WID-SEC-W-2022-1347

Vulnerability from csaf_certbund - Published: 2020-05-03 22:00 - Updated: 2025-05-29 22:00
Summary
jQuery: Mehrere Schwachstellen ermöglichen Cross-Site Scripting
Severity
Mittel
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: jQuery ist eine freie JavaScript-Bibliothek, die Funktionen zur DOM-Navigation und -Manipulation zur Verfügung stellt.
Angriff: Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in jQuery ausnutzen, um einen Cross-Site Scripting Angriff durchzuführen.
Betroffene Betriebssysteme: - BIOS/Firmware - F5 Networks - Hardware Appliance - Juniper Appliance - Linux - MacOS X - Sonstiges - UNIX - Windows
References
https://wid.cert-bund.de/.well-known/csaf/white/2… self
https://wid.cert-bund.de/portal/wid/securityadvis… self
https://github.com/jquery/jquery/security/advisor… external
https://github.com/jquery/jquery/security/advisor… external
https://www.drupal.org/sa-core-2020-002 external
https://www.debian.org/security/2020/dsa-4693 external
https://access.redhat.com/errata/RHSA-2020:2217 external
https://access.redhat.com/errata/RHSA-2020:2362 external
https://access.redhat.com/errata/RHSA-2020:2813 external
https://security.paloaltonetworks.com/PAN-SA-2020-0007 external
https://access.redhat.com/errata/RHSA-2020:2412 external
https://security.gentoo.org/glsa/202007-03 external
https://support.f5.com/csp/article/K66544153 external
https://support.f5.com/csp/article/K02453220 external
https://access.redhat.com/errata/RHSA-2020:3247 external
https://access.redhat.com/errata/RHSA-2020:3369 external
http://lists.suse.com/pipermail/sle-security-upda… external
http://lists.suse.com/pipermail/sle-security-upda… external
http://lists.suse.com/pipermail/sle-security-upda… external
http://lists.suse.com/pipermail/sle-security-upda… external
http://lists.suse.com/pipermail/sle-security-upda… external
http://lists.suse.com/pipermail/sle-security-upda… external
https://access.redhat.com/errata/RHSA-2020:3807 external
https://access.redhat.com/errata/RHSA-2020:3936 external
https://access.redhat.com/errata/RHSA-2020:4211 external
https://community.otrs.com/security-advisory-2020-14/ external
https://support.hcltechsw.com/csm?id=kb_article&s… external
https://de.tenable.com/security/tns-2020-10 external
https://access.redhat.com/errata/RHSA-2020:5412 external
https://www.dell.com/support/kbdoc/en-us/00018092… external
https://de.tenable.com/security/tns-2021-02 external
https://access.redhat.com/errata/RHSA-2021:0778 external
https://access.redhat.com/errata/RHSA-2021:0860 external
https://linux.oracle.com/errata/ELSA-2021-0860.html external
https://lists.debian.org/debian-lts-announce/2021… external
https://alas.aws.amazon.com/AL2/ALAS-2021-1626.html external
https://www.broadcom.com/support/fibre-channel-ne… external
https://access.redhat.com/errata/RHSA-2021:1846 external
https://www.broadcom.com/support/fibre-channel-ne… external
https://support.hpe.com/hpesc/public/docDisplay?d… external
https://linux.oracle.com/errata/ELSA-2021-9400.html external
https://access.redhat.com/errata/RHSA-2021:4142 external
https://linux.oracle.com/errata/ELSA-2021-9552.html external
https://linux.oracle.com/errata/ELSA-2022-9177.html external
https://access.redhat.com/errata/RHSA-2022:6393 external
https://documentation.solarwinds.com/en/success_c… external
https://www.ibm.com/support/pages/node/6852773 external
https://www.tenable.com/security/tns-2023-09 external
https://documentation.solarwinds.com/en/success_c… external
https://www.ibm.com/support/pages/node/7060517 external
https://www.moxa.com/en/support/product-support/s… external
https://www.ibm.com/support/pages/node/7160134 external
https://www.ibm.com/support/pages/node/7178266 external
https://supportportal.juniper.net/s/article/2025-… external
https://www.cisa.gov/known-exploited-vulnerabilit… external
https://ubuntu.com/security/notices/USN-7246-1 external
https://access.redhat.com/errata/RHSA-2025:1070 external
https://access.redhat.com/errata/RHSA-2025:1185 external
https://access.redhat.com/errata/RHSA-2025:1209 external
https://access.redhat.com/errata/RHSA-2025:1210 external
https://access.redhat.com/errata/RHSA-2025:1212 external
https://access.redhat.com/errata/RHSA-2025:1211 external
https://access.redhat.com/errata/RHSA-2025:1213 external
https://access.redhat.com/errata/RHSA-2025:1214 external
https://access.redhat.com/errata/RHSA-2025:1216 external
https://access.redhat.com/errata/RHSA-2025:1217 external
https://access.redhat.com/errata/RHSA-2025:1215 external
https://access.redhat.com/errata/RHSA-2025:1249 external
https://linux.oracle.com/errata/ELSA-2025-1210.html external
https://access.redhat.com/errata/RHSA-2025:1255 external
https://linux.oracle.com/errata/ELSA-2025-1215.html external
https://access.redhat.com/errata/RHSA-2025:1247 external
https://access.redhat.com/errata/RHSA-2025:1256 external
https://access.redhat.com/errata/RHSA-2025:1304 external
https://access.redhat.com/errata/RHSA-2025:1329 external
https://access.redhat.com/errata/RHSA-2025:1346 external
https://access.redhat.com/errata/RHSA-2025:1300 external
https://access.redhat.com/errata/RHSA-2025:1306 external
https://access.redhat.com/errata/RHSA-2025:1338 external
https://access.redhat.com/errata/RHSA-2025:1308 external
https://access.redhat.com/errata/RHSA-2025:1312 external
https://access.redhat.com/errata/RHSA-2025:1303 external
https://access.redhat.com/errata/RHSA-2025:1310 external
https://access.redhat.com/errata/RHSA-2025:1305 external
https://access.redhat.com/errata/RHSA-2025:1315 external
https://access.redhat.com/errata/RHSA-2025:1314 external
https://access.redhat.com/errata/RHSA-2025:1301 external
https://access.redhat.com/errata/RHSA-2025:1309 external
https://access.redhat.com/errata/RHSA-2025:1342 external
https://access.redhat.com/errata/RHSA-2025:1311 external
https://linux.oracle.com/errata/ELSA-2025-1300.html external
https://linux.oracle.com/errata/ELSA-2025-1301.html external
https://linux.oracle.com/errata/ELSA-2025-1309.html external
https://linux.oracle.com/errata/ELSA-2025-1306.html external
https://errata.build.resf.org/RLSA-2025:1314 external
https://errata.build.resf.org/RLSA-2025:1215 external
