Show filters
49 Total Results
Displaying 11-20 of 49
Sort by:
Attacker Value
Unknown

CVE-2022-30241

Disclosure Date: May 04, 2022 (last updated October 07, 2023)
The jquery.json-viewer library through 1.4.0 for Node.js does not properly escape characters such as < in a JSON object, as demonstrated by a SCRIPT element.
Attacker Value
Unknown

CVE-2022-1291

Disclosure Date: April 10, 2022 (last updated October 07, 2023)
XSS vulnerability with default `onCellHtmlData` function in GitHub repository hhurz/tableexport.jquery.plugin prior to 1.25.0. Transmitting cookies to third-party servers. Sending data from secure sessions to third-party servers
Attacker Value
Unknown

CVE-2022-23395

Disclosure Date: March 02, 2022 (last updated October 07, 2023)
jQuery Cookie 1.4.1 is affected by prototype pollution, which can lead to DOM cross-site scripting (XSS).
Attacker Value
Unknown

CVE-2022-24985

Disclosure Date: February 16, 2022 (last updated October 07, 2023)
Forms generated by JQueryForm.com before 2022-02-05 allows a remote authenticated attacker to bypass authentication and access the administrative section of other forms hosted on the same web server. This is relevant only when an organization hosts more than one of these forms on their server.
Attacker Value
Unknown

CVE-2022-24984

Disclosure Date: February 16, 2022 (last updated October 07, 2023)
Forms generated by JQueryForm.com before 2022-02-05 (if file-upload capability is enabled) allow remote unauthenticated attackers to upload executable files and achieve remote code execution. This occurs because file-extension checks occur on the client side, and because not all executable content (e.g., .phtml or .php.bak) is blocked.
Attacker Value
Unknown

CVE-2022-24983

Disclosure Date: February 16, 2022 (last updated October 07, 2023)
Forms generated by JQueryForm.com before 2022-02-05 allow remote attackers to obtain the URI to any uploaded file by capturing the POST response. When chained with CVE-2022-24984, this could lead to unauthenticated remote code execution on the underlying web server. This occurs because the Unique ID field is contained in the POST response upon submitting a form.
Attacker Value
Unknown

CVE-2022-24982

Disclosure Date: February 16, 2022 (last updated October 07, 2023)
Forms generated by JQueryForm.com before 2022-02-05 allows a remote authenticated attacker to access the cleartext credentials of all other form users. admin.php contains a hidden base64-encoded string with these credentials.
Attacker Value
Unknown

CVE-2022-24981

Disclosure Date: February 16, 2022 (last updated October 07, 2023)
A reflected cross-site scripting (XSS) vulnerability in forms generated by JQueryForm.com before 2022-02-05 allows remote attackers to inject arbitrary web script or HTML via the redirect parameter to admin.php.
Attacker Value
Unknown

CVE-2021-43862

Disclosure Date: December 30, 2021 (last updated October 07, 2023)
jQuery Terminal Emulator is a plugin for creating command line interpreters in your applications. Versions prior to 2.31.1 contain a low impact and limited cross-site scripting (XSS) vulnerability. The code for XSS payload is always visible, but an attacker can use other techniques to hide the code the victim sees. If the application uses the `execHash` option and executes code from URL, the attacker can use this URL to execute their code. The scope is limited because the javascript attribute used is added to span tag, so no automatic execution like with `onerror` on images is possible. This issue is fixed in version 2.31.1. As a workaround, the user can use formatting that wrap whole user input and its no op. The code for this workaround is available in the GitHub Security Advisory. The fix will only work when user of the library is not using different formatters (e.g. to highlight code in different way).
Attacker Value
Unknown

CVE-2021-41182

Disclosure Date: October 26, 2021 (last updated November 28, 2024)
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources.