wid-sec-w-2022-1347
Vulnerability from csaf_certbund
Published
2020-05-03 22:00
Modified
2025-07-21 22:00
Summary
jQuery: Mehrere Schwachstellen ermöglichen Cross-Site Scripting
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
jQuery ist eine freie JavaScript-Bibliothek, die Funktionen zur DOM-Navigation und -Manipulation zur Verfügung stellt.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in jQuery ausnutzen, um einen Cross-Site Scripting Angriff durchzuführen.
Betroffene Betriebssysteme
- BIOS/Firmware
- F5 Networks
- Hardware Appliance
- Juniper Appliance
- Linux
- MacOS X
- Sonstiges
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "jQuery ist eine freie JavaScript-Bibliothek, die Funktionen zur DOM-Navigation und -Manipulation zur Verf\u00fcgung stellt.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in jQuery ausnutzen, um einen Cross-Site Scripting Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware\n- F5 Networks\n- Hardware Appliance\n- Juniper Appliance\n- Linux\n- MacOS X\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1347 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2020/wid-sec-w-2022-1347.json" }, { "category": "self", "summary": "WID-SEC-2022-1347 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1347" }, { "category": "external", "summary": "GitHub Security Advisory GHSA-gxr4-xjj5-5px2 vom 2020-04-30", "url": "https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2" }, { "category": "external", "summary": "GitHub Security Advisory GHSA-jpcq-cgw6-v4j6 vom 2020-04-30", "url": "https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6" }, { "category": "external", "summary": "Drupal Security Advisory SA-CORE-2020-002 vom 2020-05-20", "url": "https://www.drupal.org/sa-core-2020-002" }, { "category": "external", "summary": "Debian Security Advisory DSA-4693 vom 2020-05-27", "url": "https://www.debian.org/security/2020/dsa-4693" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2217 vom 2020-05-28", "url": "https://access.redhat.com/errata/RHSA-2020:2217" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2362 vom 2020-06-02", "url": "https://access.redhat.com/errata/RHSA-2020:2362" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2813 vom 2020-07-02", "url": "https://access.redhat.com/errata/RHSA-2020:2813" }, { "category": "external", "summary": "Palo Alto Networks Security Advisory PAN-SA-2020-0007 vom 2020-07-08", "url": "https://security.paloaltonetworks.com/PAN-SA-2020-0007" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2412 vom 2020-07-13", "url": "https://access.redhat.com/errata/RHSA-2020:2412" }, { "category": "external", "summary": "GENTOO Security Advisory GLSA-202007-03 vom 2020-07-27", "url": "https://security.gentoo.org/glsa/202007-03" }, { "category": "external", "summary": "F5 Security Advisory K66544153 vom 2020-08-03", "url": "https://support.f5.com/csp/article/K66544153" }, { "category": "external", "summary": "F5 Security Advisory K02453220 vom 2020-08-03", "url": "https://support.f5.com/csp/article/K02453220" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:3247 vom 2020-08-04", "url": "https://access.redhat.com/errata/RHSA-2020:3247" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:3369 vom 2020-08-06", "url": "https://access.redhat.com/errata/RHSA-2020:3369" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:2292-1 vom 2020-08-21", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-August/007286.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:2292-1 vom 2020-08-21", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-August/007287.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:2373-1 vom 2020-08-28", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-August/007315.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:2373-1 vom 2020-08-28", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-August/007314.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:2650-1 vom 2020-09-16", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007435.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:2650-1 vom 2020-09-16", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007436.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:3807 vom 2020-09-23", "url": "https://access.redhat.com/errata/RHSA-2020:3807" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:3936 vom 2020-09-29", "url": "https://access.redhat.com/errata/RHSA-2020:3936" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4211 vom 2020-10-08", "url": "https://access.redhat.com/errata/RHSA-2020:4211" }, { "category": "external", "summary": "OTRS Security Advisory OSA-2020-14 vom 2020-10-12", "url": "https://community.otrs.com/security-advisory-2020-14/" }, { "category": "external", "summary": "HCL Article KB0084264 vom 2020-10-14", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0084264" }, { "category": "external", "summary": "Tenable Security Advisory", "url": "https://de.tenable.com/security/tns-2020-10" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:5412 vom 2020-12-15", "url": "https://access.redhat.com/errata/RHSA-2020:5412" }, { "category": "external", "summary": "EMC Security Advisory DSA-2020-262 vom 2021-01-16", "url": "https://www.dell.com/support/kbdoc/en-us/000180924/dsa-2020-262-dell-emc-networker-security-update-for-multiple-vulnerabilities" }, { "category": "external", "summary": "Tenable Security Advisory", "url": "https://de.tenable.com/security/tns-2021-02" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0778 vom 2021-03-09", "url": "https://access.redhat.com/errata/RHSA-2021:0778" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0860 vom 2021-03-16", "url": "https://access.redhat.com/errata/RHSA-2021:0860" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-0860 vom 2021-03-19", "url": "https://linux.oracle.com/errata/ELSA-2021-0860.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-2608 vom 2021-03-26", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2021-1626 vom 2021-04-22", "url": "https://alas.aws.amazon.com/AL2/ALAS-2021-1626.html" }, { "category": "external", "summary": "Brocade Security Advisory", "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2020-972" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:1846 vom 2021-05-18", "url": "https://access.redhat.com/errata/RHSA-2021:1846" }, { "category": "external", "summary": "Brocade Security Advisory BSA-2020-973 vom 2021-05-20", "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2020-973" }, { "category": "external", "summary": "HPE Security Bulletin", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04175en_us" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9400 vom 2021-08-09", "url": "https://linux.oracle.com/errata/ELSA-2021-9400.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4142 vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4142" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9552 vom 2021-11-19", "url": "https://linux.oracle.com/errata/ELSA-2021-9552.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9177 vom 2022-03-01", "url": "https://linux.oracle.com/errata/ELSA-2022-9177.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6393 vom 2022-09-08", "url": "https://access.redhat.com/errata/RHSA-2022:6393" }, { "category": "external", "summary": "SolarWinds Platform 2022.3 Release Notes", "url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2022-3_release_notes.htm" }, { "category": "external", "summary": "IBM Security Bulletin 6852773 vom 2023-01-05", "url": "https://www.ibm.com/support/pages/node/6852773" }, { "category": "external", "summary": "Tenable Security Advisory TNS-2023-09 vom 2023-03-02", "url": "https://www.tenable.com/security/tns-2023-09" }, { "category": "external", "summary": "SolarWinds Platform 2023.3 Release Notes", "url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2023-3_release_notes.htm" }, { "category": "external", "summary": "IBM Security Bulletin 7060517 vom 2023-10-26", "url": "https://www.ibm.com/support/pages/node/7060517" }, { "category": "external", "summary": "Moxa Security Advisory MPSA-230203 vom 2023-11-02", "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230203-pt-g503-series-multiple-vulnerabilities" }, { "category": "external", "summary": "IBM Security Bulletin 7160134 vom 2024-07-12", "url": "https://www.ibm.com/support/pages/node/7160134" }, { "category": "external", "summary": "IBM Security Bulletin 7178266 vom 2024-12-09", "url": "https://www.ibm.com/support/pages/node/7178266" }, { "category": "external", "summary": "Juniper Security Advisory JSA92874 vom 2024-01-09", "url": "https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R2-release" }, { "category": "external", "summary": "CISA Known Exploited Vulnerabilities Catalog vom 2025-01-23", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7246-1 vom 2025-01-30", "url": "https://ubuntu.com/security/notices/USN-7246-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1070 vom 2025-02-05", "url": "https://access.redhat.com/errata/RHSA-2025:1070" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1185 vom 2025-02-10", "url": "https://access.redhat.com/errata/RHSA-2025:1185" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1209 vom 2025-02-10", "url": "https://access.redhat.com/errata/RHSA-2025:1209" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1210 vom 2025-02-10", "url": "https://access.redhat.com/errata/RHSA-2025:1210" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1212 vom 2025-02-10", "url": "https://access.redhat.com/errata/RHSA-2025:1212" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1211 vom 2025-02-10", "url": "https://access.redhat.com/errata/RHSA-2025:1211" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1213 