019-08 cve-icon cve-icon
History

No history.

Subscriptions

Jquery Jquery
Oracle Agile Product Lifecycle Management For Process Banking Platform Business Process Management Suite Communications Converged Application Server Communications Interactive Session Recorder Communications Services Gatekeeper Communications Webrtc Session Controller Endeca Information Discovery Studio Enterprise Manager Ops Center Enterprise Operations Monitor Financial Services Analytical Applications Infrastructure Financial Services Asset Liability Management Financial Services Data Integration Hub Financial Services Funds Transfer Pricing Financial Services Hedge Management And Ifrs Valuations Financial Services Liquidity Risk Management Financial Services Loan Loss Forecasting And Provisioning Financial Services Market Risk Measurement And Management Financial Services Profitability Management Financial Services Reconciliation Framework Fusion Middleware Mapviewer Healthcare Foundation Healthcare Translational Research Hospitality Cruise Fleet Management Hospitality Guest Access Hospitality Materials Control Hospitality Reporting And Analytics Insurance Insbridge Rating And Underwriting Jd Edwards Enterpriseone Tools Jdeveloper Oss Support Tools Peoplesoft Enterprise Peopletools Primavera Gateway Primavera Unifier Real-time Scheduler Retail Allocation Retail Customer Insights Retail Invoice Matching Retail Sales Audit Retail Workforce Management Software Service Bus Siebel Ui Framework Utilities Framework Utilities Mobile Workforce Management Webcenter Sites Weblogic Server
Redhat Enterprise Linux Jboss Data Grid Jboss Enterprise Application Platform Jboss Fuse
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T08:43:41.697Z

Reserved: 2018-01-18T00:00:00.000Z

Link: CVE-2015-9251

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-01-18T23:29:00.307

Modified: 2024-11-21T02:40:09.093

Link: CVE-2015-9251

cve-icon Redhat

Severity : Moderate

Publid Date: 2015-06-27T00:00:00Z

Links: CVE-2015-9251 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses