{ "retire-example": { "vulnerabilities": [ { "below": "0.0.2", "severity": "low", "cwe": ["CWE-477"], "identifiers": { "CVE": ["CVE-XXXX-XXXX"], "bug": "1234", "summary": "bug summary" }, "info": ["http://github.com/eoftedal/retire.js/"] } ], "extractors": { "func": ["retire.VERSION"], "filename": ["retire-example-(§§version§§)(.min)?\\.js"], "filecontent": ["/\\*!? Retire-example v(§§version§§)"], "hashes": { "07f8b94c8d601a24a1914a1a92bec0e4fafda964": "0.0.1" } } }, "jquery": { "bowername": ["jQuery"], "npmname": "jquery", "vulnerabilities": [ { "below": "1.6.3", "severity": "medium", "cwe": ["CWE-79"], "identifiers": { "CVE": ["CVE-2011-4969"], "summary": "XSS with location.hash", "githubID": "GHSA-579v-mp3v-rrw5" }, "info": [ "https://nvd.nist.gov/vuln/detail/CVE-2011-4969", "http://research.insecurelabs.org/jquery/test/", "https://bugs.jquery.com/ticket/9521" ] }, { "below": "1.9.0b1", "cwe": ["CWE-64", "CWE-79"], "identifiers": { "CVE": ["CVE-2012-6708"], "bug": "11290", "summary": "Selector interpreted as HTML", "githubID": "GHSA-2pqj-h3vj-pqgw" }, "severity": "medium", "info": [ "http://bugs.jquery.com/ticket/11290", "https://nvd.nist.gov/vuln/detail/CVE-2012-6708", "http://research.insecurelabs.org/jquery/test/" ] }, { "below": "1.9.0", "cwe": ["CWE-79"], "identifiers": { "CVE": ["CVE-2020-7656"], "summary": "Versions of jquery prior to 1.9.0 are vulnerable to Cross-Site Scripting. The load method fails to recognize and remove \"\", which results in the enclosed script logic to be executed. This allows attackers to execute arbitrary JavaScript in a victim's browser.\n\n\n## Recommendation\n\nUpgrade to version 1.9.0 or later.", "githubID": "GHSA-q4m3-2j7h-f7xw" }, "severity": "medium", "info": [ "https://github.com/advisories/GHSA-q4m3-2j7h-f7xw", "https://nvd.nist.gov/vuln/detail/CVE-2020-7656" ] }, { "atOrAbove": "1.4.0", "below": "1.12.0", "cwe": ["CWE-79"], "identifiers": { "issue": "2432", "summary": "3rd party CORS request may execute", "CVE": ["CVE-2015-9251"], "githubID": "GHSA-rmxg-73gg-4p98" }, "severity": "medium", "info": [ "https://github.com/jquery/jquery/issues/2432", "http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/", "https://nvd.nist.gov/vuln/detail/CVE-2015-9251", "http://research.insecurelabs.org/jquery/test/" ] }, { "atOrAbove": "1.12.3", "below": "3.0.0-beta1", "cwe": ["CWE-79"], "identifiers": { "issue": "2432", "summary": "3rd party CORS request may execute", "CVE": ["CVE-2015-9251"], "githubID": "GHSA-rmxg-73gg-4p98" }, "severity": "medium", "info": [ "https://github.com/jquery/jquery/issues/2432", "http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/", "https://nvd.nist.gov/vuln/detail/CVE-2015-9251", "http://research.insecurelabs.org/jquery/test/" ] }, { "atOrAbove": "1.8.0", "below": "1.12.0", "cwe": ["CWE-79"], "identifiers": { "CVE": ["CVE-2015-9251"], "issue": "11974", "summary": "parseHTML() executes scripts in event handlers", "githubID": "GHSA-rmxg-73gg-4p98" }, "severity": "medium", "info": [ "https://bugs.jquery.com/ticket/11974", "https://nvd.nist.gov/vuln/detail/CVE-2015-9251", "http://research.insecurelabs.org/jquery/test/" ] }, { "atOrAbove": "1.12.2", "below": "2.2.0", "cwe": ["CWE-79"], "identifiers": { "CVE": ["CVE-2015-9251"], "issue": "11974", "summary": "parseHTML() executes scripts in event handlers", "githubID": "GHSA-rmxg-73gg-4p98" }, "severity": "medium", "info": [ "https://bugs.jquery.com/ticket/11974", "https://nvd.nist.gov/vuln/detail/CVE-2015-9251", "http://research.insecurelabs.org/jquery/test/" ] }, { "atOrAbove": "2.2.2", "below": "3.0.0", "cwe": ["CWE-79"], "identifiers": { "CVE": ["CVE-2015-9251"], "issue": "11974", "summary": "parseHTML() executes scripts in event handlers", "githubID": "GHSA-rmxg-73gg-4p98" }, "severity": "medium", "info": [ "https://bugs.jquery.com/ticket/11974", "https://nvd.nist.gov/vuln/detail/CVE-2015-9251", "http://research.insecurelabs.org/jquery/test/" ] }, { "atOrAbove": "3.0.0-rc.1", "below": "3.0.0", "cwe": ["CWE-400"], "identifiers": { "CVE": ["CVE-2016-10707"], "summary": "Denial of Service in jquery", "githubID": "GHSA-mhpp-875w-9cpv" }, "severity": "high", "info": ["https://nvd.nist.gov/vuln/detail/CVE-2016-10707"] }, { "atOrAbove": "1.1.4", "below": "3.4.0", "cwe": ["CWE-1321", "CWE-79"], "identifiers": { "CVE": ["CVE-2019-11358"], "PR": "4333", "summary": "jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution", "githubID": "GHSA-6c3j-c64m-qhgq" }, "severity": "medium", "info": [ "https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/", "https://nvd.nist.gov/vuln/detail/CVE-2019-11358", "https://github.com/jquery/jquery/commit/753d591aea698e57d6db58c9f722cd0808619b1b" ] }, { "below": "3.5.0", "atOrAbove": "1.2.0", "cwe": ["CWE-79"], "identifiers": { "CVE": ["CVE-2020-11022"], "issue": "4642", "summary": "Regex in its jQuery.htmlPrefilter sometimes may introduce XSS", "githubID": "GHSA-gxr4-xjj5-5px2" }, "severity": "medium", "info": ["https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/"] }, { "below": "3.5.0", "atOrAbove": "1.0.3", "cwe": ["CWE-79"], "identifiers": { "CVE": ["CVE-2020-11023", "CVE-2020-23064"], "issue": "4647", "summary": "passing HTML containing