In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
We have discovered 8,353,176 live websites that are affected by CVE-2020-11023.
Product | |
Category | JavaScript Frameworks |
Vulnerable Domains | 8,353,176 live websites (45% of jQuery install base) |
Vulnerable Versions |
|
Vulnerable Versions Count | 270 versions ( 85% of all versions) |
![]() | 2,847,850 websites |
![]() | 677,231 websites |
![]() | 594,540 websites |
![]() | 494,358 websites |
![]() | 365,581 websites |
![]() | 317,718 websites |
![]() | 273,852 websites |
![]() | 216,036 websites |
![]() | 204,308 websites |
![]() | 198,626 websites |
.com | 3,750,032 websites |
.ru | 428,905 websites |
.de | 402,588 websites |
.org | 300,274 websites |
.net | 276,992 websites |
.co.uk | 190,667 websites |
.nl | 170,722 websites |
.jp | 162,260 websites |
.it | 157,541 websites |
.fr | 133,581 websites |
Domain | Country | Rank | Contacts |
---|---|---|---|
**********.***********.com | ![]() | ** | |
********.****.br | ![]() | ** | |
*******.com | ![]() | *** | |
*********.com | ![]() | *** | |
***********.com | ![]() | *** | |
******.com | ![]() | *** | |
******.ru | ![]() | *** | |
*******.*********.com | ![]() | *** | |
*****.com | ![]() | *** | |
*****************.com | ![]() | *** |
FAQ