BDU:2023-07675

Vulnerability from fstec - Published: 27.06.2015
VLAI Severity ?
Title
Уязвимость библиотеки jQuery, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю выполнить межсайтовй скриптинг
Description
Уязвимость библиотеки jQuery связана с непринятием мер по защите структуры веб-страницы. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, выполнить межсайтовый скриптинг с помощью междоменных ajax-запросов
Vendor
Oracle Corp., Novell Inc., The jQuery Foundation, NetApp Inc., AVEVA Software, LLC, Red Hat Inc., dotCMS LLC, Сообщество свободного программного обеспечения, Ruby Team
Software Name
Enterprise Manager Ops Center, Fusion Middleware MapViewer, Business Process Management Suite, JD Edwards EnterpriseOne Tools, Primavera Unifier, Hospitality Reporting and Analytics, WebCenter Sites, Oracle JDeveloper, Communications Converged Application Server, Communications WebRTC Session Controller, OpenSUSE Leap, Oracle Hospitality Guest Access, Primavera Gateway, Oracle Hospitality Materials Control, Oracle Service Bus, Oracle Healthcare Translational Research, Oracle Retail Customer Insights, Financial Services Analytical Applications Infrastructure, Financial Services Funds Transfer Pricing, Oracle Endeca Information Discovery Studio, Banking Platform, Oracle Retail Invoice Matching, Oracle Hospitality Cruise Fleet Management, jQuery, NetApp SolidFire & HCI Storage Node, InTouch Access Anywhere, Red Hat Data Grid, Red Hat JBoss A-MQ, Red Hat JBoss Fuse, dotCMS, RetireJS, Ruby, Agile Product Lifecycle Management for Process, Communications Interactive Session Recorder, Communications Services Gatekeeper, Enterprise Operations Monitor, Financial Services Data Integration Hub, Financial Services Asset Lliability Management, Financial Services Hedge Management and Ifrs valuations, Financial Services Liquidity Risk Management, Financial Services Loan Loss Forecasting and Provisioning, Financial Services Market Risk Measurement and Management, Financial Services Profitability Management, Financial Services Reconciliation Framework, Oracle Healthcare Foundation, Insurance Insbridge Rating and Underwriting, OSS Support Tools, Oracle PeopleSoft Enterprise PeopleTools, Oracle Real-Time Scheduler, Retail Allocation, Oracle Retail Sales Audit, Retail Workforce Management Software, Siebel UI Framework, Oracle Utilities Framework, Oracle Utilities Mobile Workforce Management
Software Version
12.2.2 (Enterprise Manager Ops Center), 12.3.3 (Enterprise Manager Ops Center), 12.2.1.3.0 (Fusion Middleware MapViewer), 11.1.1.9.0 (Business Process Management Suite), 12.1.3.0.0 (Business Process Management Suite), 12.2.1.3.0 (Business Process Management Suite), 9.2 (JD Edwards EnterpriseOne Tools), 16.2 (Primavera Unifier), 16.1 (Primavera Unifier), от 17.1 до 17.12 включительно (Primavera Unifier), 9.1 (Hospitality Reporting and Analytics), 11.1.1.8.0 (WebCenter Sites), 12.2.1.3.0 (WebCenter Sites), 12.1.3.0.0 (Oracle JDeveloper), 12.2.1.3.0 (Oracle JDeveloper), до 7.0.0.1 (Communications Converged Application Server), до 7.2 (Communications WebRTC Session Controller), 15.1 (OpenSUSE Leap), 4.2.0 (Oracle Hospitality Guest Access), 4.2.1 (Oracle Hospitality Guest Access), 18.8 (Primavera Unifier), 15.2 (Primavera Gateway), 16.2 (Primavera Gateway), 17.12 (Primavera Gateway), 18.1 (Oracle Hospitality Materials Control), 12.1.3.0.0 (Oracle Service Bus), 12.2.1.3.0 (Oracle Service Bus), 3.1.0 (Oracle Healthcare Translational Research), 15.0 (Oracle Retail Customer Insights), 16.0 (Oracle Retail Customer Insights), от 7.3.3 до 7.3.5 включительно (Financial Services Analytical Applications Infrastructure), от 8.0.4 до 8.0.7 включительно (Financial Services Funds Transfer Pricing), 3.2.0 (Oracle Endeca Information Discovery Studio), 2.6.0 (Banking Platform), 2.6.1 (Banking