
We found results for “”
CVE-2016-10707
Good to know:


Date: January 18, 2018
jQuery 3.0.0-rc.1 is vulnerable to Denial of Service (DoS) due to removing a logic that lowercased attribute names. Any attribute getter using a mixed-cased name for boolean attributes goes into an infinite recursion, exceeding the stack call limit.
Language: Java
Severity Score
Related Resources (9)
Severity Score
Top Fix

Upgrade Version
Upgrade to version jQuery - 3.1.0;jquery - 3.0.0;org.webjars.npm:jquery:3.0.0;org.webjars.bowergithub.jquery:jquery-dist:3.0.0;org.webjars:jquery:3.0.0;org.webjars.npm:jquery-mobile:no_fix;org.webjars.bower:jquery:3.0.0
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | NONE |
Integrity (I): | NONE |
Availability (A): | HIGH |
CVSS v2
Base Score: |
|
---|---|
Access Vector (AV): | NETWORK |
Access Complexity (AC): | LOW |
Authentication (AU): | NONE |
Confidentiality (C): | NONE |
Integrity (I): | NONE |
Availability (A): | PARTIAL |
Additional information: |