https://linux.oracle.com/errata/ELSA-2025-1338.html external
https://linux.oracle.com/errata/ELSA-2025-1346.html external
https://access.redhat.com/errata/RHSA-2025:1515 external
https://access.redhat.com/errata/RHSA-2025:1514 external
https://access.redhat.com/errata/RHSA-2025:1601 external
https://access.redhat.com/errata/RHSA-2025:1580 external
https://linux.oracle.com/errata/ELSA-2025-1329.html external
https://access.redhat.com/errata/RHSA-2025:1983 external
https://access.redhat.com/errata/RHSA-2025:2426 external
https://access.redhat.com/errata/RHSA-2025:1985 external
https://www.ibm.com/support/pages/node/7185353 external
https://linux.oracle.com/errata/ELSA-2025-1601.html external
https://www.ibm.com/support/pages/node/7228945 external
https://supportportal.juniper.net/s/article/2025-… external
https://access.redhat.com/errata/RHSA-2025:4005 external
https://www.ibm.com/support/pages/node/7231915 external
https://www.ibm.com/support/pages/node/7233394 external
https://rhn.redhat.com/errata/RHSA-2025:8278.html external

{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "jQuery ist eine freie JavaScript-Bibliothek, die Funktionen zur DOM-Navigation und -Manipulation zur Verf\u00fcgung stellt.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in jQuery ausnutzen, um einen Cross-Site Scripting Angriff durchzuf\u00fchren.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- BIOS/Firmware\n- F5 Networks\n- Hardware Appliance\n- Juniper Appliance\n- Linux\n- MacOS X\n- Sonstiges\n- UNIX\n- Windows",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2022-1347 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2020/wid-sec-w-2022-1347.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2022-1347 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1347"
      },
      {
        "category": "external",
        "summary": "GitHub Security Advisory GHSA-gxr4-xjj5-5px2 vom 2020-04-30",
        "url": "https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2"
      },
      {
        "category": "external",
        "summary": "GitHub Security Advisory GHSA-jpcq-cgw6-v4j6 vom 2020-04-30",
        "url": "https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6"
      },
      {
        "category": "external",
        "summary": "Drupal Security Advisory SA-CORE-2020-002 vom 2020-05-20",
        "url": "https://www.drupal.org/sa-core-2020-002"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-4693 vom 2020-05-27",
        "url": "https://www.debian.org/security/2020/dsa-4693"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:2217 vom 2020-05-28",
        "url": "https://access.redhat.com/errata/RHSA-2020:2217"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:2362 vom 2020-06-02",
        "url": "https://access.redhat.com/errata/RHSA-2020:2362"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:2813 vom 2020-07-02",
        "url": "https://access.redhat.com/errata/RHSA-2020:2813"
      },
      {
        "category": "external",
        "summary": "Palo Alto Networks Security Advisory PAN-SA-2020-0007 vom 2020-07-08",
        "url": "https://security.paloaltonetworks.com/PAN-SA-2020-0007"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:2412 vom 2020-07-13",
        "url": "https://access.redhat.com/errata/RHSA-2020:2412"
      },
      {
        "category": "external",
        "summary": "GENTOO Security Advisory GLSA-202007-03 vom 2020-07-27",
        "url": "https://security.gentoo.org/glsa/202007-03"
      },
      {
        "category": "external",
        "summary": "F5 Security Advisory K66544153 vom 2020-08-03",
        "url": "https://support.f5.com/csp/article/K66544153"
      },
      {
        "category": "external",
        "summary": "F5 Security Advisory K02453220 vom 2020-08-03",
        "url": "https://support.f5.com/csp/article/K02453220"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:3247 vom 2020-08-04",
        "url": "https://access.redhat.com/errata/RHSA-2020:3247"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:3369 vom 2020-08-06",
        "url": "https://access.redhat.com/errata/RHSA-2020:3369"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2020:2292-1 vom 2020-08-21",
        "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-August/007286.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2020:2292-1 vom 2020-08-21",
        "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-August/007287.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2020:2373-1 vom 2020-08-28",
        "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-August/007315.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2020:2373-1 vom 2020-08-28",
        "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-August/007314.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2020:2650-1 vom 2020-09-16",
        "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007435.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2020:2650-1 vom 2020-09-16",
        "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007436.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:3807 vom 2020-09-23",
        "url": "https://access.redhat.com/errata/RHSA-2020:3807"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:3936 vom 2020-09-29",
        "url": "https://access.redhat.com/errata/RHSA-2020:3936"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:4211 vom 2020-10-08",
        "url": "https://access.redhat.com/errata/RHSA-2020:4211"
      },
      {
        "category": "external",
        "summary": "OTRS Security Advisory OSA-2020-14 vom 2020-10-12",
        "url": "https://community.otrs.com/security-advisory-2020-14/"
      },
      {
        "category": "external",
        "summary": "HCL Article KB0084264 vom 2020-10-14",
        "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0084264"
      },
      {
        "category": "external",
        "summary": "Tenable Security Advisory",
        "url": "https://de.tenable.com/security/tns-2020-10"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:5412 vom 2020-12-15",
        "url": "https://access.redhat.com/errata/RHSA-2020:5412"
      },
      {
        "category": "external",
        "summary": "EMC Security Advisory DSA-2020-262 vom 2021-01-16",
