10389 lines
697 KiB
Text
10389 lines
697 KiB
Text
<!DOCTYPE html>
|
||
|
||
<html lang="en">
|
||
<head>
|
||
|
||
|
||
|
||
<title>NVD - CVE-2021-44228</title>
|
||
|
||
<meta http-equiv="content-type" content="text/html; charset=UTF-8" />
|
||
<meta http-equiv="content-style-type" content="text/css" />
|
||
<meta http-equiv="content-script-type" content="text/javascript" />
|
||
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
|
||
|
||
|
||
<link href="/site-scripts/font-awesome/css/font-awesome.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link href="/site-media/bootstrap/css/bootstrap.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link href="/site-media/bootstrap/css/bootstrap-theme.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link
|
||
href="/site-scripts/eonasdan-bootstrap-datetimepicker/build/css/bootstrap-datetimepicker.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
|
||
|
||
<link href="/site-media/css/nist-fonts.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/css/base-style.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/css/media-resize.css" type="text/css"
|
||
rel="stylesheet" />
|
||
|
||
|
||
<meta name="theme-color" content="#000000">
|
||
|
||
|
||
<script src="/site-scripts/jquery/dist/jquery.min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/jquery-visible/jquery.visible.min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/underscore/underscore-min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/bootstrap/js/bootstrap.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/moment/min/moment.min.js"
|
||
type="text/javascript"></script>
|
||
<script
|
||
src="/site-scripts/eonasdan-bootstrap-datetimepicker/build/js/bootstrap-datetimepicker.min.js"
|
||
type="text/javascript"></script>
|
||
|
||
|
||
<script src="/site-media/js/megamenu.js" type="text/javascript"></script>
|
||
<script src="/site-media/js/nist-exit-script.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/forms.js" type="text/javascript"></script>
|
||
|
||
<script
|
||
src="/site-media/js/federated-analytics.all.min.js?agency=NIST&subagency=nvd&pua=UA-37115410-41&yt=true"
|
||
type="text/javascript" id="_fed_an_js_tag"></script>
|
||
|
||
<!-- Google tag (gtag.js) -->
|
||
<script async src="https://www.googletagmanager.com/gtag/js?id=G-4KKFZP12LQ"></script>
|
||
<script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-4KKFZP12LQ'); </script>
|
||
|
||
|
||
<style id="antiClickjack">
|
||
body>* {
|
||
display: none !important;
|
||
}
|
||
|
||
#antiClickjack {
|
||
display: block !important;
|
||
}
|
||
</style>
|
||
<noscript>
|
||
<style id="antiClickjackNoScript">
|
||
body>* {
|
||
display: block !important;
|
||
}
|
||
|
||
#antiClickjack {
|
||
display: none !important;
|
||
}
|
||
</style>
|
||
</noscript>
|
||
<script type="text/javascript" id="antiClickjackScript">
|
||
if (self === top) {
|
||
// no clickjacking
|
||
var antiClickjack = document.getElementById("antiClickjack");
|
||
antiClickjack.parentNode.removeChild(antiClickjack);
|
||
} else {
|
||
setTimeout(tryForward(), 5000);
|
||
}
|
||
|
||
function tryForward() {
|
||
top.location = self.location;
|
||
}
|
||
</script>
|
||
<meta charset="UTF-8">
|
||
|
||
<link href="/site-media/css/nvd-style.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/images/favicons/apple-touch-icon.png"
|
||
rel="apple-touch-icon" type="image/png" sizes="180x180" />
|
||
<link href="/site-media/images/favicons/favicon-32x32.png"
|
||
rel="icon" type="image/png" sizes="32x32" />
|
||
<link href="/site-media/images/favicons/favicon-16x16.png"
|
||
rel="icon" type="image/png" sizes="16x16" />
|
||
<link href="/site-media/images/favicons/manifest.json"
|
||
rel="manifest" />
|
||
<link href="/site-media/images/favicons/safari-pinned-tab.svg"
|
||
rel="mask-icon" color="#000000" />
|
||
<link href="/site-media/images/favicons/favicon.ico"
|
||
rel="shortcut icon" />
|
||
<meta name="msapplication-config" content="/site-media/images/favicons/browserconfig.xml" />
|
||
<link href="/site-media/images/favicons/favicon.ico"
|
||
rel="shortcut icon" type="image/x-icon" />
|
||
<link href="/site-media/images/favicons/favicon.ico" rel="icon"
|
||
type="image/x-icon" />
|
||
<meta charset="UTF-8">
|
||
<script src="/site-media/js/vulnerability/vulnDetail.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/vulnerability/cvssVulnDetail.js"
|
||
type="text/javascript"></script>
|
||
|
||
</head>
|
||
<body>
|
||
<header role="banner" title="Site Banner">
|
||
<div id="antiClickjack" style="display: none">
|
||
<h1>You are viewing this page in an unauthorized frame window.</h1>
|
||
<p>
|
||
This is a potential security issue, you are being redirected to
|
||
<a href="https://nvd.nist.gov">https://nvd.nist.gov</a>
|
||
</p>
|
||
</div>
|
||
<div>
|
||
<section class="usa-banner" aria-label="Official government website">
|
||
<div class="usa-accordion container">
|
||
<header class="usa-banner__header">
|
||
<noscript>
|
||
<p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p>
|
||
</noscript>
|
||
<img class="usa-banner__header-flag"
|
||
src="/site-media/images/usbanner/us_flag_small.png" alt="U.S. flag">
|
||
|
||
<span class="usa-banner__header-text">An official website of the United States government</span>
|
||
|
||
<button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="false" aria-controls="gov-banner">
|
||
<span class="usa-banner__button-text">Here's how you know</span>
|
||
</button>
|
||
</header>
|
||
<div class="usa-banner__content usa-accordion__content collapse" role="tabpanel" id="gov-banner" aria-expanded="true">
|
||
<div class="row">
|
||
<div class="col-md-5 col-sm-12">
|
||
<div class="row">
|
||
<div class="col-sm-2 col-xs-3">
|
||
<img class="usa-banner__icon usa-media-block__img"
|
||
src="/site-media/images/usbanner/icon-dot-gov.svg" alt="Dot gov">
|
||
</div>
|
||
<div class="col-sm-10 col-xs-9">
|
||
<p>
|
||
<strong>Official websites use .gov</strong>
|
||
<br>
|
||
A <strong>.gov</strong> website belongs to an official government organization in the United States.
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-md-5 col-sm-12">
|
||
<div class="row">
|
||
<div class="col-sm-2 col-xs-3">
|
||
<img class="usa-banner__icon usa-media-block__img"
|
||
src="/site-media/images/usbanner/icon-https.svg" alt="Https">
|
||
</div>
|
||
<div class="col-sm-10 col-xs-9">
|
||
<p>
|
||
<strong>Secure .gov websites use HTTPS</strong>
|
||
<br>
|
||
A <strong>lock</strong> (<img class="usa-banner__lock"
|
||
src="/site-media/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</section>
|
||
</div>
|
||
<div>
|
||
<div>
|
||
<nav id="navbar" class="navbar">
|
||
<div id="nist-menu-container" class="container">
|
||
<div class="row">
|
||
<!-- Brand -->
|
||
<div class="col-xs-6 col-md-4 navbar-header"
|
||
style="height:104px">
|
||
<a class="navbar-brand"
|
||
href="https://www.nist.gov"
|
||
target="_blank" rel="noopener noreferrer"
|
||
id="navbar-brand-image"
|
||
style="padding-top: 36px">
|
||
|
||
<img alt="National Institute of Standards and Technology"
|
||
src="/site-media/images/nist/nist-logo.svg"
|
||
width="110" height="30">
|
||
</a>
|
||
</div>
|
||
<div class="col-xs-6 col-md-8 navbar-nist-logo">
|
||
<span id="nvd-menu-button" class="pull-right" style="margin-top: 26px"> <a href="#">
|
||
<span class="fa fa-bars"></span> <span id="nvd-menu-full-text"><span
|
||
class="hidden-xxs">NVD </span>MENU</span>
|
||
</a>
|
||
</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="main-menu-row container">
|
||
<!-- Collect the nav links, forms, and other content for toggling -->
|
||
<div id="main-menu-drop" class="col-lg-12" style="display: none;">
|
||
<ul>
|
||
|
||
<li><a href="/general"> General <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-general"
|
||
data-expander-name="general" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="general">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/nvd-dashboard">NVD Dashboard</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://www.nist.gov/itl/nvd">News and Status Updates</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/faq">FAQ</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/visualizations">Visualizations</a>
|
||
</p>
|
||
<p>
|
||
<a href="/general/legal-disclaimer">Legal Disclaimer</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/vuln"> Vulnerabilities <span
|
||
class="expander fa fa-plus"
|
||
id="nvd-header-menu-vulnerabilities"
|
||
data-expander-name="vulnerabilities" data-expanded="false">
|
||
<span class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="vulnerabilities">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/search">Search & Statistics</a>
|
||
</p>
|
||
<p>
|
||
<a href="/vuln/categories">Weakness Types</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/data-feeds">Legacy Data Feeds</a>
|
||
</p>
|
||
<p>
|
||
<a href="/vuln/vendor-comments">Vendor Comments</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/cvmap">CVMAP</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/vuln-metrics/cvss#"> Vulnerability Metrics <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-metrics"
|
||
data-expander-name="metrics" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="metrics">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v4-calculator">CVSS v4.0
|
||
Calculators</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v3-calculator">CVSS v3.x
|
||
Calculators</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v2-calculator">CVSS v2.0
|
||
Calculator</a>
|
||
</p>
|
||
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/products"> Products <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-products"
|
||
data-expander-name="products" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="products">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe">CPE Dictionary</a>
|
||
</p>
|
||
<p>
|
||
<a href="/products/cpe/search">CPE Search</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe/statistics">CPE Statistics</a>
|
||
</p>
|
||
<p>
|
||
<a href="/products/swid">SWID</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4"></div>
|
||
</div>
|
||
</div></li>
|
||
<li>
|
||
<a href="/developers">Developers<span
|
||
class="expander fa fa-plus" id="nvd-header-menu-developers"
|
||
data-expander-name="developers" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="developers">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/start-here">Start Here</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/request-an-api-key">Request an API Key</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/vulnerabilities">Vulnerabilities</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/products">Products</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/data-sources">Data Sources</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/terms-of-use">Terms of Use</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</li>
|
||
<li><a href="/contact"> Contact NVD </a></li>
|
||
<li><a href="/other"> Other Sites <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-othersites"
|
||
data-expander-name="otherSites" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="otherSites">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="https://ncp.nist.gov">Checklist (NCP) Repository</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://ncp.nist.gov/cce">Configurations (CCE)</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search">800-53 Controls</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/scap-validation-program">SCAP
|
||
Validated Tools</a>
|
||
</p>
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/security-content-automation-protocol">SCAP</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/united-states-government-configuration-baseline">USGCB</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
|
||
<li><a href="/search"> Search <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-search"
|
||
data-expander-name="search" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="search">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/search">Vulnerability Search</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe/search">CPE Search</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
|
||
|
||
|
||
|
||
</ul>
|
||
</div>
|
||
<!-- /#mobile-nav-container -->
|
||
</div>
|
||
|
||
</nav>
|
||
<section id="itl-header" class="has-menu">
|
||
<div class="container">
|
||
<div class="row">
|
||
<div class="col-sm-12 col-md-8">
|
||
<h2 class="hidden-xs hidden-sm">
|
||
<a href="https://www.nist.gov/itl" target="_blank" rel="noopener noreferrer">Information Technology Laboratory</a>
|
||
</h2>
|
||
<h1 class="hidden-xs hidden-sm">
|
||
<a id="nvd-header-link"
|
||
href="/">National Vulnerability Database</a>
|
||
</h1>
|
||
<h1 class="hidden-xs text-center hidden-md hidden-lg"
|
||
>National Vulnerability Database</h1>
|
||
<h1 class="hidden-sm hidden-md hidden-lg text-center"
|
||
>NVD</h1>
|
||
|
||
</div>
|
||
<div class="col-sm-12 col-md-4">
|
||
<a style="width: 100%; text-align: center; display: block;padding-top: 14px">
|
||
<img id="img-logo-nvd-lg"
|
||
alt="National Vulnerability Database"
|
||
src="/site-media/images/F_NIST-Logo-NVD-white.svg"
|
||
width="500" height="100">
|
||
</a>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</section>
|
||
|
||
|
||
</div>
|
||
</div>
|
||
</header>
|
||
<main>
|
||
<div>
|
||
<div id="body-section" class="container">
|
||
<div class="row">
|
||
<ol class="breadcrumb">
|
||
<li><a href="/vuln" class="CMSBreadCrumbsLink">Vulnerabilities</a></li>
|
||
</ol>
|
||
</div>
|
||
<div>
|
||
<style>
|
||
/* wrap the words for CVSS v4 */
|
||
#nistv4Metric {
|
||
word-wrap: break-word;
|
||
}
|
||
</style>
|
||
|
||
<script>
|
||
/*<![CDATA[*/
|
||
var vuln = {
|
||
nistV4Present: false,
|
||
cnaV4Present: false,
|
||
nistV3Present: true,
|
||
cnaV3Present: false,
|
||
nistV2Present: true,
|
||
cnaV2Present: false
|
||
};
|
||
/*]]>*/
|
||
</script>
|
||
|
||
|
||
<div>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
|
||
|
||
|
||
<div id="vulnDetailPanel">
|
||
<table id="vulnDetailTableView" style="border-collapse: collapse;">
|
||
<tr>
|
||
<td colspan="2">
|
||
|
||
<h2 data-testid="page-header">
|
||
<i class="fa fa-bug fa-flip-vertical"></i><span
|
||
data-testid="page-header-vuln-id">CVE-2021-44228</span>
|
||
Detail
|
||
</h2>
|
||
|
||
|
||
|
||
<div class="row">
|
||
<div class="col-lg-9 col-md-7 col-sm-12">
|
||
<div id="vulnShowWarningDiv"
|
||
data-testid="vuln-warning-container">
|
||
<div
|
||
role="alert" data-testid="vuln-warning-alert-container" class="bs-callout bs-callout-info">
|
||
<strong class="h4Size"><span
|
||
data-testid="vuln-warning-status-name">Modified</span></strong>
|
||
<hr/>
|
||
<p data-testid="vuln-warning-banner-content">This CVE record has been updated after NVD enrichment efforts were completed. Enrichment data supplied by the NVD may require amendment due to these changes.</p>
|
||
</div>
|
||
</div>
|
||
|
||
<h3 id="vulnDescriptionTitle"
|
||
data-testid="vuln-description-title">Description </h3>
|
||
|
||
<p data-testid="vuln-description">Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.</p><br/>
|
||
|
||
|
||
|
||
|
||
|
||
<!-- CVSS Severity and Vector Strings -->
|
||
<div id="vulnCvssPanel" data-testid="vuln-cvss-container"
|
||
class="row bs-callout bs-callout-success cvssVulnDetail">
|
||
<h3 style="display: inline" title="CVSS is not a measure of risk">Metrics</h3>
|
||
 
|
||
<div id="cvssVulnDetailBtn" class="btn-group">
|
||
<button id="btn-cvss4" type="button" title="Click here to view CVSS 4.0 data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 4.0
|
||
</button>
|
||
<button id="btn-cvss3" type="button" title="Click here to view CVSS 3.x data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 3.x
|
||
</button>
|
||
<button id="btn-cvss2" type="button" title="Click here to view CVSS 2.0 data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 2.0
|
||
</button>
|
||
</div>
|
||
|
||
|
||
<div id="cvssEnrichmentNotes">
|
||
<i>
|
||
<small>
|
||
NVD enrichment efforts reference publicly available information to associate
|
||
vector strings. CVSS information contributed by other sources is also
|
||
displayed.
|
||
</small>
|
||
</i>
|
||
</div>
|
||
|
||
<!-- CVSS v4.0 -->
|
||
<div class="container-fluid" id="Vuln4CvssPanel" data-testid="vuln-cvss4-panel">
|
||
<strong>CVSS 4.0 Severity and Vector Strings:</strong>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<br/>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon" alt="NIST CVSS score">
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss4-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong> </strong><span
|
||
class="severityDetail"> <a
|
||
id="Cvss4NistCalculatorAnchorNA"
|
||
class="label label-default"
|
||
data-testid="vuln-cvss4-panel-score-na">N/A</a></span></span>
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
|
||
<span> <span
|
||
data-testid="vuln-cvss4-nist-vector-na">NVD assessment
|
||
not yet provided.</span></span> <input type="hidden"
|
||
id="nistV4MetricHidden"
|
||
value=""/>
|
||
</div>
|
||
</div>
|
||
<!-- CNA -->
|
||
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
|
||
|
||
</div>
|
||
|
||
|
||
<!-- CVSS V3.x -->
|
||
<div class="container-fluid" id="Vuln3CvssPanel" data-testid="vuln-cvss3-panel"
|
||
style="display: none;">
|
||
<strong>CVSS 3.x Severity and Vector Strings:</strong>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<br/>
|
||
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon" alt="NIST CVSS score">
|
||
|
||
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss3-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"> <a
|
||
id="Cvss3NistCalculatorAnchor"
|
||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2021-44228&vector=AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H&version=3.1&source=NIST"
|
||
data-testid="vuln-cvss3-panel-score"
|
||
class="label label-critical">10.0 CRITICAL</a>
|
||
</span></span>
|
||
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
<span><strong>Vector:</strong>
|
||
<span data-testid="vuln-cvss3-nist-vector"
|
||
class="tooltipCvss3NistMetrics">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H</span></span>
|
||
<input type="hidden"
|
||
id="nistV3MetricHidden"
|
||
value="<span id = 'nistV3Metric' style = 'display:none' > <strong style ='font-size:1.2em' > CVSS v3.1 Severity and Metrics:</strong> <p data-testid='vuln-cvssv3-score-container'> <strong>Base Score: </strong> <span data-testid='vuln-cvssv3-base-score'>10.0 </span><span data-testid='vuln-cvssv3-base-score-severity'>CRITICAL</span> <br /> <strong>Vector: </strong> <span data-testid='vuln-cvssv3-vector'> AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H </span> <br /> <strong>Impact Score: </strong> <span data-testid='vuln-cvssv3-impact-score'> 6.0 </span> <br /> <strong>Exploitability Score: </strong> <span data-testid='vuln-cvssv3-exploitability-score'> 3.9 </span> </p> <hr /> <p data-testid='vuln-cvssv3-metrics-container'> <strong>Attack Vector (AV): </strong> <span data-testid='vuln-cvssv3-av'> Network </span> <br /> <strong>Attack Complexity (AC): </strong> <span data-testid='vuln-cvssv3-ac'> Low </span> <br /> <strong>Privileges Required (PR): </strong> <span data-testid='vuln-cvssv3-pr'> None </span> <br /> <strong>User Interaction (UI): </strong> <span data-testid='vuln-cvssv3-ui'> None </span> <br /> <strong>Scope (S): </strong> <span data-testid='vuln-cvssv3-s'> Changed </span> <br /> <strong>Confidentiality (C): </strong> <span data-testid='vuln-cvssv3-c'> High </span> <br /> <strong>Integrity (I): </strong> <span data-testid='vuln-cvssv3-i'> High </span> <br /> <strong>Availability (A): </strong> <span data-testid='vuln-cvssv3-a'> High </span> </p> </span> "/>
|
||
|
||
</div>
|
||
|
||
|
||
</div>
|
||
<!-- CNA -->
|
||
|
||
|
||
<!-- ADP -->
|
||
<div class="row no-gutters">
|
||
<div>
|
||
<br/>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
|
||
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>ADP:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss3-source-adp">CISA-ADP</span>
|
||
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"> <a
|
||
id="Cvss3AdpCalculatorAnchor"
|
||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2021-44228&vector=AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H&version=3.1&source=CISA-ADP"
|
||
data-testid="vuln-cvss3-adp-panel-score"
|
||
class="label label-critical">10.0 CRITICAL</a></span></span>
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
<span><strong>Vector:</strong> <span
|
||
data-testid="vuln-cvss3-adp-vector"
|
||
class="tooltipCvss3AdpMetrics">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H</span></span>
|
||
<input type="hidden" id="adpV3MetricHidden"
|
||
value="<span id = 'nistV3Metric' style = 'display:none' > <strong style ='font-size:1.2em' > CVSS v3.1 Severity and Metrics:</strong> <p data-testid='vuln-cvssv3-score-container'> <strong>Base Score: </strong> <span data-testid='vuln-cvssv3-base-score'>10.0 </span><span data-testid='vuln-cvssv3-base-score-severity'>CRITICAL</span> <br /> <strong>Vector: </strong> <span data-testid='vuln-cvssv3-vector'> AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H </span> <br /> <strong>Impact Score: </strong> <span data-testid='vuln-cvssv3-impact-score'> 6.0 </span> <br /> <strong>Exploitability Score: </strong> <span data-testid='vuln-cvssv3-exploitability-score'> 3.9 </span> </p> <hr /> <p data-testid='vuln-cvssv3-metrics-container'> <strong>Attack Vector (AV): </strong> <span data-testid='vuln-cvssv3-av'> Network </span> <br /> <strong>Attack Complexity (AC): </strong> <span data-testid='vuln-cvssv3-ac'> Low </span> <br /> <strong>Privileges Required (PR): </strong> <span data-testid='vuln-cvssv3-pr'> None </span> <br /> <strong>User Interaction (UI): </strong> <span data-testid='vuln-cvssv3-ui'> None </span> <br /> <strong>Scope (S): </strong> <span data-testid='vuln-cvssv3-s'> Changed </span> <br /> <strong>Confidentiality (C): </strong> <span data-testid='vuln-cvssv3-c'> High </span> <br /> <strong>Integrity (I): </strong> <span data-testid='vuln-cvssv3-i'> High </span> <br /> <strong>Availability (A): </strong> <span data-testid='vuln-cvssv3-a'> High </span> </p> </span> "/>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
|
||
|
||
|
||
<!-- <div id="cvss3FootNote" class="cvssFootNote" >-->
|
||
<!-- <br/><br/>-->
|
||
<!-- <span id = "cvss3FootNoteSection" th:utext="${cvssData.cvss3FootNoteHtml}"></span>-->
|
||
<!-- </div>-->
|
||
</div>
|
||
|
||
<!-- CVSS V2.0 -->
|
||
<div class="container-fluid" id="Vuln2CvssPanel" data-testid="vuln-cvss2-panel"
|
||
style="display: none;">
|
||
<strong>CVSS 2.0 Severity and Vector Strings:</strong> <br/> <br/>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon"
|
||
alt="National Institute of Standards and Technology">
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span
|
||
data-testid="vuln-cvss2-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"> <a
|
||
id="Cvss2CalculatorAnchor"
|
||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2021-44228&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)&version=2.0&source=NIST" class="label label-danger">9.3 HIGH</a></span></span>
|
||
|
||
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
<span><strong>Vector:</strong>
|
||
<span data-testid="vuln-cvss2-panel-vector"
|
||
class="tooltipCvss2NistMetrics">(AV:N/AC:M/Au:N/C:C/I:C/A:C)</span></span> <input type="hidden"
|
||
id="nistV2MetricHidden"
|
||
value="<span id ='cnaV2Metric' style='display:none'><strong style='font-size:1.2em' >CVSS v2.0 Severity and Metrics:</strong><p data-testid='vuln-cvssv2-score-container'><strong>Base Score: </strong><span data-testid='vuln-cvssv2-base-score'>9.3 </span><span data-testid='vuln-cvssv2-base-score-severity'>HIGH</span><br /><strong>Vector: </strong><span data-testid='vuln-cvssv2-vector'>(AV:N/AC:M/Au:N/C:C/I:C/A:C)</span><br /><strong>Impact Subscore: </strong><span data-testid='vuln-cvssv2-impact-subscore'>10.0</span><br /><strong>Exploitability Subscore: </strong><span data-testid='vuln-cvssv2-exploitability-score'>8.6</span></p><hr /><p data-testid='vuln-cvssv2-metrics-container'><strong>Access Vector (AV): </strong><span data-testid='vuln-cvssv2-av'>Network</span><br /><strong>Access Complexity (AC): </strong><span data-testid='vuln-cvssv2-ac'>Medium</span><br /><strong>Authentication (AU): </strong><span data-testid='vuln-cvssv2-au'>None</span><br /><strong>Confidentiality (C): </strong><span data-testid='vuln-cvssv3-c'>Complete</span><br /><strong>Integrity (I): </strong><span data-testid='vuln-cvssv2-i'>Complete</span><br /><strong>Availability (A): </strong><span data-testid='vuln-cvssv2-a'>Complete</span><br /><strong>Additional Information: </strong><br/><span data-testid='vuln-cvssv2-additional'>Allows unauthorized disclosure of information<br/>Allows unauthorized modification<br/>Allows disruption of service<br/></span></p></span>"/>
|
||
</div>
|
||
</div>
|
||
<!-- CNA -->
|
||
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
<!-- <div id = "cvss2FootNote" class="cvssFootNote" >-->
|
||
<!-- <br/><br/>-->
|
||
<!-- <span id = "cvss2FootNoteSection" th:utext="${cvssData.cvss2FootNoteHtml}"></span>-->
|
||
<!-- </div>-->
|
||
</div>
|
||
</div>
|
||
|
||
|
||
<div class="row col-sm-12">
|
||
|
||
|
||
|
||
<div id="vulnHyperlinksPanel">
|
||
<h3>References to Advisories, Solutions, and Tools</h3>
|
||
<p>
|
||
By selecting these links, you will be leaving NIST webspace.
|
||
We have provided these links to other web sites because they
|
||
may have information that would be of interest to you. No
|
||
inferences should be drawn on account of other sites being
|
||
referenced, or not, from this page. There may be other web
|
||
sites that are more appropriate for your purpose. NIST does
|
||
not necessarily endorse the views expressed, or concur with
|
||
the facts presented on these sites. Further, NIST does not
|
||
endorse any commercial products that may be mentioned on
|
||
these sites. Please address comments about this page to <a
|
||
href="mailto:nvd@nist.gov">nvd@nist.gov</a>.
|
||
</p>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-hyperlinks-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Hyperlink</th>
|
||
<th>Resource</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-0">
|
||
<td data-testid="vuln-hyperlinks-link-0">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-0">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-1">
|
||
<td data-testid="vuln-hyperlinks-link-1">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-1">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-2">
|
||
<td data-testid="vuln-hyperlinks-link-2">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-2">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-3">
|
||
<td data-testid="vuln-hyperlinks-link-3">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-3">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-4">
|
||
<td data-testid="vuln-hyperlinks-link-4">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-4">
|
||
<span>
|
||
<span class="badge">Exploit</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-5">
|
||
<td data-testid="vuln-hyperlinks-link-5">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-5">
|
||
<span>
|
||
<span class="badge">Exploit</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-6">
|
||
<td data-testid="vuln-hyperlinks-link-6">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-6">
|
||
<span>
|
||
<span class="badge">Exploit</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-7">
|
||
<td data-testid="vuln-hyperlinks-link-7">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-7">
|
||
<span>
|
||
<span class="badge">Exploit</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-8">
|
||
<td data-testid="vuln-hyperlinks-link-8">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-8">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-9">
|
||
<td data-testid="vuln-hyperlinks-link-9">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-9">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-10">
|
||
<td data-testid="vuln-hyperlinks-link-10">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-10">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-11">
|
||
<td data-testid="vuln-hyperlinks-link-11">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-11">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-12">
|
||
<td data-testid="vuln-hyperlinks-link-12">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-12">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-13">
|
||
<td data-testid="vuln-hyperlinks-link-13">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-13">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-14">
|
||
<td data-testid="vuln-hyperlinks-link-14">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-14">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-15">
|
||
<td data-testid="vuln-hyperlinks-link-15">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-15">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-16">
|
||
<td data-testid="vuln-hyperlinks-link-16">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-16">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-17">
|
||
<td data-testid="vuln-hyperlinks-link-17">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-17">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-18">
|
||
<td data-testid="vuln-hyperlinks-link-18">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-18">
|
||
<span>
|
||
<span class="badge">Exploit</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-19">
|
||
<td data-testid="vuln-hyperlinks-link-19">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-19">
|
||
<span>
|
||
<span class="badge">Exploit</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-20">
|
||
<td data-testid="vuln-hyperlinks-link-20">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-20">
|
||
<span>
|
||
<span class="badge">Exploit</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-21">
|
||
<td data-testid="vuln-hyperlinks-link-21">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-21">
|
||
<span>
|
||
<span class="badge">Exploit</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-22">
|
||
<td data-testid="vuln-hyperlinks-link-22">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-22">
|
||
<span>
|
||
<span class="badge">Exploit</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-23">
|
||
<td data-testid="vuln-hyperlinks-link-23">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-23">
|
||
<span>
|
||
<span class="badge">Exploit</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-24">
|
||
<td data-testid="vuln-hyperlinks-link-24">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-24">
|
||
<span>
|
||
<span class="badge">Exploit</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-25">
|
||
<td data-testid="vuln-hyperlinks-link-25">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-25">
|
||
<span>
|
||
<span class="badge">Exploit</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-26">
|
||
<td data-testid="vuln-hyperlinks-link-26">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-26">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-27">
|
||
<td data-testid="vuln-hyperlinks-link-27">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-27">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-28">
|
||
<td data-testid="vuln-hyperlinks-link-28">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-28">
|
||
<span>
|
||
<span class="badge">Exploit</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-29">
|
||
<td data-testid="vuln-hyperlinks-link-29">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-29">
|
||
<span>
|
||
<span class="badge">Exploit</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-30">
|
||
<td data-testid="vuln-hyperlinks-link-30">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-30">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-31">
|
||
<td data-testid="vuln-hyperlinks-link-31">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-31">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-32">
|
||
<td data-testid="vuln-hyperlinks-link-32">
|
||
<a
|
||
href="http://seclists.org/fulldisclosure/2022/Dec/2"
|
||
target="_blank" rel="noopener noreferrer">http://seclists.org/fulldisclosure/2022/Dec/2</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-32">
|
||
<span>
|
||
<span class="badge">Exploit</span>
|
||
</span><span>
|
||
<span class="badge">Mailing List</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-33">
|
||
<td data-testid="vuln-hyperlinks-link-33">
|
||
<a
|
||
href="http://seclists.org/fulldisclosure/2022/Dec/2"
|
||
target="_blank" rel="noopener noreferrer">http://seclists.org/fulldisclosure/2022/Dec/2</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-33">
|
||
<span>
|
||
<span class="badge">Exploit</span>
|
||
</span><span>
|
||
<span class="badge">Mailing List</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-34">
|
||
<td data-testid="vuln-hyperlinks-link-34">
|
||
<a
|
||
href="http://seclists.org/fulldisclosure/2022/Jul/11"
|
||
target="_blank" rel="noopener noreferrer">http://seclists.org/fulldisclosure/2022/Jul/11</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-34">
|
||
<span>
|
||
<span class="badge">Mailing List</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-35">
|
||
<td data-testid="vuln-hyperlinks-link-35">
|
||
<a
|
||
href="http://seclists.org/fulldisclosure/2022/Jul/11"
|
||
target="_blank" rel="noopener noreferrer">http://seclists.org/fulldisclosure/2022/Jul/11</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-35">
|
||
<span>
|
||
<span class="badge">Mailing List</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-36">
|
||
<td data-testid="vuln-hyperlinks-link-36">
|
||
<a
|
||
href="http://seclists.org/fulldisclosure/2022/Mar/23"
|
||
target="_blank" rel="noopener noreferrer">http://seclists.org/fulldisclosure/2022/Mar/23</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-36">
|
||
<span>
|
||
<span class="badge">Mailing List</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-37">
|
||
<td data-testid="vuln-hyperlinks-link-37">
|
||
<a
|
||
href="http://seclists.org/fulldisclosure/2022/Mar/23"
|
||
target="_blank" rel="noopener noreferrer">http://seclists.org/fulldisclosure/2022/Mar/23</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-37">
|
||
<span>
|
||
<span class="badge">Mailing List</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-38">
|
||
<td data-testid="vuln-hyperlinks-link-38">
|
||
<a
|
||
href="http://www.openwall.com/lists/oss-security/2021/12/10/1"
|
||
target="_blank" rel="noopener noreferrer">http://www.openwall.com/lists/oss-security/2021/12/10/1</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-38">
|
||
<span>
|
||
<span class="badge">Mailing List</span>
|
||
</span><span>
|
||
<span class="badge">Mitigation</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-39">
|
||
<td data-testid="vuln-hyperlinks-link-39">
|
||
<a
|
||
href="http://www.openwall.com/lists/oss-security/2021/12/10/1"
|
||
target="_blank" rel="noopener noreferrer">http://www.openwall.com/lists/oss-security/2021/12/10/1</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-39">
|
||
<span>
|
||
<span class="badge">Mailing List</span>
|
||
</span><span>
|
||
<span class="badge">Mitigation</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-40">
|
||
<td data-testid="vuln-hyperlinks-link-40">
|
||
<a
|
||
href="http://www.openwall.com/lists/oss-security/2021/12/10/2"
|
||
target="_blank" rel="noopener noreferrer">http://www.openwall.com/lists/oss-security/2021/12/10/2</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-40">
|
||
<span>
|
||
<span class="badge">Mailing List</span>
|
||
</span><span>
|
||
<span class="badge">Mitigation</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-41">
|
||
<td data-testid="vuln-hyperlinks-link-41">
|
||
<a
|
||
href="http://www.openwall.com/lists/oss-security/2021/12/10/2"
|
||
target="_blank" rel="noopener noreferrer">http://www.openwall.com/lists/oss-security/2021/12/10/2</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-41">
|
||
<span>
|
||
<span class="badge">Mailing List</span>
|
||
</span><span>
|
||
<span class="badge">Mitigation</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-42">
|
||
<td data-testid="vuln-hyperlinks-link-42">
|
||
<a
|
||
href="http://www.openwall.com/lists/oss-security/2021/12/10/3"
|
||
target="_blank" rel="noopener noreferrer">http://www.openwall.com/lists/oss-security/2021/12/10/3</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-42">
|
||
<span>
|
||
<span class="badge">Mailing List</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-43">
|
||
<td data-testid="vuln-hyperlinks-link-43">
|
||
<a
|
||
href="http://www.openwall.com/lists/oss-security/2021/12/10/3"
|
||
target="_blank" rel="noopener noreferrer">http://www.openwall.com/lists/oss-security/2021/12/10/3</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-43">
|
||
<span>
|
||
<span class="badge">Mailing List</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-44">
|
||
<td data-testid="vuln-hyperlinks-link-44">
|
||
<a
|
||
href="http://www.openwall.com/lists/oss-security/2021/12/13/1"
|
||
target="_blank" rel="noopener noreferrer">http://www.openwall.com/lists/oss-security/2021/12/13/1</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-44">
|
||
<span>
|
||
<span class="badge">Mailing List</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-45">
|
||
<td data-testid="vuln-hyperlinks-link-45">
|
||
<a
|
||
href="http://www.openwall.com/lists/oss-security/2021/12/13/1"
|
||
target="_blank" rel="noopener noreferrer">http://www.openwall.com/lists/oss-security/2021/12/13/1</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-45">
|
||
<span>
|
||
<span class="badge">Mailing List</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-46">
|
||
<td data-testid="vuln-hyperlinks-link-46">
|
||
<a
|
||
href="http://www.openwall.com/lists/oss-security/2021/12/13/2"
|
||
target="_blank" rel="noopener noreferrer">http://www.openwall.com/lists/oss-security/2021/12/13/2</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-46">
|
||
<span>
|
||
<span class="badge">Mailing List</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-47">
|
||
<td data-testid="vuln-hyperlinks-link-47">
|
||
<a
|
||
href="http://www.openwall.com/lists/oss-security/2021/12/13/2"
|
||
target="_blank" rel="noopener noreferrer">http://www.openwall.com/lists/oss-security/2021/12/13/2</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-47">
|
||
<span>
|
||
<span class="badge">Mailing List</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-48">
|
||
<td data-testid="vuln-hyperlinks-link-48">
|
||
<a
|
||
href="http://www.openwall.com/lists/oss-security/2021/12/14/4"
|
||
target="_blank" rel="noopener noreferrer">http://www.openwall.com/lists/oss-security/2021/12/14/4</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-48">
|
||
<span>
|
||
<span class="badge">Mailing List</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-49">
|
||
<td data-testid="vuln-hyperlinks-link-49">
|
||
<a
|
||
href="http://www.openwall.com/lists/oss-security/2021/12/14/4"
|
||
target="_blank" rel="noopener noreferrer">http://www.openwall.com/lists/oss-security/2021/12/14/4</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-49">
|
||
<span>
|
||
<span class="badge">Mailing List</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-50">
|
||
<td data-testid="vuln-hyperlinks-link-50">
|
||
<a
|
||
href="http://www.openwall.com/lists/oss-security/2021/12/15/3"
|
||
target="_blank" rel="noopener noreferrer">http://www.openwall.com/lists/oss-security/2021/12/15/3</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-50">
|
||
<span>
|
||
<span class="badge">Mailing List</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-51">
|
||
<td data-testid="vuln-hyperlinks-link-51">
|
||
<a
|
||
href="http://www.openwall.com/lists/oss-security/2021/12/15/3"
|
||
target="_blank" rel="noopener noreferrer">http://www.openwall.com/lists/oss-security/2021/12/15/3</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-51">
|
||
<span>
|
||
<span class="badge">Mailing List</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-52">
|
||
<td data-testid="vuln-hyperlinks-link-52">
|
||
<a
|
||
href="https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf"
|
||
target="_blank" rel="noopener noreferrer">https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-52">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-53">
|
||
<td data-testid="vuln-hyperlinks-link-53">
|
||
<a
|
||
href="https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf"
|
||
target="_blank" rel="noopener noreferrer">https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-53">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-54">
|
||
<td data-testid="vuln-hyperlinks-link-54">
|
||
<a
|
||
href="https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf"
|
||
target="_blank" rel="noopener noreferrer">https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-54">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-55">
|
||
<td data-testid="vuln-hyperlinks-link-55">
|
||
<a
|
||
href="https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf"
|
||
target="_blank" rel="noopener noreferrer">https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-55">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-56">
|
||
<td data-testid="vuln-hyperlinks-link-56">
|
||
<a
|
||
href="https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf"
|
||
target="_blank" rel="noopener noreferrer">https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-56">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-57">
|
||
<td data-testid="vuln-hyperlinks-link-57">
|
||
<a
|
||
href="https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf"
|
||
target="_blank" rel="noopener noreferrer">https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-57">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-58">
|
||
<td data-testid="vuln-hyperlinks-link-58">
|
||
<a
|
||
href="https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf"
|
||
target="_blank" rel="noopener noreferrer">https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-58">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-59">
|
||
<td data-testid="vuln-hyperlinks-link-59">
|
||
<a
|
||
href="https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf"
|
||
target="_blank" rel="noopener noreferrer">https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-59">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-60">
|
||
<td data-testid="vuln-hyperlinks-link-60">
|
||
<a
|
||
href="https://github.com/cisagov/log4j-affected-db"
|
||
target="_blank" rel="noopener noreferrer">https://github.com/cisagov/log4j-affected-db</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-60">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-61">
|
||
<td data-testid="vuln-hyperlinks-link-61">
|
||
<a
|
||
href="https://github.com/cisagov/log4j-affected-db"
|
||
target="_blank" rel="noopener noreferrer">https://github.com/cisagov/log4j-affected-db</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-61">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-62">
|
||
<td data-testid="vuln-hyperlinks-link-62">
|
||
<a
|
||
href="https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md"
|
||
target="_blank" rel="noopener noreferrer">https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-62">
|
||
<span>
|
||
<span class="badge">Broken Link</span>
|
||
</span><span>
|
||
<span class="badge">Product</span>
|
||
</span><span>
|
||
<span class="badge">US Government Resource</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-63">
|
||
<td data-testid="vuln-hyperlinks-link-63">
|
||
<a
|
||
href="https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md"
|
||
target="_blank" rel="noopener noreferrer">https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-63">
|
||
<span>
|
||
<span class="badge">Broken Link</span>
|
||
</span><span>
|
||
<span class="badge">Product</span>
|
||
</span><span>
|
||
<span class="badge">US Government Resource</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-64">
|
||
<td data-testid="vuln-hyperlinks-link-64">
|
||
<a
|
||
href="https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228"
|
||
target="_blank" rel="noopener noreferrer">https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-64">
|
||
<span>
|
||
<span class="badge">Exploit</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-65">
|
||
<td data-testid="vuln-hyperlinks-link-65">
|
||
<a
|
||
href="https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228"
|
||
target="_blank" rel="noopener noreferrer">https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-65">
|
||
<span>
|
||
<span class="badge">Exploit</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-66">
|
||
<td data-testid="vuln-hyperlinks-link-66">
|
||
<a
|
||
href="https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html"
|
||
target="_blank" rel="noopener noreferrer">https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-66">
|
||
<span>
|
||
<span class="badge">Mailing List</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-67">
|
||
<td data-testid="vuln-hyperlinks-link-67">
|
||
<a
|
||
href="https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html"
|
||
target="_blank" rel="noopener noreferrer">https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-67">
|
||
<span>
|
||
<span class="badge">Mailing List</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-68">
|
||
<td data-testid="vuln-hyperlinks-link-68">
|
||
<a
|
||
href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/"
|
||
target="_blank" rel="noopener noreferrer">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-68">
|
||
<span>
|
||
<span class="badge">Release Notes</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-69">
|
||
<td data-testid="vuln-hyperlinks-link-69">
|
||
<a
|
||
href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/"
|
||
target="_blank" rel="noopener noreferrer">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-69">
|
||
<span>
|
||
<span class="badge">Release Notes</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-70">
|
||
<td data-testid="vuln-hyperlinks-link-70">
|
||
<a
|
||
href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/"
|
||
target="_blank" rel="noopener noreferrer">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-70">
|
||
<span>
|
||
<span class="badge">Release Notes</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-71">
|
||
<td data-testid="vuln-hyperlinks-link-71">
|
||
<a
|
||
href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/"
|
||
target="_blank" rel="noopener noreferrer">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-71">
|
||
<span>
|
||
<span class="badge">Release Notes</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-72">
|
||
<td data-testid="vuln-hyperlinks-link-72">
|
||
<a
|
||
href="https://logging.apache.org/log4j/2.x/security.html"
|
||
target="_blank" rel="noopener noreferrer">https://logging.apache.org/log4j/2.x/security.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-72">
|
||
<span>
|
||
<span class="badge">Release Notes</span>
|
||
</span><span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-73">
|
||
<td data-testid="vuln-hyperlinks-link-73">
|
||
<a
|
||
href="https://logging.apache.org/log4j/2.x/security.html"
|
||
target="_blank" rel="noopener noreferrer">https://logging.apache.org/log4j/2.x/security.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-73">
|
||
<span>
|
||
<span class="badge">Release Notes</span>
|
||
</span><span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-74">
|
||
<td data-testid="vuln-hyperlinks-link-74">
|
||
<a
|
||
href="https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/"
|
||
target="_blank" rel="noopener noreferrer">https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-74">
|
||
<span>
|
||
<span class="badge">Patch</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-75">
|
||
<td data-testid="vuln-hyperlinks-link-75">
|
||
<a
|
||
href="https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/"
|
||
target="_blank" rel="noopener noreferrer">https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-75">
|
||
<span>
|
||
<span class="badge">Patch</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-76">
|
||
<td data-testid="vuln-hyperlinks-link-76">
|
||
<a
|
||
href="https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032"
|
||
target="_blank" rel="noopener noreferrer">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-76">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-77">
|
||
<td data-testid="vuln-hyperlinks-link-77">
|
||
<a
|
||
href="https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032"
|
||
target="_blank" rel="noopener noreferrer">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-77">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-78">
|
||
<td data-testid="vuln-hyperlinks-link-78">
|
||
<a
|
||
href="https://security.netapp.com/advisory/ntap-20211210-0007/"
|
||
target="_blank" rel="noopener noreferrer">https://security.netapp.com/advisory/ntap-20211210-0007/</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-78">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-79">
|
||
<td data-testid="vuln-hyperlinks-link-79">
|
||
<a
|
||
href="https://security.netapp.com/advisory/ntap-20211210-0007/"
|
||
target="_blank" rel="noopener noreferrer">https://security.netapp.com/advisory/ntap-20211210-0007/</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-79">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-80">
|
||
<td data-testid="vuln-hyperlinks-link-80">
|
||
<a
|
||
href="https://support.apple.com/kb/HT213189"
|
||
target="_blank" rel="noopener noreferrer">https://support.apple.com/kb/HT213189</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-80">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-81">
|
||
<td data-testid="vuln-hyperlinks-link-81">
|
||
<a
|
||
href="https://support.apple.com/kb/HT213189"
|
||
target="_blank" rel="noopener noreferrer">https://support.apple.com/kb/HT213189</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-81">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-82">
|
||
<td data-testid="vuln-hyperlinks-link-82">
|
||
<a
|
||
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
|
||
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-82">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-83">
|
||
<td data-testid="vuln-hyperlinks-link-83">
|
||
<a
|
||
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
|
||
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-83">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-84">
|
||
<td data-testid="vuln-hyperlinks-link-84">
|
||
<a
|
||
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
|
||
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-84">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-85">
|
||
<td data-testid="vuln-hyperlinks-link-85">
|
||
<a
|
||
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
|
||
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-85">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-86">
|
||
<td data-testid="vuln-hyperlinks-link-86">
|
||
<a
|
||
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
|
||
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-86">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-87">
|
||
<td data-testid="vuln-hyperlinks-link-87">
|
||
<a
|
||
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
|
||
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-87">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-88">
|
||
<td data-testid="vuln-hyperlinks-link-88">
|
||
<a
|
||
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
|
||
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-88">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-89">
|
||
<td data-testid="vuln-hyperlinks-link-89">
|
||
<a
|
||
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
|
||
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-89">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-90">
|
||
<td data-testid="vuln-hyperlinks-link-90">
|
||
<a
|
||
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
|
||
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-90">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-91">
|
||
<td data-testid="vuln-hyperlinks-link-91">
|
||
<a
|
||
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
|
||
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-91">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-92">
|
||
<td data-testid="vuln-hyperlinks-link-92">
|
||
<a
|
||
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
|
||
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-92">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-93">
|
||
<td data-testid="vuln-hyperlinks-link-93">
|
||
<a
|
||
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
|
||
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-93">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-94">
|
||
<td data-testid="vuln-hyperlinks-link-94">
|
||
<a
|
||
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
|
||
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-94">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-95">
|
||
<td data-testid="vuln-hyperlinks-link-95">
|
||
<a
|
||
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
|
||
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-95">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-96">
|
||
<td data-testid="vuln-hyperlinks-link-96">
|
||
<a
|
||
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
|
||
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-96">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-97">
|
||
<td data-testid="vuln-hyperlinks-link-97">
|
||
<a
|
||
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
|
||
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-97">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-98">
|
||
<td data-testid="vuln-hyperlinks-link-98">
|
||
<a
|
||
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
|
||
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-98">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-99">
|
||
<td data-testid="vuln-hyperlinks-link-99">
|
||
<a
|
||
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
|
||
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-99">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-100">
|
||
<td data-testid="vuln-hyperlinks-link-100">
|
||
<a
|
||
href="https://twitter.com/kurtseifried/status/1469345530182455296"
|
||
target="_blank" rel="noopener noreferrer">https://twitter.com/kurtseifried/status/1469345530182455296</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-100">
|
||
<span>
|
||
<span class="badge">Broken Link</span>
|
||
</span><span>
|
||
<span class="badge">Exploit</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-101">
|
||
<td data-testid="vuln-hyperlinks-link-101">
|
||
<a
|
||
href="https://twitter.com/kurtseifried/status/1469345530182455296"
|
||
target="_blank" rel="noopener noreferrer">https://twitter.com/kurtseifried/status/1469345530182455296</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-101">
|
||
<span>
|
||
<span class="badge">Broken Link</span>
|
||
</span><span>
|
||
<span class="badge">Exploit</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-102">
|
||
<td data-testid="vuln-hyperlinks-link-102">
|
||
<a
|
||
href="https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001"
|
||
target="_blank" rel="noopener noreferrer">https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-102">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-103">
|
||
<td data-testid="vuln-hyperlinks-link-103">
|
||
<a
|
||
href="https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001"
|
||
target="_blank" rel="noopener noreferrer">https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-103">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-104">
|
||
<td data-testid="vuln-hyperlinks-link-104">
|
||
<a
|
||
href="https://www.debian.org/security/2021/dsa-5020"
|
||
target="_blank" rel="noopener noreferrer">https://www.debian.org/security/2021/dsa-5020</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-104">
|
||
<span>
|
||
<span class="badge">Mailing List</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-105">
|
||
<td data-testid="vuln-hyperlinks-link-105">
|
||
<a
|
||
href="https://www.debian.org/security/2021/dsa-5020"
|
||
target="_blank" rel="noopener noreferrer">https://www.debian.org/security/2021/dsa-5020</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-105">
|
||
<span>
|
||
<span class="badge">Mailing List</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-106">
|
||
<td data-testid="vuln-hyperlinks-link-106">
|
||
<a
|
||
href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html"
|
||
target="_blank" rel="noopener noreferrer">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-106">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-107">
|
||
<td data-testid="vuln-hyperlinks-link-107">
|
||
<a
|
||
href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html"
|
||
target="_blank" rel="noopener noreferrer">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-107">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-108">
|
||
<td data-testid="vuln-hyperlinks-link-108">
|
||
<a
|
||
href="https://www.kb.cert.org/vuls/id/930724"
|
||
target="_blank" rel="noopener noreferrer">https://www.kb.cert.org/vuls/id/930724</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-108">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">US Government Resource</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-109">
|
||
<td data-testid="vuln-hyperlinks-link-109">
|
||
<a
|
||
href="https://www.kb.cert.org/vuls/id/930724"
|
||
target="_blank" rel="noopener noreferrer">https://www.kb.cert.org/vuls/id/930724</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-109">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">US Government Resource</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-110">
|
||
<td data-testid="vuln-hyperlinks-link-110">
|
||
<a
|
||
href="https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html"
|
||
target="_blank" rel="noopener noreferrer">https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-110">
|
||
<span>
|
||
<span class="badge">Exploit</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-111">
|
||
<td data-testid="vuln-hyperlinks-link-111">
|
||
<a
|
||
href="https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html"
|
||
target="_blank" rel="noopener noreferrer">https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-111">
|
||
<span>
|
||
<span class="badge">Exploit</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-112">
|
||
<td data-testid="vuln-hyperlinks-link-112">
|
||
<a
|
||
href="https://www.oracle.com/security-alerts/alert-cve-2021-44228.html"
|
||
target="_blank" rel="noopener noreferrer">https://www.oracle.com/security-alerts/alert-cve-2021-44228.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-112">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-113">
|
||
<td data-testid="vuln-hyperlinks-link-113">
|
||
<a
|
||
href="https://www.oracle.com/security-alerts/alert-cve-2021-44228.html"
|
||
target="_blank" rel="noopener noreferrer">https://www.oracle.com/security-alerts/alert-cve-2021-44228.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-113">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-114">
|
||
<td data-testid="vuln-hyperlinks-link-114">
|
||
<a
|
||
href="https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||
target="_blank" rel="noopener noreferrer">https://www.oracle.com/security-alerts/cpuapr2022.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-114">
|
||
<span>
|
||
<span class="badge">Patch</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-115">
|
||
<td data-testid="vuln-hyperlinks-link-115">
|
||
<a
|
||
href="https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||
target="_blank" rel="noopener noreferrer">https://www.oracle.com/security-alerts/cpuapr2022.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-115">
|
||
<span>
|
||
<span class="badge">Patch</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-116">
|
||
<td data-testid="vuln-hyperlinks-link-116">
|
||
<a
|
||
href="https://www.oracle.com/security-alerts/cpujan2022.html"
|
||
target="_blank" rel="noopener noreferrer">https://www.oracle.com/security-alerts/cpujan2022.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-116">
|
||
<span>
|
||
<span class="badge">Patch</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-117">
|
||
<td data-testid="vuln-hyperlinks-link-117">
|
||
<a
|
||
href="https://www.oracle.com/security-alerts/cpujan2022.html"
|
||
target="_blank" rel="noopener noreferrer">https://www.oracle.com/security-alerts/cpujan2022.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-117">
|
||
<span>
|
||
<span class="badge">Patch</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
</div>
|
||
|
||
<div id="vulnCisaExploit">
|
||
<h3>
|
||
This CVE is in CISA's Known Exploited Vulnerabilities Catalog
|
||
</h3>
|
||
<p>
|
||
Reference <a href="https://www.cisa.gov/binding-operational-directive-22-01">
|
||
CISA's BOD 22-01</a> and <a
|
||
href="https://cisa.gov/known-exploited-vulnerabilities-catalog">Known
|
||
Exploited Vulnerabilities Catalog</a> for further guidance and requirements.
|
||
</p>
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Vulnerability Name</th>
|
||
<th>Date Added</th>
|
||
<th>Due Date</th>
|
||
<th>Required Action</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr>
|
||
<td>Apache Log4j2 Remote Code Execution Vulnerability</td>
|
||
<td>12/10/2021</td>
|
||
<td>12/24/2021</td>
|
||
<td>For all affected software assets for which updates exist, the only acceptable remediation actions are: 1) Apply updates; OR 2) remove affected assets from agency networks. Temporary mitigations using one of the measures provided at https://www.cisa.gov/uscert/ed-22-02-apache-log4j-recommended-mitigation-measures are only acceptable until updates are available.</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
