WID-SEC-W-2022-1347
Vulnerability from csaf_certbund - Published: 2020-05-03 22:00 - Updated: 2025-05-29 22:00Summary
jQuery: Mehrere Schwachstellen ermöglichen Cross-Site Scripting
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
jQuery ist eine freie JavaScript-Bibliothek, die Funktionen zur DOM-Navigation und -Manipulation zur Verfügung stellt.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in jQuery ausnutzen, um einen Cross-Site Scripting Angriff durchzuführen.
Betroffene Betriebssysteme
- BIOS/Firmware
- F5 Networks
- Hardware Appliance
- Juniper Appliance
- Linux
- MacOS X
- Sonstiges
- UNIX
- Windows
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "jQuery ist eine freie JavaScript-Bibliothek, die Funktionen zur DOM-Navigation und -Manipulation zur Verf\u00fcgung stellt.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in jQuery ausnutzen, um einen Cross-Site Scripting Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- BIOS/Firmware\n- F5 Networks\n- Hardware Appliance\n- Juniper Appliance\n- Linux\n- MacOS X\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-1347 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2020/wid-sec-w-2022-1347.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-1347 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1347"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-gxr4-xjj5-5px2 vom 2020-04-30",
"url": "https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-jpcq-cgw6-v4j6 vom 2020-04-30",
"url": "https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6"
},
{
"category": "external",
"summary": "Drupal Security Advisory SA-CORE-2020-002 vom 2020-05-20",
"url": "https://www.drupal.org/sa-core-2020-002"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4693 vom 2020-05-27",
"url": "https://www.debian.org/security/2020/dsa-4693"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:2217 vom 2020-05-28",
"url": "https://access.redhat.com/errata/RHSA-2020:2217"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:2362 vom 2020-06-02",
"url": "https://access.redhat.com/errata/RHSA-2020:2362"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:2813 vom 2020-07-02",
"url": "https://access.redhat.com/errata/RHSA-2020:2813"
},
{
"category": "external",
"summary": "Palo Alto Networks Security Advisory PAN-SA-2020-0007 vom 2020-07-08",
"url": "https://security.paloaltonetworks.com/PAN-SA-2020-0007"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:2412 vom 2020-07-13",
"url": "https://access.redhat.com/errata/RHSA-2020:2412"
},
{
"category": "external",
"summary": "GENTOO Security Advisory GLSA-202007-03 vom 2020-07-27",
"url": "https://security.gentoo.org/glsa/202007-03"
},
{
"category": "external",
"summary": "F5 Security Advisory K66544153 vom 2020-08-03",
"url": "https://support.f5.com/csp/article/K66544153"
},
{
"category": "external",
"summary": "F5 Security Advisory K02453220 vom 2020-08-03",
"url": "https://support.f5.com/csp/article/K02453220"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:3247 vom 2020-08-04",
"url": "https://access.redhat.com/errata/RHSA-2020:3247"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:3369 vom 2020-08-06",
"url": "https://access.redhat.com/errata/RHSA-2020:3369"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2292-1 vom 2020-08-21",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-August/007286.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2292-1 vom 2020-08-21",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-August/007287.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2373-1 vom 2020-08-28",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-August/007315.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2373-1 vom 2020-08-28",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-August/007314.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2650-1 vom 2020-09-16",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007435.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2650-1 vom 2020-09-16",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007436.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:3807 vom 2020-09-23",
"url": "https://access.redhat.com/errata/RHSA-2020:3807"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:3936 vom 2020-09-29",
"url": "https://access.redhat.com/errata/RHSA-2020:3936"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:4211 vom 2020-10-08",
"url": "https://access.redhat.com/errata/RHSA-2020:4211"
},
{
"category": "external",
"summary": "OTRS Security Advisory OSA-2020-14 vom 2020-10-12",
"url": "https://community.otrs.com/security-advisory-2020-14/"
},
{
"category": "external",
"summary": "HCL Article KB0084264 vom 2020-10-14",
"url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0084264"
},
{
"category": "external",
"summary": "Tenable Security Advisory",
"url": "https://de.tenable.com/security/tns-2020-10"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:5412 vom 2020-12-15",
"url": "https://access.redhat.com/errata/RHSA-2020:5412"
},
{
"category": "external",
"summary": "EMC Security Advisory DSA-2020-262 vom 2021-01-16",
"url": "https://www.dell.com/support/kbdoc/en-us/000180924/dsa-2020-262-dell-emc-networker-security-update-for-multiple-vulnerabilities"
},
{
"category": "external",
"summary": "Tenable Security Advisory",
"url": "https://de.tenable.com/security/tns-2021-02"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:0778 vom 2021-03-09",
"url": "https://access.redhat.com/errata/RHSA-2021:0778"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:0860 vom 2021-03-16",
"url": "https://access.redhat.com/errata/RHSA-2021:0860"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-0860 vom 2021-03-19",
"url": "https://linux.oracle.com/errata/ELSA-2021-0860.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-2608 vom 2021-03-26",
"url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2021-1626 vom 2021-04-22",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2021-1626.html"
},
{
"category": "external",
"summary": "Brocade Security Advisory",
"url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2020-972"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:1846 vom 2021-05-18",
"url": "https://access.redhat.com/errata/RHSA-2021:1846"
},
{
"category": "external",
"summary": "Brocade Security Advisory BSA-2020-973 vom 2021-05-20",
"url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2020-973"
},
{
"category": "external",
"summary": "HPE Security Bulletin",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04175en_us"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-9400 vom 2021-08-09",
"url": "https://linux.oracle.com/errata/ELSA-2021-9400.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:4142 vom 2021-11-09",
"url": "https://access.redhat.com/errata/RHSA-2021:4142"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-9552 vom 2021-11-19",
"url": "https://linux.oracle.com/errata/ELSA-2021-9552.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2022-9177 vom 2022-03-01",
"url": "https://linux.oracle.com/errata/ELSA-2022-9177.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:6393 vom 2022-09-08",
"url": "https://access.redhat.com/errata/RHSA-2022:6393"
},
{
"category": "external",
"summary": "SolarWinds Platform 2022.3 Release Notes",
"url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2022-3_release_notes.htm"
},
{
"category": "external",
"summary": "IBM Security Bulletin 6852773 vom 2023-01-05",
"url": "https://www.ibm.com/support/pages/node/6852773"
},
{
"category": "external",
"summary": "Tenable Security Advisory TNS-2023-09 vom 2023-03-02",
"url": "https://www.tenable.com/security/tns-2023-09"
},
{
"category": "external",
"summary": "SolarWinds Platform 2023.3 Release Notes",
"url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2023-3_release_notes.htm"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7060517 vom 2023-10-26",
"url": "https://www.ibm.com/support/pages/node/7060517"
},
{
"category": "external",
"summary": "Moxa Security Advisory MPSA-230203 vom 2023-11-02",
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230203-pt-g503-series-multiple-vulnerabilities"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7160134 vom 2024-07-12",
"url": "https://www.ibm.com/support/pages/node/7160134"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7178266 vom 2024-12-09",
"url": "https://www.ibm.com/support/pages/node/7178266"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA92874 vom 2024-01-09",
"url": "https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R2-release"
},
{
"category": "external",
"summary": "CISA Known Exploited Vulnerabilities Catalog vom 2025-01-23",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7246-1 vom 2025-01-30",
"url": "https://ubuntu.com/security/notices/USN-7246-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1070 vom 2025-02-05",
"url": "https://access.redhat.com/errata/RHSA-2025:1070"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1185 vom 2025-02-10",
"url": "https://access.redhat.com/errata/RHSA-2025:1185"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1209 vom 2025-02-10",
"url": "https://access.redhat.com/errata/RHSA-2025:1209"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1210 vom 2025-02-10",
"url": "https://access.redhat.com/errata/RHSA-2025:1210"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1212 vom 2025-02-10",
