Описание
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-11023. Reason: This candidate is a duplicate of CVE-2020-11023. Notes: All CVE users should reference CVE-2020-11023 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support |
devel | DNE | |
esm-infra-legacy/trusty | not-affected | |
esm-infra/bionic | not-affected | |
esm-infra/focal | not-affected | |
esm-infra/xenial | not-affected | |
focal | ignored | end of standard support, was needs-triage |
jammy | DNE | |
kinetic | DNE | |
lunar | DNE |
Показывать по
Связанные уязвимости
A flaw was found in jQuery, where it is vulnerable to Cross-site scripting, caused by the improper validation of user-supplied input by the <options> element. This flaw allows a remote attacker to use a specially crafted URL to execute a script in a victim's web browser within the security context of the hosting website once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-11023. Reason: This candidate is a duplicate of CVE-2020-11023. Notes: All CVE users should reference CVE-2020-11023 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
Duplicate Advisory: jQuery Cross Site Scripting vulnerability
Уязвимость библиотеки jQuery, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю выполнить межсайтовй скриптинг