wid-sec-w-2022-1347
Vulnerability from csaf_certbund
Published
2020-05-03 22:00
Modified
2025-07-21 22:00
Summary
jQuery: Mehrere Schwachstellen ermöglichen Cross-Site Scripting

Notes

Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
jQuery ist eine freie JavaScript-Bibliothek, die Funktionen zur DOM-Navigation und -Manipulation zur Verfügung stellt.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in jQuery ausnutzen, um einen Cross-Site Scripting Angriff durchzuführen.
Betroffene Betriebssysteme
- BIOS/Firmware - F5 Networks - Hardware Appliance - Juniper Appliance - Linux - MacOS X - Sonstiges - UNIX - Windows



{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "jQuery ist eine freie JavaScript-Bibliothek, die Funktionen zur DOM-Navigation und -Manipulation zur Verf\u00fcgung stellt.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in jQuery ausnutzen, um einen Cross-Site Scripting Angriff durchzuf\u00fchren.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- BIOS/Firmware\n- F5 Networks\n- Hardware Appliance\n- Juniper Appliance\n- Linux\n- MacOS X\n- Sonstiges\n- UNIX\n- Windows",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2022-1347 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2020/wid-sec-w-2022-1347.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2022-1347 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1347"
      },
      {
        "category": "external",
        "summary": "GitHub Security Advisory GHSA-gxr4-xjj5-5px2 vom 2020-04-30",
        "url": "https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2"
      },
      {
        "category": "external",
        "summary": "GitHub Security Advisory GHSA-jpcq-cgw6-v4j6 vom 2020-04-30",
        "url": "https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6"
      },
      {
        "category": "external",
        "summary": "Drupal Security Advisory SA-CORE-2020-002 vom 2020-05-20",
        "url": "https://www.drupal.org/sa-core-2020-002"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-4693 vom 2020-05-27",
        "url": "https://www.debian.org/security/2020/dsa-4693"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:2217 vom 2020-05-28",
        "url": "https://access.redhat.com/errata/RHSA-2020:2217"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:2362 vom 2020-06-02",
        "url": "https://access.redhat.com/errata/RHSA-2020:2362"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:2813 vom 2020-07-02",
        "url": "https://access.redhat.com/errata/RHSA-2020:2813"
      },
      {
        "category": "external",
        "summary": "Palo Alto Networks Security Advisory PAN-SA-2020-0007 vom 2020-07-08",
        "url": "https://security.paloaltonetworks.com/PAN-SA-2020-0007"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:2412 vom 2020-07-13",
        "url": "https://access.redhat.com/errata/RHSA-2020:2412"
      },
      {
        "category": "external",
        "summary": "GENTOO Security Advisory GLSA-202007-03 vom 2020-07-27",
        "url": "https://security.gentoo.org/glsa/202007-03"
      },
      {
        "category": "external",
        "summary": "F5 Security Advisory K66544153 vom 2020-08-03",
        "url": "https://support.f5.com/csp/article/K66544153"
      },
      {
        "category": "external",
        "summary": "F5 Security Advisory K02453220 vom 2020-08-03",
        "url": "https://support.f5.com/csp/article/K02453220"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:3247 vom 2020-08-04",
        "url": "https://access.redhat.com/errata/RHSA-2020:3247"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:3369 vom 2020-08-06",
        "url": "https://access.redhat.com/errata/RHSA-2020:3369"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2020:2292-1 vom 2020-08-21",
        "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-August/007286.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2020:2292-1 vom 2020-08-21",
        "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-August/007287.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2020:2373-1 vom 2020-08-28",
        "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-August/007315.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2020:2373-1 vom 2020-08-28",
        "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-August/007314.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2020:2650-1 vom 2020-09-16",
        "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007435.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2020:2650-1 vom 2020-09-16",
        "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007436.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:3807 vom 2020-09-23",
        "url": "https://access.redhat.com/errata/RHSA-2020:3807"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:3936 vom 2020-09-29",
        "url": "https://access.redhat.com/errata/RHSA-2020:3936"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:4211 vom 2020-10-08",
        "url": "https://access.redhat.com/errata/RHSA-2020:4211"
      },
      {
        "category": "external",
        "summary": "OTRS Security Advisory OSA-2020-14 vom 2020-10-12",
        "url": "https://community.otrs.com/security-advisory-2020-14/"
      },
      {
        "category": "external",
        "summary": "HCL Article KB0084264 vom 2020-10-14",
        "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0084264"
      },
      {
