1.14.1
13 years ago
10 months ago
Known vulnerabilities in the org.webjars:jquery-ui package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
org.webjars:jquery-ui is a library for manipulating UI elements via jQuery. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the initialization of Exploiting this vulnerability is possible if a How to fix Cross-site Scripting (XSS)? Upgrade | [,1.13.2) |
org.webjars:jquery-ui is a library for manipulating UI elements via jQuery. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) when accepting the value of the How to fix Cross-site Scripting (XSS)? Upgrade | [,1.13.0) |
org.webjars:jquery-ui is a library for manipulating UI elements via jQuery. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) when accepting the value of POCInitializing the 'datepicker' in the following way:
will call the How to fix Cross-site Scripting (XSS)? Upgrade | [,1.13.0) |
org.webjars:jquery-ui is a library for manipulating UI elements via jQuery. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). When accepting the value of various ###POC Initializing the 'Datepicker' in the following way:
will call the How to fix Cross-site Scripting (XSS)? Upgrade | [,1.13.0) |
org.webjars:jquery-ui is a library for manipulating UI elements via jQuery. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). One of the provided elements is a dialog, which also supports showing custom text for closing via the If you allow user input to be passed through to the How to fix Cross-site Scripting (XSS)? Upgrade | [,1.12.0) |