        "url": "https://www.dell.com/support/kbdoc/en-us/000180924/dsa-2020-262-dell-emc-networker-security-update-for-multiple-vulnerabilities"
      },
      {
        "category": "external",
        "summary": "Tenable Security Advisory",
        "url": "https://de.tenable.com/security/tns-2021-02"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:0778 vom 2021-03-09",
        "url": "https://access.redhat.com/errata/RHSA-2021:0778"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:0860 vom 2021-03-16",
        "url": "https://access.redhat.com/errata/RHSA-2021:0860"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-0860 vom 2021-03-19",
        "url": "https://linux.oracle.com/errata/ELSA-2021-0860.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-2608 vom 2021-03-26",
        "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2021-1626 vom 2021-04-22",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2021-1626.html"
      },
      {
        "category": "external",
        "summary": "Brocade Security Advisory",
        "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2020-972"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:1846 vom 2021-05-18",
        "url": "https://access.redhat.com/errata/RHSA-2021:1846"
      },
      {
        "category": "external",
        "summary": "Brocade Security Advisory BSA-2020-973 vom 2021-05-20",
        "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2020-973"
      },
      {
        "category": "external",
        "summary": "HPE Security Bulletin",
        "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04175en_us"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-9400 vom 2021-08-09",
        "url": "https://linux.oracle.com/errata/ELSA-2021-9400.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:4142 vom 2021-11-09",
        "url": "https://access.redhat.com/errata/RHSA-2021:4142"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-9552 vom 2021-11-19",
        "url": "https://linux.oracle.com/errata/ELSA-2021-9552.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2022-9177 vom 2022-03-01",
        "url": "https://linux.oracle.com/errata/ELSA-2022-9177.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:6393 vom 2022-09-08",
        "url": "https://access.redhat.com/errata/RHSA-2022:6393"
      },
      {
        "category": "external",
        "summary": "SolarWinds Platform 2022.3 Release Notes",
        "url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2022-3_release_notes.htm"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 6852773 vom 2023-01-05",
        "url": "https://www.ibm.com/support/pages/node/6852773"
      },
      {
        "category": "external",
        "summary": "Tenable Security Advisory TNS-2023-09 vom 2023-03-02",
        "url": "https://www.tenable.com/security/tns-2023-09"
      },
      {
        "category": "external",
        "summary": "SolarWinds Platform 2023.3 Release Notes",
        "url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2023-3_release_notes.htm"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7060517 vom 2023-10-26",
        "url": "https://www.ibm.com/support/pages/node/7060517"
      },
      {
        "category": "external",
        "summary": "Moxa Security Advisory MPSA-230203 vom 2023-11-02",
        "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230203-pt-g503-series-multiple-vulnerabilities"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7160134 vom 2024-07-12",
        "url": "https://www.ibm.com/support/pages/node/7160134"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7178266 vom 2024-12-09",
        "url": "https://www.ibm.com/support/pages/node/7178266"
      },
      {
        "category": "external",
        "summary": "Juniper Security Advisory JSA92874 vom 2024-01-09",
        "url": "https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R2-release"
      },
      {
        "category": "external",
        "summary": "CISA Known Exploited Vulnerabilities Catalog vom 2025-01-23",
        "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7246-1 vom 2025-01-30",
        "url": "https://ubuntu.com/security/notices/USN-7246-1"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1070 vom 2025-02-05",
        "url": "https://access.redhat.com/errata/RHSA-2025:1070"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1185 vom 2025-02-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:1185"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1209 vom 2025-02-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:1209"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1210 vom 2025-02-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:1210"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1212 vom 2025-02-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:1212"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1211 vom 2025-02-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:1211"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1213 vom 2025-02-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:1213"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1214 vom 2025-02-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:1214"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1216 vom 2025-02-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:1216"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1217 vom 2025-02-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:1217"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1215 vom 2025-02-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:1215"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1249 vom 2025-02-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:1249"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-1210 vom 2025-02-11",
        "url": "https://linux.oracle.com/errata/ELSA-2025-1210.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1255 vom 2025-02-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:1255"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-1215 vom 2025-02-11",
