1782 lines
218 KiB
Text
1782 lines
218 KiB
Text
<!DOCTYPE html>
|
||
|
||
<html lang="en">
|
||
<head>
|
||
|
||
|
||
|
||
<title>NVD - CVE-2021-3710</title>
|
||
|
||
<meta http-equiv="content-type" content="text/html; charset=UTF-8" />
|
||
<meta http-equiv="content-style-type" content="text/css" />
|
||
<meta http-equiv="content-script-type" content="text/javascript" />
|
||
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
|
||
|
||
|
||
<link href="/site-scripts/font-awesome/css/font-awesome.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link href="/site-media/bootstrap/css/bootstrap.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link href="/site-media/bootstrap/css/bootstrap-theme.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link
|
||
href="/site-scripts/eonasdan-bootstrap-datetimepicker/build/css/bootstrap-datetimepicker.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
|
||
|
||
<link href="/site-media/css/nist-fonts.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/css/base-style.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/css/media-resize.css" type="text/css"
|
||
rel="stylesheet" />
|
||
|
||
|
||
<meta name="theme-color" content="#000000">
|
||
|
||
|
||
<script src="/site-scripts/jquery/dist/jquery.min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/jquery-visible/jquery.visible.min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/underscore/underscore-min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/bootstrap/js/bootstrap.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/moment/min/moment.min.js"
|
||
type="text/javascript"></script>
|
||
<script
|
||
src="/site-scripts/eonasdan-bootstrap-datetimepicker/build/js/bootstrap-datetimepicker.min.js"
|
||
type="text/javascript"></script>
|
||
|
||
|
||
<script src="/site-media/js/megamenu.js" type="text/javascript"></script>
|
||
<script src="/site-media/js/nist-exit-script.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/forms.js" type="text/javascript"></script>
|
||
|
||
<script
|
||
src="/site-media/js/federated-analytics.all.min.js?agency=NIST&subagency=nvd&pua=UA-37115410-41&yt=true"
|
||
type="text/javascript" id="_fed_an_js_tag"></script>
|
||
|
||
<!-- Google tag (gtag.js) -->
|
||
<script async src="https://www.googletagmanager.com/gtag/js?id=G-4KKFZP12LQ"></script>
|
||
<script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-4KKFZP12LQ'); </script>
|
||
|
||
|
||
<style id="antiClickjack">
|
||
body>* {
|
||
display: none !important;
|
||
}
|
||
|
||
#antiClickjack {
|
||
display: block !important;
|
||
}
|
||
</style>
|
||
<noscript>
|
||
<style id="antiClickjackNoScript">
|
||
body>* {
|
||
display: block !important;
|
||
}
|
||
|
||
#antiClickjack {
|
||
display: none !important;
|
||
}
|
||
</style>
|
||
</noscript>
|
||
<script type="text/javascript" id="antiClickjackScript">
|
||
if (self === top) {
|
||
// no clickjacking
|
||
var antiClickjack = document.getElementById("antiClickjack");
|
||
antiClickjack.parentNode.removeChild(antiClickjack);
|
||
} else {
|
||
setTimeout(tryForward(), 5000);
|
||
}
|
||
|
||
function tryForward() {
|
||
top.location = self.location;
|
||
}
|
||
</script>
|
||
<meta charset="UTF-8">
|
||
|
||
<link href="/site-media/css/nvd-style.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/images/favicons/apple-touch-icon.png"
|
||
rel="apple-touch-icon" type="image/png" sizes="180x180" />
|
||
<link href="/site-media/images/favicons/favicon-32x32.png"
|
||
rel="icon" type="image/png" sizes="32x32" />
|
||
<link href="/site-media/images/favicons/favicon-16x16.png"
|
||
rel="icon" type="image/png" sizes="16x16" />
|
||
<link href="/site-media/images/favicons/manifest.json"
|
||
rel="manifest" />
|
||
<link href="/site-media/images/favicons/safari-pinned-tab.svg"
|
||
rel="mask-icon" color="#000000" />
|
||
<link href="/site-media/images/favicons/favicon.ico"
|
||
rel="shortcut icon" />
|
||
<meta name="msapplication-config" content="/site-media/images/favicons/browserconfig.xml" />
|
||
<link href="/site-media/images/favicons/favicon.ico"
|
||
rel="shortcut icon" type="image/x-icon" />
|
||
<link href="/site-media/images/favicons/favicon.ico" rel="icon"
|
||
type="image/x-icon" />
|
||
<meta charset="UTF-8">
|
||
<script src="/site-media/js/vulnerability/vulnDetail.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/vulnerability/cvssVulnDetail.js"
|
||
type="text/javascript"></script>
|
||
|
||
</head>
|
||
<body>
|
||
<header role="banner" title="Site Banner">
|
||
<div id="antiClickjack" style="display: none">
|
||
<h1>You are viewing this page in an unauthorized frame window.</h1>
|
||
<p>
|
||
This is a potential security issue, you are being redirected to
|
||
<a href="https://nvd.nist.gov">https://nvd.nist.gov</a>
|
||
</p>
|
||
</div>
|
||
<div>
|
||
<section class="usa-banner" aria-label="Official government website">
|
||
<div class="usa-accordion container">
|
||
<header class="usa-banner__header">
|
||
<noscript>
|
||
<p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p>
|
||
</noscript>
|
||
<img class="usa-banner__header-flag"
|
||
src="/site-media/images/usbanner/us_flag_small.png" alt="U.S. flag">
|
||
|
||
<span class="usa-banner__header-text">An official website of the United States government</span>
|
||
|
||
<button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="false" aria-controls="gov-banner">
|
||
<span class="usa-banner__button-text">Here's how you know</span>
|
||
</button>
|
||
</header>
|
||
<div class="usa-banner__content usa-accordion__content collapse" role="tabpanel" id="gov-banner" aria-expanded="true">
|
||
<div class="row">
|
||
<div class="col-md-5 col-sm-12">
|
||
<div class="row">
|
||
<div class="col-sm-2 col-xs-3">
|
||
<img class="usa-banner__icon usa-media-block__img"
|
||
src="/site-media/images/usbanner/icon-dot-gov.svg" alt="Dot gov">
|
||
</div>
|
||
<div class="col-sm-10 col-xs-9">
|
||
<p>
|
||
<strong>Official websites use .gov</strong>
|
||
<br>
|
||
A <strong>.gov</strong> website belongs to an official government organization in the United States.