vom 2025-02-10", "url": "https://access.redhat.com/errata/RHSA-2025:1213" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1214 vom 2025-02-10", "url": "https://access.redhat.com/errata/RHSA-2025:1214" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1216 vom 2025-02-10", "url": "https://access.redhat.com/errata/RHSA-2025:1216" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1217 vom 2025-02-10", "url": "https://access.redhat.com/errata/RHSA-2025:1217" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1215 vom 2025-02-10", "url": "https://access.redhat.com/errata/RHSA-2025:1215" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1249 vom 2025-02-10", "url": "https://access.redhat.com/errata/RHSA-2025:1249" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-1210 vom 2025-02-11", "url": "https://linux.oracle.com/errata/ELSA-2025-1210.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1255 vom 2025-02-10", "url": "https://access.redhat.com/errata/RHSA-2025:1255" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-1215 vom 2025-02-11", "url": "https://linux.oracle.com/errata/ELSA-2025-1215.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1247 vom 2025-02-10", "url": "https://access.redhat.com/errata/RHSA-2025:1247" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1256 vom 2025-02-10", "url": "https://access.redhat.com/errata/RHSA-2025:1256" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1304 vom 2025-02-11", "url": "https://access.redhat.com/errata/RHSA-2025:1304" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1329 vom 2025-02-11", "url": "https://access.redhat.com/errata/RHSA-2025:1329" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1346 vom 2025-02-12", "url": "https://access.redhat.com/errata/RHSA-2025:1346" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1300 vom 2025-02-11", "url": "https://access.redhat.com/errata/RHSA-2025:1300" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1306 vom 2025-02-11", "url": "https://access.redhat.com/errata/RHSA-2025:1306" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1338 vom 2025-02-12", "url": "https://access.redhat.com/errata/RHSA-2025:1338" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1308 vom 2025-02-11", "url": "https://access.redhat.com/errata/RHSA-2025:1308" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1312 vom 2025-02-11", "url": "https://access.redhat.com/errata/RHSA-2025:1312" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1303 vom 2025-02-11", "url": "https://access.redhat.com/errata/RHSA-2025:1303" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1310 vom 2025-02-11", "url": "https://access.redhat.com/errata/RHSA-2025:1310" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1305 vom 2025-02-11", "url": "https://access.redhat.com/errata/RHSA-2025:1305" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1315 vom 2025-02-11", "url": "https://access.redhat.com/errata/RHSA-2025:1315" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1314 vom 2025-02-11", "url": "https://access.redhat.com/errata/RHSA-2025:1314" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1301 vom 2025-02-11", "url": "https://access.redhat.com/errata/RHSA-2025:1301" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1309 vom 2025-02-11", "url": "https://access.redhat.com/errata/RHSA-2025:1309" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1342 vom 2025-02-12", "url": "https://access.redhat.com/errata/RHSA-2025:1342" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1311 vom 2025-02-11", "url": "https://access.redhat.com/errata/RHSA-2025:1311" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-1300 vom 2025-02-13", "url": "https://linux.oracle.com/errata/ELSA-2025-1300.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-1301 vom 2025-02-13", "url": "https://linux.oracle.com/errata/ELSA-2025-1301.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-1309 vom 2025-02-13", "url": "https://linux.oracle.com/errata/ELSA-2025-1309.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-1306 vom 2025-02-14", "url": "https://linux.oracle.com/errata/ELSA-2025-1306.html" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2025:1314 vom 2025-02-13", "url": "https://errata.build.resf.org/RLSA-2025:1314" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2025:1215 vom 2025-02-13", "url": "https://errata.build.resf.org/RLSA-2025:1215" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-1338 vom 2025-02-14", "url": "https://linux.oracle.com/errata/ELSA-2025-1338.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-1346 vom 2025-02-14", "url": "https://linux.oracle.com/errata/ELSA-2025-1346.