{
  "threat_severity" : "Moderate",
  "public_date" : "2012-11-27T00:00:00Z",
  "bugzilla" : {
    "description" : "jquery-ui: XSS vulnerability in default content in Tooltip widget",
    "id" : "1166064",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1166064"
  },
  "cvss" : {
    "cvss_base_score" : "4.3",
    "cvss_scoring_vector" : "AV:N/AC:M/Au:N/C:N/I:P/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-79",
  "details" : [ "Cross-site scripting (XSS) vulnerability in the default content option in jquery.ui.tooltip.js in the Tooltip widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title attribute, which is not properly handled in the autocomplete combo box demo." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2015-07-21T00:00:00Z",
    "advisory" : "RHSA-2015:1462",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "ipa-0:3.0.0-47.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2015-03-05T00:00:00Z",
    "advisory" : "RHSA-2015:0442",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "ipa-0:4.1.0-18.el7"
  } ],
  "package_state" : [ {
    "product_name" : "CloudForms Management Engine 5",
    "fix_state" : "Will not fix",
    "package_name" : "ruby193-rubygem-jquery-rails",
    "cpe" : "cpe:/a:redhat:cloudforms_managementengine:5"
  }, {
    "product_name" : "OpenShift Enterprise 1",
    "fix_state" : "Will not fix",
    "package_name" : "ruby193-rubygem-jquery-rails",
    "cpe" : "cpe:/a:redhat:openshift:1"
  }, {
    "product_name" : "OpenStack Foreman",
    "fix_state" : "Will not fix",
    "package_name" : "ruby193-rubygem-jquery-ui-rails",
    "cpe" : "cpe:/a:redhat:openstack-installer:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Will not fix",
    "package_name" : "python-sphinx",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Will not fix",
    "package_name" : "python-sphinx",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Will not fix",
    "package_name" : "yelp-xsl",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat OpenShift Enterprise 2",
    "fix_state" : "Will not fix",
    "package_name" : "ruby193-rubygem-jquery-rails",
    "cpe" : "cpe:/a:redhat:openshift:2"
  }, {
    "product_name" : "Red Hat OpenStack Platform 4",
    "fix_state" : "Will not fix",
    "package_name" : "ruby193-rubygem-jquery-rails",
    "cpe" : "cpe:/a:redhat:openstack:4"
  }, {
    "product_name" : "Red Hat Satellite 6",
    "fix_state" : "Will not fix",
    "package_name" : "ruby193-rubygem-jquery-ui-rails",
    "cpe" : "cpe:/a:redhat:satellite:6"
  }, {
    "product_name" : "Red Hat Software Collections for Red Hat Enterprise Linux",
    "fix_state" : "Will not fix",
    "package_name" : "ror40-rubygem-jquery-rails",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:1"
  }, {
    "product_name" : "Red Hat Software Collections for Red Hat Enterprise Linux",
    "fix_state" : "Will not fix",
    "package_name" : "ruby193-rubygem-jquery-rails",
    "cpe" : "cpe:/a:redhat:rhel_software_collections:1"
  }, {
    "product_name" : "Red Hat Subscription Asset Manager",
    "fix_state" : "Will not fix",
    "package_name" : "ruby193-rubygem-jquery-rails",
    "cpe" : "cpe:/a:rhel_sam:1"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2012-6662\nhttps://nvd.nist.gov/vuln/detail/CVE-2012-6662" ],
  "name" : "CVE-2012-6662",
  "csaw" : false
}