        "url": "https://linux.oracle.com/errata/ELSA-2025-1215.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1247 vom 2025-02-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:1247"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1256 vom 2025-02-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:1256"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1304 vom 2025-02-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:1304"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1329 vom 2025-02-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:1329"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1346 vom 2025-02-12",
        "url": "https://access.redhat.com/errata/RHSA-2025:1346"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1300 vom 2025-02-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:1300"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1306 vom 2025-02-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:1306"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1338 vom 2025-02-12",
        "url": "https://access.redhat.com/errata/RHSA-2025:1338"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1308 vom 2025-02-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:1308"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1312 vom 2025-02-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:1312"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1303 vom 2025-02-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:1303"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1310 vom 2025-02-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:1310"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1305 vom 2025-02-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:1305"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1315 vom 2025-02-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:1315"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1314 vom 2025-02-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:1314"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1301 vom 2025-02-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:1301"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1309 vom 2025-02-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:1309"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1342 vom 2025-02-12",
        "url": "https://access.redhat.com/errata/RHSA-2025:1342"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1311 vom 2025-02-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:1311"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-1300 vom 2025-02-13",
        "url": "https://linux.oracle.com/errata/ELSA-2025-1300.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-1301 vom 2025-02-13",
        "url": "https://linux.oracle.com/errata/ELSA-2025-1301.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-1309 vom 2025-02-13",
        "url": "https://linux.oracle.com/errata/ELSA-2025-1309.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-1306 vom 2025-02-14",
        "url": "https://linux.oracle.com/errata/ELSA-2025-1306.html"
      },
      {
        "category": "external",
        "summary": "Rocky Linux Security Advisory RLSA-2025:1314 vom 2025-02-13",
        "url": "https://errata.build.resf.org/RLSA-2025:1314"
      },
      {
        "category": "external",
        "summary": "Rocky Linux Security Advisory RLSA-2025:1215 vom 2025-02-13",
        "url": "https://errata.build.resf.org/RLSA-2025:1215"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-1338 vom 2025-02-14",
        "url": "https://linux.oracle.com/errata/ELSA-2025-1338.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-1346 vom 2025-02-14",
        "url": "https://linux.oracle.com/errata/ELSA-2025-1346.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1515 vom 2025-02-17",
        "url": "https://access.redhat.com/errata/RHSA-2025:1515"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1514 vom 2025-02-17",
        "url": "https://access.redhat.com/errata/RHSA-2025:1514"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1601 vom 2025-02-17",
        "url": "https://access.redhat.com/errata/RHSA-2025:1601"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1580 vom 2025-02-17",
        "url": "https://access.redhat.com/errata/RHSA-2025:1580"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-1329 vom 2025-02-19",
        "url": "https://linux.oracle.com/errata/ELSA-2025-1329.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1983 vom 2025-03-05",
        "url": "https://access.redhat.com/errata/RHSA-2025:1983"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:2426 vom 2025-03-06",
        "url": "https://access.redhat.com/errata/RHSA-2025:2426"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1985 vom 2025-03-05",
        "url": "https://access.redhat.com/errata/RHSA-2025:1985"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7185353 vom 2025-03-11",
        "url": "https://www.ibm.com/support/pages/node/7185353"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-1601 vom 2025-03-13",
        "url": "https://linux.oracle.com/errata/ELSA-2025-1601.html"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin",
        "url": "https://www.ibm.com/support/pages/node/7228945"
      },
      {
        "category": "external",
        "summary": "Juniper Security Bulletin",
        "url": "https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R2-release?language=en_US"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:4005 vom 2025-04-17",
        "url": "https://access.redhat.com/errata/RHSA-2025:4005"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7231915 vom 2025-04-26",
        "url": "https://www.ibm.com/support/pages/node/7231915"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7233394 vom 2025-05-14",
        "url": "https://www.ibm.com/support/pages/node/7233394"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:8278 vom 2025-05-29",
        "url": "https://rhn.redhat.com/errata/RHSA-2025:8278.html"
      }
    ],
    "source_lang": "en-US",
    "title": "jQuery: Mehrere Schwachstellen erm\u00f6glichen Cross-Site Scripting",
    "tracking": {
      "current_release_date": "2025-05-29T22:00:00.000+00:00",
      "generator": {