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1515 vom 2025-02-17", "url": "https://access.redhat.com/errata/RHSA-2025:1515" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1514 vom 2025-02-17", "url": "https://access.redhat.com/errata/RHSA-2025:1514" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1601 vom 2025-02-17", "url": "https://access.redhat.com/errata/RHSA-2025:1601" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1580 vom 2025-02-17", "url": "https://access.redhat.com/errata/RHSA-2025:1580" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-1329 vom 2025-02-19", "url": "https://linux.oracle.com/errata/ELSA-2025-1329.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1983 vom 2025-03-05", "url": "https://access.redhat.com/errata/RHSA-2025:1983" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2426 vom 2025-03-06", "url": "https://access.redhat.com/errata/RHSA-2025:2426" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1985 vom 2025-03-05", "url": "https://access.redhat.com/errata/RHSA-2025:1985" }, { "category": "external", "summary": "IBM Security Bulletin 7185353 vom 2025-03-11", "url": "https://www.ibm.com/support/pages/node/7185353" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-1601 vom 2025-03-13", "url": "https://linux.oracle.com/errata/ELSA-2025-1601.html" }, { "category": "external", "summary": "IBM Security Bulletin", "url": "https://www.ibm.com/support/pages/node/7228945" }, { "category": "external", "summary": "Juniper Security Bulletin", "url": "https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R2-release?language=en_US" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:4005 vom 2025-04-17", "url": "https://access.redhat.com/errata/RHSA-2025:4005" }, { "category": "external", "summary": "IBM Security Bulletin 7231915 vom 2025-04-26", "url": "https://www.ibm.com/support/pages/node/7231915" }, { "category": "external", "summary": "IBM Security Bulletin 7233394 vom 2025-05-14", "url": "https://www.ibm.com/support/pages/node/7233394" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8278 vom 2025-05-29", "url": "https://rhn.redhat.com/errata/RHSA-2025:8278.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7622-1 vom 2025-07-08", "url": "https://ubuntu.com/security/notices/USN-7622-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7658-1 vom 2025-07-21", "url": "https://ubuntu.com/security/notices/USN-7658-1" } ], "source_lang": "en-US", "title": "jQuery: Mehrere Schwachstellen erm\u00f6glichen Cross-Site Scripting", "tracking": { "current_release_date": "2025-07-21T22:00:00.000+00:00", "generator": { "date": "2025-07-22T07:36:57.184+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2022-1347", "initial_release_date": "2020-05-03T22:00:00.000+00:00", "revision_history": [ { "date": "2020-05-03T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2020-05-21T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Drupal aufgenommen" }, { "date": "2020-05-24T22:00:00.000+00:00", "number": "3", "summary": "Referenz(en) aufgenommen: FEDORA-2020-11BE4B36D4" }, { "date": "2020-05-26T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2020-05-27T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-06-02T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-06-07T22:00:00.000+00:00", "number": "7", "summary": "Referenz(en) aufgenommen: FEDORA-2020-36D2DB5F51" }, { "date": "2020-07-02T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-07-08T22:00:00.000+00:00", "number": "9", "summary": "Neue Informationen von Palo Alto Networks aufgenommen" }, { "date": "2020-07-13T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-07-26T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von GENTOO aufgenommen" }, { "date": "2020-08-03T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von F5 aufgenommen" }, { "date": "2020-08-04T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-08-06T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-08-23T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-08-30T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-09-06T22:00:00.000+00:00", "number": "17", "summary": "Referenz(en) aufgenommen: FEDORA-2020-FBB94073A1" }, { "date": "2020-09-16T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-09-23T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-09-29T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-10-07T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-10-11T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von OTRS aufgenommen" }, { "date": "2020-10-14T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von HCL aufgenommen" }, { "date": "2020-12-07T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Tenable aufgenommen" }, { "date": "2020-12-15T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-01-17T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von EMC aufgenommen" }, { "date": "2021-02-17T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Tenable