4.3
CVSSv2

CVE-2016-7103

Published: 15/03/2017 Updated: 22/06/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Cross-site scripting (XSS) vulnerability in jQuery UI prior to 1.12.0 might allow remote malicious users to inject arbitrary web script or HTML via the closeText parameter of the dialog function.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

jqueryui jquery ui

oracle weblogic server 12.1.3.0.0

oracle weblogic server 10.3.6.0.0

oracle weblogic server 12.2.1.3.0

oracle business intelligence 12.2.1.3.0

oracle business intelligence 12.2.1.4.0

oracle hospitality cruise fleet management 9.0.11

oracle application express

oracle primavera unifier

oracle siebel ui framework

oracle oss support tools

oracle oss support tools 2.12.42

fedoraproject fedora 30

fedoraproject fedora 35

fedoraproject fedora 36

netapp snapcenter -

redhat openstack 7.0

redhat openstack 9

redhat openstack 8

juniper junos 21.2

debian debian linux 9.0

Vendor Advisories

Synopsis Low: python-XStatic-jquery-ui security update Type/Severity Security Advisory: Low Topic An update for python-XStatic-jquery-ui is now available for Red Hat OpenStack Platform 80 (Liberty)Red Hat Product Security has rated this update as having a security impact of Low A Common Vulnerability Sco ...
Synopsis Low: python-XStatic-jquery-ui security update Type/Severity Security Advisory: Low Topic An update for python-XStatic-jquery-ui is now available for Red Hat Enterprise Linux OpenStack Platform 70 (Kilo) for RHEL 7Red Hat Product Security has rated this update as having a security impact of Low A ...
Synopsis Low: python-XStatic-jquery-ui security update Type/Severity Security Advisory: Low Topic An update for python-XStatic-jquery-ui is now available for Red Hat OpenStack Platform 90 (Mitaka)Red Hat Product Security has rated this update as having a security impact of Low A Common Vulnerability Scor ...
SecurityCenter has recently been discovered to have several vulnerabilities Two were reported by external parties while the rest were discovered during internal testing Note that the library vulnerabilities were not fully diagnosed so SecurityCenter may or may not be impacted Tenable opted to upgrade the libraries as it was more efficient Detai ...
Tenable's Passive Vulnerability Scanner (PVS) uses third-party libraries to provide certain standardized functionality Four of these libraries were found to contain vulnerabilities and were fixed upstream Those fixes have been integrated despite there being no known exploitation scenarios related to PVS OpenSSL ssl/statem/statemc read_state_ma ...

ICS Advisories

Hitachi Energy MSM Product
Critical Infrastructure Sectors: Energy

References

CWE-79https://nodesecurity.io/advisories/127https://jqueryui.com/changelog/1.12.0/https://github.com/jquery/jquery-ui/commit/9644e7bae9116edaf8d37c5b38cb32b892f10ff6https://github.com/jquery/api.jqueryui.com/issues/281http://rhn.redhat.com/errata/RHSA-2017-0161.htmlhttps://www.tenable.com/security/tns-2016-19http://rhn.redhat.com/errata/RHSA-2016-2933.htmlhttp://rhn.redhat.com/errata/RHSA-2016-2932.htmlhttp://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.htmlhttp://www.securityfocus.com/bid/104823https://security.netapp.com/advisory/ntap-20190416-0007/https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.htmlhttps://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.htmlhttps://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.htmlhttps://www.oracle.com/security-alerts/cpuapr2020.htmlhttps://www.oracle.com/security-alerts/cpuApr2021.htmlhttps://www.oracle.com//security-alerts/cpujul2021.htmlhttps://www.drupal.org/sa-core-2022-002https://lists.debian.org/debian-lts-announce/2022/01/msg00014.htmlhttps://www.oracle.com/security-alerts/cpujan2022.htmlhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E2I4UHPIW26FIALH7GGZ3IYUUA53VOOJ/https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3Ehttps://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6%40%3Ccommits.roller.apache.org%3Ehttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3Ehttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3Ehttps://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3Ehttps://nvd.nist.govhttps://access.redhat.com/errata/RHSA-2016:2932https://www.cisa.gov/uscert/ics/advisories/icsa-22-242-03https://www.tenable.com/security/tns-2016-19