First published: Fri Mar 08 2013(Updated: )
Cross-site scripting (XSS) vulnerability in jQuery before 1.6.3, when using location.hash to select elements, allows remote attackers to inject arbitrary web script or HTML via a crafted tag.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.webjars.npm:jquery | <1.6.3 | 1.6.3 |
rubygems/jquery-rails | <1.0.16 | 1.0.16 |
nuget/jQuery | <1.6.3 | 1.6.3 |
npm/jquery | <1.6.3 | 1.6.3 |
jQuery | <=1.6.2 | |
jQuery | =1.6 | |
jQuery | =1.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4969 is classified as a moderate severity vulnerability due to its potential for cross-site scripting attacks.
To fix CVE-2011-4969, upgrade jQuery to version 1.6.3 or later.
CVE-2011-4969 affects all versions of jQuery before 1.6.3.
Yes, CVE-2011-4969 can be exploited remotely by injecting malicious scripts.
CVE-2011-4969 is a cross-site scripting (XSS) vulnerability.