aufgenommen" }, { "date": "2021-03-09T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-03-16T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-03-18T23:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-03-25T23:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2021-04-21T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2021-05-16T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von BROCADE aufgenommen" }, { "date": "2021-05-18T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-05-20T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von BROCADE aufgenommen" }, { "date": "2021-07-18T22:00:00.000+00:00", "number": "36", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2021-08-09T22:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-11-09T23:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-11-18T23:00:00.000+00:00", "number": "39", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-02-28T23:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-09-08T22:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-09-28T22:00:00.000+00:00", "number": "42", "summary": "Neue Updates aufgenommen" }, { "date": "2023-01-05T23:00:00.000+00:00", "number": "43", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-03-02T23:00:00.000+00:00", "number": "44", "summary": "Neue Updates von Tenable aufgenommen" }, { "date": "2023-07-25T22:00:00.000+00:00", "number": "45", "summary": "Neue Updates aufgenommen" }, { "date": "2023-10-26T22:00:00.000+00:00", "number": "46", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-11-02T23:00:00.000+00:00", "number": "47", "summary": "Neue Updates von moxa aufgenommen" }, { "date": "2024-07-11T22:00:00.000+00:00", "number": "48", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-12-09T23:00:00.000+00:00", "number": "49", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-01-08T23:00:00.000+00:00", "number": "50", "summary": "Neue Updates von Juniper aufgenommen" }, { "date": "2025-01-23T23:00:00.000+00:00", "number": "51", "summary": "CVE-2020-11023 wird ausgenutzt" }, { "date": "2025-01-30T23:00:00.000+00:00", "number": "52", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-05T23:00:00.000+00:00", "number": "53", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-02-09T23:00:00.000+00:00", "number": "54", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-02-10T23:00:00.000+00:00", "number": "55", "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen" }, { "date": "2025-02-11T23:00:00.000+00:00", "number": "56", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-02-12T23:00:00.000+00:00", "number": "57", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-02-13T23:00:00.000+00:00", "number": "58", "summary": "Neue Updates von Oracle Linux und Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2025-02-16T23:00:00.000+00:00", "number": "59", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-02-17T23:00:00.000+00:00", "number": "60", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-02-18T23:00:00.000+00:00", "number": "61", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-03-05T23:00:00.000+00:00", "number": "62", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-03-10T23:00:00.000+00:00", "number": "63", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-03-12T23:00:00.000+00:00", "number": "64", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-03-24T23:00:00.000+00:00", "number": "65", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-04-10T22:00:00.000+00:00", "number": "66", "summary": "Neue Updates aufgenommen" }, { "date": "2025-04-21T22:00:00.000+00:00", "number": "67", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-04-27T22:00:00.000+00:00", "number": "68", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-05-14T22:00:00.000+00:00", "number": "69", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-05-29T22:00:00.000+00:00", "number": "70", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-07-07T22:00:00.000+00:00", "number": "71", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-21T22:00:00.000+00:00", "number": "72", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "72" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Broadcom Brocade Switch", "product": { "name": "Broadcom Brocade Switch", "product_id": "T015844", "product_identification_helper": { "cpe": "cpe:/h:brocade:switch:-" } } } ], "category": "vendor", "name": "Broadcom" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c19.4", "product": { "name": "EMC NetWorker \u003c19.4", "product_id": "T018107" } }, { "category": "product_version", "name": "19.4", "product": { "name": "EMC NetWorker 19.4", "product_id": "T018107-fixed", "product_identification_helper": { "cpe": "cpe:/a:emc:networker:19.4" } } } ], "category": "product_name", "name": "NetWorker" } ], "category": "vendor", "name": "EMC" }, { "branches": [ { "category": "product_name", "name": "F5 BIG-IP", "product": { "name": "F5 