CVE-2019-11358
Description
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
jQuery before 3.4.0 mishandles jQuery.extend(true, {}, ...) allowing Object.prototype pollution via __proto__, affecting Drupal, Backdrop CMS, and others.
Root
Cause
CVE-2019-11358 is a prototype pollution vulnerability in the jQuery JavaScript library, present in versions prior to 3.4.0. The flaw resides in the jQuery.extend(true, {}, ...) function when used to deep-merge objects [1]. Specifically, if an unsanitized source object contains an enumerable __proto__ property, the merge operation can pollute the native Object.prototype [1]. This occurs because the deep-extend logic does not guard against special property names like __proto__.
Attack
Vector
The vulnerability is exploitable via any attacker-controlled input that is passed unsanitized to a deep-extend operation, such as JSON parsing or user-supplied configuration objects [1]. No authentication or privileged network position is required if the application processes untrusted data client-side. Common scenarios include plugins, CMS themes, or web applications that accept serialized data (e.g., via AJAX or WebSocket) and merge it into existing objects.
Impact
By polluting Object.prototype, an attacker can inject properties that affect all objects in the runtime, potentially leading to property injection, unexpected default values, and in downstream code paths, privilege escalation or cross-site scripting (XSS) [1]. In content management systems like Drupal and Backdrop CMS, this could enable an attacker to modify application behavior or bypass security controls.
Remediation
jQuery 3.4.0 and later versions fix the issue by properly handling __proto__ during deep extension [2]. Users are strongly advised to upgrade to jQuery 3.4.0 or higher. For applications where immediate upgrade is not feasible, workarounds include sanitizing input to remove __proto__ keys before passing objects to $.extend().
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
jquerynpm | >= 1.1.4, < 3.4.0 | 3.4.0 |
jquery-railsRubyGems | < 4.3.4 | 4.3.4 |
jQueryNuGet | >= 1.1.4, < 3.4.0 | 3.4.0 |
djangoPyPI | >= 2.0a1, < 2.1.9 | 2.1.9 |
djangoPyPI | >= 2.2a1, < 2.2.2 | 2.2.2 |
org.webjars.npm:jqueryMaven | >= 1.1.4, < 3.4.0 | 3.4.0 |
maximebf/debugbarPackagist | < 1.19.0 | 1.19.0 |
Affected products
18- Range: 1.0, 1.0.1, 1.0.2, …
- ghsa-coords17 versionspkg:composer/maximebf/debugbarpkg:gem/jquery-railspkg:maven/org.webjars.npm/jquerypkg:npm/jquerypkg:nuget/jquerypkg:pypi/djangopkg:rpm/almalinux/custodiapkg:rpm/almalinux/python3-custodiapkg:rpm/almalinux/python3-jwcryptopkg:rpm/almalinux/python3-kdcproxypkg:rpm/almalinux/python3-pyusbpkg:rpm/almalinux/python3-qrcodepkg:rpm/almalinux/python3-qrcode-corepkg:rpm/almalinux/python3-yubicopkg:rpm/opensuse/python-notebook&distro=openSUSE%20Leap%2015.6pkg:rpm/suse/python-Django&distro=SUSE%20Package%20Hub%2015%20SP1pkg:rpm/suse/python-notebook&distro=SUSE%20Package%20Hub%2015%20SP6
< 1.19.0+ 16 more
- (no CPE)range: < 1.19.0
- (no CPE)range: < 4.3.4
- (no CPE)range: >= 1.1.4, < 3.4.0
- (no CPE)range: >= 1.1.4, < 3.4.0
- (no CPE)range: >= 1.1.4, < 3.4.0
- (no CPE)range: >= 2.0a1, < 2.1.9
- (no CPE)range: < 0.6.0-3.module_el8.6.0+2881+2f24dc92
- (no CPE)range: < 0.6.0-3.module_el8.6.0+2881+2f24dc92
- (no CPE)range: < 0.5.0-1.module_el8.5.0+2641+983b221b
- (no CPE)range: < 0.4-5.module_el8.6.0+2881+2f24dc92
- (no CPE)range: < 1.0.0-9.module_el8.5.0+2641+983b221b
- (no CPE)range: < 5.1-12.module_el8.6.0+2881+2f24dc92
- (no CPE)range: < 5.1-12.module_el8.6.0+2737+7e73ea90
- (no CPE)range: < 1.3.2-9.module_el8.5.0+2641+983b221b
- (no CPE)range: < 5.7.11-bp156.4.3.1
- (no CPE)range: < 2.2.4-bp151.3.3.1
- (no CPE)range: < 5.7.11-bp156.4.3.1
Patches
5847216e60544bump jquery to v3.7.1 (#548)
1 file changed · +2 −2
src/DebugBar/Resources/vendor/jquery/dist/jquery.min.js+2 −2 modified
34ec52269adeApplied jQuery patch for CVE-2019-11358.