Platform), 2.6.2 (Banking Platform), 11.1.1.9.0 (Oracle JDeveloper), 15.0 (Oracle Retail Invoice Matching), 9.0.11 (Oracle Hospitality Cruise Fleet Management), до 3.0.0 (jQuery), - (NetApp SolidFire & HCI Storage Node), до 2017 Update 2 (InTouch Access Anywhere), 7.3.5 (Red Hat Data Grid), 6.3 R15 (Red Hat JBoss A-MQ), 6.3 R15 (Red Hat JBoss Fuse), 5.1.1 (dotCMS), - (RetireJS), 2.5 (Ruby), 6.2.0.0 (Agile Product Lifecycle Management for Process), 6.2.1.0 (Agile Product Lifecycle Management for Process), 6.2.2.0 (Agile Product Lifecycle Management for Process), 6.2.3.0 (Agile Product Lifecycle Management for Process), 6.2.3.1 (Agile Product Lifecycle Management for Process), 6.0 (Communications Interactive Session Recorder), 6.1 (Communications Interactive Session Recorder), 6.2 (Communications Interactive Session Recorder), 3.1.0 (Oracle Endeca Information Discovery Studio), до 6.1.0.4.0 (Communications Services Gatekeeper), 3.4 (Enterprise Operations Monitor), 4.0 (Enterprise Operations Monitor), от 8.0.0 до 8.0.7 включительно (Financial Services Analytical Applications Infrastructure), от 8.0.5 до 8.0.7 включительно (Financial Services Data Integration Hub), от 8.0.4 до 8.0.7 (Financial Services Asset Lliability Management), от 8.0.4 до 8.0.7 включительно (Financial Services Hedge Management and Ifrs valuations), от 8.0.2 до 8.0.6 включительно (Financial Services Liquidity Risk Management), от 8.0.2 до 8.0.7 включительно (Financial Services Loan Loss Forecasting and Provisioning), 8.0.5 (Financial Services Market Risk Measurement and Management), 8.0.6 (Financial Services Market Risk Measurement and Management), от 8.0.4 до 8.0.6 включительно (Financial Services Profitability Management), 8.0.5 (Financial Services Reconciliation Framework), 8.0.6 (Financial Services Reconciliation Framework), 7.1 (Oracle Healthcare Foundation), 7.2 (Oracle Healthcare Foundation), 5.2 (Insurance Insbridge Rating and Underwriting), 5.4 (Insurance Insbridge Rating and Underwriting), 5.5 (Insurance Insbridge Rating and Underwriting), 19.1 (OSS Support Tools), 8.55 (Oracle PeopleSoft Enterprise PeopleTools), 8.56 (Oracle PeopleSoft Enterprise PeopleTools), 8.57 (Oracle PeopleSoft Enterprise PeopleTools), 2.3.0 (Oracle Real-Time Scheduler), 15.0.2 (Retail Allocation), 15.0 (Oracle Retail Sales Audit), 1.60.9 (Retail Workforce Management Software), 1.64.0 (Retail Workforce Management Software), 18.10 (Siebel UI Framework), 18.11 (Siebel UI Framework), от 4.3.0.1 до 4.3.0.4 (Oracle Utilities Framework), 2.3.0 (Oracle Utilities Mobile Workforce Management), 12.1.3.0 (WebCenter Sites)
Possible Mitigations
Использование рекомендаций: Для программных продуктов NetApp Inc.: https://security.netapp.com/advisory/ntap-20210108-0004/ Для jQuery; https://snyk.io/vuln/npm:jquery:20150627 Для InTouch Access Anywhere: https://ics-cert.us-cert.gov/advisories/ICSA-18-212-04 Для программных продуктов Red Hat Inc.: https://access.redhat.com/errata/RHSA-2020:0481 https://access.redhat.com/errata/RHSA-2020:0729 Для dotCMS: https://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html Для RetireJS: https://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html Для OctoberCMS: https://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html Для openSUSE Leap и Ruby: https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ZJAMCVFC2KL342QI4W5HGYIZXTNBURQT/ Для программных продуктов Oracle Corp.: http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
Reference
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html http://seclists.org/fulldisclosure/2019/May/10 http://seclists.org/fulldisclosure/2019/May/11 http://seclists.org/fulldisclosure/2019/May/13 http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/105658 https://access.redhat.com/errata/RHSA-2020:0481 https://access.redhat.com/errata/RHSA-2020:0729 https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc https://github.com/jquery/jquery/issues/2432 https://github.com/jquery/jquery/pull/2588 https://github.com/jquery/jquery/pull/2588/commits/c254d308a7d3f1eac4d0b42837804cfffcba4bb2 https://ics-cert.us-cert.gov/advisories/ICSA-18-212-04 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731%40%3Cdev.flink.apache.org%3E https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49%40%3Cuser.flink.apache.org%3E https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2%40%3Cuser.flink.apache.org%3E https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854%40%3Cuser.flink.apache.org%3E https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6%40%3Ccommits.roller.apache.org%3E https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E https://seclists.org/bugtraq/2019/May/18 https://security.netapp.com/advisory/ntap-20210108-0004/ https://snyk.io/vuln/npm:jquery:20150627 https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec126.pdf https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html https://www.tenable.com/security/tns-2019-08
CWE
CWE-79

{
  "CVSS 2.0": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
  "CVSS 3.0": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
  "CVSS 4.0": null,
  "remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
  "remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
  "\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Oracle Corp., Novell Inc., The jQuery Foundation, NetApp Inc., AVEVA Software, LLC, Red Hat Inc., dotCMS LLC, \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, Ruby Team",
  "\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "12.2.2 (Enterprise Manager Ops Center), 12.3.3 (Enterprise Manager Ops Center), 12.2.1.3.0 (Fusion Middleware MapViewer), 11.1.1.9.0 (Business Process Management Suite), 12.1.3.0.0 (Business Process Management Suite), 12.2.1.3.0 (Business Process Management Suite), 9.2 (JD Edwards EnterpriseOne Tools), 16.2 (Primavera Unifier), 16.1 (Primavera Unifier), \u043e\u0442 17.1 \u0434\u043e 17.12 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Primavera Unifier), 9.1 (Hospitality Reporting and Analytics), 11.1.1.8.0 (WebCenter Sites), 12.2.1.3.0 (WebCenter Sites), 12.1.3.0.0 (Oracle JDeveloper), 12.2.1.3.0 (Oracle JDeveloper), \u0434\u043e 7.0.0.1 (Communications Converged Application Server), \u0434\u043e 7.2 (Communications WebRTC Session Controller), 15.1 (OpenSUSE Leap), 4.2.0 (Oracle Hospitality Guest Access), 4.2.1 (Oracle Hospitality Guest Access), 18.8 (Primavera Unifier), 15.2 (Primavera Gateway), 16.2 (Primavera Gateway), 17.12 (Primavera Gateway), 18.1 (Oracle Hospitality Materials Control), 12.1.3.0.0 (Oracle Service Bus), 12.2.1.3.0 (Oracle Service Bus), 3.1.0 (Oracle Healthcare Translational Research), 15.0 (Oracle Retail Customer Insights), 16.0 (Oracle Retail Customer Insights), \u043e\u0442 7.3.3 \u0434\u043e 7.3.5 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Financial Services Analytical Applications Infrastructure), \u043e\u0442 8.0.4 \u0434\u043e 8.0.7 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Financial Services Funds Transfer Pricing), 3.2.0 (Oracle Endeca Information Discovery Studio), 2.6.0 (Banking Platform), 2.6.1 (Banking Platform), 2.6.2 (Banking Platform), 11.1.1.9.0 (Oracle JDeveloper), 15.0 (Oracle Retail Invoice Matching), 9.0.11 (Oracle Hospitality Cruise Fleet Management), \u0434\u043e 3.0.0 (jQuery), - (NetApp SolidFire \u0026 HCI Storage Node), \u0434\u043e 2017 Update 2 (InTouch Access Anywhere), 7.3.5 (Red Hat Data Grid), 6.3 R15 (Red Hat JBoss A-MQ), 6.3 R15 (Red Hat JBoss Fuse), 5.1.1 (dotCMS), - (RetireJS), 2.5 (Ruby), 6.2.0.0 (Agile Product Lifecycle Management for Process), 6.2.1.0 (Agile Product Lifecycle