CVE-2016-10537

Source
https://nvd.nist.gov/vuln/detail/CVE-2016-10537
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-10537.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2016-10537
Aliases
Published
2018-05-31T20:29:01Z
Modified
2025-07-29T06:59:29.406137Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

backbone is a module that adds in structure to a JavaScript heavy application through key-value pairs and custom events connecting to your RESTful API through JSON There exists a potential Cross Site Scripting vulnerability in the Model#Escape function of backbone 0.3.3 and earlier, if a user is able to supply input. This is due to the regex that's replacing things to miss the conversion of things such as < to <.

References

Affected packages

Debian:11 / backbone

Package

Name
backbone
Purl
pkg:deb/debian/backbone?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.5.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / backbone

Package

Name
backbone
Purl
pkg:deb/debian/backbone?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.5.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / backbone

Package

Name
backbone
Purl
pkg:deb/debian/backbone?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.5.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/jashkenas/backbone

Affected ranges

Type
GIT
Repo
https://github.com/jashkenas/backbone
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

0.*

0.1.0
0.1.1
0.1.2
0.2.0
0.3.0
0.3.1
0.3.2
0.3.3