        "category": "external",
        "summary": "Tenable Security Advisory",
        "url": "https://de.tenable.com/security/tns-2020-10"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2020:5412 vom 2020-12-15",
        "url": "https://access.redhat.com/errata/RHSA-2020:5412"
      },
      {
        "category": "external",
        "summary": "EMC Security Advisory DSA-2020-262 vom 2021-01-16",
        "url": "https://www.dell.com/support/kbdoc/en-us/000180924/dsa-2020-262-dell-emc-networker-security-update-for-multiple-vulnerabilities"
      },
      {
        "category": "external",
        "summary": "Tenable Security Advisory",
        "url": "https://de.tenable.com/security/tns-2021-02"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:0778 vom 2021-03-09",
        "url": "https://access.redhat.com/errata/RHSA-2021:0778"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:0860 vom 2021-03-16",
        "url": "https://access.redhat.com/errata/RHSA-2021:0860"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-0860 vom 2021-03-19",
        "url": "https://linux.oracle.com/errata/ELSA-2021-0860.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-2608 vom 2021-03-26",
        "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2021-1626 vom 2021-04-22",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2021-1626.html"
      },
      {
        "category": "external",
        "summary": "Brocade Security Advisory",
        "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2020-972"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:1846 vom 2021-05-18",
        "url": "https://access.redhat.com/errata/RHSA-2021:1846"
      },
      {
        "category": "external",
        "summary": "Brocade Security Advisory BSA-2020-973 vom 2021-05-20",
        "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2020-973"
      },
      {
        "category": "external",
        "summary": "HPE Security Bulletin",
        "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04175en_us"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-9400 vom 2021-08-09",
        "url": "https://linux.oracle.com/errata/ELSA-2021-9400.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2021:4142 vom 2021-11-09",
        "url": "https://access.redhat.com/errata/RHSA-2021:4142"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2021-9552 vom 2021-11-19",
        "url": "https://linux.oracle.com/errata/ELSA-2021-9552.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2022-9177 vom 2022-03-01",
        "url": "https://linux.oracle.com/errata/ELSA-2022-9177.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2022:6393 vom 2022-09-08",
        "url": "https://access.redhat.com/errata/RHSA-2022:6393"
      },
      {
        "category": "external",
        "summary": "SolarWinds Platform 2022.3 Release Notes",
        "url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2022-3_release_notes.htm"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 6852773 vom 2023-01-05",
        "url": "https://www.ibm.com/support/pages/node/6852773"
      },
      {
        "category": "external",
        "summary": "Tenable Security Advisory TNS-2023-09 vom 2023-03-02",
        "url": "https://www.tenable.com/security/tns-2023-09"
      },
      {
        "category": "external",
        "summary": "SolarWinds Platform 2023.3 Release Notes",
        "url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2023-3_release_notes.htm"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7060517 vom 2023-10-26",
        "url": "https://www.ibm.com/support/pages/node/7060517"
      },
      {
        "category": "external",
        "summary": "Moxa Security Advisory MPSA-230203 vom 2023-11-02",
        "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230203-pt-g503-series-multiple-vulnerabilities"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7160134 vom 2024-07-12",
        "url": "https://www.ibm.com/support/pages/node/7160134"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7178266 vom 2024-12-09",
        "url": "https://www.ibm.com/support/pages/node/7178266"
      },
      {
        "category": "external",
        "summary": "Juniper Security Advisory JSA92874 vom 2024-01-09",
        "url": "https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R2-release"
      },
      {
        "category": "external",
        "summary": "CISA Known Exploited Vulnerabilities Catalog vom 2025-01-23",
        "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7246-1 vom 2025-01-30",
        "url": "https://ubuntu.com/security/notices/USN-7246-1"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1070 vom 2025-02-05",
