Search for packages
Package details: pkg:deb/debian/jqueryui@1.8.dfsg-3%2Bdeb6u1
purl pkg:deb/debian/jqueryui@1.8.dfsg-3%2Bdeb6u1
Next non-vulnerable version 1.12.1+dfsg-8+deb11u2
Latest non-vulnerable version 1.12.1+dfsg-8+deb11u2
Risk 3.3
Vulnerabilities affecting this package (8)
Vulnerability Summary Fixed by
VCID-274t-xnyx-g3g1
Aliases:
CVE-2021-41183
GHSA-j7qv-pgf6-hvh4
XSS in `*Text` options of the Datepicker widget in jquery-ui ### Impact Accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. For example, initializing the datepicker in the following way: ```js $("#datepicker").datepicker( { showButtonPanel: true, showOn: "both", closeText: "<script>doEvilThing('closeText XSS')</script>", currentText: "<script>doEvilThing('currentText XSS')</script>", prevText: "<script>doEvilThing('prevText XSS')</script>", nextText: "<script>doEvilThing('nextText XSS')</script>", buttonText: "<script>doEvilThing('buttonText XSS')</script>", appendText: "<script>doEvilThing('appendText XSS')</script>", } ); ``` will call `doEvilThing` with 6 different parameters coming from all `*Text` options. ### Patches The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML. ### Workarounds A workaround is to not accept the value of the `*Text` options from untrusted sources. ### For more information If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery UI repo](https://github.com/jquery/jquery-ui/issues). If you don't find an answer, open a new issue.
1.12.1+dfsg-8+deb11u2
Affected by 0 other vulnerabilities.
VCID-3v88-t4gx-wud6
Aliases:
CVE-2012-6662
GHSA-qqxp-xp9v-vvx6
Moderate severity vulnerability that affects jquery-ui Cross-site scripting (XSS) vulnerability in the default content option in jquery.ui.tooltip.js in the Tooltip widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title attribute, which is not properly handled in the autocomplete combo box demo.
1.10.1+dfsg-1
Affected by 5 other vulnerabilities.
VCID-5h7t-vacy-6ybx
Aliases:
CVE-2021-41182
GHSA-9gj3-hwp5-pmwc
XSS in the `altField` option of the Datepicker widget in jquery-ui ### Impact Accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. For example, initializing the datepicker in the following way: ```js $("#datepicker").datepicker( { altField: "<img onerror='doEvilThing()' src='/404' >", } ); ``` will call the `doEvilThing` function. ### Patches The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. ### Workarounds A workaround is to not accept the value of the `altField` option from untrusted sources. ### For more information If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery UI repo](https://github.com/jquery/jquery-ui/issues). If you don't find an answer, open a new issue."
1.12.1+dfsg-8+deb11u2
Affected by 0 other vulnerabilities.
VCID-969e-x2hw-yuae
Aliases:
CVE-2022-31160
GHSA-h6gj-6jjq-h8g9
jQuery UI vulnerable to XSS when refreshing a checkboxradio with an HTML-like initial text label ### Impact Initializing a checkboxradio widget on an input enclosed within a label makes that parent label contents considered as the input label. If you call `.checkboxradio( "refresh" )` on such a widget and the initial HTML contained encoded HTML entities, they will erroneously get decoded. This can lead to potentially executing JavaScript code. For example, starting with the following initial secure HTML: ```html <label> <input id="test-input"> &lt;img src=x onerror="alert(1)"&gt; </label> ``` and calling: ```javascript $( "#test-input" ).checkboxradio(); $( "#test-input" ).checkboxradio( "refresh" ); ``` will turn the initial HTML into: ```html <label> <!-- some jQuery UI elements --> <input id="test-input"> <img src=x onerror="alert(1)"> </label> ``` and the alert will get executed. ### Patches The bug has been patched in jQuery UI 1.13.2. ### Workarounds To remediate the issue, if you can change the initial HTML, you can wrap all the non-input contents of the `label` in a `span`: ```html <label> <input id="test-input"> <span>&lt;img src=x onerror="alert(1)"&gt;</span> </label> ``` ### References https://blog.jqueryui.com/2022/07/jquery-ui-1-13-2-released/ ### For more information If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery UI repo](https://github.com/jquery/jquery-ui/issues?q=is%3Aissue+is%3Aopen+sort%3Aupdated-desc). If you don't find an answer, open a new issue.
1.12.1+dfsg-8+deb11u2
Affected by 0 other vulnerabilities.
VCID-cx5x-heat-c7am
Aliases:
DSA-3249-2 jqueryui
security update
1.8.ooops.21+dfsg-2+deb7u2
Affected by 7 other vulnerabilities.
VCID-ktep-avsk-gkae
Aliases:
CVE-2021-41184
GHSA-gpqq-952q-5327
XSS in the `of` option of the `.position()` util in jquery-ui ### Impact Accepting the value of the `of` option of the [`.position()`](https://api.jqueryui.com/position/) util from untrusted sources may execute untrusted code. For example, invoking the following code: ```js $("#element").position( { my: "left top", at: "right bottom", of: "<img onerror='doEvilThing()' src='/404' />", collision: "none" }); ``` will call the `doEvilThing()` function. ### Patches The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. ### Workarounds A workaround is to not accept the value of the `of` option from untrusted sources. ### For more information If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery UI repo](https://github.com/jquery/jquery-ui/issues). If you don't find an answer, open a new issue."
1.12.1+dfsg-8+deb11u2
Affected by 0 other vulnerabilities.
VCID-rg1w-7nxn-kkcj
Aliases:
CVE-2010-5312
GHSA-wcm2-9c89-wmfm
Cross-site Scripting in jquery-ui Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option.
1.8.ooops.21+dfsg-2+deb7u2
Affected by 7 other vulnerabilities.
1.10.1+dfsg-1
Affected by 5 other vulnerabilities.
VCID-v2wn-ca7g-uyar
Aliases:
CVE-2016-7103
GHSA-hpcf-8vf9-q4gj
XSS in dialog closeText jQuery-UI is a library for manipulating UI elements via jQuery. Version 1.11.4 has a cross site scripting (XSS) vulnerability in the `closeText` parameter of the `dialog` function. If your application passes user input to this parameter, it may be vulnerable to XSS via this attack vector.
1.12.1+dfsg-3
Affected by 4 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2025-08-01T18:22:09.816133+00:00 Debian Oval Importer Affected by VCID-ktep-avsk-gkae https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:19:32.951798+00:00 Debian Oval Importer Affected by VCID-274t-xnyx-g3g1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:22:31.282632+00:00 Debian Oval Importer Affected by VCID-3v88-t4gx-wud6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:22:10.274539+00:00 Debian Oval Importer Affected by VCID-rg1w-7nxn-kkcj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:29:17.065367+00:00 Debian Oval Importer Affected by VCID-v2wn-ca7g-uyar https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:40:09.220224+00:00 Debian Oval Importer Affected by VCID-969e-x2hw-yuae https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:16:28.848207+00:00 Debian Oval Importer Affected by VCID-5h7t-vacy-6ybx https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T09:33:58.630719+00:00 Debian Oval Importer Affected by VCID-cx5x-heat-c7am https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0
2025-08-01T09:30:13.414310+00:00 Debian Oval Importer Affected by VCID-rg1w-7nxn-kkcj https://www.debian.org/security/oval/oval-definitions-wheezy.xml.bz2 37.0.0