</div>
|
||
|
||
<div id="vulnTechnicalDetailsDiv" class="technicalDetails"
|
||
data-testid="vuln-technical-details-container">
|
||
<h3>Weakness Enumeration</h3>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-CWEs-table">
|
||
<thead>
|
||
<tr>
|
||
<th>CWE-ID</th>
|
||
<th>CWE Name</th>
|
||
<th>Source</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
<tr data-testid="vuln-CWEs-row-0">
|
||
<td data-testid="vuln-CWEs-link-0">
|
||
<a href="http://cwe.mitre.org/data/definitions/917.html" target="_blank" rel="noopener noreferrer">CWE-917</a>
|
||
|
||
</td>
|
||
<td
|
||
data-testid="vuln-CWEs-link-0">Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression La</td>
|
||
|
||
<td data-testid="vuln-cwes-assigner-0">
|
||
<span class="cweSource" data-testid="vuln-cwes-assigner-0-0"
|
||
>
|
||
<img src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cweNvdIcon"
|
||
alt="cwe source acceptance level">
|
||
|
||
<span>NIST </span>
|
||
</span>
|
||
|
||
</td>
|
||
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-CWEs-row-1">
|
||
<td data-testid="vuln-CWEs-link-1">
|
||
<a href="http://cwe.mitre.org/data/definitions/502.html" target="_blank" rel="noopener noreferrer">CWE-502</a>
|
||
|
||
</td>
|
||
<td
|
||
data-testid="vuln-CWEs-link-1">Deserialization of Untrusted Data</td>
|
||
|
||
<td data-testid="vuln-cwes-assigner-1">
|
||
<span class="cweSource" data-testid="vuln-cwes-assigner-1-0"
|
||
>
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
<span>Apache Software Foundation </span>
|
||
</span>
|
||
|
||
</td>
|
||
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-CWEs-row-2">
|
||
<td data-testid="vuln-CWEs-link-2">
|
||
<a href="http://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noopener noreferrer">CWE-400</a>
|
||
|
||
</td>
|
||
<td
|
||
data-testid="vuln-CWEs-link-2">Uncontrolled Resource Consumption</td>
|
||
|
||
<td data-testid="vuln-cwes-assigner-2">
|
||
<span class="cweSource" data-testid="vuln-cwes-assigner-2-0"
|
||
>
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
<span>Apache Software Foundation </span>
|
||
</span>
|
||
|
||
</td>
|
||
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-CWEs-row-3">
|
||
<td data-testid="vuln-CWEs-link-3">
|
||
<a href="http://cwe.mitre.org/data/definitions/20.html" target="_blank" rel="noopener noreferrer">CWE-20</a>
|
||
|
||
</td>
|
||
<td
|
||
data-testid="vuln-CWEs-link-3">Improper Input Validation</td>
|
||
|
||
<td data-testid="vuln-cwes-assigner-3">
|
||
<span class="cweSource" data-testid="vuln-cwes-assigner-3-0"
|
||
>
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
<span>Apache Software Foundation </span>
|
||
</span>
|
||
|
||
</td>
|
||
|
||
</tr>
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
</div>
|
||
|
||
|
||
<div>
|
||
<h3>
|
||
Known Affected Software Configurations <small> <a
|
||
id="toggleCpeVersion" href="#vulnConfigurationsArea">Switch
|
||
to CPE 2.2</a></small>
|
||
</h3>
|
||
<span id="vulnConfigurationsArea"></span>
|
||
<input type="hidden" id="cveIdHidden" value="CVE-2021-44228"/>
|
||
|
||
<div>
|
||
|
||
<div id="vulnCpeTreeLoading"><h3>CPEs loading, please wait.</h3></div>
|
||
<div id="vulnCpeTree" style="display: none;"></div>
|
||
<input type="hidden"
|
||
id="InputRestBasePath"
|
||
value="/rest/public">
|
||
<input type="hidden" id="cveTreeJsonDataHidden" value="[{"id":1,"dataTestId":"vuln-software-config-1","totalCpeCount":7,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-1-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aapache%3Alog4j%3A2.0%3A-%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:apache:log4j:2.0:-:*:*:*:*:*:*","cpe22Uri":"cpe:/a:apache:log4j:2.0:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-0","id":"16343387","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aapache%3Alog4j%3A2.0%3Abeta9%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:apache:log4j:2.0:beta9:*:*:*:*:*:*","cpe22Uri":"cpe:/a:apache:log4j:2.0:beta9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1","id":"16343385","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aapache%3Alog4j%3A2.0%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:apache:log4j:2.0:rc1:*:*:*:*:*:*","cpe22Uri":"cpe:/a:apache:log4j:2.0:rc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2","id":"16343384","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aapache%3Alog4j%3A2.0%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:apache:log4j:2.0:rc2:*:*:*:*:*:*","cpe22Uri":"cpe:/a:apache:log4j:2.0:rc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-3","id":"16343386","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aapache%3Alog4j%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:apache:log4j","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-4","id":"16343389","matchCpes":[],"rangeDescription":" versions from (including) 2.0.1 up to (excluding) 2.3.1 ","rangeStartType":"including","rangeStartVersion":"2.0.1","rangeEndType":"excluding","rangeEndVersion":"2.3.1","rangeId":"462223","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aapache%3Alog4j%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:apache:log4j","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-5","id":"16343390","matchCpes":[],"rangeDescription":" versions from (including) 2.4.0 up to (excluding) 2.12.2 ","rangeStartType":"including","rangeStartVersion":"2.4.0","rangeEndType":"excluding","rangeEndVersion":"2.12.2","rangeId":"462224","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aapache%3Alog4j%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:apache:log4j","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-6","id":"16343388","matchCpes":[],"rangeDescription":" versions from (including) 2.13.0 up to (excluding) 2.15.0 ","rangeStartType":"including","rangeStartVersion":"2.13.0","rangeEndType":"excluding","rangeEndVersion":"2.15.0","rangeId":"444608","rangeCpes":[]}],"containers":[]}]},{"id":2,"dataTestId":"vuln-software-config-2","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-2-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-2-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asiemens%3Asppa-t3000_ses3000_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:siemens:sppa-t3000_ses3000_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:siemens:sppa-t3000_ses3000_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-0-0","id":"16343391","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-2-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asiemens%3Asppa-t3000_ses3000%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:siemens:sppa-t3000_ses3000:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:siemens:sppa-t3000_ses3000:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-0","id":"16343392","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":3,"dataTestId":"vuln-software-config-3","totalCpeCount":63,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-3-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Acaptial%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:captial:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:captial","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-0","id":"16343455","matchCpes":[],"rangeDescription":" versions up to (excluding) 2019.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"2019.1","rangeId":"444908","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Acaptial%3A2019.1%3A-%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:captial:2019.1:-:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:captial:2019.1:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1","id":"16343438","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Acaptial%3A2019.1%3Asp1912%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:captial:2019.1:sp1912:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:captial:2019.1:sp1912","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-2","id":"16343422","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Acomos%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:comos:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:comos","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-3","id":"16343421","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Adesigo_cc_advanced_reports%3A4.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:desigo_cc_advanced_reports:4.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:desigo_cc_advanced_reports:4.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-4","id":"16343420","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Adesigo_cc_advanced_reports%3A4.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:desigo_cc_advanced_reports:4.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:desigo_cc_advanced_reports:4.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-5","id":"16343416","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Adesigo_cc_advanced_reports%3A4.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:desigo_cc_advanced_reports:4.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:desigo_cc_advanced_reports:4.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-6","id":"16343417","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Adesigo_cc_advanced_reports%3A5.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:desigo_cc_advanced_reports:5.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:desigo_cc_advanced_reports:5.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-7","id":"16343418","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Adesigo_cc_advanced_reports%3A5.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:desigo_cc_advanced_reports:5.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:desigo_cc_advanced_reports:5.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-8","id":"16343419","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Adesigo_cc_info_center%3A5.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:desigo_cc_info_center:5.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:desigo_cc_info_center:5.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-9","id":"16343414","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Adesigo_cc_info_center%3A5.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:desigo_cc_info_center:5.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:desigo_cc_info_center:5.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-10","id":"16343415","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Ae-car_operation_center%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:e-car_operation_center:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:e-car_operation_center","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-11","id":"16343413","matchCpes":[],"rangeDescription":" versions up to (excluding) 2021-12-13 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"2021-12-13","rangeId":"444865","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Aenergy_engage%3A3.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:energy_engage:3.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:energy_engage:3.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-12","id":"16343412","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Aenergyip%3A8.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:energyip:8.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:energyip:8.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-13","id":"16343408","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Aenergyip%3A8.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:energyip:8.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:energyip:8.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-14","id":"16343409","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Aenergyip%3A8.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:energyip:8.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:energyip:8.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-15","id":"16343410","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Aenergyip%3A9.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:energyip:9.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:energyip:9.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-16","id":"16343411","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Aenergyip_prepay%3A3.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:energyip_prepay:3.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:energyip_prepay:3.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-17","id":"16343398","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Aenergyip_prepay%3A3.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:energyip_prepay:3.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:energyip_prepay:3.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-18","id":"16343399","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Agma-manager%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:gma-manager:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:gma-manager","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-19","id":"16343407","matchCpes":[],"rangeDescription":" versions up to (excluding) 8.6.2j-398 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"8.6.2j-398","rangeId":"444859","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Ahead-end_system_universal_device_integration_system%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:head-end_system_universal_device_integration_system:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:head-end_system_universal_device_integration_system","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-20","id":"16343406","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Aindustrial_edge_management%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:industrial_edge_management:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:industrial_edge_management","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-21","id":"16343454","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Aindustrial_edge_management_hub%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:industrial_edge_management_hub:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:industrial_edge_management_hub","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-22","id":"16343453","matchCpes":[],"rangeDescription":" versions up to (excluding) 2021-12-13 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"2021-12-13","rangeId":"444906","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Alogo%5C%21_soft_comfort%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:logo\\!_soft_comfort:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:logo%21_soft_comfort","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-23","id":"16343393","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Amendix%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:mendix:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:mendix","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-24","id":"16343452","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Amindsphere%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:mindsphere:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:mindsphere","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-25","id":"16343451","matchCpes":[],"rangeDescription":" versions up to (excluding) 2021-12-11 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"2021-12-11","rangeId":"444904","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Anavigator%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:navigator:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:navigator","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-26","id":"16343423","matchCpes":[],"rangeDescription":" versions up to (excluding) 2021-12-13 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"2021-12-13","rangeId":"444876","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Anx%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:nx:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:nx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-27","id":"16343449","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Aopcenter_intelligence%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:opcenter_intelligence:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:opcenter_intelligence","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-28","id":"16343450","matchCpes":[],"rangeDescription":" versions up to (including) 3.2 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"3.2","rangeId":"444903","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Aoperation_scheduler%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:operation_scheduler:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:operation_scheduler","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-29","id":"16343448","matchCpes":[],"rangeDescription":" versions up to (including) 1.1.3 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"1.1.3","rangeId":"444901","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Asentron_powermanager%3A4.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:sentron_powermanager:4.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:sentron_powermanager:4.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-30","id":"16343447","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Asentron_powermanager%3A4.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:sentron_powermanager:4.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:sentron_powermanager:4.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-31","id":"16343446","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Asiguard_dsa%3A4.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:siguard_dsa:4.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:siguard_dsa:4.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-32","id":"16343445","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Asiguard_dsa%3A4.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:siguard_dsa:4.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:siguard_dsa:4.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-33","id":"16343443","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Asiguard_dsa%3A4.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:siguard_dsa:4.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:siguard_dsa:4.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-34","id":"16343444","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Asipass_integrated%3A2.80%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:sipass_integrated:2.80:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:sipass_integrated:2.80","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-35","id":"16343405","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Asipass_integrated%3A2.85%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:sipass_integrated:2.85:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:sipass_integrated:2.85","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-36","id":"16343404","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Asiveillance_command%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:siveillance_command:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:siveillance_command","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-37","id":"16343403","matchCpes":[],"rangeDescription":" versions up to (including) 4.16.2.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"4.16.2.1","rangeId":"444653","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Asiveillance_control_pro%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:siveillance_control_pro:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:siveillance_control_pro","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-38","id":"16343397","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Asiveillance_identity%3A1.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:siveillance_identity:1.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:siveillance_identity:1.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-39","id":"16343402","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Asiveillance_identity%3A1.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:siveillance_identity:1.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:siveillance_identity:1.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-40","id":"16343401","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Asiveillance_vantage%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:siveillance_vantage:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:siveillance_vantage","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-41","id":"16343442","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Asiveillance_viewpoint%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:siveillance_viewpoint:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:siveillance_viewpoint","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-42","id":"16343441","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Asolid_edge_cam_pro%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:solid_edge_cam_pro:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:solid_edge_cam_pro","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-43","id":"16343440","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Asolid_edge_harness_design%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:solid_edge_harness_design:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:solid_edge_harness_design","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-44","id":"16343437","matchCpes":[],"rangeDescription":" versions up to (excluding) 2020 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"2020","rangeId":"444890","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Asolid_edge_harness_design%3A2020%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:solid_edge_harness_design:2020:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:solid_edge_harness_design:2020","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-45","id":"16343439","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Asolid_edge_harness_design%3A2020%3A-%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:solid_edge_harness_design:2020:-:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:solid_edge_harness_design:2020:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-46","id":"16343436","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Asolid_edge_harness_design%3A2020%3Asp2002%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:solid_edge_harness_design:2020:sp2002:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:solid_edge_harness_design:2020:sp2002","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-47","id":"16343435","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Aspectrum_power_4%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:spectrum_power_4:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:spectrum_power_4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-48","id":"16343396","matchCpes":[],"rangeDescription":" versions up to (excluding) 4.70 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"4.70","rangeId":"380057","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Aspectrum_power_4%3A4.70%3A-%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:spectrum_power_4:4.70:-:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:spectrum_power_4:4.70:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-49","id":"16343395","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Aspectrum_power_4%3A4.70%3Asp7%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:spectrum_power_4:4.70:sp7:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:spectrum_power_4:4.70:sp7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-50","id":"16343394","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Aspectrum_power_4%3A4.70%3Asp8%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:spectrum_power_4:4.70:sp8:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:spectrum_power_4:4.70:sp8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-51","id":"16343400","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Aspectrum_power_7%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:spectrum_power_7:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:spectrum_power_7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-52","id":"16343433","matchCpes":[],"rangeDescription":" versions up to (excluding) 2.30 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"2.30","rangeId":"444886","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Aspectrum_power_7%3A2.30%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:spectrum_power_7:2.30:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:spectrum_power_7:2.30","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-53","id":"16343434","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Aspectrum_power_7%3A2.30%3A-%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:spectrum_power_7:2.30:-:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:spectrum_power_7:2.30:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-54","id":"16343432","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Aspectrum_power_7%3A2.30%3Asp2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:spectrum_power_7:2.30:sp2:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:spectrum_power_7:2.30:sp2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-55","id":"16343431","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Ateamcenter%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:teamcenter:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:teamcenter","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-56","id":"16343430","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Avesys%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:vesys:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:vesys","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-57","id":"16343428","matchCpes":[],"rangeDescription":" versions up to (excluding) 2019.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"2019.1","rangeId":"444881","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Avesys%3A2019.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:vesys:2019.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:vesys:2019.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-58","id":"16343427","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Avesys%3A2019.1%3A-%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:vesys:2019.1:-:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:vesys:2019.1:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-59","id":"16343429","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Avesys%3A2019.1%3Asp1912%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:vesys:2019.1:sp1912:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:vesys:2019.1:sp1912","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-60","id":"16343426","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Axpedition_enterprise%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:xpedition_enterprise:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:xpedition_enterprise:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-61","id":"16343425","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Axpedition_package_integrator%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:xpedition_package_integrator:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:xpedition_package_integrator:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-62","id":"16343424","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]},{"id":4,"dataTestId":"vuln-software-config-4","totalCpeCount":9,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-4-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aintel%3Aaudio_development_kit%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:intel:audio_development_kit:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:intel:audio_development_kit:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-0","id":"16343456","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aintel%3Acomputer_vision_annotation_tool%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:intel:computer_vision_annotation_tool:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:intel:computer_vision_annotation_tool:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1","id":"16343461","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aintel%3Adata_center_manager%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:intel:data_center_manager:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:intel:data_center_manager","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-2","id":"16343464","matchCpes":[],"rangeDescription":" versions up to (excluding) 5.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"5.1","rangeId":"556295","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aintel%3Agenomics_kernel_library%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:intel:genomics_kernel_library:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:intel:genomics_kernel_library:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-3","id":"16343462","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aintel%3Aoneapi_sample_browser%3A-%3A*%3A*%3A*%3A*%3Aeclipse%3A*%3A*","cpe23Uri":"cpe:2.3:a:intel:oneapi_sample_browser:-:*:*:*:*:eclipse:*:*","cpe22Uri":"cpe:/a:intel:oneapi_sample_browser:-::~~~eclipse~~","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-4","id":"16343459","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aintel%3Asecure_device_onboard%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:intel:secure_device_onboard:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:intel:secure_device_onboard:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-5","id":"16343458","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aintel%3Asensor_solution_firmware_development_kit%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:intel:sensor_solution_firmware_development_kit:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:intel:sensor_solution_firmware_development_kit:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-6","id":"16343460","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aintel%3Asystem_debugger%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:intel:system_debugger:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:intel:system_debugger:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-7","id":"16343457","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aintel%3Asystem_studio%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:intel:system_studio:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:intel:system_studio:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-8","id":"16343463","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]},{"id":5,"dataTestId":"vuln-software-config-5","totalCpeCount":3,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-5-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A9.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:debian:debian_linux:9.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0","id":"16343465","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A10.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:debian:debian_linux:10.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1","id":"16343466","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A11.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:debian:debian_linux:11.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-2","id":"16343467","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]},{"id":6,"dataTestId":"vuln-software-config-6","totalCpeCount":2,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-6-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afedoraproject%3Afedora%3A34%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:fedoraproject:fedora:34","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-6-0-0","id":"16343468","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afedoraproject%3Afedora%3A35%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:fedoraproject:fedora:35","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-6-0-1","id":"16343469","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]},{"id":7,"dataTestId":"vuln-software-config-7","totalCpeCount":1,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-7-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asonicwall%3Aemail_security%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:sonicwall:email_security:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:sonicwall:email_security","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-7-0-0","id":"16343470","matchCpes":[],"rangeDescription":" versions up to (excluding) 10.0.12 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"10.0.12","rangeId":"444622","rangeCpes":[]}],"containers":[]}]},{"id":8,"dataTestId":"vuln-software-config-8","totalCpeCount":9,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-8-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Anetapp%3Aactive_iq_unified_manager%3A-%3A*%3A*%3A*%3A*%3Alinux%3A*%3A*","cpe23Uri":"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*","cpe22Uri":"cpe:/a:netapp:active_iq_unified_manager:-::~~~linux~~","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-8-0-0","id":"16343474","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Anetapp%3Aactive_iq_unified_manager%3A-%3A*%3A*%3A*%3A*%3Avmware_vsphere%3A*%3A*","cpe23Uri":"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*","cpe22Uri":"cpe:/a:netapp:active_iq_unified_manager:-::~~~vmware_vsphere~~","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-8-0-1","id":"16343473","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Anetapp%3Aactive_iq_unified_manager%3A-%3A*%3A*%3A*%3A*%3Awindows%3A*%3A*","cpe23Uri":"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*","cpe22Uri":"cpe:/a:netapp:active_iq_unified_manager:-::~~~windows~~","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-8-0-2","id":"16343475","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Anetapp%3Acloud_insights%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:netapp:cloud_insights:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:netapp:cloud_insights:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-8-0-3","id":"16343472","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Anetapp%3Acloud_manager%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:netapp:cloud_manager:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:netapp:cloud_manager:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-8-0-4","id":"16343476","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Anetapp%3Acloud_secure_agent%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:netapp:cloud_secure_agent:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-8-0-5","id":"16343477","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Anetapp%3Aoncommand_insight%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:netapp:oncommand_insight:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-8-0-6","id":"16343471","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Anetapp%3Aontap_tools%3A-%3A*%3A*%3A*%3A*%3Avmware_vsphere%3A*%3A*","cpe23Uri":"cpe:2.3:a:netapp:ontap_tools:-:*:*:*:*:vmware_vsphere:*:*","cpe22Uri":"cpe:/a:netapp:ontap_tools:-::~~~vmware_vsphere~~","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-8-0-7","id":"16343478","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Anetapp%3Asnapcenter%3A-%3A*%3A*%3A*%3A*%3Avmware_vsphere%3A*%3A*","cpe23Uri":"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:vmware_vsphere:*:*","cpe22Uri":"cpe:/a:netapp:snapcenter:-::~~~vmware_vsphere~~","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-8-0-8","id":"16343479","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]},{"id":9,"dataTestId":"vuln-software-config-9","totalCpeCount":105,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-9-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aadvanced_malware_protection_virtual_private_cloud_appliance%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:advanced_malware_protection_virtual_private_cloud_appliance:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:advanced_malware_protection_virtual_private_cloud_appliance","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-0","id":"16343535","matchCpes":[],"rangeDescription":" versions up to (excluding) 3.5.4 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"3.5.4","rangeId":"444966","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aautomated_subsea_tuning%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:automated_subsea_tuning:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:automated_subsea_tuning","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-1","id":"16343533","matchCpes":[],"rangeDescription":" versions up to (excluding) 2.1.0 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"2.1.0","rangeId":"444964","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Abroadworks%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:broadworks:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:broadworks","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-2","id":"16343584","matchCpes":[],"rangeDescription":" versions up to (excluding) 2021.11_1.162 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"2021.11_1.162","rangeId":"445025","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Abusiness_process_automation%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:business_process_automation:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:business_process_automation","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-3","id":"16343532","matchCpes":[],"rangeDescription":" versions up to (excluding) 3.0.000.115 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"3.0.000.115","rangeId":"444963","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Abusiness_process_automation%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:business_process_automation:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:business_process_automation","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-4","id":"16343531","matchCpes":[],"rangeDescription":" versions from (including) 3.1.000.000 up to (excluding) 3.1.000.044 ","rangeStartType":"including","rangeStartVersion":"3.1.000.000","rangeEndType":"excluding","rangeEndVersion":"3.1.000.044","rangeId":"444962","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Abusiness_process_automation%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:business_process_automation:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:business_process_automation","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-5","id":"16343530","matchCpes":[],"rangeDescription":" versions from (including) 3.2.000.000 up to (excluding) 3.2.000.009 ","rangeStartType":"including","rangeStartVersion":"3.2.000.000","rangeEndType":"excluding","rangeEndVersion":"3.2.000.009","rangeId":"444961","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acloud_connect%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:cloud_connect:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:cloud_connect","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-6","id":"16343583","matchCpes":[],"rangeDescription":" versions up to (excluding) 12.6\\(1\\) ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"12.6\\(1\\)","rangeId":"445024","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acloudcenter%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:cloudcenter:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:cloudcenter","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-7","id":"16343526","matchCpes":[],"rangeDescription":" versions up to (excluding) 4.10.0.16 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"4.10.0.16","rangeId":"444957","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acloudcenter_cost_optimizer%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:cloudcenter_cost_optimizer:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:cloudcenter_cost_optimizer","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-8","id":"16343529","matchCpes":[],"rangeDescription":" versions up to (excluding) 5.5.2 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"5.5.2","rangeId":"444960","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acloudcenter_suite_admin%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:cloudcenter_suite_admin:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:cloudcenter_suite_admin","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-9","id":"16343528","matchCpes":[],"rangeDescription":" versions up to (excluding) 5.3.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"5.3.1","rangeId":"444959","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acloudcenter_workload_manager%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:cloudcenter_workload_manager:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:cloudcenter_workload_manager","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-10","id":"16343527","matchCpes":[],"rangeDescription":" versions up to (excluding) 5.5.2 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"5.5.2","rangeId":"444958","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acommon_services_platform_collector%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:common_services_platform_collector:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:common_services_platform_collector","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-11","id":"16343525","matchCpes":[],"rangeDescription":" versions up to (excluding) 2.9.1.3 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"2.9.1.3","rangeId":"444956","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acommon_services_platform_collector%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:common_services_platform_collector:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:common_services_platform_collector","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-12","id":"16343524","matchCpes":[],"rangeDescription":" versions from (including) 2.10.0 up to (excluding) 2.10.0.1 ","rangeStartType":"including","rangeStartVersion":"2.10.0","rangeEndType":"excluding","rangeEndVersion":"2.10.0.1","rangeId":"444955","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aconnected_mobile_experiences%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:connected_mobile_experiences:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:connected_mobile_experiences:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-13","id":"16343558","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acontact_center_domain_manager%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:contact_center_domain_manager:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:contact_center_domain_manager","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-14","id":"16343582","matchCpes":[],"rangeDescription":" versions up to (excluding) 12.5\\(1\\) ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"12.5\\(1\\)","rangeId":"445023","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acontact_center_management_portal%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:contact_center_management_portal:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:contact_center_management_portal","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-15","id":"16343581","matchCpes":[],"rangeDescription":" versions up to (excluding) 12.5\\(1\\) ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"12.5\\(1\\)","rangeId":"445022","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acrosswork_data_gateway%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:crosswork_data_gateway","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-16","id":"16343523","matchCpes":[],"rangeDescription":" versions up to (excluding) 2.0.2 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"2.0.2","rangeId":"444954","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acrosswork_data_gateway%3A3.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:crosswork_data_gateway:3.0.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:crosswork_data_gateway:3.0.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-17","id":"16343522","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acrosswork_network_controller%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:crosswork_network_controller:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:crosswork_network_controller","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-18","id":"16343521","matchCpes":[],"rangeDescription":" versions up to (excluding) 2.0.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"2.0.1","rangeId":"444952","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acrosswork_network_controller%3A3.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:crosswork_network_controller:3.0.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:crosswork_network_controller:3.0.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-19","id":"16343520","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acrosswork_optimization_engine%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:crosswork_optimization_engine:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:crosswork_optimization_engine","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-20","id":"16343518","matchCpes":[],"rangeDescription":" versions up to (excluding) 2.0.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"2.0.1","rangeId":"444949","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acrosswork_optimization_engine%3A3.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:crosswork_optimization_engine:3.0.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:crosswork_optimization_engine:3.0.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-21","id":"16343519","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acrosswork_platform_infrastructure%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:crosswork_platform_infrastructure:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:crosswork_platform_infrastructure","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-22","id":"16343516","matchCpes":[],"rangeDescription":" versions up to (excluding) 4.0.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"4.0.1","rangeId":"444947","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acrosswork_platform_infrastructure%3A4.1.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:crosswork_platform_infrastructure:4.1.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:crosswork_platform_infrastructure:4.1.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-23","id":"16343517","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acrosswork_zero_touch_provisioning%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:crosswork_zero_touch_provisioning","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-24","id":"16343514","matchCpes":[],"rangeDescription":" versions up to (excluding) 2.0.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"2.0.1","rangeId":"444945","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acrosswork_zero_touch_provisioning%3A3.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:3.0.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:crosswork_zero_touch_provisioning:3.0.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-25","id":"16343515","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acustomer_experience_cloud_agent%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:customer_experience_cloud_agent:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:customer_experience_cloud_agent","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-26","id":"16343536","matchCpes":[],"rangeDescription":" versions up to (excluding) 1.12.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"1.12.1","rangeId":"444967","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acyber_vision_sensor_management_extension%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:cyber_vision_sensor_management_extension:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:cyber_vision_sensor_management_extension","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-27","id":"16343513","matchCpes":[],"rangeDescription":" versions up to (excluding) 4.0.3 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"4.0.3","rangeId":"444944","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Adata_center_network_manager%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:data_center_network_manager:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:data_center_network_manager","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-28","id":"16343487","matchCpes":[],"rangeDescription":" versions up to (excluding) 11.3\\(1\\) ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"11.3\\(1\\)","rangeId":"323312","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Adata_center_network_manager%3A11.3%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:data_center_network_manager:11.3\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:data_center_network_manager:11.3%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-29","id":"16343495","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Adna_center%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:dna_center:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:dna_center","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-30","id":"16343552","matchCpes":[],"rangeDescription":" versions up to (excluding) 2.1.2.8 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"2.1.2.8","rangeId":"444992","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Adna_center%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:dna_center:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:dna_center","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-31","id":"16343555","matchCpes":[],"rangeDescription":" versions from (including) 2.2.2.0 up to (excluding) 2.2.2.8 ","rangeStartType":"including","rangeStartVersion":"2.2.2.0","rangeEndType":"excluding","rangeEndVersion":"2.2.2.8","rangeId":"444995","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Adna_center%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:dna_center:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:dna_center","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-32","id":"16343544","matchCpes":[],"rangeDescription":" versions from (including) 2.2.3.0 up to (excluding) 2.2.3.4 ","rangeStartType":"including","rangeStartVersion":"2.2.3.0","rangeEndType":"excluding","rangeEndVersion":"2.2.3.4","rangeId":"444984","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Adna_spaces%5C%3A_connector%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:dna_spaces\\:_connector:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:dna_spaces%3a_connector","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-33","id":"16343512","matchCpes":[],"rangeDescription":" versions up to (excluding) 2.5 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"2.5","rangeId":"444943","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aemergency_responder%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:emergency_responder:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:emergency_responder","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-34","id":"16343580","matchCpes":[],"rangeDescription":" versions up to (excluding) 11.5\\(4\\) ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"11.5\\(4\\)","rangeId":"445021","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aenterprise_chat_and_email%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:enterprise_chat_and_email:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:enterprise_chat_and_email","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-35","id":"16343579","matchCpes":[],"rangeDescription":" versions up to (excluding) 12.0\\(1\\) ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"12.0\\(1\\)","rangeId":"445020","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aevolved_programmable_network_manager%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:evolved_programmable_network_manager:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:evolved_programmable_network_manager","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-36","id":"16343510","matchCpes":[],"rangeDescription":" versions up to (including) 4.1.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"4.1.1","rangeId":"444941","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Afinesse%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:finesse:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:finesse","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-37","id":"16343502","matchCpes":[],"rangeDescription":" versions up to (excluding) 12.6\\(1\\) ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"12.6\\(1\\)","rangeId":"412744","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Afinesse%3A12.6%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:finesse:12.6\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:finesse:12.6%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-38","id":"16343503","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Afog_director%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:fog_director:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:fog_director:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-39","id":"16343543","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aidentity_services_engine%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:identity_services_engine","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-40","id":"16343486","matchCpes":[],"rangeDescription":" versions up to (excluding) 2.4.0 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"2.4.0","rangeId":"294688","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aidentity_services_engine%3A2.4.0%3A-%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:identity_services_engine:2.4.0:-:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:identity_services_engine:2.4.0:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-41","id":"16343501","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aintegrated_management_controller_supervisor%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:integrated_management_controller_supervisor:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:integrated_management_controller_supervisor","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-42","id":"16343546","matchCpes":[],"rangeDescription":" versions up to (excluding) 2.3.2.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"2.3.2.1","rangeId":"444986","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aintersight_virtual_appliance%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:intersight_virtual_appliance:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:intersight_virtual_appliance","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-43","id":"16343509","matchCpes":[],"rangeDescription":" versions up to (excluding) 1.0.9-361 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"1.0.9-361","rangeId":"444940","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aiot_operations_dashboard%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:iot_operations_dashboard:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:iot_operations_dashboard:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-44","id":"16343508","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Anetwork_assurance_engine%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:network_assurance_engine:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:network_assurance_engine","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-45","id":"16343550","matchCpes":[],"rangeDescription":" versions up to (excluding) 6.0.2 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"6.0.2","rangeId":"444990","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Anetwork_services_orchestrator%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:network_services_orchestrator","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-46","id":"16343507","matchCpes":[],"rangeDescription":" versions up to (excluding) 5.3.5.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"5.3.5.1","rangeId":"444938","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Anetwork_services_orchestrator%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:network_services_orchestrator","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-47","id":"16343511","matchCpes":[],"rangeDescription":" versions from (including) 5.4 up to (excluding) 5.4.5.2 ","rangeStartType":"including","rangeStartVersion":"5.4","rangeEndType":"excluding","rangeEndVersion":"5.4.5.2","rangeId":"444942","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Anetwork_services_orchestrator%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:network_services_orchestrator","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-48","id":"16343506","matchCpes":[],"rangeDescription":" versions from (including) 5.5 up to (excluding) 5.5.4.1 ","rangeStartType":"including","rangeStartVersion":"5.5","rangeEndType":"excluding","rangeEndVersion":"5.5.4.1","rangeId":"444937","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Anetwork_services_orchestrator%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:network_services_orchestrator","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-49","id":"16343505","matchCpes":[],"rangeDescription":" versions from (including) 5.6 up to (excluding) 5.6.3.1 ","rangeStartType":"including","rangeStartVersion":"5.6","rangeEndType":"excluding","rangeEndVersion":"5.6.3.1","rangeId":"444936","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Anexus_dashboard%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:nexus_dashboard:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:nexus_dashboard","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-50","id":"16343504","matchCpes":[],"rangeDescription":" versions up to (excluding) 2.1.2 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"2.1.2","rangeId":"444935","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Anexus_insights%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:nexus_insights:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:nexus_insights","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-51","id":"16343534","matchCpes":[],"rangeDescription":" versions up to (excluding) 6.0.2 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"6.0.2","rangeId":"444965","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aoptical_network_controller%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:optical_network_controller:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:optical_network_controller","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-52","id":"16343542","matchCpes":[],"rangeDescription":" versions up to (excluding) 1.1.0 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"1.1.0","rangeId":"444982","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Apackaged_contact_center_enterprise%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:packaged_contact_center_enterprise:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:packaged_contact_center_enterprise","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-53","id":"16343578","matchCpes":[],"rangeDescription":" versions up to (excluding) 11.6 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"11.6","rangeId":"445019","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Apackaged_contact_center_enterprise%3A11.6%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:packaged_contact_center_enterprise:11.6\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:packaged_contact_center_enterprise:11.6%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-54","id":"16343483","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Apaging_server%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:paging_server:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:paging_server","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-55","id":"16343576","matchCpes":[],"rangeDescription":" versions up to (excluding) 14.4.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"14.4.1","rangeId":"445017","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aprime_service_catalog%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:prime_service_catalog:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:prime_service_catalog","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-56","id":"16343557","matchCpes":[],"rangeDescription":" versions up to (excluding) 12.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"12.1","rangeId":"444997","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Asd-wan_vmanage%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:sd-wan_vmanage","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-57","id":"16343541","matchCpes":[],"rangeDescription":" versions up to (excluding) 20.3.4.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"20.3.4.1","rangeId":"444981","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Asd-wan_vmanage%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:sd-wan_vmanage","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-58","id":"16343545","matchCpes":[],"rangeDescription":" versions from (including) 20.4 up to (excluding) 20.4.2.1 ","rangeStartType":"including","rangeStartVersion":"20.4","rangeEndType":"excluding","rangeEndVersion":"20.4.2.1","rangeId":"444985","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Asd-wan_vmanage%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:sd-wan_vmanage","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-59","id":"16343549","matchCpes":[],"rangeDescription":" versions from (including) 20.5 up to (excluding) 20.5.1.1 ","rangeStartType":"including","rangeStartVersion":"20.5","rangeEndType":"excluding","rangeEndVersion":"20.5.1.1","rangeId":"444989","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Asd-wan_vmanage%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:sd-wan_vmanage","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-60","id":"16343553","matchCpes":[],"rangeDescription":" versions from (including) 20.6 up to (excluding) 20.6.2.1 ","rangeStartType":"including","rangeStartVersion":"20.6","rangeEndType":"excluding","rangeEndVersion":"20.6.2.1","rangeId":"444993","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Asmart_phy%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:smart_phy:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:smart_phy","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-61","id":"16343556","matchCpes":[],"rangeDescription":" versions up to (excluding) 3.2.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"3.2.1","rangeId":"444996","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aucs_central%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:ucs_central:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:ucs_central","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-62","id":"16343539","matchCpes":[],"rangeDescription":" versions up to (excluding) 2.0\\(1p\\) ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"2.0\\(1p\\)","rangeId":"444979","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aucs_director%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:ucs_director:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:ucs_director","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-63","id":"16343540","matchCpes":[],"rangeDescription":" versions up to (excluding) 6.8.2.0 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"6.8.2.0","rangeId":"444980","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_communications_manager%3A*%3A*%3A*%3A*%3A-%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:-:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_communications_manager:::~~-~~~","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-64","id":"16343572","matchCpes":[],"rangeDescription":" versions up to (excluding) 11.5\\(1\\) ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"11.5\\(1\\)","rangeId":"445013","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_communications_manager%3A*%3A*%3A*%3A*%3Asession_management%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:session_management:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_communications_manager:::~~session_management~~~","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-65","id":"16343571","matchCpes":[],"rangeDescription":" versions up to (excluding) 11.5\\(1\\) ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"11.5\\(1\\)","rangeId":"445012","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_communications_manager%3A11.5%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_communications_manager:11.5%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-66","id":"16343577","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_communications_manager%3A11.5%5C%281%5C%29%3A*%3A*%3A*%3A-%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1\\):*:*:*:-:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_communications_manager:11.5%281%29::~~-~~~","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-67","id":"16343575","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_communications_manager%3A11.5%5C%281%5C%29%3A*%3A*%3A*%3Asession_management%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1\\):*:*:*:session_management:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_communications_manager:11.5%281%29::~~session_management~~~","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-68","id":"16343574","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_communications_manager%3A11.5%5C%281%5C%29su3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1\\)su3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_communications_manager:11.5%281%29su3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-69","id":"16343573","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_communications_manager_im_and_presence_service%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_communications_manager_im_and_presence_service","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-70","id":"16343570","matchCpes":[],"rangeDescription":" versions up to (excluding) 11.5\\(1\\) ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"11.5\\(1\\)","rangeId":"445011","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_communications_manager_im_and_presence_service%3A11.5%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:11.5\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_communications_manager_im_and_presence_service:11.5%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-71","id":"16343480","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_contact_center_enterprise%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_contact_center_enterprise:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_contact_center_enterprise","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-72","id":"16343568","matchCpes":[],"rangeDescription":" versions up to (excluding) 11.6\\(2\\) ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"11.6\\(2\\)","rangeId":"445009","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_contact_center_enterprise%3A11.6%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_contact_center_enterprise:11.6\\(2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_contact_center_enterprise:11.6%282%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-73","id":"16343569","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_contact_center_express%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_contact_center_express:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_contact_center_express","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-74","id":"16343494","matchCpes":[],"rangeDescription":" versions up to (excluding) 12.5\\(1\\) ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"12.5\\(1\\)","rangeId":"347391","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_customer_voice_portal%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_customer_voice_portal:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_customer_voice_portal","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-75","id":"16343565","matchCpes":[],"rangeDescription":" versions up to (excluding) 11.6 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"11.6","rangeId":"445006","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_customer_voice_portal%3A11.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_customer_voice_portal:11.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_customer_voice_portal:11.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-76","id":"16343481","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_customer_voice_portal%3A12.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_customer_voice_portal:12.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_customer_voice_portal:12.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-77","id":"16343566","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_customer_voice_portal%3A12.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_customer_voice_portal:12.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_customer_voice_portal:12.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-78","id":"16343567","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunity_connection%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unity_connection:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unity_connection","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-79","id":"16343560","matchCpes":[],"rangeDescription":" versions up to (excluding) 11.5\\(1\\) ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"11.5\\(1\\)","rangeId":"445001","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Avideo_surveillance_operations_manager%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:video_surveillance_operations_manager:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:video_surveillance_operations_manager","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-80","id":"16343559","matchCpes":[],"rangeDescription":" versions up to (excluding) 7.14.4 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"7.14.4","rangeId":"445000","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Avirtual_topology_system%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:virtual_topology_system:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:virtual_topology_system","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-81","id":"16343554","matchCpes":[],"rangeDescription":" versions up to (excluding) 2.6.7 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"2.6.7","rangeId":"444994","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Avirtualized_infrastructure_manager%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:virtualized_infrastructure_manager:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:virtualized_infrastructure_manager","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-82","id":"16343551","matchCpes":[],"rangeDescription":" versions up to (excluding) 3.2.0 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"3.2.0","rangeId":"444991","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Avirtualized_infrastructure_manager%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:virtualized_infrastructure_manager:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:virtualized_infrastructure_manager","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-83","id":"16343548","matchCpes":[],"rangeDescription":" versions from (including) 3.4.0 up to (excluding) 3.4.4 ","rangeStartType":"including","rangeStartVersion":"3.4.0","rangeEndType":"excluding","rangeEndVersion":"3.4.4","rangeId":"444988","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Avirtualized_voice_browser%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:virtualized_voice_browser:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:virtualized_voice_browser","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-84","id":"16343561","matchCpes":[],"rangeDescription":" versions up to (excluding) 12.5\\(1\\) ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"12.5\\(1\\)","rangeId":"445002","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Awan_automation_engine%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:wan_automation_engine:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:wan_automation_engine","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-85","id":"16343547","matchCpes":[],"rangeDescription":" versions up to (excluding) 7.3.0.2 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"7.3.0.2","rangeId":"444987","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:webex_meetings_server:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:webex_meetings_server","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-86","id":"16343482","matchCpes":[],"rangeDescription":" versions up to (excluding) 3.0 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"3.0","rangeId":"265011","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A3.0%3A-%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:webex_meetings_server:3.0:-:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:webex_meetings_server:3.0:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-87","id":"16343485","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A3.0%3Amaintenance_release1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release1:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:webex_meetings_server:3.0:maintenance_release1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-88","id":"16343484","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A3.0%3Amaintenance_release2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release2:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:webex_meetings_server:3.0:maintenance_release2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-89","id":"16343488","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A3.0%3Amaintenance_release3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:webex_meetings_server:3.0:maintenance_release3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-90","id":"16343489","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A3.0%3Amaintenance_release3%3A-%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3:-:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:webex_meetings_server:3.0:maintenance_release3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-91","id":"16343496","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A3.0%3Amaintenance_release3_security_patch4%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3_security_patch4:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:webex_meetings_server:3.0:maintenance_release3_security_patch4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-92","id":"16343500","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A3.0%3Amaintenance_release3_security_patch5%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3_security_patch5:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:webex_meetings_server:3.0:maintenance_release3_security_patch5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-93","id":"16343537","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A3.0%3Amaintenance_release3_service_pack_2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3_service_pack_2:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:webex_meetings_server:3.0:maintenance_release3_service_pack_2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-94","id":"16343497","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A3.0%3Amaintenance_release3_service_pack_3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3_service_pack_3:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:webex_meetings_server:3.0:maintenance_release3_service_pack_3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-95","id":"16343498","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A3.0%3Amaintenance_release4%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release4:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:webex_meetings_server:3.0:maintenance_release4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-96","id":"16343499","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A4.0%3A-%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:webex_meetings_server:4.0:-:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:webex_meetings_server:4.0:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-97","id":"16343490","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A4.0%3Amaintenance_release1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_release1:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:webex_meetings_server:4.0:maintenance_release1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-98","id":"16343491","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A4.0%3Amaintenance_release2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_release2:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:webex_meetings_server:4.0:maintenance_release2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-99","id":"16343492","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A4.0%3Amaintenance_release3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_release3:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:webex_meetings_server:4.0:maintenance_release3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-100","id":"16343493","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aworkload_optimization_manager%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:workload_optimization_manager:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:workload_optimization_manager","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-101","id":"16343538","matchCpes":[],"rangeDescription":" versions up to (excluding) 3.2.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"3.2.1","rangeId":"444978","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aunified_intelligence_center%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:unified_intelligence_center:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:unified_intelligence_center","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-102","id":"16343564","matchCpes":[],"rangeDescription":" versions up to (excluding) 12.6\\(1\\) ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"12.6\\(1\\)","rangeId":"445005","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aunified_sip_proxy%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:unified_sip_proxy:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:unified_sip_proxy","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-103","id":"16343563","matchCpes":[],"rangeDescription":" versions up to (excluding) 10.2.1v2 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"10.2.1v2","rangeId":"445004","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aunified_workforce_optimization%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:unified_workforce_optimization:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:unified_workforce_optimization","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-104","id":"16343562","matchCpes":[],"rangeDescription":" versions up to (excluding) 11.5\\(1\\) ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"11.5\\(1\\)","rangeId":"445003","rangeCpes":[]}],"containers":[]}]},{"id":10,"dataTestId":"vuln-software-config-10","totalCpeCount":25,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-10-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-10-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Afirepower_1010%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:firepower_1010:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:firepower_1010:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-0-0","id":"16343597","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Afirepower_1120%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:firepower_1120:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:firepower_1120:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-0-1","id":"16343598","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Afirepower_1140%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:firepower_1140:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:firepower_1140:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-0-2","id":"16343599","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Afirepower_1150%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:firepower_1150:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:firepower_1150:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-0-3","id":"16343600","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Afirepower_2110%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:firepower_2110:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-0-4","id":"16343586","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Afirepower_2120%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:firepower_2120:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-0-5","id":"16343587","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Afirepower_2130%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:firepower_2130:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-0-6","id":"16343588","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Afirepower_2140%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:firepower_2140:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-0-7","id":"16343589","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Afirepower_4110%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:firepower_4110:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-0-8","id":"16343590","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Afirepower_4112%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:firepower_4112:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:firepower_4112:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-0-9","id":"16343601","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Afirepower_4115%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:firepower_4115:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:firepower_4115:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-0-10","id":"16343594","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Afirepower_4120%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:firepower_4120:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-0-11","id":"16343591","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Afirepower_4125%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:firepower_4125:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:firepower_4125:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-0-12","id":"16343595","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Afirepower_4140%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:firepower_4140:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-0-13","id":"16343592","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Afirepower_4145%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:firepower_4145:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:firepower_4145:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-0-14","id":"16343596","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Afirepower_4150%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:firepower_4150:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-0-15","id":"16343593","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Afirepower_9300%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:firepower_9300:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-0-16","id":"16343585","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-10-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Afxos%3A6.2.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:fxos:6.2.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:fxos:6.2.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-1-0","id":"16343608","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Afxos%3A6.3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:fxos:6.3.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:fxos:6.3.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-1-1","id":"16343607","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Afxos%3A6.4.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:fxos:6.4.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:fxos:6.4.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-1-2","id":"16343606","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Afxos%3A6.5.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:fxos:6.5.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:fxos:6.5.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-1-3","id":"16343605","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Afxos%3A6.6.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:fxos:6.6.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:fxos:6.6.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-1-4","id":"16343604","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Afxos%3A6.7.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:fxos:6.7.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:fxos:6.7.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-1-5","id":"16343603","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Afxos%3A7.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:fxos:7.0.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:fxos:7.0.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-1-6","id":"16343602","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Afxos%3A7.1.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:fxos:7.1.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:fxos:7.1.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-1-7","id":"16343609","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":11,"dataTestId":"vuln-software-config-11","totalCpeCount":166,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-11-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aautomated_subsea_tuning%3A02.01.00%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:automated_subsea_tuning:02.01.00:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:automated_subsea_tuning:02.01.00","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-0","id":"16343735","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Abroadworks%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:broadworks:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:broadworks:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-1","id":"16343673","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acloudcenter_suite%3A4.10%5C%280.15%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:cloudcenter_suite:4.10\\(0.15\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:cloudcenter_suite:4.10%280.15%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-2","id":"16343749","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acloudcenter_suite%3A5.3%5C%280%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:cloudcenter_suite:5.3\\(0\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:cloudcenter_suite:5.3%280%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-3","id":"16343732","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acloudcenter_suite%3A5.4%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:cloudcenter_suite:5.4\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:cloudcenter_suite:5.4%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-4","id":"16343734","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acloudcenter_suite%3A5.5%5C%280%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:cloudcenter_suite:5.5\\(0\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:cloudcenter_suite:5.5%280%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-5","id":"16343733","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acloudcenter_suite%3A5.5%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:cloudcenter_suite:5.5\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:cloudcenter_suite:5.5%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-6","id":"16343748","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acommon_services_platform_collector%3A002.009%5C%28000.000%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:common_services_platform_collector:002.009\\(000.000\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:common_services_platform_collector:002.009%28000.000%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-7","id":"16343775","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acommon_services_platform_collector%3A002.009%5C%28000.001%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:common_services_platform_collector:002.009\\(000.001\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:common_services_platform_collector:002.009%28000.001%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-8","id":"16343774","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acommon_services_platform_collector%3A002.009%5C%28000.002%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:common_services_platform_collector:002.009\\(000.002\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:common_services_platform_collector:002.009%28000.002%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-9","id":"16343773","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acommon_services_platform_collector%3A002.009%5C%28001.000%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:common_services_platform_collector:002.009\\(001.000\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:common_services_platform_collector:002.009%28001.000%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-10","id":"16343772","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acommon_services_platform_collector%3A002.009%5C%28001.001%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:common_services_platform_collector:002.009\\(001.001\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:common_services_platform_collector:002.009%28001.001%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-11","id":"16343771","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acommon_services_platform_collector%3A002.009%5C%28001.002%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:common_services_platform_collector:002.009\\(001.002\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:common_services_platform_collector:002.009%28001.002%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-12","id":"16343770","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acommon_services_platform_collector%3A002.010%5C%28000.000%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:common_services_platform_collector:002.010\\(000.000\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:common_services_platform_collector:002.010%28000.000%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-13","id":"16343769","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aconnected_analytics_for_network_deployment%3A006.004.000.003%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:connected_analytics_for_network_deployment:006.004.000.003:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:connected_analytics_for_network_deployment:006.004.000.003","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-14","id":"16343763","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aconnected_analytics_for_network_deployment%3A006.005.000.%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:connected_analytics_for_network_deployment:006.005.000.:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:connected_analytics_for_network_deployment:006.005.000.","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-15","id":"16343762","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aconnected_analytics_for_network_deployment%3A006.005.000.000%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:connected_analytics_for_network_deployment:006.005.000.000:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:connected_analytics_for_network_deployment:006.005.000.000","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-16","id":"16343761","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aconnected_analytics_for_network_deployment%3A007.000.001%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.000.001:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:connected_analytics_for_network_deployment:007.000.001","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-17","id":"16343760","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aconnected_analytics_for_network_deployment%3A007.001.000%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.001.000:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:connected_analytics_for_network_deployment:007.001.000","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-18","id":"16343759","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aconnected_analytics_for_network_deployment%3A007.002.000%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.002.000:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:connected_analytics_for_network_deployment:007.002.000","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-19","id":"16343758","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aconnected_analytics_for_network_deployment%3A7.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:connected_analytics_for_network_deployment:7.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:connected_analytics_for_network_deployment:7.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-20","id":"16343752","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aconnected_analytics_for_network_deployment%3A007.003.000%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.003.000:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:connected_analytics_for_network_deployment:007.003.000","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-21","id":"16343757","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aconnected_analytics_for_network_deployment%3A007.003.001.001%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.003.001.001:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:connected_analytics_for_network_deployment:007.003.001.001","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-22","id":"16343756","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aconnected_analytics_for_network_deployment%3A007.003.003%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.003.003:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:connected_analytics_for_network_deployment:007.003.003","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-23","id":"16343755","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aconnected_analytics_for_network_deployment%3A008.000.000%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:connected_analytics_for_network_deployment:008.000.000:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:connected_analytics_for_network_deployment:008.000.000","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-24","id":"16343754","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aconnected_analytics_for_network_deployment%3A008.000.000.000.004%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:connected_analytics_for_network_deployment:008.000.000.000.004:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:connected_analytics_for_network_deployment:008.000.000.000.004","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-25","id":"16343753","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acrosswork_network_automation%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:crosswork_network_automation:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:crosswork_network_automation:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-26","id":"16343766","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acrosswork_network_automation%3A2.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:crosswork_network_automation:2.0.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:crosswork_network_automation:2.0.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-27","id":"16343768","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acrosswork_network_automation%3A3.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:crosswork_network_automation:3.0.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:crosswork_network_automation:3.0.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-28","id":"16343767","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acrosswork_network_automation%3A4.1.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:crosswork_network_automation:4.1.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:crosswork_network_automation:4.1.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-29","id":"16343765","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acrosswork_network_automation%3A4.1.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:crosswork_network_automation:4.1.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:crosswork_network_automation:4.1.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-30","id":"16343764","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acx_cloud_agent%3A001.012%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:cx_cloud_agent:001.012:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:cx_cloud_agent:001.012","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-31","id":"16343746","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acyber_vision%3A4.0.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:cyber_vision:4.0.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:cyber_vision:4.0.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-32","id":"16343751","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Acyber_vision_sensor_management_extension%3A4.0.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:cyber_vision_sensor_management_extension:4.0.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:cyber_vision_sensor_management_extension:4.0.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-33","id":"16343623","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Adna_center%3A2.2.2.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:dna_center:2.2.2.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:dna_center:2.2.2.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-34","id":"16343694","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Adna_spaces%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:dna_spaces:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:dna_spaces:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-35","id":"16343750","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Adna_spaces_connector%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:dna_spaces_connector:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:dna_spaces_connector:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-36","id":"16343624","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aemergency_responder%3A11.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:emergency_responder:11.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:emergency_responder:11.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-37","id":"16343669","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aemergency_responder%3A11.5%5C%284.65000.14%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:emergency_responder:11.5\\(4.65000.14\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:emergency_responder:11.5%284.65000.14%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-38","id":"16343668","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aemergency_responder%3A11.5%5C%284.66000.14%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:emergency_responder:11.5\\(4.66000.14\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:emergency_responder:11.5%284.66000.14%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-39","id":"16343667","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aenterprise_chat_and_email%3A12.0%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:enterprise_chat_and_email:12.0\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:enterprise_chat_and_email:12.0%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-40","id":"16343666","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aenterprise_chat_and_email%3A12.5%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:enterprise_chat_and_email:12.5\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:enterprise_chat_and_email:12.5%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-41","id":"16343665","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aenterprise_chat_and_email%3A12.6%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:enterprise_chat_and_email:12.6\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:enterprise_chat_and_email:12.6%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-42","id":"16343664","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aevolved_programmable_network_manager%3A3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:evolved_programmable_network_manager:3.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:evolved_programmable_network_manager:3.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-43","id":"16343717","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aevolved_programmable_network_manager%3A3.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:evolved_programmable_network_manager:3.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:evolved_programmable_network_manager:3.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-44","id":"16343716","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aevolved_programmable_network_manager%3A4.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:evolved_programmable_network_manager:4.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:evolved_programmable_network_manager:4.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-45","id":"16343715","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aevolved_programmable_network_manager%3A4.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:evolved_programmable_network_manager:4.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:evolved_programmable_network_manager:4.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-46","id":"16343714","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aevolved_programmable_network_manager%3A5.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:evolved_programmable_network_manager:5.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:evolved_programmable_network_manager:5.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-47","id":"16343713","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aevolved_programmable_network_manager%3A5.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:evolved_programmable_network_manager:5.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:evolved_programmable_network_manager:5.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-48","id":"16343712","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Afinesse%3A12.5%5C%281%5C%29%3Asu1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:finesse:12.5\\(1\\):su1:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:finesse:12.5%281%29:su1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-49","id":"16343663","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Afinesse%3A12.5%5C%281%5C%29%3Asu2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:finesse:12.5\\(1\\):su2:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:finesse:12.5%281%29:su2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-50","id":"16343662","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Afinesse%3A12.6%5C%281%5C%29%3A-%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:finesse:12.6\\(1\\):-:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:finesse:12.6%281%29:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-51","id":"16343661","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Afinesse%3A12.6%5C%281%5C%29%3Aes01%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:finesse:12.6\\(1\\):es01:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:finesse:12.6%281%29:es01","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-52","id":"16343660","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Afinesse%3A12.6%5C%281%5C%29%3Aes02%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:finesse:12.6\\(1\\):es02:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:finesse:12.6%281%29:es02","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-53","id":"16343659","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Afinesse%3A12.6%5C%281%5C%29%3Aes03%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:finesse:12.6\\(1\\):es03:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:finesse:12.6%281%29:es03","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-54","id":"16343658","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Afirepower_threat_defense%3A6.2.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:firepower_threat_defense:6.2.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:firepower_threat_defense:6.2.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-55","id":"16343611","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Afirepower_threat_defense%3A6.3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:firepower_threat_defense:6.3.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:firepower_threat_defense:6.3.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-56","id":"16343614","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Afirepower_threat_defense%3A6.4.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:firepower_threat_defense:6.4.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:firepower_threat_defense:6.4.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-57","id":"16343613","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Afirepower_threat_defense%3A6.5.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:firepower_threat_defense:6.5.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:firepower_threat_defense:6.5.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-58","id":"16343617","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Afirepower_threat_defense%3A6.6.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:firepower_threat_defense:6.6.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:firepower_threat_defense:6.6.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-59","id":"16343618","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Afirepower_threat_defense%3A6.7.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:firepower_threat_defense:6.7.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:firepower_threat_defense:6.7.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-60","id":"16343744","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Afirepower_threat_defense%3A7.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:firepower_threat_defense:7.0.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:firepower_threat_defense:7.0.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-61","id":"16343743","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Afirepower_threat_defense%3A7.1.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:firepower_threat_defense:7.1.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:firepower_threat_defense:7.1.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-62","id":"16343742","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aidentity_services_engine%3A002.004%5C%28000.914%5C%29%3A-%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:identity_services_engine:002.004\\(000.914\\):-:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:identity_services_engine:002.004%28000.914%29:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-63","id":"16343741","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aidentity_services_engine%3A002.006%5C%28000.156%5C%29%3A-%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:identity_services_engine:002.006\\(000.156\\):-:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:identity_services_engine:002.006%28000.156%29:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-64","id":"16343740","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aidentity_services_engine%3A002.007%5C%28000.356%5C%29%3A-%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:identity_services_engine:002.007\\(000.356\\):-:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:identity_services_engine:002.007%28000.356%29:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-65","id":"16343739","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aidentity_services_engine%3A003.000%5C%28000.458%5C%29%3A-%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:identity_services_engine:003.000\\(000.458\\):-:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:identity_services_engine:003.000%28000.458%29:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-66","id":"16343738","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aidentity_services_engine%3A003.001%5C%28000.518%5C%29%3A-%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:identity_services_engine:003.001\\(000.518\\):-:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:identity_services_engine:003.001%28000.518%29:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-67","id":"16343737","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aidentity_services_engine%3A003.002%5C%28000.116%5C%29%3A-%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:identity_services_engine:003.002\\(000.116\\):-:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:identity_services_engine:003.002%28000.116%29:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-68","id":"16343736","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aintegrated_management_controller_supervisor%3A002.003%5C%28002.000%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:integrated_management_controller_supervisor:002.003\\(002.000\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:integrated_management_controller_supervisor:002.003%28002.000%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-69","id":"16343687","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aintegrated_management_controller_supervisor%3A2.3.2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:integrated_management_controller_supervisor:2.3.2.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:integrated_management_controller_supervisor:2.3.2.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-70","id":"16343686","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aintersight_virtual_appliance%3A1.0.9-343%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:intersight_virtual_appliance:1.0.9-343:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:intersight_virtual_appliance:1.0.9-343","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-71","id":"16343711","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Amobility_services_engine%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:mobility_services_engine:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:mobility_services_engine:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-72","id":"16343747","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Anetwork_assurance_engine%3A6.0%5C%282.1912%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:network_assurance_engine:6.0\\(2.1912\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:network_assurance_engine:6.0%282.1912%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-73","id":"16343693","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Anetwork_dashboard_fabric_controller%3A11.0%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.0\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:network_dashboard_fabric_controller:11.0%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-74","id":"16343725","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Anetwork_dashboard_fabric_controller%3A11.1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:network_dashboard_fabric_controller:11.1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-75","id":"16343724","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Anetwork_dashboard_fabric_controller%3A11.2%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.2\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:network_dashboard_fabric_controller:11.2%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-76","id":"16343723","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Anetwork_dashboard_fabric_controller%3A11.3%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.3\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:network_dashboard_fabric_controller:11.3%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-77","id":"16343722","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Anetwork_dashboard_fabric_controller%3A11.4%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.4\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:network_dashboard_fabric_controller:11.4%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-78","id":"16343721","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Anetwork_dashboard_fabric_controller%3A11.5%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.5\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:network_dashboard_fabric_controller:11.5%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-79","id":"16343720","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Anetwork_dashboard_fabric_controller%3A11.5%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.5\\(2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:network_dashboard_fabric_controller:11.5%282%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-80","id":"16343719","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Anetwork_dashboard_fabric_controller%3A11.5%5C%283%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.5\\(3\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:network_dashboard_fabric_controller:11.5%283%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-81","id":"16343718","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Anetwork_insights_for_data_center%3A6.0%5C%282.1914%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:network_insights_for_data_center:6.0\\(2.1914\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:network_insights_for_data_center:6.0%282.1914%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-82","id":"16343745","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Anetwork_services_orchestrator%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:network_services_orchestrator:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:network_services_orchestrator:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-83","id":"16343710","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aoptical_network_controller%3A1.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:optical_network_controller:1.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:optical_network_controller:1.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-84","id":"16343692","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Apaging_server%3A8.3%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:paging_server:8.3\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:paging_server:8.3%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-85","id":"16343651","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Apaging_server%3A8.4%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:paging_server:8.4\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:paging_server:8.4%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-86","id":"16343650","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Apaging_server%3A8.5%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:paging_server:8.5\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:paging_server:8.5%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-87","id":"16343649","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Apaging_server%3A9.0%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:paging_server:9.0\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:paging_server:9.0%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-88","id":"16343648","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Apaging_server%3A9.0%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:paging_server:9.0\\(2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:paging_server:9.0%282%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-89","id":"16343647","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Apaging_server%3A9.1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:paging_server:9.1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:paging_server:9.1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-90","id":"16343646","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Apaging_server%3A12.5%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:paging_server:12.5\\(2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:paging_server:12.5%282%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-91","id":"16343653","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Apaging_server%3A14.0%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:paging_server:14.0\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:paging_server:14.0%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-92","id":"16343652","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aprime_service_catalog%3A12.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:prime_service_catalog:12.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:prime_service_catalog:12.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-93","id":"16343610","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Asd-wan_vmanage%3A20.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:sd-wan_vmanage:20.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:sd-wan_vmanage:20.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-94","id":"16343619","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Asd-wan_vmanage%3A20.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:sd-wan_vmanage:20.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:sd-wan_vmanage:20.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-95","id":"16343691","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Asd-wan_vmanage%3A20.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:sd-wan_vmanage:20.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:sd-wan_vmanage:20.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-96","id":"16343621","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Asd-wan_vmanage%3A20.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:sd-wan_vmanage:20.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:sd-wan_vmanage:20.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-97","id":"16343620","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Asd-wan_vmanage%3A20.6.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:sd-wan_vmanage:20.6.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:sd-wan_vmanage:20.6.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-98","id":"16343688","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Asd-wan_vmanage%3A20.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:sd-wan_vmanage:20.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:sd-wan_vmanage:20.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-99","id":"16343690","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Asd-wan_vmanage%3A20.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:sd-wan_vmanage:20.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:sd-wan_vmanage:20.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-100","id":"16343689","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Asmart_phy%3A3.1.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:smart_phy:3.1.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:smart_phy:3.1.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-101","id":"16343708","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Asmart_phy%3A3.1.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:smart_phy:3.1.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:smart_phy:3.1.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-102","id":"16343707","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Asmart_phy%3A3.1.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:smart_phy:3.1.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:smart_phy:3.1.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-103","id":"16343706","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Asmart_phy%3A3.1.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:smart_phy:3.1.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:smart_phy:3.1.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-104","id":"16343705","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Asmart_phy%3A3.2.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:smart_phy:3.2.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:smart_phy:3.2.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-105","id":"16343704","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Asmart_phy%3A21.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:smart_phy:21.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:smart_phy:21.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-106","id":"16343709","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aucs_central_software%3A2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:ucs_central_software:2.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:ucs_central_software:2.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-107","id":"16343685","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aucs_central_software%3A2.0%5C%281a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:ucs_central_software:2.0\\(1a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:ucs_central_software:2.0%281a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-108","id":"16343684","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aucs_central_software%3A2.0%5C%281b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:ucs_central_software:2.0\\(1b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:ucs_central_software:2.0%281b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-109","id":"16343683","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aucs_central_software%3A2.0%5C%281c%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:ucs_central_software:2.0\\(1c\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:ucs_central_software:2.0%281c%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-110","id":"16343682","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aucs_central_software%3A2.0%5C%281d%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:ucs_central_software:2.0\\(1d\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:ucs_central_software:2.0%281d%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-111","id":"16343681","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aucs_central_software%3A2.0%5C%281e%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:ucs_central_software:2.0\\(1e\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:ucs_central_software:2.0%281e%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-112","id":"16343680","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aucs_central_software%3A2.0%5C%281f%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:ucs_central_software:2.0\\(1f\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:ucs_central_software:2.0%281f%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-113","id":"16343679","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aucs_central_software%3A2.0%5C%281g%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:ucs_central_software:2.0\\(1g\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:ucs_central_software:2.0%281g%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-114","id":"16343678","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aucs_central_software%3A2.0%5C%281h%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:ucs_central_software:2.0\\(1h\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:ucs_central_software:2.0%281h%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-115","id":"16343677","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aucs_central_software%3A2.0%5C%281k%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:ucs_central_software:2.0\\(1k\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:ucs_central_software:2.0%281k%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-116","id":"16343676","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aucs_central_software%3A2.0%5C%281l%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:ucs_central_software:2.0\\(1l\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:ucs_central_software:2.0%281l%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-117","id":"16343675","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_communications_manager%3A11.5%5C%281.17900.52%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.17900.52\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_communications_manager:11.5%281.17900.52%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-118","id":"16343645","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_communications_manager%3A11.5%5C%281.18119.2%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.18119.2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_communications_manager:11.5%281.18119.2%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-119","id":"16343644","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_communications_manager%3A11.5%5C%281.18900.97%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.18900.97\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_communications_manager:11.5%281.18900.97%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-120","id":"16343643","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_communications_manager%3A11.5%5C%281.21900.40%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.21900.40\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_communications_manager:11.5%281.21900.40%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-121","id":"16343642","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_communications_manager%3A11.5%5C%281.22900.28%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.22900.28\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_communications_manager:11.5%281.22900.28%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-122","id":"16343641","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_communications_manager_im_%5C%26_presence_service%3A11.5%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_communications_manager_im_\\&_presence_service:11.5\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_communications_manager_im_%26_presence_service:11.5%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-123","id":"16343640","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_communications_manager_im_%5C%26_presence_service%3A11.5%5C%281.22900.6%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_communications_manager_im_\\&_presence_service:11.5\\(1.22900.6\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_communications_manager_im_%26_presence_service:11.5%281.22900.6%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-124","id":"16343639","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_computing_system%3A006.008%5C%28001.000%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_computing_system:006.008\\(001.000\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_computing_system:006.008%28001.000%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-125","id":"16343674","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_contact_center_enterprise%3A11.6%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_contact_center_enterprise:11.6\\(2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_contact_center_enterprise:11.6%282%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-126","id":"16343622","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_contact_center_enterprise%3A12.0%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_contact_center_enterprise:12.0\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_contact_center_enterprise:12.0%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-127","id":"16343657","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_contact_center_enterprise%3A12.5%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_contact_center_enterprise:12.5\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_contact_center_enterprise:12.5%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-128","id":"16343656","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_contact_center_enterprise%3A12.6%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_contact_center_enterprise:12.6\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_contact_center_enterprise:12.6%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-129","id":"16343655","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_contact_center_enterprise%3A12.6%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_contact_center_enterprise:12.6\\(2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_contact_center_enterprise:12.6%282%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-130","id":"16343654","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_contact_center_express%3A12.5%5C%281%5C%29%3A-%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\):-:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_contact_center_express:12.5%281%29:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-131","id":"16343638","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_contact_center_express%3A12.5%5C%281%5C%29%3Asu1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\):su1:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_contact_center_express:12.5%281%29:su1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-132","id":"16343637","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_contact_center_express%3A12.6%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_contact_center_express:12.6\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_contact_center_express:12.6%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-133","id":"16343672","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_contact_center_express%3A12.6%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_contact_center_express:12.6\\(2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_contact_center_express:12.6%282%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-134","id":"16343671","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_contact_center_management_portal%3A12.6%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_contact_center_management_portal:12.6\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_contact_center_management_portal:12.6%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-135","id":"16343670","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_customer_voice_portal%3A11.6%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_customer_voice_portal:11.6\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_customer_voice_portal:11.6%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-136","id":"16343636","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_customer_voice_portal%3A12.0%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_customer_voice_portal:12.0\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_customer_voice_portal:12.0%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-137","id":"16343635","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_customer_voice_portal%3A12.5%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_customer_voice_portal:12.5\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_customer_voice_portal:12.5%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-138","id":"16343634","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_customer_voice_portal%3A12.6%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_customer_voice_portal:12.6\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_customer_voice_portal:12.6%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-139","id":"16343633","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_intelligence_center%3A12.6%5C%281%5C%29%3A-%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_intelligence_center:12.6\\(1\\):-:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_intelligence_center:12.6%281%29:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-140","id":"16343632","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_intelligence_center%3A12.6%5C%281%5C%29%3Aes01%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_intelligence_center:12.6\\(1\\):es01:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_intelligence_center:12.6%281%29:es01","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-141","id":"16343631","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_intelligence_center%3A12.6%5C%281%5C%29%3Aes02%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_intelligence_center:12.6\\(1\\):es02:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_intelligence_center:12.6%281%29:es02","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-142","id":"16343630","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_intelligence_center%3A12.6%5C%282%5C%29%3A-%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_intelligence_center:12.6\\(2\\):-:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_intelligence_center:12.6%282%29:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-143","id":"16343629","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_sip_proxy%3A010.000%5C%28000%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_sip_proxy:010.000\\(000\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_sip_proxy:010.000%28000%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-144","id":"16343628","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_sip_proxy%3A010.000%5C%28001%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_sip_proxy:010.000\\(001\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_sip_proxy:010.000%28001%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-145","id":"16343627","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_sip_proxy%3A010.002%5C%28000%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_sip_proxy:010.002\\(000\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_sip_proxy:010.002%28000%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-146","id":"16343626","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_sip_proxy%3A010.002%5C%28001%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_sip_proxy:010.002\\(001\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_sip_proxy:010.002%28001%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-147","id":"16343625","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_workforce_optimization%3A11.5%5C%281%5C%29%3Asr7%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_workforce_optimization:11.5\\(1\\):sr7:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_workforce_optimization:11.5%281%29:sr7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-148","id":"16343730","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunity_connection%3A11.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unity_connection:11.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unity_connection:11.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-149","id":"16343616","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunity_connection%3A11.5%5C%281.10000.6%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unity_connection:11.5\\(1.10000.6\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unity_connection:11.5%281.10000.6%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-150","id":"16343731","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Avideo_surveillance_manager%3A7.14%5C%281.26%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:video_surveillance_manager:7.14\\(1.26\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:video_surveillance_manager:7.14%281.26%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-151","id":"16343729","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Avideo_surveillance_manager%3A7.14%5C%282.26%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:video_surveillance_manager:7.14\\(2.26\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:video_surveillance_manager:7.14%282.26%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-152","id":"16343728","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Avideo_surveillance_manager%3A7.14%5C%283.025%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:video_surveillance_manager:7.14\\(3.025\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:video_surveillance_manager:7.14%283.025%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-153","id":"16343727","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Avideo_surveillance_manager%3A7.14%5C%284.018%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:video_surveillance_manager:7.14\\(4.018\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:video_surveillance_manager:7.14%284.018%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-154","id":"16343726","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Avirtual_topology_system%3A2.6.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:virtual_topology_system:2.6.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:virtual_topology_system:2.6.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-155","id":"16343703","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Awan_automation_engine%3A7.1.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:wan_automation_engine:7.1.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:wan_automation_engine:7.1.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-156","id":"16343702","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Awan_automation_engine%3A7.2.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:wan_automation_engine:7.2.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:wan_automation_engine:7.2.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-157","id":"16343701","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Awan_automation_engine%3A7.2.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:wan_automation_engine:7.2.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:wan_automation_engine:7.2.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-158","id":"16343700","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Awan_automation_engine%3A7.2.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:wan_automation_engine:7.2.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:wan_automation_engine:7.2.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-159","id":"16343699","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Awan_automation_engine%3A7.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:wan_automation_engine:7.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:wan_automation_engine:7.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-160","id":"16343698","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Awan_automation_engine%3A7.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:wan_automation_engine:7.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:wan_automation_engine:7.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-161","id":"16343697","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Awan_automation_engine%3A7.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:wan_automation_engine:7.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:wan_automation_engine:7.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-162","id":"16343696","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Awan_automation_engine%3A7.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:wan_automation_engine:7.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:wan_automation_engine:7.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-163","id":"16343695","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:webex_meetings_server:3.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:webex_meetings_server:3.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-164","id":"16343612","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A4.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:webex_meetings_server:4.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:webex_meetings_server:4.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-165","id":"16343615","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]},{"id":12,"dataTestId":"vuln-software-config-12","totalCpeCount":2,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-12-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asnowsoftware%3Asnow_commander%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:snowsoftware:snow_commander:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:snowsoftware:snow_commander","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-12-0-0","id":"16343777","matchCpes":[],"rangeDescription":" versions up to (excluding) 8.10.0 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"8.10.0","rangeId":"455891","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asnowsoftware%3Avm_access_proxy%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:snowsoftware:vm_access_proxy:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:snowsoftware:vm_access_proxy","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-12-0-1","id":"16343776","matchCpes":[],"rangeDescription":" versions up to (excluding) 3.6 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"3.6","rangeId":"455890","rangeCpes":[]}],"containers":[]}]},{"id":13,"dataTestId":"vuln-software-config-13","totalCpeCount":2,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-13-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Abentley%3Asynchro%3A*%3A*%3A*%3A*%3Apro%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:bentley:synchro:*:*:*:*:pro:*:*:*","cpe22Uri":"cpe:/a:bentley:synchro:::~~pro~~~","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-13-0-0","id":"16343779","matchCpes":[],"rangeDescription":" versions from (including) 6.1 up to (excluding) 6.4.3.2 ","rangeStartType":"including","rangeStartVersion":"6.1","rangeEndType":"excluding","rangeEndVersion":"6.4.3.2","rangeId":"477781","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Abentley%3Asynchro_4d%3A*%3A*%3A*%3A*%3Apro%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:bentley:synchro_4d:*:*:*:*:pro:*:*:*","cpe22Uri":"cpe:/a:bentley:synchro_4d:::~~pro~~~","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-13-0-1","id":"16343778","matchCpes":[],"rangeDescription":" versions up to (excluding) 6.2.4.2 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"6.2.4.2","rangeId":"477780","rangeCpes":[]}],"containers":[]}]},{"id":14,"dataTestId":"vuln-software-config-14","totalCpeCount":1,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-14-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Apercussion%3Arhythmyx%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:percussion:rhythmyx:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:percussion:rhythmyx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-14-0-0","id":"16343780","matchCpes":[],"rangeDescription":" versions up to (including) 7.3.2 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"including","rangeEndVersion":"7.3.2","rangeId":"514093","rangeCpes":[]}],"containers":[]}]},{"id":15,"dataTestId":"vuln-software-config-15","totalCpeCount":1,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-15-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aapple%3Axcode%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:apple:xcode","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-15-0-0","id":"16343781","matchCpes":[],"rangeDescription":" versions up to (excluding) 13.3 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"13.3","rangeId":"480114","rangeCpes":[]}],"containers":[]}]}]"/>
|
||
|
||
<p id="vulnCpeInfo" >
|
||
<small>
|
||
<i class="fa fa-bug fa-flip-vertical"></i> Denotes Vulnerable Software<br />
|
||
<a href="mailto:cpe_dictionary@nist.gov">Are we missing a CPE here? Please let us know</a>.<br />
|
||
|
||
</small>
|
||
</p>
|
||
<script src="/site-media/js/vulnerability/cpe-match.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/vulnerability/configurationListing.js"
|
||
type="text/javascript"></script>
|
||
</div>
|
||
</div>
|
||
|
||
<div id="vulnChangeHistoryDiv"
|
||
data-testid="vuln-change-history-container">
|
||
<h3 id="VulnChangeHistorySection">Change History</h3>
|
||
<small> 54 change records found <a href="#VulnChangeHistorySection"
|
||
style="text-decoration: underline" id="changeHistoryToggle">show
|
||
changes</a>
|
||
</small>
|
||
<div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-0">CVE Modified by CISA-ADP</span> <span
|
||
data-testid="vuln-change-history-date-0">2/04/2025 10:15:13 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">CVSS V3.1</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-1">CVE Modified by CVE</span> <span
|
||
data-testid="vuln-change-history-date-1">11/21/2024 1:30:38 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">http://seclists.org/fulldisclosure/2022/Dec/2</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">http://seclists.org/fulldisclosure/2022/Jul/11</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">http://seclists.org/fulldisclosure/2022/Mar/23</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/10/1</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/10/2</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/10/3</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/13/1</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/13/2</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/14/4</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/15/3</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">https://github.com/cisagov/log4j-affected-db</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">https://logging.apache.org/log4j/2.x/security.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">https://security.netapp.com/advisory/ntap-20211210-0007/</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">https://support.apple.com/kb/HT213189</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">https://twitter.com/kurtseifried/status/1469345530182455296</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.debian.org/security/2021/dsa-5020</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.kb.cert.org/vuls/id/930724</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/alert-cve-2021-44228.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpuapr2022.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpujan2022.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-2">Modified Analysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-2">7/24/2024 1:08:24 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
cpe:2.3:h:siemens:sppa-t3000_ses3000:-:*:*:*:*:*:*:*
|
||
OR
|
||
*cpe:2.3:o:siemens:sppa-t3000_ses3000_firmware:*:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:siemens:sppa-t3000_ses3000_firmware:*:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:siemens:sppa-t3000_ses3000:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:* versions up to (excluding) 13.3</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html Third Party Advisory, VDB Entry</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html Exploit, Third Party Advisory, VDB Entry</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html Third Party Advisory, VDB Entry</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html Exploit, Third Party Advisory, VDB Entry</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html Third Party Advisory, VDB Entry</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html Exploit, Third Party Advisory, VDB Entry</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html Third Party Advisory, VDB Entry</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html Exploit, Third Party Advisory, VDB Entry</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html Third Party Advisory, VDB Entry</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md Product, US Government Resource</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md Broken Link, Product, US Government Resource</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/ No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/ Release Notes</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/ No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/ Release Notes</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://security.netapp.com/advisory/ntap-20211210-0007/ Vendor Advisory</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">https://security.netapp.com/advisory/ntap-20211210-0007/ Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://twitter.com/kurtseifried/status/1469345530182455296 Exploit, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">https://twitter.com/kurtseifried/status/1469345530182455296 Broken Link, Exploit, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://www.debian.org/security/2021/dsa-5020 Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.debian.org/security/2021/dsa-5020 Mailing List, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-3">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-3">5/14/2024 5:36:54 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-4">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-4">11/06/2023 10:39:36 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">Reference</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">Apache Software Foundation https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/ [No types assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">Reference</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">Apache Software Foundation https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/ [No types assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">Reference</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">Apache Software Foundation https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">Reference</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">Apache Software Foundation https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-5">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-5">4/03/2023 4:15:07 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-5">
|
||
<td
|
||
data-testid="vuln-change-history-5-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-5-type">Reference</td>
|
||
<td data-testid="vuln-change-history-5-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-5-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-6">Modified Analysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-6">2/06/2023 1:53:16 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-6">
|
||
<td
|
||
data-testid="vuln-change-history-6-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-6-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-6-old">
|
||
|
||
|
||
|
||
|
||
<strong data-testid="vuln-change-history-6-showing"
|
||
>Record truncated, showing 500 of 563 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=02/06/2023T13:53:16.990-0500">View Entire Change Record</a><br/>
|
||
<pre>OR
|
||
*cpe:2.3:a:intel:audio_development_kit:-:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:intel:computer_vision_annotation_tool:-:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:intel:data_center_manager:-:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:intel:genomics_kernel_library:-:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:intel:oneapi_sample_browser:-:*:*:*:*:eclipse:*:*
|
||
*cpe:2.3:a:intel:secure_device_onboard:-:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:intel:sensor_solution_firmware_development_kit:-:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:intel:system_debugger:-:*:</pre>
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-6-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-6-showing"
|
||
|
||
>Record truncated, showing 500 of 594 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=02/06/2023T13:53:16.990-0500">View Entire Change Record</a><br />
|
||
<pre>OR
|
||
*cpe:2.3:a:intel:audio_development_kit:-:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:intel:computer_vision_annotation_tool:-:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:intel:data_center_manager:*:*:*:*:*:*:*:* versions up to (excluding) 5.1
|
||
*cpe:2.3:a:intel:genomics_kernel_library:-:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:intel:oneapi_sample_browser:-:*:*:*:*:eclipse:*:*
|
||
*cpe:2.3:a:intel:secure_device_onboard:-:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:intel:sensor_solution_firmware_development_kit:-:*:*:*:*:*:*:*
|
||
*cpe:2</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-6">
|
||
<td
|
||
data-testid="vuln-change-history-6-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-6-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-6-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://seclists.org/fulldisclosure/2022/Dec/2 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-6-new">
|
||
|
||
<pre style="word-break: break-all !important">http://seclists.org/fulldisclosure/2022/Dec/2 Exploit, Mailing List, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-7">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-7">12/09/2022 12:15:12 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-7">
|
||
<td
|
||
data-testid="vuln-change-history-7-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-7-type">Reference</td>
|
||
<td data-testid="vuln-change-history-7-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-7-new">
|
||
|
||
<pre style="word-break: break-all !important">http://seclists.org/fulldisclosure/2022/Dec/2 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-8">Reanalysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-8">8/17/2022 1:46:12 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-8">
|
||
<td
|
||
data-testid="vuln-change-history-8-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-8-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-8-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-8-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:a:percussion:rhythmyx:*:*:*:*:*:*:*:* versions up to (including) 7.3.2</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-9">Modified Analysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-9">8/09/2022 9:17:54 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-9">
|
||
<td
|
||
data-testid="vuln-change-history-9-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-9-type">CWE</td>
|
||
<td data-testid="vuln-change-history-9-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-9-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST CWE-917</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-9">
|
||
<td
|
||
data-testid="vuln-change-history-9-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-9-type">CWE</td>
|
||
<td data-testid="vuln-change-history-9-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">NIST CWE-502</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-9-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-9">
|
||
<td
|
||
data-testid="vuln-change-history-9-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-9-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-9-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-9-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html Third Party Advisory, VDB Entry</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-9">
|
||
<td
|
||
data-testid="vuln-change-history-9-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-9-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-9-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-9-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html Exploit, Third Party Advisory, VDB Entry</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-9">
|
||
<td
|
||
data-testid="vuln-change-history-9-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-9-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-9-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://seclists.org/fulldisclosure/2022/Jul/11 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-9-new">
|
||
|
||
<pre style="word-break: break-all !important">http://seclists.org/fulldisclosure/2022/Jul/11 Mailing List, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-10">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-10">8/03/2022 2:15:11 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-10">
|
||
<td
|
||
data-testid="vuln-change-history-10-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-10-type">Reference</td>
|
||
<td data-testid="vuln-change-history-10-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-10-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-11">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-11">7/22/2022 2:15:08 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-11">
|
||
<td
|
||
data-testid="vuln-change-history-11-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-11-type">Reference</td>
|
||
<td data-testid="vuln-change-history-11-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-11-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-12">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-12">7/22/2022 2:15:09 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-12">
|
||
<td
|
||
data-testid="vuln-change-history-12-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-12-type">Reference</td>
|
||
<td data-testid="vuln-change-history-12-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-12-new">
|
||
|
||
<pre style="word-break: break-all !important">http://seclists.org/fulldisclosure/2022/Jul/11 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-13">Modified Analysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-13">6/30/2022 2:26:17 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-13">
|
||
<td
|
||
data-testid="vuln-change-history-13-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-13-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-13-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-13-new">
|
||
|
||
<pre style="word-break: break-all !important">https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228 Exploit, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-13">
|
||
<td
|
||
data-testid="vuln-change-history-13-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-13-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-13-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-13-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html Exploit, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-13">
|
||
<td
|
||
data-testid="vuln-change-history-13-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-13-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-13-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpuapr2022.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-13-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpuapr2022.html Patch, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-14">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-14">5/05/2022 7:15:08 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-14">
|
||
<td
|
||
data-testid="vuln-change-history-14-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-14-type">Reference</td>
|
||
<td data-testid="vuln-change-history-14-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-14-new">
|
||
|
||
<pre style="word-break: break-all !important">https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-14">
|
||
<td
|
||
data-testid="vuln-change-history-14-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-14-type">Reference</td>
|
||
<td data-testid="vuln-change-history-14-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-14-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-15">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-15">4/19/2022 8:16:30 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-15">
|
||
<td
|
||
data-testid="vuln-change-history-15-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-15-type">Reference</td>
|
||
<td data-testid="vuln-change-history-15-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-15-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpuapr2022.html [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-16">Reanalysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-16">4/18/2022 9:45:53 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-16">
|
||
<td
|
||
data-testid="vuln-change-history-16-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-16-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-16-old">
|
||
|
||
|
||
|
||
|
||
<strong data-testid="vuln-change-history-16-showing"
|
||
>Record truncated, showing 500 of 504 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=04/18/2022T09:45:53.437-0400">View Entire Change Record</a><br/>
|
||
<pre>OR
|
||
*cpe:2.3:a:apache:log4j:2.0:-:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:beta9:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:rc1:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:rc2:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.0.1 up to (excluding) 2.3.1
|
||
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.4.0 up to (excluding) 2.12.2
|
||
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.13.0 up to (excluding) 2.</pre>
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-16-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-16-showing"
|
||
|
||
>Record truncated, showing 500 of 504 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=04/18/2022T09:45:53.437-0400">View Entire Change Record</a><br />
|
||
<pre>OR
|
||
*cpe:2.3:a:apache:log4j:2.0:-:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:beta9:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:rc1:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:rc2:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.0.1 up to (excluding) 2.3.1
|
||
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.4.0 up to (excluding) 2.12.2
|
||
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.13.0 up to (excluding) 2.</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-16">
|
||
<td
|
||
data-testid="vuln-change-history-16-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-16-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-16-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://seclists.org/fulldisclosure/2022/Mar/23 Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-16-new">
|
||
|
||
<pre style="word-break: break-all !important">http://seclists.org/fulldisclosure/2022/Mar/23 Mailing List, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-17">Modified Analysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-17">4/12/2022 2:14:48 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-17">
|
||
<td
|
||
data-testid="vuln-change-history-17-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-17-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-17-old">
|
||
|
||
|
||
|
||
|
||
<strong data-testid="vuln-change-history-17-showing"
|
||
>Record truncated, showing 500 of 504 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=04/12/2022T14:14:48.383-0400">View Entire Change Record</a><br/>
|
||
<pre>OR
|
||
*cpe:2.3:a:apache:log4j:2.0:-:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:beta9:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:rc1:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:rc2:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.0.1 up to (excluding) 2.3.1
|
||
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.4.0 up to (excluding) 2.12.2
|
||
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.13.0 up to (excluding) 2.</pre>
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-17-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-17-showing"
|
||
|
||
>Record truncated, showing 500 of 504 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=04/12/2022T14:14:48.383-0400">View Entire Change Record</a><br />
|
||
<pre>OR
|
||
*cpe:2.3:a:apache:log4j:2.0:-:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:beta9:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:rc1:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:rc2:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.0.1 up to (excluding) 2.3.1
|
||
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.4.0 up to (excluding) 2.12.2
|
||
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.13.0 up to (excluding) 2.</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-17">
|
||
<td
|
||
data-testid="vuln-change-history-17-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-17-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-17-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-17-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:a:bentley:synchro:*:*:*:*:pro:*:*:* versions from (including) 6.1 up to (excluding) 6.4.3.2
|
||
*cpe:2.3:a:bentley:synchro_4d:*:*:*:*:pro:*:*:* versions up to (excluding) 6.2.4.2</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-17">
|
||
<td
|
||
data-testid="vuln-change-history-17-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-17-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-17-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://seclists.org/fulldisclosure/2022/Mar/23 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-17-new">
|
||
|
||
<pre style="word-break: break-all !important">http://seclists.org/fulldisclosure/2022/Mar/23 Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-17">
|
||
<td
|
||
data-testid="vuln-change-history-17-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-17-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-17-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://github.com/cisagov/log4j-affected-db No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-17-new">
|
||
|
||
<pre style="word-break: break-all !important">https://github.com/cisagov/log4j-affected-db Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-17">
|
||
<td
|
||
data-testid="vuln-change-history-17-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-17-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-17-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://support.apple.com/kb/HT213189 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-17-new">
|
||
|
||
<pre style="word-break: break-all !important">https://support.apple.com/kb/HT213189 Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-17">
|
||
<td
|
||
data-testid="vuln-change-history-17-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-17-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-17-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-17-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001 Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-18">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-18">3/15/2022 2:15:15 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-18">
|
||
<td
|
||
data-testid="vuln-change-history-18-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-18-type">Reference</td>
|
||
<td data-testid="vuln-change-history-18-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-18-new">
|
||
|
||
<pre style="word-break: break-all !important">http://seclists.org/fulldisclosure/2022/Mar/23 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-19">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-19">3/14/2022 4:15:08 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-19">
|
||
<td
|
||
data-testid="vuln-change-history-19-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-19-type">Reference</td>
|
||
<td data-testid="vuln-change-history-19-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-19-new">
|
||
|
||
<pre style="word-break: break-all !important">https://support.apple.com/kb/HT213189 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-20">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-20">3/01/2022 6:15:08 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-20">
|
||
<td
|
||
data-testid="vuln-change-history-20-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-20-type">Reference</td>
|
||
<td data-testid="vuln-change-history-20-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-20-new">
|
||
|
||
<pre style="word-break: break-all !important">https://github.com/cisagov/log4j-affected-db [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-20">
|
||
<td
|
||
data-testid="vuln-change-history-20-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-20-type">Reference</td>
|
||
<td data-testid="vuln-change-history-20-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-20-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-21">Modified Analysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-21">2/18/2022 11:23:10 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-21">
|
||
<td
|
||
data-testid="vuln-change-history-21-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-21-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-21-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpujan2022.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-21-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpujan2022.html Patch, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-22">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-22">2/07/2022 11:16:32 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-22">
|
||
<td
|
||
data-testid="vuln-change-history-22-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-22-type">Reference</td>
|
||
<td data-testid="vuln-change-history-22-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-22-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpujan2022.html [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-23">Modified Analysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-23">2/01/2022 3:31:54 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-23">
|
||
<td
|
||
data-testid="vuln-change-history-23-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-23-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-23-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:a:apache:log4j:2.0:-:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:beta9:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:rc1:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:rc2:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.0.1 up to (excluding) 2.12.2
|
||
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.13.0 up to (excluding) 2.15.0</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-23-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-23-showing"
|
||
|
||
>Record truncated, showing 500 of 504 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=02/01/2022T15:31:54.840-0500">View Entire Change Record</a><br />
|
||
<pre>OR
|
||
*cpe:2.3:a:apache:log4j:2.0:-:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:beta9:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:rc1:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:rc2:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.0.1 up to (excluding) 2.3.1
|
||
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.4.0 up to (excluding) 2.12.2
|
||
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.13.0 up to (excluding) 2.</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-23">
|
||
<td
|
||
data-testid="vuln-change-history-23-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-23-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-23-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-23-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-23">
|
||
<td
|
||
data-testid="vuln-change-history-23-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-23-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-23-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-23-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html Third Party Advisory, VDB Entry</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-23">
|
||
<td
|
||
data-testid="vuln-change-history-23-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-23-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-23-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-23-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html Third Party Advisory, VDB Entry</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-23">
|
||
<td
|
||
data-testid="vuln-change-history-23-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-23-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-23-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-23-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html Third Party Advisory, VDB Entry</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-23">
|
||
<td
|
||
data-testid="vuln-change-history-23-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-23-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-23-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-23-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html Third Party Advisory, VDB Entry</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-23">
|
||
<td
|
||
data-testid="vuln-change-history-23-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-23-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-23-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-23-new">
|
||
|
||
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-23">
|
||
<td
|
||
data-testid="vuln-change-history-23-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-23-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-23-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-23-new">
|
||
|
||
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-23">
|
||
<td
|
||
data-testid="vuln-change-history-23-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-23-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-23-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-23-new">
|
||
|
||
<pre style="word-break: break-all !important">https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md Product, US Government Resource</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-23">
|
||
<td
|
||
data-testid="vuln-change-history-23-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-23-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-23-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/ No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-23-new">
|
||
|
||
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/ Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-23">
|
||
<td
|
||
data-testid="vuln-change-history-23-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-23-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-23-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ Patch, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-23-new">
|
||
|
||
<pre style="word-break: break-all !important">https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ Patch, Third Party Advisory, Vendor Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-24">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-24">1/24/2022 12:15:09 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-24">
|
||
<td
|
||
data-testid="vuln-change-history-24-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-24-type">Reference</td>
|
||
<td data-testid="vuln-change-history-24-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-24-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-25">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-25">1/20/2022 4:15:11 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-25">
|
||
<td
|
||
data-testid="vuln-change-history-25-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-25-type">Reference</td>
|
||
<td data-testid="vuln-change-history-25-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-25-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-26">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-26">1/18/2022 11:15:08 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-26">
|
||
<td
|
||
data-testid="vuln-change-history-26-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-26-type">Reference</td>
|
||
<td data-testid="vuln-change-history-26-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-26-new">
|
||
|
||
<pre style="word-break: break-all !important">https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-27">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-27">1/12/2022 1:15:07 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-27">
|
||
<td
|
||
data-testid="vuln-change-history-27-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-27-type">Description</td>
|
||
<td data-testid="vuln-change-history-27-old">
|
||
|
||
|
||
|
||
|
||
<strong data-testid="vuln-change-history-27-showing"
|
||
>Record truncated, showing 500 of 644 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=01/12/2022T13:15:07.827-0500">View Entire Change Record</a><br/>
|
||
<pre>Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0, this functionality has been completely </pre>
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-27-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-27-showing"
|
||
|
||
>Record truncated, showing 500 of 713 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=01/12/2022T13:15:07.827-0500">View Entire Change Record</a><br />
|
||
<pre>Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along wit</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-27">
|
||
<td
|
||
data-testid="vuln-change-history-27-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-27-type">Reference</td>
|
||
<td data-testid="vuln-change-history-27-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-27-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-27">
|
||
<td
|
||
data-testid="vuln-change-history-27-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-27-type">Reference</td>
|
||
<td data-testid="vuln-change-history-27-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-27-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-27">
|
||
<td
|
||
data-testid="vuln-change-history-27-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-27-type">Reference</td>
|
||
<td data-testid="vuln-change-history-27-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-27-new">
|
||
|
||
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-27">
|
||
<td
|
||
data-testid="vuln-change-history-27-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-27-type">Reference</td>
|
||
<td data-testid="vuln-change-history-27-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-27-new">
|
||
|
||
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-27">
|
||
<td
|
||
data-testid="vuln-change-history-27-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-27-type">Reference</td>
|
||
<td data-testid="vuln-change-history-27-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-27-new">
|
||
|
||
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/ [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-28">Reanalysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-28">12/28/2021 2:32:40 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-28">
|
||
<td
|
||
data-testid="vuln-change-history-28-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-28-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-28-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-28-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:a:snowsoftware:snow_commander:*:*:*:*:*:*:*:* versions up to (excluding) 8.10.0
|
||
*cpe:2.3:a:snowsoftware:vm_access_proxy:*:*:*:*:*:*:*:* versions up to (excluding) 3.6</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-28">
|
||
<td
|
||
data-testid="vuln-change-history-28-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-28-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-28-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-28-new">
|
||
|
||
<pre style="word-break: break-all !important">https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ Patch, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-29">Reanalysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-29">12/20/2021 1:13:50 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-29">
|
||
<td
|
||
data-testid="vuln-change-history-29-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-29-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-29-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-29-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-29-showing"
|
||
|
||
>Record truncated, showing 500 of 11978 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/20/2021T13:13:50.153-0500">View Entire Change Record</a><br />
|
||
<pre>OR
|
||
*cpe:2.3:a:cisco:automated_subsea_tuning:02.01.00:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:cisco:broadworks:-:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:cisco:cloudcenter_suite:4.10\(0.15\):*:*:*:*:*:*:*
|
||
*cpe:2.3:a:cisco:cloudcenter_suite:5.3\(0\):*:*:*:*:*:*:*
|
||
*cpe:2.3:a:cisco:cloudcenter_suite:5.4\(1\):*:*:*:*:*:*:*
|
||
*cpe:2.3:a:cisco:cloudcenter_suite:5.5\(0\):*:*:*:*:*:*:*
|
||
*cpe:2.3:a:cisco:cloudcenter_suite:5.5\(1\):*:*:*:*:*:*:*
|
||
*cpe:2.3:a:cisco:common_services_platform_collector:002</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-29">
|
||
<td
|
||
data-testid="vuln-change-history-29-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-29-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-29-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ Mitigation, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-29-new">
|
||
|
||
<pre style="word-break: break-all !important">https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-30">Modified Analysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-30">12/16/2021 2:56:45 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:a:apache:log4j:2.0:-:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:beta9:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:rc1:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:rc2:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.0.1 up to (excluding) 2.15.0</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:a:apache:log4j:2.0:-:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:beta9:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:rc1:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:rc2:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.0.1 up to (excluding) 2.12.2
|
||
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.13.0 up to (excluding) 2.15.0</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-30-showing"
|
||
|
||
>Record truncated, showing 500 of 1404 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/16/2021T14:56:45.773-0500">View Entire Change Record</a><br />
|
||
<pre>AND
|
||
OR
|
||
*cpe:2.3:o:cisco:fxos:6.2.3:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:fxos:6.3.0:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:fxos:6.4.0:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:fxos:6.5.0:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:fxos:6.6.0:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:fxos:6.7.0:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:fxos:7.0.0:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:fxos:7.1.0:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:cisco:firepower_1010:-:*:*:*:*:*:*:*
|
||
</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:siemens:sppa-t3000_ses3000_firmware:*:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:siemens:sppa-t3000_ses3000:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-30-showing"
|
||
|
||
>Record truncated, showing 500 of 9929 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/16/2021T14:56:45.773-0500">View Entire Change Record</a><br />
|
||
<pre>OR
|
||
*cpe:2.3:a:cisco:advanced_malware_protection_virtual_private_cloud_appliance:*:*:*:*:*:*:*:* versions up to (excluding) 3.5.4
|
||
*cpe:2.3:a:cisco:automated_subsea_tuning:*:*:*:*:*:*:*:* versions up to (excluding) 2.1.0
|
||
*cpe:2.3:a:cisco:broadworks:*:*:*:*:*:*:*:* versions up to (excluding) 2021.11_1.162
|
||
*cpe:2.3:a:cisco:business_process_automation:*:*:*:*:*:*:*:* versions up to (excluding) 3.0.000.115
|
||
*cpe:2.3:a:cisco:business_process_automation:*:*:*:*:*:*:*:* versions f</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-30-showing"
|
||
|
||
>Record truncated, showing 500 of 563 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/16/2021T14:56:45.773-0500">View Entire Change Record</a><br />
|
||
<pre>OR
|
||
*cpe:2.3:a:intel:audio_development_kit:-:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:intel:computer_vision_annotation_tool:-:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:intel:data_center_manager:-:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:intel:genomics_kernel_library:-:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:intel:oneapi_sample_browser:-:*:*:*:*:eclipse:*:*
|
||
*cpe:2.3:a:intel:secure_device_onboard:-:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:intel:sensor_solution_firmware_development_kit:-:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:intel:system_debugger:-:*:</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-30-showing"
|
||
|
||
>Record truncated, showing 500 of 569 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/16/2021T14:56:45.773-0500">View Entire Change Record</a><br />
|
||
<pre>OR
|
||
*cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*
|
||
*cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
|
||
*cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
|
||
*cpe:2.3:a:netapp:cloud_insights:-:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:netapp:cloud_manager:-:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:netapp:ontap_tools:-:*:*:*:*:vmware_vsphe</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-30-showing"
|
||
|
||
>Record truncated, showing 500 of 4212 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/16/2021T14:56:45.773-0500">View Entire Change Record</a><br />
|
||
<pre>OR
|
||
*cpe:2.3:a:siemens:captial:*:*:*:*:*:*:*:* versions up to (excluding) 2019.1
|
||
*cpe:2.3:a:siemens:captial:2019.1:-:*:*:*:*:*:*
|
||
*cpe:2.3:a:siemens:captial:2019.1:sp1912:*:*:*:*:*:*
|
||
*cpe:2.3:a:siemens:comos:*:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:siemens:desigo_cc_advanced_reports:4.0:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:siemens:desigo_cc_advanced_reports:4.1:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:siemens:desigo_cc_advanced_reports:4.2:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:siemens:desigo_cc_advanced_reports:</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:a:sonicwall:email_security:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.12</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html Third Party Advisory, VDB Entry</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html Exploit, Third Party Advisory, VDB Entry</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html Exploit, Third Party Advisory, VDB Entry</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html Third Party Advisory, VDB Entry</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html Third Party Advisory, VDB Entry</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html Third Party Advisory, VDB Entry</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html Third Party Advisory, VDB Entry</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html Third Party Advisory, VDB Entry</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/13/1 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/13/1 Mailing List, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/13/2 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/13/2 Mailing List, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/14/4 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/14/4 Mailing List, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/15/3 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/15/3 Mailing List, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
<pre style="word-break: break-all !important">https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html Mailing List, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/ No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/ Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
<pre style="word-break: break-all !important">https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ Mitigation, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://twitter.com/kurtseifried/status/1469345530182455296 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
<pre style="word-break: break-all !important">https://twitter.com/kurtseifried/status/1469345530182455296 Exploit, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://www.debian.org/security/2021/dsa-5020 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.debian.org/security/2021/dsa-5020 Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://www.kb.cert.org/vuls/id/930724 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.kb.cert.org/vuls/id/930724 Third Party Advisory, US Government Resource</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-31">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-31">12/16/2021 12:15:08 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-31">
|
||
<td
|
||
data-testid="vuln-change-history-31-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-31-type">Reference</td>
|
||
<td data-testid="vuln-change-history-31-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-31-new">
|
||
|
||
<pre style="word-break: break-all !important">https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-32">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-32">12/16/2021 9:15:08 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-32">
|
||
<td
|
||
data-testid="vuln-change-history-32-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-32-type">Reference</td>
|
||
<td data-testid="vuln-change-history-32-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-32-new">
|
||
|
||
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-33">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-33">12/15/2021 5:15:07 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-33">
|
||
<td
|
||
data-testid="vuln-change-history-33-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-33-type">Reference</td>
|
||
<td data-testid="vuln-change-history-33-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-33-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/15/3 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-34">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-34">12/15/2021 1:15:07 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-34">
|
||
<td
|
||
data-testid="vuln-change-history-34-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-34-type">Reference</td>
|
||
<td data-testid="vuln-change-history-34-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-34-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-34">
|
||
<td
|
||
data-testid="vuln-change-history-34-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-34-type">Reference</td>
|
||
<td data-testid="vuln-change-history-34-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-34-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-34">
|
||
<td
|
||
data-testid="vuln-change-history-34-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-34-type">Reference</td>
|
||
<td data-testid="vuln-change-history-34-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-34-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-35">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-35">12/15/2021 12:15:07 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-35">
|
||
<td
|
||
data-testid="vuln-change-history-35-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-35-type">Description</td>
|
||
<td data-testid="vuln-change-history-35-old">
|
||
|
||
|
||
|
||
|
||
<strong data-testid="vuln-change-history-35-showing"
|
||
>Record truncated, showing 500 of 645 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/15/2021T12:15:07.953-0500">View Entire Change Record</a><br/>
|
||
<pre>Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0, this functionality has been completely </pre>
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-35-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-35-showing"
|
||
|
||
>Record truncated, showing 500 of 644 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/15/2021T12:15:07.953-0500">View Entire Change Record</a><br />
|
||
<pre>Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0, this functionality has been completely </pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-35">
|
||
<td
|
||
data-testid="vuln-change-history-35-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-35-type">Reference</td>
|
||
<td data-testid="vuln-change-history-35-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-35-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-35">
|
||
<td
|
||
data-testid="vuln-change-history-35-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-35-type">Reference</td>
|
||
<td data-testid="vuln-change-history-35-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-35-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-35">
|
||
<td
|
||
data-testid="vuln-change-history-35-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-35-type">Reference</td>
|
||
<td data-testid="vuln-change-history-35-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/15/1 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-35-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-36">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-36">12/15/2021 11:15:07 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-36">
|
||
<td
|
||
data-testid="vuln-change-history-36-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-36-type">Description</td>
|
||
<td data-testid="vuln-change-history-36-old">
|
||
|
||
|
||
|
||
|
||
<strong data-testid="vuln-change-history-36-showing"
|
||
>Record truncated, showing 500 of 716 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/15/2021T11:15:07.653-0500">View Entire Change Record</a><br/>
|
||
<pre>Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (>2.10) this behavior can be mitigated by setting system property "log4j2.formatM</pre>
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-36-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-36-showing"
|
||
|
||
>Record truncated, showing 500 of 645 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/15/2021T11:15:07.653-0500">View Entire Change Record</a><br />
|
||
<pre>Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0, this functionality has been completely </pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-36">
|
||
<td
|
||
data-testid="vuln-change-history-36-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-36-type">Reference</td>
|
||
<td data-testid="vuln-change-history-36-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-36-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/15/1 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-37">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-37">12/14/2021 11:15:06 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-37">
|
||
<td
|
||
data-testid="vuln-change-history-37-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-37-type">Reference</td>
|
||
<td data-testid="vuln-change-history-37-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-37-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.kb.cert.org/vuls/id/930724 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-38">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-38">12/14/2021 10:15:06 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-38">
|
||
<td
|
||
data-testid="vuln-change-history-38-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-38-type">Reference</td>
|
||
<td data-testid="vuln-change-history-38-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-38-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-39">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-39">12/14/2021 2:15:07 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-39">
|
||
<td
|
||
data-testid="vuln-change-history-39-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-39-type">Reference</td>
|
||
<td data-testid="vuln-change-history-39-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-39-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/14/4 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-40">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-40">12/14/2021 1:15:08 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-40">
|
||
<td
|
||
data-testid="vuln-change-history-40-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-40-type">Reference</td>
|
||
<td data-testid="vuln-change-history-40-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-40-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-40">
|
||
<td
|
||
data-testid="vuln-change-history-40-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-40-type">Reference</td>
|
||
<td data-testid="vuln-change-history-40-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-40-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-40">
|
||
<td
|
||
data-testid="vuln-change-history-40-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-40-type">Reference</td>
|
||
<td data-testid="vuln-change-history-40-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-40-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-41">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-41">12/13/2021 8:15:08 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-41">
|
||
<td
|
||
data-testid="vuln-change-history-41-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-41-type">Reference</td>
|
||
<td data-testid="vuln-change-history-41-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-41-new">
|
||
|
||
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-42">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-42">12/13/2021 7:15:07 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-42">
|
||
<td
|
||
data-testid="vuln-change-history-42-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-42-type">Description</td>
|
||
<td data-testid="vuln-change-history-42-old">
|
||
|
||
|
||
|
||
|
||
<strong data-testid="vuln-change-history-42-showing"
|
||
>Record truncated, showing 500 of 916 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/13/2021T19:15:07.230-0500">View Entire Change Record</a><br/>
|
||
<pre>Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (>2.10) this behavior can be mitigated by setting system property "log4j2.formatM</pre>
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-42-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-42-showing"
|
||
|
||
>Record truncated, showing 500 of 716 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/13/2021T19:15:07.230-0500">View Entire Change Record</a><br />
|
||
<pre>Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (>2.10) this behavior can be mitigated by setting system property "log4j2.formatM</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-42">
|
||
<td
|
||
data-testid="vuln-change-history-42-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-42-type">Reference</td>
|
||
<td data-testid="vuln-change-history-42-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-42-new">
|
||
|
||
<pre style="word-break: break-all !important">https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-42">
|
||
<td
|
||
data-testid="vuln-change-history-42-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-42-type">Reference</td>
|
||
<td data-testid="vuln-change-history-42-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-42-new">
|
||
|
||
<pre style="word-break: break-all !important">https://twitter.com/kurtseifried/status/1469345530182455296 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-42">
|
||
<td
|
||
data-testid="vuln-change-history-42-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-42-type">Reference</td>
|
||
<td data-testid="vuln-change-history-42-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-42-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.debian.org/security/2021/dsa-5020 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-43">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-43">12/13/2021 5:15:07 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-43">
|
||
<td
|
||
data-testid="vuln-change-history-43-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-43-type">Reference</td>
|
||
<td data-testid="vuln-change-history-43-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-43-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/13/1 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-43">
|
||
<td
|
||
data-testid="vuln-change-history-43-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-43-type">Reference</td>
|
||
<td data-testid="vuln-change-history-43-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-43-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/13/2 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-44">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-44">12/13/2021 3:15:07 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-44">
|
||
<td
|
||
data-testid="vuln-change-history-44-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-44-type">Reference</td>
|
||
<td data-testid="vuln-change-history-44-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-44-new">
|
||
|
||
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/ [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-45">Initial Analysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-45">12/13/2021 10:00:11 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-45">
|
||
<td
|
||
data-testid="vuln-change-history-45-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-45-type">CVSS V3.1</td>
|
||
<td data-testid="vuln-change-history-45-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-45-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-45">
|
||
<td
|
||
data-testid="vuln-change-history-45-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-45-type">CVSS V2</td>
|
||
<td data-testid="vuln-change-history-45-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-45-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST (AV:N/AC:M/Au:N/C:C/I:C/A:C)</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-45">
|
||
<td
|
||
data-testid="vuln-change-history-45-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-45-type">CWE</td>
|
||
<td data-testid="vuln-change-history-45-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-45-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST CWE-502</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-45">
|
||
<td
|
||
data-testid="vuln-change-history-45-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-45-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-45-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-45-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:a:apache:log4j:2.0:-:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:beta9:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:rc1:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:2.0:rc2:*:*:*:*:*:*
|
||
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.0.1 up to (excluding) 2.15.0</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-45">
|
||
<td
|
||
data-testid="vuln-change-history-45-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-45-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-45-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-45-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html Third Party Advisory, VDB Entry</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-45">
|
||
<td
|
||
data-testid="vuln-change-history-45-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-45-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-45-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/10/1 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-45-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/10/1 Mailing List, Mitigation, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-45">
|
||
<td
|
||
data-testid="vuln-change-history-45-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-45-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-45-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/10/2 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-45-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/10/2 Mailing List, Mitigation, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-45">
|
||
<td
|
||
data-testid="vuln-change-history-45-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-45-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-45-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/10/3 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-45-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/10/3 Mailing List, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-45">
|
||
<td
|
||
data-testid="vuln-change-history-45-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-45-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-45-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://logging.apache.org/log4j/2.x/security.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-45-new">
|
||
|
||
<pre style="word-break: break-all !important">https://logging.apache.org/log4j/2.x/security.html Release Notes, Vendor Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-45">
|
||
<td
|
||
data-testid="vuln-change-history-45-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-45-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-45-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-45-new">
|
||
|
||
<pre style="word-break: break-all !important">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032 Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-45">
|
||
<td
|
||
data-testid="vuln-change-history-45-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-45-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-45-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://security.netapp.com/advisory/ntap-20211210-0007/ No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-45-new">
|
||
|
||
<pre style="word-break: break-all !important">https://security.netapp.com/advisory/ntap-20211210-0007/ Vendor Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-45">
|
||
<td
|
||
data-testid="vuln-change-history-45-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-45-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-45-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-45-new">
|
||
|
||
<pre style="word-break: break-all !important">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-45">
|
||
<td
|
||
data-testid="vuln-change-history-45-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-45-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-45-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/alert-cve-2021-44228.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-45-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/alert-cve-2021-44228.html Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-46">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-46">12/13/2021 7:15:07 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-46">
|
||
<td
|
||
data-testid="vuln-change-history-46-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-46-type">Description</td>
|
||
<td data-testid="vuln-change-history-46-old">
|
||
|
||
|
||
|
||
|
||
<strong data-testid="vuln-change-history-46-showing"
|
||
>Record truncated, showing 500 of 716 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/13/2021T07:15:07.637-0500">View Entire Change Record</a><br/>
|
||
<pre>Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (>2.10) this behavior can be mitigated by setting system property "log4j2.formatM</pre>
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-46-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-46-showing"
|
||
|
||
>Record truncated, showing 500 of 916 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/13/2021T07:15:07.637-0500">View Entire Change Record</a><br />
|
||
<pre>Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (>2.10) this behavior can be mitigated by setting system property "log4j2.formatM</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-47">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-47">12/13/2021 6:15:10 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-47">
|
||
<td
|
||
data-testid="vuln-change-history-47-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-47-type">Reference</td>
|
||
<td data-testid="vuln-change-history-47-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-47-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/alert-cve-2021-44228.html [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-48">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-48">12/12/2021 12:15:07 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-48">
|
||
<td
|
||
data-testid="vuln-change-history-48-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-48-type">Description</td>
|
||
<td data-testid="vuln-change-history-48-old">
|
||
|
||
|
||
|
||
|
||
<strong data-testid="vuln-change-history-48-showing"
|
||
>Record truncated, showing 500 of 916 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/12/2021T12:15:07.630-0500">View Entire Change Record</a><br/>
|
||
<pre>Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (>2.10) this behavior can be mitigated by setting system property "log4j2.formatM</pre>
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-48-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-48-showing"
|
||
|
||
>Record truncated, showing 500 of 716 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/12/2021T12:15:07.630-0500">View Entire Change Record</a><br />
|
||
<pre>Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (>2.10) this behavior can be mitigated by setting system property "log4j2.formatM</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-48">
|
||
<td
|
||
data-testid="vuln-change-history-48-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-48-type">Reference</td>
|
||
<td data-testid="vuln-change-history-48-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://www.debian.org/security/2021/dsa-5020 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-48-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-49">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-49">12/12/2021 6:15:08 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-49">
|
||
<td
|
||
data-testid="vuln-change-history-49-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-49-type">Reference</td>
|
||
<td data-testid="vuln-change-history-49-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-49-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.debian.org/security/2021/dsa-5020 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-50">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-50">12/11/2021 12:15:12 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-50">
|
||
<td
|
||
data-testid="vuln-change-history-50-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-50-type">Reference</td>
|
||
<td data-testid="vuln-change-history-50-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-50-new">
|
||
|
||
<pre style="word-break: break-all !important">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-51">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-51">12/10/2021 5:15:08 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-51">
|
||
<td
|
||
data-testid="vuln-change-history-51-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-51-type">Reference</td>
|
||
<td data-testid="vuln-change-history-51-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-51-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/10/3 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-51">
|
||
<td
|
||
data-testid="vuln-change-history-51-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-51-type">Reference</td>
|
||
<td data-testid="vuln-change-history-51-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-51-new">
|
||
|
||
<pre style="word-break: break-all !important">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-52">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-52">12/10/2021 1:15:08 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-52">
|
||
<td
|
||
data-testid="vuln-change-history-52-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-52-type">Reference</td>
|
||
<td data-testid="vuln-change-history-52-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-52-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-52">
|
||
<td
|
||
data-testid="vuln-change-history-52-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-52-type">Reference</td>
|
||
<td data-testid="vuln-change-history-52-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-52-new">
|
||
|
||
<pre style="word-break: break-all !important">https://security.netapp.com/advisory/ntap-20211210-0007/ [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-53">CVE Modified by Apache Software Foundation</span> <span
|
||
data-testid="vuln-change-history-date-53">12/10/2021 8:15:07 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-53">
|
||
<td
|
||
data-testid="vuln-change-history-53-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-53-type">Reference</td>
|
||
<td data-testid="vuln-change-history-53-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-53-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/10/1 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-53">
|
||
<td
|
||
data-testid="vuln-change-history-53-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-53-type">Reference</td>
|
||
<td data-testid="vuln-change-history-53-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-53-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/10/2 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</div>
|
||
</div>
|
||
|
||
|
||
<div class="col-lg-3 col-md-5 col-sm-12">
|
||
|
||
<div class="bs-callout bs-callout-info">
|
||
<h4>Quick Info</h4>
|
||
<strong>CVE Dictionary Entry:</strong><br/> <a
|
||
target="_blank" rel="noopener noreferrer" data-testid="vuln-cve-dictionary-entry"
|
||
href="https://cve.org/CVERecord?id=CVE-2021-44228">CVE-2021-44228</a><br/> <strong>NVD
|
||
Published Date:</strong><br/> <span
|
||
data-testid="vuln-published-on">12/10/2021</span><br/> <strong>NVD
|
||
Last Modified:</strong><br/> <span
|
||
data-testid="vuln-last-modified-on">02/04/2025</span><br/> <strong>
|
||
Source:</strong><br/> <span
|
||
data-testid="vuln-current-description-source">Apache Software Foundation</span><br/>
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</td>
|
||
</tr>
|
||
</table>
|
||
|
||
</div>
|
||
<!-- Hidden input for padding -->
|
||
<input type="hidden" value="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" id="padding" name="padding"/>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</main>
|
||
<footer id="footer" role="contentinfo">
|
||
<div class="container">
|
||
|
||
<div class="row">
|
||
<div class="col-sm-12">
|
||
<ul class="social-list pull-right">
|
||
<li class="field-item service-twitter list-horiz"><a
|
||
href="https://twitter.com/NISTCyber" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span>
|
||
</a></li>
|
||
<li class="field-item service-facebook list-horiz"><a
|
||
href="https://www.facebook.com/NIST" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-linkedin list-horiz"><a
|
||
href="https://www.linkedin.com/company/nist" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-youtube list-horiz"><a
|
||
href="https://www.youtube.com/user/USNISTGOV" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-rss list-horiz"><a
|
||
href="https://www.nist.gov/news-events/nist-rss-feeds"
|
||
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink">
|
||
<i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i>
|
||
</a></li>
|
||
<li class="field-item service-govdelivery list-horiz last"><a
|
||
href="https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3"
|
||
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink ext">
|
||
<i class="fa fa-envelope fa-fw"><span
|
||
class="element-invisible">govdelivery</span></i><span class="ext"><span
|
||
class="element-invisible"> (link is external)</span></span>
|
||
</a></li>
|
||
</ul>
|
||
<span class="hidden-xs"> <a
|
||
title="National Institute of Standards and Technology" rel="home"
|
||
class="footer-nist-logo"> <img
|
||
src="/site-media/images/nist/nist-logo.png"
|
||
alt="National Institute of Standards and Technology logo" />
|
||
</a>
|
||
</span>
|
||
</div>
|
||
</div>
|
||
<div class="row hidden-sm hidden-md hidden-lg">
|
||
<div class="col-sm-12">
|
||
<a href="https://www.nist.gov"
|
||
title="National Institute of Standards and Technology" rel="home"
|
||
target="_blank" rel="noopener noreferrer" class="footer-nist-logo"> <img
|
||
src="/site-media/images/nist/nist-logo.png"
|
||
alt="National Institute of Standards and Technology logo" />
|
||
</a>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="row footer-contact-container">
|
||
<div class="col-sm-6">
|
||
<strong>HEADQUARTERS</strong>
|
||
<br>
|
||
100 Bureau Drive
|
||
<br>
|
||
Gaithersburg, MD 20899
|
||
<br>
|
||
<a href="tel:301-975-2000">(301) 975-2000</a>
|
||
<br>
|
||
<br>
|
||
<a href="mailto:nvd@nist.gov">Webmaster</a> | <a
|
||
href="https://www.nist.gov/about-nist/contact-us">Contact Us</a>
|
||
| <a href="https://www.nist.gov/about-nist/visit"
|
||
style="display: inline-block;">Our Other Offices</a>
|
||
</div>
|
||
<div class="col-sm-6">
|
||
<div class="pull-right"
|
||
style="text-align:right">
|
||
<strong>Incident Response Assistance and Non-NVD Related<br>Technical Cyber Security Questions:</strong>
|
||
<br>
|
||
US-CERT Security Operations Center
|
||
<br> Email: <a href="mailto:soc@us-cert.gov">soc@us-cert.gov</a>
|
||
<br> Phone: 1-888-282-0870
|
||
</div>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="row">
|
||
<nav title="Footer Navigation" role="navigation"
|
||
class="row footer-bottom-links-container">
|
||
<!-- https://github.com/usnistgov/nist-header-footer/blob/nist-pages/boilerplate-footer.html -->
|
||
<p>
|
||
<a href="https://www.nist.gov/oism/site-privacy">Site Privacy</a>
|
||
|
|
||
<a href="https://www.nist.gov/oism/accessibility">Accessibility</a>
|
||
|
|
||
<a href="https://www.nist.gov/privacy">Privacy Program</a>
|
||
|
|
||
<a href="https://www.nist.gov/oism/copyrights">Copyrights</a>
|
||
|
|
||
<a href="https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a>
|
||
|
|
||
<a href="https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a>
|
||
|
|
||
<a href="https://www.nist.gov/foia">FOIA</a>
|
||
|
|
||
<a href="https://www.nist.gov/environmental-policy-statement">Environmental Policy</a>
|
||
|
|
||
<a href="https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a>
|
||
|
|
||
<a href="https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a>
|
||
|
|
||
<a href="https://www.commerce.gov/">Commerce.gov</a>
|
||
|
|
||
<a href="https://www.science.gov/">Science.gov</a>
|
||
|
|
||
<a href="https://www.usa.gov/">USA.gov</a>
|
||
</p>
|
||
</nav>
|
||
</div>
|
||
</div>
|
||
</footer>
|
||
</body>
|
||
</html>
|
||
|
||
|