vulnerability
Rocky Linux: CVE-2020-11023: gcc (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:N/I:P/A:N) | Apr 29, 2020 | Mar 12, 2024 | Aug 13, 2025 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
Apr 29, 2020
Added
Mar 12, 2024
Modified
Aug 13, 2025
Description
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
Solutions
rocky-upgrade-bind-dyndb-ldaprocky-upgrade-bind-dyndb-ldap-debuginforocky-upgrade-bind-dyndb-ldap-debugsourcerocky-upgrade-cpprocky-upgrade-cpp-debuginforocky-upgrade-doxygenrocky-upgrade-doxygen-debuginforocky-upgrade-doxygen-debugsourcerocky-upgrade-doxygen-doxywizardrocky-upgrade-doxygen-doxywizard-debuginforocky-upgrade-doxygen-latexrocky-upgrade-gccrocky-upgrade-gcc-c++rocky-upgrade-gcc-c++-debuginforocky-upgrade-gcc-debuginforocky-upgrade-gcc-debugsourcerocky-upgrade-gcc-gdb-pluginrocky-upgrade-gcc-gdb-plugin-debuginforocky-upgrade-gcc-gfortranrocky-upgrade-gcc-gfortran-debuginforocky-upgrade-gcc-offload-nvptxrocky-upgrade-gcc-offload-nvptx-debuginforocky-upgrade-gcc-plugin-annobinrocky-upgrade-gcc-plugin-annobin-debuginforocky-upgrade-gcc-plugin-develrocky-upgrade-gcc-plugin-devel-debuginforocky-upgrade-gcc-toolset-13-gccrocky-upgrade-gcc-toolset-13-gcc-c++rocky-upgrade-gcc-toolset-13-gcc-c++-debuginforocky-upgrade-gcc-toolset-13-gcc-debuginforocky-upgrade-gcc-toolset-13-gcc-gfortranrocky-upgrade-gcc-toolset-13-gcc-gfortran-debuginforocky-upgrade-gcc-toolset-13-gcc-plugin-annobinrocky-upgrade-gcc-toolset-13-gcc-plugin-annobin-debuginforocky-upgrade-gcc-toolset-13-gcc-plugin-develrocky-upgrade-gcc-toolset-13-gcc-plugin-devel-debuginforocky-upgrade-gcc-toolset-13-libasan-develrocky-upgrade-gcc-toolset-13-libatomic-develrocky-upgrade-gcc-toolset-13-libgccjitrocky-upgrade-gcc-toolset-13-libgccjit-debuginforocky-upgrade-gcc-toolset-13-libgccjit-develrocky-upgrade-gcc-toolset-13-libitm-develrocky-upgrade-gcc-toolset-13-liblsan-develrocky-upgrade-gcc-toolset-13-libquadmath-develrocky-upgrade-gcc-toolset-13-libstdc++-develrocky-upgrade-gcc-toolset-13-libstdc++-docsrocky-upgrade-gcc-toolset-13-libtsan-develrocky-upgrade-gcc-toolset-13-libubsan-develrocky-upgrade-gcc-toolset-13-offload-nvptxrocky-upgrade-gcc-toolset-13-offload-nvptx-debuginforocky-upgrade-gcc-toolset-14-gccrocky-upgrade-gcc-toolset-14-gcc-c++rocky-upgrade-gcc-toolset-14-gcc-c++-debuginforocky-upgrade-gcc-toolset-14-gcc-debuginforocky-upgrade-gcc-toolset-14-gcc-gfortranrocky-upgrade-gcc-toolset-14-gcc-gfortran-debuginforocky-upgrade-gcc-toolset-14-gcc-plugin-annobinrocky-upgrade-gcc-toolset-14-gcc-plugin-annobin-debuginforocky-upgrade-gcc-toolset-14-gcc-plugin-develrocky-upgrade-gcc-toolset-14-gcc-plugin-devel-debuginforocky-upgrade-gcc-toolset-14-libasan-develrocky-upgrade-gcc-toolset-14-libatomic-develrocky-upgrade-gcc-toolset-14-libgccjitrocky-upgrade-gcc-toolset-14-libgccjit-debuginforocky-upgrade-gcc-toolset-14-libgccjit-develrocky-upgrade-gcc-toolset-14-libitm-develrocky-upgrade-gcc-toolset-14-liblsan-develrocky-upgrade-gcc-toolset-14-libquadmath-develrocky-upgrade-gcc-toolset-14-libstdc++-develrocky-upgrade-gcc-toolset-14-libstdc++-docsrocky-upgrade-gcc-toolset-14-libtsan-develrocky-upgrade-gcc-toolset-14-libubsan-develrocky-upgrade-gcc-toolset-14-offload-nvptxrocky-upgrade-gcc-toolset-14-offload-nvptx-debuginforocky-upgrade-ipa-clientrocky-upgrade-ipa-client-debuginforocky-upgrade-ipa-client-epnrocky-upgrade-ipa-client-sambarocky-upgrade-ipa-debuginforocky-upgrade-ipa-debugsourcerocky-upgrade-ipa-serverrocky-upgrade-ipa-server-debuginforocky-upgrade-ipa-server-trust-adrocky-upgrade-ipa-server-trust-ad-debuginforocky-upgrade-libasanrocky-upgrade-libasan-debuginforocky-upgrade-libasan8rocky-upgrade-libasan8-debuginforocky-upgrade-libatomicrocky-upgrade-libatomic-debuginforocky-upgrade-libatomic-staticrocky-upgrade-libgccrocky-upgrade-libgcc-debuginforocky-upgrade-libgccjitrocky-upgrade-libgccjit-debuginforocky-upgrade-libgccjit-develrocky-upgrade-libgfortranrocky-upgrade-libgfortran-debuginforocky-upgrade-libgomprocky-upgrade-libgomp-debuginforocky-upgrade-libgomp-offload-nvptxrocky-upgrade-libgomp-offload-nvptx-debuginforocky-upgrade-libitmrocky-upgrade-libitm-debuginforocky-upgrade-libitm-develrocky-upgrade-liblsanrocky-upgrade-liblsan-debuginforocky-upgrade-libquadmathrocky-upgrade-libquadmath-debuginforocky-upgrade-libquadmath-develrocky-upgrade-libstdc++rocky-upgrade-libstdc++-debuginforocky-upgrade-libstdc++-develrocky-upgrade-libstdc++-docsrocky-upgrade-libstdc++-staticrocky-upgrade-libtsanrocky-upgrade-libtsan-debuginforocky-upgrade-libtsan2rocky-upgrade-libtsan2-debuginforocky-upgrade-libubsanrocky-upgrade-libubsan-debuginforocky-upgrade-opendnssecrocky-upgrade-opendnssec-debuginforocky-upgrade-opendnssec-debugsourcerocky-upgrade-pcsrocky-upgrade-pcs-snmprocky-upgrade-python-nss-debugsourcerocky-upgrade-python-nss-docrocky-upgrade-python3-nssrocky-upgrade-python3-nss-debuginforocky-upgrade-python3-tbbrocky-upgrade-python3-tbb-debuginforocky-upgrade-softhsmrocky-upgrade-softhsm-debuginforocky-upgrade-softhsm-debugsourcerocky-upgrade-softhsm-develrocky-upgrade-tbbrocky-upgrade-tbb-debuginforocky-upgrade-tbb-debugsourcerocky-upgrade-tbb-develrocky-upgrade-tbb-doc
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.