Show filters
49 Total Results
Displaying 21-30 of 49
Sort by:
Attacker Value
Unknown

CVE-2021-41183

Disclosure Date: October 26, 2021 (last updated November 28, 2024)
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML. A workaround is to not accept the value of the `*Text` options from untrusted sources.
Attacker Value
Unknown

CVE-2021-41184

Disclosure Date: October 26, 2021 (last updated November 28, 2024)
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `of` option of the `.position()` util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. A workaround is to not accept the value of the `of` option from untrusted sources.
Attacker Value
Unknown

CVE-2021-24543

Disclosure Date: October 25, 2021 (last updated November 28, 2024)
The jQuery Reply to Comment WordPress plugin through 1.31 does not have any CSRF check when saving its settings, nor sanitise or escape its 'Quote String' and 'Reply String' settings before outputting them in Comments, leading to a Stored Cross-Site Scripting issue.
Attacker Value
Unknown

CVE-2021-20083

Disclosure Date: April 23, 2021 (last updated November 08, 2023)
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in jquery-plugin-query-object 2.2.3 allows a malicious user to inject properties into Object.prototype.
Attacker Value
Unknown

CVE-2021-20086

Disclosure Date: April 23, 2021 (last updated November 28, 2024)
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in jquery-bbq 1.2.1 allows a malicious user to inject properties into Object.prototype.
Attacker Value
Unknown

CVE-2021-20084

Disclosure Date: April 23, 2021 (last updated November 28, 2024)
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in jquery-sparkle 1.5.2-beta allows a malicious user to inject properties into Object.prototype.
Attacker Value
Unknown

CVE-2021-21252

Disclosure Date: January 13, 2021 (last updated February 22, 2025)
The jQuery Validation Plugin provides drop-in validation for your existing forms. It is published as an npm package "jquery-validation". jquery-validation before version 1.19.3 contains one or more regular expressions that are vulnerable to ReDoS (Regular Expression Denial of Service). This is fixed in 1.19.3.
Attacker Value
Unknown

CVE-2020-7656

Disclosure Date: May 19, 2020 (last updated February 21, 2025)
jquery prior to 1.9.0 allows Cross-site Scripting attacks via the load method. The load method fails to recognize and remove "<script>" HTML tags that contain a whitespace character, i.e: "</script >", which results in the enclosed script logic to be executed.
Attacker Value
Unknown

CVE-2018-18405

Disclosure Date: April 22, 2020 (last updated February 21, 2025)
jQuery v2.2.2 allows XSS via a crafted onerror attribute of an IMG element. NOTE: this vulnerability has been reported to be spam entry
Attacker Value
Unknown

CVE-2014-8739

Disclosure Date: February 08, 2020 (last updated February 21, 2025)
Unrestricted file upload vulnerability in server/php/UploadHandler.php in the jQuery File Upload Plugin 6.4.4 for jQuery, as used in the Creative Solutions Creative Contact Form (formerly Sexy Contact Form) before 1.0.0 for WordPress and before 2.0.1 for Joomla!, allows remote attackers to execute arbitrary code by uploading a PHP file with an PHP extension, then accessing it via a direct request to the file in files/, as exploited in the wild in October 2014.