Attacker Value
Moderate
6
CVE-2015-9251
6
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Attacker Value
Moderate
(1 user assessed)Exploitability
Low
(1 user assessed)User Interaction
Unknown
Privileges Required
Unknown
Attack Vector
Unknown
6
MITRE ATT&CK
Log in to add MITRE ATT&CK tag
Add MITRE ATT&CK tactics and techniques that apply to this CVE.
Collection
Techniques
Validation
Validated
Initial Access
Techniques
Validation
Validated
MITRE ATT&CK
Select the MITRE ATT&CK Tactics that apply to this CVE
Collection
Select any Techniques used:
Command and Control
Select any Techniques used:
Credential Access
Select any Techniques used:
Defense Evasion
Select any Techniques used:
Discovery
Select any Techniques used:
Execution
Select any Techniques used:
Exfiltration
Select any Techniques used:
Impact
Select any Techniques used:
Initial Access
Select any Techniques used:
Lateral Movement
Select any Techniques used:
Persistence
Select any Techniques used:
Privilege Escalation
Select any Techniques used:
Common in enterpriseVulnerable in default configurationNo useful accessVulnerable in uncommon configuration
Topic Tags
Select the tags that apply to this CVE (Assessment added tags are disabled and cannot be removed)
What makes this of high-value to an attacker?
What makes this of low-value to an attacker?
Description
jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
Add Assessment
0
Ratings
-
Attacker ValueMedium
-
ExploitabilityLow
Would you also like to delete your Exploited in the Wild Report?
Delete Assessment Only Delete Assessment and Exploited in the Wild ReportCVSS V3 Severity and Metrics
Data provided by the National Vulnerability Database (NVD)
Base Score:
None
Impact Score:
Unknown
Exploitability Score:
Unknown
Attack Vector (AV):
Unknown
Attack Complexity (AC):
Unknown
Privileges Required (PR):
Unknown
User Interaction (UI):
Unknown
Scope (S):
Unknown
Confidentiality (C):
Unknown
Integrity (I):
Unknown
Availability (A):
Unknown
General Information
Offensive Application
Unknown
Utility Class
Unknown
Ports
Unknown
OS
Unknown
Vulnerable Versions
n/a
Prerequisites
Unknown
Discovered By
Unknown
PoC Author
Unknown
Metasploit Module
Unknown
Reporter
Unknown
Vendors
- jquery,
- oracle
Products
- agile product lifecycle management for process 6.2.0.0,
- agile product lifecycle management for process 6.2.1.0,
- agile product lifecycle management for process 6.2.2.0,
- agile product lifecycle management for process 6.2.3.0,
- agile product lifecycle management for process 6.2.3.1,
- banking platform 2.6.0,
- banking platform 2.6.1,
- banking platform 2.6.2,
- business process management suite 11.1.1.9.0,
- business process management suite 12.1.3.0.0,
- business process management suite 12.2.1.3.0,
- communications converged application server,
- communications interactive session recorder 6.0,
- communications interactive session recorder 6.1,
- communications interactive session recorder 6.2,
- communications services gatekeeper,
- communications webrtc session controller,
- endeca information discovery studio 3.1.0,
- endeca information discovery studio 3.2.0,
- enterprise manager ops center 12.2.2,
- enterprise manager ops center 12.3.3,
- enterprise operations monitor 3.4,
- enterprise operations monitor 4.0,
- financial services analytical applications infrastructure,
- financial services asset liability management,
- financial services data integration hub,
- financial services funds transfer pricing,
- financial services hedge management and ifrs valuations,
- financial services liquidity risk management,
- financial services loan loss forecasting and provisioning,
- financial services market risk measurement and management 8.0.5,
- financial services market risk measurement and management 8.0.6,
- financial services profitability management,
- financial services reconciliation framework 8.0.5,
- financial services reconciliation framework 8.0.6,
- fusion middleware mapviewer 12.2.1.3.0,
- healthcare foundation 7.1,
- healthcare foundation 7.2,
- healthcare translational research 3.1.0,
- hospitality cruise fleet management 9.0.11,
- hospitality guest access 4.2.0,
- hospitality guest access 4.2.1,
- hospitality materials control 18.1,
- hospitality reporting and analytics 9.1.0,
- insurance insbridge rating and underwriting 5.2,
- insurance insbridge rating and underwriting 5.4,
- insurance insbridge rating and underwriting 5.5,
- jd edwards enterpriseone tools 9.2,
- jdeveloper 11.1.1.9.0,
- jdeveloper 12.1.3.0.0,
- jdeveloper 12.2.1.3.0,
- jquery,
- oss support tools 19.1,
- peoplesoft enterprise peopletools 8.55,
- peoplesoft enterprise peopletools 8.56,
- peoplesoft enterprise peopletools 8.57,
- primavera gateway 15.2,
- primavera gateway 16.2,
- primavera gateway 17.12,
- primavera unifier,
- primavera unifier 16.1,
- primavera unifier 16.2,
- primavera unifier 18.8,
- real-time scheduler 2.3.0,
- retail allocation 15.0.2,
- retail customer insights 15.0,
- retail customer insights 16.0,
- retail invoice matching 15.0,
- retail sales audit 15.0,
- retail workforce management software 1.60.9,
- retail workforce management software 1.64.0,
- service bus 12.1.3.0.0,
- service bus 12.2.1.3.0,
- siebel ui framework 18.10,
- siebel ui framework 18.11,
- utilities framework,
- utilities mobile workforce management 2.3.0,
- webcenter sites 11.1.1.8.0,
- weblogic server 12.1.3.0,
- weblogic server 12.2.1.3
References
Advisory
Miscellaneous
Additional Info
Authenticated
Unknown
Exploitable
Unknown
Reliability
Unknown
Stability
Unknown
Available Mitigations
Unknown
Shelf Life
Unknown
Userbase/Installbase
Unknown
Patch Effectiveness
Unknown
Rapid7
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: