6.9
CVE-2020-11023
- EPSS 21.32%
- Published 29.04.2020 21:15:11
- Last modified 24.01.2025 02:00:02
- Source security-advisories@github.com
- Teams watchlist Login
- Open Login
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
Data is provided by the National Vulnerability Database (NVD)
Debian ≫ Debian Linux Version9.0
Fedoraproject ≫ Fedora Version31
Fedoraproject ≫ Fedora Version32
Fedoraproject ≫ Fedora Version33
Oracle ≫ Application Express Version < 20.2
Oracle ≫ Application Testing Suite Version13.3.0.1
Oracle ≫ Banking Enterprise Collections Version >= 2.7.0 <= 2.8.0
Oracle ≫ Banking Platform Version >= 2.4.0 <= 2.10.0
Oracle ≫ Business Intelligence Version5.9.0.0.0 SwEditionenterprise
Oracle ≫ Communications Analytics Version12.1.1
Oracle ≫ Communications Eagle Application Processor Version >= 16.1.0 <= 16.4.0
Oracle ≫ Communications Element Manager Version8.1.1
Oracle ≫ Communications Element Manager Version8.2.0
Oracle ≫ Communications Element Manager Version8.2.1
Oracle ≫ Communications Interactive Session Recorder Version >= 6.1 <= 6.4
Oracle ≫ Communications Operations Monitor Version >= 4.1 <= 4.3
Oracle ≫ Communications Operations Monitor Version3.4
Oracle ≫ Communications Services Gatekeeper Version7.0
Oracle ≫ Communications Session Report Manager Version8.1.1
Oracle ≫ Communications Session Report Manager Version8.2.0
Oracle ≫ Communications Session Report Manager Version8.2.1
Oracle ≫ Communications Session Route Manager Version8.1.1
Oracle ≫ Communications Session Route Manager Version8.2.0
Oracle ≫ Communications Session Route Manager Version8.2.1
Oracle ≫ Health Sciences Inform Version6.3.0
Oracle ≫ Healthcare Translational Research Version3.2.1
Oracle ≫ Healthcare Translational Research Version3.3.1
Oracle ≫ Healthcare Translational Research Version3.3.2
Oracle ≫ Healthcare Translational Research Version3.4.0
Oracle ≫ Hyperion Financial Reporting Version11.1.2.4
Oracle ≫ Jd Edwards Enterpriseone Orchestrator Version < 9.2.5.0
Oracle ≫ Jd Edwards Enterpriseone Tools Version < 9.2.5.0
Oracle ≫ Oss Support Tools Version < 2.12.41
Oracle ≫ Primavera Gateway Version >= 16.2 <= 16.2.11
Oracle ≫ Primavera Gateway Version >= 17.12.0 <= 17.12.7
Oracle ≫ Primavera Gateway Version >= 18.8.0 <= 18.8.9
Oracle ≫ Primavera Gateway Version >= 19.12.0 <= 19.12.4
Oracle ≫ Rest Data Services Version11.2.0.4 SwEdition-
Oracle ≫ Rest Data Services Version12.1.0.2 SwEdition-
Oracle ≫ Rest Data Services Version12.2.0.1 SwEdition-
Oracle ≫ Rest Data Services Version18c SwEdition-
Oracle ≫ Rest Data Services Version19c SwEdition-
Oracle ≫ Siebel Mobile Version <= 20.12
Oracle ≫ Storagetek Acsls Version8.5.1
Oracle ≫ Storagetek Tape Analytics Sw Tool Version2.3.1
Oracle ≫ Webcenter Sites Version12.2.1.3.0
Oracle ≫ Webcenter Sites Version12.2.1.4.0
Oracle ≫ Weblogic Server Version12.1.3.0.0
Oracle ≫ Weblogic Server Version12.2.1.3.0
Oracle ≫ Weblogic Server Version12.2.1.4.0
Oracle ≫ Weblogic Server Version14.1.1.0.0
Netapp ≫ H300s Firmware Version-
Netapp ≫ H500s Firmware Version-
Netapp ≫ H700s Firmware Version-
Netapp ≫ H300e Firmware Version-
Netapp ≫ H500e Firmware Version-
Netapp ≫ H700e Firmware Version-
Netapp ≫ H410s Firmware Version-
Netapp ≫ H410c Firmware Version-
Netapp ≫ Oncommand Insight Version-
Netapp ≫ Oncommand System Manager Version >= 3.0 <= 3.1.3
Netapp ≫ Snap Creator Framework Version-
Netapp ≫ Snapcenter Server Version-
Tenable ≫ Log Correlation Engine Version < 6.0.9
23.01.2025: CISA Known Exploited Vulnerabilities (KEV) Catalog
JQuery Cross-Site Scripting (XSS) Vulnerability
VulnerabilityJQuery contains a persistent cross-site scripting (XSS) vulnerability. When passing maliciously formed, untrusted input enclosed in HTML tags, JQuery's DOM manipulators can execute untrusted code in the context of the user's browser.
DescriptionApply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Required actionsType | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 21.32% | 0.955 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.1 | 2.8 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:N/I:P/A:N
|
security-advisories@github.com | 6.9 | 1.6 | 4.7 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.