Логотип exploitDog
product: "drupal"
Консоль
Логотип exploitDog

exploitDog

product: "drupal"

Количество 1 988

Количество 1 988

ubuntu логотип

CVE-2021-41164

около 4 лет назад

CKEditor4 is an open source WYSIWYG HTML editor. In affected versions a vulnerability has been discovered in the Advanced Content Filter (ACF) module and may affect all plugins used by CKEditor 4. The vulnerability allowed to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at version < 4.17.0. The problem has been recognized and patched. The fix will be available in version 4.17.0.

CVSS3: 8.2
EPSS: Низкий
nvd логотип

CVE-2021-41164

около 4 лет назад

CKEditor4 is an open source WYSIWYG HTML editor. In affected versions a vulnerability has been discovered in the Advanced Content Filter (ACF) module and may affect all plugins used by CKEditor 4. The vulnerability allowed to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at version < 4.17.0. The problem has been recognized and patched. The fix will be available in version 4.17.0.

CVSS3: 8.2
EPSS: Низкий
debian логотип

CVE-2021-41164

около 4 лет назад

CKEditor4 is an open source WYSIWYG HTML editor. In affected versions ...

CVSS3: 8.2
EPSS: Низкий
github логотип

GHSA-vcjf-mgcg-jxjq

больше 4 лет назад

CKEditor 4.0 vulnerability in the HTML Data Processor

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-7c37-p4gh-wrh2

почти 4 года назад

Multiple cross-site scripting (XSS) vulnerabilities in the Token module before 4.7.x-1.5, and 5.x before 5.x-1.9, for Drupal; as used by the ASIN Field, e-Commerce, Fullname field for CCK, Invite, Node Relativity, Pathauto, PayPal Node, and Ubercart modules; allow remote authenticated users with a post comments privilege to inject arbitrary web script or HTML via unspecified vectors related to (1) comments, (2) vocabulary names, (3) term names, and (4) usernames.

EPSS: Низкий
ubuntu логотип

CVE-2020-9281

почти 6 лет назад

A cross-site scripting (XSS) vulnerability in the HTML Data Processor for CKEditor 4.0 before 4.14 allows remote attackers to inject arbitrary web script through a crafted "protected" comment (with the cke_protected syntax).

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2020-9281

почти 6 лет назад

A cross-site scripting (XSS) vulnerability in the HTML Data Processor for CKEditor 4.0 before 4.14 allows remote attackers to inject arbitrary web script through a crafted "protected" comment (with the cke_protected syntax).

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2007-5621

больше 18 лет назад

Multiple cross-site scripting (XSS) vulnerabilities in the Token module before 4.7.x-1.5, and 5.x before 5.x-1.9, for Drupal; as used by the ASIN Field, e-Commerce, Fullname field for CCK, Invite, Node Relativity, Pathauto, PayPal Node, and Ubercart modules; allow remote authenticated users with a post comments privilege to inject arbitrary web script or HTML via unspecified vectors related to (1) comments, (2) vocabulary names, (3) term names, and (4) usernames.

CVSS2: 3.5
EPSS: Низкий
github логотип

GHSA-j7qv-pgf6-hvh4

больше 4 лет назад

XSS in `*Text` options of the Datepicker widget in jquery-ui

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-gpqq-952q-5327

больше 4 лет назад

XSS in the `of` option of the `.position()` util in jquery-ui

CVSS3: 6.5
EPSS: Средний
ubuntu логотип

CVE-2021-41184

больше 4 лет назад

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `of` option of the `.position()` util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. A workaround is to not accept the value of the `of` option from untrusted sources.

CVSS3: 6.5
EPSS: Средний
redhat логотип

CVE-2021-41184

больше 4 лет назад

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `of` option of the `.position()` util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. A workaround is to not accept the value of the `of` option from untrusted sources.

CVSS3: 6.5
EPSS: Средний
nvd логотип

CVE-2021-41184

больше 4 лет назад

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `of` option of the `.position()` util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. A workaround is to not accept the value of the `of` option from untrusted sources.

CVSS3: 6.5
EPSS: Средний
debian логотип

CVE-2021-41184

больше 4 лет назад

jQuery-UI is the official jQuery user interface library. Prior to vers ...

CVSS3: 6.5
EPSS: Средний
ubuntu логотип

CVE-2021-41183

больше 4 лет назад

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML. A workaround is to not accept the value of the `*Text` options from untrusted sources.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2021-41183

больше 4 лет назад

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML. A workaround is to not accept the value of the `*Text` options from untrusted sources.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2021-41183

больше 4 лет назад

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML. A workaround is to not accept the value of the `*Text` options from untrusted sources.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2021-41183

больше 4 лет назад

jQuery-UI is the official jQuery user interface library. Prior to vers ...

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-9gj3-hwp5-pmwc

больше 4 лет назад

XSS in the `altField` option of the Datepicker widget in jquery-ui

CVSS3: 6.5
EPSS: Средний
ubuntu логотип

CVE-2021-41182

больше 4 лет назад

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources.

CVSS3: 6.5
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-41164

CKEditor4 is an open source WYSIWYG HTML editor. In affected versions a vulnerability has been discovered in the Advanced Content Filter (ACF) module and may affect all plugins used by CKEditor 4. The vulnerability allowed to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at version < 4.17.0. The problem has been recognized and patched. The fix will be available in version 4.17.0.

