Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:apk/alpine/drupal7@7.86-r0?arch=ppc64le&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/drupal7@7.86-r0?arch=ppc64le&distroversion=v3.18&reponame=community
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (4)
Vulnerability Summary Aliases
VCID-btgv-ef3h-83d3 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources. CVE-2021-41182
GHSA-9gj3-hwp5-pmwc
VCID-ctcx-2x3h-7uhc Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Cross-site scripting (XSS) vulnerability in jQuery UI might allow remote attackers to inject arbitrary web script or HTML via the closeText parameter of the dialog function. CVE-2016-7103
GHSA-hpcf-8vf9-q4gj
VCID-ejey-qgbe-97c1 Cross-site Scripting in jquery-ui Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option. CVE-2010-5312
GHSA-wcm2-9c89-wmfm
VCID-gypk-ukbc-7qe3 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML. A workaround is to not accept the value of the `*Text` options from untrusted sources. CVE-2021-41183
GHSA-j7qv-pgf6-hvh4

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-03T17:57:39.023340+00:00 Alpine Linux Importer Fixing VCID-ejey-qgbe-97c1 https://secdb.alpinelinux.org/v3.18/community.json 38.1.0
2026-04-01T19:20:14.306518+00:00 Alpine Linux Importer Fixing VCID-ctcx-2x3h-7uhc https://secdb.alpinelinux.org/v3.18/community.json 38.0.0
2026-04-01T19:13:39.562498+00:00 Alpine Linux Importer Fixing VCID-btgv-ef3h-83d3 https://secdb.alpinelinux.org/v3.18/community.json 38.0.0
2026-04-01T19:10:35.010386+00:00 Alpine Linux Importer Fixing VCID-gypk-ukbc-7qe3 https://secdb.alpinelinux.org/v3.18/community.json 38.0.0