CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
EPSS
Percentile
82.0%
Severity: Medium
Date : 2019-10-02
CVE-ID : CVE-2012-6708 CVE-2015-9251
Package : ruby-rdoc
Type : cross-site scripting
Remote : Yes
Link : https://security.archlinux.org/AVG-1041
The package ruby-rdoc before version 6.1.2-1 is vulnerable to cross-
site scripting.
Upgrade to 6.1.2-1.
The problems have been fixed upstream in version 6.1.2.
None.
jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS)
attacks. The jQuery(strInput) function does not differentiate selectors
from HTML in a reliable fashion. In vulnerable versions, jQuery
determined whether the input was HTML by looking for the ‘<’ character
anywhere in the string, giving attackers more flexibility when
attempting to construct a malicious payload. In fixed versions, jQuery
only deems the input to be HTML if it explicitly starts with the ‘<’
character, limiting exploitability only to attackers who can control
the beginning of a string, which is far less common.
jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks
when a cross-domain Ajax request is performed without the dataType
option, causing text/javascript responses to be executed.
An attacker is able to perform cross-side scripting attacks by tricking
users to generate documentation with a vulnerable RDoc version. RDoc is
a static documentation generation tool, patching the tool itself is
insufficient to mitigate these vulnerabilities. Documentations
generated with previous versions have to be re-generated with newer
RDoc.
https://bugs.archlinux.org/task/63978
https://www.ruby-lang.org/en/news/2019/08/28/multiple-jquery-vulnerabilities-in-rdoc/
https://bugs.jquery.com/ticket/11290
https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d
https://github.com/jquery/jquery/issues/2432
https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc
https://security.archlinux.org/CVE-2012-6708
https://security.archlinux.org/CVE-2015-9251
bugs.archlinux.org/task/63978
bugs.jquery.com/ticket/11290
github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d
github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc
github.com/jquery/jquery/issues/2432
security.archlinux.org/AVG-1041
security.archlinux.org/CVE-2012-6708
security.archlinux.org/CVE-2015-9251
www.ruby-lang.org/en/news/2019/08/28/multiple-jquery-vulnerabilities-in-rdoc/
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
EPSS
Percentile
82.0%