CVSS3: 8.2
0%
Низкий
около 4 лет назад
nvd логотип
CVE-2021-41164

CKEditor4 is an open source WYSIWYG HTML editor. In affected versions a vulnerability has been discovered in the Advanced Content Filter (ACF) module and may affect all plugins used by CKEditor 4. The vulnerability allowed to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at version < 4.17.0. The problem has been recognized and patched. The fix will be available in version 4.17.0.

CVSS3: 8.2
0%
Низкий
около 4 лет назад
debian логотип
CVE-2021-41164

CKEditor4 is an open source WYSIWYG HTML editor. In affected versions ...

CVSS3: 8.2
0%
Низкий
около 4 лет назад
github логотип
GHSA-vcjf-mgcg-jxjq

CKEditor 4.0 vulnerability in the HTML Data Processor

CVSS3: 6.1
1%
Низкий
больше 4 лет назад
github логотип
GHSA-7c37-p4gh-wrh2

Multiple cross-site scripting (XSS) vulnerabilities in the Token module before 4.7.x-1.5, and 5.x before 5.x-1.9, for Drupal; as used by the ASIN Field, e-Commerce, Fullname field for CCK, Invite, Node Relativity, Pathauto, PayPal Node, and Ubercart modules; allow remote authenticated users with a post comments privilege to inject arbitrary web script or HTML via unspecified vectors related to (1) comments, (2) vocabulary names, (3) term names, and (4) usernames.

0%
Низкий
почти 4 года назад
ubuntu логотип
CVE-2020-9281

A cross-site scripting (XSS) vulnerability in the HTML Data Processor for CKEditor 4.0 before 4.14 allows remote attackers to inject arbitrary web script through a crafted "protected" comment (with the cke_protected syntax).

CVSS3: 6.1
1%
Низкий
почти 6 лет назад
nvd логотип
CVE-2020-9281

A cross-site scripting (XSS) vulnerability in the HTML Data Processor for CKEditor 4.0 before 4.14 allows remote attackers to inject arbitrary web script through a crafted "protected" comment (with the cke_protected syntax).

CVSS3: 6.1
1%
Низкий
почти 6 лет назад
nvd логотип
CVE-2007-5621

Multiple cross-site scripting (XSS) vulnerabilities in the Token module before 4.7.x-1.5, and 5.x before 5.x-1.9, for Drupal; as used by the ASIN Field, e-Commerce, Fullname field for CCK, Invite, Node Relativity, Pathauto, PayPal Node, and Ubercart modules; allow remote authenticated users with a post comments privilege to inject arbitrary web script or HTML via unspecified vectors related to (1) comments, (2) vocabulary names, (3) term names, and (4) usernames.

CVSS2: 3.5
0%
Низкий
больше 18 лет назад
github логотип
GHSA-j7qv-pgf6-hvh4

XSS in `*Text` options of the Datepicker widget in jquery-ui

CVSS3: 6.5
5%
Низкий
больше 4 лет назад
github логотип
GHSA-gpqq-952q-5327

XSS in the `of` option of the `.position()` util in jquery-ui

CVSS3: 6.5
15%
Средний
больше 4 лет назад
ubuntu логотип
CVE-2021-41184

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `of` option of the `.position()` util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. A workaround is to not accept the value of the `of` option from untrusted sources.

CVSS3: 6.5
15%
Средний
больше 4 лет назад
redhat логотип
CVE-2021-41184

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `of` option of the `.position()` util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. A workaround is to not accept the value of the `of` option from untrusted sources.

CVSS3: 6.5
15%
Средний
больше 4 лет назад
nvd логотип
CVE-2021-41184

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `of` option of the `.position()` util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. A workaround is to not accept the value of the `of` option from untrusted sources.

CVSS3: 6.5
15%
Средний
больше 4 лет назад
debian логотип
CVE-2021-41184

jQuery-UI is the official jQuery user interface library. Prior to vers ...

CVSS3: 6.5
15%
Средний
больше 4 лет назад
ubuntu логотип
CVE-2021-41183

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML. A workaround is to not accept the value of the `*Text` options from untrusted sources.

CVSS3: 6.5
5%
Низкий
больше 4 лет назад
redhat логотип
CVE-2021-41183

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML. A workaround is to not accept the value of the `*Text` options from untrusted sources.

CVSS3: 6.5
5%
Низкий
больше 4 лет назад
nvd логотип
CVE-2021-41183

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML. A workaround is to not accept the value of the `*Text` options from untrusted sources.

CVSS3: 6.5
5%
Низкий
больше 4 лет назад
debian логотип
CVE-2021-41183

jQuery-UI is the official jQuery user interface library. Prior to vers ...

CVSS3: 6.5
5%
Низкий
больше 4 лет назад
github логотип
GHSA-9gj3-hwp5-pmwc

XSS in the `altField` option of the Datepicker widget in jquery-ui

CVSS3: 6.5
24%
Средний
больше 4 лет назад
ubuntu логотип
CVE-2021-41182

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources.

CVSS3: 6.5
24%
Средний
больше 4 лет назад

Уязвимостей на страницу