"url": "https://access.redhat.com/errata/RHSA-2025:1212"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1211 vom 2025-02-10",
"url": "https://access.redhat.com/errata/RHSA-2025:1211"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1213 vom 2025-02-10",
"url": "https://access.redhat.com/errata/RHSA-2025:1213"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1214 vom 2025-02-10",
"url": "https://access.redhat.com/errata/RHSA-2025:1214"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1216 vom 2025-02-10",
"url": "https://access.redhat.com/errata/RHSA-2025:1216"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1217 vom 2025-02-10",
"url": "https://access.redhat.com/errata/RHSA-2025:1217"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1215 vom 2025-02-10",
"url": "https://access.redhat.com/errata/RHSA-2025:1215"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1249 vom 2025-02-10",
"url": "https://access.redhat.com/errata/RHSA-2025:1249"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1210 vom 2025-02-11",
"url": "https://linux.oracle.com/errata/ELSA-2025-1210.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1255 vom 2025-02-10",
"url": "https://access.redhat.com/errata/RHSA-2025:1255"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1215 vom 2025-02-11",
"url": "https://linux.oracle.com/errata/ELSA-2025-1215.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1247 vom 2025-02-10",
"url": "https://access.redhat.com/errata/RHSA-2025:1247"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1256 vom 2025-02-10",
"url": "https://access.redhat.com/errata/RHSA-2025:1256"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1304 vom 2025-02-11",
"url": "https://access.redhat.com/errata/RHSA-2025:1304"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1329 vom 2025-02-11",
"url": "https://access.redhat.com/errata/RHSA-2025:1329"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1346 vom 2025-02-12",
"url": "https://access.redhat.com/errata/RHSA-2025:1346"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1300 vom 2025-02-11",
"url": "https://access.redhat.com/errata/RHSA-2025:1300"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1306 vom 2025-02-11",
"url": "https://access.redhat.com/errata/RHSA-2025:1306"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1338 vom 2025-02-12",
"url": "https://access.redhat.com/errata/RHSA-2025:1338"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1308 vom 2025-02-11",
"url": "https://access.redhat.com/errata/RHSA-2025:1308"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1312 vom 2025-02-11",
"url": "https://access.redhat.com/errata/RHSA-2025:1312"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1303 vom 2025-02-11",
"url": "https://access.redhat.com/errata/RHSA-2025:1303"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1310 vom 2025-02-11",
"url": "https://access.redhat.com/errata/RHSA-2025:1310"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1305 vom 2025-02-11",
"url": "https://access.redhat.com/errata/RHSA-2025:1305"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1315 vom 2025-02-11",
"url": "https://access.redhat.com/errata/RHSA-2025:1315"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1314 vom 2025-02-11",
"url": "https://access.redhat.com/errata/RHSA-2025:1314"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1301 vom 2025-02-11",
"url": "https://access.redhat.com/errata/RHSA-2025:1301"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1309 vom 2025-02-11",
"url": "https://access.redhat.com/errata/RHSA-2025:1309"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1342 vom 2025-02-12",
"url": "https://access.redhat.com/errata/RHSA-2025:1342"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1311 vom 2025-02-11",
"url": "https://access.redhat.com/errata/RHSA-2025:1311"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1300 vom 2025-02-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-1300.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1301 vom 2025-02-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-1301.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1309 vom 2025-02-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-1309.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1306 vom 2025-02-14",
"url": "https://linux.oracle.com/errata/ELSA-2025-1306.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:1314 vom 2025-02-13",
"url": "https://errata.build.resf.org/RLSA-2025:1314"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:1215 vom 2025-02-13",
"url": "https://errata.build.resf.org/RLSA-2025:1215"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1338 vom 2025-02-14",
"url": "https://linux.oracle.com/errata/ELSA-2025-1338.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1346 vom 2025-02-14",
"url": "https://linux.oracle.com/errata/ELSA-2025-1346.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1515 vom 2025-02-17",
"url": "https://access.redhat.com/errata/RHSA-2025:1515"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1514 vom 2025-02-17",
"url": "https://access.redhat.com/errata/RHSA-2025:1514"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1601 vom 2025-02-17",
"url": "https://access.redhat.com/errata/RHSA-2025:1601"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1580 vom 2025-02-17",
"url": "https://access.redhat.com/errata/RHSA-2025:1580"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1329 vom 2025-02-19",
"url": "https://linux.oracle.com/errata/ELSA-2025-1329.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1983 vom 2025-03-05",
"url": "https://access.redhat.com/errata/RHSA-2025:1983"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2426 vom 2025-03-06",
"url": "https://access.redhat.com/errata/RHSA-2025:2426"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1985 vom 2025-03-05",
"url": "https://access.redhat.com/errata/RHSA-2025:1985"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7185353 vom 2025-03-11",
"url": "https://www.ibm.com/support/pages/node/7185353"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1601 vom 2025-03-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-1601.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin",
"url": "https://www.ibm.com/support/pages/node/7228945"
},
{
"category": "external",
"summary": "Juniper Security Bulletin",
"url": "https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R2-release?language=en_US"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:4005 vom 2025-04-17",
"url": "https://access.redhat.com/errata/RHSA-2025:4005"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7231915 vom 2025-04-26",
"url": "https://www.ibm.com/support/pages/node/7231915"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7233394 vom 2025-05-14",
"url": "https://www.ibm.com/support/pages/node/7233394"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:8278 vom 2025-05-29",
"url": "https://rhn.redhat.com/errata/RHSA-2025:8278.html"
}
],
"source_lang": "en-US",
"title": "jQuery: Mehrere Schwachstellen erm\u00f6glichen Cross-Site Scripting",
"tracking": {
"current_release_date": "2025-05-29T22:00:00.000+00:00",
"generator": {
"date": "2025-05-30T09:12:17.730+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2022-1347",
"initial_release_date": "2020-05-03T22:00:00.000+00:00",
"revision_history": [
{
"date": "2020-05-03T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2020-05-21T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Drupal aufgenommen"
},
{
"date": "2020-05-24T22:00:00.000+00:00",
"number": "3",
"summary": "Referenz(en) aufgenommen: FEDORA-2020-11BE4B36D4"
},
{
"date": "2020-05-26T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2020-05-27T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-06-02T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-06-07T22:00:00.000+00:00",
"number": "7",
"summary": "Referenz(en) aufgenommen: FEDORA-2020-36D2DB5F51"
},
{
"date": "2020-07-02T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-07-08T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Informationen von Palo Alto Networks aufgenommen"
},
{
"date": "2020-07-13T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-07-26T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von GENTOO aufgenommen"
},
{
"date": "2020-08-03T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von F5 aufgenommen"
},
{
"date": "2020-08-04T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-08-06T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-08-23T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-08-30T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-09-06T22:00:00.000+00:00",
"number": "17",
"summary": "Referenz(en) aufgenommen: FEDORA-2020-FBB94073A1"
},
{
"date": "2020-09-16T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-09-23T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-09-29T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-10-07T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-10-11T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von OTRS aufgenommen"
},
{
"date": "2020-10-14T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von HCL aufgenommen"
},
{
"date": "2020-12-07T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Tenable aufgenommen"
},
{
"date": "2020-12-15T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-01-17T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von EMC aufgenommen"
},
{
"date": "2021-02-17T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Tenable aufgenommen"
},
{
"date": "2021-03-09T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-03-16T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-03-18T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2021-03-25T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2021-04-21T22:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2021-05-16T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von BROCADE aufgenommen"
},
{
"date": "2021-05-18T22:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-05-20T22:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von BROCADE aufgenommen"
},
{
"date": "2021-07-18T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2021-08-09T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2021-11-09T23:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-11-18T23:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2022-02-28T23:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2022-09-08T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-09-28T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2023-01-05T23:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2023-03-02T23:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von Tenable aufgenommen"
},
{
"date": "2023-07-25T22:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2023-10-26T22:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2023-11-02T23:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von moxa aufgenommen"
},
{
"date": "2024-07-11T22:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-12-09T23:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-01-08T23:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von Juniper aufgenommen"
},
{
"date": "2025-01-23T23:00:00.000+00:00",
"number": "51",
"summary": "CVE-2020-11023 wird ausgenutzt"
},
{
"date": "2025-01-30T23:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-02-05T23:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-02-09T23:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-02-10T23:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2025-02-11T23:00:00.000+00:00",
"number": "56",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-02-12T23:00:00.000+00:00",
"number": "57",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-02-13T23:00:00.000+00:00",
"number": "58",
"summary": "Neue Updates von Oracle Linux und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-02-16T23:00:00.000+00:00",
"number": "59",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-02-17T23:00:00.000+00:00",
"number": "60",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-02-18T23:00:00.000+00:00",
"number": "61",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-03-05T23:00:00.000+00:00",
"number": "62",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-03-10T23:00:00.000+00:00",
"number": "63",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-03-12T23:00:00.000+00:00",
"number": "64",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-03-24T23:00:00.000+00:00",
"number": "65",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-04-10T22:00:00.000+00:00",
"number": "66",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-04-21T22:00:00.000+00:00",
"number": "67",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-04-27T22:00:00.000+00:00",
"number": "68",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-05-14T22:00:00.000+00:00",
"number": "69",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-05-29T22:00:00.000+00:00",
"number": "70",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "70"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Broadcom Brocade Switch",
"product": {
"name": "Broadcom Brocade Switch",
"product_id": "T015844",
"product_identification_helper": {
"cpe": "cpe:/h:brocade:switch:-"
}
}
}
],
"category": "vendor",
"name": "Broadcom"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c19.4",
"product": {
"name": "EMC NetWorker \u003c19.4",
"product_id": "T018107"
}
},
{
"category": "product_version",
"name": "19.4",
"product": {
"name": "EMC NetWorker 19.4",
"product_id": "T018107-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:emc:networker:19.4"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
}
],
"category": "vendor",
"name": "EMC"
},
{
"branches": [
{
"category": "product_name",
"name": "F5 BIG-IP",
"product": {
"name": "F5 BIG-IP",
"product_id": "T001663",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:-"
}
}
}
],
"category": "vendor",