        "url": "https://access.redhat.com/errata/RHSA-2025:1070"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1185 vom 2025-02-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:1185"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1209 vom 2025-02-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:1209"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1210 vom 2025-02-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:1210"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1212 vom 2025-02-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:1212"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1211 vom 2025-02-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:1211"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1213 vom 2025-02-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:1213"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1214 vom 2025-02-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:1214"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1216 vom 2025-02-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:1216"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1217 vom 2025-02-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:1217"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1215 vom 2025-02-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:1215"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1249 vom 2025-02-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:1249"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-1210 vom 2025-02-11",
        "url": "https://linux.oracle.com/errata/ELSA-2025-1210.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1255 vom 2025-02-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:1255"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-1215 vom 2025-02-11",
        "url": "https://linux.oracle.com/errata/ELSA-2025-1215.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1247 vom 2025-02-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:1247"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1256 vom 2025-02-10",
        "url": "https://access.redhat.com/errata/RHSA-2025:1256"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1304 vom 2025-02-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:1304"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1329 vom 2025-02-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:1329"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1346 vom 2025-02-12",
        "url": "https://access.redhat.com/errata/RHSA-2025:1346"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1300 vom 2025-02-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:1300"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1306 vom 2025-02-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:1306"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1338 vom 2025-02-12",
        "url": "https://access.redhat.com/errata/RHSA-2025:1338"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1308 vom 2025-02-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:1308"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1312 vom 2025-02-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:1312"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1303 vom 2025-02-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:1303"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1310 vom 2025-02-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:1310"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1305 vom 2025-02-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:1305"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1315 vom 2025-02-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:1315"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1314 vom 2025-02-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:1314"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1301 vom 2025-02-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:1301"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1309 vom 2025-02-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:1309"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1342 vom 2025-02-12",
        "url": "https://access.redhat.com/errata/RHSA-2025:1342"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1311 vom 2025-02-11",
        "url": "https://access.redhat.com/errata/RHSA-2025:1311"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-1300 vom 2025-02-13",
        "url": "https://linux.oracle.com/errata/ELSA-2025-1300.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-1301 vom 2025-02-13",
        "url": "https://linux.oracle.com/errata/ELSA-2025-1301.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-1309 vom 2025-02-13",
        "url": "https://linux.oracle.com/errata/ELSA-2025-1309.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-1306 vom 2025-02-14",
        "url": "https://linux.oracle.com/errata/ELSA-2025-1306.html"
      },
      {
        "category": "external",
        "summary": "Rocky Linux Security Advisory RLSA-2025:1314 vom 2025-02-13",
        "url": "https://errata.build.resf.org/RLSA-2025:1314"
      },
      {
        "category": "external",
        "summary": "Rocky Linux Security Advisory RLSA-2025:1215 vom 2025-02-13",
        "url": "https://errata.build.resf.org/RLSA-2025:1215"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-1338 vom 2025-02-14",
        "url": "https://linux.oracle.com/errata/ELSA-2025-1338.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-1346 vom 2025-02-14",
        "url": "https://linux.oracle.com/errata/ELSA-2025-1346.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1515 vom 2025-02-17",
        "url": "https://access.redhat.com/errata/RHSA-2025:1515"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1514 vom 2025-02-17",
        "url": "https://access.redhat.com/errata/RHSA-2025:1514"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1601 vom 2025-02-17",
        "url": "https://access.redhat.com/errata/RHSA-2025:1601"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1580 vom 2025-02-17",
        "url": "https://access.redhat.com/errata/RHSA-2025:1580"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-1329 vom 2025-02-19",
