Cross-site scripting (XSS) vulnerability in jQuery UI before 1.12.0 might allow remote attackers to inject arbitrary web script or HTML via the closeText parameter of the dialog function.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
History
22 Jun 2023, 19:50
Type | Values Removed | Values Added |
---|---|---|
First Time |
Oracle oss Support Tools
Debian Juniper junos Debian debian Linux Oracle siebel Ui Framework Juniper |
|
CPE | cpe:2.3:a:jquery:jquery_ui:*:*:*:*:*:*:*:* cpe:2.3:a:jqueryui:jquery_ui:1.10.0:rc1:*:*:*:*:*:* |
cpe:2.3:a:jqueryui:jquery_ui:*:*:*:*:*:*:*:* cpe:2.3:a:oracle:oss_support_tools:2.12.42:*:*:*:*:*:*:* cpe:2.3:a:oracle:siebel_ui_framework:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* cpe:2.3:a:oracle:oss_support_tools:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* |
References | (MISC) https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E - Mailing List, Third Party Advisory | |
References | (MISC) https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html - Patch, Third Party Advisory | |
References | (MISC) https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E - Mailing List, Third Party Advisory | |
References | (MISC) https://www.oracle.com/security-alerts/cpuApr2021.html - Third Party Advisory | |
References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/ - Mailing List, Third Party Advisory | |
References | (N/A) https://www.oracle.com//security-alerts/cpujul2021.html - Third Party Advisory | |
References | (CONFIRM) https://github.com/jquery/api.jqueryui.com/issues/281 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
References | (MISC) https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E - Mailing List, Third Party Advisory | |
References | (MISC) https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html - Patch, Third Party Advisory | |
References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E2I4UHPIW26FIALH7GGZ3IYUUA53VOOJ/ - Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html - Mailing List, Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/104823 - Broken Link, Third Party Advisory, VDB Entry | |
References | (CONFIRM) https://www.drupal.org/sa-core-2022-002 - Third Party Advisory | |
References | (MISC) https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E - Mailing List, Third Party Advisory | |
References | (MISC) https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6%40%3Ccommits.roller.apache.org%3E - Mailing List, Third Party Advisory | |
References | (CONFIRM) http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html - Patch, Third Party Advisory | |
References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/ - Mailing List, Third Party Advisory | |
References | (MISC) https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html - Patch, Third Party Advisory | |
References | (MISC) https://www.oracle.com/security-alerts/cpujan2022.html - Third Party Advisory |
21 Jun 2023, 17:50
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:jquery:jquery_ui:1.10.0:beta1:*:*:*:*:*:* |
cpe:2.3:a:jqueryui:jquery_ui:1.10.0:beta1:*:*:*:*:*:* cpe:2.3:a:jqueryui:jquery_ui:1.10.0:rc1:*:*:*:*:*:* |
First Time |
Jqueryui
Jqueryui jquery Ui |
04 Nov 2022, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
03 Nov 2022, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
24 Oct 2022, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Feb 2022, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
19 Jan 2022, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
04 Aug 2021, 17:15
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:redhat:openstack:8.0:*:*:*:*:*:*:* |
cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:* cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:* |
References |
|
14 Jun 2021, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2017-03-15 16:59
Updated : 2023-12-10 12:01
NVD link : CVE-2016-7103
Mitre link : CVE-2016-7103
CVE.ORG link : CVE-2016-7103
JSON object : View
Products Affected
oracle
- hospitality_cruise_fleet_management
- oss_support_tools
- weblogic_server
- business_intelligence
- primavera_unifier
- application_express
- siebel_ui_framework
netapp
- snapcenter
juniper
- junos
redhat
- openstack
jqueryui
- jquery_ui
debian
- debian_linux
fedoraproject
- fedora
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')