{"vulnerability": "CVE-2021-41184", "sightings": [{"uuid": "8a69ec1d-cbc4-400a-83f5-c9b853c457c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41184", "type": "seen", "source": "https://t.me/cibsecurity/31221", "content": "\u203c CVE-2021-41184 \u203c\n\njQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `of` option of the `.position()` util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. A workaround is to not accept the value of the `of` option from untrusted sources.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-26T18:15:00.000000Z"}]}