{"uuid": "b7192aa1-b2ad-469d-937d-cd60ddd46efd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2015-9251", "type": "seen", "source": "https://t.me/syr00000000/584", "content": "+] Vulnerable component: jquery v2.2.4 \n[!] Component location: https://moe.gov.sy/js/jquery.js \n[!] Total vulnerabilities: 3 \n[!] Summary: parseHTML() executes scripts in event handlers \n[!] Severity: medium \n[!] CVE: CVE-2015-9251 \n[!] Summary: 3rd party CORS request may execute \n[!] Severity: medium \n[!] CVE: CVE-2015-9251 \n[!] Summary: jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution \n[!] Severity: low \n[!] CVE: CVE-2019-11358", "creation_timestamp": "2025-06-08T23:22:14.000000Z"}