4 files changed · +25 −2
django/contrib/admin/static/admin/js/vendor/jquery/jquery.js+2 −1 modified@@ -261,8 +261,9 @@ jQuery.extend = jQuery.fn.extend = function() { src = target[ name ]; copy = options[ name ]; + // Prevent Object.prototype pollution // Prevent never-ending loop - if ( target === copy ) { + if ( name === "__proto__" || target === copy ) { continue; }
django/contrib/admin/static/admin/js/vendor/jquery/jquery.min.js+1 −1 modifieddocs/releases/2.1.9.txt+11 −0 modified@@ -19,3 +19,14 @@ payload, could result in an clickable JavaScript link. link. You may customise the validator by passing a ``validator_class`` kwarg to ``AdminURLFieldWidget.__init__()``, e.g. when using :attr:`~django.contrib.admin.ModelAdmin.formfield_overrides`. + +Patched bundled jQuery for CVE-2019-11358: Prototype pollution +-------------------------------------------------------------- + +jQuery before 3.4.0, mishandles ``jQuery.extend(true, {}, ...)`` because of +``Object.prototype`` pollution. If an unsanitized source object contained an +enumerable ``__proto__`` property, it could extend the native +``Object.prototype``. + +The bundled version of jQuery used by the Django admin has been patched to +allow for the ``select2`` library's use of ``jQuery.extend()``.
docs/releases/2.2.2.txt+11 −0 modified@@ -20,6 +20,17 @@ link. You may customise the validator by passing a ``validator_class`` kwarg to ``AdminURLFieldWidget.__init__()``, e.g. when using :attr:`~django.contrib.admin.ModelAdmin.formfield_overrides`. +Patched bundled jQuery for CVE-2019-11358: Prototype pollution +-------------------------------------------------------------- + +jQuery before 3.4.0, mishandles ``jQuery.extend(true, {}, ...)`` because of +``Object.prototype`` pollution. If an unsanitized source object contained an +enumerable ``__proto__`` property, it could extend the native +``Object.prototype``. + +The bundled version of jQuery used by the Django admin has been patched to +allow for the ``select2`` library's use of ``jQuery.extend()``. + Bugfixes ========
baaf187a4e35[2.2.x] Applied jQuery patch for CVE-2019-11358.
4 files changed · +25 −2
django/contrib/admin/static/admin/js/vendor/jquery/jquery.js+2 −1 modified@@ -261,8 +261,9 @@ jQuery.extend = jQuery.fn.extend = function() { src = target[ name ]; copy = options[ name ]; + // Prevent Object.prototype pollution // Prevent never-ending loop - if ( target === copy ) { + if ( name === "__proto__" || target === copy ) { continue; }
django/contrib/admin/static/admin/js/vendor/jquery/jquery.min.js+1 −1 modifieddocs/releases/2.1.9.txt+11 −0 modified@@ -19,3 +19,14 @@ payload, could result in an clickable JavaScript link. link. You may customise the validator by passing a ``validator_class`` kwarg to ``AdminURLFieldWidget.__init__()``, e.g. when using :attr:`~django.contrib.admin.ModelAdmin.formfield_overrides`. + +Patched bundled jQuery for CVE-2019-11358: Prototype pollution +-------------------------------------------------------------- + +jQuery before 3.4.0, mishandles ``jQuery.extend(true, {}, ...)`` because of +``Object.prototype`` pollution. If an unsanitized source object contained an +enumerable ``__proto__`` property, it could extend the native +``Object.prototype``. + +The bundled version of jQuery used by the Django admin has been patched to +allow for the ``select2`` library's use of ``jQuery.extend()``.
