Cross-site scripting (XSS) vulnerability in jQuery UI before 1.12.0 might allow remote attackers to inject arbitrary web script or HTML via the closeText parameter of the dialog function.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
History
21 Nov 2024, 02:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://rhn.redhat.com/errata/RHSA-2016-2932.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-2933.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2017-0161.html - Third Party Advisory, VDB Entry | |
References | () http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html - Patch, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/104823 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://github.com/jquery/api.jqueryui.com/issues/281 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
References | () https://github.com/jquery/jquery-ui/commit/9644e7bae9116edaf8d37c5b38cb32b892f10ff6 - Patch, Third Party Advisory | |
References | () https://jqueryui.com/changelog/1.12.0/ - Release Notes, Vendor Advisory | |
References | () https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E - Mailing List, Third Party Advisory | |
References | () https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E - Mailing List, Third Party Advisory | |
References | () https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6%40%3Ccommits.roller.apache.org%3E - Mailing List, Third Party Advisory | |
References | () https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E - Mailing List, Third Party Advisory | |
References | () https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E2I4UHPIW26FIALH7GGZ3IYUUA53VOOJ/ - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/ - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/ - Mailing List, Third Party Advisory | |
References | () https://nodesecurity.io/advisories/127 - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20190416-0007/ - Third Party Advisory | |
References | () https://www.drupal.org/sa-core-2022-002 - Third Party Advisory | |
References | () https://www.oracle.com//security-alerts/cpujul2021.html - Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuApr2021.html - Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuapr2020.html - Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujan2022.html - Third Party Advisory | |
References | () https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html - Patch, Third Party Advisory | |
References | () https://www.tenable.com/security/tns-2016-19 - Third Party Advisory |
04 Nov 2022, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
24 Oct 2022, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Feb 2022, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
19 Jan 2022, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
04 Aug 2021, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
CPE | cpe:2.3:a:redhat:openstack:9.0:*:*:*:*:*:*:* |
cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:* cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:* |
14 Jun 2021, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2017-03-15 16:59
Updated : 2025-04-20 01:37
NVD link : CVE-2016-7103
Mitre link : CVE-2016-7103
CVE.ORG link : CVE-2016-7103
JSON object : View
Products Affected
oracle
- application_express
- siebel_ui_framework
- hospitality_cruise_fleet_management
- primavera_unifier
- weblogic_server
- business_intelligence
- oss_support_tools
jqueryui
- jquery_ui
netapp
- snapcenter
juniper
- junos
debian
- debian_linux
fedoraproject
- fedora
redhat
- openstack
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')