Management for Process), 6.2.2.0 (Agile Product Lifecycle Management for Process), 6.2.3.0 (Agile Product Lifecycle Management for Process), 6.2.3.1 (Agile Product Lifecycle Management for Process), 6.0 (Communications Interactive Session Recorder), 6.1 (Communications Interactive Session Recorder), 6.2 (Communications Interactive Session Recorder), 3.1.0 (Oracle Endeca Information Discovery Studio), \u0434\u043e 6.1.0.4.0 (Communications Services Gatekeeper), 3.4 (Enterprise Operations Monitor), 4.0 (Enterprise Operations Monitor), \u043e\u0442 8.0.0 \u0434\u043e 8.0.7 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Financial Services Analytical Applications Infrastructure), \u043e\u0442 8.0.5 \u0434\u043e 8.0.7 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Financial Services Data Integration Hub), \u043e\u0442 8.0.4 \u0434\u043e 8.0.7 (Financial Services Asset Lliability Management), \u043e\u0442 8.0.4 \u0434\u043e 8.0.7 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Financial Services Hedge Management and Ifrs valuations), \u043e\u0442 8.0.2 \u0434\u043e 8.0.6 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Financial Services Liquidity Risk Management), \u043e\u0442 8.0.2 \u0434\u043e 8.0.7 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Financial Services Loan Loss Forecasting and Provisioning), 8.0.5 (Financial Services Market Risk Measurement and Management), 8.0.6 (Financial Services Market Risk Measurement and Management), \u043e\u0442 8.0.4 \u0434\u043e 8.0.6 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Financial Services Profitability Management), 8.0.5 (Financial Services Reconciliation Framework), 8.0.6 (Financial Services Reconciliation Framework), 7.1 (Oracle Healthcare Foundation), 7.2 (Oracle Healthcare Foundation), 5.2 (Insurance Insbridge Rating and Underwriting), 5.4 (Insurance Insbridge Rating and Underwriting), 5.5 (Insurance Insbridge Rating and Underwriting), 19.1 (OSS Support Tools), 8.55 (Oracle PeopleSoft Enterprise PeopleTools), 8.56 (Oracle PeopleSoft Enterprise PeopleTools), 8.57 (Oracle PeopleSoft Enterprise PeopleTools), 2.3.0 (Oracle Real-Time Scheduler), 15.0.2 (Retail Allocation), 15.0 (Oracle Retail Sales Audit), 1.60.9 (Retail Workforce Management Software), 1.64.0 (Retail Workforce Management Software), 18.10 (Siebel UI Framework), 18.11 (Siebel UI Framework), \u043e\u0442 4.3.0.1 \u0434\u043e 4.3.0.4 (Oracle Utilities Framework), 2.3.0 (Oracle Utilities Mobile Workforce Management), 12.1.3.0 (WebCenter Sites)",
  "\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 NetApp Inc.:\nhttps://security.netapp.com/advisory/ntap-20210108-0004/\n\n\u0414\u043b\u044f jQuery;\nhttps://snyk.io/vuln/npm:jquery:20150627\n\n\u0414\u043b\u044f InTouch Access Anywhere:\nhttps://ics-cert.us-cert.gov/advisories/ICSA-18-212-04\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/errata/RHSA-2020:0481\nhttps://access.redhat.com/errata/RHSA-2020:0729\n\n\u0414\u043b\u044f dotCMS:\nhttps://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html\n\n\u0414\u043b\u044f RetireJS:\nhttps://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html\n\n\u0414\u043b\u044f OctoberCMS:\nhttps://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html\n\n\u0414\u043b\u044f openSUSE Leap \u0438 Ruby:\nhttps://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ZJAMCVFC2KL342QI4W5HGYIZXTNBURQT/\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Oracle Corp.:\nhttp://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html\nhttps://www.oracle.com/security-alerts/cpuapr2020.html\nhttps://www.oracle.com/security-alerts/cpujan2020.html\nhttps://www.oracle.com/security-alerts/cpujul2020.html\nhttps://www.oracle.com/security-alerts/cpuoct2020.html\nhttps://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html\nhttps://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html\nhttps://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\nhttps://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