        "url": "https://linux.oracle.com/errata/ELSA-2025-1329.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1983 vom 2025-03-05",
        "url": "https://access.redhat.com/errata/RHSA-2025:1983"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:2426 vom 2025-03-06",
        "url": "https://access.redhat.com/errata/RHSA-2025:2426"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:1985 vom 2025-03-05",
        "url": "https://access.redhat.com/errata/RHSA-2025:1985"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7185353 vom 2025-03-11",
        "url": "https://www.ibm.com/support/pages/node/7185353"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-1601 vom 2025-03-13",
        "url": "https://linux.oracle.com/errata/ELSA-2025-1601.html"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin",
        "url": "https://www.ibm.com/support/pages/node/7228945"
      },
      {
        "category": "external",
        "summary": "Juniper Security Bulletin",
        "url": "https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R2-release?language=en_US"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:4005 vom 2025-04-17",
        "url": "https://access.redhat.com/errata/RHSA-2025:4005"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7231915 vom 2025-04-26",
        "url": "https://www.ibm.com/support/pages/node/7231915"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7233394 vom 2025-05-14",
        "url": "https://www.ibm.com/support/pages/node/7233394"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:8278 vom 2025-05-29",
        "url": "https://rhn.redhat.com/errata/RHSA-2025:8278.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7622-1 vom 2025-07-08",
        "url": "https://ubuntu.com/security/notices/USN-7622-1"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7658-1 vom 2025-07-21",
        "url": "https://ubuntu.com/security/notices/USN-7658-1"
      }
    ],
    "source_lang": "en-US",
    "title": "jQuery: Mehrere Schwachstellen erm\u00f6glichen Cross-Site Scripting",
    "tracking": {
      "current_release_date": "2025-07-21T22:00:00.000+00:00",
      "generator": {
        "date": "2025-07-22T07:36:57.184+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.4.0"
        }
      },
      "id": "WID-SEC-W-2022-1347",
      "initial_release_date": "2020-05-03T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2020-05-03T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2020-05-21T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Drupal aufgenommen"
        },
        {
          "date": "2020-05-24T22:00:00.000+00:00",
          "number": "3",
          "summary": "Referenz(en) aufgenommen: FEDORA-2020-11BE4B36D4"
        },
        {
          "date": "2020-05-26T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2020-05-27T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-06-02T22:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-06-07T22:00:00.000+00:00",
          "number": "7",
          "summary": "Referenz(en) aufgenommen: FEDORA-2020-36D2DB5F51"
        },
        {
          "date": "2020-07-02T22:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-07-08T22:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Informationen von Palo Alto Networks aufgenommen"
        },
        {
          "date": "2020-07-13T22:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-07-26T22:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von GENTOO aufgenommen"
        },
        {
          "date": "2020-08-03T22:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von F5 aufgenommen"
        },
        {
          "date": "2020-08-04T22:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-08-06T22:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-08-23T22:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2020-08-30T22:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2020-09-06T22:00:00.000+00:00",
          "number": "17",
          "summary": "Referenz(en) aufgenommen: FEDORA-2020-FBB94073A1"
        },
        {
          "date": "2020-09-16T22:00:00.000+00:00",
          "number": "18",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2020-09-23T22:00:00.000+00:00",
          "number": "19",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-09-29T22:00:00.000+00:00",
          "number": "20",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-10-07T22:00:00.000+00:00",
          "number": "21",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2020-10-11T22:00:00.000+00:00",
          "number": "22",
          "summary": "Neue Updates von OTRS aufgenommen"
        },
        {
          "date": "2020-10-14T22:00:00.000+00:00",
          "number": "23",
          "summary": "Neue Updates von HCL aufgenommen"
        },
        {
          "date": "2020-12-07T23:00:00.000+00:00",
          "number": "24",
          "summary": "Neue Updates von Tenable aufgenommen"
        },
        {
          "date": "2020-12-15T23:00:00.000+00:00",
          "number": "25",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-01-17T23:00:00.000+00:00",
          "number": "26",
          "summary": "Neue Updates von EMC aufgenommen"
        },
        {
          "date": "2021-02-17T23:00:00.000+00:00",
          "number": "27",
          "summary": "Neue Updates von Tenable aufgenommen"
        },
        {
          "date": "2021-03-09T23:00:00.000+00:00",
