Количество 1 966
Количество 1 966
GHSA-9gj3-hwp5-pmwc
XSS in the `altField` option of the Datepicker widget in jquery-ui

CVE-2021-41182
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources.

CVE-2021-41182
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources.

CVE-2021-41182
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources.
CVE-2021-41182
jQuery-UI is the official jQuery user interface library. Prior to vers ...

BDU:2023-07871
Уязвимость метода .position() библиотеки jQuery UI, позволяющая нарушителю выполнить произвольный код

RLSA-2025:1338
Moderate: gcc-toolset-14-gcc security update

RLSA-2025:1306
Moderate: gcc-toolset-13-gcc security update

RLSA-2025:1301
Moderate: gcc security update

RLSA-2025:1215
Moderate: tbb security update

RLSA-2021:1846
Moderate: idm:DL1 and idm:client security, bug fix, and enhancement update
GHSA-jpcq-cgw6-v4j6
Potential XSS vulnerability in jQuery

CVE-2020-11023
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVE-2020-11023
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVE-2020-11023
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11023
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, pa ...
GHSA-gxr4-xjj5-5px2
Potential XSS vulnerability in jQuery

CVE-2020-11022
In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVE-2020-11022
In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVE-2020-11022
In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-9gj3-hwp5-pmwc XSS in the `altField` option of the Datepicker widget in jquery-ui | CVSS3: 6.5 | 24% Средний | больше 3 лет назад | |
![]() | CVE-2021-41182 jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources. | CVSS3: 6.5 | 24% Средний | больше 3 лет назад |
![]() | CVE-2021-41182 jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources. | CVSS3: 6.5 | 24% Средний | больше 3 лет назад |
![]() | CVE-2021-41182 jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources. | CVSS3: 6.5 | 24% Средний | больше 3 лет назад |
CVE-2021-41182 jQuery-UI is the official jQuery user interface library. Prior to vers ... | CVSS3: 6.5 | 24% Средний | больше 3 лет назад | |
![]() | BDU:2023-07871 Уязвимость метода .position() библиотеки jQuery UI, позволяющая нарушителю выполнить произвольный код | CVSS3: 6.5 | 28% Средний | около 4 лет назад |
![]() | RLSA-2025:1338 Moderate: gcc-toolset-14-gcc security update | 12% Средний | 4 месяца назад | |
![]() | RLSA-2025:1306 Moderate: gcc-toolset-13-gcc security update | 12% Средний | 4 месяца назад | |
![]() | RLSA-2025:1301 Moderate: gcc security update | 12% Средний | 4 месяца назад | |
![]() | RLSA-2025:1215 Moderate: tbb security update | 12% Средний | 4 месяца назад | |
![]() | RLSA-2021:1846 Moderate: idm:DL1 and idm:client security, bug fix, and enhancement update | 12% Средний | около 4 лет назад | |
GHSA-jpcq-cgw6-v4j6 Potential XSS vulnerability in jQuery | CVSS3: 6.9 | 12% Средний | около 5 лет назад | |
![]() | CVE-2020-11023 In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. | CVSS3: 6.9 | 12% Средний | около 5 лет назад |
![]() | CVE-2020-11023 In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. | CVSS3: 6.1 | 12% Средний | около 5 лет назад |
![]() | CVE-2020-11023 In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. | CVSS3: 6.9 | 12% Средний | около 5 лет назад |
CVE-2020-11023 In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, pa ... | CVSS3: 6.9 | 12% Средний | около 5 лет назад | |
GHSA-gxr4-xjj5-5px2 Potential XSS vulnerability in jQuery | CVSS3: 6.9 | 5% Низкий | около 5 лет назад | |
![]() | CVE-2020-11022 In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. | CVSS3: 6.9 | 5% Низкий | около 5 лет назад |
![]() | CVE-2020-11022 In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. | CVSS3: 6.1 | 5% Низкий | около 5 лет назад |
![]() | CVE-2020-11022 In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. | CVSS3: 6.9 | 5% Низкий | около 5 лет назад |
Уязвимостей на страницу