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-md-5 col-sm-12">
|
||
<div class="row">
|
||
<div class="col-sm-2 col-xs-3">
|
||
<img class="usa-banner__icon usa-media-block__img"
|
||
src="/site-media/images/usbanner/icon-https.svg" alt="Https">
|
||
</div>
|
||
<div class="col-sm-10 col-xs-9">
|
||
<p>
|
||
<strong>Secure .gov websites use HTTPS</strong>
|
||
<br>
|
||
A <strong>lock</strong> (<img class="usa-banner__lock"
|
||
src="/site-media/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</section>
|
||
</div>
|
||
<div>
|
||
<div>
|
||
<nav id="navbar" class="navbar">
|
||
<div id="nist-menu-container" class="container">
|
||
<div class="row">
|
||
<!-- Brand -->
|
||
<div class="col-xs-6 col-md-4 navbar-header"
|
||
style="height:104px">
|
||
<a class="navbar-brand"
|
||
href="https://www.nist.gov"
|
||
target="_blank" rel="noopener noreferrer"
|
||
id="navbar-brand-image"
|
||
style="padding-top: 36px">
|
||
|
||
<img alt="National Institute of Standards and Technology"
|
||
src="/site-media/images/nist/nist-logo.svg"
|
||
width="110" height="30">
|
||
</a>
|
||
</div>
|
||
<div class="col-xs-6 col-md-8 navbar-nist-logo">
|
||
<span id="nvd-menu-button" class="pull-right" style="margin-top: 26px"> <a href="#">
|
||
<span class="fa fa-bars"></span> <span id="nvd-menu-full-text"><span
|
||
class="hidden-xxs">NVD </span>MENU</span>
|
||
</a>
|
||
</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="main-menu-row container">
|
||
<!-- Collect the nav links, forms, and other content for toggling -->
|
||
<div id="main-menu-drop" class="col-lg-12" style="display: none;">
|
||
<ul>
|
||
|
||
<li><a href="/general"> General <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-general"
|
||
data-expander-name="general" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="general">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/nvd-dashboard">NVD Dashboard</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://www.nist.gov/itl/nvd">News and Status Updates</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/faq">FAQ</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/visualizations">Visualizations</a>
|
||
</p>
|
||
<p>
|
||
<a href="/general/legal-disclaimer">Legal Disclaimer</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/vuln"> Vulnerabilities <span
|
||
class="expander fa fa-plus"
|
||
id="nvd-header-menu-vulnerabilities"
|
||
data-expander-name="vulnerabilities" data-expanded="false">
|
||
<span class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="vulnerabilities">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/search">Search & Statistics</a>
|
||
</p>
|
||
<p>
|
||
<a href="/vuln/categories">Weakness Types</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/data-feeds">Legacy Data Feeds</a>
|
||
</p>
|
||
<p>
|
||
<a href="/vuln/vendor-comments">Vendor Comments</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/cvmap">CVMAP</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/vuln-metrics/cvss#"> Vulnerability Metrics <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-metrics"
|
||
data-expander-name="metrics" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="metrics">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v4-calculator">CVSS v4.0
|
||
Calculators</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v3-calculator">CVSS v3.x
|
||
Calculators</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v2-calculator">CVSS v2.0
|
||
Calculator</a>
|
||
</p>
|
||
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/products"> Products <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-products"
|
||
data-expander-name="products" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="products">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe">CPE Dictionary</a>
|
||
</p>
|
||
<p>
|
||
<a href="/products/cpe/search">CPE Search</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe/statistics">CPE Statistics</a>
|
||
</p>
|
||
<p>
|
||
<a href="/products/swid">SWID</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4"></div>
|
||
</div>
|
||
</div></li>
|
||
<li>
|
||
<a href="/developers">Developers<span
|
||
class="expander fa fa-plus" id="nvd-header-menu-developers"
|
||
data-expander-name="developers" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="developers">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/start-here">Start Here</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/request-an-api-key">Request an API Key</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/vulnerabilities">Vulnerabilities</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/products">Products</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/data-sources">Data Sources</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/terms-of-use">Terms of Use</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</li>
|
||
<li><a href="/contact"> Contact NVD </a></li>
|
||
<li><a href="/other"> Other Sites <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-othersites"
|
||
data-expander-name="otherSites" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="otherSites">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="https://ncp.nist.gov">Checklist (NCP) Repository</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://ncp.nist.gov/cce">Configurations (CCE)</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search">800-53 Controls</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/scap-validation-program">SCAP
|
||
Validated Tools</a>
|
||
</p>
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/security-content-automation-protocol">SCAP</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/united-states-government-configuration-baseline">USGCB</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
|
||
<li><a href="/search"> Search <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-search"
|
||
data-expander-name="search" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="search">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/search">Vulnerability Search</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe/search">CPE Search</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
|
||
|
||
|
||
|
||
</ul>
|
||
</div>
|
||
<!-- /#mobile-nav-container -->
|
||
</div>
|
||
|
||
</nav>
|
||
<section id="itl-header" class="has-menu">
|
||
<div class="container">
|
||
<div class="row">
|
||
<div class="col-sm-12 col-md-8">
|
||
<h2 class="hidden-xs hidden-sm">
|
||
<a href="https://www.nist.gov/itl" target="_blank" rel="noopener noreferrer">Information Technology Laboratory</a>
|
||
</h2>
|
||
<h1 class="hidden-xs hidden-sm">
|
||
<a id="nvd-header-link"
|
||
href="/">National Vulnerability Database</a>
|
||
</h1>
|
||
<h1 class="hidden-xs text-center hidden-md hidden-lg"
|
||
>National Vulnerability Database</h1>
|
||
<h1 class="hidden-sm hidden-md hidden-lg text-center"
|
||
>NVD</h1>
|
||
|
||
</div>
|
||
<div class="col-sm-12 col-md-4">
|
||
<a style="width: 100%; text-align: center; display: block;padding-top: 14px">
|
||
<img id="img-logo-nvd-lg"
|
||
alt="National Vulnerability Database"
|
||
src="/site-media/images/F_NIST-Logo-NVD-white.svg"
|
||
width="500" height="100">
|
||
</a>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</section>
|
||
|
||
|
||
</div>
|
||
</div>
|
||
</header>
|
||
<main>
|
||
<div>
|
||
<div id="body-section" class="container">
|
||
