nist-gov/nvd.nist.gov/vuln/detail/CVE-2021-44228
2025-03-07 17:19:30 +00:00

10389 lines
697 KiB
Text
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<!DOCTYPE html>
<html lang="en">
<head>
<title>NVD - CVE-2021-44228</title>
<meta http-equiv="content-type" content="text/html; charset=UTF-8" />
<meta http-equiv="content-style-type" content="text/css" />
<meta http-equiv="content-script-type" content="text/javascript" />
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
<link href="/site-scripts/font-awesome/css/font-awesome.min.css"
type="text/css" rel="stylesheet" />
<link href="/site-media/bootstrap/css/bootstrap.min.css"
type="text/css" rel="stylesheet" />
<link href="/site-media/bootstrap/css/bootstrap-theme.min.css"
type="text/css" rel="stylesheet" />
<link
href="/site-scripts/eonasdan-bootstrap-datetimepicker/build/css/bootstrap-datetimepicker.min.css"
type="text/css" rel="stylesheet" />
<link href="/site-media/css/nist-fonts.css" type="text/css"
rel="stylesheet" />
<link href="/site-media/css/base-style.css" type="text/css"
rel="stylesheet" />
<link href="/site-media/css/media-resize.css" type="text/css"
rel="stylesheet" />
<meta name="theme-color" content="#000000">
<script src="/site-scripts/jquery/dist/jquery.min.js"
type="text/javascript"></script>
<script src="/site-scripts/jquery-visible/jquery.visible.min.js"
type="text/javascript"></script>
<script src="/site-scripts/underscore/underscore-min.js"
type="text/javascript"></script>
<script src="/site-media/bootstrap/js/bootstrap.js"
type="text/javascript"></script>
<script src="/site-scripts/moment/min/moment.min.js"
type="text/javascript"></script>
<script
src="/site-scripts/eonasdan-bootstrap-datetimepicker/build/js/bootstrap-datetimepicker.min.js"
type="text/javascript"></script>
<script src="/site-media/js/megamenu.js" type="text/javascript"></script>
<script src="/site-media/js/nist-exit-script.js"
type="text/javascript"></script>
<script src="/site-media/js/forms.js" type="text/javascript"></script>
<script
src="/site-media/js/federated-analytics.all.min.js?agency=NIST&amp;subagency=nvd&amp;pua=UA-37115410-41&amp;yt=true"
type="text/javascript" id="_fed_an_js_tag"></script>
<!-- Google tag (gtag.js) -->
<script async src="https://www.googletagmanager.com/gtag/js?id=G-4KKFZP12LQ"></script>
<script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-4KKFZP12LQ'); </script>
<style id="antiClickjack">
body>* {
display: none !important;
}
#antiClickjack {
display: block !important;
}
</style>
<noscript>
<style id="antiClickjackNoScript">
body>* {
display: block !important;
}
#antiClickjack {
display: none !important;
}
</style>
</noscript>
<script type="text/javascript" id="antiClickjackScript">
if (self === top) {
// no clickjacking
var antiClickjack = document.getElementById("antiClickjack");
antiClickjack.parentNode.removeChild(antiClickjack);
} else {
setTimeout(tryForward(), 5000);
}
function tryForward() {
top.location = self.location;
}
</script>
<meta charset="UTF-8">
<link href="/site-media/css/nvd-style.css" type="text/css"
rel="stylesheet" />
<link href="/site-media/images/favicons/apple-touch-icon.png"
rel="apple-touch-icon" type="image/png" sizes="180x180" />
<link href="/site-media/images/favicons/favicon-32x32.png"
rel="icon" type="image/png" sizes="32x32" />
<link href="/site-media/images/favicons/favicon-16x16.png"
rel="icon" type="image/png" sizes="16x16" />
<link href="/site-media/images/favicons/manifest.json"
rel="manifest" />
<link href="/site-media/images/favicons/safari-pinned-tab.svg"
rel="mask-icon" color="#000000" />
<link href="/site-media/images/favicons/favicon.ico"
rel="shortcut icon" />
<meta name="msapplication-config" content="/site-media/images/favicons/browserconfig.xml" />
<link href="/site-media/images/favicons/favicon.ico"
rel="shortcut icon" type="image/x-icon" />
<link href="/site-media/images/favicons/favicon.ico" rel="icon"
type="image/x-icon" />
<meta charset="UTF-8">
<script src="/site-media/js/vulnerability/vulnDetail.js"
type="text/javascript"></script>
<script src="/site-media/js/vulnerability/cvssVulnDetail.js"
type="text/javascript"></script>
</head>
<body>
<header role="banner" title="Site Banner">
<div id="antiClickjack" style="display: none">
<h1>You are viewing this page in an unauthorized frame window.</h1>
<p>
This is a potential security issue, you are being redirected to
<a href="https://nvd.nist.gov">https://nvd.nist.gov</a>
</p>
</div>
<div>
<section class="usa-banner" aria-label="Official government website">
<div class="usa-accordion container">
<header class="usa-banner__header">
<noscript>
<p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p>
</noscript>
<img class="usa-banner__header-flag"
src="/site-media/images/usbanner/us_flag_small.png" alt="U.S. flag">
&nbsp;
<span class="usa-banner__header-text">An official website of the United States government</span>
<button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="false" aria-controls="gov-banner">
<span class="usa-banner__button-text">Here's how you know</span>
</button>
</header>
<div class="usa-banner__content usa-accordion__content collapse" role="tabpanel" id="gov-banner" aria-expanded="true">
<div class="row">
<div class="col-md-5 col-sm-12">
<div class="row">
<div class="col-sm-2 col-xs-3">
<img class="usa-banner__icon usa-media-block__img"
src="/site-media/images/usbanner/icon-dot-gov.svg" alt="Dot gov">
</div>
<div class="col-sm-10 col-xs-9">
<p>
<strong>Official websites use .gov</strong>
<br>
A <strong>.gov</strong> website belongs to an official government organization in the United States.
</p>
</div>
</div>
</div>
<div class="col-md-5 col-sm-12">
<div class="row">
<div class="col-sm-2 col-xs-3">
<img class="usa-banner__icon usa-media-block__img"
src="/site-media/images/usbanner/icon-https.svg" alt="Https">
</div>
<div class="col-sm-10 col-xs-9">
<p>
<strong>Secure .gov websites use HTTPS</strong>
<br>
A <strong>lock</strong> (<img class="usa-banner__lock"
src="/site-media/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.
</p>
</div>
</div>
</div>
</div>
</div>
</div>
</section>
</div>
<div>
<div>
<nav id="navbar" class="navbar">
<div id="nist-menu-container" class="container">
<div class="row">
<!-- Brand -->
<div class="col-xs-6 col-md-4 navbar-header"
style="height:104px">
<a class="navbar-brand"
href="https://www.nist.gov"
target="_blank" rel="noopener noreferrer"
id="navbar-brand-image"
style="padding-top: 36px">
<img alt="National Institute of Standards and Technology"
src="/site-media/images/nist/nist-logo.svg"
width="110" height="30">
</a>
</div>
<div class="col-xs-6 col-md-8 navbar-nist-logo">
<span id="nvd-menu-button" class="pull-right" style="margin-top: 26px"> <a href="#">
<span class="fa fa-bars"></span> <span id="nvd-menu-full-text"><span
class="hidden-xxs">NVD </span>MENU</span>
</a>
</span>
</div>
</div>
</div>
<div class="main-menu-row container">
<!-- Collect the nav links, forms, and other content for toggling -->
<div id="main-menu-drop" class="col-lg-12" style="display: none;">
<ul>
<li><a href="/general"> General <span
class="expander fa fa-plus" id="nvd-header-menu-general"
data-expander-name="general" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="general">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/general/nvd-dashboard">NVD Dashboard</a>
</p>
<p>
<a href="https://www.nist.gov/itl/nvd">News and Status Updates</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/general/faq">FAQ</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/general/visualizations">Visualizations</a>
</p>
<p>
<a href="/general/legal-disclaimer">Legal Disclaimer</a>
</p>
</div>
</div>
</div></li>
<li><a href="/vuln"> Vulnerabilities <span
class="expander fa fa-plus"
id="nvd-header-menu-vulnerabilities"
data-expander-name="vulnerabilities" data-expanded="false">
<span class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="vulnerabilities">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/vuln/search">Search &amp; Statistics</a>
</p>
<p>
<a href="/vuln/categories">Weakness Types</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/vuln/data-feeds">Legacy Data Feeds</a>
</p>
<p>
<a href="/vuln/vendor-comments">Vendor Comments</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/vuln/cvmap">CVMAP</a>
</p>
</div>
</div>
</div></li>
<li><a href="/vuln-metrics/cvss#"> Vulnerability Metrics <span
class="expander fa fa-plus" id="nvd-header-menu-metrics"
data-expander-name="metrics" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="metrics">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/vuln-metrics/cvss/v4-calculator">CVSS v4.0
Calculators</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/vuln-metrics/cvss/v3-calculator">CVSS v3.x
Calculators</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/vuln-metrics/cvss/v2-calculator">CVSS v2.0
Calculator</a>
</p>
</div>
</div>
</div></li>
<li><a href="/products"> Products <span
class="expander fa fa-plus" id="nvd-header-menu-products"
data-expander-name="products" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="products">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/products/cpe">CPE Dictionary</a>
</p>
<p>
<a href="/products/cpe/search">CPE Search</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/products/cpe/statistics">CPE Statistics</a>
</p>
<p>
<a href="/products/swid">SWID</a>
</p>
</div>
<div class="col-lg-4"></div>
</div>
</div></li>
<li>
<a href="/developers">Developers<span
class="expander fa fa-plus" id="nvd-header-menu-developers"
data-expander-name="developers" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="developers">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/developers/start-here">Start Here</a>
</p>
<p>
<a href="/developers/request-an-api-key">Request an API Key</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/developers/vulnerabilities">Vulnerabilities</a>
</p>
<p>
<a href="/developers/products">Products</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/developers/data-sources">Data Sources</a>
</p>
<p>
<a href="/developers/terms-of-use">Terms of Use</a>
</p>
</div>
</div>
</div>
</li>
<li><a href="/contact"> Contact NVD </a></li>
<li><a href="/other"> Other Sites <span
class="expander fa fa-plus" id="nvd-header-menu-othersites"
data-expander-name="otherSites" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="otherSites">
<div class="row">
<div class="col-lg-4">
<p>
<a href="https://ncp.nist.gov">Checklist (NCP) Repository</a>
</p>
<p>
<a href="https://ncp.nist.gov/cce">Configurations (CCE)</a>
</p>
<p>
<a href="https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search">800-53 Controls</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a
href="https://csrc.nist.gov/projects/scap-validation-program">SCAP
Validated Tools</a>
</p>
<p>
<a
href="https://csrc.nist.gov/projects/security-content-automation-protocol">SCAP</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a
href="https://csrc.nist.gov/projects/united-states-government-configuration-baseline">USGCB</a>
</p>
</div>
</div>
</div></li>
<li><a href="/search"> Search <span
class="expander fa fa-plus" id="nvd-header-menu-search"
data-expander-name="search" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="search">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/vuln/search">Vulnerability Search</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/products/cpe/search">CPE Search</a>
</p>
</div>
</div>
</div></li>
</ul>
</div>
<!-- /#mobile-nav-container -->
</div>
</nav>
<section id="itl-header" class="has-menu">
<div class="container">
<div class="row">
<div class="col-sm-12 col-md-8">
<h2 class="hidden-xs hidden-sm">
<a href="https://www.nist.gov/itl" target="_blank" rel="noopener noreferrer">Information Technology Laboratory</a>
</h2>
<h1 class="hidden-xs hidden-sm">
<a id="nvd-header-link"
href="/">National Vulnerability Database</a>
</h1>
<h1 class="hidden-xs text-center hidden-md hidden-lg"
>National Vulnerability Database</h1>
<h1 class="hidden-sm hidden-md hidden-lg text-center"
>NVD</h1>
</div>
<div class="col-sm-12 col-md-4">
<a style="width: 100%; text-align: center; display: block;padding-top: 14px">
<img id="img-logo-nvd-lg"
alt="National Vulnerability Database"
src="/site-media/images/F_NIST-Logo-NVD-white.svg"
width="500" height="100">
</a>
</div>
</div>
</div>
</section>
</div>
</div>
</header>
<main>
<div>
<div id="body-section" class="container">
<div class="row">
<ol class="breadcrumb">
<li><a href="/vuln" class="CMSBreadCrumbsLink">Vulnerabilities</a></li>
</ol>
</div>
<div>
<style>
/* wrap the words for CVSS v4 */
#nistv4Metric {
word-wrap: break-word;
}
</style>
<script>
/*<![CDATA[*/
var vuln = {
nistV4Present: false,
cnaV4Present: false,
nistV3Present: true,
cnaV3Present: false,
nistV2Present: true,
cnaV2Present: false
};
/*]]>*/
</script>
<div>
</div>
<div id="vulnDetailPanel">
<table id="vulnDetailTableView" style="border-collapse: collapse;">
<tr>
<td colspan="2">
<h2 data-testid="page-header">
<i class="fa fa-bug fa-flip-vertical"></i><span
data-testid="page-header-vuln-id">CVE-2021-44228</span>
Detail
</h2>
<div class="row">
<div class="col-lg-9 col-md-7 col-sm-12">
<div id="vulnShowWarningDiv"
data-testid="vuln-warning-container">
<div
role="alert" data-testid="vuln-warning-alert-container" class="bs-callout bs-callout-info">
<strong class="h4Size"><span
data-testid="vuln-warning-status-name">Modified</span></strong>
<hr/>
<p data-testid="vuln-warning-banner-content">This CVE record has been updated after NVD enrichment efforts were completed. Enrichment data supplied by the NVD may require amendment due to these changes.</p>
</div>
</div>
<h3 id="vulnDescriptionTitle"
data-testid="vuln-description-title">Description </h3>
<p data-testid="vuln-description">Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.</p><br/>
<!-- CVSS Severity and Vector Strings -->
<div id="vulnCvssPanel" data-testid="vuln-cvss-container"
class="row bs-callout bs-callout-success cvssVulnDetail">
<h3 style="display: inline" title="CVSS is not a measure of risk">Metrics</h3>
&ensp;
<div id="cvssVulnDetailBtn" class="btn-group">
<button id="btn-cvss4" type="button" title="Click here to view CVSS 4.0 data"
class="btn default btn-lg cvssBtn">CVSS Version 4.0
</button>
<button id="btn-cvss3" type="button" title="Click here to view CVSS 3.x data"
class="btn default btn-lg cvssBtn">CVSS Version 3.x
</button>
<button id="btn-cvss2" type="button" title="Click here to view CVSS 2.0 data"
class="btn default btn-lg cvssBtn">CVSS Version 2.0
</button>
</div>
<div id="cvssEnrichmentNotes">
<i>
<small>
NVD enrichment efforts reference publicly available information to associate
vector strings. CVSS information contributed by other sources is also
displayed.