docs/releases/2.2.2.txt+11 −0 modified@@ -20,6 +20,17 @@ link. You may customise the validator by passing a ``validator_class`` kwarg to ``AdminURLFieldWidget.__init__()``, e.g. when using :attr:`~django.contrib.admin.ModelAdmin.formfield_overrides`. +Patched bundled jQuery for CVE-2019-11358: Prototype pollution +-------------------------------------------------------------- + +jQuery before 3.4.0, mishandles ``jQuery.extend(true, {}, ...)`` because of +``Object.prototype`` pollution. If an unsanitized source object contained an +enumerable ``__proto__`` property, it could extend the native +``Object.prototype``. + +The bundled version of jQuery used by the Django admin has been patched to +allow for the ``select2`` library's use of ``jQuery.extend()``. + Bugfixes ========
95649bc08547[2.1.x] Applied jQuery patch for CVE-2019-11358.
3 files changed · +14 −2
django/contrib/admin/static/admin/js/vendor/jquery/jquery.js+2 −1 modified@@ -261,8 +261,9 @@ jQuery.extend = jQuery.fn.extend = function() { src = target[ name ]; copy = options[ name ]; + // Prevent Object.prototype pollution // Prevent never-ending loop - if ( target === copy ) { + if ( name === "__proto__" || target === copy ) { continue; }
django/contrib/admin/static/admin/js/vendor/jquery/jquery.min.js+1 −1 modifieddocs/releases/2.1.9.txt+11 −0 modified@@ -19,3 +19,14 @@ payload, could result in an clickable JavaScript link. link. You may customise the validator by passing a ``validator_class`` kwarg to ``AdminURLFieldWidget.__init__()``, e.g. when using :attr:`~django.contrib.admin.ModelAdmin.formfield_overrides`. + +Patched bundled jQuery for CVE-2019-11358: Prototype pollution +-------------------------------------------------------------- + +jQuery before 3.4.0, mishandles ``jQuery.extend(true, {}, ...)`` because of +``Object.prototype`` pollution. If an unsanitized source object contained an +enumerable ``__proto__`` property, it could extend the native +``Object.prototype``. + +The bundled version of jQuery used by the Django admin has been patched to +allow for the ``select2`` library's use of ``jQuery.extend()``.
753d591aea69Core: Prevent Object.prototype pollution for $.extend( true, ... )
2 files changed · +9 −1
src/core.js+2 −1 modified@@ -158,8 +158,9 @@ jQuery.extend = jQuery.fn.extend = function() { for ( name in options ) { copy = options[ name ]; + // Prevent Object.prototype pollution // Prevent never-ending loop - if ( target === copy ) { + if ( name === "__proto__" || target === copy ) { continue; }
test/unit/core.js+7 −0 modified@@ -1062,6 +1062,13 @@ QUnit.test( "jQuery.extend(true,{},{a:[], o:{}}); deep copy with array, followed assert.ok( !Array.isArray( result.object ), "result.object wasn't paved with an empty array" ); } ); +QUnit.test( "jQuery.extend( true, ... ) Object.prototype pollution", function( assert ) { + assert.expect( 1 ); + + jQuery.extend( true, {}, JSON.parse( "{\"__proto__\": {\"devMode\": true}}" ) ); + assert.ok( !( "devMode" in {} ), "Object.prototype not polluted" ); +} ); + QUnit.test( "jQuery.each(Object,Function)", function( assert ) { assert.expect( 23 );
Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
119- lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.htmlghsavendor-advisoryWEB
- lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.htmlghsavendor-advisoryWEB