<div class="row">
|
||
<ol class="breadcrumb">
|
||
<li><a href="/vuln" class="CMSBreadCrumbsLink">Vulnerabilities</a></li>
|
||
</ol>
|
||
</div>
|
||
<div>
|
||
<style>
|
||
/* wrap the words for CVSS v4 */
|
||
#nistv4Metric {
|
||
word-wrap: break-word;
|
||
}
|
||
</style>
|
||
|
||
<script>
|
||
/*<![CDATA[*/
|
||
var vuln = {
|
||
nistV4Present: false,
|
||
cnaV4Present: false,
|
||
nistV3Present: true,
|
||
cnaV3Present: true,
|
||
nistV2Present: true,
|
||
cnaV2Present: false
|
||
};
|
||
/*]]>*/
|
||
</script>
|
||
|
||
|
||
<div>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
|
||
|
||
|
||
<div id="vulnDetailPanel">
|
||
<table id="vulnDetailTableView" style="border-collapse: collapse;">
|
||
<tr>
|
||
<td colspan="2">
|
||
|
||
<h2 data-testid="page-header">
|
||
<i class="fa fa-bug fa-flip-vertical"></i><span
|
||
data-testid="page-header-vuln-id">CVE-2021-3710</span>
|
||
Detail
|
||
</h2>
|
||
|
||
|
||
|
||
<div class="row">
|
||
<div class="col-lg-9 col-md-7 col-sm-12">
|
||
<div id="vulnShowWarningDiv"
|
||
data-testid="vuln-warning-container">
|
||
<div
|
||
role="alert" data-testid="vuln-warning-alert-container" class="bs-callout bs-callout-info">
|
||
<strong class="h4Size"><span
|
||
data-testid="vuln-warning-status-name">Modified</span></strong>
|
||
<hr/>
|
||
<p data-testid="vuln-warning-banner-content">This CVE record has been updated after NVD enrichment efforts were completed. Enrichment data supplied by the NVD may require amendment due to these changes.</p>
|
||
</div>
|
||
</div>
|
||
|
||
<h3 id="vulnDescriptionTitle"
|
||
data-testid="vuln-description-title">Description </h3>
|
||
|
||
<p data-testid="vuln-description">An information disclosure via path traversal was discovered in apport/hookutils.py function read_file(). This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior to 2.20.1-0ubuntu2.30+esm2; 2.20.9 versions prior to 2.20.9-0ubuntu7.26; 2.20.11 versions prior to 2.20.11-0ubuntu27.20; 2.20.11 versions prior to 2.20.11-0ubuntu65.3;</p><br/>
|
||
|
||
|
||
|
||
|
||
|
||
<!-- CVSS Severity and Vector Strings -->
|
||
<div id="vulnCvssPanel" data-testid="vuln-cvss-container"
|
||
class="row bs-callout bs-callout-success cvssVulnDetail">
|
||
<h3 style="display: inline" title="CVSS is not a measure of risk">Metrics</h3>
|
||
 
|
||
<div id="cvssVulnDetailBtn" class="btn-group">
|
||
<button id="btn-cvss4" type="button" title="Click here to view CVSS 4.0 data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 4.0
|
||
</button>
|
||
<button id="btn-cvss3" type="button" title="Click here to view CVSS 3.x data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 3.x
|
||
</button>
|
||
<button id="btn-cvss2" type="button" title="Click here to view CVSS 2.0 data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 2.0
|
||
</button>
|
||
</div>
|
||
|
||
|
||
<div id="cvssEnrichmentNotes">
|
||
<i>
|
||
<small>
|
||
NVD enrichment efforts reference publicly available information to associate
|
||
vector strings. CVSS information contributed by other sources is also
|
||
displayed.
|
||
</small>
|
||
</i>
|
||
</div>
|
||
|
||
<!-- CVSS v4.0 -->
|
||
<div class="container-fluid" id="Vuln4CvssPanel" data-testid="vuln-cvss4-panel">
|
||
<strong>CVSS 4.0 Severity and Vector Strings:</strong>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<br/>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon" alt="NIST CVSS score">
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss4-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong> </strong><span
|
||
class="severityDetail"> <a
|
||
id="Cvss4NistCalculatorAnchorNA"
|
||
class="label label-default"
|
||
data-testid="vuln-cvss4-panel-score-na">N/A</a></span></span>
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
|
||
<span> <span
|
||
data-testid="vuln-cvss4-nist-vector-na">NVD assessment
|
||
not yet provided.</span></span> <input type="hidden"
|
||
id="nistV4MetricHidden"
|
||
value=""/>
|
||
</div>
|
||
</div>
|
||
<!-- CNA -->
|
||
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
|
||
|
||
</div>
|
||
|
||
|
||
<!-- CVSS V3.x -->
|
||
<div class="container-fluid" id="Vuln3CvssPanel" data-testid="vuln-cvss3-panel"
|
||
style="display: none;">
|
||
<strong>CVSS 3.x Severity and Vector Strings:</strong>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<br/>
|
||
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon" alt="NIST CVSS score">
|
||
|
||
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss3-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"> <a
|
||
id="Cvss3NistCalculatorAnchor"
|
||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2021-3710&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N&version=3.1&source=NIST"
|
||
data-testid="vuln-cvss3-panel-score"
|
||
class="label label-warning">5.5 MEDIUM</a>
|
||
</span></span>
|
||
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
<span><strong>Vector:</strong>
|
||
<span data-testid="vuln-cvss3-nist-vector"
|
||
class="tooltipCvss3NistMetrics">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span></span>
|
||
<input type="hidden"
|
||
id="nistV3MetricHidden"
|
||
value="<span id = 'nistV3Metric' style = 'display:none' > <strong style ='font-size:1.2em' > CVSS v3.1 Severity and Metrics:</strong> <p data-testid='vuln-cvssv3-score-container'> <strong>Base Score: </strong> <span data-testid='vuln-cvssv3-base-score'>5.5 </span><span data-testid='vuln-cvssv3-base-score-severity'>MEDIUM</span> <br /> <strong>Vector: </strong> <span data-testid='vuln-cvssv3-vector'> AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N </span> <br /> <strong>Impact Score: </strong> <span data-testid='vuln-cvssv3-impact-score'> 3.6 </span> <br /> <strong>Exploitability Score: </strong> <span data-testid='vuln-cvssv3-exploitability-score'> 1.8 </span> </p> <hr /> <p data-testid='vuln-cvssv3-metrics-container'> <strong>Attack Vector (AV): </strong> <span data-testid='vuln-cvssv3-av'> Local </span> <br /> <strong>Attack Complexity (AC): </strong> <span data-testid='vuln-cvssv3-ac'> Low </span> <br /> <strong>Privileges Required (PR): </strong> <span data-testid='vuln-cvssv3-pr'> Low </span> <br /> <strong>User Interaction (UI): </strong> <span data-testid='vuln-cvssv3-ui'> None </span> <br /> <strong>Scope (S): </strong> <span data-testid='vuln-cvssv3-s'> Unchanged </span> <br /> <strong>Confidentiality (C): </strong> <span data-testid='vuln-cvssv3-c'> High </span> <br /> <strong>Integrity (I): </strong> <span data-testid='vuln-cvssv3-i'> None </span> <br /> <strong>Availability (A): </strong> <span data-testid='vuln-cvssv3-a'> None </span> </p> </span> "/>
|
||
|
||
</div>
|
||
|
||
|
||
</div>
|
||
<!-- CNA -->
|
||
<div class="row no-gutters">
|
||
|
||
<br/>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
|
||
<div id="v3CnaIconContributor">
|
||
<img src="/site-media/images/NVD_Contributor_Stack_Plain.svg"
|
||
class="cvssNvdIcon"
|
||
alt="Nist CVSS score does not match with CNA score">
|
||
|
||
</div>
|
||
|
||
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>CNA:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss3-source-cna">Canonical Ltd.</span>
|
||
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"> <a
|
||
id="Cvss3CnaCalculatorAnchor"
|
||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2021-3710&vector=AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N&version=3.1&source=Canonical%20Ltd."