  "\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "27.06.2015",
  "\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "11.11.2023",
  "\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "11.11.2023",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2023-07675",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2015-9251, ICSA-18-212-04",
  "\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
  "\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
  "\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Enterprise Manager Ops Center, Fusion Middleware MapViewer, Business Process Management Suite, JD Edwards EnterpriseOne Tools, Primavera Unifier, Hospitality Reporting and Analytics, WebCenter Sites, Oracle JDeveloper, Communications Converged Application Server, Communications WebRTC Session Controller, OpenSUSE Leap, Oracle Hospitality Guest Access, Primavera Gateway, Oracle Hospitality Materials Control, Oracle Service Bus, Oracle Healthcare Translational Research, Oracle Retail Customer Insights, Financial Services Analytical Applications Infrastructure, Financial Services Funds Transfer Pricing, Oracle Endeca Information Discovery Studio, Banking Platform, Oracle Retail Invoice Matching, Oracle Hospitality Cruise Fleet Management, jQuery, NetApp SolidFire \u0026 HCI Storage Node, InTouch Access Anywhere, Red Hat Data Grid, Red Hat JBoss A-MQ, Red Hat JBoss Fuse, dotCMS, RetireJS, Ruby, Agile Product Lifecycle Management for Process, Communications Interactive Session Recorder, Communications Services Gatekeeper, Enterprise Operations Monitor, Financial Services Data Integration Hub, Financial Services Asset Lliability Management, Financial Services Hedge Management and Ifrs valuations, Financial Services Liquidity Risk Management, Financial Services Loan Loss Forecasting and Provisioning, Financial Services Market Risk Measurement and Management, Financial Services Profitability Management, Financial Services Reconciliation Framework, Oracle Healthcare Foundation, Insurance Insbridge Rating and Underwriting, OSS Support Tools, Oracle PeopleSoft Enterprise PeopleTools, Oracle Real-Time Scheduler, Retail Allocation, Oracle Retail Sales Audit, Retail Workforce Management Software, Siebel UI Framework, Oracle Utilities Framework, Oracle Utilities Mobile Workforce Management",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Novell Inc. OpenSUSE Leap 15.1 ",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 jQuery, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u043f\u0440\u0438\u043d\u044f\u0442\u0438\u0435\u043c \u043c\u0435\u0440 \u043f\u043e \u0437\u0430\u0449\u0438\u0442\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b \u0432\u0435\u0431-\u0441\u0442\u0440\u0430\u043d\u0438\u0446\u044b, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043c\u0435\u0436\u0441\u0430\u0439\u0442\u043e\u0432\u0439 \u0441\u043a\u0440\u0438\u043f\u0442\u0438\u043d\u0433",
  "\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043f\u0440\u0438\u043d\u044f\u0442\u0438\u0435 \u043c\u0435\u0440 \u043f\u043e \u0437\u0430\u0449\u0438\u0442\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b \u0432\u0435\u0431-\u0441\u0442\u0440\u0430\u043d\u0438\u0446\u044b (\u0438\u043b\u0438 \\\u00ab\u041c\u0435\u0436\u0441\u0430\u0439\u0442\u043e\u0432\u0430\u044f \u0441\u0446\u0435\u043d\u0430\u0440\u043d\u0430\u044f \u0430\u0442\u0430\u043a\u0430\\\u00bb) (CWE-79)",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 jQuery \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043f\u0440\u0438\u043d\u044f\u0442\u0438\u0435\u043c \u043c\u0435\u0440 \u043f\u043e \u0437\u0430\u0449\u0438\u0442\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b \u0432\u0435\u0431-\u0441\u0442\u0440\u0430\u043d\u0438\u0446\u044b. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043c\u0435\u0436\u0441\u0430\u0439\u0442\u043e\u0432\u044b\u0439 \u0441\u043a\u0440\u0438\u043f\u0442\u0438\u043d\u0433 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043c\u0435\u0436\u0434\u043e\u043c\u0435\u043d\u043d\u044b\u0445 ajax-\u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432",
