Логотип exploitDog
product: "drupal"
Консоль
Логотип exploitDog

exploitDog

product: "drupal"

Количество 1 966

Количество 1 966

github логотип

GHSA-9gj3-hwp5-pmwc

больше 3 лет назад

XSS in the `altField` option of the Datepicker widget in jquery-ui

CVSS3: 6.5
EPSS: Средний
ubuntu логотип

CVE-2021-41182

больше 3 лет назад

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources.

CVSS3: 6.5
EPSS: Средний
redhat логотип

CVE-2021-41182

больше 3 лет назад

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources.

CVSS3: 6.5
EPSS: Средний
nvd логотип

CVE-2021-41182

больше 3 лет назад

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources.

CVSS3: 6.5
EPSS: Средний
debian логотип

CVE-2021-41182

больше 3 лет назад

jQuery-UI is the official jQuery user interface library. Prior to vers ...

CVSS3: 6.5
EPSS: Средний
fstec логотип

BDU:2023-07871

около 4 лет назад

Уязвимость метода .position() библиотеки jQuery UI, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.5
EPSS: Средний
rocky логотип

RLSA-2025:1338

4 месяца назад

Moderate: gcc-toolset-14-gcc security update

EPSS: Средний
rocky логотип

RLSA-2025:1306

4 месяца назад

Moderate: gcc-toolset-13-gcc security update

EPSS: Средний
rocky логотип

RLSA-2025:1301

4 месяца назад

Moderate: gcc security update

EPSS: Средний
rocky логотип

RLSA-2025:1215

4 месяца назад

Moderate: tbb security update

EPSS: Средний
rocky логотип

RLSA-2021:1846

около 4 лет назад

Moderate: idm:DL1 and idm:client security, bug fix, and enhancement update

EPSS: Средний
github логотип

GHSA-jpcq-cgw6-v4j6

около 5 лет назад

Potential XSS vulnerability in jQuery

CVSS3: 6.9
EPSS: Средний
ubuntu логотип

CVE-2020-11023

около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.9
EPSS: Средний
redhat логотип

CVE-2020-11023

около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.1
EPSS: Средний
nvd логотип

CVE-2020-11023

около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.9
EPSS: Средний
debian логотип

CVE-2020-11023

около 5 лет назад

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, pa ...

CVSS3: 6.9
EPSS: Средний
github логотип

GHSA-gxr4-xjj5-5px2

около 5 лет назад

Potential XSS vulnerability in jQuery

CVSS3: 6.9
EPSS: Низкий
ubuntu логотип

CVE-2020-11022

около 5 лет назад

In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.9
EPSS: Низкий
redhat логотип

CVE-2020-11022

около 5 лет назад

In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2020-11022

около 5 лет назад

In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-9gj3-hwp5-pmwc

XSS in the `altField` option of the Datepicker widget in jquery-ui

CVSS3: 6.5
24%
Средний
больше 3 лет назад
ubuntu логотип
CVE-2021-41182

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources.

CVSS3: 6.5
24%
Средний
больше 3 лет назад
redhat логотип
CVE-2021-41182

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources.

CVSS3: 6.5
24%
Средний
больше 3 лет назад
nvd логотип
CVE-2021-41182

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources.

CVSS3: 6.5
24%
Средний
больше 3 лет назад
debian логотип
CVE-2021-41182

jQuery-UI is the official jQuery user interface library. Prior to vers ...

CVSS3: 6.5
24%
Средний
больше 3 лет назад
fstec логотип
BDU:2023-07871

Уязвимость метода .position() библиотеки jQuery UI, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.5
28%
Средний
около 4 лет назад
rocky логотип
RLSA-2025:1338

Moderate: gcc-toolset-14-gcc security update

12%
Средний
4 месяца назад
rocky логотип
RLSA-2025:1306

Moderate: gcc-toolset-13-gcc security update

12%
Средний
4 месяца назад
rocky логотип
RLSA-2025:1301

Moderate: gcc security update

12%
Средний
4 месяца назад
rocky логотип
RLSA-2025:1215

Moderate: tbb security update

12%
Средний
4 месяца назад
rocky логотип
RLSA-2021:1846

Moderate: idm:DL1 and idm:client security, bug fix, and enhancement update

12%
Средний
около 4 лет назад
github логотип
GHSA-jpcq-cgw6-v4j6

Potential XSS vulnerability in jQuery

CVSS3: 6.9
12%
Средний
около 5 лет назад
ubuntu логотип
CVE-2020-11023

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.9
12%
Средний
около 5 лет назад
redhat логотип
CVE-2020-11023

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.1
12%
Средний
около 5 лет назад
nvd логотип
CVE-2020-11023

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.9
12%
Средний
около 5 лет назад
debian логотип
CVE-2020-11023

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, pa ...

CVSS3: 6.9
12%
Средний
около 5 лет назад
github логотип
GHSA-gxr4-xjj5-5px2

Potential XSS vulnerability in jQuery

CVSS3: 6.9
5%
Низкий
около 5 лет назад
ubuntu логотип
CVE-2020-11022

In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.9
5%
Низкий
около 5 лет назад
redhat логотип
CVE-2020-11022

In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.1
5%
Низкий
около 5 лет назад
nvd логотип
CVE-2020-11022

In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVSS3: 6.9
5%
Низкий
около 5 лет назад

Уязвимостей на страницу