"name": "F5"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"category": "product_name",
"name": "HCL BigFix",
"product": {
"name": "HCL BigFix",
"product_id": "T017494",
"product_identification_helper": {
"cpe": "cpe:/a:hcltech:bigfix:-"
}
}
}
],
"category": "vendor",
"name": "HCL"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c9.0.1a",
"product": {
"name": "HPE Fabric OS \u003c9.0.1a",
"product_id": "T019354"
}
},
{
"category": "product_version",
"name": "9.0.1a",
"product": {
"name": "HPE Fabric OS 9.0.1a",
"product_id": "T019354-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:hpe:fabric_os:v9.0.1a"
}
}
}
],
"category": "product_name",
"name": "Fabric OS"
},
{
"category": "product_name",
"name": "HPE Switch",
"product": {
"name": "HPE Switch",
"product_id": "T005119",
"product_identification_helper": {
"cpe": "cpe:/h:hp:switch:-"
}
}
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"category": "product_name",
"name": "IBM MQ",
"product": {
"name": "IBM MQ",
"product_id": "T021398",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:mq:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "7.6.1.2",
"product": {
"name": "IBM Maximo Asset Management 7.6.1.2",
"product_id": "812526",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:maximo_asset_management:7.6.1.2"
}
}
}
],
"category": "product_name",
"name": "Maximo Asset Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP9",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP9",
"product_id": "T036127"
}
},
{
"category": "product_version",
"name": "7.5.0 UP9",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP9",
"product_id": "T036127-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up9"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP11 IF03",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP11 IF03",
"product_id": "T041724"
}
},
{
"category": "product_version",
"name": "7.5.0 UP11 IF03",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP11 IF03",
"product_id": "T041724-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11_if03"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP11 IF04",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP11 IF04",
"product_id": "T043169"
}
},
{
"category": "product_version",
"name": "7.5.0 UP11 IF04",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP11 IF04",
"product_id": "T043169-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11_if04"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP12",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP12",
"product_id": "T043784"
}
},
{
"category": "product_version",
"name": "7.5.0 UP12",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP12",
"product_id": "T043784-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up12"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
},
{
"category": "product_name",
"name": "IBM Storage Scale",
"product": {
"name": "IBM Storage Scale",
"product_id": "T019402",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_scale:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "IP Edition \u003c=4.2.0.15",
"product": {
"name": "IBM Tivoli Network Manager IP Edition \u003c=4.2.0.15",
"product_id": "T025750"
}
},
{
"category": "product_version_range",
"name": "IP Edition \u003c=4.2.0.15",
"product": {
"name": "IBM Tivoli Network Manager IP Edition \u003c=4.2.0.15",
"product_id": "T025750-fixed"
}
}
],
"category": "product_name",
"name": "Tivoli Network Manager"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c24.1R2",
"product": {
"name": "Juniper Junos Space \u003c24.1R2",
"product_id": "T040074"
}
},
{
"category": "product_version",
"name": "24.1R2",
"product": {
"name": "Juniper Junos Space 24.1R2",
"product_id": "T040074-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:junos_space:24.1r2"
}
}
}
],
"category": "product_name",
"name": "Junos Space"
}
],
"category": "vendor",
"name": "Juniper"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cPT-G503 v5.3",
"product": {
"name": "Moxa Switch \u003cPT-G503 v5.3",
"product_id": "T030907"
}
},
{
"category": "product_version",
"name": "PT-G503 v5.3",
"product": {
"name": "Moxa Switch PT-G503 v5.3",
"product_id": "T030907-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:moxa:switch:pt-g503_v5.3"
}
}
}
],
"category": "product_name",
"name": "Switch"
}
],
"category": "vendor",
"name": "Moxa"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c3.5.0",
"product": {
"name": "Open Source jQuery \u003c3.5.0",
"product_id": "T016413"
}
},
{
"category": "product_version",
"name": "3.5.0",
"product": {
"name": "Open Source jQuery 3.5.0",
"product_id": "T016413-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:jquery:jquery:3.5.0"
}
}
}
],