          "number": "28",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-03-16T23:00:00.000+00:00",
          "number": "29",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-03-18T23:00:00.000+00:00",
          "number": "30",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2021-03-25T23:00:00.000+00:00",
          "number": "31",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2021-04-21T22:00:00.000+00:00",
          "number": "32",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2021-05-16T22:00:00.000+00:00",
          "number": "33",
          "summary": "Neue Updates von BROCADE aufgenommen"
        },
        {
          "date": "2021-05-18T22:00:00.000+00:00",
          "number": "34",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-05-20T22:00:00.000+00:00",
          "number": "35",
          "summary": "Neue Updates von BROCADE aufgenommen"
        },
        {
          "date": "2021-07-18T22:00:00.000+00:00",
          "number": "36",
          "summary": "Neue Updates von HP aufgenommen"
        },
        {
          "date": "2021-08-09T22:00:00.000+00:00",
          "number": "37",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2021-11-09T23:00:00.000+00:00",
          "number": "38",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2021-11-18T23:00:00.000+00:00",
          "number": "39",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2022-02-28T23:00:00.000+00:00",
          "number": "40",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2022-09-08T22:00:00.000+00:00",
          "number": "41",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2022-09-28T22:00:00.000+00:00",
          "number": "42",
          "summary": "Neue Updates aufgenommen"
        },
        {
          "date": "2023-01-05T23:00:00.000+00:00",
          "number": "43",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2023-03-02T23:00:00.000+00:00",
          "number": "44",
          "summary": "Neue Updates von Tenable aufgenommen"
        },
        {
          "date": "2023-07-25T22:00:00.000+00:00",
          "number": "45",
          "summary": "Neue Updates aufgenommen"
        },
        {
          "date": "2023-10-26T22:00:00.000+00:00",
          "number": "46",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2023-11-02T23:00:00.000+00:00",
          "number": "47",
          "summary": "Neue Updates von moxa aufgenommen"
        },
        {
          "date": "2024-07-11T22:00:00.000+00:00",
          "number": "48",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2024-12-09T23:00:00.000+00:00",
          "number": "49",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2025-01-08T23:00:00.000+00:00",
          "number": "50",
          "summary": "Neue Updates von Juniper aufgenommen"
        },
        {
          "date": "2025-01-23T23:00:00.000+00:00",
          "number": "51",
          "summary": "CVE-2020-11023 wird ausgenutzt"
        },
        {
          "date": "2025-01-30T23:00:00.000+00:00",
          "number": "52",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-02-05T23:00:00.000+00:00",
          "number": "53",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-02-09T23:00:00.000+00:00",
          "number": "54",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-02-10T23:00:00.000+00:00",
          "number": "55",
          "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
        },
        {
          "date": "2025-02-11T23:00:00.000+00:00",
          "number": "56",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-02-12T23:00:00.000+00:00",
          "number": "57",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2025-02-13T23:00:00.000+00:00",
          "number": "58",
          "summary": "Neue Updates von Oracle Linux und Rocky Enterprise Software Foundation aufgenommen"
        },
        {
          "date": "2025-02-16T23:00:00.000+00:00",
          "number": "59",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-02-17T23:00:00.000+00:00",
          "number": "60",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-02-18T23:00:00.000+00:00",
          "number": "61",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2025-03-05T23:00:00.000+00:00",
          "number": "62",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-03-10T23:00:00.000+00:00",
          "number": "63",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2025-03-12T23:00:00.000+00:00",
          "number": "64",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2025-03-24T23:00:00.000+00:00",
          "number": "65",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2025-04-10T22:00:00.000+00:00",
          "number": "66",
          "summary": "Neue Updates aufgenommen"
        },
        {
          "date": "2025-04-21T22:00:00.000+00:00",
          "number": "67",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-04-27T22:00:00.000+00:00",
          "number": "68",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2025-05-14T22:00:00.000+00:00",
          "number": "69",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2025-05-29T22:00:00.000+00:00",
          "number": "70",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2025-07-07T22:00:00.000+00:00",
          "number": "71",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-07-21T22:00:00.000+00:00",
          "number": "72",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        }
      ],
      "status": "final",
