René's URL Explorer Experiment


Title: CVE-2012-6708 (Medium) detected in jquery.1.4.4.nupkg · Issue #13 · ignatandrei/JavaScriptAndMVVMandMVC · GitHub

Open Graph Title: CVE-2012-6708 (Medium) detected in jquery.1.4.4.nupkg · Issue #13 · ignatandrei/JavaScriptAndMVVMandMVC

X Title: CVE-2012-6708 (Medium) detected in jquery.1.4.4.nupkg · Issue #13 · ignatandrei/JavaScriptAndMVVMandMVC

Description: CVE-2012-6708 - Medium Severity Vulnerability Vulnerable Library - jquery.1.4.4.nupkg jQuery is a fast and concise JavaScript Library that simplifies HTML document traversing, event hand... Library home page: https://api.nuget.org/packag...

Open Graph Description: CVE-2012-6708 - Medium Severity Vulnerability Vulnerable Library - jquery.1.4.4.nupkg jQuery is a fast and concise JavaScript Library that simplifies HTML document traversing, event hand... Library...

X Description: CVE-2012-6708 - Medium Severity Vulnerability Vulnerable Library - jquery.1.4.4.nupkg jQuery is a fast and concise JavaScript Library that simplifies HTML document traversing, event hand... Library...

Opengraph URL: https://github.com/ignatandrei/JavaScriptAndMVVMandMVC/issues/13

X: @github

direct link

Domain: patch-diff.githubusercontent.com


Hey, it has json ld scripts:
{"@context":"https://schema.org","@type":"DiscussionForumPosting","headline":"CVE-2012-6708 (Medium) detected in jquery.1.4.4.nupkg","articleBody":"## CVE-2012-6708 - Medium Severity Vulnerability\n\u003cdetails\u003e\u003csummary\u003e\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20\u003e Vulnerable Library - \u003cb\u003ejquery.1.4.4.nupkg\u003c/b\u003e\u003c/p\u003e\u003c/summary\u003e\n\n\u003cp\u003ejQuery is a fast and concise JavaScript Library that simplifies HTML document traversing, event hand...\u003c/p\u003e\n\u003cp\u003eLibrary home page: \u003ca href=\"https://api.nuget.org/packages/jquery.1.4.4.nupkg\"\u003ehttps://api.nuget.org/packages/jquery.1.4.4.nupkg\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003ePath to dependency file: /tmp/ws-scm/JavaScriptAndMVVMandMVC/packages/jQuery.Validation.1.11.1/jQuery.Validation.1.11.1.nuspec\u003c/p\u003e\n\u003cp\u003ePath to vulnerable library: /JavaScriptAndMVVMandMVC/packages/jQuery.Validation.1.11.1/jQuery.Validation.1.11.1.nuspec\u003c/p\u003e\n\u003cp\u003e\n\nDependency Hierarchy:\n  - :x: **jquery.1.4.4.nupkg** (Vulnerable Library)\n\u003cp\u003eFound in HEAD commit: \u003ca href=\"https://github.com/ignatandrei/JavaScriptAndMVVMandMVC/commit/f9885f517c6cbae93e178995ccc1763fbd601b93\"\u003ef9885f517c6cbae93e178995ccc1763fbd601b93\u003c/a\u003e\u003c/p\u003e\n\u003c/p\u003e\n\u003c/details\u003e\n\u003cp\u003e\u003c/p\u003e\n\u003cdetails\u003e\u003csummary\u003e\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20\u003e Vulnerability Details\u003c/summary\u003e\n\u003cp\u003e  \n  \njQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '\u003c' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '\u003c' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.\n\n\u003cp\u003ePublish Date: 2018-01-18\n\u003cp\u003eURL: \u003ca href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6708\u003eCVE-2012-6708\u003c/a\u003e\u003c/p\u003e\n\u003c/p\u003e\n\u003c/details\u003e\n\u003cp\u003e\u003c/p\u003e\n\u003cdetails\u003e\u003csummary\u003e\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20\u003e CVSS 3 Score Details (\u003cb\u003e6.1\u003c/b\u003e)\u003c/summary\u003e\n\u003cp\u003e\n\nBase Score Metrics:\n- Exploitability Metrics:\n  - Attack Vector: Network\n  - Attack Complexity: Low\n  - Privileges Required: None\n  - User Interaction: Required\n  - Scope: Changed\n- Impact Metrics:\n  - Confidentiality Impact: Low\n  - Integrity Impact: Low\n  - Availability Impact: None\n\u003c/p\u003e\nFor more information on CVSS3 Scores, click \u003ca href=\"https://www.first.org/cvss/calculator/3.0\"\u003ehere\u003c/a\u003e.\n\u003c/p\u003e\n\u003c/details\u003e\n\u003cp\u003e\u003c/p\u003e\n\u003cdetails\u003e\u003csummary\u003e\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20\u003e Suggested Fix\u003c/summary\u003e\n\u003cp\u003e\n\n\u003cp\u003eType: Upgrade version\u003c/p\u003e\n\u003cp\u003eOrigin: \u003ca href=\"https://nvd.nist.gov/vuln/detail/CVE-2012-6708\"\u003ehttps://nvd.nist.gov/vuln/detail/CVE-2012-6708\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eRelease Date: 2018-01-18\u003c/p\u003e\n\u003cp\u003eFix Resolution: jQuery - v1.9.0\u003c/p\u003e\n\n\u003c/p\u003e\n\u003c/details\u003e\n\u003cp\u003e\u003c/p\u003e\n\n***\nStep up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)","author":{"url":"https://github.com/mend-bolt-for-github[bot]","@type":"Person","name":"mend-bolt-for-github[bot]"},"datePublished":"2019-11-01T18:48:26.000Z","interactionStatistic":{"@type":"InteractionCounter","interactionType":"https://schema.org/CommentAction","userInteractionCount":0},"url":"https://github.com/13/JavaScriptAndMVVMandMVC/issues/13"}

