Storyline embedded jQuery - security vulnerability
One of our clients noticed that there's a mention that jQuery '1.7.1' is used/embedded in the published storyline result. This version seems to contains some security vulnerabilities.
Is this something that can be updated? Or should I not have that security concern? Could I do something about this?
-> jQuery 1.7.1 is used in Storyline 1 (storyline_compiled.js) and in Storyline 2 (player_compiled.js); this file is needed to play the html5 version on pc only.
Any tips? Suggestions?