Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://github.com/jquery/jquery/commit/db9e023e62c1ff5d8f21ed9868ab6878da2005e9", "name": "https://github.com/jquery/jquery/commit/db9e023e62c1ff5d8f21ed9868ab6878da2005e9", "tags": ["Exploit", "Patch"], "refsource": "CONFIRM"}, {"url": "http://bugs.jquery.com/ticket/9521", "name": "http://bugs.jquery.com/ticket/9521", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.ubuntu.com/usn/USN-1722-1", "name": "USN-1722-1", "tags": [], "refsource": "UBUNTU"}, {"url": "http://blog.jquery.com/2011/09/01/jquery-1-6-3-released/", "name": "http://blog.jquery.com/2011/09/01/jquery-1-6-3-released/", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.osvdb.org/80056", "name": "80056", "tags": [], "refsource": "OSVDB"}, {"url": "http://www.openwall.com/lists/oss-security/2013/01/31/3", "name": "[oss-security] 20130130 jQuery 1.6.2 XSS CVE assignment", "tags": [], "refsource": "MLIST"}, {"url": "http://blog.mindedsecurity.com/2011/07/jquery-is-sink.html", "name": "http://blog.mindedsecurity.com/2011/07/jquery-is-sink.html", "tags": [], "refsource": "MISC"}, {"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017", "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017", "tags": [], "refsource": "CONFIRM"}, {"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380", "tags": [], "refsource": "CONFIRM"}, {"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05232730", "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05232730", "tags": [], "refsource": "CONFIRM"}, {"url": "http://www.securityfocus.com/bid/58458", "name": "58458", "tags": [], "refsource": "BID"}, {"url": "http://www.securitytracker.com/id/1036620", "name": "1036620", "tags": [], "refsource": "SECTRACK"}, {"url": "https://security.netapp.com/advisory/ntap-20190416-0007/", "name": "https://security.netapp.com/advisory/ntap-20190416-0007/", "tags": [], "refsource": "CONFIRM"}, {"url": "https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E", "name": "[pulsar-commits] 20190416 [GitHub] [pulsar] one70six opened a new issue #4057: Security Vulnerabilities - Black Duck Scan - Pulsar v.2.3.1", "tags": [], "refsource": "MLIST"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in jQuery before 1.6.3, when using location.hash to select elements, allows remote attackers to inject arbitrary web script or HTML via a crafted tag."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-79"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2011-4969", "ASSIGNER": "secalert@redhat.com"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "severity": "MEDIUM", "impactScore": 2.9, "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}}, "publishedDate": "2013-03-08T22:55Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:jquery:jquery:1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:jquery:jquery:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "1.6.2"}, {"cpe23Uri": "cpe:2.3:a:jquery:jquery:1.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2019-04-16T18:29Z"}