"category": "product_name",
"name": "jQuery"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "PaloAlto Networks PAN-OS",
"product": {
"name": "PaloAlto Networks PAN-OS",
"product_id": "T012790",
"product_identification_helper": {
"cpe": "cpe:/o:paloaltonetworks:pan-os:-"
}
}
}
],
"category": "vendor",
"name": "PaloAlto Networks"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version",
"name": "Service Interconnect 1",
"product": {
"name": "Red Hat Enterprise Linux Service Interconnect 1",
"product_id": "T028472",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:service_interconnect_1"
}
}
},
{
"category": "product_version",
"name": "Discovery",
"product": {
"name": "Red Hat Enterprise Linux Discovery",
"product_id": "T040951",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:discovery"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Logging \u003c5.9.12",
"product": {
"name": "Red Hat OpenShift Logging \u003c5.9.12",
"product_id": "T041594"
}
},
{
"category": "product_version",
"name": "Logging 5.9.12",
"product": {
"name": "Red Hat OpenShift Logging 5.9.12",
"product_id": "T041594-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:logging__5.9.12"
}
}
},
{
"category": "product_version_range",
"name": "Logging \u003c5.8.18",
"product": {
"name": "Red Hat OpenShift Logging \u003c5.8.18",
"product_id": "T041595"
}
},
{
"category": "product_version",
"name": "Logging 5.8.18",
"product": {
"name": "Red Hat OpenShift Logging 5.8.18",
"product_id": "T041595-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:logging__5.8.18"
}
}
}
],
"category": "product_name",
"name": "OpenShift"
},
{
"branches": [
{
"category": "product_version",
"name": "16.2",
"product": {
"name": "Red Hat OpenStack 16.2",
"product_id": "T023999",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:16.2"
}
}
}
],
"category": "product_name",
"name": "OpenStack"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "SolarWinds Orion",
"product": {
"name": "SolarWinds Orion",
"product_id": "T024734",
"product_identification_helper": {
"cpe": "cpe:/a:solarwinds:orion_core_services:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2023.3",
"product": {
"name": "SolarWinds Platform \u003c2023.3",
"product_id": "T028897"
}
},
{
"category": "product_version",
"name": "2023.3",
"product": {
"name": "SolarWinds Platform 2023.3",
"product_id": "T028897-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:solarwinds:orion_platform:2023.3"
}
}
}
],
"category": "product_name",
"name": "Platform"
}
],
"category": "vendor",
"name": "SolarWinds"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Tenable Security Nessus",
"product": {
"name": "Tenable Security Nessus",
"product_id": "T016399",
"product_identification_helper": {
"cpe": "cpe:/a:tenable:nessus:-"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.5.0",
"product": {
"name": "Tenable Security Nessus \u003c10.5.0",
"product_id": "T026604"
}
},
{
"category": "product_version",
"name": "10.5.0",
"product": {
"name": "Tenable Security Nessus 10.5.0",
"product_id": "T026604-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:tenable:nessus:10.5.0"
}
}
}
],
"category": "product_name",
"name": "Nessus"
},
{
"category": "product_name",
"name": "Tenable Security Nessus Network Monitor",
"product": {
"name": "Tenable Security Nessus Network Monitor",
"product_id": "T016632",
"product_identification_helper": {
"cpe": "cpe:/a:tenable:nessus_network_monitor:-"
}
}
}
],
"category": "vendor",
"name": "Tenable Security"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-11022",
"product_status": {
"known_affected": [
"67646",
"T015844",
"T016413",
"T016632",
"T036127",
"T004914",
"T016399",
"T017494",
"T012790",
"T019354",
"T023999",
"T043784",
"T043169",
"T040074",
"T026604",
"T018107",
"T001663",
"812526",
"398363",
"T040951",
"T021398",
"T028472",
"T041724",
"T005119",
"T012167",
"T032255",
"T041594",
"T019402",
"2951",
"T002207",
"T000126",
"T024734",
"T028897",
"T030907",
"T041595"
],
"last_affected": [
"T025750"
]
},
"release_date": "2020-05-03T22:00:00.000+00:00",
"title": "CVE-2020-11022"
},
{
"cve": "CVE-2020-11023",
"product_status": {
"known_affected": [
"67646",
"T015844",
"T016413",
"T016632",
"T036127",
"T004914",
"T016399",
"T017494",
"T012790",
"T019354",
"T023999",
"T043784",
"T043169",
"T040074",
"T026604",
"T018107",
"T001663",
"812526",
"398363",
"T040951",
"T021398",
"T028472",
"T041724",
"T005119",
"T012167",
"T032255",
"T041594",
"T019402",
"2951",
"T002207",
"T000126",
"T024734",
"T028897",
"T030907",
"T041595"
],
"last_affected": [
"T025750"
]
},
"release_date": "2020-05-03T22:00:00.000+00:00",
"title": "CVE-2020-11023"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…