</small>
</i>
</div>
<!-- CVSS v4.0 -->
<div class="container-fluid" id="Vuln4CvssPanel" data-testid="vuln-cvss4-panel">
<strong>CVSS 4.0 Severity and Vector Strings:</strong>
<!-- NIST -->
<div class="row no-gutters">
<br/>
<div class="col-lg-3 col-sm-6">
<div class="row">
<div class="col-lg-3 col-sm-6">
<img
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
class="cvssNvdIcon" alt="NIST CVSS score">
</div>
<div class="col-lg-9 col-sm-6">
<strong>NIST:</strong>&nbsp;<span class="wrapData"
data-testid="vuln-cvss4-source-nvd">NVD</span>
</div>
</div>
</div>
<div class="col-lg-3 col-sm-6">
<span><strong> </strong><span
class="severityDetail"> <a
id="Cvss4NistCalculatorAnchorNA"
class="label label-default"
data-testid="vuln-cvss4-panel-score-na">N/A</a></span></span>
</div>
<div class="col-lg-6 col-sm-12">
<span> <span
data-testid="vuln-cvss4-nist-vector-na">NVD assessment
not yet provided.</span></span> <input type="hidden"
id="nistV4MetricHidden"
value=""/>
</div>
</div>
<!-- CNA -->
<!-- ADP -->
</div>
<!-- CVSS V3.x -->
<div class="container-fluid" id="Vuln3CvssPanel" data-testid="vuln-cvss3-panel"
style="display: none;">
<strong>CVSS 3.x Severity and Vector Strings:</strong>
<!-- NIST -->
<div class="row no-gutters">
<br/>
<div class="col-lg-3 col-sm-6">
<div class="row">
<div class="col-lg-3 col-sm-6">
<img
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
class="cvssNvdIcon" alt="NIST CVSS score">
</div>
<div class="col-lg-9 col-sm-6">
<strong>NIST:</strong>&nbsp;<span class="wrapData"
data-testid="vuln-cvss3-source-nvd">NVD</span>
</div>
</div>
</div>
<div class="col-lg-3 col-sm-6">
<span><strong>Base
Score:</strong>&nbsp;<span class="severityDetail"> <a
id="Cvss3NistCalculatorAnchor"
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2021-44228&amp;vector=AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST"
data-testid="vuln-cvss3-panel-score"
class="label label-critical">10.0 CRITICAL</a>
</span></span>
</div>
<div class="col-lg-6 col-sm-12">
<span><strong>Vector:</strong>&nbsp;
<span data-testid="vuln-cvss3-nist-vector"
class="tooltipCvss3NistMetrics">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H</span></span>
<input type="hidden"
id="nistV3MetricHidden"
value="&lt;span id = &#39;nistV3Metric&#39; style = &#39;display:none&#39; &gt; &lt;strong style =&#39;font-size:1.2em&#39; &gt; CVSS v3.1 Severity and Metrics:&lt;/strong&gt; &lt;p data-testid=&#39;vuln-cvssv3-score-container&#39;&gt; &lt;strong&gt;Base Score: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-base-score&#39;&gt;10.0 &lt;/span&gt;&lt;span data-testid=&#39;vuln-cvssv3-base-score-severity&#39;&gt;CRITICAL&lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Vector: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-vector&#39;&gt; AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Impact Score: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-impact-score&#39;&gt; 6.0 &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Exploitability Score: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-exploitability-score&#39;&gt; 3.9 &lt;/span&gt; &lt;/p&gt; &lt;hr /&gt; &lt;p data-testid=&#39;vuln-cvssv3-metrics-container&#39;&gt; &lt;strong&gt;Attack Vector (AV): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-av&#39;&gt; Network &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Attack Complexity (AC): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-ac&#39;&gt; Low &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Privileges Required (PR): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-pr&#39;&gt; None &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;User Interaction (UI): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-ui&#39;&gt; None &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Scope (S): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-s&#39;&gt; Changed &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Confidentiality (C): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-c&#39;&gt; High &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Integrity (I): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-i&#39;&gt; High &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Availability (A): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-a&#39;&gt; High &lt;/span&gt; &lt;/p&gt; &lt;/span&gt; "/>
</div>
</div>
<!-- CNA -->
<!-- ADP -->
<div class="row no-gutters">
<div>
<br/>
<div class="col-lg-3 col-sm-6">
<div class="row">
<div class="col-lg-3 col-sm-6">
</div>
<div class="col-lg-9 col-sm-6">
<strong>ADP:</strong>&nbsp; <span class="wrapData"
data-testid="vuln-cvss3-source-adp">CISA-ADP</span>
</div>
</div>
</div>
<div class="col-lg-3 col-sm-6">
<span><strong>Base
Score:</strong>&nbsp;<span class="severityDetail"> <a
id="Cvss3AdpCalculatorAnchor"
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2021-44228&amp;vector=AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H&amp;version=3.1&amp;source=CISA-ADP"
data-testid="vuln-cvss3-adp-panel-score"
class="label label-critical">10.0 CRITICAL</a></span></span>
</div>
<div class="col-lg-6 col-sm-12">
<span><strong>Vector:</strong>&nbsp; <span
data-testid="vuln-cvss3-adp-vector"
class="tooltipCvss3AdpMetrics">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H</span></span>
<input type="hidden" id="adpV3MetricHidden"
value="&lt;span id = &#39;nistV3Metric&#39; style = &#39;display:none&#39; &gt; &lt;strong style =&#39;font-size:1.2em&#39; &gt; CVSS v3.1 Severity and Metrics:&lt;/strong&gt; &lt;p data-testid=&#39;vuln-cvssv3-score-container&#39;&gt; &lt;strong&gt;Base Score: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-base-score&#39;&gt;10.0 &lt;/span&gt;&lt;span data-testid=&#39;vuln-cvssv3-base-score-severity&#39;&gt;CRITICAL&lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Vector: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-vector&#39;&gt; AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Impact Score: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-impact-score&#39;&gt; 6.0 &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Exploitability Score: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-exploitability-score&#39;&gt; 3.9 &lt;/span&gt; &lt;/p&gt; &lt;hr /&gt; &lt;p data-testid=&#39;vuln-cvssv3-metrics-container&#39;&gt; &lt;strong&gt;Attack Vector (AV): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-av&#39;&gt; Network &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Attack Complexity (AC): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-ac&#39;&gt; Low &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Privileges Required (PR): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-pr&#39;&gt; None &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;User Interaction (UI): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-ui&#39;&gt; None &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Scope (S): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-s&#39;&gt; Changed &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Confidentiality (C): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-c&#39;&gt; High &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Integrity (I): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-i&#39;&gt; High &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Availability (A): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-a&#39;&gt; High &lt;/span&gt; &lt;/p&gt; &lt;/span&gt; "/>
</div>
</div>
</div>
<!-- <div id="cvss3FootNote" class="cvssFootNote" >-->
<!-- <br/><br/>-->
<!-- <span id = "cvss3FootNoteSection" th:utext="${cvssData.cvss3FootNoteHtml}"></span>-->
<!-- </div>-->
</div>
<!-- CVSS V2.0 -->
<div class="container-fluid" id="Vuln2CvssPanel" data-testid="vuln-cvss2-panel"
style="display: none;">
<strong>CVSS 2.0 Severity and Vector Strings:</strong> <br/> <br/>
<!-- NIST -->
<div class="row no-gutters">
<div class="col-lg-3 col-sm-6">
<div class="row">
<div class="col-lg-3 col-sm-6">
<img
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
class="cvssNvdIcon"
alt="National Institute of Standards and Technology">
</div>
<div class="col-lg-9 col-sm-6">
<strong>NIST:</strong>&nbsp;<span
data-testid="vuln-cvss2-source-nvd">NVD</span>
</div>
</div>
</div>
<div class="col-lg-3 col-sm-6">
<span><strong>Base
Score:</strong>&nbsp;<span class="severityDetail"> <a
id="Cvss2CalculatorAnchor"
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2021-44228&amp;vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)&amp;version=2.0&amp;source=NIST" class="label label-danger">9.3 HIGH</a></span></span>
</div>
<div class="col-lg-6 col-sm-12">
<span><strong>Vector:</strong>&nbsp;
<span data-testid="vuln-cvss2-panel-vector"
class="tooltipCvss2NistMetrics">(AV:N/AC:M/Au:N/C:C/I:C/A:C)</span></span> <input type="hidden"
id="nistV2MetricHidden"
value="&lt;span id =&#39;cnaV2Metric&#39; style=&#39;display:none&#39;&gt;&lt;strong style=&#39;font-size:1.2em&#39; &gt;CVSS v2.0 Severity and Metrics:&lt;/strong&gt;&lt;p data-testid=&#39;vuln-cvssv2-score-container&#39;&gt;&lt;strong&gt;Base Score: &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-base-score&#39;&gt;9.3 &lt;/span&gt;&lt;span data-testid=&#39;vuln-cvssv2-base-score-severity&#39;&gt;HIGH&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Vector: &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-vector&#39;&gt;(AV:N/AC:M/Au:N/C:C/I:C/A:C)&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Impact Subscore: &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-impact-subscore&#39;&gt;10.0&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Exploitability Subscore: &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-exploitability-score&#39;&gt;8.6&lt;/span&gt;&lt;/p&gt;&lt;hr /&gt;&lt;p data-testid=&#39;vuln-cvssv2-metrics-container&#39;&gt;&lt;strong&gt;Access Vector (AV): &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-av&#39;&gt;Network&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Access Complexity (AC): &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-ac&#39;&gt;Medium&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Authentication (AU): &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-au&#39;&gt;None&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Confidentiality (C): &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv3-c&#39;&gt;Complete&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Integrity (I): &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-i&#39;&gt;Complete&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Availability (A): &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-a&#39;&gt;Complete&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Additional Information: &lt;/strong&gt;&lt;br/&gt;&lt;span data-testid=&#39;vuln-cvssv2-additional&#39;&gt;Allows unauthorized disclosure of information&lt;br/&gt;Allows unauthorized modification&lt;br/&gt;Allows disruption of service&lt;br/&gt;&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;"/>
</div>
</div>
<!-- CNA -->
<!-- ADP -->
<!-- <div id = "cvss2FootNote" class="cvssFootNote" >-->
<!-- <br/><br/>-->
<!-- <span id = "cvss2FootNoteSection" th:utext="${cvssData.cvss2FootNoteHtml}"></span>-->
<!-- </div>-->
</div>
</div>
<div class="row col-sm-12">
<div id="vulnHyperlinksPanel">
<h3>References to Advisories, Solutions, and Tools</h3>
<p>
By selecting these links, you will be leaving NIST webspace.
We have provided these links to other web sites because they
may have information that would be of interest to you. No
inferences should be drawn on account of other sites being
referenced, or not, from this page. There may be other web
sites that are more appropriate for your purpose. NIST does
not necessarily endorse the views expressed, or concur with
the facts presented on these sites. Further, NIST does not
endorse any commercial products that may be mentioned on
these sites. Please address comments about this page to <a
href="mailto:nvd@nist.gov">nvd@nist.gov</a>.
</p>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-hyperlinks-table">
<thead>
<tr>
<th>Hyperlink</th>
<th>Resource</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-hyperlinks-row-0">
<td data-testid="vuln-hyperlinks-link-0">
<a
href="http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html</a></td>
<td data-testid="vuln-hyperlinks-resType-0">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-1">
<td data-testid="vuln-hyperlinks-link-1">
<a
href="http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html</a></td>
<td data-testid="vuln-hyperlinks-resType-1">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-2">
<td data-testid="vuln-hyperlinks-link-2">
<a
href="http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html</a></td>
<td data-testid="vuln-hyperlinks-resType-2">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-3">
<td data-testid="vuln-hyperlinks-link-3">
<a
href="http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html</a></td>
<td data-testid="vuln-hyperlinks-resType-3">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-4">
<td data-testid="vuln-hyperlinks-link-4">
<a
href="http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html</a></td>
<td data-testid="vuln-hyperlinks-resType-4">
<span>
<span class="badge">Exploit</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-5">
<td data-testid="vuln-hyperlinks-link-5">
<a
href="http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html</a></td>
<td data-testid="vuln-hyperlinks-resType-5">
<span>
<span class="badge">Exploit</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-6">
<td data-testid="vuln-hyperlinks-link-6">
<a
href="http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html</a></td>
<td data-testid="vuln-hyperlinks-resType-6">
<span>
<span class="badge">Exploit</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-7">
<td data-testid="vuln-hyperlinks-link-7">
<a
href="http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html</a></td>
<td data-testid="vuln-hyperlinks-resType-7">
<span>
<span class="badge">Exploit</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-8">
<td data-testid="vuln-hyperlinks-link-8">
<a
href="http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html</a></td>
<td data-testid="vuln-hyperlinks-resType-8">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-9">
<td data-testid="vuln-hyperlinks-link-9">
<a
href="http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html</a></td>
<td data-testid="vuln-hyperlinks-resType-9">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-10">
<td data-testid="vuln-hyperlinks-link-10">
<a
href="http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html</a></td>
<td data-testid="vuln-hyperlinks-resType-10">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-11">
<td data-testid="vuln-hyperlinks-link-11">
<a
href="http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html</a></td>
<td data-testid="vuln-hyperlinks-resType-11">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-12">
<td data-testid="vuln-hyperlinks-link-12">
<a
href="http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html</a></td>
<td data-testid="vuln-hyperlinks-resType-12">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-13">
<td data-testid="vuln-hyperlinks-link-13">
<a
href="http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html</a></td>
<td data-testid="vuln-hyperlinks-resType-13">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-14">
<td data-testid="vuln-hyperlinks-link-14">
<a
href="http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html</a></td>
<td data-testid="vuln-hyperlinks-resType-14">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-15">
<td data-testid="vuln-hyperlinks-link-15">
<a
href="http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html</a></td>
<td data-testid="vuln-hyperlinks-resType-15">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-16">
<td data-testid="vuln-hyperlinks-link-16">
<a
href="http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html</a></td>
<td data-testid="vuln-hyperlinks-resType-16">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-17">
<td data-testid="vuln-hyperlinks-link-17">
<a
href="http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html</a></td>
<td data-testid="vuln-hyperlinks-resType-17">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-18">
<td data-testid="vuln-hyperlinks-link-18">
<a
href="http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html</a></td>
<td data-testid="vuln-hyperlinks-resType-18">
<span>
<span class="badge">Exploit</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-19">
<td data-testid="vuln-hyperlinks-link-19">
<a
href="http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html</a></td>
<td data-testid="vuln-hyperlinks-resType-19">
<span>
<span class="badge">Exploit</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-20">
<td data-testid="vuln-hyperlinks-link-20">
<a
href="http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html</a></td>
<td data-testid="vuln-hyperlinks-resType-20">
<span>
<span class="badge">Exploit</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-21">
<td data-testid="vuln-hyperlinks-link-21">
<a
href="http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html</a></td>
<td data-testid="vuln-hyperlinks-resType-21">
<span>
<span class="badge">Exploit</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-22">
<td data-testid="vuln-hyperlinks-link-22">
<a
href="http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html</a></td>
<td data-testid="vuln-hyperlinks-resType-22">
<span>
<span class="badge">Exploit</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-23">
<td data-testid="vuln-hyperlinks-link-23">
<a
href="http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html</a></td>
<td data-testid="vuln-hyperlinks-resType-23">
<span>
<span class="badge">Exploit</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-24">
<td data-testid="vuln-hyperlinks-link-24">
<a
href="http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html</a></td>
<td data-testid="vuln-hyperlinks-resType-24">
<span>
<span class="badge">Exploit</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-25">
<td data-testid="vuln-hyperlinks-link-25">
<a
href="http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html</a></td>
<td data-testid="vuln-hyperlinks-resType-25">
<span>
<span class="badge">Exploit</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-26">
<td data-testid="vuln-hyperlinks-link-26">
<a
href="http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html</a></td>
<td data-testid="vuln-hyperlinks-resType-26">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-27">
<td data-testid="vuln-hyperlinks-link-27">
<a
href="http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html</a></td>
<td data-testid="vuln-hyperlinks-resType-27">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-28">
<td data-testid="vuln-hyperlinks-link-28">
<a
href="http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html</a></td>
<td data-testid="vuln-hyperlinks-resType-28">
<span>
<span class="badge">Exploit</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-29">
<td data-testid="vuln-hyperlinks-link-29">
<a
href="http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html</a></td>
<td data-testid="vuln-hyperlinks-resType-29">
<span>
<span class="badge">Exploit</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-30">
<td data-testid="vuln-hyperlinks-link-30">
<a
href="http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html</a></td>
<td data-testid="vuln-hyperlinks-resType-30">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-31">
<td data-testid="vuln-hyperlinks-link-31">
<a
href="http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html"
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html</a></td>
<td data-testid="vuln-hyperlinks-resType-31">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">VDB Entry</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-32">
<td data-testid="vuln-hyperlinks-link-32">
<a
href="http://seclists.org/fulldisclosure/2022/Dec/2"
target="_blank" rel="noopener noreferrer">http://seclists.org/fulldisclosure/2022/Dec/2</a></td>
<td data-testid="vuln-hyperlinks-resType-32">
<span>
<span class="badge">Exploit</span>&nbsp;
</span><span>
<span class="badge">Mailing List</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-33">
<td data-testid="vuln-hyperlinks-link-33">
<a
href="http://seclists.org/fulldisclosure/2022/Dec/2"
target="_blank" rel="noopener noreferrer">http://seclists.org/fulldisclosure/2022/Dec/2</a></td>
<td data-testid="vuln-hyperlinks-resType-33">
<span>
<span class="badge">Exploit</span>&nbsp;
</span><span>
<span class="badge">Mailing List</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-34">
<td data-testid="vuln-hyperlinks-link-34">
<a
href="http://seclists.org/fulldisclosure/2022/Jul/11"
target="_blank" rel="noopener noreferrer">http://seclists.org/fulldisclosure/2022/Jul/11</a></td>
<td data-testid="vuln-hyperlinks-resType-34">
<span>
<span class="badge">Mailing List</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-35">
<td data-testid="vuln-hyperlinks-link-35">
<a
href="http://seclists.org/fulldisclosure/2022/Jul/11"
target="_blank" rel="noopener noreferrer">http://seclists.org/fulldisclosure/2022/Jul/11</a></td>
<td data-testid="vuln-hyperlinks-resType-35">
<span>
<span class="badge">Mailing List</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-36">
<td data-testid="vuln-hyperlinks-link-36">
<a
href="http://seclists.org/fulldisclosure/2022/Mar/23"
target="_blank" rel="noopener noreferrer">http://seclists.org/fulldisclosure/2022/Mar/23</a></td>
<td data-testid="vuln-hyperlinks-resType-36">
<span>
<span class="badge">Mailing List</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-37">
<td data-testid="vuln-hyperlinks-link-37">
<a
href="http://seclists.org/fulldisclosure/2022/Mar/23"
target="_blank" rel="noopener noreferrer">http://seclists.org/fulldisclosure/2022/Mar/23</a></td>
<td data-testid="vuln-hyperlinks-resType-37">
<span>
<span class="badge">Mailing List</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-38">
<td data-testid="vuln-hyperlinks-link-38">
<a
href="http://www.openwall.com/lists/oss-security/2021/12/10/1"
target="_blank" rel="noopener noreferrer">http://www.openwall.com/lists/oss-security/2021/12/10/1</a></td>
<td data-testid="vuln-hyperlinks-resType-38">
<span>
<span class="badge">Mailing List</span>&nbsp;
</span><span>
<span class="badge">Mitigation</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-39">
<td data-testid="vuln-hyperlinks-link-39">
<a
href="http://www.openwall.com/lists/oss-security/2021/12/10/1"
target="_blank" rel="noopener noreferrer">http://www.openwall.com/lists/oss-security/2021/12/10/1</a></td>
<td data-testid="vuln-hyperlinks-resType-39">
<span>
<span class="badge">Mailing List</span>&nbsp;
</span><span>
<span class="badge">Mitigation</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-40">
<td data-testid="vuln-hyperlinks-link-40">
<a
href="http://www.openwall.com/lists/oss-security/2021/12/10/2"
target="_blank" rel="noopener noreferrer">http://www.openwall.com/lists/oss-security/2021/12/10/2</a></td>
<td data-testid="vuln-hyperlinks-resType-40">
<span>
<span class="badge">Mailing List</span>&nbsp;
</span><span>
<span class="badge">Mitigation</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-41">
<td data-testid="vuln-hyperlinks-link-41">
<a
href="http://www.openwall.com/lists/oss-security/2021/12/10/2"
target="_blank" rel="noopener noreferrer">http://www.openwall.com/lists/oss-security/2021/12/10/2</a></td>
<td data-testid="vuln-hyperlinks-resType-41">
<span>
<span class="badge">Mailing List</span>&nbsp;
</span><span>
<span class="badge">Mitigation</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-42">
<td data-testid="vuln-hyperlinks-link-42">
<a
href="http://www.openwall.com/lists/oss-security/2021/12/10/3"
target="_blank" rel="noopener noreferrer">http://www.openwall.com/lists/oss-security/2021/12/10/3</a></td>
<td data-testid="vuln-hyperlinks-resType-42">
<span>