|
||
data-testid="vuln-cvss3-cna-panel-score"
|
||
class="label label-warning">6.5 MEDIUM</a></span></span>
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
<span><strong>Vector:</strong> <span
|
||
data-testid="vuln-cvss3-cna-vector"
|
||
class="tooltipCvss3CnaMetrics">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N</span></span>
|
||
<input type="hidden" id="cnaV3MetricHidden"
|
||
value="<span id = 'nistV3Metric' style = 'display:none' > <strong style ='font-size:1.2em' > CVSS v3.1 Severity and Metrics:</strong> <p data-testid='vuln-cvssv3-score-container'> <strong>Base Score: </strong> <span data-testid='vuln-cvssv3-base-score'>6.5 </span><span data-testid='vuln-cvssv3-base-score-severity'>MEDIUM</span> <br /> <strong>Vector: </strong> <span data-testid='vuln-cvssv3-vector'> AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N </span> <br /> <strong>Impact Score: </strong> <span data-testid='vuln-cvssv3-impact-score'> 4.0 </span> <br /> <strong>Exploitability Score: </strong> <span data-testid='vuln-cvssv3-exploitability-score'> 2.0 </span> </p> <hr /> <p data-testid='vuln-cvssv3-metrics-container'> <strong>Attack Vector (AV): </strong> <span data-testid='vuln-cvssv3-av'> Local </span> <br /> <strong>Attack Complexity (AC): </strong> <span data-testid='vuln-cvssv3-ac'> Low </span> <br /> <strong>Privileges Required (PR): </strong> <span data-testid='vuln-cvssv3-pr'> Low </span> <br /> <strong>User Interaction (UI): </strong> <span data-testid='vuln-cvssv3-ui'> None </span> <br /> <strong>Scope (S): </strong> <span data-testid='vuln-cvssv3-s'> Changed </span> <br /> <strong>Confidentiality (C): </strong> <span data-testid='vuln-cvssv3-c'> High </span> <br /> <strong>Integrity (I): </strong> <span data-testid='vuln-cvssv3-i'> None </span> <br /> <strong>Availability (A): </strong> <span data-testid='vuln-cvssv3-a'> None </span> </p> </span> "/>
|
||
</div>
|
||
</div>
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
|
||
|
||
<!-- <div id="cvss3FootNote" class="cvssFootNote" >-->
|
||
<!-- <br/><br/>-->
|
||
<!-- <span id = "cvss3FootNoteSection" th:utext="${cvssData.cvss3FootNoteHtml}"></span>-->
|
||
<!-- </div>-->
|
||
</div>
|
||
|
||
<!-- CVSS V2.0 -->
|
||
<div class="container-fluid" id="Vuln2CvssPanel" data-testid="vuln-cvss2-panel"
|
||
style="display: none;">
|
||
<strong>CVSS 2.0 Severity and Vector Strings:</strong> <br/> <br/>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon"
|
||
alt="National Institute of Standards and Technology">
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span
|
||
data-testid="vuln-cvss2-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"> <a
|
||
id="Cvss2CalculatorAnchor"
|
||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2021-3710&vector=(AV:L/AC:M/Au:N/C:C/I:N/A:N)&version=2.0&source=NIST" class="label label-warning">4.7 MEDIUM</a></span></span>
|
||
|
||
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
<span><strong>Vector:</strong>
|
||
<span data-testid="vuln-cvss2-panel-vector"
|
||
class="tooltipCvss2NistMetrics">(AV:L/AC:M/Au:N/C:C/I:N/A:N)</span></span> <input type="hidden"
|
||
id="nistV2MetricHidden"
|
||
value="<span id ='cnaV2Metric' style='display:none'><strong style='font-size:1.2em' >CVSS v2.0 Severity and Metrics:</strong><p data-testid='vuln-cvssv2-score-container'><strong>Base Score: </strong><span data-testid='vuln-cvssv2-base-score'>4.7 </span><span data-testid='vuln-cvssv2-base-score-severity'>MEDIUM</span><br /><strong>Vector: </strong><span data-testid='vuln-cvssv2-vector'>(AV:L/AC:M/Au:N/C:C/I:N/A:N)</span><br /><strong>Impact Subscore: </strong><span data-testid='vuln-cvssv2-impact-subscore'>6.9</span><br /><strong>Exploitability Subscore: </strong><span data-testid='vuln-cvssv2-exploitability-score'>3.4</span></p><hr /><p data-testid='vuln-cvssv2-metrics-container'><strong>Access Vector (AV): </strong><span data-testid='vuln-cvssv2-av'>Local</span><br /><strong>Access Complexity (AC): </strong><span data-testid='vuln-cvssv2-ac'>Medium</span><br /><strong>Authentication (AU): </strong><span data-testid='vuln-cvssv2-au'>None</span><br /><strong>Confidentiality (C): </strong><span data-testid='vuln-cvssv3-c'>Complete</span><br /><strong>Integrity (I): </strong><span data-testid='vuln-cvssv2-i'>None</span><br /><strong>Availability (A): </strong><span data-testid='vuln-cvssv2-a'>None</span><br /><strong>Additional Information: </strong><br/><span data-testid='vuln-cvssv2-additional'>Allows unauthorized disclosure of information<br/></span></p></span>"/>
|
||
</div>
|
||
</div>
|
||
<!-- CNA -->
|
||
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
<!-- <div id = "cvss2FootNote" class="cvssFootNote" >-->
|
||
<!-- <br/><br/>-->
|
||
<!-- <span id = "cvss2FootNoteSection" th:utext="${cvssData.cvss2FootNoteHtml}"></span>-->
|
||
<!-- </div>-->
|
||
</div>
|
||
</div>
|
||
|
||
|
||
<div class="row col-sm-12">
|
||
|
||
|
||
|
||
<div id="vulnHyperlinksPanel">
|
||
<h3>References to Advisories, Solutions, and Tools</h3>
|
||
<p>
|
||
By selecting these links, you will be leaving NIST webspace.
|
||
We have provided these links to other web sites because they
|
||
may have information that would be of interest to you. No
|
||
inferences should be drawn on account of other sites being
|
||
referenced, or not, from this page. There may be other web
|
||
sites that are more appropriate for your purpose. NIST does
|
||
not necessarily endorse the views expressed, or concur with
|
||
the facts presented on these sites. Further, NIST does not
|
||
endorse any commercial products that may be mentioned on
|
||
these sites. Please address comments about this page to <a
|
||
href="mailto:nvd@nist.gov">nvd@nist.gov</a>.