      "version": "72"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Broadcom Brocade Switch",
            "product": {
              "name": "Broadcom Brocade Switch",
              "product_id": "T015844",
              "product_identification_helper": {
                "cpe": "cpe:/h:brocade:switch:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Broadcom"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Debian Linux",
            "product": {
              "name": "Debian Linux",
              "product_id": "2951",
              "product_identification_helper": {
                "cpe": "cpe:/o:debian:debian_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c19.4",
                "product": {
                  "name": "EMC NetWorker \u003c19.4",
                  "product_id": "T018107"
                }
              },
              {
                "category": "product_version",
                "name": "19.4",
                "product": {
                  "name": "EMC NetWorker 19.4",
                  "product_id": "T018107-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:emc:networker:19.4"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "NetWorker"
          }
        ],
        "category": "vendor",
        "name": "EMC"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "F5 BIG-IP",
            "product": {
              "name": "F5 BIG-IP",
              "product_id": "T001663",
              "product_identification_helper": {
                "cpe": "cpe:/a:f5:big-ip:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "F5"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Gentoo Linux",
            "product": {
              "name": "Gentoo Linux",
              "product_id": "T012167",
              "product_identification_helper": {
                "cpe": "cpe:/o:gentoo:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Gentoo"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "HCL BigFix",
            "product": {
              "name": "HCL BigFix",
              "product_id": "T017494",
              "product_identification_helper": {
                "cpe": "cpe:/a:hcltech:bigfix:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "HCL"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c9.0.1a",
                "product": {
                  "name": "HPE Fabric OS \u003c9.0.1a",
                  "product_id": "T019354"
                }
              },
              {
                "category": "product_version",
                "name": "9.0.1a",
                "product": {
                  "name": "HPE Fabric OS 9.0.1a",
                  "product_id": "T019354-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:hpe:fabric_os:v9.0.1a"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Fabric OS"
          },
          {
            "category": "product_name",
            "name": "HPE Switch",
            "product": {
              "name": "HPE Switch",
              "product_id": "T005119",
              "product_identification_helper": {
                "cpe": "cpe:/h:hp:switch:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "HPE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "IBM MQ",
            "product": {
              "name": "IBM MQ",
              "product_id": "T021398",
              "product_identification_helper": {
                "cpe": "cpe:/a:ibm:mq:-"
              }
            }
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "7.6.1.2",
                "product": {
                  "name": "IBM Maximo Asset Management 7.6.1.2",
                  "product_id": "812526",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:maximo_asset_management:7.6.1.2"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Maximo Asset Management"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c7.5.0 UP9",
                "product": {
                  "name": "IBM QRadar SIEM \u003c7.5.0 UP9",
                  "product_id": "T036127"
                }
              },
              {
                "category": "product_version",
                "name": "7.5.0 UP9",
                "product": {
                  "name": "IBM QRadar SIEM 7.5.0 UP9",
                  "product_id": "T036127-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up9"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.5.0 UP11 IF03",
                "product": {
                  "name": "IBM QRadar SIEM \u003c7.5.0 UP11 IF03",
                  "product_id": "T041724"
                }
              },
              {
                "category": "product_version",
                "name": "7.5.0 UP11 IF03",
                "product": {
                  "name": "IBM QRadar SIEM 7.5.0 UP11 IF03",
                  "product_id": "T041724-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11_if03"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.5.0 UP11 IF04",
                "product": {
                  "name": "IBM QRadar SIEM \u003c7.5.0 UP11 IF04",
                  "product_id": "T043169"
                }
              },
              {
                "category": "product_version",
                "name": "7.5.0 UP11 IF04",
                "product": {
                  "name": "IBM QRadar SIEM 7.5.0 UP11 IF04",
                  "product_id": "T043169-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11_if04"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.5.0 UP12",
