org.webjars.bower:jquery-ui@1.11.3 vulnerabilities
-
latest version
1.12.1
-
first published
9 years ago
-
latest version published
8 years ago
-
licenses detected
- [1.10.3,1.11.4)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.webjars.bower:jquery-ui package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.webjars.bower:jquery-ui is a library for manipulating UI elements via jQuery. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the initialization of Exploiting this vulnerability is possible if a How to fix Cross-site Scripting (XSS)? Upgrade |
[,1.13.2)
|
org.webjars.bower:jquery-ui is a library for manipulating UI elements via jQuery. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) when accepting the value of the How to fix Cross-site Scripting (XSS)? A fix was pushed into the |
[0,)
|
org.webjars.bower:jquery-ui is a library for manipulating UI elements via jQuery. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) when accepting the value of POCInitializing the 'datepicker' in the following way:
will call the How to fix Cross-site Scripting (XSS)? A fix was pushed into the |
[0,)
|
org.webjars.bower:jquery-ui is a library for manipulating UI elements via jQuery. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). When accepting the value of various ###POC Initializing the 'Datepicker' in the following way:
will call the How to fix Cross-site Scripting (XSS)? A fix was pushed into the |
[0,)
|
org.webjars.bower:jquery-ui is a library for manipulating UI elements via jQuery. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). One of the provided elements is a dialog, which also supports showing custom text for closing via the If you allow user input to be passed through to the How to fix Cross-site Scripting (XSS)? Upgrade |
[,1.12.0)
|