        "date": "2025-05-30T09:12:17.730+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.12"
        }
      },
      "id": "WID-SEC-W-2022-1347",
      "initial_release_date": "2020-05-03T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2020-05-03T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2020-05-21T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Drupal aufgenommen"
        },
        {
          "date": "2020-05-24T22:00:00.000+00:00",
          "number": "3",
          "summary": "Referenz(en) aufgenommen: FEDORA-2020-11BE4B36D4"
        },
        {
          "date": "2020-05-26T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2020-05-27T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-06-02T22:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-06-07T22:00:00.000+00:00",
          "number": "7",
          "summary": "Referenz(en) aufgenommen: FEDORA-2020-36D2DB5F51"
        },
        {
          "date": "2020-07-02T22:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-07-08T22:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Informationen von Palo Alto Networks aufgenommen"
        },
        {
          "date": "2020-07-13T22:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-07-26T22:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von GENTOO aufgenommen"
        },
        {
          "date": "2020-08-03T22:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von F5 aufgenommen"
        },
        {
          "date": "2020-08-04T22:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-08-06T22:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-08-23T22:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2020-08-30T22:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2020-09-06T22:00:00.000+00:00",
          "number": "17",
          "summary": "Referenz(en) aufgenommen: FEDORA-2020-FBB94073A1"
        },
        {
          "date": "2020-09-16T22:00:00.000+00:00",
          "number": "18",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2020-09-23T22:00:00.000+00:00",
          "number": "19",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-09-29T22:00:00.000+00:00",
          "number": "20",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-10-07T22:00:00.000+00:00",
          "number": "21",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-10-11T22:00:00.000+00:00",
          "number": "22",
          "summary": "Neue Updates von OTRS aufgenommen"
        },
        {
          "date": "2020-10-14T22:00:00.000+00:00",
          "number": "23",
          "summary": "Neue Updates von HCL aufgenommen"
        },
        {
          "date": "2020-12-07T23:00:00.000+00:00",
          "number": "24",
          "summary": "Neue Updates von Tenable aufgenommen"
        },
        {
          "date": "2020-12-15T23:00:00.000+00:00",
          "number": "25",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-01-17T23:00:00.000+00:00",
          "number": "26",
          "summary": "Neue Updates von EMC aufgenommen"
        },
        {
          "date": "2021-02-17T23:00:00.000+00:00",
          "number": "27",
          "summary": "Neue Updates von Tenable aufgenommen"
        },
        {
          "date": "2021-03-09T23:00:00.000+00:00",
          "number": "28",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-03-16T23:00:00.000+00:00",
          "number": "29",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-03-18T23:00:00.000+00:00",
          "number": "30",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2021-03-25T23:00:00.000+00:00",
          "number": "31",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2021-04-21T22:00:00.000+00:00",
          "number": "32",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2021-05-16T22:00:00.000+00:00",
          "number": "33",
          "summary": "Neue Updates von BROCADE aufgenommen"
        },
        {
          "date": "2021-05-18T22:00:00.000+00:00",
          "number": "34",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-05-20T22:00:00.000+00:00",
          "number": "35",
          "summary": "Neue Updates von BROCADE aufgenommen"
        },
        {
          "date": "2021-07-18T22:00:00.000+00:00",
          "number": "36",
          "summary": "Neue Updates von HP aufgenommen"
        },
        {
          "date": "2021-08-09T22:00:00.000+00:00",
          "number": "37",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2021-11-09T23:00:00.000+00:00",
          "number": "38",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-11-18T23:00:00.000+00:00",
          "number": "39",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2022-02-28T23:00:00.000+00:00",
          "number": "40",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2022-09-08T22:00:00.000+00:00",
          "number": "41",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2022-09-28T22:00:00.000+00:00",
          "number": "42",
          "summary": "Neue Updates aufgenommen"
        },
        {
          "date": "2023-01-05T23:00:00.000+00:00",
          "number": "43",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2023-03-02T23:00:00.000+00:00",
          "number": "44",
          "summary": "Neue Updates von Tenable aufgenommen"
        },
        {
          "date": "2023-07-25T22:00:00.000+00:00",
          "number": "45",
          "summary": "Neue Updates aufgenommen"
        },
        {
          "date": "2023-10-26T22:00:00.000+00:00",
          "number": "46",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2023-11-02T23:00:00.000+00:00",
          "number": "47",
          "summary": "Neue Updates von moxa aufgenommen"
        },
        {
          "date": "2024-07-11T22:00:00.000+00:00",
          "number": "48",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2024-12-09T23:00:00.000+00:00",
          "number": "49",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2025-01-08T23:00:00.000+00:00",
          "number": "50",
          "summary": "Neue Updates von Juniper aufgenommen"
        },
        {
          "date": "2025-01-23T23:00:00.000+00:00",
          "number": "51",
          "summary": "CVE-2020-11023 wird ausgenutzt"
        },
        {
