Version 7.0.0
jquery-ui-rails
jQuery UI's JavaScript, CSS, and image files packaged for the Rails 3.1+ asset pipeline
Install Instructions
gem install jquery-ui-rails
Current Version Release Date March 19, 2024
Language Ruby
Package URL (purl) pkg:gem/jquery-ui-rails@7.0.0
Find jquery-ui-rails
vulnerabilities in your supply chain.
jquery-ui-rails Vulnerabilities
Sort by
CVE (Latest)
CVE | CVSS Score | CWE(s) | EPSS Score | EPSS % | Impacted Versions |
---|---|---|---|---|---|
CVE-2016-7103 | Medium 6.1 | CWE-79 | 0.0119 | 0.8486 |
|
CVE-2021-41182 | Medium 6.5 | CWE-79 | 0.00421 | 0.73972 |
|
CVE-2021-41183 | Medium 6.5 | CWE-79 | 0.00661 | 0.79505 |
|
CVE-2021-41184 | Medium 6.5 | CWE-79 | 0.00301 | 0.6924 |
|
CVE-2022-31160 | Medium 6.1 | CWE-79 | 0.00299 | 0.69106 |
|
CVE-2010-5312 | Medium 6.1 | CWE-79 | 0.02009 | 0.88546 |
|
CVE-2012-6662 | Medium 4.3 | CWE-79 | 0.0019 | 0.56544 |
|
jquery-ui-rails Vulnerability Remediation Guidance
CVE | Description | Full list of Impacted Versions | Fix |
---|---|---|---|
CVE-2022-31160 | jQuery UI is a curated set of user interface interactions, effects, widgets, and themes built on top of jQuery. Versions prior to 1.13.2 are potentially vulnerable to cross-site scripting. Initializing a checkboxradio widget on an input enclosed within a label makes that parent label contents considered as the input label. Calling `.checkboxradio( "refresh" )` on such a widget and the initial HTML contained encoded HTML entities will make them erroneously get decoded. This can lead to potentially executing JavaScript code. The bug has been patched in jQuery UI 1.13.2. To remediate the issue, someone who can change the initial HTML can wrap all the non-input contents of the `label` in a `span`. | 5.0.3, 5.0.5, 5.0.4, 5.0.0, 6.0.0, 0.2.1, 2.0.0, 4.2.1 (Show all) | Major → 7.0.0 |
CVE-2021-41184 | jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `of` option of the `.position()` util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. A workaround is to not accept the value of the `of` option from untrusted sources. | 5.0.3, 5.0.5, 5.0.4, 5.0.0, 6.0.0, 0.2.1, 2.0.0, 4.2.1 (Show all) | Major → 7.0.0 |
CVE-2021-41183 | jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML. A workaround is to not accept the value of the `*Text` options from untrusted sources. | 5.0.3, 5.0.5, 5.0.4, 5.0.0, 6.0.0, 0.2.1, 2.0.0, 4.2.1 (Show all) | Major → 7.0.0 |
CVE-2021-41182 | jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources. | 5.0.3, 5.0.5, 5.0.4, 5.0.0, 6.0.0, 0.2.1, 2.0.0, 4.2.1 (Show all) | Major → 7.0.0 |
CVE-2016-7103 | Cross-site scripting (XSS) vulnerability in jQuery UI before 1.12.0 might allow remote attackers to inject arbitrary web script or HTML via the closeText parameter of the dialog function. | 5.0.3, 5.0.5, 5.0.4, 5.0.0, 0.2.1, 2.0.0, 4.2.1, 4.1.2 (Show all) | Major → 7.0.0 |
CVE-2012-6662 | Cross-site scripting (XSS) vulnerability in the default content option in jquery.ui.tooltip.js in the Tooltip widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title attribute, which is not properly handled in the autocomplete combo box demo. | 0.2.1, 2.0.0, 2.0.2, 0.5.0, 0.4.0, 0.3.0, 0.2.2, 0.1.0 (Show all) | Major → 7.0.0 |
CVE-2010-5312 | Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option. | 0.2.1, 2.0.0, 2.0.2, 0.5.0, 0.4.0, 0.3.0, 0.2.2, 0.1.0 (Show all) | Major → 7.0.0 |
Instantly see if these jquery-ui-rails
vulnerabilities affect your code.
Dependencies
Packages using versions of jquery-ui-rails affected by its vulnerabilities
Dependent Packages |
---|
railties>= 3.2.16 |