Vulnerability Description
jQuery 1.4.2 allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to use of the text method inside after.
CVSS Score
6.1
MEDIUM
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jquery | Jquery | 1.4.2 |
Related Weaknesses (CWE)
References
- http://seclists.org/fulldisclosure/2014/Sep/10Mailing ListThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1136683Issue TrackingThird Party Advisory
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+Struxur
- http://seclists.org/fulldisclosure/2014/Sep/10Mailing ListThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1136683Issue TrackingThird Party Advisory
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+Struxur
FAQ
What is CVE-2014-6071?
CVE-2014-6071 is a vulnerability with a CVSS score of 6.1 (MEDIUM). jQuery 1.4.2 allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to use of the text method inside after.
How severe is CVE-2014-6071?
CVE-2014-6071 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-6071?
Check the references section above for vendor advisories and patch information. Affected products include: Jquery Jquery.