logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2020-11023

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2020-11023

Description:
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
Last updated date:
08/31/2023

Reports

alt

ACTIVELY EXPLOITED

Type:
exploitation
Confidence:
HIGH
Date of publishing:
07/30/2021
Reference url to background

https://cybersecurityworks.com/patchwatch/july-oracle-patches-342-security-vulnerabilities.html

Type:
exploitation
Confidence:
HIGH
Date of publishing:
07/06/2022
Type:
exploitation
Confidence:
HIGH
Date of publishing:
07/12/2022
Type:
exploit
Confidence:
HIGH
Date of publishing:
04/14/2021
Type:
exploit
Confidence:
HIGH
Date of publishing:
07/20/2021
Vulnerability FeedContributorsAboutBlog

@inTheWild

©2024

Privacy Policy