route-pattern/_view_fragments/issues/show/:user_id/:repository/:id/issue_layout(.:format)
route-controllervoltron_issues_fragments
route-actionissue_layout
fetch-noncev2:2b94e0aa-fc78-80ff-c539-cf136f13958c
current-catalog-service-hash81bb79d38c15960b92d99bca9288a9108c7a47b18f2423d0f6438c5b7bcd2114
request-idBAF0:19F937:2A5718F:35EF5FF:6991B4E1
html-safe-nonce776cf45231161cc100359675823132c1d5adb3456c57be4a7b5f84bba4c83383
visitor-payloadeyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJCQUYwOjE5RjkzNzoyQTU3MThGOjM1RUY1RkY6Njk5MUI0RTEiLCJ2aXNpdG9yX2lkIjoiMTk5Mjg2ODkxNTkyNDAyMjQ5NyIsInJlZ2lvbl9lZGdlIjoiaWFkIiwicmVnaW9uX3JlbmRlciI6ImlhZCJ9
visitor-hmac3a1b15c0da17719757ea8f00be455efe4a0fb22f62cc83076bd0119ed40beea0
hovercard-subject-tagissue:516287331
github-keyboard-shortcutsrepository,issues,copilot
google-site-verificationApib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I
octolytics-urlhttps://collector.github.com/github/collect
analytics-location///voltron/issues_fragments/issue_layout
fb:app_id1401488693436528
apple-itunes-appapp-id=1477376905, app-argument=https://github.com/_view_fragments/issues/show/ignatandrei/JavaScriptAndMVVMandMVC/13/issue_layout
twitter:imagehttps://opengraph.githubassets.com/9dcac0d8eca26ddc86ba4ad2f8701d94b5d5b75a531e6163dfaea88507d83199/ignatandrei/JavaScriptAndMVVMandMVC/issues/13
twitter:cardsummary_large_image
og:imagehttps://opengraph.githubassets.com/9dcac0d8eca26ddc86ba4ad2f8701d94b5d5b75a531e6163dfaea88507d83199/ignatandrei/JavaScriptAndMVVMandMVC/issues/13
og:image:altCVE-2012-6708 - Medium Severity Vulnerability Vulnerable Library - jquery.1.4.4.nupkg jQuery is a fast and concise JavaScript Library that simplifies HTML document traversing, event hand... Library...
og:image:width1200
og:image:height600
og:site_nameGitHub
og:typeobject
og:author:usernamemend-bolt-for-github[bot]
hostnamegithub.com
expected-hostnamegithub.com
None42c603b9d642c4a9065a51770f75e5e27132fef0e858607f5c9cb7e422831a7b
turbo-cache-controlno-preview
go-importgithub.com/ignatandrei/JavaScriptAndMVVMandMVC git https://github.com/ignatandrei/JavaScriptAndMVVMandMVC.git
octolytics-dimension-user_id153982
octolytics-dimension-user_loginignatandrei
octolytics-dimension-repository_id15478526
octolytics-dimension-repository_nwoignatandrei/JavaScriptAndMVVMandMVC
octolytics-dimension-repository_publictrue
octolytics-dimension-repository_is_forkfalse
octolytics-dimension-repository_network_root_id15478526
octolytics-dimension-repository_network_root_nwoignatandrei/JavaScriptAndMVVMandMVC
turbo-body-classeslogged-out env-production page-responsive
disable-turbofalse
browser-stats-urlhttps://api.github.com/_private/browser/stats
browser-errors-urlhttps://api.github.com/_private/browser/errors
release848bc6032dcc93a9a7301dcc3f379a72ba13b96e
ui-targetfull
theme-color#1e2327
color-schemelight dark

Links:

Skip to contenthttps://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/issues/13#start-of-content
https://patch-diff.githubusercontent.com/
Sign in https://patch-diff.githubusercontent.com/login?return_to=https%3A%2F%2Fgithub.com%2Fignatandrei%2FJavaScriptAndMVVMandMVC%2Fissues%2F13
GitHub CopilotWrite better code with AIhttps://github.com/features/copilot
GitHub SparkBuild and deploy intelligent appshttps://github.com/features/spark
GitHub ModelsManage and compare promptshttps://github.com/features/models
MCP RegistryNewIntegrate external toolshttps://github.com/mcp
ActionsAutomate any workflowhttps://github.com/features/actions
CodespacesInstant dev environmentshttps://github.com/features/codespaces
IssuesPlan and track workhttps://github.com/features/issues
Code ReviewManage code changeshttps://github.com/features/code-review
GitHub Advanced SecurityFind and fix vulnerabilitieshttps://github.com/security/advanced-security
Code securitySecure your code as you buildhttps://github.com/security/advanced-security/code-security
Secret protectionStop leaks before they starthttps://github.com/security/advanced-security/secret-protection
Why GitHubhttps://github.com/why-github
Documentationhttps://docs.github.com
Bloghttps://github.blog
Changeloghttps://github.blog/changelog
Marketplacehttps://github.com/marketplace
View all featureshttps://github.com/features
Enterpriseshttps://github.com/enterprise
Small and medium teamshttps://github.com/team
Startupshttps://github.com/enterprise/startups
Nonprofitshttps://github.com/solutions/industry/nonprofits
App Modernizationhttps://github.com/solutions/use-case/app-modernization
DevSecOpshttps://github.com/solutions/use-case/devsecops
DevOpshttps://github.com/solutions/use-case/devops
CI/CDhttps://github.com/solutions/use-case/ci-cd
View all use caseshttps://github.com/solutions/use-case
Healthcarehttps://github.com/solutions/industry/healthcare
Financial serviceshttps://github.com/solutions/industry/financial-services
Manufacturinghttps://github.com/solutions/industry/manufacturing
Governmenthttps://github.com/solutions/industry/government
View all industrieshttps://github.com/solutions/industry
View all solutionshttps://github.com/solutions
AIhttps://github.com/resources/articles?topic=ai
Software Developmenthttps://github.com/resources/articles?topic=software-development
DevOpshttps://github.com/resources/articles?topic=devops
Securityhttps://github.com/resources/articles?topic=security
View all topicshttps://github.com/resources/articles
Customer storieshttps://github.com/customer-stories
Events & webinarshttps://github.com/resources/events
Ebooks & reportshttps://github.com/resources/whitepapers
Business insightshttps://github.com/solutions/executive-insights
GitHub Skillshttps://skills.github.com
Documentationhttps://docs.github.com
Customer supporthttps://support.github.com
Community forumhttps://github.com/orgs/community/discussions
Trust centerhttps://github.com/trust-center
Partnershttps://github.com/partners
GitHub SponsorsFund open source developershttps://github.com/sponsors
Security Labhttps://securitylab.github.com
Maintainer Communityhttps://maintainers.github.com
Acceleratorhttps://github.com/accelerator
Archive Programhttps://archiveprogram.github.com
Topicshttps://github.com/topics
Trendinghttps://github.com/trending
Collectionshttps://github.com/collections
Enterprise platformAI-powered developer platformhttps://github.com/enterprise
GitHub Advanced SecurityEnterprise-grade security featureshttps://github.com/security/advanced-security
Copilot for BusinessEnterprise-grade AI featureshttps://github.com/features/copilot/copilot-business
Premium SupportEnterprise-grade 24/7 supporthttps://github.com/premium-support
Pricinghttps://github.com/pricing
Search syntax tipshttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
documentationhttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
Sign in https://patch-diff.githubusercontent.com/login?return_to=https%3A%2F%2Fgithub.com%2Fignatandrei%2FJavaScriptAndMVVMandMVC%2Fissues%2F13
Sign up https://patch-diff.githubusercontent.com/signup?ref_cta=Sign+up&ref_loc=header+logged+out&ref_page=%2F%3Cuser-name%3E%2F%3Crepo-name%3E%2Fvoltron%2Fissues_fragments%2Fissue_layout&source=header-repo&source_repo=ignatandrei%2FJavaScriptAndMVVMandMVC
Reloadhttps://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/issues/13
Reloadhttps://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/issues/13
Reloadhttps://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/issues/13
ignatandrei https://patch-diff.githubusercontent.com/ignatandrei