                "product": {
                  "name": "IBM QRadar SIEM \u003c7.5.0 UP12",
                  "product_id": "T043784"
                }
              },
              {
                "category": "product_version",
                "name": "7.5.0 UP12",
                "product": {
                  "name": "IBM QRadar SIEM 7.5.0 UP12",
                  "product_id": "T043784-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up12"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "QRadar SIEM"
          },
          {
            "category": "product_name",
            "name": "IBM Storage Scale",
            "product": {
              "name": "IBM Storage Scale",
              "product_id": "T019402",
              "product_identification_helper": {
                "cpe": "cpe:/a:ibm:spectrum_scale:-"
              }
            }
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "IP Edition \u003c=4.2.0.15",
                "product": {
                  "name": "IBM Tivoli Network Manager IP Edition \u003c=4.2.0.15",
                  "product_id": "T025750"
                }
              },
              {
                "category": "product_version_range",
                "name": "IP Edition \u003c=4.2.0.15",
                "product": {
                  "name": "IBM Tivoli Network Manager IP Edition \u003c=4.2.0.15",
                  "product_id": "T025750-fixed"
                }
              }
            ],
            "category": "product_name",
            "name": "Tivoli Network Manager"
          }
        ],
        "category": "vendor",
        "name": "IBM"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c24.1R2",
                "product": {
                  "name": "Juniper Junos Space \u003c24.1R2",
                  "product_id": "T040074"
                }
              },
              {
                "category": "product_version",
                "name": "24.1R2",
                "product": {
                  "name": "Juniper Junos Space 24.1R2",
                  "product_id": "T040074-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:juniper:junos_space:24.1r2"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Junos Space"
          }
        ],
        "category": "vendor",
        "name": "Juniper"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cPT-G503 v5.3",
                "product": {
                  "name": "Moxa Switch \u003cPT-G503 v5.3",
                  "product_id": "T030907"
                }
              },
              {
                "category": "product_version",
                "name": "PT-G503 v5.3",
                "product": {
                  "name": "Moxa Switch PT-G503 v5.3",
                  "product_id": "T030907-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/h:moxa:switch:pt-g503_v5.3"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Switch"
          }
        ],
        "category": "vendor",
        "name": "Moxa"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c3.5.0",
                "product": {
                  "name": "Open Source jQuery \u003c3.5.0",
                  "product_id": "T016413"
                }
              },
              {
                "category": "product_version",
                "name": "3.5.0",
                "product": {
                  "name": "Open Source jQuery 3.5.0",
                  "product_id": "T016413-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:jquery:jquery:3.5.0"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "jQuery"
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Palo Alto Networks PAN-OS",
            "product": {
              "name": "Palo Alto Networks PAN-OS",
              "product_id": "T012790",
              "product_identification_helper": {
                "cpe": "cpe:/o:paloaltonetworks:pan-os:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Palo Alto Networks"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "RESF Rocky Linux",
            "product": {
              "name": "RESF Rocky Linux",
              "product_id": "T032255",
              "product_identification_helper": {
                "cpe": "cpe:/o:resf:rocky_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "RESF"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux",
                "product": {
                  "name": "Red Hat Enterprise Linux",
                  "product_id": "67646",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:-"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "Service Interconnect 1",
                "product": {
                  "name": "Red Hat Enterprise Linux Service Interconnect 1",
                  "product_id": "T028472",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:service_interconnect_1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "Discovery",
                "product": {
                  "name": "Red Hat Enterprise Linux Discovery",
                  "product_id": "T040951",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:discovery"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "Logging \u003c5.9.12",
                "product": {
                  "name": "Red Hat OpenShift Logging \u003c5.9.12",
                  "product_id": "T041594"
                }
              },
              {
                "category": "product_version",
                "name": "Logging 5.9.12",
                "product": {