|
||
</p>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-hyperlinks-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Hyperlink</th>
|
||
<th>Resource</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-0">
|
||
<td data-testid="vuln-hyperlinks-link-0">
|
||
<a
|
||
href="https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1933832"
|
||
target="_blank" rel="noopener noreferrer">https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1933832</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-0">
|
||
<span>
|
||
<span class="badge">Exploit</span>
|
||
</span><span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-1">
|
||
<td data-testid="vuln-hyperlinks-link-1">
|
||
<a
|
||
href="https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1933832"
|
||
target="_blank" rel="noopener noreferrer">https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1933832</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-1">
|
||
<span>
|
||
<span class="badge">Exploit</span>
|
||
</span><span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-2">
|
||
<td data-testid="vuln-hyperlinks-link-2">
|
||
<a
|
||
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3710"
|
||
target="_blank" rel="noopener noreferrer">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3710</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-2">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-3">
|
||
<td data-testid="vuln-hyperlinks-link-3">
|
||
<a
|
||
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3710"
|
||
target="_blank" rel="noopener noreferrer">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3710</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-3">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-4">
|
||
<td data-testid="vuln-hyperlinks-link-4">
|
||
<a
|
||
href="https://ubuntu.com/security/notices/USN-5077-1"
|
||
target="_blank" rel="noopener noreferrer">https://ubuntu.com/security/notices/USN-5077-1</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-4">
|
||
<span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-5">
|
||
<td data-testid="vuln-hyperlinks-link-5">
|
||
<a
|
||
href="https://ubuntu.com/security/notices/USN-5077-1"
|
||
target="_blank" rel="noopener noreferrer">https://ubuntu.com/security/notices/USN-5077-1</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-5">
|
||
<span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-6">
|
||
<td data-testid="vuln-hyperlinks-link-6">
|
||
<a
|
||
href="https://ubuntu.com/security/notices/USN-5077-2"
|
||
target="_blank" rel="noopener noreferrer">https://ubuntu.com/security/notices/USN-5077-2</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-6">
|
||
<span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-7">
|
||
<td data-testid="vuln-hyperlinks-link-7">
|
||
<a
|
||
href="https://ubuntu.com/security/notices/USN-5077-2"
|
||
target="_blank" rel="noopener noreferrer">https://ubuntu.com/security/notices/USN-5077-2</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-7">
|
||
<span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
</div>
|
||
|
||
|
||
|
||
<div id="vulnTechnicalDetailsDiv" class="technicalDetails"
|
||
data-testid="vuln-technical-details-container">
|
||
<h3>Weakness Enumeration</h3>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-CWEs-table">
|
||
<thead>
|
||
<tr>
|
||
<th>CWE-ID</th>
|
||
<th>CWE Name</th>
|
||
<th>Source</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
<tr data-testid="vuln-CWEs-row-0">
|
||
<td data-testid="vuln-CWEs-link-0">
|
||
<a href="http://cwe.mitre.org/data/definitions/22.html" target="_blank" rel="noopener noreferrer">CWE-22</a>
|
||
|
||
</td>
|
||
<td
|
||
data-testid="vuln-CWEs-link-0">Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')</td>
|
||
|
||
<td data-testid="vuln-cwes-assigner-0">
|
||
<span class="cweSource" data-testid="vuln-cwes-assigner-0-0"
|
||
>
|
||
<img src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cweNvdIcon"
|
||
alt="cwe source acceptance level">
|
||
|
||
<span>NIST </span>
|
||
</span>
|
||
|
||
</td>
|
||
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-CWEs-row-1">
|
||
<td data-testid="vuln-CWEs-link-1">
|
||
<a href="http://cwe.mitre.org/data/definitions/24.html" target="_blank" rel="noopener noreferrer">CWE-24</a>
|
||
|
||
</td>
|
||
<td
|
||
data-testid="vuln-CWEs-link-1">Path Traversal: '../filedir'</td>
|
||
|
||
<td data-testid="vuln-cwes-assigner-1">
|
||
<span class="cweSource" data-testid="vuln-cwes-assigner-1-0"
|
||
>
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
<span>Canonical Ltd. </span>
|
||
</span>
|
||
|
||
</td>
|
||
|
||
</tr>
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
</div>
|
||
|
||
|
||
<div>
|
||
<h3>
|
||
Known Affected Software Configurations <small> <a
|
||
id="toggleCpeVersion" href="#vulnConfigurationsArea">Switch
|
||
to CPE 2.2</a></small>
|
||
</h3>
|
||
<span id="vulnConfigurationsArea"></span>
|
||
<input type="hidden" id="cveIdHidden" value="CVE-2021-3710"/>
|
||
|
||
<div>
|
||
|
||
<div id="vulnCpeTreeLoading"><h3>CPEs loading, please wait.</h3></div>
|
||
<div id="vulnCpeTree" style="display: none;"></div>
|
||
<input type="hidden"
|
||
id="InputRestBasePath"
|
||
value="/rest/public">
|
||
<input type="hidden" id="cveTreeJsonDataHidden" value="[{"id":1,"dataTestId":"vuln-software-config-1","totalCpeCount":32,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-1-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-1-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acanonical%3Aubuntu_linux%3A14.04%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:canonical:ubuntu_linux:14.04","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-0-0","id":"15416780","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-1-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-0","id":"15416781","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-1","id":"15416782","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-2","id":"15416810","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu3.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu3.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-3","id":"15416783","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu3.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu3.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-4","id":"15416784","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu3.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu3.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-5","id":"15416785","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu3.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu3.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-6","id":"15416786","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu3.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu3.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-7","id":"15416787","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu3.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu3.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-8","id":"15416788","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu3.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu3.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-9","id":"15416789","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu3.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu3.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-10","id":"15416790","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu3.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu3.9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-11","id":"15416791","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu3.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu3.10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-12","id":"15416792","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu3.11%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.11:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu3.11","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-13","id":"15416793","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu3.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu3.12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-14","id":"15416794","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu3.13%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.13:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu3.13","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-15","id":"15416795","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu3.14%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.14:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu3.14","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-16","id":"15416796","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu3.15%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.15:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu3.15","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-17","id":"15416797","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu3.16%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.16:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu3.16","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-18","id":"15416798","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu3.17%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.17:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu3.17","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-19","id":"15416799","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu3.18%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.18:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu3.18","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-20","id":"15416800","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu3.19%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.19:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu3.19","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-21","id":"15416801","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu3.20%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.20:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu3.20","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-22","id":"15416802","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu3.21%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.21:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu3.21","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-23","id":"15416803","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu3.23%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.23:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu3.23","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-24","id":"15416804","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu3.24%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.24:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu3.24","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-25","id":"15416805","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu3.25%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.25:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu3.25","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-26","id":"15416806","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu3.27%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.27:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu3.27","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-27","id":"15416807","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu3.28%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.28:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu3.28","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-28","id":"15416808","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu3.29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.29:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu3.29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-29","id":"15416809","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.14.1-0ubuntu3.29%5C%2Besm7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.29\\+esm7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.14.1-0ubuntu3.29%2besm7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-30","id":"15416811","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":2,"dataTestId":"vuln-software-config-2","totalCpeCount":30,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-2-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-2-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acanonical%3Aubuntu_linux%3A16.04%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:canonical:ubuntu_linux:16.04","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-0-0","id":"15416750","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-2-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.1-0ubuntu1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.1-0ubuntu1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-0","id":"15416751","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.1-0ubuntu2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.1-0ubuntu2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-1","id":"15416752","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.1-0ubuntu2.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.1-0ubuntu2.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-2","id":"15416753","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.1-0ubuntu2.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.1-0ubuntu2.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-3","id":"15416754","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.1-0ubuntu2.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.1-0ubuntu2.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-4","id":"15416755","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.1-0ubuntu2.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.1-0ubuntu2.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-5","id":"15416756","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.1-0ubuntu2.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.1-0ubuntu2.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-6","id":"15416757","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.1-0ubuntu2.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.1-0ubuntu2.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-7","id":"15416758","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.1-0ubuntu2.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.1-0ubuntu2.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-8","id":"15416759","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.1-0ubuntu2.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.1-0ubuntu2.9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-9","id":"15416760","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.1-0ubuntu2.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.1-0ubuntu2.10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-10","id":"15416761","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.1-0ubuntu2.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.1-0ubuntu2.12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-11","id":"15416762","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.1-0ubuntu2.13%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.13:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.1-0ubuntu2.13","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-12","id":"15416763","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.1-0ubuntu2.14%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.14:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.1-0ubuntu2.14","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-13","id":"15416764","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.1-0ubuntu2.15%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.15:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.1-0ubuntu2.15","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-14","id":"15416765","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.1-0ubuntu2.16%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.16:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.1-0ubuntu2.16","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-15","id":"15416766","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.1-0ubuntu2.17%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.17:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.1-0ubuntu2.17","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-16","id":"15416767","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.1-0ubuntu2.18%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.18:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.1-0ubuntu2.18","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-17","id":"15416768","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.1-0ubuntu2.19%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.19:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.1-0ubuntu2.19","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-18","id":"15416769","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.1-0ubuntu2.20%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.20:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.1-0ubuntu2.20","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-19","id":"15416770","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.1-0ubuntu2.21%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.21:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.1-0ubuntu2.21","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-20","id":"15416771","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.1-0ubuntu2.22%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.22:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.1-0ubuntu2.22","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-21","id":"15416772","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.1-0ubuntu2.23%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.23:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.1-0ubuntu2.23","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-22","id":"15416773","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.1-0ubuntu2.25%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.25:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.1-0ubuntu2.25","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-23","id":"15416774","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.1-0ubuntu2.26%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.26:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.1-0ubuntu2.26","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-24","id":"15416775","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.1-0ubuntu2.27%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.27:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.1-0ubuntu2.27","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-25","id":"15416776","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.1-0ubuntu2.28%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.28:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.1-0ubuntu2.28","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-26","id":"15416777","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.1-0ubuntu2.30%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.30:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.1-0ubuntu2.30","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-27","id":"15416778","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.1-0ubuntu2.30%5C%2Besm1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.30\\+esm1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.1-0ubuntu2.30%2besm1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-28","id":"15416779","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":3,"dataTestId":"vuln-software-config-3","totalCpeCount":31,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-3-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-3-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acanonical%3Aubuntu_linux%3A18.04%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:canonical:ubuntu_linux:18.04","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-0-0","id":"15416719","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-3-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.9-0ubuntu1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.9-0ubuntu1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-0","id":"15416720","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.9-0ubuntu2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.9-0ubuntu2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-1","id":"15416721","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.9-0ubuntu3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.9-0ubuntu3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-2","id":"15416722","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.9-0ubuntu4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.9-0ubuntu4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-3","id":"15416723","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.9-0ubuntu5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.9-0ubuntu5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-4","id":"15416724","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.9-0ubuntu6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.9-0ubuntu6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-5","id":"15416725","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.9-0ubuntu7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.9-0ubuntu7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-6","id":"15416726","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.9-0ubuntu7.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.9-0ubuntu7.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-7","id":"15416727","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.9-0ubuntu7.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.9-0ubuntu7.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-8","id":"15416728","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.9-0ubuntu7.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.9-0ubuntu7.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-9","id":"15416729","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.9-0ubuntu7.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.9-0ubuntu7.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-10","id":"15416730","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.9-0ubuntu7.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.9-0ubuntu7.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-11","id":"15416731","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.9-0ubuntu7.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.9-0ubuntu7.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-12","id":"15416732","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.9-0ubuntu7.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.9-0ubuntu7.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-13","id":"15416733","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.9-0ubuntu7.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.9-0ubuntu7.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-14","id":"15416734","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.9-0ubuntu7.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.9-0ubuntu7.9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-15","id":"15416735","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.9-0ubuntu7.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.9-0ubuntu7.10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-16","id":"15416736","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.9-0ubuntu7.11%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.11:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.9-0ubuntu7.11","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-17","id":"15416737","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.9-0ubuntu7.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.9-0ubuntu7.12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-18","id":"15416738","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.9-0ubuntu7.13%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.13:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.9-0ubuntu7.13","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-19","id":"15416739","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.9-0ubuntu7.14%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.14:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.9-0ubuntu7.14","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-20","id":"15416740","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.9-0ubuntu7.15%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.15:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.9-0ubuntu7.15","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-21","id":"15416741","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.9-0ubuntu7.16%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.16:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.9-0ubuntu7.16","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-22","id":"15416742","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.9-0ubuntu7.17%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.17:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.9-0ubuntu7.17","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-23","id":"15416743","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.9-0ubuntu7.18%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.18:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.9-0ubuntu7.18","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-24","id":"15416744","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.9-0ubuntu7.19%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.19:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.9-0ubuntu7.19","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-25","id":"15416745","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.9-0ubuntu7.20%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.20:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.9-0ubuntu7.20","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-26","id":"15416746","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.9-0ubuntu7.21%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.21:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.9-0ubuntu7.21","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-27","id":"15416747","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.9-0ubuntu7.23%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.23:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.9-0ubuntu7.23","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-28","id":"15416748","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.9-0ubuntu7.24%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7.24:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.9-0ubuntu7.24","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-29","id":"15416749","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":4,"dataTestId":"vuln-software-config-4","totalCpeCount":37,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-4-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-4-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acanonical%3Aubuntu_linux%3A20.04%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:canonical:ubuntu_linux:20.04","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-0-0","id":"15416682","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-4-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-0","id":"15416683","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-1","id":"15416684","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-2","id":"15416685","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu11%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu11:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu11","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-3","id":"15416686","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-4","id":"15416687","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu13%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu13:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu13","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-5","id":"15416688","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu14%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu14:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu14","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-6","id":"15416689","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu15%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu15:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu15","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-7","id":"15416690","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu16%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu16:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu16","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-8","id":"15416691","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu17%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu17:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu17","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-9","id":"15416692","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu18%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu18:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu18","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-10","id":"15416693","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu19%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu19:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu19","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-11","id":"15416694","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu20%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu20:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu20","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-12","id":"15416695","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu21%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu21:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu21","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-13","id":"15416696","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu22%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu22:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu22","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-14","id":"15416697","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu23%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu23:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu23","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-15","id":"15416698","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu24%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu24:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu24","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-16","id":"15416699","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu25%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu25:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu25","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-17","id":"15416700","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu26%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu26:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu26","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-18","id":"15416701","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu27%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu27","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-19","id":"15416702","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu27.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu27.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-20","id":"15416703","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu27.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu27.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-21","id":"15416704","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu27.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu27.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-22","id":"15416705","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu27.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu27.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-23","id":"15416706","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu27.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu27.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-24","id":"15416707","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu27.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu27.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-25","id":"15416708","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu27.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu27.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-26","id":"15416709","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu27.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu27.9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-27","id":"15416710","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu27.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu27.10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-28","id":"15416711","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu27.11%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.11:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu27.11","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-29","id":"15416712","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu27.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu27.12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-30","id":"15416713","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu27.13%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.13:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu27.13","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-31","id":"15416714","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu27.14%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.14:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu27.14","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-32","id":"15416715","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu27.16%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.16:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu27.16","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-33","id":"15416716","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu27.17%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.17:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu27.17","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-34","id":"15416717","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu27.18%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu27.18:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu27.18","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-35","id":"15416718","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":5,"dataTestId":"vuln-software-config-5","totalCpeCount":45,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-5-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-5-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acanonical%3Aubuntu_linux%3A21.04%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:21.04:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:canonical:ubuntu_linux:21.04","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-0","id":"15416637","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-5-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu28%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu28:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu28","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-0","id":"15416653","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu29:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-1","id":"15416638","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu30%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu30:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu30","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-2","id":"15416639","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu31%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu31:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu31","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-3","id":"15416640","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu32%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu32:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu32","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-4","id":"15416641","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu33%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu33:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu33","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-5","id":"15416642","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu34%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu34:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu34","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-6","id":"15416643","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu35%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu35:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu35","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-7","id":"15416644","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu36%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu36:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu36","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-8","id":"15416645","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu37%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu37:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu37","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-9","id":"15416646","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu38%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu38:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu38","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-10","id":"15416647","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu39%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu39:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu39","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-11","id":"15416648","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu40%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu40:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu40","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-12","id":"15416649","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu41%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu41:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu41","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-13","id":"15416650","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu42%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu42:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu42","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-14","id":"15416651","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu43%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu43:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu43","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-15","id":"15416652","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu44%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu44:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu44","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-16","id":"15416654","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu45%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu45:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu45","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-17","id":"15416655","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu46%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu46:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu46","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-18","id":"15416656","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu47%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu47:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu47","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-19","id":"15416657","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu48%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu48:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu48","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-20","id":"15416658","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu49%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu49:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu49","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-21","id":"15416659","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu50%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu50:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu50","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-22","id":"15416660","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu50.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu50.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu50.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-23","id":"15416661","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu50.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu50.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu50.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-24","id":"15416662","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu50.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu50.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu50.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-25","id":"15416663","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu50.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu50.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu50.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-26","id":"15416664","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu50.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu50.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu50.