You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to dependency file: /tmp/ws-scm/myReads/node_modules/sockjs/examples/express/index.html
Path to vulnerable library: /myReads/node_modules/sockjs/examples/express/index.html,/myReads/node_modules/sockjs/examples/multiplex/index.html,/myReads/node_modules/vm-browserify/example/run/index.html,/myReads/node_modules/sockjs/examples/echo/index.html,/myReads/node_modules/sockjs/examples/hapi/html/index.html,/myReads/node_modules/sockjs/examples/express-3.x/index.html
WS-2016-0090 - Medium Severity Vulnerability
JavaScript library for DOM operations
Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.1/jquery.min.js
Path to dependency file: /tmp/ws-scm/myReads/node_modules/sockjs/examples/express/index.html
Path to vulnerable library: /myReads/node_modules/sockjs/examples/express/index.html,/myReads/node_modules/sockjs/examples/multiplex/index.html,/myReads/node_modules/vm-browserify/example/run/index.html,/myReads/node_modules/sockjs/examples/echo/index.html,/myReads/node_modules/sockjs/examples/hapi/html/index.html,/myReads/node_modules/sockjs/examples/express-3.x/index.html
Dependency Hierarchy:
Found in HEAD commit: 9d78f8cf9a0c6413c5b55917c4151fb4791348b2
JQuery, before 2.2.0, is vulnerable to Cross-site Scripting (XSS) attacks via text/javascript response with arbitrary code execution.
Publish Date: 2016-11-27
URL: WS-2016-0090
Base Score Metrics not available
Type: Upgrade version
Origin: jquery/jquery@b078a62
Release Date: 2019-04-08
Fix Resolution: 2.2.0
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: