{"id":"CVE-2018-1000665","details":"Dojo Dojo Objective Harness (DOH) version prior to version 1.14 contains a Cross Site Scripting (XSS) vulnerability in unit.html and testsDOH/_base/loader/i18n-exhaustive/i18n-test/unit.html and testsDOH/_base/i18nExhaustive.js in the DOH that can result in Victim attacked through their browser - deliver malware, steal HTTP cookies, bypass CORS trust. This attack appear to be exploitable via Victims are typically lured to a web site under the attacker's control; the XSS vulnerability on the target domain is silently exploited without the victim's knowledge. This vulnerability appears to have been fixed in 1.14.","aliases":["GHSA-vmq9-cm7m-4p8p"],"modified":"2026-04-11T17:14:17.694039Z","published":"2018-09-06T17:29:01.597Z","references":[{"type":"ADVISORY","url":"https://github.com/dojo/dojo/pull/307"},{"type":"FIX","url":"https://dojotoolkit.org/blog/dojo-1-14-released"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dojo/dojo","events":[{"introduced":"0"},{"last_affected":"c06e1335f8a4e48c8e8b1f4650845aebd570fd49"}],"database_specific":{"cpe":"cpe:2.3:a:dojotoolkit:dojo:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"1.13.0"}],"source":"CPE_FIELD"}}],"versions":["1.10.0","1.10.0-beta1","1.10.0-rc1","1.11.0","1.11.0-rc1","1.11.0-rc2","1.11.0-rc3","1.11.0-rc4","1.11.0-rc5","1.12.0","1.12.0-rc1","1.12.0-rc2","1.12.0-rc3","1.12.0-rc4","1.13.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-1000665.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}