org.webjars.bower:jquery@2.2.2 vulnerabilities
-
latest version
3.7.1
-
latest non vulnerable version
-
first published
9 years ago
-
latest version published
8 months ago
-
licenses detected
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.webjars.bower:jquery package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
org.webjars.bower:jquery is a JavaScript library. It makes things like HTML document traversal and manipulation, event handling, animation, and Ajax much simpler with an easy-to-use API that works across a multitude of browsers. Affected versions of this package are vulnerable to Cross-site Scripting (XSS).
Passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. How to fix Cross-site Scripting (XSS)? Upgrade |
[1.2.0,3.5.0)
|
org.webjars.bower:jquery is a JavaScript library. It makes things like HTML document traversal and manipulation, event handling, animation, and Ajax much simpler with an easy-to-use API that works across a multitude of browsers. Affected versions of this package are vulnerable to Cross-site Scripting (XSS)
Passing HTML containing NOTE: This vulnerability was also assigned CVE-2020-23064. How to fix Cross-site Scripting (XSS)? Upgrade |
[1.0.3,3.5.0)
|
org.webjars.bower:jquery is a JavaScript library. It makes things like HTML document traversal and manipulation, event handling, animation, and Ajax much simpler with an easy-to-use API that works across a multitude of browsers. Affected versions of this package are vulnerable to Prototype Pollution. The Note: CVE-2019-5428 is a duplicate of CVE-2019-11358 How to fix Prototype Pollution? Upgrade |
[,3.4.0)
|
org.webjars.bower:jquery is a JavaScript library. It makes things like HTML document traversal and manipulation, event handling, animation, and Ajax much simpler with an easy-to-use API that works across a multitude of browsers. Affected versions of this package are vulnerable to Cross-site Scripting (XSS)
attacks when a cross-domain ajax request is performed without the Note: After being implemented in version 1.12.0, the fix of this vulnerability was reverted in 1.12.3, and then was only reintroduced in version 3.0.0-beta1. The fix was never released in any tag of the 2.x.x branch, as it was reverted out of the branch before being released. Note: CVE-2017-16012 is a duplicate of CVE-2015-9251 How to fix Cross-site Scripting (XSS)? Upgrade |
[,1.12.2)
[1.12.3,3.0.0)
|