org.wicketstuff:jquery@1.4.17.2 vulnerabilities

  • latest version

    1.4.21

  • first published

    14 years ago

  • latest version published

    12 years ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.wicketstuff:jquery package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Prototype Pollution

    org.wicketstuff:jquery is a JQuery integration for Wicket package.

    Affected versions of this package are vulnerable to Prototype Pollution. The extend function can be tricked into modifying the prototype of Object when the attacker controls part of the structure passed to this function. This can let an attacker add or modify an existing property that will then exist on all objects.

    Note: CVE-2019-5428 is a duplicate of CVE-2019-11358

    How to fix Prototype Pollution?

    There is no fixed version for org.wicketstuff:jquery.

    [0,)
    • M
    Cross-site Scripting (XSS)

    org.wicketstuff:jquery is a JQuery integration for Wicket package.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain ajax request is performed without the dataType option causing text/javascript responses to be executed.

    Note: After being implemented in version 1.12.0, the fix of this vulnerability was reverted in 1.12.3, and then was only reintroduced in version 3.0.0-beta1. The fix was never released in any tag of the 2.x.x branch, as it was reverted out of the branch before being released.

    Note: CVE-2017-16012 is a duplicate of CVE-2015-9251

    How to fix Cross-site Scripting (XSS)?

    There is no fixed version for org.wicketstuff:jquery.

    [0,)
    • M
    Cross-site Scripting (XSS)

    org.wicketstuff:jquery is a JQuery integration for Wicket package.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS). The location.hash() function was used to select elements, but also allows remote attackers to inject script into the page.

    This vulnerability is related to a vulnerability in jQuery-migrate and in fullpage.js.

    How to fix Cross-site Scripting (XSS)?

    There is no fixed version for org.wicketstuff:jquery.

    [0,)