<span class="badge">Mailing List</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-43">
<td data-testid="vuln-hyperlinks-link-43">
<a
href="http://www.openwall.com/lists/oss-security/2021/12/10/3"
target="_blank" rel="noopener noreferrer">http://www.openwall.com/lists/oss-security/2021/12/10/3</a></td>
<td data-testid="vuln-hyperlinks-resType-43">
<span>
<span class="badge">Mailing List</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-44">
<td data-testid="vuln-hyperlinks-link-44">
<a
href="http://www.openwall.com/lists/oss-security/2021/12/13/1"
target="_blank" rel="noopener noreferrer">http://www.openwall.com/lists/oss-security/2021/12/13/1</a></td>
<td data-testid="vuln-hyperlinks-resType-44">
<span>
<span class="badge">Mailing List</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-45">
<td data-testid="vuln-hyperlinks-link-45">
<a
href="http://www.openwall.com/lists/oss-security/2021/12/13/1"
target="_blank" rel="noopener noreferrer">http://www.openwall.com/lists/oss-security/2021/12/13/1</a></td>
<td data-testid="vuln-hyperlinks-resType-45">
<span>
<span class="badge">Mailing List</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-46">
<td data-testid="vuln-hyperlinks-link-46">
<a
href="http://www.openwall.com/lists/oss-security/2021/12/13/2"
target="_blank" rel="noopener noreferrer">http://www.openwall.com/lists/oss-security/2021/12/13/2</a></td>
<td data-testid="vuln-hyperlinks-resType-46">
<span>
<span class="badge">Mailing List</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-47">
<td data-testid="vuln-hyperlinks-link-47">
<a
href="http://www.openwall.com/lists/oss-security/2021/12/13/2"
target="_blank" rel="noopener noreferrer">http://www.openwall.com/lists/oss-security/2021/12/13/2</a></td>
<td data-testid="vuln-hyperlinks-resType-47">
<span>
<span class="badge">Mailing List</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-48">
<td data-testid="vuln-hyperlinks-link-48">
<a
href="http://www.openwall.com/lists/oss-security/2021/12/14/4"
target="_blank" rel="noopener noreferrer">http://www.openwall.com/lists/oss-security/2021/12/14/4</a></td>
<td data-testid="vuln-hyperlinks-resType-48">
<span>
<span class="badge">Mailing List</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-49">
<td data-testid="vuln-hyperlinks-link-49">
<a
href="http://www.openwall.com/lists/oss-security/2021/12/14/4"
target="_blank" rel="noopener noreferrer">http://www.openwall.com/lists/oss-security/2021/12/14/4</a></td>
<td data-testid="vuln-hyperlinks-resType-49">
<span>
<span class="badge">Mailing List</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-50">
<td data-testid="vuln-hyperlinks-link-50">
<a
href="http://www.openwall.com/lists/oss-security/2021/12/15/3"
target="_blank" rel="noopener noreferrer">http://www.openwall.com/lists/oss-security/2021/12/15/3</a></td>
<td data-testid="vuln-hyperlinks-resType-50">
<span>
<span class="badge">Mailing List</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-51">
<td data-testid="vuln-hyperlinks-link-51">
<a
href="http://www.openwall.com/lists/oss-security/2021/12/15/3"
target="_blank" rel="noopener noreferrer">http://www.openwall.com/lists/oss-security/2021/12/15/3</a></td>
<td data-testid="vuln-hyperlinks-resType-51">
<span>
<span class="badge">Mailing List</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-52">
<td data-testid="vuln-hyperlinks-link-52">
<a
href="https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf"
target="_blank" rel="noopener noreferrer">https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf</a></td>
<td data-testid="vuln-hyperlinks-resType-52">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-53">
<td data-testid="vuln-hyperlinks-link-53">
<a
href="https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf"
target="_blank" rel="noopener noreferrer">https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf</a></td>
<td data-testid="vuln-hyperlinks-resType-53">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-54">
<td data-testid="vuln-hyperlinks-link-54">
<a
href="https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf"
target="_blank" rel="noopener noreferrer">https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf</a></td>
<td data-testid="vuln-hyperlinks-resType-54">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-55">
<td data-testid="vuln-hyperlinks-link-55">
<a
href="https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf"
target="_blank" rel="noopener noreferrer">https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf</a></td>
<td data-testid="vuln-hyperlinks-resType-55">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-56">
<td data-testid="vuln-hyperlinks-link-56">
<a
href="https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf"
target="_blank" rel="noopener noreferrer">https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf</a></td>
<td data-testid="vuln-hyperlinks-resType-56">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-57">
<td data-testid="vuln-hyperlinks-link-57">
<a
href="https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf"
target="_blank" rel="noopener noreferrer">https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf</a></td>
<td data-testid="vuln-hyperlinks-resType-57">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-58">
<td data-testid="vuln-hyperlinks-link-58">
<a
href="https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf"
target="_blank" rel="noopener noreferrer">https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf</a></td>
<td data-testid="vuln-hyperlinks-resType-58">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-59">
<td data-testid="vuln-hyperlinks-link-59">
<a
href="https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf"
target="_blank" rel="noopener noreferrer">https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf</a></td>
<td data-testid="vuln-hyperlinks-resType-59">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-60">
<td data-testid="vuln-hyperlinks-link-60">
<a
href="https://github.com/cisagov/log4j-affected-db"
target="_blank" rel="noopener noreferrer">https://github.com/cisagov/log4j-affected-db</a></td>
<td data-testid="vuln-hyperlinks-resType-60">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-61">
<td data-testid="vuln-hyperlinks-link-61">
<a
href="https://github.com/cisagov/log4j-affected-db"
target="_blank" rel="noopener noreferrer">https://github.com/cisagov/log4j-affected-db</a></td>
<td data-testid="vuln-hyperlinks-resType-61">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-62">
<td data-testid="vuln-hyperlinks-link-62">
<a
href="https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md"
target="_blank" rel="noopener noreferrer">https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md</a></td>
<td data-testid="vuln-hyperlinks-resType-62">
<span>
<span class="badge">Broken Link</span>&nbsp;
</span><span>
<span class="badge">Product</span>&nbsp;
</span><span>
<span class="badge">US Government Resource</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-63">
<td data-testid="vuln-hyperlinks-link-63">
<a
href="https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md"
target="_blank" rel="noopener noreferrer">https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md</a></td>
<td data-testid="vuln-hyperlinks-resType-63">
<span>
<span class="badge">Broken Link</span>&nbsp;
</span><span>
<span class="badge">Product</span>&nbsp;
</span><span>
<span class="badge">US Government Resource</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-64">
<td data-testid="vuln-hyperlinks-link-64">
<a
href="https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228"
target="_blank" rel="noopener noreferrer">https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228</a></td>
<td data-testid="vuln-hyperlinks-resType-64">
<span>
<span class="badge">Exploit</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-65">
<td data-testid="vuln-hyperlinks-link-65">
<a
href="https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228"
target="_blank" rel="noopener noreferrer">https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228</a></td>
<td data-testid="vuln-hyperlinks-resType-65">
<span>
<span class="badge">Exploit</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-66">
<td data-testid="vuln-hyperlinks-link-66">
<a
href="https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html"
target="_blank" rel="noopener noreferrer">https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html</a></td>
<td data-testid="vuln-hyperlinks-resType-66">
<span>
<span class="badge">Mailing List</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-67">
<td data-testid="vuln-hyperlinks-link-67">
<a
href="https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html"
target="_blank" rel="noopener noreferrer">https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html</a></td>
<td data-testid="vuln-hyperlinks-resType-67">
<span>
<span class="badge">Mailing List</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-68">
<td data-testid="vuln-hyperlinks-link-68">
<a
href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/"
target="_blank" rel="noopener noreferrer">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/</a></td>
<td data-testid="vuln-hyperlinks-resType-68">
<span>
<span class="badge">Release Notes</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-69">
<td data-testid="vuln-hyperlinks-link-69">
<a
href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/"
target="_blank" rel="noopener noreferrer">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/</a></td>
<td data-testid="vuln-hyperlinks-resType-69">
<span>
<span class="badge">Release Notes</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-70">
<td data-testid="vuln-hyperlinks-link-70">
<a
href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/"
target="_blank" rel="noopener noreferrer">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/</a></td>
<td data-testid="vuln-hyperlinks-resType-70">
<span>
<span class="badge">Release Notes</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-71">
<td data-testid="vuln-hyperlinks-link-71">
<a
href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/"
target="_blank" rel="noopener noreferrer">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/</a></td>
<td data-testid="vuln-hyperlinks-resType-71">
<span>
<span class="badge">Release Notes</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-72">
<td data-testid="vuln-hyperlinks-link-72">
<a
href="https://logging.apache.org/log4j/2.x/security.html"
target="_blank" rel="noopener noreferrer">https://logging.apache.org/log4j/2.x/security.html</a></td>
<td data-testid="vuln-hyperlinks-resType-72">
<span>
<span class="badge">Release Notes</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-73">
<td data-testid="vuln-hyperlinks-link-73">
<a
href="https://logging.apache.org/log4j/2.x/security.html"
target="_blank" rel="noopener noreferrer">https://logging.apache.org/log4j/2.x/security.html</a></td>
<td data-testid="vuln-hyperlinks-resType-73">
<span>
<span class="badge">Release Notes</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-74">
<td data-testid="vuln-hyperlinks-link-74">
<a
href="https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/"
target="_blank" rel="noopener noreferrer">https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/</a></td>
<td data-testid="vuln-hyperlinks-resType-74">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-75">
<td data-testid="vuln-hyperlinks-link-75">
<a
href="https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/"
target="_blank" rel="noopener noreferrer">https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/</a></td>
<td data-testid="vuln-hyperlinks-resType-75">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-76">
<td data-testid="vuln-hyperlinks-link-76">
<a
href="https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032"
target="_blank" rel="noopener noreferrer">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032</a></td>
<td data-testid="vuln-hyperlinks-resType-76">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-77">
<td data-testid="vuln-hyperlinks-link-77">
<a
href="https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032"
target="_blank" rel="noopener noreferrer">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032</a></td>
<td data-testid="vuln-hyperlinks-resType-77">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-78">
<td data-testid="vuln-hyperlinks-link-78">
<a
href="https://security.netapp.com/advisory/ntap-20211210-0007/"
target="_blank" rel="noopener noreferrer">https://security.netapp.com/advisory/ntap-20211210-0007/</a></td>
<td data-testid="vuln-hyperlinks-resType-78">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-79">
<td data-testid="vuln-hyperlinks-link-79">
<a
href="https://security.netapp.com/advisory/ntap-20211210-0007/"
target="_blank" rel="noopener noreferrer">https://security.netapp.com/advisory/ntap-20211210-0007/</a></td>
<td data-testid="vuln-hyperlinks-resType-79">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-80">
<td data-testid="vuln-hyperlinks-link-80">
<a
href="https://support.apple.com/kb/HT213189"
target="_blank" rel="noopener noreferrer">https://support.apple.com/kb/HT213189</a></td>
<td data-testid="vuln-hyperlinks-resType-80">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-81">
<td data-testid="vuln-hyperlinks-link-81">
<a
href="https://support.apple.com/kb/HT213189"
target="_blank" rel="noopener noreferrer">https://support.apple.com/kb/HT213189</a></td>
<td data-testid="vuln-hyperlinks-resType-81">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-82">
<td data-testid="vuln-hyperlinks-link-82">
<a
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
<td data-testid="vuln-hyperlinks-resType-82">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-83">
<td data-testid="vuln-hyperlinks-link-83">
<a
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
<td data-testid="vuln-hyperlinks-resType-83">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-84">
<td data-testid="vuln-hyperlinks-link-84">
<a
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
<td data-testid="vuln-hyperlinks-resType-84">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-85">
<td data-testid="vuln-hyperlinks-link-85">
<a
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
<td data-testid="vuln-hyperlinks-resType-85">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-86">
<td data-testid="vuln-hyperlinks-link-86">
<a
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
<td data-testid="vuln-hyperlinks-resType-86">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-87">
<td data-testid="vuln-hyperlinks-link-87">
<a
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
<td data-testid="vuln-hyperlinks-resType-87">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-88">
<td data-testid="vuln-hyperlinks-link-88">
<a
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
<td data-testid="vuln-hyperlinks-resType-88">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-89">
<td data-testid="vuln-hyperlinks-link-89">
<a
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
<td data-testid="vuln-hyperlinks-resType-89">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-90">
<td data-testid="vuln-hyperlinks-link-90">
<a
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
<td data-testid="vuln-hyperlinks-resType-90">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-91">
<td data-testid="vuln-hyperlinks-link-91">
<a
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
<td data-testid="vuln-hyperlinks-resType-91">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-92">
<td data-testid="vuln-hyperlinks-link-92">
<a
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
<td data-testid="vuln-hyperlinks-resType-92">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-93">
<td data-testid="vuln-hyperlinks-link-93">
<a
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
<td data-testid="vuln-hyperlinks-resType-93">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-94">
<td data-testid="vuln-hyperlinks-link-94">
<a
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
<td data-testid="vuln-hyperlinks-resType-94">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-95">
<td data-testid="vuln-hyperlinks-link-95">
<a
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
<td data-testid="vuln-hyperlinks-resType-95">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-96">
<td data-testid="vuln-hyperlinks-link-96">
<a
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
<td data-testid="vuln-hyperlinks-resType-96">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-97">
<td data-testid="vuln-hyperlinks-link-97">
<a
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
<td data-testid="vuln-hyperlinks-resType-97">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-98">
<td data-testid="vuln-hyperlinks-link-98">
<a
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
<td data-testid="vuln-hyperlinks-resType-98">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-99">
<td data-testid="vuln-hyperlinks-link-99">
<a
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd"
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</a></td>
<td data-testid="vuln-hyperlinks-resType-99">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-100">
<td data-testid="vuln-hyperlinks-link-100">
<a
href="https://twitter.com/kurtseifried/status/1469345530182455296"
target="_blank" rel="noopener noreferrer">https://twitter.com/kurtseifried/status/1469345530182455296</a></td>
<td data-testid="vuln-hyperlinks-resType-100">
<span>
<span class="badge">Broken Link</span>&nbsp;
</span><span>
<span class="badge">Exploit</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-101">
<td data-testid="vuln-hyperlinks-link-101">
<a
href="https://twitter.com/kurtseifried/status/1469345530182455296"
target="_blank" rel="noopener noreferrer">https://twitter.com/kurtseifried/status/1469345530182455296</a></td>
<td data-testid="vuln-hyperlinks-resType-101">
<span>
<span class="badge">Broken Link</span>&nbsp;
</span><span>
<span class="badge">Exploit</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-102">
<td data-testid="vuln-hyperlinks-link-102">
<a
href="https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001"
target="_blank" rel="noopener noreferrer">https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001</a></td>
<td data-testid="vuln-hyperlinks-resType-102">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-103">
<td data-testid="vuln-hyperlinks-link-103">
<a
href="https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001"
target="_blank" rel="noopener noreferrer">https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001</a></td>
<td data-testid="vuln-hyperlinks-resType-103">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-104">
<td data-testid="vuln-hyperlinks-link-104">
<a
href="https://www.debian.org/security/2021/dsa-5020"
target="_blank" rel="noopener noreferrer">https://www.debian.org/security/2021/dsa-5020</a></td>
<td data-testid="vuln-hyperlinks-resType-104">
<span>
<span class="badge">Mailing List</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-105">
<td data-testid="vuln-hyperlinks-link-105">
<a
href="https://www.debian.org/security/2021/dsa-5020"
target="_blank" rel="noopener noreferrer">https://www.debian.org/security/2021/dsa-5020</a></td>
<td data-testid="vuln-hyperlinks-resType-105">
<span>
<span class="badge">Mailing List</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-106">
<td data-testid="vuln-hyperlinks-link-106">
<a
href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html"
target="_blank" rel="noopener noreferrer">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html</a></td>
<td data-testid="vuln-hyperlinks-resType-106">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-107">
<td data-testid="vuln-hyperlinks-link-107">
<a
href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html"
target="_blank" rel="noopener noreferrer">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html</a></td>
<td data-testid="vuln-hyperlinks-resType-107">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-108">
<td data-testid="vuln-hyperlinks-link-108">
<a
href="https://www.kb.cert.org/vuls/id/930724"
target="_blank" rel="noopener noreferrer">https://www.kb.cert.org/vuls/id/930724</a></td>
<td data-testid="vuln-hyperlinks-resType-108">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">US Government Resource</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-109">
<td data-testid="vuln-hyperlinks-link-109">
<a
href="https://www.kb.cert.org/vuls/id/930724"
target="_blank" rel="noopener noreferrer">https://www.kb.cert.org/vuls/id/930724</a></td>
<td data-testid="vuln-hyperlinks-resType-109">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span><span>
<span class="badge">US Government Resource</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-110">
<td data-testid="vuln-hyperlinks-link-110">
<a
href="https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html"
target="_blank" rel="noopener noreferrer">https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html</a></td>
<td data-testid="vuln-hyperlinks-resType-110">
<span>
<span class="badge">Exploit</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-111">
<td data-testid="vuln-hyperlinks-link-111">
<a
href="https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html"
target="_blank" rel="noopener noreferrer">https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html</a></td>
<td data-testid="vuln-hyperlinks-resType-111">
<span>
<span class="badge">Exploit</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-112">
<td data-testid="vuln-hyperlinks-link-112">
<a
href="https://www.oracle.com/security-alerts/alert-cve-2021-44228.html"
target="_blank" rel="noopener noreferrer">https://www.oracle.com/security-alerts/alert-cve-2021-44228.html</a></td>
<td data-testid="vuln-hyperlinks-resType-112">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-113">
<td data-testid="vuln-hyperlinks-link-113">
<a
href="https://www.oracle.com/security-alerts/alert-cve-2021-44228.html"
target="_blank" rel="noopener noreferrer">https://www.oracle.com/security-alerts/alert-cve-2021-44228.html</a></td>
<td data-testid="vuln-hyperlinks-resType-113">
<span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-114">
<td data-testid="vuln-hyperlinks-link-114">
<a
href="https://www.oracle.com/security-alerts/cpuapr2022.html"
target="_blank" rel="noopener noreferrer">https://www.oracle.com/security-alerts/cpuapr2022.html</a></td>
<td data-testid="vuln-hyperlinks-resType-114">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-115">
<td data-testid="vuln-hyperlinks-link-115">
<a
href="https://www.oracle.com/security-alerts/cpuapr2022.html"
target="_blank" rel="noopener noreferrer">https://www.oracle.com/security-alerts/cpuapr2022.html</a></td>
<td data-testid="vuln-hyperlinks-resType-115">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-116">
<td data-testid="vuln-hyperlinks-link-116">
<a
href="https://www.oracle.com/security-alerts/cpujan2022.html"
target="_blank" rel="noopener noreferrer">https://www.oracle.com/security-alerts/cpujan2022.html</a></td>
<td data-testid="vuln-hyperlinks-resType-116">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-117">
<td data-testid="vuln-hyperlinks-link-117">
<a
href="https://www.oracle.com/security-alerts/cpujan2022.html"
target="_blank" rel="noopener noreferrer">https://www.oracle.com/security-alerts/cpujan2022.html</a></td>
<td data-testid="vuln-hyperlinks-resType-117">
<span>
<span class="badge">Patch</span>&nbsp;
</span><span>
<span class="badge">Third Party Advisory</span>&nbsp;
</span>
</td>
</tr>
</tbody>
</table>
</div>
<div id="vulnCisaExploit">
<h3>
This CVE is in CISA's Known Exploited Vulnerabilities Catalog
</h3>
<p>
Reference <a href="https://www.cisa.gov/binding-operational-directive-22-01">
CISA's BOD 22-01</a> and <a
href="https://cisa.gov/known-exploited-vulnerabilities-catalog">Known
Exploited Vulnerabilities Catalog</a> for further guidance and requirements.
</p>
<table
class="table table-striped table-condensed table-bordered detail-table">
<thead>
<tr>
<th>Vulnerability Name</th>
<th>Date Added</th>
<th>Due Date</th>
<th>Required Action</th>
</tr>
</thead>
<tbody>
<tr>
<td>Apache Log4j2 Remote Code Execution Vulnerability</td>
<td>12/10/2021</td>
<td>12/24/2021</td>
<td>For all affected software assets for which updates exist, the only acceptable remediation actions are: 1) Apply updates; OR 2) remove affected assets from agency networks. Temporary mitigations using one of the measures provided at https://www.cisa.gov/uscert/ed-22-02-apache-log4j-recommended-mitigation-measures are only acceptable until updates are available.</td>
</tr>
</tbody>
</table>
</div>
<div id="vulnTechnicalDetailsDiv" class="technicalDetails"
data-testid="vuln-technical-details-container">
<h3>Weakness Enumeration</h3>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-CWEs-table">
<thead>
<tr>
<th>CWE-ID</th>
<th>CWE Name</th>
<th>Source</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-CWEs-row-0">
<td data-testid="vuln-CWEs-link-0">
<a href="http://cwe.mitre.org/data/definitions/917.html" target="_blank" rel="noopener noreferrer">CWE-917</a>
</td>
<td
data-testid="vuln-CWEs-link-0">Improper Neutralization of Special Elements used in an Expression Language Statement (&#39;Expression La</td>
<td data-testid="vuln-cwes-assigner-0">
<span class="cweSource" data-testid="vuln-cwes-assigner-0-0"
>
<img src="/site-media/images/NVD_NVD_Stack_Plain.svg"
class="cweNvdIcon"
alt="cwe source acceptance level">
<span>NIST</span>
</span>
</td>
</tr>
<tr data-testid="vuln-CWEs-row-1">
<td data-testid="vuln-CWEs-link-1">
<a href="http://cwe.mitre.org/data/definitions/502.html" target="_blank" rel="noopener noreferrer">CWE-502</a>
</td>
<td
data-testid="vuln-CWEs-link-1">Deserialization of Untrusted Data</td>
<td data-testid="vuln-cwes-assigner-1">
<span class="cweSource" data-testid="vuln-cwes-assigner-1-0"
>
<span>Apache Software Foundation</span>
</span>
</td>
</tr>
<tr data-testid="vuln-CWEs-row-2">
<td data-testid="vuln-CWEs-link-2">
<a href="http://cwe.mitre.org/data/definitions/400.html" target="_blank" rel="noopener noreferrer">CWE-400</a>
</td>
<td
data-testid="vuln-CWEs-link-2">Uncontrolled Resource Consumption</td>
<td data-testid="vuln-cwes-assigner-2">
<span class="cweSource" data-testid="vuln-cwes-assigner-2-0"
>
<span>Apache Software Foundation</span>
</span>
</td>
</tr>
<tr data-testid="vuln-CWEs-row-3">
<td data-testid="vuln-CWEs-link-3">
<a href="http://cwe.mitre.org/data/definitions/20.html" target="_blank" rel="noopener noreferrer">CWE-20</a>
</td>
<td
data-testid="vuln-CWEs-link-3">Improper Input Validation</td>
<td data-testid="vuln-cwes-assigner-3">
<span class="cweSource" data-testid="vuln-cwes-assigner-3-0"
>
<span>Apache Software Foundation</span>
</span>
</td>
</tr>
</tbody>
</table>
</div>
<div>
<h3>
Known Affected Software Configurations <small> <a
id="toggleCpeVersion" href="#vulnConfigurationsArea">Switch
to CPE 2.2</a></small>
</h3>
<span id="vulnConfigurationsArea"></span>
<input type="hidden" id="cveIdHidden" value="CVE-2021-44228"/>
<div>
<div id="vulnCpeTreeLoading"><h3>CPEs loading, please wait.</h3></div>
<div id="vulnCpeTree" style="display: none;"></div>
<input type="hidden"
id="InputRestBasePath"
value="/rest/public">
<input type="hidden" id="cveTreeJsonDataHidden" value="[{&quot;id&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-config-1&quot;,&quot;totalCpeCount&quot;:7,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-1-0&quot;,&quot;configType&quot;:&quot;BASIC&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Aapache%3Alog4j%3A2.0%3A-%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:apache:log4j:2.0:-:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:apache:log4j:2.0:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-0&quot;,&quot;id&quot;:&quot;16343387&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Aapache%3Alog4j%3A2.0%3Abeta9%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:apache:log4j:2.0:beta9:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:apache:log4j:2.0:beta9&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-1&quot;,&quot;id&quot;:&quot;16343385&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Aapache%3Alog4j%3A2.0%3Arc1%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:apache:log4j:2.0:rc1:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:apache:log4j:2.0:rc1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-2&quot;,&quot;id&quot;:&quot;16343384&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Aapache%3Alog4j%3A2.0%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:apache:log4j:2.0:rc2:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:apache:log4j:2.0:rc2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-3&quot;,&quot;id&quot;:&quot;16343386&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Aapache%3Alog4j%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:apache:log4j&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-4&quot;,&quot;id&quot;:&quot;16343389&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions from (including) 2.0.1 up to (excluding) 2.3.1 &quot;,&quot;rangeStartType&quot;:&quot;including&quot;,&quot;rangeStartVersion&quot;:&quot;2.0.1&quot;,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;2.3.1&quot;,&quot;rangeId&quot;:&quot;462223&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Aapache%3Alog4j%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:apache:log4j&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-5&quot;,&quot;id&quot;:&quot;16343390&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions from (including) 2.4.0 up to (excluding) 2.12.2 &quot;,&quot;rangeStartType&quot;:&quot;including&quot;,&quot;rangeStartVersion&quot;:&quot;2.4.0&quot;,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;2.12.2&quot;,&quot;rangeId&quot;:&quot;462224&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Aapache%3Alog4j%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:apache:log4j&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-6&quot;,&quot;id&quot;:&quot;16343388&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions from (including) 2.13.0 up to (excluding) 2.15.0 &quot;,&quot;rangeStartType&quot;:&quot;including&quot;,&quot;rangeStartVersion&quot;:&quot;2.13.0&quot;,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;2.15.0&quot;,&quot;rangeId&quot;:&quot;444608&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]},{&quot;id&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-config-2&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-2-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-2-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Asiemens%3Asppa-t3000_ses3000_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:siemens:sppa-t3000_ses3000_firmware:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:siemens:sppa-t3000_ses3000_firmware&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-0-0&quot;,&quot;id&quot;:&quot;16343391&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-2-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Asiemens%3Asppa-t3000_ses3000%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:siemens:sppa-t3000_ses3000:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:siemens:sppa-t3000_ses3000:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-1-0&quot;,&quot;id&quot;:&quot;16343392&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:3,&quot;dataTestId&quot;:&quot;vuln-software-config-3&quot;,&quot;totalCpeCount&quot;:63,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-3-0&quot;,&quot;configType&quot;:&quot;BASIC&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Acaptial%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:captial:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:captial&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-0&quot;,&quot;id&quot;:&quot;16343455&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 2019.1 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;2019.1&quot;,&quot;rangeId&quot;:&quot;444908&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Acaptial%3A2019.1%3A-%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:captial:2019.1:-:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:captial:2019.1:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-1&quot;,&quot;id&quot;:&quot;16343438&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Acaptial%3A2019.1%3Asp1912%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:captial:2019.1:sp1912:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:captial:2019.1:sp1912&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-2&quot;,&quot;id&quot;:&quot;16343422&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Acomos%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:comos:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:comos&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-3&quot;,&quot;id&quot;:&quot;16343421&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Adesigo_cc_advanced_reports%3A4.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:desigo_cc_advanced_reports:4.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:desigo_cc_advanced_reports:4.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-4&quot;,&quot;id&quot;:&quot;16343420&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Adesigo_cc_advanced_reports%3A4.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:desigo_cc_advanced_reports:4.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:desigo_cc_advanced_reports:4.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-5&quot;,&quot;id&quot;:&quot;16343416&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Adesigo_cc_advanced_reports%3A4.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:desigo_cc_advanced_reports:4.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:desigo_cc_advanced_reports:4.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-6&quot;,&quot;id&quot;:&quot;16343417&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Adesigo_cc_advanced_reports%3A5.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:desigo_cc_advanced_reports:5.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:desigo_cc_advanced_reports:5.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-7&quot;,&quot;id&quot;:&quot;16343418&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Adesigo_cc_advanced_reports%3A5.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:desigo_cc_advanced_reports:5.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:desigo_cc_advanced_reports:5.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-8&quot;,&quot;id&quot;:&quot;16343419&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Adesigo_cc_info_center%3A5.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:desigo_cc_info_center:5.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:desigo_cc_info_center:5.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-9&quot;,&quot;id&quot;:&quot;16343414&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Adesigo_cc_info_center%3A5.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:desigo_cc_info_center:5.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:desigo_cc_info_center:5.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-10&quot;,&quot;id&quot;:&quot;16343415&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Ae-car_operation_center%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:e-car_operation_center:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:e-car_operation_center&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-11&quot;,&quot;id&quot;:&quot;16343413&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 2021-12-13 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;2021-12-13&quot;,&quot;rangeId&quot;:&quot;444865&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Aenergy_engage%3A3.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:energy_engage:3.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:energy_engage:3.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-12&quot;,&quot;id&quot;:&quot;16343412&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Aenergyip%3A8.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:energyip:8.5:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:energyip:8.5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-13&quot;,&quot;id&quot;:&quot;16343408&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Aenergyip%3A8.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:energyip:8.6:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:energyip:8.6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-14&quot;,&quot;id&quot;:&quot;16343409&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Aenergyip%3A8.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:energyip:8.7:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:energyip:8.7&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-15&quot;,&quot;id&quot;:&quot;16343410&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Aenergyip%3A9.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:energyip:9.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:energyip:9.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-16&quot;,&quot;id&quot;:&quot;16343411&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Aenergyip_prepay%3A3.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:energyip_prepay:3.7:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:energyip_prepay:3.7&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-17&quot;,&quot;id&quot;:&quot;16343398&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Aenergyip_prepay%3A3.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:energyip_prepay:3.8:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:energyip_prepay:3.8&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-18&quot;,&quot;id&quot;:&quot;16343399&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Agma-manager%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:gma-manager:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:gma-manager&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-19&quot;,&quot;id&quot;:&quot;16343407&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 8.6.2j-398 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;8.6.2j-398&quot;,&quot;rangeId&quot;:&quot;444859&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Ahead-end_system_universal_device_integration_system%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:head-end_system_universal_device_integration_system:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:head-end_system_universal_device_integration_system&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-20&quot;,&quot;id&quot;:&quot;16343406&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Aindustrial_edge_management%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:industrial_edge_management:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:industrial_edge_management&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-21&quot;,&quot;id&quot;:&quot;16343454&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Aindustrial_edge_management_hub%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:industrial_edge_management_hub:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:industrial_edge_management_hub&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-22&quot;,&quot;id&quot;:&quot;16343453&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 2021-12-13 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;2021-12-13&quot;,&quot;rangeId&quot;:&quot;444906&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Alogo%5C%21_soft_comfort%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:logo\\!_soft_comfort:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:logo%21_soft_comfort&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-23&quot;,&quot;id&quot;:&quot;16343393&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Amendix%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:mendix:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:mendix&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-24&quot;,&quot;id&quot;:&quot;16343452&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Amindsphere%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:mindsphere:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:mindsphere&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-25&quot;,&quot;id&quot;:&quot;16343451&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 2021-12-11 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;2021-12-11&quot;,&quot;rangeId&quot;:&quot;444904&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Anavigator%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:navigator:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:navigator&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-26&quot;,&quot;id&quot;:&quot;16343423&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 2021-12-13 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;2021-12-13&quot;,&quot;rangeId&quot;:&quot;444876&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Anx%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:nx:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:nx&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-27&quot;,&quot;id&quot;:&quot;16343449&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Aopcenter_intelligence%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:opcenter_intelligence:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:opcenter_intelligence&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-28&quot;,&quot;id&quot;:&quot;16343450&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (including) 3.2 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;including&quot;,&quot;rangeEndVersion&quot;:&quot;3.2&quot;,&quot;rangeId&quot;:&quot;444903&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Aoperation_scheduler%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:operation_scheduler:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:operation_scheduler&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-29&quot;,&quot;id&quot;:&quot;16343448&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (including) 1.1.3 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;including&quot;,&quot;rangeEndVersion&quot;:&quot;1.1.3&quot;,&quot;rangeId&quot;:&quot;444901&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Asentron_powermanager%3A4.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:sentron_powermanager:4.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:sentron_powermanager:4.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-30&quot;,&quot;id&quot;:&quot;16343447&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Asentron_powermanager%3A4.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:sentron_powermanager:4.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:sentron_powermanager:4.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-31&quot;,&quot;id&quot;:&quot;16343446&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Asiguard_dsa%3A4.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:siguard_dsa:4.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:siguard_dsa:4.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-32&quot;,&quot;id&quot;:&quot;16343445&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Asiguard_dsa%3A4.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:siguard_dsa:4.3:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:siguard_dsa:4.3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-33&quot;,&quot;id&quot;:&quot;16343443&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Asiguard_dsa%3A4.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:siguard_dsa:4.4:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:siguard_dsa:4.4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-34&quot;,&quot;id&quot;:&quot;16343444&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Asipass_integrated%3A2.80%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:sipass_integrated:2.80:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:sipass_integrated:2.80&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-35&quot;,&quot;id&quot;:&quot;16343405&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Asipass_integrated%3A2.85%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:sipass_integrated:2.85:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:sipass_integrated:2.85&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-36&quot;,&quot;id&quot;:&quot;16343404&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Asiveillance_command%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:siveillance_command:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:siveillance_command&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-37&quot;,&quot;id&quot;:&quot;16343403&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (including) 4.16.2.1 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;including&quot;,&quot;rangeEndVersion&quot;:&quot;4.16.2.1&quot;,&quot;rangeId&quot;:&quot;444653&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Asiveillance_control_pro%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:siveillance_control_pro:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:siveillance_control_pro&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-38&quot;,&quot;id&quot;:&quot;16343397&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Asiveillance_identity%3A1.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:siveillance_identity:1.5:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:siveillance_identity:1.5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-39&quot;,&quot;id&quot;:&quot;16343402&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Asiveillance_identity%3A1.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:siveillance_identity:1.6:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:siveillance_identity:1.6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-40&quot;,&quot;id&quot;:&quot;16343401&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Asiveillance_vantage%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:siveillance_vantage:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:siveillance_vantage&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-41&quot;,&quot;id&quot;:&quot;16343442&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Asiveillance_viewpoint%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:siveillance_viewpoint:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:siveillance_viewpoint&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-42&quot;,&quot;id&quot;:&quot;16343441&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Asolid_edge_cam_pro%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:solid_edge_cam_pro:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:solid_edge_cam_pro&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-43&quot;,&quot;id&quot;:&quot;16343440&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Asolid_edge_harness_design%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:solid_edge_harness_design:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:solid_edge_harness_design&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-44&quot;,&quot;id&quot;:&quot;16343437&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 2020 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;2020&quot;,&quot;rangeId&quot;:&quot;444890&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Asolid_edge_harness_design%3A2020%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:solid_edge_harness_design:2020:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:solid_edge_harness_design:2020&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-45&quot;,&quot;id&quot;:&quot;16343439&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Asolid_edge_harness_design%3A2020%3A-%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:solid_edge_harness_design:2020:-:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:solid_edge_harness_design:2020:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-46&quot;,&quot;id&quot;:&quot;16343436&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Asolid_edge_harness_design%3A2020%3Asp2002%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:solid_edge_harness_design:2020:sp2002:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:solid_edge_harness_design:2020:sp2002&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-47&quot;,&quot;id&quot;:&quot;16343435&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Aspectrum_power_4%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:spectrum_power_4:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:spectrum_power_4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-48&quot;,&quot;id&quot;:&quot;16343396&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 4.70 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;4.70&quot;,&quot;rangeId&quot;:&quot;380057&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Aspectrum_power_4%3A4.70%3A-%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:spectrum_power_4:4.70:-:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:spectrum_power_4:4.70:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-49&quot;,&quot;id&quot;:&quot;16343395&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Aspectrum_power_4%3A4.70%3Asp7%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:spectrum_power_4:4.70:sp7:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:spectrum_power_4:4.70:sp7&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-50&quot;,&quot;id&quot;:&quot;16343394&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Aspectrum_power_4%3A4.70%3Asp8%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:spectrum_power_4:4.70:sp8:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:spectrum_power_4:4.70:sp8&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-51&quot;,&quot;id&quot;:&quot;16343400&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Aspectrum_power_7%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:spectrum_power_7:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:spectrum_power_7&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-52&quot;,&quot;id&quot;:&quot;16343433&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 2.30 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;2.30&quot;,&quot;rangeId&quot;:&quot;444886&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Aspectrum_power_7%3A2.30%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:spectrum_power_7:2.30:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:spectrum_power_7:2.30&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-53&quot;,&quot;id&quot;:&quot;16343434&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Aspectrum_power_7%3A2.30%3A-%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:spectrum_power_7:2.30:-:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:spectrum_power_7:2.30:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-54&quot;,&quot;id&quot;:&quot;16343432&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Aspectrum_power_7%3A2.30%3Asp2%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:spectrum_power_7:2.30:sp2:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:spectrum_power_7:2.30:sp2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-55&quot;,&quot;id&quot;:&quot;16343431&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Ateamcenter%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:teamcenter:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:teamcenter&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-56&quot;,&quot;id&quot;:&quot;16343430&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Avesys%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:vesys:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:vesys&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-57&quot;,&quot;id&quot;:&quot;16343428&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 2019.1 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;2019.1&quot;,&quot;rangeId&quot;:&quot;444881&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Avesys%3A2019.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:vesys:2019.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:vesys:2019.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-58&quot;,&quot;id&quot;:&quot;16343427&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Avesys%3A2019.1%3A-%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:vesys:2019.1:-:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:vesys:2019.1:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-59&quot;,&quot;id&quot;:&quot;16343429&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Avesys%3A2019.1%3Asp1912%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:vesys:2019.1:sp1912:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:vesys:2019.1:sp1912&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-60&quot;,&quot;id&quot;:&quot;16343426&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Axpedition_enterprise%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:xpedition_enterprise:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:xpedition_enterprise:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-61&quot;,&quot;id&quot;:&quot;16343425&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asiemens%3Axpedition_package_integrator%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:siemens:xpedition_package_integrator:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:siemens:xpedition_package_integrator:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-62&quot;,&quot;id&quot;:&quot;16343424&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]},{&quot;id&quot;:4,&quot;dataTestId&quot;:&quot;vuln-software-config-4&quot;,&quot;totalCpeCount&quot;:9,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-4-0&quot;,&quot;configType&quot;:&quot;BASIC&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Aintel%3Aaudio_development_kit%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:intel:audio_development_kit:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:intel:audio_development_kit:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-4-0-0&quot;,&quot;id&quot;:&quot;16343456&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Aintel%3Acomputer_vision_annotation_tool%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:intel:computer_vision_annotation_tool:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:intel:computer_vision_annotation_tool:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-4-0-1&quot;,&quot;id&quot;:&quot;16343461&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Aintel%3Adata_center_manager%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:intel:data_center_manager:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:intel:data_center_manager&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-4-0-2&quot;,&quot;id&quot;:&quot;16343464&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 5.1 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;5.1&quot;,&quot;rangeId&quot;:&quot;556295&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Aintel%3Agenomics_kernel_library%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:intel:genomics_kernel_library:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:intel:genomics_kernel_library:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-4-0-3&quot;,&quot;id&quot;:&quot;16343462&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Aintel%3Aoneapi_sample_browser%3A-%3A*%3A*%3A*%3A*%3Aeclipse%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:intel:oneapi_sample_browser:-:*:*:*:*:eclipse:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:intel:oneapi_sample_browser:-::~~~eclipse~~&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-4-0-4&quot;,&quot;id&quot;:&quot;16343459&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Aintel%3Asecure_device_onboard%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:intel:secure_device_onboard:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:intel:secure_device_onboard:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-4-0-5&quot;,&quot;id&quot;:&quot;16343458&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Aintel%3Asensor_solution_firmware_development_kit%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:intel:sensor_solution_firmware_development_kit:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:intel:sensor_solution_firmware_development_kit:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-4-0-6&quot;,&quot;id&quot;:&quot;16343460&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Aintel%3Asystem_debugger%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:intel:system_debugger:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:intel:system_debugger:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-4-0-7&quot;,&quot;id&quot;:&quot;16343457&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Aintel%3Asystem_studio%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:intel:system_studio:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:intel:system_studio:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-4-0-8&quot;,&quot;id&quot;:&quot;16343463&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]},{&quot;id&quot;:5,&quot;dataTestId&quot;:&quot;vuln-software-config-5&quot;,&quot;totalCpeCount&quot;:3,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-5-0&quot;,&quot;configType&quot;:&quot;BASIC&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A9.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:debian:debian_linux:9.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-5-0-0&quot;,&quot;id&quot;:&quot;16343465&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A10.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:debian:debian_linux:10.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-5-0-1&quot;,&quot;id&quot;:&quot;16343466&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A11.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:debian:debian_linux:11.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-5-0-2&quot;,&quot;id&quot;:&quot;16343467&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]},{&quot;id&quot;:6,&quot;dataTestId&quot;:&quot;vuln-software-config-6&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-6-0&quot;,&quot;configType&quot;:&quot;BASIC&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Afedoraproject%3Afedora%3A34%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:fedoraproject:fedora:34&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-6-0-0&quot;,&quot;id&quot;:&quot;16343468&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Afedoraproject%3Afedora%3A35%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:fedoraproject:fedora:35&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-6-0-1&quot;,&quot;id&quot;:&quot;16343469&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]},{&quot;id&quot;:7,&quot;dataTestId&quot;:&quot;vuln-software-config-7&quot;,&quot;totalCpeCount&quot;:1,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-7-0&quot;,&quot;configType&quot;:&quot;BASIC&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asonicwall%3Aemail_security%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:sonicwall:email_security:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:sonicwall:email_security&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-7-0-0&quot;,&quot;id&quot;:&quot;16343470&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 10.0.12 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;10.0.12&quot;,&quot;rangeId&quot;:&quot;444622&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]},{&quot;id&quot;:8,&quot;dataTestId&quot;:&quot;vuln-software-config-8&quot;,&quot;totalCpeCount&quot;:9,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-8-0&quot;,&quot;configType&quot;:&quot;BASIC&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Anetapp%3Aactive_iq_unified_manager%3A-%3A*%3A*%3A*%3A*%3Alinux%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:netapp:active_iq_unified_manager:-::~~~linux~~&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-8-0-0&quot;,&quot;id&quot;:&quot;16343474&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Anetapp%3Aactive_iq_unified_manager%3A-%3A*%3A*%3A*%3A*%3Avmware_vsphere%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:netapp:active_iq_unified_manager:-::~~~vmware_vsphere~~&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-8-0-1&quot;,&quot;id&quot;:&quot;16343473&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Anetapp%3Aactive_iq_unified_manager%3A-%3A*%3A*%3A*%3A*%3Awindows%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:netapp:active_iq_unified_manager:-::~~~windows~~&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-8-0-2&quot;,&quot;id&quot;:&quot;16343475&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Anetapp%3Acloud_insights%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:netapp:cloud_insights:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:netapp:cloud_insights:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-8-0-3&quot;,&quot;id&quot;:&quot;16343472&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Anetapp%3Acloud_manager%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:netapp:cloud_manager:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:netapp:cloud_manager:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-8-0-4&quot;,&quot;id&quot;:&quot;16343476&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Anetapp%3Acloud_secure_agent%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:netapp:cloud_secure_agent:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-8-0-5&quot;,&quot;id&quot;:&quot;16343477&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Anetapp%3Aoncommand_insight%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:netapp:oncommand_insight:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-8-0-6&quot;,&quot;id&quot;:&quot;16343471&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Anetapp%3Aontap_tools%3A-%3A*%3A*%3A*%3A*%3Avmware_vsphere%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:netapp:ontap_tools:-:*:*:*:*:vmware_vsphere:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:netapp:ontap_tools:-::~~~vmware_vsphere~~&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-8-0-7&quot;,&quot;id&quot;:&quot;16343478&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Anetapp%3Asnapcenter%3A-%3A*%3A*%3A*%3A*%3Avmware_vsphere%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:vmware_vsphere:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:netapp:snapcenter:-::~~~vmware_vsphere~~&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-8-0-8&quot;,&quot;id&quot;:&quot;16343479&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]},{&quot;id&quot;:9,&quot;dataTestId&quot;:&quot;vuln-software-config-9&quot;,&quot;totalCpeCount&quot;:105,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-9-0&quot;,&quot;configType&quot;:&quot;BASIC&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aadvanced_malware_protection_virtual_private_cloud_appliance%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:advanced_malware_protection_virtual_private_cloud_appliance:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:advanced_malware_protection_virtual_private_cloud_appliance&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-0&quot;,&quot;id&quot;:&quot;16343535&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 3.5.4 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;3.5.4&quot;,&quot;rangeId&quot;:&quot;444966&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aautomated_subsea_tuning%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:automated_subsea_tuning:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:automated_subsea_tuning&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-1&quot;,&quot;id&quot;:&quot;16343533&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 2.1.0 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;2.1.0&quot;,&quot;rangeId&quot;:&quot;444964&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Abroadworks%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:broadworks:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:broadworks&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-2&quot;,&quot;id&quot;:&quot;16343584&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 2021.11_1.162 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;2021.11_1.162&quot;,&quot;rangeId&quot;:&quot;445025&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Abusiness_process_automation%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:business_process_automation:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:business_process_automation&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-3&quot;,&quot;id&quot;:&quot;16343532&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 3.0.000.115 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;3.0.000.115&quot;,&quot;rangeId&quot;:&quot;444963&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Abusiness_process_automation%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:business_process_automation:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:business_process_automation&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-4&quot;,&quot;id&quot;:&quot;16343531&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions from (including) 3.1.000.000 up to (excluding) 3.1.000.044 &quot;,&quot;rangeStartType&quot;:&quot;including&quot;,&quot;rangeStartVersion&quot;:&quot;3.1.000.000&quot;,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;3.1.000.044&quot;,&quot;rangeId&quot;:&quot;444962&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Abusiness_process_automation%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:business_process_automation:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:business_process_automation&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-5&quot;,&quot;id&quot;:&quot;16343530&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions from (including) 3.2.000.000 up to (excluding) 3.2.000.009 &quot;,&quot;rangeStartType&quot;:&quot;including&quot;,&quot;rangeStartVersion&quot;:&quot;3.2.000.000&quot;,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;3.2.000.009&quot;,&quot;rangeId&quot;:&quot;444961&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acloud_connect%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:cloud_connect:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:cloud_connect&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-6&quot;,&quot;id&quot;:&quot;16343583&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 12.6\\(1\\) &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;12.6\\(1\\)&quot;,&quot;rangeId&quot;:&quot;445024&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acloudcenter%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:cloudcenter:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:cloudcenter&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-7&quot;,&quot;id&quot;:&quot;16343526&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 4.10.0.16 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;4.10.0.16&quot;,&quot;rangeId&quot;:&quot;444957&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acloudcenter_cost_optimizer%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:cloudcenter_cost_optimizer:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:cloudcenter_cost_optimizer&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-8&quot;,&quot;id&quot;:&quot;16343529&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 5.5.2 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;5.5.2&quot;,&quot;rangeId&quot;:&quot;444960&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acloudcenter_suite_admin%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:cloudcenter_suite_admin:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:cloudcenter_suite_admin&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-9&quot;,&quot;id&quot;:&quot;16343528&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 5.3.1 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;5.3.1&quot;,&quot;rangeId&quot;:&quot;444959&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acloudcenter_workload_manager%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:cloudcenter_workload_manager:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:cloudcenter_workload_manager&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-10&quot;,&quot;id&quot;:&quot;16343527&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 5.5.2 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;5.5.2&quot;,&quot;rangeId&quot;:&quot;444958&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acommon_services_platform_collector%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:common_services_platform_collector:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:common_services_platform_collector&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-11&quot;,&quot;id&quot;:&quot;16343525&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 2.9.1.3 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;2.9.1.3&quot;,&quot;rangeId&quot;:&quot;444956&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acommon_services_platform_collector%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:common_services_platform_collector:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:common_services_platform_collector&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-12&quot;,&quot;id&quot;:&quot;16343524&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions from (including) 2.10.0 up to (excluding) 2.10.0.1 &quot;,&quot;rangeStartType&quot;:&quot;including&quot;,&quot;rangeStartVersion&quot;:&quot;2.10.0&quot;,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;2.10.0.1&quot;,&quot;rangeId&quot;:&quot;444955&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aconnected_mobile_experiences%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:connected_mobile_experiences:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:connected_mobile_experiences:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-13&quot;,&quot;id&quot;:&quot;16343558&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acontact_center_domain_manager%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:contact_center_domain_manager:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:contact_center_domain_manager&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-14&quot;,&quot;id&quot;:&quot;16343582&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 12.5\\(1\\) &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;12.5\\(1\\)&quot;,&quot;rangeId&quot;:&quot;445023&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acontact_center_management_portal%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:contact_center_management_portal:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:contact_center_management_portal&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-15&quot;,&quot;id&quot;:&quot;16343581&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 12.5\\(1\\) &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;12.5\\(1\\)&quot;,&quot;rangeId&quot;:&quot;445022&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acrosswork_data_gateway%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:crosswork_data_gateway&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-16&quot;,&quot;id&quot;:&quot;16343523&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 2.0.2 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;2.0.2&quot;,&quot;rangeId&quot;:&quot;444954&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acrosswork_data_gateway%3A3.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:crosswork_data_gateway:3.0.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:crosswork_data_gateway:3.0.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-17&quot;,&quot;id&quot;:&quot;16343522&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acrosswork_network_controller%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:crosswork_network_controller:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:crosswork_network_controller&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-18&quot;,&quot;id&quot;:&quot;16343521&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 2.0.1 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;2.0.1&quot;,&quot;rangeId&quot;:&quot;444952&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acrosswork_network_controller%3A3.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:crosswork_network_controller:3.0.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:crosswork_network_controller:3.0.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-19&quot;,&quot;id&quot;:&quot;16343520&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acrosswork_optimization_engine%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:crosswork_optimization_engine:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:crosswork_optimization_engine&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-20&quot;,&quot;id&quot;:&quot;16343518&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 2.0.1 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;2.0.1&quot;,&quot;rangeId&quot;:&quot;444949&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acrosswork_optimization_engine%3A3.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:crosswork_optimization_engine:3.0.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:crosswork_optimization_engine:3.0.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-21&quot;,&quot;id&quot;:&quot;16343519&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acrosswork_platform_infrastructure%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:crosswork_platform_infrastructure:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:crosswork_platform_infrastructure&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-22&quot;,&quot;id&quot;:&quot;16343516&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 4.0.1 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;4.0.1&quot;,&quot;rangeId&quot;:&quot;444947&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acrosswork_platform_infrastructure%3A4.1.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:crosswork_platform_infrastructure:4.1.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:crosswork_platform_infrastructure:4.1.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-23&quot;,&quot;id&quot;:&quot;16343517&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acrosswork_zero_touch_provisioning%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:crosswork_zero_touch_provisioning&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-24&quot;,&quot;id&quot;:&quot;16343514&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 2.0.1 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;2.0.1&quot;,&quot;rangeId&quot;:&quot;444945&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acrosswork_zero_touch_provisioning%3A3.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:3.0.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:crosswork_zero_touch_provisioning:3.0.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-25&quot;,&quot;id&quot;:&quot;16343515&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acustomer_experience_cloud_agent%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:customer_experience_cloud_agent:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:customer_experience_cloud_agent&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-26&quot;,&quot;id&quot;:&quot;16343536&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 1.12.1 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;1.12.1&quot;,&quot;rangeId&quot;:&quot;444967&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acyber_vision_sensor_management_extension%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:cyber_vision_sensor_management_extension:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:cyber_vision_sensor_management_extension&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-27&quot;,&quot;id&quot;:&quot;16343513&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 4.0.3 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;4.0.3&quot;,&quot;rangeId&quot;:&quot;444944&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Adata_center_network_manager%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:data_center_network_manager:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:data_center_network_manager&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-28&quot;,&quot;id&quot;:&quot;16343487&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 11.3\\(1\\) &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;11.3\\(1\\)&quot;,&quot;rangeId&quot;:&quot;323312&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Adata_center_network_manager%3A11.3%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:data_center_network_manager:11.3\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:data_center_network_manager:11.3%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-29&quot;,&quot;id&quot;:&quot;16343495&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Adna_center%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:dna_center:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:dna_center&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-30&quot;,&quot;id&quot;:&quot;16343552&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 2.1.2.8 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;2.1.2.8&quot;,&quot;rangeId&quot;:&quot;444992&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Adna_center%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:dna_center:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:dna_center&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-31&quot;,&quot;id&quot;:&quot;16343555&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions from (including) 2.2.2.0 up to (excluding) 2.2.2.8 &quot;,&quot;rangeStartType&quot;:&quot;including&quot;,&quot;rangeStartVersion&quot;:&quot;2.2.2.0&quot;,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;2.2.2.8&quot;,&quot;rangeId&quot;:&quot;444995&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Adna_center%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:dna_center:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:dna_center&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-32&quot;,&quot;id&quot;:&quot;16343544&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions from (including) 2.2.3.0 up to (excluding) 2.2.3.4 &quot;,&quot;rangeStartType&quot;:&quot;including&quot;,&quot;rangeStartVersion&quot;:&quot;2.2.3.0&quot;,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;2.2.3.4&quot;,&quot;rangeId&quot;:&quot;444984&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Adna_spaces%5C%3A_connector%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:dna_spaces\\:_connector:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:dna_spaces%3a_connector&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-33&quot;,&quot;id&quot;:&quot;16343512&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 2.5 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;2.5&quot;,&quot;rangeId&quot;:&quot;444943&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aemergency_responder%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:emergency_responder:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:emergency_responder&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-34&quot;,&quot;id&quot;:&quot;16343580&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 11.5\\(4\\) &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;11.5\\(4\\)&quot;,&quot;rangeId&quot;:&quot;445021&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aenterprise_chat_and_email%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:enterprise_chat_and_email:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:enterprise_chat_and_email&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-35&quot;,&quot;id&quot;:&quot;16343579&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 12.0\\(1\\) &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;12.0\\(1\\)&quot;,&quot;rangeId&quot;:&quot;445020&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aevolved_programmable_network_manager%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:evolved_programmable_network_manager:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:evolved_programmable_network_manager&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-36&quot;,&quot;id&quot;:&quot;16343510&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (including) 4.1.1 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;including&quot;,&quot;rangeEndVersion&quot;:&quot;4.1.1&quot;,&quot;rangeId&quot;:&quot;444941&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Afinesse%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:finesse:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:finesse&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-37&quot;,&quot;id&quot;:&quot;16343502&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 12.6\\(1\\) &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;12.6\\(1\\)&quot;,&quot;rangeId&quot;:&quot;412744&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Afinesse%3A12.6%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:finesse:12.6\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:finesse:12.6%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-38&quot;,&quot;id&quot;:&quot;16343503&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Afog_director%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:fog_director:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:fog_director:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-39&quot;,&quot;id&quot;:&quot;16343543&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aidentity_services_engine%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:identity_services_engine&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-40&quot;,&quot;id&quot;:&quot;16343486&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 2.4.0 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;2.4.0&quot;,&quot;rangeId&quot;:&quot;294688&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aidentity_services_engine%3A2.4.0%3A-%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:identity_services_engine:2.4.0:-:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:identity_services_engine:2.4.0:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-41&quot;,&quot;id&quot;:&quot;16343501&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aintegrated_management_controller_supervisor%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:integrated_management_controller_supervisor:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:integrated_management_controller_supervisor&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-42&quot;,&quot;id&quot;:&quot;16343546&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 2.3.2.1 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;2.3.2.1&quot;,&quot;rangeId&quot;:&quot;444986&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aintersight_virtual_appliance%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:intersight_virtual_appliance:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:intersight_virtual_appliance&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-43&quot;,&quot;id&quot;:&quot;16343509&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 1.0.9-361 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;1.0.9-361&quot;,&quot;rangeId&quot;:&quot;444940&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aiot_operations_dashboard%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:iot_operations_dashboard:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:iot_operations_dashboard:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-44&quot;,&quot;id&quot;:&quot;16343508&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Anetwork_assurance_engine%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:network_assurance_engine:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:network_assurance_engine&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-45&quot;,&quot;id&quot;:&quot;16343550&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 6.0.2 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;6.0.2&quot;,&quot;rangeId&quot;:&quot;444990&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Anetwork_services_orchestrator%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:network_services_orchestrator&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-46&quot;,&quot;id&quot;:&quot;16343507&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 5.3.5.1 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;5.3.5.1&quot;,&quot;rangeId&quot;:&quot;444938&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Anetwork_services_orchestrator%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:network_services_orchestrator&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-47&quot;,&quot;id&quot;:&quot;16343511&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions from (including) 5.4 up to (excluding) 5.4.5.2 &quot;,&quot;rangeStartType&quot;:&quot;including&quot;,&quot;rangeStartVersion&quot;:&quot;5.4&quot;,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;5.4.5.2&quot;,&quot;rangeId&quot;:&quot;444942&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Anetwork_services_orchestrator%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:network_services_orchestrator&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-48&quot;,&quot;id&quot;:&quot;16343506&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions from (including) 5.5 up to (excluding) 5.5.4.1 &quot;,&quot;rangeStartType&quot;:&quot;including&quot;,&quot;rangeStartVersion&quot;:&quot;5.5&quot;,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;5.5.4.1&quot;,&quot;rangeId&quot;:&quot;444937&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Anetwork_services_orchestrator%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:network_services_orchestrator&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-49&quot;,&quot;id&quot;:&quot;16343505&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions from (including) 5.6 up to (excluding) 5.6.3.1 &quot;,&quot;rangeStartType&quot;:&quot;including&quot;,&quot;rangeStartVersion&quot;:&quot;5.6&quot;,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;5.6.3.1&quot;,&quot;rangeId&quot;:&quot;444936&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Anexus_dashboard%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:nexus_dashboard:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:nexus_dashboard&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-50&quot;,&quot;id&quot;:&quot;16343504&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 2.1.2 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;2.1.2&quot;,&quot;rangeId&quot;:&quot;444935&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Anexus_insights%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:nexus_insights:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:nexus_insights&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-51&quot;,&quot;id&quot;:&quot;16343534&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 6.0.2 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;6.0.2&quot;,&quot;rangeId&quot;:&quot;444965&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aoptical_network_controller%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:optical_network_controller:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:optical_network_controller&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-52&quot;,&quot;id&quot;:&quot;16343542&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 1.1.0 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;1.1.0&quot;,&quot;rangeId&quot;:&quot;444982&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Apackaged_contact_center_enterprise%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:packaged_contact_center_enterprise:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:packaged_contact_center_enterprise&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-53&quot;,&quot;id&quot;:&quot;16343578&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 11.6 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;11.6&quot;,&quot;rangeId&quot;:&quot;445019&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Apackaged_contact_center_enterprise%3A11.6%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:packaged_contact_center_enterprise:11.6\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:packaged_contact_center_enterprise:11.6%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-54&quot;,&quot;id&quot;:&quot;16343483&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Apaging_server%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:paging_server:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:paging_server&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-55&quot;,&quot;id&quot;:&quot;16343576&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 14.4.1 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;14.4.1&quot;,&quot;rangeId&quot;:&quot;445017&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aprime_service_catalog%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:prime_service_catalog:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:prime_service_catalog&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-56&quot;,&quot;id&quot;:&quot;16343557&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 12.1 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;12.1&quot;,&quot;rangeId&quot;:&quot;444997&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Asd-wan_vmanage%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:sd-wan_vmanage&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-57&quot;,&quot;id&quot;:&quot;16343541&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 20.3.4.1 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;20.3.4.1&quot;,&quot;rangeId&quot;:&quot;444981&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Asd-wan_vmanage%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:sd-wan_vmanage&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-58&quot;,&quot;id&quot;:&quot;16343545&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions from (including) 20.4 up to (excluding) 20.4.2.1 &quot;,&quot;rangeStartType&quot;:&quot;including&quot;,&quot;rangeStartVersion&quot;:&quot;20.4&quot;,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;20.4.2.1&quot;,&quot;rangeId&quot;:&quot;444985&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Asd-wan_vmanage%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:sd-wan_vmanage&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-59&quot;,&quot;id&quot;:&quot;16343549&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions from (including) 20.5 up to (excluding) 20.5.1.1 &quot;,&quot;rangeStartType&quot;:&quot;including&quot;,&quot;rangeStartVersion&quot;:&quot;20.5&quot;,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;20.5.1.1&quot;,&quot;rangeId&quot;:&quot;444989&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Asd-wan_vmanage%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:sd-wan_vmanage&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-60&quot;,&quot;id&quot;:&quot;16343553&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions from (including) 20.6 up to (excluding) 20.6.2.1 &quot;,&quot;rangeStartType&quot;:&quot;including&quot;,&quot;rangeStartVersion&quot;:&quot;20.6&quot;,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;20.6.2.1&quot;,&quot;rangeId&quot;:&quot;444993&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Asmart_phy%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:smart_phy:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:smart_phy&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-61&quot;,&quot;id&quot;:&quot;16343556&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 3.2.1 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;3.2.1&quot;,&quot;rangeId&quot;:&quot;444996&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aucs_central%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:ucs_central:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:ucs_central&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-62&quot;,&quot;id&quot;:&quot;16343539&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 2.0\\(1p\\) &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;2.0\\(1p\\)&quot;,&quot;rangeId&quot;:&quot;444979&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aucs_director%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:ucs_director:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:ucs_director&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-63&quot;,&quot;id&quot;:&quot;16343540&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 6.8.2.0 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;6.8.2.0&quot;,&quot;rangeId&quot;:&quot;444980&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_communications_manager%3A*%3A*%3A*%3A*%3A-%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:-:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_communications_manager:::~~-~~~&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-64&quot;,&quot;id&quot;:&quot;16343572&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 11.5\\(1\\) &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;11.5\\(1\\)&quot;,&quot;rangeId&quot;:&quot;445013&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_communications_manager%3A*%3A*%3A*%3A*%3Asession_management%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:session_management:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_communications_manager:::~~session_management~~~&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-65&quot;,&quot;id&quot;:&quot;16343571&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 11.5\\(1\\) &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;11.5\\(1\\)&quot;,&quot;rangeId&quot;:&quot;445012&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_communications_manager%3A11.5%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_communications_manager:11.5%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-66&quot;,&quot;id&quot;:&quot;16343577&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_communications_manager%3A11.5%5C%281%5C%29%3A*%3A*%3A*%3A-%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1\\):*:*:*:-:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_communications_manager:11.5%281%29::~~-~~~&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-67&quot;,&quot;id&quot;:&quot;16343575&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_communications_manager%3A11.5%5C%281%5C%29%3A*%3A*%3A*%3Asession_management%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1\\):*:*:*:session_management:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_communications_manager:11.5%281%29::~~session_management~~~&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-68&quot;,&quot;id&quot;:&quot;16343574&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_communications_manager%3A11.5%5C%281%5C%29su3%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1\\)su3:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_communications_manager:11.5%281%29su3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-69&quot;,&quot;id&quot;:&quot;16343573&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_communications_manager_im_and_presence_service%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_communications_manager_im_and_presence_service&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-70&quot;,&quot;id&quot;:&quot;16343570&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 11.5\\(1\\) &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;11.5\\(1\\)&quot;,&quot;rangeId&quot;:&quot;445011&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_communications_manager_im_and_presence_service%3A11.5%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:11.5\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_communications_manager_im_and_presence_service:11.5%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-71&quot;,&quot;id&quot;:&quot;16343480&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_contact_center_enterprise%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_contact_center_enterprise:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_contact_center_enterprise&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-72&quot;,&quot;id&quot;:&quot;16343568&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 11.6\\(2\\) &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;11.6\\(2\\)&quot;,&quot;rangeId&quot;:&quot;445009&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_contact_center_enterprise%3A11.6%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_contact_center_enterprise:11.6\\(2\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_contact_center_enterprise:11.6%282%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-73&quot;,&quot;id&quot;:&quot;16343569&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_contact_center_express%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_contact_center_express:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_contact_center_express&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-74&quot;,&quot;id&quot;:&quot;16343494&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 12.5\\(1\\) &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;12.5\\(1\\)&quot;,&quot;rangeId&quot;:&quot;347391&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_customer_voice_portal%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_customer_voice_portal:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_customer_voice_portal&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-75&quot;,&quot;id&quot;:&quot;16343565&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 11.6 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;11.6&quot;,&quot;rangeId&quot;:&quot;445006&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_customer_voice_portal%3A11.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_customer_voice_portal:11.6:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_customer_voice_portal:11.6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-76&quot;,&quot;id&quot;:&quot;16343481&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_customer_voice_portal%3A12.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_customer_voice_portal:12.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_customer_voice_portal:12.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-77&quot;,&quot;id&quot;:&quot;16343566&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_customer_voice_portal%3A12.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_customer_voice_portal:12.5:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_customer_voice_portal:12.5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-78&quot;,&quot;id&quot;:&quot;16343567&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunity_connection%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unity_connection:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unity_connection&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-79&quot;,&quot;id&quot;:&quot;16343560&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 11.5\\(1\\) &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;11.5\\(1\\)&quot;,&quot;rangeId&quot;:&quot;445001&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Avideo_surveillance_operations_manager%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:video_surveillance_operations_manager:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:video_surveillance_operations_manager&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-80&quot;,&quot;id&quot;:&quot;16343559&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 7.14.4 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;7.14.4&quot;,&quot;rangeId&quot;:&quot;445000&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Avirtual_topology_system%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:virtual_topology_system:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:virtual_topology_system&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-81&quot;,&quot;id&quot;:&quot;16343554&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 2.6.7 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;2.6.7&quot;,&quot;rangeId&quot;:&quot;444994&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Avirtualized_infrastructure_manager%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:virtualized_infrastructure_manager:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:virtualized_infrastructure_manager&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-82&quot;,&quot;id&quot;:&quot;16343551&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 3.2.0 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;3.2.0&quot;,&quot;rangeId&quot;:&quot;444991&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Avirtualized_infrastructure_manager%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:virtualized_infrastructure_manager:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:virtualized_infrastructure_manager&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-83&quot;,&quot;id&quot;:&quot;16343548&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions from (including) 3.4.0 up to (excluding) 3.4.4 &quot;,&quot;rangeStartType&quot;:&quot;including&quot;,&quot;rangeStartVersion&quot;:&quot;3.4.0&quot;,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;3.4.4&quot;,&quot;rangeId&quot;:&quot;444988&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Avirtualized_voice_browser%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:virtualized_voice_browser:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:virtualized_voice_browser&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-84&quot;,&quot;id&quot;:&quot;16343561&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 12.5\\(1\\) &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;12.5\\(1\\)&quot;,&quot;rangeId&quot;:&quot;445002&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Awan_automation_engine%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:wan_automation_engine:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:wan_automation_engine&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-85&quot;,&quot;id&quot;:&quot;16343547&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 7.3.0.2 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;7.3.0.2&quot;,&quot;rangeId&quot;:&quot;444987&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:webex_meetings_server:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:webex_meetings_server&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-86&quot;,&quot;id&quot;:&quot;16343482&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 3.0 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;3.0&quot;,&quot;rangeId&quot;:&quot;265011&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A3.0%3A-%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:webex_meetings_server:3.0:-:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:webex_meetings_server:3.0:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-87&quot;,&quot;id&quot;:&quot;16343485&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A3.0%3Amaintenance_release1%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release1:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:webex_meetings_server:3.0:maintenance_release1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-88&quot;,&quot;id&quot;:&quot;16343484&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A3.0%3Amaintenance_release2%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release2:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:webex_meetings_server:3.0:maintenance_release2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-89&quot;,&quot;id&quot;:&quot;16343488&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A3.0%3Amaintenance_release3%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:webex_meetings_server:3.0:maintenance_release3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-90&quot;,&quot;id&quot;:&quot;16343489&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A3.0%3Amaintenance_release3%3A-%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3:-:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:webex_meetings_server:3.0:maintenance_release3:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-91&quot;,&quot;id&quot;:&quot;16343496&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A3.0%3Amaintenance_release3_security_patch4%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3_security_patch4:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:webex_meetings_server:3.0:maintenance_release3_security_patch4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-92&quot;,&quot;id&quot;:&quot;16343500&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A3.0%3Amaintenance_release3_security_patch5%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3_security_patch5:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:webex_meetings_server:3.0:maintenance_release3_security_patch5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-93&quot;,&quot;id&quot;:&quot;16343537&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A3.0%3Amaintenance_release3_service_pack_2%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3_service_pack_2:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:webex_meetings_server:3.0:maintenance_release3_service_pack_2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-94&quot;,&quot;id&quot;:&quot;16343497&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A3.0%3Amaintenance_release3_service_pack_3%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3_service_pack_3:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:webex_meetings_server:3.0:maintenance_release3_service_pack_3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-95&quot;,&quot;id&quot;:&quot;16343498&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A3.0%3Amaintenance_release4%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release4:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:webex_meetings_server:3.0:maintenance_release4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-96&quot;,&quot;id&quot;:&quot;16343499&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A4.0%3A-%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:webex_meetings_server:4.0:-:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:webex_meetings_server:4.0:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-97&quot;,&quot;id&quot;:&quot;16343490&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A4.0%3Amaintenance_release1%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_release1:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:webex_meetings_server:4.0:maintenance_release1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-98&quot;,&quot;id&quot;:&quot;16343491&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A4.0%3Amaintenance_release2%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_release2:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:webex_meetings_server:4.0:maintenance_release2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-99&quot;,&quot;id&quot;:&quot;16343492&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A4.0%3Amaintenance_release3%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_release3:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:webex_meetings_server:4.0:maintenance_release3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-100&quot;,&quot;id&quot;:&quot;16343493&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aworkload_optimization_manager%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:workload_optimization_manager:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:workload_optimization_manager&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-101&quot;,&quot;id&quot;:&quot;16343538&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 3.2.1 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;3.2.1&quot;,&quot;rangeId&quot;:&quot;444978&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Acisco%3Aunified_intelligence_center%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:cisco:unified_intelligence_center:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:cisco:unified_intelligence_center&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-102&quot;,&quot;id&quot;:&quot;16343564&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 12.6\\(1\\) &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;12.6\\(1\\)&quot;,&quot;rangeId&quot;:&quot;445005&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Acisco%3Aunified_sip_proxy%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:cisco:unified_sip_proxy:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:cisco:unified_sip_proxy&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-103&quot;,&quot;id&quot;:&quot;16343563&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 10.2.1v2 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;10.2.1v2&quot;,&quot;rangeId&quot;:&quot;445004&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Acisco%3Aunified_workforce_optimization%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:cisco:unified_workforce_optimization:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:cisco:unified_workforce_optimization&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-104&quot;,&quot;id&quot;:&quot;16343562&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 11.5\\(1\\) &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;11.5\\(1\\)&quot;,&quot;rangeId&quot;:&quot;445003&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]},{&quot;id&quot;:10,&quot;dataTestId&quot;:&quot;vuln-software-config-10&quot;,&quot;totalCpeCount&quot;:25,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-10-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-10-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Acisco%3Afirepower_1010%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:cisco:firepower_1010:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:cisco:firepower_1010:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-10-0-0-0&quot;,&quot;id&quot;:&quot;16343597&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Acisco%3Afirepower_1120%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:cisco:firepower_1120:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:cisco:firepower_1120:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-10-0-0-1&quot;,&quot;id&quot;:&quot;16343598&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Acisco%3Afirepower_1140%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:cisco:firepower_1140:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:cisco:firepower_1140:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-10-0-0-2&quot;,&quot;id&quot;:&quot;16343599&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Acisco%3Afirepower_1150%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:cisco:firepower_1150:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:cisco:firepower_1150:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-10-0-0-3&quot;,&quot;id&quot;:&quot;16343600&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Acisco%3Afirepower_2110%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:cisco:firepower_2110:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-10-0-0-4&quot;,&quot;id&quot;:&quot;16343586&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Acisco%3Afirepower_2120%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:cisco:firepower_2120:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-10-0-0-5&quot;,&quot;id&quot;:&quot;16343587&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Acisco%3Afirepower_2130%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:cisco:firepower_2130:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-10-0-0-6&quot;,&quot;id&quot;:&quot;16343588&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Acisco%3Afirepower_2140%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:cisco:firepower_2140:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-10-0-0-7&quot;,&quot;id&quot;:&quot;16343589&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Acisco%3Afirepower_4110%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:cisco:firepower_4110:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-10-0-0-8&quot;,&quot;id&quot;:&quot;16343590&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Acisco%3Afirepower_4112%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:cisco:firepower_4112:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:cisco:firepower_4112:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-10-0-0-9&quot;,&quot;id&quot;:&quot;16343601&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Acisco%3Afirepower_4115%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:cisco:firepower_4115:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:cisco:firepower_4115:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-10-0-0-10&quot;,&quot;id&quot;:&quot;16343594&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Acisco%3Afirepower_4120%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:cisco:firepower_4120:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-10-0-0-11&quot;,&quot;id&quot;:&quot;16343591&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Acisco%3Afirepower_4125%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:cisco:firepower_4125:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:cisco:firepower_4125:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-10-0-0-12&quot;,&quot;id&quot;:&quot;16343595&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Acisco%3Afirepower_4140%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:cisco:firepower_4140:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-10-0-0-13&quot;,&quot;id&quot;:&quot;16343592&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Acisco%3Afirepower_4145%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:cisco:firepower_4145:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:cisco:firepower_4145:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-10-0-0-14&quot;,&quot;id&quot;:&quot;16343596&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Acisco%3Afirepower_4150%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:cisco:firepower_4150:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-10-0-0-15&quot;,&quot;id&quot;:&quot;16343593&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Acisco%3Afirepower_9300%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:cisco:firepower_9300:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-10-0-0-16&quot;,&quot;id&quot;:&quot;16343585&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-10-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Acisco%3Afxos%3A6.2.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:cisco:fxos:6.2.3:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:cisco:fxos:6.2.3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-10-0-1-0&quot;,&quot;id&quot;:&quot;16343608&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Acisco%3Afxos%3A6.3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:cisco:fxos:6.3.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:cisco:fxos:6.3.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-10-0-1-1&quot;,&quot;id&quot;:&quot;16343607&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Acisco%3Afxos%3A6.4.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:cisco:fxos:6.4.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:cisco:fxos:6.4.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-10-0-1-2&quot;,&quot;id&quot;:&quot;16343606&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Acisco%3Afxos%3A6.5.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:cisco:fxos:6.5.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:cisco:fxos:6.5.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-10-0-1-3&quot;,&quot;id&quot;:&quot;16343605&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Acisco%3Afxos%3A6.6.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:cisco:fxos:6.6.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:cisco:fxos:6.6.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-10-0-1-4&quot;,&quot;id&quot;:&quot;16343604&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Acisco%3Afxos%3A6.7.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:cisco:fxos:6.7.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:cisco:fxos:6.7.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-10-0-1-5&quot;,&quot;id&quot;:&quot;16343603&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Acisco%3Afxos%3A7.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:cisco:fxos:7.0.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:cisco:fxos:7.0.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-10-0-1-6&quot;,&quot;id&quot;:&quot;16343602&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Acisco%3Afxos%3A7.1.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:cisco:fxos:7.1.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:cisco:fxos:7.1.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-10-0-1-7&quot;,&quot;id&quot;:&quot;16343609&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:11,&quot;dataTestId&quot;:&quot;vuln-software-config-11&quot;,&quot;totalCpeCount&quot;:166,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-11-0&quot;,&quot;configType&quot;:&quot;BASIC&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aautomated_subsea_tuning%3A02.01.00%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:automated_subsea_tuning:02.01.00:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:automated_subsea_tuning:02.01.00&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-0&quot;,&quot;id&quot;:&quot;16343735&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Abroadworks%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:broadworks:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:broadworks:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-1&quot;,&quot;id&quot;:&quot;16343673&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acloudcenter_suite%3A4.10%5C%280.15%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:cloudcenter_suite:4.10\\(0.15\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:cloudcenter_suite:4.10%280.15%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-2&quot;,&quot;id&quot;:&quot;16343749&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acloudcenter_suite%3A5.3%5C%280%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:cloudcenter_suite:5.3\\(0\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:cloudcenter_suite:5.3%280%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-3&quot;,&quot;id&quot;:&quot;16343732&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acloudcenter_suite%3A5.4%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:cloudcenter_suite:5.4\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:cloudcenter_suite:5.4%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-4&quot;,&quot;id&quot;:&quot;16343734&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acloudcenter_suite%3A5.5%5C%280%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:cloudcenter_suite:5.5\\(0\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:cloudcenter_suite:5.5%280%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-5&quot;,&quot;id&quot;:&quot;16343733&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acloudcenter_suite%3A5.5%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:cloudcenter_suite:5.5\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:cloudcenter_suite:5.5%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-6&quot;,&quot;id&quot;:&quot;16343748&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acommon_services_platform_collector%3A002.009%5C%28000.000%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:common_services_platform_collector:002.009\\(000.000\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:common_services_platform_collector:002.009%28000.000%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-7&quot;,&quot;id&quot;:&quot;16343775&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acommon_services_platform_collector%3A002.009%5C%28000.001%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:common_services_platform_collector:002.009\\(000.001\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:common_services_platform_collector:002.009%28000.001%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-8&quot;,&quot;id&quot;:&quot;16343774&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acommon_services_platform_collector%3A002.009%5C%28000.002%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:common_services_platform_collector:002.009\\(000.002\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:common_services_platform_collector:002.009%28000.002%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-9&quot;,&quot;id&quot;:&quot;16343773&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acommon_services_platform_collector%3A002.009%5C%28001.000%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:common_services_platform_collector:002.009\\(001.000\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:common_services_platform_collector:002.009%28001.000%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-10&quot;,&quot;id&quot;:&quot;16343772&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acommon_services_platform_collector%3A002.009%5C%28001.001%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:common_services_platform_collector:002.009\\(001.001\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:common_services_platform_collector:002.009%28001.001%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-11&quot;,&quot;id&quot;:&quot;16343771&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acommon_services_platform_collector%3A002.009%5C%28001.002%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:common_services_platform_collector:002.009\\(001.002\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:common_services_platform_collector:002.009%28001.002%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-12&quot;,&quot;id&quot;:&quot;16343770&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acommon_services_platform_collector%3A002.010%5C%28000.000%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:common_services_platform_collector:002.010\\(000.000\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:common_services_platform_collector:002.010%28000.000%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-13&quot;,&quot;id&quot;:&quot;16343769&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aconnected_analytics_for_network_deployment%3A006.004.000.003%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:connected_analytics_for_network_deployment:006.004.000.003:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:connected_analytics_for_network_deployment:006.004.000.003&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-14&quot;,&quot;id&quot;:&quot;16343763&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aconnected_analytics_for_network_deployment%3A006.005.000.%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:connected_analytics_for_network_deployment:006.005.000.:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:connected_analytics_for_network_deployment:006.005.000.&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-15&quot;,&quot;id&quot;:&quot;16343762&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aconnected_analytics_for_network_deployment%3A006.005.000.000%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:connected_analytics_for_network_deployment:006.005.000.000:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:connected_analytics_for_network_deployment:006.005.000.000&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-16&quot;,&quot;id&quot;:&quot;16343761&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aconnected_analytics_for_network_deployment%3A007.000.001%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.000.001:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:connected_analytics_for_network_deployment:007.000.001&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-17&quot;,&quot;id&quot;:&quot;16343760&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aconnected_analytics_for_network_deployment%3A007.001.000%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.001.000:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:connected_analytics_for_network_deployment:007.001.000&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-18&quot;,&quot;id&quot;:&quot;16343759&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aconnected_analytics_for_network_deployment%3A007.002.000%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.002.000:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:connected_analytics_for_network_deployment:007.002.000&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-19&quot;,&quot;id&quot;:&quot;16343758&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aconnected_analytics_for_network_deployment%3A7.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:connected_analytics_for_network_deployment:7.3:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:connected_analytics_for_network_deployment:7.3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-20&quot;,&quot;id&quot;:&quot;16343752&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aconnected_analytics_for_network_deployment%3A007.003.000%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.003.000:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:connected_analytics_for_network_deployment:007.003.000&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-21&quot;,&quot;id&quot;:&quot;16343757&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aconnected_analytics_for_network_deployment%3A007.003.001.001%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.003.001.001:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:connected_analytics_for_network_deployment:007.003.001.001&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-22&quot;,&quot;id&quot;:&quot;16343756&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aconnected_analytics_for_network_deployment%3A007.003.003%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.003.003:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:connected_analytics_for_network_deployment:007.003.003&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-23&quot;,&quot;id&quot;:&quot;16343755&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aconnected_analytics_for_network_deployment%3A008.000.000%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:connected_analytics_for_network_deployment:008.000.000:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:connected_analytics_for_network_deployment:008.000.000&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-24&quot;,&quot;id&quot;:&quot;16343754&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aconnected_analytics_for_network_deployment%3A008.000.000.000.004%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:connected_analytics_for_network_deployment:008.000.000.000.004:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:connected_analytics_for_network_deployment:008.000.000.000.004&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-25&quot;,&quot;id&quot;:&quot;16343753&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acrosswork_network_automation%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:crosswork_network_automation:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:crosswork_network_automation:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-26&quot;,&quot;id&quot;:&quot;16343766&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acrosswork_network_automation%3A2.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:crosswork_network_automation:2.0.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:crosswork_network_automation:2.0.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-27&quot;,&quot;id&quot;:&quot;16343768&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acrosswork_network_automation%3A3.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:crosswork_network_automation:3.0.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:crosswork_network_automation:3.0.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-28&quot;,&quot;id&quot;:&quot;16343767&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acrosswork_network_automation%3A4.1.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:crosswork_network_automation:4.1.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:crosswork_network_automation:4.1.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-29&quot;,&quot;id&quot;:&quot;16343765&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acrosswork_network_automation%3A4.1.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:crosswork_network_automation:4.1.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:crosswork_network_automation:4.1.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-30&quot;,&quot;id&quot;:&quot;16343764&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acx_cloud_agent%3A001.012%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:cx_cloud_agent:001.012:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:cx_cloud_agent:001.012&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-31&quot;,&quot;id&quot;:&quot;16343746&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acyber_vision%3A4.0.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:cyber_vision:4.0.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:cyber_vision:4.0.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-32&quot;,&quot;id&quot;:&quot;16343751&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Acyber_vision_sensor_management_extension%3A4.0.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:cyber_vision_sensor_management_extension:4.0.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:cyber_vision_sensor_management_extension:4.0.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-33&quot;,&quot;id&quot;:&quot;16343623&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Adna_center%3A2.2.2.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:dna_center:2.2.2.8:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:dna_center:2.2.2.8&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-34&quot;,&quot;id&quot;:&quot;16343694&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Adna_spaces%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:dna_spaces:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:dna_spaces:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-35&quot;,&quot;id&quot;:&quot;16343750&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Adna_spaces_connector%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:dna_spaces_connector:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:dna_spaces_connector:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-36&quot;,&quot;id&quot;:&quot;16343624&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aemergency_responder%3A11.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:emergency_responder:11.5:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:emergency_responder:11.5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-37&quot;,&quot;id&quot;:&quot;16343669&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aemergency_responder%3A11.5%5C%284.65000.14%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:emergency_responder:11.5\\(4.65000.14\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:emergency_responder:11.5%284.65000.14%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-38&quot;,&quot;id&quot;:&quot;16343668&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aemergency_responder%3A11.5%5C%284.66000.14%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:emergency_responder:11.5\\(4.66000.14\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:emergency_responder:11.5%284.66000.14%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-39&quot;,&quot;id&quot;:&quot;16343667&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aenterprise_chat_and_email%3A12.0%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:enterprise_chat_and_email:12.0\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:enterprise_chat_and_email:12.0%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-40&quot;,&quot;id&quot;:&quot;16343666&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aenterprise_chat_and_email%3A12.5%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:enterprise_chat_and_email:12.5\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:enterprise_chat_and_email:12.5%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-41&quot;,&quot;id&quot;:&quot;16343665&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aenterprise_chat_and_email%3A12.6%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:enterprise_chat_and_email:12.6\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:enterprise_chat_and_email:12.6%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-42&quot;,&quot;id&quot;:&quot;16343664&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aevolved_programmable_network_manager%3A3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:evolved_programmable_network_manager:3.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:evolved_programmable_network_manager:3.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-43&quot;,&quot;id&quot;:&quot;16343717&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aevolved_programmable_network_manager%3A3.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:evolved_programmable_network_manager:3.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:evolved_programmable_network_manager:3.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-44&quot;,&quot;id&quot;:&quot;16343716&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aevolved_programmable_network_manager%3A4.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:evolved_programmable_network_manager:4.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:evolved_programmable_network_manager:4.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-45&quot;,&quot;id&quot;:&quot;16343715&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aevolved_programmable_network_manager%3A4.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:evolved_programmable_network_manager:4.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:evolved_programmable_network_manager:4.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-46&quot;,&quot;id&quot;:&quot;16343714&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aevolved_programmable_network_manager%3A5.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:evolved_programmable_network_manager:5.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:evolved_programmable_network_manager:5.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-47&quot;,&quot;id&quot;:&quot;16343713&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aevolved_programmable_network_manager%3A5.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:evolved_programmable_network_manager:5.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:evolved_programmable_network_manager:5.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-48&quot;,&quot;id&quot;:&quot;16343712&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Afinesse%3A12.5%5C%281%5C%29%3Asu1%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:finesse:12.5\\(1\\):su1:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:finesse:12.5%281%29:su1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-49&quot;,&quot;id&quot;:&quot;16343663&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Afinesse%3A12.5%5C%281%5C%29%3Asu2%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:finesse:12.5\\(1\\):su2:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:finesse:12.5%281%29:su2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-50&quot;,&quot;id&quot;:&quot;16343662&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Afinesse%3A12.6%5C%281%5C%29%3A-%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:finesse:12.6\\(1\\):-:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:finesse:12.6%281%29:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-51&quot;,&quot;id&quot;:&quot;16343661&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Afinesse%3A12.6%5C%281%5C%29%3Aes01%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:finesse:12.6\\(1\\):es01:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:finesse:12.6%281%29:es01&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-52&quot;,&quot;id&quot;:&quot;16343660&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Afinesse%3A12.6%5C%281%5C%29%3Aes02%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:finesse:12.6\\(1\\):es02:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:finesse:12.6%281%29:es02&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-53&quot;,&quot;id&quot;:&quot;16343659&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Afinesse%3A12.6%5C%281%5C%29%3Aes03%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:finesse:12.6\\(1\\):es03:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:finesse:12.6%281%29:es03&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-54&quot;,&quot;id&quot;:&quot;16343658&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Afirepower_threat_defense%3A6.2.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:firepower_threat_defense:6.2.3:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:firepower_threat_defense:6.2.3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-55&quot;,&quot;id&quot;:&quot;16343611&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Afirepower_threat_defense%3A6.3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:firepower_threat_defense:6.3.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:firepower_threat_defense:6.3.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-56&quot;,&quot;id&quot;:&quot;16343614&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Afirepower_threat_defense%3A6.4.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:firepower_threat_defense:6.4.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:firepower_threat_defense:6.4.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-57&quot;,&quot;id&quot;:&quot;16343613&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Afirepower_threat_defense%3A6.5.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:firepower_threat_defense:6.5.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:firepower_threat_defense:6.5.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-58&quot;,&quot;id&quot;:&quot;16343617&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Afirepower_threat_defense%3A6.6.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:firepower_threat_defense:6.6.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:firepower_threat_defense:6.6.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-59&quot;,&quot;id&quot;:&quot;16343618&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Afirepower_threat_defense%3A6.7.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:firepower_threat_defense:6.7.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:firepower_threat_defense:6.7.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-60&quot;,&quot;id&quot;:&quot;16343744&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Afirepower_threat_defense%3A7.0.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:firepower_threat_defense:7.0.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:firepower_threat_defense:7.0.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-61&quot;,&quot;id&quot;:&quot;16343743&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Afirepower_threat_defense%3A7.1.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:firepower_threat_defense:7.1.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:firepower_threat_defense:7.1.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-62&quot;,&quot;id&quot;:&quot;16343742&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aidentity_services_engine%3A002.004%5C%28000.914%5C%29%3A-%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:identity_services_engine:002.004\\(000.914\\):-:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:identity_services_engine:002.004%28000.914%29:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-63&quot;,&quot;id&quot;:&quot;16343741&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aidentity_services_engine%3A002.006%5C%28000.156%5C%29%3A-%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:identity_services_engine:002.006\\(000.156\\):-:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:identity_services_engine:002.006%28000.156%29:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-64&quot;,&quot;id&quot;:&quot;16343740&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aidentity_services_engine%3A002.007%5C%28000.356%5C%29%3A-%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:identity_services_engine:002.007\\(000.356\\):-:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:identity_services_engine:002.007%28000.356%29:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-65&quot;,&quot;id&quot;:&quot;16343739&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aidentity_services_engine%3A003.000%5C%28000.458%5C%29%3A-%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:identity_services_engine:003.000\\(000.458\\):-:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:identity_services_engine:003.000%28000.458%29:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-66&quot;,&quot;id&quot;:&quot;16343738&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aidentity_services_engine%3A003.001%5C%28000.518%5C%29%3A-%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:identity_services_engine:003.001\\(000.518\\):-:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:identity_services_engine:003.001%28000.518%29:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-67&quot;,&quot;id&quot;:&quot;16343737&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aidentity_services_engine%3A003.002%5C%28000.116%5C%29%3A-%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:identity_services_engine:003.002\\(000.116\\):-:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:identity_services_engine:003.002%28000.116%29:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-68&quot;,&quot;id&quot;:&quot;16343736&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aintegrated_management_controller_supervisor%3A002.003%5C%28002.000%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:integrated_management_controller_supervisor:002.003\\(002.000\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:integrated_management_controller_supervisor:002.003%28002.000%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-69&quot;,&quot;id&quot;:&quot;16343687&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aintegrated_management_controller_supervisor%3A2.3.2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:integrated_management_controller_supervisor:2.3.2.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:integrated_management_controller_supervisor:2.3.2.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-70&quot;,&quot;id&quot;:&quot;16343686&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aintersight_virtual_appliance%3A1.0.9-343%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:intersight_virtual_appliance:1.0.9-343:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:intersight_virtual_appliance:1.0.9-343&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-71&quot;,&quot;id&quot;:&quot;16343711&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Amobility_services_engine%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:mobility_services_engine:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:mobility_services_engine:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-72&quot;,&quot;id&quot;:&quot;16343747&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Anetwork_assurance_engine%3A6.0%5C%282.1912%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:network_assurance_engine:6.0\\(2.1912\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:network_assurance_engine:6.0%282.1912%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-73&quot;,&quot;id&quot;:&quot;16343693&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Anetwork_dashboard_fabric_controller%3A11.0%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.0\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:network_dashboard_fabric_controller:11.0%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-74&quot;,&quot;id&quot;:&quot;16343725&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Anetwork_dashboard_fabric_controller%3A11.1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.1\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:network_dashboard_fabric_controller:11.1%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-75&quot;,&quot;id&quot;:&quot;16343724&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Anetwork_dashboard_fabric_controller%3A11.2%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.2\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:network_dashboard_fabric_controller:11.2%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-76&quot;,&quot;id&quot;:&quot;16343723&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Anetwork_dashboard_fabric_controller%3A11.3%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.3\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:network_dashboard_fabric_controller:11.3%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-77&quot;,&quot;id&quot;:&quot;16343722&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Anetwork_dashboard_fabric_controller%3A11.4%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.4\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:network_dashboard_fabric_controller:11.4%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-78&quot;,&quot;id&quot;:&quot;16343721&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Anetwork_dashboard_fabric_controller%3A11.5%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.5\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:network_dashboard_fabric_controller:11.5%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-79&quot;,&quot;id&quot;:&quot;16343720&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Anetwork_dashboard_fabric_controller%3A11.5%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.5\\(2\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:network_dashboard_fabric_controller:11.5%282%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-80&quot;,&quot;id&quot;:&quot;16343719&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Anetwork_dashboard_fabric_controller%3A11.5%5C%283%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.5\\(3\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:network_dashboard_fabric_controller:11.5%283%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-81&quot;,&quot;id&quot;:&quot;16343718&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Anetwork_insights_for_data_center%3A6.0%5C%282.1914%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:network_insights_for_data_center:6.0\\(2.1914\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:network_insights_for_data_center:6.0%282.1914%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-82&quot;,&quot;id&quot;:&quot;16343745&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Anetwork_services_orchestrator%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:network_services_orchestrator:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:network_services_orchestrator:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-83&quot;,&quot;id&quot;:&quot;16343710&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aoptical_network_controller%3A1.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:optical_network_controller:1.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:optical_network_controller:1.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-84&quot;,&quot;id&quot;:&quot;16343692&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Apaging_server%3A8.3%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:paging_server:8.3\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:paging_server:8.3%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-85&quot;,&quot;id&quot;:&quot;16343651&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Apaging_server%3A8.4%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:paging_server:8.4\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:paging_server:8.4%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-86&quot;,&quot;id&quot;:&quot;16343650&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Apaging_server%3A8.5%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:paging_server:8.5\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:paging_server:8.5%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-87&quot;,&quot;id&quot;:&quot;16343649&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Apaging_server%3A9.0%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:paging_server:9.0\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:paging_server:9.0%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-88&quot;,&quot;id&quot;:&quot;16343648&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Apaging_server%3A9.0%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:paging_server:9.0\\(2\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:paging_server:9.0%282%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-89&quot;,&quot;id&quot;:&quot;16343647&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Apaging_server%3A9.1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:paging_server:9.1\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:paging_server:9.1%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-90&quot;,&quot;id&quot;:&quot;16343646&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Apaging_server%3A12.5%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:paging_server:12.5\\(2\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:paging_server:12.5%282%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-91&quot;,&quot;id&quot;:&quot;16343653&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Apaging_server%3A14.0%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:paging_server:14.0\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:paging_server:14.0%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-92&quot;,&quot;id&quot;:&quot;16343652&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aprime_service_catalog%3A12.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:prime_service_catalog:12.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:prime_service_catalog:12.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-93&quot;,&quot;id&quot;:&quot;16343610&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Asd-wan_vmanage%3A20.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:sd-wan_vmanage:20.3:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:sd-wan_vmanage:20.3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-94&quot;,&quot;id&quot;:&quot;16343619&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Asd-wan_vmanage%3A20.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:sd-wan_vmanage:20.4:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:sd-wan_vmanage:20.4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-95&quot;,&quot;id&quot;:&quot;16343691&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Asd-wan_vmanage%3A20.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:sd-wan_vmanage:20.5:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:sd-wan_vmanage:20.5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-96&quot;,&quot;id&quot;:&quot;16343621&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Asd-wan_vmanage%3A20.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:sd-wan_vmanage:20.6:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:sd-wan_vmanage:20.6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-97&quot;,&quot;id&quot;:&quot;16343620&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Asd-wan_vmanage%3A20.6.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:sd-wan_vmanage:20.6.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:sd-wan_vmanage:20.6.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-98&quot;,&quot;id&quot;:&quot;16343688&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Asd-wan_vmanage%3A20.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:sd-wan_vmanage:20.7:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:sd-wan_vmanage:20.7&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-99&quot;,&quot;id&quot;:&quot;16343690&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Asd-wan_vmanage%3A20.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:sd-wan_vmanage:20.8:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:sd-wan_vmanage:20.8&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-100&quot;,&quot;id&quot;:&quot;16343689&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Asmart_phy%3A3.1.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:smart_phy:3.1.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:smart_phy:3.1.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-101&quot;,&quot;id&quot;:&quot;16343708&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Asmart_phy%3A3.1.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:smart_phy:3.1.3:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:smart_phy:3.1.3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-102&quot;,&quot;id&quot;:&quot;16343707&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Asmart_phy%3A3.1.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:smart_phy:3.1.4:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:smart_phy:3.1.4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-103&quot;,&quot;id&quot;:&quot;16343706&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Asmart_phy%3A3.1.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:smart_phy:3.1.5:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:smart_phy:3.1.5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-104&quot;,&quot;id&quot;:&quot;16343705&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Asmart_phy%3A3.2.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:smart_phy:3.2.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:smart_phy:3.2.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-105&quot;,&quot;id&quot;:&quot;16343704&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Asmart_phy%3A21.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:smart_phy:21.3:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:smart_phy:21.3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-106&quot;,&quot;id&quot;:&quot;16343709&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aucs_central_software%3A2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:ucs_central_software:2.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:ucs_central_software:2.