{
"retire-example": {
"vulnerabilities": [
{
"below": "0.0.2",
"severity": "low",
"cwe": ["CWE-477"],
"identifiers": {
"CVE": ["CVE-XXXX-XXXX"],
"bug": "1234",
"summary": "bug summary"
},
"info": ["http://github.com/eoftedal/retire.js/"]
}
],
"extractors": {
"func": ["retire.VERSION"],
"filename": ["retire-example-(§§version§§)(.min)?\\.js"],
"filecontent": ["/\\*!? Retire-example v(§§version§§)"],
"hashes": { "07f8b94c8d601a24a1914a1a92bec0e4fafda964": "0.0.1" }
}
},
"jquery": {
"bowername": ["jQuery"],
"npmname": "jquery",
"vulnerabilities": [
{
"below": "1.6.3",
"severity": "medium",
"cwe": ["CWE-79"],
"identifiers": {
"CVE": ["CVE-2011-4969"],
"summary": "XSS with location.hash",
"githubID": "GHSA-579v-mp3v-rrw5"
},
"info": [
"https://nvd.nist.gov/vuln/detail/CVE-2011-4969",
"http://research.insecurelabs.org/jquery/test/",
"https://bugs.jquery.com/ticket/9521"
]
},
{
"below": "1.9.0b1",
"cwe": ["CWE-64", "CWE-79"],
"identifiers": {
"CVE": ["CVE-2012-6708"],
"bug": "11290",
"summary": "Selector interpreted as HTML",
"githubID": "GHSA-2pqj-h3vj-pqgw"
},
"severity": "medium",
"info": [
"http://bugs.jquery.com/ticket/11290",
"https://nvd.nist.gov/vuln/detail/CVE-2012-6708",
"http://research.insecurelabs.org/jquery/test/"
]
},
{
"below": "1.9.0",
"cwe": ["CWE-79"],
"identifiers": {
"CVE": ["CVE-2020-7656"],
"summary": "Versions of jquery prior to 1.9.0 are vulnerable to Cross-Site Scripting. The load method fails to recognize and remove \"\", which results in the enclosed script logic to be executed. This allows attackers to execute arbitrary JavaScript in a victim's browser.\n\n\n## Recommendation\n\nUpgrade to version 1.9.0 or later.",
"githubID": "GHSA-q4m3-2j7h-f7xw"
},
"severity": "medium",
"info": [
"https://github.com/advisories/GHSA-q4m3-2j7h-f7xw",
"https://nvd.nist.gov/vuln/detail/CVE-2020-7656"
]
},
{
"atOrAbove": "1.4.0",
"below": "1.12.0",
"cwe": ["CWE-79"],
"identifiers": {
"issue": "2432",
"summary": "3rd party CORS request may execute",
"CVE": ["CVE-2015-9251"],
"githubID": "GHSA-rmxg-73gg-4p98"
},
"severity": "medium",
"info": [
"https://github.com/jquery/jquery/issues/2432",
"http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/",
"https://nvd.nist.gov/vuln/detail/CVE-2015-9251",
"http://research.insecurelabs.org/jquery/test/"
]
},
{
"atOrAbove": "1.12.3",
"below": "3.0.0-beta1",
"cwe": ["CWE-79"],
"identifiers": {
"issue": "2432",
"summary": "3rd party CORS request may execute",
"CVE": ["CVE-2015-9251"],
"githubID": "GHSA-rmxg-73gg-4p98"
},
"severity": "medium",
"info": [
"https://github.com/jquery/jquery/issues/2432",
"http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/",
"https://nvd.nist.gov/vuln/detail/CVE-2015-9251",
"http://research.insecurelabs.org/jquery/test/"
]
},
{
"atOrAbove": "1.8.0",
"below": "1.12.0",
"cwe": ["CWE-79"],
"identifiers": {
"CVE": ["CVE-2015-9251"],
"issue": "11974",
"summary": "parseHTML() executes scripts in event handlers",
"githubID": "GHSA-rmxg-73gg-4p98"
},
"severity": "medium",
"info": [
"https://bugs.jquery.com/ticket/11974",
"https://nvd.nist.gov/vuln/detail/CVE-2015-9251",
"http://research.insecurelabs.org/jquery/test/"
]
},
{
"atOrAbove": "1.12.2",
"below": "2.2.0",
"cwe": ["CWE-79"],
"identifiers": {
"CVE": ["CVE-2015-9251"],
"issue": "11974",
"summary": "parseHTML() executes scripts in event handlers",
"githubID": "GHSA-rmxg-73gg-4p98"
},
"severity": "medium",
"info": [
"https://bugs.jquery.com/ticket/11974",
"https://nvd.nist.gov/vuln/detail/CVE-2015-9251",
"http://research.insecurelabs.org/jquery/test/"
]
},
{
"atOrAbove": "2.2.2",
"below": "3.0.0",
"cwe": ["CWE-79"],
"identifiers": {
"CVE": ["CVE-2015-9251"],
"issue": "11974",
"summary": "parseHTML() executes scripts in event handlers",
"githubID": "GHSA-rmxg-73gg-4p98"
},
"severity": "medium",
"info": [
"https://bugs.jquery.com/ticket/11974",
"https://nvd.nist.gov/vuln/detail/CVE-2015-9251",
"http://research.insecurelabs.org/jquery/test/"
]
},
{
"atOrAbove": "3.0.0-rc.1",
"below": "3.0.0",
"cwe": ["CWE-400"],
"identifiers": {
"CVE": ["CVE-2016-10707"],
"summary": "Denial of Service in jquery",
"githubID": "GHSA-mhpp-875w-9cpv"
},
"severity": "high",
"info": ["https://nvd.nist.gov/vuln/detail/CVE-2016-10707"]
},
{
"atOrAbove": "1.1.4",
"below": "3.4.0",
"cwe": ["CWE-1321", "CWE-79"],
"identifiers": {
"CVE": ["CVE-2019-11358"],
"PR": "4333",
"summary": "jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution",
"githubID": "GHSA-6c3j-c64m-qhgq"
},
"severity": "medium",
"info": [
"https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/",
"https://nvd.nist.gov/vuln/detail/CVE-2019-11358",
"https://github.com/jquery/jquery/commit/753d591aea698e57d6db58c9f722cd0808619b1b"
]
},
{
"below": "3.5.0",
"atOrAbove": "1.2.0",
"cwe": ["CWE-79"],
"identifiers": {
"CVE": ["CVE-2020-11022"],
"issue": "4642",
"summary": "Regex in its jQuery.htmlPrefilter sometimes may introduce XSS",
"githubID": "GHSA-gxr4-xjj5-5px2"
},
"severity": "medium",
"info": ["https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/"]
},
{
"below": "3.5.0",
"atOrAbove": "1.0.3",
"cwe": ["CWE-79"],
"identifiers": {
"CVE": ["CVE-2020-11023", "CVE-2020-23064"],
"issue": "4647",
"summary": "passing HTML containing