You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
Uh oh!
There was an error while loading. Please reload this page.
CVE-2020-11022 - Medium Severity Vulnerability
WebJar for jQuery
Library home page: http://webjars.org
Path to dependency file: /pom.xml
Path to vulnerable library: /epository/org/webjars/jquery/2.1.1/jquery-2.1.1.jar
Dependency Hierarchy:
Found in HEAD commit: 1d4a86820b5ccc9e51b82198be488c68e9299e40
Found in base branch: master
In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
Publish Date: 2020-04-29
URL: CVE-2020-11022
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11022
Release Date: 2020-04-29
Fix Resolution: 3.5.0
⛑️ Automatic Remediation is available for this issue
The text was updated successfully, but these errors were encountered: