Cross-site scripting (XSS) vulnerability in jQuery UI before 1.12.0 might allow remote attackers to inject arbitrary web script or HTML via the closeText parameter of the dialog function.
https://www.tenable.com/security/tns-2016-19
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.drupal.org/sa-core-2022-002
https://security.netapp.com/advisory/ntap-20190416-0007/
https://nodesecurity.io/advisories/127
https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html
https://jqueryui.com/changelog/1.12.0/
https://github.com/jquery/jquery-ui/commit/9644e7bae9116edaf8d37c5b38cb32b892f10ff6
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://rhn.redhat.com/errata/RHSA-2017-0161.html