The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of jQuery Core

2 jQuery jsTree: code execution via eval
An attacker can use a vulnerability via eval() of jQuery jsTree, in order to run code...
2133, FEDORA-2019-38abc6b897, FEDORA-2019-a171291a47, VIGILANCE-VUL-29531
2 jQuery Core: privilege escalation via Object.prototype Pollution
An attacker can bypass restrictions via Object.prototype Pollution of jQuery Core, in order to escalate his privileges...
bulletinoct2019, cpujul2019, cpuoct2019, CVE-2019-11358, DLA-1797-1, DRUPAL-SA-CORE-2019-005, DRUPAL-SA-CORE-2019-006, DSA-4460-1, EZSA-2019-005, FEDORA-2019-2a0ce0c58c, FEDORA-2019-a06dffab1c, FEDORA-2019-f563e66380, NTAP-20190919-0001, openSUSE-SU-2019:1839-1, openSUSE-SU-2019:1872-1, RHSA-2019:1456-01, Synology-SA-19:19, VIGILANCE-VUL-29030
2 jQuery: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of jQuery, in order to run JavaScript code in the context of the web site...
bulletinjul2018, cpuapr2019, cpujan2019, cpujul2019, cpuoct2018, cpuoct2019, CVE-2015-9251, FEDORA-2016-06e8a3f776, FEDORA-2016-3368a38282, FEDORA-2016-8516b7d6fb, FEDORA-2016-b6cb3e83fa, VIGILANCE-VUL-21468
2 jQuery: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of jQuery, in order to run JavaScript code in the context of the web site...
CVE-2012-6662, FEDORA-2014-15515, FEDORA-2014-15519, RHSA-2015:0442-01, RHSA-2015:1462-01, VIGILANCE-VUL-17471
2 jQuery: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of jQuery, in order to execute JavaScript code in the context of the web site...
CVE-2010-5312, DSA-3249-1, DSA-3249-2, FEDORA-2014-15967, FEDORA-2014-16048, RHSA-2015:0442-01, RHSA-2015:1462-01, VIGILANCE-VUL-16795
Our database contains other pages. You can request a free trial to read them.

Display information about jQuery Core: