jquery@1.11.0-beta3 vulnerabilities
JavaScript library for DOM operations
-
latest version
3.7.1
-
latest non vulnerable version
-
first published
14 years ago
-
latest version published
a year ago
-
licenses detected
- >=0
Direct Vulnerabilities
Known vulnerabilities in the jquery package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
jquery is a package that makes things like HTML document traversal and manipulation, event handling, animation, and Ajax much simpler with an easy-to-use API that works across a multitude of browsers. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). Passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. How to fix Cross-site Scripting (XSS)? Upgrade |
>=1.5.1 <3.5.0
|
jquery is a package that makes things like HTML document traversal and manipulation, event handling, animation, and Ajax much simpler with an easy-to-use API that works across a multitude of browsers. Affected versions of this package are vulnerable to Cross-site Scripting (XSS)
Passing HTML containing NOTE: This vulnerability was also assigned CVE-2020-23064. How to fix Cross-site Scripting (XSS)? Upgrade |
>=1.5.1 <3.5.0
|
jquery is a package that makes things like HTML document traversal and manipulation, event handling, animation, and Ajax much simpler with an easy-to-use API that works across a multitude of browsers. Affected versions of this package are vulnerable to Prototype Pollution. The Note: CVE-2019-5428 is a duplicate of CVE-2019-11358 How to fix Prototype Pollution? Upgrade |
<3.4.0
|
jquery is a package that makes things like HTML document traversal and manipulation, event handling, animation, and Ajax much simpler with an easy-to-use API that works across a multitude of browsers. Affected versions of this package are vulnerable to Cross-site Scripting (XSS)
attacks when a cross-domain ajax request is performed without the Note: After being implemented in version 1.12.0, the fix of this vulnerability was reverted in 1.12.3, and then was only reintroduced in version 3.0.0-beta1. The fix was never released in any tag of the 2.x.x branch, as it was reverted out of the branch before being released. Note: CVE-2017-16012 is a duplicate of CVE-2015-9251 How to fix Cross-site Scripting (XSS)? Upgrade |
<1.12.0
>=1.12.3 <3.0.0-beta1
|