Security Advisories (9)
CVE-2020-11022 (2020-04-29)

In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVE-2020-11023 (2020-04-29)

In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

CVE-2019-11358 (2019-04-20)

jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.

CVE-2015-9251 (2018-01-18)

jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.

CVE-2011-4969 (2013-03-08)

Cross-site scripting (XSS) vulnerability in jQuery before 1.6.3, when using location.hash to select elements, allows remote attackers to inject arbitrary web script or HTML via a crafted tag.

CVE-2012-6708 (2018-01-18)

jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.

CVE-2020-7656 (2020-05-19)

jquery prior to 1.9.0 allows Cross-site Scripting attacks via the load method. The load method fails to recognize and remove "<script>" HTML tags that contain a whitespace character, i.e: "</script >", which results in the enclosed script logic to be executed.

CVE-2019-5428

Prototype Pollution is a vulnerability affecting JavaScript. Prototype Pollution refers to the ability to inject properties into existing JavaScript language construct prototypes, such as objects. JavaScript allows all Object attributes to be altered, including their magical attributes such as _proto_, constructor and prototype. An attacker manipulates these attributes to overwrite, or pollute, a JavaScript application object prototype of the base object by injecting other values. Properties on the Object.prototype are then inherited by all the JavaScript objects through the prototype chain. When that happens, this leads to either denial of service by triggering JavaScript exceptions, or it tampers with the application source code to force the code path that the attacker injects, thereby leading to remote code execution.

CVE-2014-6071 (2018-01-16)

jQuery 1.4.2 allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to use of the text method inside after.

NAME

Sidef::Sys::Sys

DESCRIPTION

This class implements ...

SYNOPSIS

var obj = Sys(...)

INHERITS

Inherits methods from:

* Sidef::Object::Object

METHODS

alarm

Sys.alarm()

Returns the

bless

Sys.bless()

Returns the

class_name

Sys.class_name()

Returns the

defined

Sys.defined()

Returns the

die

Sys.die()

Returns the

Aliases: raise

eval

Sys.eval()

Returns the

exec

Sys.exec()

Returns the

exit

Sys.exit()

Returns the

fork

Sys.fork()

Returns the

getgrent

Sys.getgrent()

Returns the

getgrgid

Sys.getgrgid()

Returns the

getgrnam

Sys.getgrnam()

Returns the

gethostbyaddr

Sys.gethostbyaddr()

Returns the

gethostbyname

Sys.gethostbyname()

Returns the

gethostent

Sys.gethostent()

Returns the

getnetbyaddr

Sys.getnetbyaddr()

Returns the

getnetbyname

Sys.getnetbyname()

Returns the

getnetent

Sys.getnetent()

Returns the

getpgrp

Sys.getpgrp()

Returns the

getppid

Sys.getppid()

Returns the

getpriority

Sys.getpriority()

Returns the

getprotobyname

Sys.getprotobyname()

Returns the

getprotobynumber

Sys.getprotobynumber()

Returns the

getprotoent

Sys.getprotoent()

Returns the

getpwent

Sys.getpwent()

Returns the

getpwnam

Sys.getpwnam()

Returns the

getpwuid

Sys.getpwuid()

Returns the

getservbyname

Sys.getservbyname()

Returns the

getservbyport

Sys.getservbyport()

Returns the

getservent

Sys.getservent()

Returns the

isweak

Sys.isweak()

Returns the

kill

Sys.kill()

Returns the

nano_sleep

Sys.nano_sleep()

Returns the

Aliases: nanosleep

open

Sys.open()

Returns the

opendir

Sys.opendir()

Returns the

os

Sys.os()

Returns the

Aliases: osname

print

Sys.print()

Returns the

printf

Sys.printf()

Returns the

printh

Sys.printh()

Returns the

read

Sys.read()

Returns the

readln

Sys.readln()

Returns the

Aliases: scanln

ref

Sys.ref()

Returns the

refaddr

Sys.refaddr()

Returns the

reftype

Sys.reftype()

Returns the

run

Sys.run()

Returns the

Aliases: system

say

Sys.say()

Returns the

Aliases: println

select

Sys.select()

Returns the

setgrent

Sys.setgrent()

Returns the

sethostent

Sys.sethostent()

Returns the

setnetent

Sys.setnetent()

Returns the

setpgrp

Sys.setpgrp()

Returns the

setpriority

Sys.setpriority()

Returns the

setprotoent

Sys.setprotoent()

Returns the

setpwent

Sys.setpwent()

Returns the

setservent

Sys.setservent()

Returns the

sidef

Sys.sidef()

Returns the

sleep

Sys.sleep()

Returns the

stderr

Sys.stderr()

Returns the

stdin

Sys.stdin()

Returns the

stdout

Sys.stdout()

Returns the

ualarm

Sys.ualarm()

Returns the

Aliases: micro_alarm

umask

Sys.umask()

Returns the

unweaken

Sys.unweaken()

Returns the

user

Sys.user()

Returns the

Aliases: getlogin

usleep

Sys.usleep()

Returns the

Aliases: micro_sleep

wait

Sys.wait()

Returns the

warn

Sys.warn()

Returns the

weaken

Sys.weaken()

Returns the