  "\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
  "\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
  "\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u043d\u044a\u0435\u043a\u0446\u0438\u044f",
  "\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html\nhttp://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html\nhttp://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html\nhttp://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html\nhttp://seclists.org/fulldisclosure/2019/May/10\nhttp://seclists.org/fulldisclosure/2019/May/11\nhttp://seclists.org/fulldisclosure/2019/May/13\nhttp://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html\nhttp://www.securityfocus.com/bid/105658\nhttps://access.redhat.com/errata/RHSA-2020:0481\nhttps://access.redhat.com/errata/RHSA-2020:0729\nhttps://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc\nhttps://github.com/jquery/jquery/issues/2432\nhttps://github.com/jquery/jquery/pull/2588\nhttps://github.com/jquery/jquery/pull/2588/commits/c254d308a7d3f1eac4d0b42837804cfffcba4bb2\nhttps://ics-cert.us-cert.gov/advisories/ICSA-18-212-04\nhttps://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601\nhttps://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731%40%3Cdev.flink.apache.org%3E\nhttps://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49%40%3Cuser.flink.apache.org%3E\nhttps://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E\nhttps://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2%40%3Cuser.flink.apache.org%3E\nhttps://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854%40%3Cuser.flink.apache.org%3E\nhttps://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E\nhttps://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6%40%3Ccommits.roller.apache.org%3E\nhttps://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E\nhttps://seclists.org/bugtraq/2019/May/18\nhttps://security.netapp.com/advisory/ntap-20210108-0004/\nhttps://snyk.io/vuln/npm:jquery:20150627\nhttps://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec126.pdf\nhttps://www.oracle.com/security-alerts/cpuapr2020.html\nhttps://www.oracle.com/security-alerts/cpujan2020.html\nhttps://www.oracle.com/security-alerts/cpuoct2020.html\nhttps://www.oracle.com/security-alerts/cpuoct2020.html\nhttps://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html\nhttps://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html\nhttps://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\nhttps://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html\nhttps://www.tenable.com/security/tns-2019-08",
  "\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
  "\u0422\u0438\u043f \u041f\u041e": "\u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u041f\u041e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c, \u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0437\u0430\u0449\u0438\u0442\u044b, \u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0410\u0421\u0423 \u0422\u041f, \u041f\u041e \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
  "\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-79",
  "\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,4)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,1)"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…