{"id":"CVE-2011-4969","details":"Cross-site scripting (XSS) vulnerability in jQuery before 1.6.3, when using location.hash to select elements, allows remote attackers to inject arbitrary web script or HTML via a crafted tag.","aliases":["GHSA-579v-mp3v-rrw5"],"modified":"2024-04-11T07:40:47Z","published":"2013-03-08T22:55:01Z","withdrawn":"2024-06-30T13:40:12.031694Z","references":[{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-1722-1"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20190416-0007/"},{"type":"ARTICLE","url":"http://blog.jquery.com/2011/09/01/jquery-1-6-3-released/"},{"type":"ARTICLE","url":"http://blog.mindedsecurity.com/2011/07/jquery-is-sink.html"},{"type":"FIX","url":"https://github.com/jquery/jquery/commit/db9e023e62c1ff5d8f21ed9868ab6878da2005e9"},{"type":"WEB","url":"http://bugs.jquery.com/ticket/9521"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2013/01/31/3"},{"type":"WEB","url":"http://www.osvdb.org/80056"},{"type":"WEB","url":"http://www.securityfocus.com/bid/58458"},{"type":"WEB","url":"http://www.securitytracker.com/id/1036620"},{"type":"WEB","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017"},{"type":"WEB","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380"},{"type":"WEB","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05232730"},{"type":"WEB","url":"https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E"}],"affected":[{"package":{"name":"jquery","ecosystem":"Debian:10","purl":"pkg:deb/debian/jquery?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.6.4-1"}]}],"ecosystem_specific":{"urgency":"low"},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2011-4969.json"}}],"schema_version":"1.7.3"}