JavaScriptAndMVVMandMVChttps://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC
Notifications https://patch-diff.githubusercontent.com/login?return_to=%2Fignatandrei%2FJavaScriptAndMVVMandMVC
Fork 2 https://patch-diff.githubusercontent.com/login?return_to=%2Fignatandrei%2FJavaScriptAndMVVMandMVC
Star 0 https://patch-diff.githubusercontent.com/login?return_to=%2Fignatandrei%2FJavaScriptAndMVVMandMVC
Code https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC
Issues 21 https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/issues
Pull requests 6 https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/pulls
Actions https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/actions
Projects 0 https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/projects
Wiki https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/wiki
Security 0 https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/security
Insights https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/pulse
Code https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC
Issues https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/issues
Pull requests https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/pulls
Actions https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/actions
Projects https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/projects
Wiki https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/wiki
Security https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/security
Insights https://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/pulse
New issuehttps://patch-diff.githubusercontent.com/login?return_to=https://github.com/ignatandrei/JavaScriptAndMVVMandMVC/issues/13
New issuehttps://patch-diff.githubusercontent.com/login?return_to=https://github.com/ignatandrei/JavaScriptAndMVVMandMVC/issues/13
CVE-2012-6708 (Medium) detected in jquery.1.4.4.nupkghttps://patch-diff.githubusercontent.com/ignatandrei/JavaScriptAndMVVMandMVC/issues/13#top
security vulnerabilitySecurity vulnerability detected by WhiteSourcehttps://github.com/ignatandrei/JavaScriptAndMVVMandMVC/issues?q=state%3Aopen%20label%3A%22security%20vulnerability%22
https://github.com/apps/mend-bolt-for-github
https://github.com/apps/mend-bolt-for-github
mend-bolt-for-githubhttps://github.com/apps/mend-bolt-for-github
on Nov 1, 2019https://github.com/ignatandrei/JavaScriptAndMVVMandMVC/issues/13#issue-516287331
CVE-2012-6708https://github.com/advisories/GHSA-2pqj-h3vj-pqgw
https://camo.githubusercontent.com/7f707ecbb163ab74b555da5daea2f4e73596a00ea0f498a511bb2245fe6dcafc/68747470733a2f2f7768697465736f757263652d7265736f75726365732e7768697465736f75726365736f6674776172652e636f6d2f76756c6e65726162696c6974795f64657461696c732e706e67
https://api.nuget.org/packages/jquery.1.4.4.nupkghttps://api.nuget.org/packages/jquery.1.4.4.nupkg
f9885f517c6cbae93e178995ccc1763fbd601b93https://github.com/ignatandrei/JavaScriptAndMVVMandMVC/commit/f9885f517c6cbae93e178995ccc1763fbd601b93
https://camo.githubusercontent.com/1dbe807ae3be1590d27523cd4e02c03a8d07e1dff49ec0084294a2c006984b4c/68747470733a2f2f7768697465736f757263652d7265736f75726365732e7768697465736f75726365736f6674776172652e636f6d2f6d656469756d5f76756c2e706e67
CVE-2012-6708https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6708
https://camo.githubusercontent.com/8b05d7d0c83d5dc1f3422d1e4497c6a700365c61fc1dd1e3769cd369cdeb63a5/68747470733a2f2f7768697465736f757263652d7265736f75726365732e7768697465736f75726365736f6674776172652e636f6d2f63767373332e706e67
herehttps://www.first.org/cvss/calculator/3.0
https://camo.githubusercontent.com/a06e014122a02d3958748cbca226e8fc721aaef2a61d9ec4be1c79248702fdd7/68747470733a2f2f7768697465736f757263652d7265736f75726365732e7768697465736f75726365736f6674776172652e636f6d2f7375676765737465645f6669782e706e67
https://nvd.nist.gov/vuln/detail/CVE-2012-6708https://nvd.nist.gov/vuln/detail/CVE-2012-6708
herehttps://www.whitesourcesoftware.com/full_solution_bolt_github
security vulnerabilitySecurity vulnerability detected by WhiteSourcehttps://github.com/ignatandrei/JavaScriptAndMVVMandMVC/issues?q=state%3Aopen%20label%3A%22security%20vulnerability%22
https://github.com
Termshttps://docs.github.com/site-policy/github-terms/github-terms-of-service
Privacyhttps://docs.github.com/site-policy/privacy-policies/github-privacy-statement
Securityhttps://github.com/security
Statushttps://www.githubstatus.com/
Communityhttps://github.community/
Docshttps://docs.github.com/
Contacthttps://support.github.com?tags=dotcom-footer

Viewport: width=device-width


URLs of crawlers that visited me.