          "date": "2025-01-30T23:00:00.000+00:00",
          "number": "52",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-02-05T23:00:00.000+00:00",
          "number": "53",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-02-09T23:00:00.000+00:00",
          "number": "54",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-02-10T23:00:00.000+00:00",
          "number": "55",
          "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
        },
        {
          "date": "2025-02-11T23:00:00.000+00:00",
          "number": "56",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-02-12T23:00:00.000+00:00",
          "number": "57",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2025-02-13T23:00:00.000+00:00",
          "number": "58",
          "summary": "Neue Updates von Oracle Linux und Rocky Enterprise Software Foundation aufgenommen"
        },
        {
          "date": "2025-02-16T23:00:00.000+00:00",
          "number": "59",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-02-17T23:00:00.000+00:00",
          "number": "60",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-02-18T23:00:00.000+00:00",
          "number": "61",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2025-03-05T23:00:00.000+00:00",
          "number": "62",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-03-10T23:00:00.000+00:00",
          "number": "63",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2025-03-12T23:00:00.000+00:00",
          "number": "64",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2025-03-24T23:00:00.000+00:00",
          "number": "65",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2025-04-10T22:00:00.000+00:00",
          "number": "66",
          "summary": "Neue Updates aufgenommen"
        },
        {
          "date": "2025-04-21T22:00:00.000+00:00",
          "number": "67",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-04-27T22:00:00.000+00:00",
          "number": "68",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2025-05-14T22:00:00.000+00:00",
          "number": "69",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2025-05-29T22:00:00.000+00:00",
          "number": "70",
          "summary": "Neue Updates von Red Hat aufgenommen"
        }
      ],
      "status": "final",
      "version": "70"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Broadcom Brocade Switch",
            "product": {
              "name": "Broadcom Brocade Switch",
              "product_id": "T015844",
              "product_identification_helper": {
                "cpe": "cpe:/h:brocade:switch:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Broadcom"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Debian Linux",
            "product": {
              "name": "Debian Linux",
              "product_id": "2951",
              "product_identification_helper": {
                "cpe": "cpe:/o:debian:debian_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c19.4",
                "product": {
                  "name": "EMC NetWorker \u003c19.4",
                  "product_id": "T018107"
                }
              },
              {
                "category": "product_version",
                "name": "19.4",
                "product": {
                  "name": "EMC NetWorker 19.4",
                  "product_id": "T018107-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:emc:networker:19.4"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "NetWorker"
          }
        ],
        "category": "vendor",
        "name": "EMC"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "F5 BIG-IP",
            "product": {
              "name": "F5 BIG-IP",
              "product_id": "T001663",
              "product_identification_helper": {
                "cpe": "cpe:/a:f5:big-ip:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "F5"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Gentoo Linux",
            "product": {
              "name": "Gentoo Linux",
              "product_id": "T012167",
              "product_identification_helper": {
                "cpe": "cpe:/o:gentoo:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Gentoo"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "HCL BigFix",
            "product": {
              "name": "HCL BigFix",
              "product_id": "T017494",
              "product_identification_helper": {
                "cpe": "cpe:/a:hcltech:bigfix:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "HCL"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c9.0.1a",
                "product": {
                  "name": "HPE Fabric OS \u003c9.0.1a",
                  "product_id": "T019354"
                }
              },
              {
                "category": "product_version",
                "name": "9.0.1a",
                "product": {
                  "name": "HPE Fabric OS 9.0.1a",
                  "product_id": "T019354-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:hpe:fabric_os:v9.0.1a"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Fabric OS"
          },
          {
            "category": "product_name",
            "name": "HPE Switch",
            "product": {
              "name": "HPE Switch",
              "product_id": "T005119",
              "product_identification_helper": {
                "cpe": "cpe:/h:hp:switch:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "HPE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "IBM MQ",
            "product": {
              "name": "IBM MQ",
              "product_id": "T021398",
              "product_identification_helper": {
                "cpe": "cpe:/a:ibm:mq:-"
              }
            }
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "7.6.1.2",
                "product": {
                  "name": "IBM Maximo Asset Management 7.6.1.2",
                  "product_id": "812526",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:maximo_asset_management:7.6.1.2"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Maximo Asset Management"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c7.5.0 UP9",
                "product": {
                  "name": "IBM QRadar SIEM \u003c7.5.0 UP9",
