Cross-site scripting (XSS) vulnerability in jQuery UI before 1.12.0 might allow remote attackers to inject arbitrary web script or HTML via the closeText parameter of the dialog function.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
History
21 Nov 2024, 02:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://rhn.redhat.com/errata/RHSA-2016-2932.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-2933.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2017-0161.html - Third Party Advisory, VDB Entry | |
References | () http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html - Patch, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/104823 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://github.com/jquery/api.jqueryui.com/issues/281 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
References | () https://github.com/jquery/jquery-ui/commit/9644e7bae9116edaf8d37c5b38cb32b892f10ff6 - Patch, Third Party Advisory | |
References | () https://jqueryui.com/changelog/1.12.0/ - Release Notes, Vendor Advisory | |
References | () https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E - Mailing List, Third Party Advisory | |
References | () https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E - Mailing List, Third Party Advisory | |
References | () https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6%40%3Ccommits.roller.apache.org%3E - Mailing List, Third Party Advisory | |
References | () https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E - Mailing List, Third Party Advisory | |
References | () https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E2I4UHPIW26FIALH7GGZ3IYUUA53VOOJ/ - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/ - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/ - Mailing List, Third Party Advisory | |
References | () https://nodesecurity.io/advisories/127 - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20190416-0007/ - Third Party Advisory | |
References | () https://www.drupal.org/sa-core-2022-002 - Third Party Advisory | |
References | () https://www.oracle.com//security-alerts/cpujul2021.html - Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuApr2021.html - Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuapr2020.html - Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujan2022.html - Third Party Advisory | |
References | () https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html - Patch, Third Party Advisory | |
References | () https://www.tenable.com/security/tns-2016-19 - Third Party Advisory |
Information
Published : 2017-03-15 16:59
Updated : 2025-04-20 01:37
NVD link : CVE-2016-7103
Mitre link : CVE-2016-7103
CVE.ORG link : CVE-2016-7103
JSON object : View
Products Affected
oracle
- hospitality_cruise_fleet_management
- business_intelligence
- application_express
- oss_support_tools
- weblogic_server
- primavera_unifier
- siebel_ui_framework
netapp
- snapcenter
debian
- debian_linux
redhat
- openstack
jqueryui
- jquery_ui
fedoraproject
- fedora
juniper
- junos
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')