In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/o:redhat:enterprise_linux:9 |
Thu, 13 Feb 2025 00:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat discovery
Redhat rhel Aus Redhat rhel E4s Redhat rhel Els Redhat rhel Eus Redhat rhel Tus |
|
CPEs | cpe:/a:redhat:enterprise_linux:8::crb cpe:/a:redhat:enterprise_linux:9 cpe:/a:redhat:enterprise_linux:9::crb cpe:/a:redhat:openstack:16.2::el8 cpe:/a:redhat:rhel_aus:8.2 cpe:/a:redhat:rhel_aus:8.4 cpe:/a:redhat:rhel_aus:8.6 cpe:/a:redhat:rhel_e4s:8.4 cpe:/a:redhat:rhel_e4s:8.6 cpe:/a:redhat:rhel_e4s:9.0 cpe:/a:redhat:rhel_eus:8.8 cpe:/a:redhat:rhel_eus:8.8::crb cpe:/a:redhat:rhel_eus:9.2 cpe:/a:redhat:rhel_eus:9.2::crb cpe:/a:redhat:rhel_eus:9.4 cpe:/a:redhat:rhel_eus:9.4::crb cpe:/a:redhat:rhel_tus:8.4 cpe:/a:redhat:rhel_tus:8.6 cpe:/o:redhat:discovery:1.0::el9 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:rhel_aus:7.7 cpe:/o:redhat:rhel_els:7 |
|
Vendors & Products |
Redhat discovery
Redhat rhel Aus Redhat rhel E4s Redhat rhel Els Redhat rhel Eus Redhat rhel Tus |
|
References |
|
Mon, 10 Feb 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
kev
|
Thu, 23 Jan 2025 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 23 Jan 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-10T18:30:49.172Z
Reserved: 2020-03-30T00:00:00.000Z
Link: CVE-2020-11023

Updated: 2025-01-23T21:07:47.681Z

Status : Modified
Published: 2020-04-29T21:15:11.743
Modified: 2025-01-24T02:00:02.453
Link: CVE-2020-11023
