Language:
https://www.drupal.org/project/jquery_update
https://en.wikipedia.org/wiki/Software_regression
https://html.spec.whatwg.org/multipage/custom-elements.html
https://jquery.com/upgrade-guide/3.5/#description-of-the-change
https://www.drupal.org/project/issues/drupal
https://www.drupal.org/security-team/report-issue
https://www.drupal.org/sa-core-2020-003
https://www.drupal.org/project/drupal/releases/7.70
https://www.drupal.org/sa-core-2020-002
http://www.nessus.org/u?f249edf4
http://www.nessus.org/u?07eeffa7
http://www.nessus.org/u?bc025732
Severity: Medium
ID: 136745
File Name: drupal_8_8_6.nasl
Version: 1.8
Type: remote
Family: CGI abuses
Published: 5/21/2020
Updated: 1/24/2025
Configuration: Enable paranoid mode, Enable thorough checks
Supported Sensors: Nessus
Risk Factor: Medium
Score: 5.7
Risk Factor: Medium
Base Score: 4.3
Temporal Score: 3.6
Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS Score Source: CVE-2020-11023
Risk Factor: Medium
Base Score: 6.1
Temporal Score: 5.7
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CPE: cpe:/a:drupal:drupal
Required KB Items: Settings/ParanoidReport, installed_sw/Drupal
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 5/20/2020
Vulnerability Publication Date: 4/29/2020
CISA Known Exploited Vulnerability Due Dates: 2/13/2025
CVE: CVE-2020-11022, CVE-2020-11023
IAVB: 2020-B-0030