                  "product_id": "T036127"
                }
              },
              {
                "category": "product_version",
                "name": "7.5.0 UP9",
                "product": {
                  "name": "IBM QRadar SIEM 7.5.0 UP9",
                  "product_id": "T036127-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up9"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.5.0 UP11 IF03",
                "product": {
                  "name": "IBM QRadar SIEM \u003c7.5.0 UP11 IF03",
                  "product_id": "T041724"
                }
              },
              {
                "category": "product_version",
                "name": "7.5.0 UP11 IF03",
                "product": {
                  "name": "IBM QRadar SIEM 7.5.0 UP11 IF03",
                  "product_id": "T041724-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11_if03"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.5.0 UP11 IF04",
                "product": {
                  "name": "IBM QRadar SIEM \u003c7.5.0 UP11 IF04",
                  "product_id": "T043169"
                }
              },
              {
                "category": "product_version",
                "name": "7.5.0 UP11 IF04",
                "product": {
                  "name": "IBM QRadar SIEM 7.5.0 UP11 IF04",
                  "product_id": "T043169-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11_if04"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.5.0 UP12",
                "product": {
                  "name": "IBM QRadar SIEM \u003c7.5.0 UP12",
                  "product_id": "T043784"
                }
              },
              {
                "category": "product_version",
                "name": "7.5.0 UP12",
                "product": {
                  "name": "IBM QRadar SIEM 7.5.0 UP12",
                  "product_id": "T043784-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up12"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "QRadar SIEM"
          },
          {
            "category": "product_name",
            "name": "IBM Storage Scale",
            "product": {
              "name": "IBM Storage Scale",
              "product_id": "T019402",
              "product_identification_helper": {
                "cpe": "cpe:/a:ibm:spectrum_scale:-"
              }
            }
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "IP Edition \u003c=4.2.0.15",
                "product": {
                  "name": "IBM Tivoli Network Manager IP Edition \u003c=4.2.0.15",
                  "product_id": "T025750"
                }
              },
              {
                "category": "product_version_range",
                "name": "IP Edition \u003c=4.2.0.15",
                "product": {
                  "name": "IBM Tivoli Network Manager IP Edition \u003c=4.2.0.15",
                  "product_id": "T025750-fixed"
                }
              }
            ],
            "category": "product_name",
            "name": "Tivoli Network Manager"
          }
        ],
        "category": "vendor",
        "name": "IBM"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c24.1R2",
                "product": {
                  "name": "Juniper Junos Space \u003c24.1R2",
                  "product_id": "T040074"
                }
              },
              {
                "category": "product_version",
                "name": "24.1R2",
                "product": {
                  "name": "Juniper Junos Space 24.1R2",
                  "product_id": "T040074-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:juniper:junos_space:24.1r2"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Junos Space"
          }
        ],
        "category": "vendor",
        "name": "Juniper"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cPT-G503 v5.3",
                "product": {
                  "name": "Moxa Switch \u003cPT-G503 v5.3",
                  "product_id": "T030907"
                }
              },
              {
                "category": "product_version",
                "name": "PT-G503 v5.3",
                "product": {
                  "name": "Moxa Switch PT-G503 v5.3",
                  "product_id": "T030907-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/h:moxa:switch:pt-g503_v5.3"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Switch"
          }
        ],
        "category": "vendor",
        "name": "Moxa"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c3.5.0",
                "product": {
                  "name": "Open Source jQuery \u003c3.5.0",
                  "product_id": "T016413"
                }
              },
              {
                "category": "product_version",
                "name": "3.5.0",
                "product": {
                  "name": "Open Source jQuery 3.5.0",
                  "product_id": "T016413-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:jquery:jquery:3.5.0"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "jQuery"
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "PaloAlto Networks PAN-OS",
            "product": {
              "name": "PaloAlto Networks PAN-OS",
              "product_id": "T012790",
              "product_identification_helper": {
                "cpe": "cpe:/o:paloaltonetworks:pan-os:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "PaloAlto Networks"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "RESF Rocky Linux",
            "product": {
              "name": "RESF Rocky Linux",
              "product_id": "T032255",
              "product_identification_helper": {
                "cpe": "cpe:/o:resf:rocky_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "RESF"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux",
                "product": {
                  "name": "Red Hat Enterprise Linux",
                  "product_id": "67646",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:-"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "Service Interconnect 1",
                "product": {
                  "name": "Red Hat Enterprise Linux Service Interconnect 1",