BIG-IP", "product_id": "T001663", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:-" } } } ], "category": "vendor", "name": "F5" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "HCL BigFix", "product": { "name": "HCL BigFix", "product_id": "T017494", "product_identification_helper": { "cpe": "cpe:/a:hcltech:bigfix:-" } } } ], "category": "vendor", "name": "HCL" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c9.0.1a", "product": { "name": "HPE Fabric OS \u003c9.0.1a", "product_id": "T019354" } }, { "category": "product_version", "name": "9.0.1a", "product": { "name": "HPE Fabric OS 9.0.1a", "product_id": "T019354-fixed", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:v9.0.1a" } } } ], "category": "product_name", "name": "Fabric OS" }, { "category": "product_name", "name": "HPE Switch", "product": { "name": "HPE Switch", "product_id": "T005119", "product_identification_helper": { "cpe": "cpe:/h:hp:switch:-" } } } ], "category": "vendor", "name": "HPE" }, { "branches": [ { "category": "product_name", "name": "IBM MQ", "product": { "name": "IBM MQ", "product_id": "T021398", "product_identification_helper": { "cpe": "cpe:/a:ibm:mq:-" } } }, { "branches": [ { "category": "product_version", "name": "7.6.1.2", "product": { "name": "IBM Maximo Asset Management 7.6.1.2", "product_id": "812526", "product_identification_helper": { "cpe": "cpe:/a:ibm:maximo_asset_management:7.6.1.2" } } } ], "category": "product_name", "name": "Maximo Asset Management" }, { "branches": [ { "category": "product_version_range", "name": "\u003c7.5.0 UP9", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP9", "product_id": "T036127" } }, { "category": "product_version", "name": "7.5.0 UP9", "product": { "name": "IBM QRadar SIEM 7.5.0 UP9", "product_id": "T036127-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up9" } } }, { "category": "product_version_range", "name": "\u003c7.5.0 UP11 IF03", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP11 IF03", "product_id": "T041724" } }, { "category": "product_version", "name": "7.5.0 UP11 IF03", "product": { "name": "IBM QRadar SIEM 7.5.0 UP11 IF03", "product_id": "T041724-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11_if03" } } }, { "category": "product_version_range", "name": "\u003c7.5.0 UP11 IF04", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP11 IF04", "product_id": "T043169" } }, { "category": "product_version", "name": "7.5.0 UP11 IF04", "product": { "name": "IBM QRadar SIEM 7.5.0 UP11 IF04", "product_id": "T043169-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11_if04" } } }, { "category": "product_version_range", "name": "\u003c7.5.0 UP12", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP12", "product_id": "T043784" } }, { "category": "product_version", "name": "7.5.0 UP12", "product": { "name": "IBM QRadar SIEM 7.5.0 UP12", "product_id": "T043784-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up12" } } } ], "category": "product_name", "name": "QRadar SIEM" }, { "category": "product_name", "name": "IBM Storage Scale", "product": { "name": "IBM Storage Scale", "product_id": "T019402", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_scale:-" } } }, { "branches": [ { "category": "product_version_range", "name": "IP Edition \u003c=4.2.0.15", "product": { "name": "IBM Tivoli Network Manager IP Edition \u003c=4.2.0.15", "product_id": "T025750" } }, { "category": "product_version_range", "name": "IP Edition \u003c=4.2.0.15", "product": { "name": "IBM Tivoli Network Manager IP Edition \u003c=4.2.0.15", "product_id": "T025750-fixed" } } ], "category": "product_name", "name": "Tivoli Network Manager" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c24.1R2", "product": { "name": "Juniper Junos Space \u003c24.1R2", "product_id": "T040074" } }, { "category": "product_version", "name": "24.1R2", "product": { "name": "Juniper Junos Space 24.1R2", "product_id": "T040074-fixed", "product_identification_helper": { "cpe": "cpe:/a:juniper:junos_space:24.1r2" } } } ], "category": "product_name", "name": "Junos Space" } ], "category": "vendor", "name": "Juniper" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cPT-G503 v5.3", "product": { "name": "Moxa Switch \u003cPT-G503 v5.3", "product_id": "T030907" } }, { "category": "product_version", "name": "PT-G503 v5.3", "product": { "name": "Moxa Switch PT-G503 v5.3", "product_id": "T030907-fixed", "product_identification_helper": { "cpe": "cpe:/h:moxa:switch:pt-g503_v5.3" } } } ], "category": "product_name", "name": "Switch" } ], "category": "vendor", "name": "Moxa" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c3.5.0", "product": { "name": "Open Source jQuery \u003c3.5.0", "product_id": "T016413" } }, { "category": "product_version", "name": "3.5.0", "product": { "name": "Open Source jQuery 