{"uuid": "c6d8296c-8e0f-471b-9c8f-1dd4ba985d23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-11358", "type": "seen", "source": "https://t.me/syr00000000/6451", "content": "+] Vulnerable component: jquery v2.2.4 \n[!] Component location: https://moe.gov.sy/js/jquery.js \n[!] Total vulnerabilities: 3 \n[!] Summary: parseHTML() executes scripts in event handlers \n[!] Severity: medium \n[!] CVE: CVE-2015-9251 \n[!] Summary: 3rd party CORS request may execute \n[!] Severity: medium \n[!] CVE: CVE-2015-9251 \n[!] Summary: jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution \n[!] Severity: low \n[!] CVE: CVE-2019-11358", "creation_timestamp": "2025-06-08T23:22:14.000000Z"}