Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-yjt6-bhfr-u3aj
Summary
Duplicate Advisory: Prototype Pollution in jquery
## Duplicate Advisory
This advisory is a duplicate of [GHSA-6c3j-c64m-qhgq](https://github.com/advisories/GHSA-6c3j-c64m-qhgq). This link is maintained to preserve external references.

## Original Description
Versions of `jquery`  prior to 3.4.0 are vulnerable to Prototype Pollution. The extend() method allows an attacker to modify the prototype for `Object` causing changes in properties that will exist on all objects.

## Recommendation
Upgrade to version 3.4.0 or later.
Aliases
0
alias CVE-2019-5428
1
alias GHSA-wv67-q8rr-grjp
Fixed_packages
0
url pkg:maven/org.webjars.npm/jquery@3.4.0
purl pkg:maven/org.webjars.npm/jquery@3.4.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5618-53yg-8qh4
1
vulnerability VCID-8mpx-4ueh-qqfv
2
vulnerability VCID-cvxp-ctj9-guej
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.webjars.npm/jquery@3.4.0
1
url pkg:npm/jquery@3.4.0
purl pkg:npm/jquery@3.4.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5618-53yg-8qh4
1
vulnerability VCID-8mpx-4ueh-qqfv
2
vulnerability VCID-cvxp-ctj9-guej
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/jquery@3.4.0
2
url pkg:nuget/jquery@3.4.0
purl pkg:nuget/jquery@3.4.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5618-53yg-8qh4
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/jquery@3.4.0
Affected_packages
References
0
reference_url https://blog.jquery.com/2019/04/10/jquery-3-4-0-released
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://blog.jquery.com/2019/04/10/jquery-3-4-0-released
1
reference_url https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/
reference_id
reference_type
scores
url https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/
2
reference_url https://github.com/jquery/jquery/pull/4333
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jquery/jquery/pull/4333
3
reference_url https://hackerone.com/reports/454365
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://hackerone.com/reports/454365
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-5428
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-5428
5
reference_url https://www.npmjs.com/advisories/796
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.npmjs.com/advisories/796
6
reference_url https://github.com/nodejs/security-wg/blob/main/vuln/npm/496.json
reference_id 496
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements
url https://github.com/nodejs/security-wg/blob/main/vuln/npm/496.json
7
reference_url https://github.com/advisories/GHSA-wv67-q8rr-grjp
reference_id GHSA-wv67-q8rr-grjp
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-wv67-q8rr-grjp
Weaknesses
Exploits
Severity_range_score4.0 - 6.9
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-yjt6-bhfr-u3aj