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-27","id":"15416665","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu51%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu51:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu51","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-28","id":"15416666","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu52%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu52:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu52","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-29","id":"15416667","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu53%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu53:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu53","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-30","id":"15416668","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu54%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu54:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu54","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-31","id":"15416669","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu55%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu55:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu55","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-32","id":"15416670","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu56%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu56:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu56","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-33","id":"15416671","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu57%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu57:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu57","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-34","id":"15416672","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu58%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu58:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu58","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-35","id":"15416673","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu59%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu59:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu59","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-36","id":"15416674","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu60%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu60:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu60","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-37","id":"15416675","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu61%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu61:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu61","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-38","id":"15416678","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu62%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu62:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu62","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-39","id":"15416679","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu63%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu63:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu63","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-40","id":"15416680","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu64%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu64:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu64","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-41","id":"15416681","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu65%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu65:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu65","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-42","id":"15416676","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acanonical%3Aapport%3A2.20.11-0ubuntu65.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:canonical:apport:2.20.11-0ubuntu65.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:canonical:apport:2.20.11-0ubuntu65.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-43","id":"15416677","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]}]"/>
|
||
|
||
<p id="vulnCpeInfo" >
|
||
<small>
|
||
<i class="fa fa-bug fa-flip-vertical"></i> Denotes Vulnerable Software<br />
|
||
<a href="mailto:cpe_dictionary@nist.gov">Are we missing a CPE here? Please let us know</a>.<br />
|
||
|
||
</small>
|
||
</p>
|
||
<script src="/site-media/js/vulnerability/cpe-match.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/vulnerability/configurationListing.js"
|
||
type="text/javascript"></script>
|
||
</div>
|
||
</div>
|
||
|
||
<div id="vulnChangeHistoryDiv"
|
||
data-testid="vuln-change-history-container">
|
||
<h3 id="VulnChangeHistorySection">Change History</h3>
|
||
<small> 3 change records found <a href="#VulnChangeHistorySection"
|
||
style="text-decoration: underline" id="changeHistoryToggle">show
|
||
changes</a>
|
||
</small>
|
||
<div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-0">CVE Modified by CVE</span> <span
|
||
data-testid="vuln-change-history-date-0">11/21/2024 1:22:12 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1933832</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3710</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://ubuntu.com/security/notices/USN-5077-1</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://ubuntu.com/security/notices/USN-5077-2</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-1">CVE Modified by Canonical Ltd.</span> <span
|
||
data-testid="vuln-change-history-date-1">5/14/2024 5:25:04 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-2">Initial Analysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-2">10/08/2021 12:51:47 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CVSS V3.1</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CVSS V2</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST (AV:L/AC:M/Au:N/C:C/I:N/A:N)</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CWE</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST CWE-22</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-2-showing"
|
||
|
||
>Record truncated, showing 500 of 2271 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-3710/change-record?changeRecordedOn=10/08/2021T12:51:47.777-0400">View Entire Change Record</a><br />
|
||
<pre>AND
|
||
OR
|
||
*cpe:2.3:a:canonical:apport:2.14.1-0ubuntu1:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:canonical:apport:2.14.1-0ubuntu2:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.1:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.2:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.3:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:canonical:apport:2.14.1-0ubuntu3.4:*:*:*:*:*:*:*
|
||
</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-2-showing"
|
||
|
||
>Record truncated, showing 500 of 2133 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-3710/change-record?changeRecordedOn=10/08/2021T12:51:47.777-0400">View Entire Change Record</a><br />
|
||
<pre>AND
|
||
OR
|
||
*cpe:2.3:a:canonical:apport:2.20.1-0ubuntu1:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.1:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.2:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.4:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.5:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:canonical:apport:2.20.1-0ubuntu2.6:*:*:*:*:*:*:*
|
||
</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-2-showing"
|
||
|
||
>Record truncated, showing 500 of 3174 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-3710/change-record?changeRecordedOn=10/08/2021T12:51:47.777-0400">View Entire Change Record</a><br />
|
||
<pre>AND
|
||
OR
|
||
*cpe:2.3:a:canonical:apport:2.20.11-0ubuntu28:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:canonical:apport:2.20.11-0ubuntu29:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:canonical:apport:2.20.11-0ubuntu30:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:canonical:apport:2.20.11-0ubuntu31:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:canonical:apport:2.20.11-0ubuntu32:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:canonical:apport:2.20.11-0ubuntu33:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:canonical:apport:2.20.11-0ubuntu34:*:*:*:*:*:*:</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-2-showing"
|
||
|
||
>Record truncated, showing 500 of 2640 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-3710/change-record?changeRecordedOn=10/08/2021T12:51:47.777-0400">View Entire Change Record</a><br />
|
||
<pre>AND
|
||
OR
|
||
*cpe:2.3:a:canonical:apport:2.20.11-0ubuntu8:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:canonical:apport:2.20.11-0ubuntu9:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:canonical:apport:2.20.11-0ubuntu10:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:canonical:apport:2.20.11-0ubuntu11:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:canonical:apport:2.20.11-0ubuntu12:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:canonical:apport:2.20.11-0ubuntu13:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:canonical:apport:2.20.11-0ubuntu14:*:*:*:*:*:*:*
|
||
</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-2-showing"
|
||
|
||
>Record truncated, showing 500 of 2182 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-3710/change-record?changeRecordedOn=10/08/2021T12:51:47.777-0400">View Entire Change Record</a><br />
|
||
<pre>AND
|
||
OR
|
||
*cpe:2.3:a:canonical:apport:2.20.9-0ubuntu1:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:canonical:apport:2.20.9-0ubuntu2:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:canonical:apport:2.20.9-0ubuntu3:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:canonical:apport:2.20.9-0ubuntu4:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:canonical:apport:2.20.9-0ubuntu5:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:canonical:apport:2.20.9-0ubuntu6:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:canonical:apport:2.20.9-0ubuntu7:*:*:*:*:*:*:*
|
||
*c</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1933832 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1933832 Exploit, Vendor Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3710 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3710 Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://ubuntu.com/security/notices/USN-5077-1 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">https://ubuntu.com/security/notices/USN-5077-1 Vendor Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://ubuntu.com/security/notices/USN-5077-2 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">https://ubuntu.com/security/notices/USN-5077-2 Vendor Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</div>
|
||
</div>
|
||
|
||
|
||
<div class="col-lg-3 col-md-5 col-sm-12">
|
||
|
||
<div class="bs-callout bs-callout-info">
|
||
<h4>Quick Info</h4>
|
||
<strong>CVE Dictionary Entry:</strong><br/> <a
|
||
target="_blank" rel="noopener noreferrer" data-testid="vuln-cve-dictionary-entry"
|
||
href="https://cve.org/CVERecord?id=CVE-2021-3710">CVE-2021-3710</a><br/> <strong>NVD
|
||
Published Date:</strong><br/> <span
|
||
data-testid="vuln-published-on">09/30/2021</span><br/> <strong>NVD
|
||
Last Modified:</strong><br/> <span
|
||
data-testid="vuln-last-modified-on">11/21/2024</span><br/> <strong>
|
||
Source:</strong><br/> <span
|
||
data-testid="vuln-current-description-source">Canonical Ltd.</span><br/>
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</td>
|
||
</tr>
|
||
</table>
|
||
|
||
</div>
|
||
<!-- Hidden input for padding -->
|
||
<input type="hidden" value="qP1uFNNhsf6WLR85sedlJY67B2KvxgLnJsReJttiNfq8XRBHuhmpeiMyZqbS4fQhgWsfliSKAPPWrRekXpKgRaBWnR8vpkTyHrFnYR3fSvRJJ0BW0X" id="padding" name="padding"/>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</main>
|
||
<footer id="footer" role="contentinfo">
|
||
<div class="container">
|
||
|
||
<div class="row">
|
||
<div class="col-sm-12">
|
||
<ul class="social-list pull-right">
|
||
<li class="field-item service-twitter list-horiz"><a
|
||
href="https://twitter.com/NISTCyber" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span>
|
||
</a></li>
|
||
<li class="field-item service-facebook list-horiz"><a
|
||
href="https://www.facebook.com/NIST" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-linkedin list-horiz"><a
|
||
href="https://www.linkedin.com/company/nist" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-youtube list-horiz"><a
|
||
href="https://www.youtube.com/user/USNISTGOV" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-rss list-horiz"><a
|
||
href="https://www.nist.gov/news-events/nist-rss-feeds"
|
||
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink">
|
||
<i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i>
|
||
</a></li>
|
||
<li class="field-item service-govdelivery list-horiz last"><a
|
||
href="https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3"
|
||
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink ext">
|
||
<i class="fa fa-envelope fa-fw"><span
|
||
class="element-invisible">govdelivery</span></i><span class="ext"><span
|
||
class="element-invisible"> (link is external)</span></span>
|
||
</a></li>
|
||
</ul>
|
||
<span class="hidden-xs"> <a
|
||
title="National Institute of Standards and Technology" rel="home"
|
||
class="footer-nist-logo"> <img
|
||
src="/site-media/images/nist/nist-logo.png"
|
||
alt="National Institute of Standards and Technology logo" />
|
||
</a>
|
||
</span>
|
||
</div>
|
||
</div>
|
||
<div class="row hidden-sm hidden-md hidden-lg">
|
||
<div class="col-sm-12">
|
||
<a href="https://www.nist.gov"
|
||
title="National Institute of Standards and Technology" rel="home"
|
||
target="_blank" rel="noopener noreferrer" class="footer-nist-logo"> <img
|
||
src="/site-media/images/nist/nist-logo.png"
|
||
alt="National Institute of Standards and Technology logo" />
|
||
</a>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="row footer-contact-container">
|
||
<div class="col-sm-6">
|
||
<strong>HEADQUARTERS</strong>
|
||
<br>
|
||
100 Bureau Drive
|
||
<br>
|
||
Gaithersburg, MD 20899
|
||
<br>
|
||
<a href="tel:301-975-2000">(301) 975-2000</a>
|
||
<br>
|
||
<br>
|
||
<a href="mailto:nvd@nist.gov">Webmaster</a> | <a
|
||
href="https://www.nist.gov/about-nist/contact-us">Contact Us</a>
|
||
| <a href="https://www.nist.gov/about-nist/visit"
|
||
style="display: inline-block;">Our Other Offices</a>
|
||
</div>
|
||
<div class="col-sm-6">
|
||
<div class="pull-right"
|
||
style="text-align:right">
|
||
<strong>Incident Response Assistance and Non-NVD Related<br>Technical Cyber Security Questions:</strong>
|
||
<br>
|
||
US-CERT Security Operations Center
|
||
<br> Email: <a href="mailto:soc@us-cert.gov">soc@us-cert.gov</a>
|
||
<br> Phone: 1-888-282-0870
|
||
</div>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="row">
|
||
<nav title="Footer Navigation" role="navigation"
|
||
class="row footer-bottom-links-container">
|
||
<!-- https://github.com/usnistgov/nist-header-footer/blob/nist-pages/boilerplate-footer.html -->
|
||
<p>
|
||
<a href="https://www.nist.gov/oism/site-privacy">Site Privacy</a>
|
||
|
|
||
<a href="https://www.nist.gov/oism/accessibility">Accessibility</a>
|
||
|
|
||
<a href="https://www.nist.gov/privacy">Privacy Program</a>
|
||
|
|
||
<a href="https://www.nist.gov/oism/copyrights">Copyrights</a>
|
||
|
|
||
<a href="https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a>
|
||
|
|
||
<a href="https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a>
|
||
|
|
||
<a href="https://www.nist.gov/foia">FOIA</a>
|
||
|
|
||
<a href="https://www.nist.gov/environmental-policy-statement">Environmental Policy</a>
|
||
|
|
||
<a href="https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a>
|
||
|
|
||
<a href="https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a>
|
||
|
|
||
<a href="https://www.commerce.gov/">Commerce.gov</a>
|
||
|
|
||
<a href="https://www.science.gov/">Science.gov</a>
|
||
|
|
||
<a href="https://www.usa.gov/">USA.gov</a>
|
||
</p>
|
||
</nav>
|
||
</div>
|
||
</div>
|
||
</footer>
|
||
</body>
|
||
</html>
|
||
|
||
|