3.5.0", "product_id": "T016413-fixed", "product_identification_helper": { "cpe": "cpe:/a:jquery:jquery:3.5.0" } } } ], "category": "product_name", "name": "jQuery" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Palo Alto Networks PAN-OS", "product": { "name": "Palo Alto Networks PAN-OS", "product_id": "T012790", "product_identification_helper": { "cpe": "cpe:/o:paloaltonetworks:pan-os:-" } } } ], "category": "vendor", "name": "Palo Alto Networks" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "category": "product_version", "name": "Service Interconnect 1", "product": { "name": "Red Hat Enterprise Linux Service Interconnect 1", "product_id": "T028472", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:service_interconnect_1" } } }, { "category": "product_version", "name": "Discovery", "product": { "name": "Red Hat Enterprise Linux Discovery", "product_id": "T040951", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:discovery" } } } ], "category": "product_name", "name": "Enterprise Linux" }, { "branches": [ { "category": "product_version_range", "name": "Logging \u003c5.9.12", "product": { "name": "Red Hat OpenShift Logging \u003c5.9.12", "product_id": "T041594" } }, { "category": "product_version", "name": "Logging 5.9.12", "product": { "name": "Red Hat OpenShift Logging 5.9.12", "product_id": "T041594-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:logging__5.9.12" } } }, { "category": "product_version_range", "name": "Logging \u003c5.8.18", "product": { "name": "Red Hat OpenShift Logging \u003c5.8.18", "product_id": "T041595" } }, { "category": "product_version", "name": "Logging 5.8.18", "product": { "name": "Red Hat OpenShift Logging 5.8.18", "product_id": "T041595-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:logging__5.8.18" } } } ], "category": "product_name", "name": "OpenShift" }, { "branches": [ { "category": "product_version", "name": "16.2", "product": { "name": "Red Hat OpenStack 16.2", "product_id": "T023999", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:16.2" } } } ], "category": "product_name", "name": "OpenStack" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "SolarWinds Orion", "product": { "name": "SolarWinds Orion", "product_id": "T024734", "product_identification_helper": { "cpe": "cpe:/a:solarwinds:orion_core_services:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c2023.3", "product": { "name": "SolarWinds Platform \u003c2023.3", "product_id": "T028897" } }, { "category": "product_version", "name": "2023.3", "product": { "name": "SolarWinds Platform 2023.3", "product_id": "T028897-fixed", "product_identification_helper": { "cpe": "cpe:/a:solarwinds:orion_platform:2023.3" } } } ], "category": "product_name", "name": "Platform" } ], "category": "vendor", "name": "SolarWinds" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Tenable Security Nessus", "product": { "name": "Tenable Security Nessus", "product_id": "T016399", "product_identification_helper": { "cpe": "cpe:/a:tenable:nessus:-" } } }, { "category": "product_version_range", "name": "\u003c10.5.0", "product": { "name": "Tenable Security Nessus \u003c10.5.0", "product_id": "T026604" } }, { "category": "product_version", "name": "10.5.0", "product": { "name": "Tenable Security Nessus 10.5.0", "product_id": "T026604-fixed", "product_identification_helper": { "cpe": "cpe:/a:tenable:nessus:10.5.0" } } } ], "category": "product_name", "name": "Nessus" }, { "category": "product_name", "name": "Tenable Security Nessus Network Monitor", "product": { "name": "Tenable Security Nessus Network Monitor", "product_id": "T016632", "product_identification_helper": { "cpe": "cpe:/a:tenable:nessus_network_monitor:-" } } } ], "category": "vendor", "name": "Tenable Security" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-11022", "product_status": { "known_affected": [ "67646", "T015844", "T016413", "T016632", "T036127", "T004914", "T016399", "T017494", "T012790", "T019354", "T023999", "T043784", "T043169", "T040074", "T026604", "T018107", "T001663", "812526", "398363", "T040951", "T021398", "T028472", "T041724", "T005119", "T012167", "T032255", "T041594", "T019402", "2951", "T002207", "T000126", "T024734", "T028897", "T030907", "T041595" ], "last_affected": [ "T025750" ] }, "release_date": "2020-05-03T22:00:00.000+00:00", "title": "CVE-2020-11022" }, { "cve": "CVE-2020-11023", "product_status": { "known_affected": [ "67646", "T015844", "T016413", "T016632", "T036127", "T004914", "T016399", "T017494", "T012790", "T019354", "T023999", "T043784", "T043169", "T040074", "T026604", "T018107", "T001663", "812526", "398363", "T040951", "T021398", "T028472", "T041724", "T005119", "T012167", "T032255", "T041594", "T019402", "2951", "T002207", "T000126", "T024734", "T028897", "T030907", "T041595" ], "last_affected": [ "T025750" ] }, "release_date": "2020-05-03T22:00:00.000+00:00", "title": "CVE-2020-11023" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…