                  "product_id": "T028472",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:service_interconnect_1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "Discovery",
                "product": {
                  "name": "Red Hat Enterprise Linux Discovery",
                  "product_id": "T040951",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:discovery"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "Logging \u003c5.9.12",
                "product": {
                  "name": "Red Hat OpenShift Logging \u003c5.9.12",
                  "product_id": "T041594"
                }
              },
              {
                "category": "product_version",
                "name": "Logging 5.9.12",
                "product": {
                  "name": "Red Hat OpenShift Logging 5.9.12",
                  "product_id": "T041594-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:logging__5.9.12"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Logging \u003c5.8.18",
                "product": {
                  "name": "Red Hat OpenShift Logging \u003c5.8.18",
                  "product_id": "T041595"
                }
              },
              {
                "category": "product_version",
                "name": "Logging 5.8.18",
                "product": {
                  "name": "Red Hat OpenShift Logging 5.8.18",
                  "product_id": "T041595-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:logging__5.8.18"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "OpenShift"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "16.2",
                "product": {
                  "name": "Red Hat OpenStack 16.2",
                  "product_id": "T023999",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openstack:16.2"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "OpenStack"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SolarWinds Orion",
            "product": {
              "name": "SolarWinds Orion",
              "product_id": "T024734",
              "product_identification_helper": {
                "cpe": "cpe:/a:solarwinds:orion_core_services:-"
              }
            }
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c2023.3",
                "product": {
                  "name": "SolarWinds Platform \u003c2023.3",
                  "product_id": "T028897"
                }
              },
              {
                "category": "product_version",
                "name": "2023.3",
                "product": {
                  "name": "SolarWinds Platform 2023.3",
                  "product_id": "T028897-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:solarwinds:orion_platform:2023.3"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Platform"
          }
        ],
        "category": "vendor",
        "name": "SolarWinds"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Tenable Security Nessus",
                "product": {
                  "name": "Tenable Security Nessus",
                  "product_id": "T016399",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:tenable:nessus:-"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c10.5.0",
                "product": {
                  "name": "Tenable Security Nessus \u003c10.5.0",
                  "product_id": "T026604"
                }
              },
              {
                "category": "product_version",
                "name": "10.5.0",
                "product": {
                  "name": "Tenable Security Nessus 10.5.0",
                  "product_id": "T026604-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:tenable:nessus:10.5.0"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Nessus"
          },
          {
            "category": "product_name",
            "name": "Tenable Security Nessus Network Monitor",
            "product": {
              "name": "Tenable Security Nessus Network Monitor",
              "product_id": "T016632",
              "product_identification_helper": {
                "cpe": "cpe:/a:tenable:nessus_network_monitor:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Tenable Security"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-11022",
      "product_status": {
        "known_affected": [
          "67646",
          "T015844",
          "T016413",
          "T016632",
          "T036127",
          "T004914",
          "T016399",
          "T017494",
          "T012790",
          "T019354",
          "T023999",
          "T043784",
          "T043169",
          "T040074",
          "T026604",
          "T018107",
          "T001663",
          "812526",
          "398363",
          "T040951",
          "T021398",
          "T028472",
          "T041724",
          "T005119",
          "T012167",
          "T032255",
          "T041594",
          "T019402",
          "2951",
          "T002207",
          "T000126",
          "T024734",
          "T028897",
          "T030907",
          "T041595"
        ],
        "last_affected": [
          "T025750"
        ]
      },
      "release_date": "2020-05-03T22:00:00.000+00:00",
      "title": "CVE-2020-11022"
    },
    {
      "cve": "CVE-2020-11023",
      "product_status": {
        "known_affected": [
          "67646",
          "T015844",
          "T016413",
          "T016632",
          "T036127",
          "T004914",
          "T016399",
          "T017494",
          "T012790",
          "T019354",
          "T023999",
          "T043784",
          "T043169",
          "T040074",
          "T026604",
          "T018107",
          "T001663",
          "812526",
          "398363",
          "T040951",
          "T021398",
          "T028472",
          "T041724",
          "T005119",
          "T012167",
          "T032255",
          "T041594",
          "T019402",
          "2951",
          "T002207",
          "T000126",
          "T024734",
          "T028897",
          "T030907",
          "T041595"
        ],
        "last_affected": [
          "T025750"
        ]
      },
      "release_date": "2020-05-03T22:00:00.000+00:00",
      "title": "CVE-2020-11023"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…