                  "name": "Red Hat OpenShift Logging 5.9.12",
                  "product_id": "T041594-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:logging__5.9.12"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Logging \u003c5.8.18",
                "product": {
                  "name": "Red Hat OpenShift Logging \u003c5.8.18",
                  "product_id": "T041595"
                }
              },
              {
                "category": "product_version",
                "name": "Logging 5.8.18",
                "product": {
                  "name": "Red Hat OpenShift Logging 5.8.18",
                  "product_id": "T041595-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:logging__5.8.18"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "OpenShift"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "16.2",
                "product": {
                  "name": "Red Hat OpenStack 16.2",
                  "product_id": "T023999",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openstack:16.2"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "OpenStack"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SolarWinds Orion",
            "product": {
              "name": "SolarWinds Orion",
              "product_id": "T024734",
              "product_identification_helper": {
                "cpe": "cpe:/a:solarwinds:orion_core_services:-"
              }
            }
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c2023.3",
                "product": {
                  "name": "SolarWinds Platform \u003c2023.3",
                  "product_id": "T028897"
                }
              },
              {
                "category": "product_version",
                "name": "2023.3",
                "product": {
                  "name": "SolarWinds Platform 2023.3",
                  "product_id": "T028897-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:solarwinds:orion_platform:2023.3"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Platform"
          }
        ],
        "category": "vendor",
        "name": "SolarWinds"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Tenable Security Nessus",
                "product": {
                  "name": "Tenable Security Nessus",
                  "product_id": "T016399",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:tenable:nessus:-"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c10.5.0",
                "product": {
                  "name": "Tenable Security Nessus \u003c10.5.0",
                  "product_id": "T026604"
                }
              },
              {
                "category": "product_version",
                "name": "10.5.0",
                "product": {
                  "name": "Tenable Security Nessus 10.5.0",
                  "product_id": "T026604-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:tenable:nessus:10.5.0"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Nessus"
          },
          {
            "category": "product_name",
            "name": "Tenable Security Nessus Network Monitor",
            "product": {
              "name": "Tenable Security Nessus Network Monitor",
              "product_id": "T016632",
              "product_identification_helper": {
                "cpe": "cpe:/a:tenable:nessus_network_monitor:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Tenable Security"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-11022",
      "product_status": {
        "known_affected": [
          "67646",
          "T015844",
          "T016413",
          "T016632",
          "T036127",
          "T004914",
          "T016399",
          "T017494",
          "T012790",
          "T019354",
          "T023999",
          "T043784",
          "T043169",
          "T040074",
          "T026604",
          "T018107",
          "T001663",
          "812526",
          "398363",
          "T040951",
          "T021398",
          "T028472",
          "T041724",
          "T005119",
          "T012167",
          "T032255",
          "T041594",
          "T019402",
          "2951",
          "T002207",
          "T000126",
          "T024734",
          "T028897",
          "T030907",
          "T041595"
        ],
        "last_affected": [
          "T025750"
        ]
      },
      "release_date": "2020-05-03T22:00:00.000+00:00",
      "title": "CVE-2020-11022"
    },
    {
      "cve": "CVE-2020-11023",
      "product_status": {
        "known_affected": [
          "67646",
          "T015844",
          "T016413",
          "T016632",
          "T036127",
          "T004914",
          "T016399",
          "T017494",
          "T012790",
          "T019354",
          "T023999",
          "T043784",
          "T043169",
          "T040074",
          "T026604",
          "T018107",
          "T001663",
          "812526",
          "398363",
          "T040951",
          "T021398",
          "T028472",
          "T041724",
          "T005119",
          "T012167",
          "T032255",
          "T041594",
          "T019402",
          "2951",
          "T002207",
          "T000126",
          "T024734",
          "T028897",
          "T030907",
          "T041595"
        ],
        "last_affected": [
          "T025750"
        ]
      },
      "release_date": "2020-05-03T22:00:00.000+00:00",
      "title": "CVE-2020-11023"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…