- access.redhat.com/errata/RHBA-2019:1570ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:1456ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:2587ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:3023ghsavendor-advisoryWEB
- access.redhat.com/errata/RHSA-2019:3024ghsavendor-advisoryWEB
- github.com/advisories/GHSA-6c3j-c64m-qhgqghsaADVISORY
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4UOAZIFCSZ3ENEFOR5IXX6NFAD3HV7FA/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5IABSKTYZ5JUGL735UKGXL5YPRYOPUYI/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KYH3OAGR2RTCHRA5NOKX2TES7SNQMWGO/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QV3PKZC3PQCO3273HAT76PAQZFBEO4KP/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RLXRX23725JL366CNZGJZ7AQQB7LHQ6F/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WZW27UCJ5CYFL4KFFFMYMIBNMIU2ALG5/mitrevendor-advisory
- nvd.nist.gov/vuln/detail/CVE-2019-11358ghsaADVISORY
- www.debian.org/security/2019/dsa-4434ghsavendor-advisoryWEB
- www.debian.org/security/2019/dsa-4460ghsavendor-advisoryWEB
- packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.htmlghsaWEB
- packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.htmlghsaWEB
- packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.htmlghsaWEB
- seclists.org/fulldisclosure/2019/May/10ghsamailing-listWEB
- seclists.org/fulldisclosure/2019/May/11ghsamailing-listWEB
- seclists.org/fulldisclosure/2019/May/13ghsamailing-listWEB
- www.openwall.com/lists/oss-security/2019/06/03/2ghsamailing-listWEB
- www.securityfocus.com/bid/108023ghsavdb-entryWEB
- backdropcms.org/security/backdrop-sa-core-2019-009ghsaWEB
- blog.jquery.com/2019/04/10/jquery-3-4-0-releasedghsaWEB
- github.com/django/django/commit/34ec52269ade54af31a021b12969913129571a3fghsaWEB
- github.com/django/django/commit/95649bc08547a878cebfa1d019edec8cb1b80829ghsaWEB
- github.com/django/django/commit/baaf187a4e354bf3976c51e2c83a0d2f8ee6e6adghsaWEB
- github.com/jquery/jquery/commit/753d591aea698e57d6db58c9f722cd0808619b1bghsaWEB
- github.com/jquery/jquery/pull/4333ghsaWEB
- github.com/maximebf/php-debugbar/commit/847216e60544258c881f2733d699bbcfeefac0fcghsaWEB
- github.com/maximebf/php-debugbar/issues/447ghsaWEB
- github.com/rails/jquery-rails/blob/master/CHANGELOG.mdghsaWEB
- github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-rails/CVE-2019-11358.ymlghsaWEB
- kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601ghsaWEB
- lists.apache.org/thread.html/08720ef215ee7ab3386c05a1a90a7d1c852bf0706f176a7816bf65fc%40%3Ccommits.airflow.apache.org%3Eghsamailing-listWEB
- lists.apache.org/thread.html/08720ef215ee7ab3386c05a1a90a7d1c852bf0706f176a7816bf65fc@%3Ccommits.airflow.apache.org%3EghsaWEB
- lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3Eghsamailing-listWEB
- lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3EghsaWEB
- lists.apache.org/thread.html/5928aa293e39d248266472210c50f176cac1535220f2486e6a7fa844%40%3Ccommits.airflow.apache.org%3Eghsamailing-listWEB
- lists.apache.org/thread.html/5928aa293e39d248266472210c50f176cac1535220f2486e6a7fa844@%3Ccommits.airflow.apache.org%3EghsaWEB
- lists.apache.org/thread.html/6097cdbd6f0a337bedd9bb5cc441b2d525ff002a96531de367e4259f%40%3Ccommits.airflow.apache.org%3Eghsamailing-listWEB
- lists.apache.org/thread.html/6097cdbd6f0a337bedd9bb5cc441b2d525ff002a96531de367e4259f@%3Ccommits.airflow.apache.org%3EghsaWEB
