CPANSA-Yukki-2010-5312-jqueryui: Yukki vulnerability
Publisher | giterlizzi | Document category | csaf_security_advisory |
---|---|---|---|
Initial release date | 2014-11-24T00:00:00 | Engine | CSAF Perl Toolkit 0.25 |
Current release date | 2014-11-24T00:00:00 | Build Date | |
Current version | 1 | Status | final |
CVSS v3.1 Base Score | 6.1 | Severity | |
Original language | Language | en | |
Also referred to |
Vulnerability Description
Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option.
Vulnerabilities
CVE-2010-5312
Vulnerability DescriptionCross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option.
Weakness | CWE-79 : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
---|
Product status
Known affected
Product | Score | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Yukki greater than or equal 0.0.121700 and less than or equal 0.140290 |
|
giterlizzi
Namespace: https://github.com/giterlizzi/
gdt@cpan.org
References
- CPANSA-Yukki-2010-5312-jqueryui JSON self
https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2014/cpansa-yukki-2010-5312-jqueryui.json - https://github.com/jquery/jquery-ui/commit/7e9060c109b928769a664dbcc2c17bd21231b6f3 external
https://github.com/jquery/jquery-ui/commit/7e9060c109b928769a664dbcc2c17bd21231b6f3 - http://seclists.org/oss-sec/2014/q4/616 external
http://seclists.org/oss-sec/2014/q4/616 - http://bugs.jqueryui.com/ticket/6016 external
http://bugs.jqueryui.com/ticket/6016 - http://seclists.org/oss-sec/2014/q4/613 external
http://seclists.org/oss-sec/2014/q4/613 - http://rhn.redhat.com/errata/RHSA-2015-0442.html external
http://rhn.redhat.com/errata/RHSA-2015-0442.html - http://www.debian.org/security/2015/dsa-3249 external
http://www.debian.org/security/2015/dsa-3249 - http://www.securityfocus.com/bid/71106 external
http://www.securityfocus.com/bid/71106 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html external
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html - http://rhn.redhat.com/errata/RHSA-2015-1462.html external
http://rhn.redhat.com/errata/RHSA-2015-1462.html - http://www.securitytracker.com/id/1037035 external
http://www.securitytracker.com/id/1037035 - https://exchange.xforce.ibmcloud.com/vulnerabilities/98696 external
https://exchange.xforce.ibmcloud.com/vulnerabilities/98696 - https://security.netapp.com/advisory/ntap-20190416-0007/ external
https://security.netapp.com/advisory/ntap-20190416-0007/ - https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E external
https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E - https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E external
https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E - https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html external
https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html - https://www.drupal.org/sa-core-2022-002 external
https://www.drupal.org/sa-core-2022-002 - https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E external
https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E - CVE-2010-5312 (NVD) external
https://nvd.nist.gov/vuln/detail/CVE-2010-5312
Revision history
Version | Date of the revision | Summary of the revision |
---|---|---|
1 | Mon Nov 24 00:00:00 2014 | First release |
Sharing rules
TLP:WHITE
For the TLP version see: https://www.first.org/tlp/