jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.

Project Subscriptions

Vendors Products
Agile Product Lifecycle Management For Process Subscribe
Banking Platform Subscribe
Business Process Management Suite Subscribe
Communications Converged Application Server Subscribe
Communications Interactive Session Recorder Subscribe
Communications Services Gatekeeper Subscribe
Communications Webrtc Session Controller Subscribe
Endeca Information Discovery Studio Subscribe
Enterprise Manager Ops Center Subscribe
Enterprise Operations Monitor Subscribe
Financial Services Analytical Applications Infrastructure Subscribe
Financial Services Asset Liability Management Subscribe
Financial Services Data Integration Hub Subscribe
Financial Services Funds Transfer Pricing Subscribe
Financial Services Hedge Management And Ifrs Valuations Subscribe
Financial Services Liquidity Risk Management Subscribe
Financial Services Loan Loss Forecasting And Provisioning Subscribe
Financial Services Market Risk Measurement And Management Subscribe
Financial Services Profitability Management Subscribe
Financial Services Reconciliation Framework Subscribe
Fusion Middleware Mapviewer Subscribe
Healthcare Foundation Subscribe
Healthcare Translational Research Subscribe
Hospitality Cruise Fleet Management Subscribe
Hospitality Guest Access Subscribe
Hospitality Materials Control Subscribe
Hospitality Reporting And Analytics Subscribe
Insurance Insbridge Rating And Underwriting Subscribe
Jd Edwards Enterpriseone Tools Subscribe
Jdeveloper Subscribe
Oss Support Tools Subscribe
Peoplesoft Enterprise Peopletools Subscribe
Primavera Gateway Subscribe
Primavera Unifier Subscribe
Real-time Scheduler Subscribe
Retail Allocation Subscribe
Retail Customer Insights Subscribe
Retail Invoice Matching Subscribe
Retail Sales Audit Subscribe
Retail Workforce Management Software Subscribe
Service Bus Subscribe
Siebel Ui Framework Subscribe
Utilities Framework Subscribe
Utilities Mobile Workforce Management Subscribe
Webcenter Sites Subscribe
Weblogic Server Subscribe
Enterprise Linux Subscribe
Jboss Data Grid Subscribe
Jboss Enterprise Application Platform Subscribe
Jboss Fuse Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-rmxg-73gg-4p98 Cross-Site Scripting (XSS) in jquery
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html cve-icon cve-icon
http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html cve-icon cve-icon
http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html cve-icon cve-icon
http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html cve-icon cve-icon
http://seclists.org/fulldisclosure/2019/May/10 cve-icon cve-icon
http://seclists.org/fulldisclosure/2019/May/11 cve-icon cve-icon
http://seclists.org/fulldisclosure/2019/May/13 cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html cve-icon cve-icon
http://www.securityfocus.com/bid/105658 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2020:0481 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2020:0729 cve-icon cve-icon
https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc cve-icon cve-icon
https://github.com/jquery/jquery/issues/2432 cve-icon cve-icon
https://github.com/jquery/jquery/pull/2588 cve-icon cve-icon
https://github.com/jquery/jquery/pull/2588/commits/c254d308a7d3f1eac4d0b42837804cfffcba4bb2 cve-icon cve-icon
https://ics-cert.us-cert.gov/advisories/ICSA-18-212-04 cve-icon cve-icon
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 cve-icon cve-icon
https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731%40%3Cdev.flink.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49%40%3Cuser.flink.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2%40%3Cuser.flink.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854%40%3Cuser.flink.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6%40%3Ccommits.roller.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2015-9251 cve-icon
https://seclists.org/bugtraq/2019/May/18 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20210108-0004/ cve-icon cve-icon
https://snyk.io/vuln/npm:jquery:20150627 cve-icon cve-icon
https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec126.pdf cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2015-9251 cve-icon
https://www.oracle.com/security-alerts/cpuapr2020.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2020.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujul2020.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuoct2020.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html cve-icon cve-icon
https://www.tenable.com/security/tns-2019-08 cve-icon cve-icon
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T08:43:41.697Z

Reserved: 2018-01-18T00:00:00

Link: CVE-2015-9251

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-01-18T23:29:00.307

Modified: 2024-11-21T02:40:09.093

Link: CVE-2015-9251

cve-icon Redhat

Severity : Moderate

Publid Date: 2015-06-27T00:00:00Z

Links: CVE-2015-9251 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses