From 54cac060d7397b729c84160a8cb20c972b410179 Mon Sep 17 00:00:00 2001 From: deacon-mp Date: Mon, 18 May 2026 19:05:42 -0400 Subject: [PATCH] =?UTF-8?q?security(static):=20upgrade=20jQuery=201.12.4?= =?UTF-8?q?=20=E2=86=92=203.7.1,=20drop=20unreferenced=203.3.1=20bundle?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit static/jquery/jquery.js was jQuery 1.12.4 (2016), loaded by templates/core.html on every page of the operator UI. Affected by: * CVE-2015-9251 — XSS via cross-domain Ajax responses (fixed in jQuery 3.0) * CVE-2019-11358 — prototype pollution in $.extend (fixed in 3.4) * CVE-2020-11022 — XSS via HTML manipulation methods (.html, .append, etc.) * CVE-2020-11023 — XSS via