jquery-ui-dist@1.12.1 vulnerabilities
A curated set of user interface interactions, effects, widgets, and themes built on top of the jQuery JavaScript Library.
-
latest version
1.13.3
-
latest non vulnerable version
-
first published
8 years ago
-
latest version published
5 months ago
-
licenses detected
- >=0
Direct Vulnerabilities
Known vulnerabilities in the jquery-ui-dist package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
jquery-ui-dist is a "no-changes" fork/repackage of the jquery-ui .zip release artifacts. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) when accepting the value of the How to fix Cross-site Scripting (XSS)? Upgrade |
<1.13.0
|
jquery-ui-dist is a "no-changes" fork/repackage of the jquery-ui .zip release artifacts. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). When accepting the value of various ###POC Initializing the 'Datepicker' in the following way:
will call the How to fix Cross-site Scripting (XSS)? Upgrade |
<1.13.0
|
jquery-ui-dist is a "no-changes" fork/repackage of the jquery-ui .zip release artifacts. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) when accepting the value of POCInitializing the 'datepicker' in the following way:
will call the How to fix Cross-site Scripting (XSS)? Upgrade |
<1.13.0
|
jquery-ui-dist is a "no-changes" fork/repackage of the jquery-ui .zip release artifacts. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the initialization of Exploiting this vulnerability is possible if a How to fix Cross-site Scripting (XSS)? Upgrade |
<1.13.2
|