- lists.apache.org/thread.html/88fb0362fd40e5b605ea8149f63241537b8b6fb5bfa315391fc5cbb7%40%3Ccommits.airflow.apache.org%3Eghsamailing-listWEB
- lists.apache.org/thread.html/88fb0362fd40e5b605ea8149f63241537b8b6fb5bfa315391fc5cbb7@%3Ccommits.airflow.apache.org%3EghsaWEB
- lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3Eghsamailing-listWEB
- lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3EghsaWEB
- lists.apache.org/thread.html/b736d0784cf02f5a30fbb4c5902762a15ad6d47e17e2c5a17b7d6205%40%3Ccommits.airflow.apache.org%3Eghsamailing-listWEB
- lists.apache.org/thread.html/b736d0784cf02f5a30fbb4c5902762a15ad6d47e17e2c5a17b7d6205@%3Ccommits.airflow.apache.org%3EghsaWEB
- lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6%40%3Ccommits.roller.apache.org%3Eghsamailing-listWEB
- lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6@%3Ccommits.roller.apache.org%3EghsaWEB
- lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3%40%3Ccommits.nifi.apache.org%3Eghsamailing-listWEB
- lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3EghsaWEB
- lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3Eghsamailing-listWEB
- lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r2041a75d3fc09dec55adfd95d598b38d22715303f65c997c054844c9%40%3Cissues.flink.apache.org%3Eghsamailing-listWEB
- lists.apache.org/thread.html/r2041a75d3fc09dec55adfd95d598b38d22715303f65c997c054844c9@%3Cissues.flink.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r2baacab6e0acb5a2092eb46ae04fd6c3e8277b4fd79b1ffb7f3254fa%40%3Cissues.flink.apache.org%3Eghsamailing-listWEB
- lists.apache.org/thread.html/r2baacab6e0acb5a2092eb46ae04fd6c3e8277b4fd79b1ffb7f3254fa@%3Cissues.flink.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r38f0d1aa3c923c22977fe7376508f030f22e22c1379fbb155bf29766%40%3Cdev.syncope.apache.org%3Eghsamailing-listWEB
- lists.apache.org/thread.html/r38f0d1aa3c923c22977fe7376508f030f22e22c1379fbb155bf29766@%3Cdev.syncope.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r41b5bfe009c845f67d4f68948cc9419ac2d62e287804aafd72892b08%40%3Cissues.flink.apache.org%3Eghsamailing-listWEB
- lists.apache.org/thread.html/r41b5bfe009c845f67d4f68948cc9419ac2d62e287804aafd72892b08@%3Cissues.flink.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r7aac081cbddb6baa24b75e74abf0929bf309b176755a53e3ed810355%40%3Cdev.flink.apache.org%3Eghsamailing-listWEB
- lists.apache.org/thread.html/r7aac081cbddb6baa24b75e74abf0929bf309b176755a53e3ed810355@%3Cdev.flink.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r7d64895cc4dff84d0becfc572b20c0e4bf9bfa7b10c6f5f73e783734%40%3Cdev.storm.apache.org%3Eghsamailing-listWEB
- lists.apache.org/thread.html/r7d64895cc4dff84d0becfc572b20c0e4bf9bfa7b10c6f5f73e783734@%3Cdev.storm.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r7e8ebccb7c022e41295f6fdb7b971209b83702339f872ddd8cf8bf73%40%3Cissues.flink.apache.org%3Eghsamailing-listWEB
- lists.apache.org/thread.html/r7e8ebccb7c022e41295f6fdb7b971209b83702339f872ddd8cf8bf73@%3Cissues.flink.apache.org%3EghsaWEB
- lists.apache.org/thread.html/rac25da84ecdcd36f6de5ad0d255f4e967209bbbebddb285e231da37d%40%3Cissues.flink.apache.org%3Eghsamailing-listWEB
- lists.apache.org/thread.html/rac25da84ecdcd36f6de5ad0d255f4e967209bbbebddb285e231da37d@%3Cissues.flink.apache.org%3EghsaWEB
- lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b%40%3Ccommits.nifi.apache.org%3Eghsamailing-listWEB
- lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3EghsaWEB
- lists.debian.org/debian-lts-announce/2019/05/msg00006.htmlghsamailing-listWEB
- lists.debian.org/debian-lts-announce/2019/05/msg00029.htmlghsamailing-listWEB
- lists.debian.org/debian-lts-announce/2020/02/msg00024.htmlghsamailing-listWEB
- lists.debian.org/debian-lts-announce/2023/08/msg00040.htmlghsamailing-listWEB
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4UOAZIFCSZ3ENEFOR5IXX6NFAD3HV7FAghsaWEB
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5IABSKTYZ5JUGL735UKGXL5YPRYOPUYIghsaWEB
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KYH3OAGR2RTCHRA5NOKX2TES7SNQMWGOghsaWEB
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QV3PKZC3PQCO3273HAT76PAQZFBEO4KPghsaWEB
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RLXRX23725JL366CNZGJZ7AQQB7LHQ6FghsaWEB
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WZW27UCJ5CYFL4KFFFMYMIBNMIU2ALG5ghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UOAZIFCSZ3ENEFOR5IXX6NFAD3HV7FAghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5IABSKTYZ5JUGL735UKGXL5YPRYOPUYIghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KYH3OAGR2RTCHRA5NOKX2TES7SNQMWGOghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QV3PKZC3PQCO3273HAT76PAQZFBEO4KPghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RLXRX23725JL366CNZGJZ7AQQB7LHQ6FghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZW27UCJ5CYFL4KFFFMYMIBNMIU2ALG5ghsaWEB
- seclists.org/bugtraq/2019/Apr/32ghsamailing-listWEB
- seclists.org/bugtraq/2019/Jun/12ghsamailing-listWEB
- seclists.org/bugtraq/2019/May/18ghsamailing-listWEB
- security.netapp.com/advisory/ntap-20190919-0001ghsaWEB
- security.snyk.io/vuln/SNYK-DOTNET-JQUERY-450226ghsaWEB
- snyk.io/vuln/SNYK-JS-JQUERY-174006ghsaWEB
- supportportal.juniper.net/s/article/2021-07-Security-Bulletin-Junos-OS-Multiple-J-Web-vulnerabilities-resolved-in-Junos-OS-21-2R1ghsaWEB
- web.archive.org/web/20190824065237/http://www.securityfocus.com/bid/108023ghsaWEB
- www.djangoproject.com/weblog/2019/jun/03/security-releasesghsaWEB
- www.drupal.org/sa-core-2019-006ghsaWEB
- www.oracle.com//security-alerts/cpujul2021.htmlghsaWEB
- www.oracle.com/security-alerts/cpuApr2021.htmlghsaWEB
- www.oracle.com/security-alerts/cpuapr2020.htmlghsaWEB
- www.oracle.com/security-alerts/cpujan2020.htmlghsaWEB
- www.oracle.com/security-alerts/cpujan2021.htmlghsaWEB
- www.oracle.com/security-alerts/cpujan2022.htmlghsaWEB
- www.oracle.com/security-alerts/cpujul2020.htmlghsaWEB
- www.oracle.com/security-alerts/cpuoct2020.htmlghsaWEB
- www.oracle.com/security-alerts/cpuoct2021.htmlghsaWEB
- www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.htmlghsaWEB
- www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.htmlghsaWEB
- www.privacy-wise.com/mitigating-cve-2019-11358-in-old-versions-of-jqueryghsaWEB
- www.synology.com/security/advisory/Synology_SA_19_19ghsaWEB
- www.tenable.com/security/tns-2019-08ghsaWEB
- www.tenable.com/security/tns-2020-02ghsaWEB
- blog.jquery.com/2019/04/10/jquery-3-4-0-released/mitre
- security.netapp.com/advisory/ntap-20190919-0001/mitre
- www.privacy-wise.com/mitigating-cve-2019-11358-in-old-versions-of-jquery/mitre
News mentions
0No linked articles in our index yet.