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-107&quot;,&quot;id&quot;:&quot;16343685&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aucs_central_software%3A2.0%5C%281a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:ucs_central_software:2.0\\(1a\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:ucs_central_software:2.0%281a%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-108&quot;,&quot;id&quot;:&quot;16343684&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aucs_central_software%3A2.0%5C%281b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:ucs_central_software:2.0\\(1b\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:ucs_central_software:2.0%281b%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-109&quot;,&quot;id&quot;:&quot;16343683&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aucs_central_software%3A2.0%5C%281c%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:ucs_central_software:2.0\\(1c\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:ucs_central_software:2.0%281c%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-110&quot;,&quot;id&quot;:&quot;16343682&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aucs_central_software%3A2.0%5C%281d%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:ucs_central_software:2.0\\(1d\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:ucs_central_software:2.0%281d%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-111&quot;,&quot;id&quot;:&quot;16343681&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aucs_central_software%3A2.0%5C%281e%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:ucs_central_software:2.0\\(1e\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:ucs_central_software:2.0%281e%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-112&quot;,&quot;id&quot;:&quot;16343680&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aucs_central_software%3A2.0%5C%281f%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:ucs_central_software:2.0\\(1f\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:ucs_central_software:2.0%281f%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-113&quot;,&quot;id&quot;:&quot;16343679&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aucs_central_software%3A2.0%5C%281g%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:ucs_central_software:2.0\\(1g\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:ucs_central_software:2.0%281g%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-114&quot;,&quot;id&quot;:&quot;16343678&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aucs_central_software%3A2.0%5C%281h%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:ucs_central_software:2.0\\(1h\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:ucs_central_software:2.0%281h%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-115&quot;,&quot;id&quot;:&quot;16343677&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aucs_central_software%3A2.0%5C%281k%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:ucs_central_software:2.0\\(1k\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:ucs_central_software:2.0%281k%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-116&quot;,&quot;id&quot;:&quot;16343676&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aucs_central_software%3A2.0%5C%281l%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:ucs_central_software:2.0\\(1l\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:ucs_central_software:2.0%281l%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-117&quot;,&quot;id&quot;:&quot;16343675&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_communications_manager%3A11.5%5C%281.17900.52%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.17900.52\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_communications_manager:11.5%281.17900.52%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-118&quot;,&quot;id&quot;:&quot;16343645&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_communications_manager%3A11.5%5C%281.18119.2%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.18119.2\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_communications_manager:11.5%281.18119.2%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-119&quot;,&quot;id&quot;:&quot;16343644&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_communications_manager%3A11.5%5C%281.18900.97%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.18900.97\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_communications_manager:11.5%281.18900.97%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-120&quot;,&quot;id&quot;:&quot;16343643&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_communications_manager%3A11.5%5C%281.21900.40%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.21900.40\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_communications_manager:11.5%281.21900.40%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-121&quot;,&quot;id&quot;:&quot;16343642&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_communications_manager%3A11.5%5C%281.22900.28%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.22900.28\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_communications_manager:11.5%281.22900.28%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-122&quot;,&quot;id&quot;:&quot;16343641&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_communications_manager_im_%5C%26_presence_service%3A11.5%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_communications_manager_im_\\&amp;_presence_service:11.5\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_communications_manager_im_%26_presence_service:11.5%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-123&quot;,&quot;id&quot;:&quot;16343640&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_communications_manager_im_%5C%26_presence_service%3A11.5%5C%281.22900.6%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_communications_manager_im_\\&amp;_presence_service:11.5\\(1.22900.6\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_communications_manager_im_%26_presence_service:11.5%281.22900.6%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-124&quot;,&quot;id&quot;:&quot;16343639&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_computing_system%3A006.008%5C%28001.000%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_computing_system:006.008\\(001.000\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_computing_system:006.008%28001.000%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-125&quot;,&quot;id&quot;:&quot;16343674&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_contact_center_enterprise%3A11.6%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_contact_center_enterprise:11.6\\(2\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_contact_center_enterprise:11.6%282%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-126&quot;,&quot;id&quot;:&quot;16343622&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_contact_center_enterprise%3A12.0%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_contact_center_enterprise:12.0\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_contact_center_enterprise:12.0%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-127&quot;,&quot;id&quot;:&quot;16343657&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_contact_center_enterprise%3A12.5%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_contact_center_enterprise:12.5\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_contact_center_enterprise:12.5%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-128&quot;,&quot;id&quot;:&quot;16343656&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_contact_center_enterprise%3A12.6%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_contact_center_enterprise:12.6\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_contact_center_enterprise:12.6%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-129&quot;,&quot;id&quot;:&quot;16343655&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_contact_center_enterprise%3A12.6%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_contact_center_enterprise:12.6\\(2\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_contact_center_enterprise:12.6%282%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-130&quot;,&quot;id&quot;:&quot;16343654&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_contact_center_express%3A12.5%5C%281%5C%29%3A-%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\):-:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_contact_center_express:12.5%281%29:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-131&quot;,&quot;id&quot;:&quot;16343638&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_contact_center_express%3A12.5%5C%281%5C%29%3Asu1%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\):su1:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_contact_center_express:12.5%281%29:su1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-132&quot;,&quot;id&quot;:&quot;16343637&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_contact_center_express%3A12.6%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_contact_center_express:12.6\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_contact_center_express:12.6%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-133&quot;,&quot;id&quot;:&quot;16343672&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_contact_center_express%3A12.6%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_contact_center_express:12.6\\(2\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_contact_center_express:12.6%282%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-134&quot;,&quot;id&quot;:&quot;16343671&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_contact_center_management_portal%3A12.6%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_contact_center_management_portal:12.6\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_contact_center_management_portal:12.6%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-135&quot;,&quot;id&quot;:&quot;16343670&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_customer_voice_portal%3A11.6%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_customer_voice_portal:11.6\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_customer_voice_portal:11.6%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-136&quot;,&quot;id&quot;:&quot;16343636&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_customer_voice_portal%3A12.0%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_customer_voice_portal:12.0\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_customer_voice_portal:12.0%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-137&quot;,&quot;id&quot;:&quot;16343635&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_customer_voice_portal%3A12.5%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_customer_voice_portal:12.5\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_customer_voice_portal:12.5%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-138&quot;,&quot;id&quot;:&quot;16343634&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_customer_voice_portal%3A12.6%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_customer_voice_portal:12.6\\(1\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_customer_voice_portal:12.6%281%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-139&quot;,&quot;id&quot;:&quot;16343633&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_intelligence_center%3A12.6%5C%281%5C%29%3A-%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_intelligence_center:12.6\\(1\\):-:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_intelligence_center:12.6%281%29:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-140&quot;,&quot;id&quot;:&quot;16343632&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_intelligence_center%3A12.6%5C%281%5C%29%3Aes01%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_intelligence_center:12.6\\(1\\):es01:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_intelligence_center:12.6%281%29:es01&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-141&quot;,&quot;id&quot;:&quot;16343631&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_intelligence_center%3A12.6%5C%281%5C%29%3Aes02%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_intelligence_center:12.6\\(1\\):es02:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_intelligence_center:12.6%281%29:es02&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-142&quot;,&quot;id&quot;:&quot;16343630&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_intelligence_center%3A12.6%5C%282%5C%29%3A-%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_intelligence_center:12.6\\(2\\):-:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_intelligence_center:12.6%282%29:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-143&quot;,&quot;id&quot;:&quot;16343629&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_sip_proxy%3A010.000%5C%28000%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_sip_proxy:010.000\\(000\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_sip_proxy:010.000%28000%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-144&quot;,&quot;id&quot;:&quot;16343628&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_sip_proxy%3A010.000%5C%28001%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_sip_proxy:010.000\\(001\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_sip_proxy:010.000%28001%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-145&quot;,&quot;id&quot;:&quot;16343627&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_sip_proxy%3A010.002%5C%28000%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_sip_proxy:010.002\\(000\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_sip_proxy:010.002%28000%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-146&quot;,&quot;id&quot;:&quot;16343626&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_sip_proxy%3A010.002%5C%28001%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_sip_proxy:010.002\\(001\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_sip_proxy:010.002%28001%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-147&quot;,&quot;id&quot;:&quot;16343625&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunified_workforce_optimization%3A11.5%5C%281%5C%29%3Asr7%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unified_workforce_optimization:11.5\\(1\\):sr7:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unified_workforce_optimization:11.5%281%29:sr7&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-148&quot;,&quot;id&quot;:&quot;16343730&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunity_connection%3A11.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unity_connection:11.5:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unity_connection:11.5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-149&quot;,&quot;id&quot;:&quot;16343616&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Aunity_connection%3A11.5%5C%281.10000.6%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:unity_connection:11.5\\(1.10000.6\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:unity_connection:11.5%281.10000.6%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-150&quot;,&quot;id&quot;:&quot;16343731&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Avideo_surveillance_manager%3A7.14%5C%281.26%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:video_surveillance_manager:7.14\\(1.26\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:video_surveillance_manager:7.14%281.26%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-151&quot;,&quot;id&quot;:&quot;16343729&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Avideo_surveillance_manager%3A7.14%5C%282.26%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:video_surveillance_manager:7.14\\(2.26\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:video_surveillance_manager:7.14%282.26%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-152&quot;,&quot;id&quot;:&quot;16343728&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Avideo_surveillance_manager%3A7.14%5C%283.025%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:video_surveillance_manager:7.14\\(3.025\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:video_surveillance_manager:7.14%283.025%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-153&quot;,&quot;id&quot;:&quot;16343727&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Avideo_surveillance_manager%3A7.14%5C%284.018%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:video_surveillance_manager:7.14\\(4.018\\):*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:video_surveillance_manager:7.14%284.018%29&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-154&quot;,&quot;id&quot;:&quot;16343726&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Avirtual_topology_system%3A2.6.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:virtual_topology_system:2.6.6:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:virtual_topology_system:2.6.6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-155&quot;,&quot;id&quot;:&quot;16343703&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Awan_automation_engine%3A7.1.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:wan_automation_engine:7.1.3:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:wan_automation_engine:7.1.3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-156&quot;,&quot;id&quot;:&quot;16343702&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Awan_automation_engine%3A7.2.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:wan_automation_engine:7.2.1:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:wan_automation_engine:7.2.1&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-157&quot;,&quot;id&quot;:&quot;16343701&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Awan_automation_engine%3A7.2.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:wan_automation_engine:7.2.2:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:wan_automation_engine:7.2.2&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-158&quot;,&quot;id&quot;:&quot;16343700&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Awan_automation_engine%3A7.2.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:wan_automation_engine:7.2.3:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:wan_automation_engine:7.2.3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-159&quot;,&quot;id&quot;:&quot;16343699&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Awan_automation_engine%3A7.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:wan_automation_engine:7.3:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:wan_automation_engine:7.3&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-160&quot;,&quot;id&quot;:&quot;16343698&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Awan_automation_engine%3A7.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:wan_automation_engine:7.4:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:wan_automation_engine:7.4&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-161&quot;,&quot;id&quot;:&quot;16343697&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Awan_automation_engine%3A7.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:wan_automation_engine:7.5:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:wan_automation_engine:7.5&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-162&quot;,&quot;id&quot;:&quot;16343696&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Awan_automation_engine%3A7.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:wan_automation_engine:7.6:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:wan_automation_engine:7.6&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-163&quot;,&quot;id&quot;:&quot;16343695&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:webex_meetings_server:3.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:webex_meetings_server:3.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-164&quot;,&quot;id&quot;:&quot;16343612&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Acisco%3Awebex_meetings_server%3A4.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:cisco:webex_meetings_server:4.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:cisco:webex_meetings_server:4.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-165&quot;,&quot;id&quot;:&quot;16343615&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]},{&quot;id&quot;:12,&quot;dataTestId&quot;:&quot;vuln-software-config-12&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-12-0&quot;,&quot;configType&quot;:&quot;BASIC&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asnowsoftware%3Asnow_commander%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:snowsoftware:snow_commander:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:snowsoftware:snow_commander&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-12-0-0&quot;,&quot;id&quot;:&quot;16343777&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 8.10.0 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;8.10.0&quot;,&quot;rangeId&quot;:&quot;455891&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Asnowsoftware%3Avm_access_proxy%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:snowsoftware:vm_access_proxy:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:snowsoftware:vm_access_proxy&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-12-0-1&quot;,&quot;id&quot;:&quot;16343776&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 3.6 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;3.6&quot;,&quot;rangeId&quot;:&quot;455890&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]},{&quot;id&quot;:13,&quot;dataTestId&quot;:&quot;vuln-software-config-13&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-13-0&quot;,&quot;configType&quot;:&quot;BASIC&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Abentley%3Asynchro%3A*%3A*%3A*%3A*%3Apro%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:bentley:synchro:*:*:*:*:pro:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:bentley:synchro:::~~pro~~~&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-13-0-0&quot;,&quot;id&quot;:&quot;16343779&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions from (including) 6.1 up to (excluding) 6.4.3.2 &quot;,&quot;rangeStartType&quot;:&quot;including&quot;,&quot;rangeStartVersion&quot;:&quot;6.1&quot;,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;6.4.3.2&quot;,&quot;rangeId&quot;:&quot;477781&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Abentley%3Asynchro_4d%3A*%3A*%3A*%3A*%3Apro%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:bentley:synchro_4d:*:*:*:*:pro:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:bentley:synchro_4d:::~~pro~~~&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-13-0-1&quot;,&quot;id&quot;:&quot;16343778&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 6.2.4.2 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;6.2.4.2&quot;,&quot;rangeId&quot;:&quot;477780&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]},{&quot;id&quot;:14,&quot;dataTestId&quot;:&quot;vuln-software-config-14&quot;,&quot;totalCpeCount&quot;:1,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-14-0&quot;,&quot;configType&quot;:&quot;BASIC&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Apercussion%3Arhythmyx%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:percussion:rhythmyx:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:percussion:rhythmyx&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-14-0-0&quot;,&quot;id&quot;:&quot;16343780&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (including) 7.3.2 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;including&quot;,&quot;rangeEndVersion&quot;:&quot;7.3.2&quot;,&quot;rangeId&quot;:&quot;514093&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]},{&quot;id&quot;:15,&quot;dataTestId&quot;:&quot;vuln-software-config-15&quot;,&quot;totalCpeCount&quot;:1,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-15-0&quot;,&quot;configType&quot;:&quot;BASIC&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Aa%3Aapple%3Axcode%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/a:apple:xcode&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-15-0-0&quot;,&quot;id&quot;:&quot;16343781&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot; versions up to (excluding) 13.3 &quot;,&quot;rangeStartType&quot;:&quot;none&quot;,&quot;rangeStartVersion&quot;:null,&quot;rangeEndType&quot;:&quot;excluding&quot;,&quot;rangeEndVersion&quot;:&quot;13.3&quot;,&quot;rangeId&quot;:&quot;480114&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]"/>
<p id="vulnCpeInfo" >
<small>
<i class="fa fa-bug fa-flip-vertical"></i> Denotes Vulnerable Software<br />
<a href="mailto:cpe_dictionary@nist.gov">Are we missing a CPE here? Please let us know</a>.<br />
</small>
</p>
<script src="/site-media/js/vulnerability/cpe-match.js"
type="text/javascript"></script>
<script src="/site-media/js/vulnerability/configurationListing.js"
type="text/javascript"></script>
</div>
</div>
<div id="vulnChangeHistoryDiv"
data-testid="vuln-change-history-container">
<h3 id="VulnChangeHistorySection">Change History</h3>
<small> 54 change records found <a href="#VulnChangeHistorySection"
style="text-decoration: underline" id="changeHistoryToggle">show
changes</a>
</small>
<div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-0">CVE Modified by CISA-ADP</span> <span
data-testid="vuln-change-history-date-0">2/04/2025 10:15:13 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">CVSS V3.1</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-1">CVE Modified by CVE</span> <span
data-testid="vuln-change-history-date-1">11/21/2024 1:30:38 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">http://seclists.org/fulldisclosure/2022/Dec/2</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">http://seclists.org/fulldisclosure/2022/Jul/11</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">http://seclists.org/fulldisclosure/2022/Mar/23</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/10/1</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/10/2</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/10/3</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/13/1</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/13/2</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/14/4</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/15/3</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">https://github.com/cisagov/log4j-affected-db</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">https://logging.apache.org/log4j/2.x/security.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">https://security.netapp.com/advisory/ntap-20211210-0007/</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">https://support.apple.com/kb/HT213189</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">https://twitter.com/kurtseifried/status/1469345530182455296</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">https://www.debian.org/security/2021/dsa-5020</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">https://www.kb.cert.org/vuls/id/930724</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/alert-cve-2021-44228.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpuapr2022.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-1">
<td
data-testid="vuln-change-history-1-action">Added</td>
<td
data-testid="vuln-change-history-1-type">Reference</td>
<td data-testid="vuln-change-history-1-old">
</td>
<td data-testid="vuln-change-history-1-new">
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpujan2022.html</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-2">Modified Analysis by NIST</span> <span
data-testid="vuln-change-history-date-2">7/24/2024 1:08:24 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Changed</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
<pre style="word-break: break-all !important">AND
OR
cpe:2.3:h:siemens:sppa-t3000_ses3000:-:*:*:*:*:*:*:*
OR
*cpe:2.3:o:siemens:sppa-t3000_ses3000_firmware:*:*:*:*:*:*:*:*</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:siemens:sppa-t3000_ses3000_firmware:*:*:*:*:*:*:*:*
OR
cpe:2.3:h:siemens:sppa-t3000_ses3000:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">OR
*cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:* versions up to (excluding) 13.3</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Changed</td>
<td
data-testid="vuln-change-history-2-type">Reference Type</td>
<td data-testid="vuln-change-history-2-old">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html Third Party Advisory, VDB Entry</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html Exploit, Third Party Advisory, VDB Entry</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Changed</td>
<td
data-testid="vuln-change-history-2-type">Reference Type</td>
<td data-testid="vuln-change-history-2-old">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html Third Party Advisory, VDB Entry</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html Exploit, Third Party Advisory, VDB Entry</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Changed</td>
<td
data-testid="vuln-change-history-2-type">Reference Type</td>
<td data-testid="vuln-change-history-2-old">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html Third Party Advisory, VDB Entry</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html Exploit, Third Party Advisory, VDB Entry</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Changed</td>
<td
data-testid="vuln-change-history-2-type">Reference Type</td>
<td data-testid="vuln-change-history-2-old">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html Third Party Advisory, VDB Entry</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html Exploit, Third Party Advisory, VDB Entry</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Changed</td>
<td
data-testid="vuln-change-history-2-type">Reference Type</td>
<td data-testid="vuln-change-history-2-old">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html Third Party Advisory, VDB Entry</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Changed</td>
<td
data-testid="vuln-change-history-2-type">Reference Type</td>
<td data-testid="vuln-change-history-2-old">
<pre style="word-break: break-all !important">https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md Product, US Government Resource</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md Broken Link, Product, US Government Resource</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Changed</td>
<td
data-testid="vuln-change-history-2-type">Reference Type</td>
<td data-testid="vuln-change-history-2-old">
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/ No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/ Release Notes</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Changed</td>
<td
data-testid="vuln-change-history-2-type">Reference Type</td>
<td data-testid="vuln-change-history-2-old">
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/ No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/ Release Notes</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Changed</td>
<td
data-testid="vuln-change-history-2-type">Reference Type</td>
<td data-testid="vuln-change-history-2-old">
<pre style="word-break: break-all !important">https://security.netapp.com/advisory/ntap-20211210-0007/ Vendor Advisory</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">https://security.netapp.com/advisory/ntap-20211210-0007/ Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Changed</td>
<td
data-testid="vuln-change-history-2-type">Reference Type</td>
<td data-testid="vuln-change-history-2-old">
<pre style="word-break: break-all !important">https://twitter.com/kurtseifried/status/1469345530182455296 Exploit, Third Party Advisory</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">https://twitter.com/kurtseifried/status/1469345530182455296 Broken Link, Exploit, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Changed</td>
<td
data-testid="vuln-change-history-2-type">Reference Type</td>
<td data-testid="vuln-change-history-2-old">
<pre style="word-break: break-all !important">https://www.debian.org/security/2021/dsa-5020 Third Party Advisory</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">https://www.debian.org/security/2021/dsa-5020 Mailing List, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-3">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-3">5/14/2024 5:36:54 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-4">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-4">11/06/2023 10:39:36 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Added</td>
<td
data-testid="vuln-change-history-4-type">Reference</td>
<td data-testid="vuln-change-history-4-old">
</td>
<td data-testid="vuln-change-history-4-new">
<pre style="word-break: break-all !important">Apache Software Foundation https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/ [No types assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Added</td>
<td
data-testid="vuln-change-history-4-type">Reference</td>
<td data-testid="vuln-change-history-4-old">
</td>
<td data-testid="vuln-change-history-4-new">
<pre style="word-break: break-all !important">Apache Software Foundation https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/ [No types assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Removed</td>
<td
data-testid="vuln-change-history-4-type">Reference</td>
<td data-testid="vuln-change-history-4-old">
<pre style="word-break: break-all !important">Apache Software Foundation https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-4-new">
</td>
</tr>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Removed</td>
<td
data-testid="vuln-change-history-4-type">Reference</td>
<td data-testid="vuln-change-history-4-old">
<pre style="word-break: break-all !important">Apache Software Foundation https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-4-new">
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-5">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-5">4/03/2023 4:15:07 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-5">
<td
data-testid="vuln-change-history-5-action">Added</td>
<td
data-testid="vuln-change-history-5-type">Reference</td>
<td data-testid="vuln-change-history-5-old">
</td>
<td data-testid="vuln-change-history-5-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-6">Modified Analysis by NIST</span> <span
data-testid="vuln-change-history-date-6">2/06/2023 1:53:16 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-6">
<td
data-testid="vuln-change-history-6-action">Changed</td>
<td
data-testid="vuln-change-history-6-type">CPE Configuration</td>
<td data-testid="vuln-change-history-6-old">
<strong data-testid="vuln-change-history-6-showing"
>Record truncated, showing 500 of 563 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=02/06/2023T13:53:16.990-0500">View Entire Change Record</a><br/>
<pre>OR
*cpe:2.3:a:intel:audio_development_kit:-:*:*:*:*:*:*:*
*cpe:2.3:a:intel:computer_vision_annotation_tool:-:*:*:*:*:*:*:*
*cpe:2.3:a:intel:data_center_manager:-:*:*:*:*:*:*:*
*cpe:2.3:a:intel:genomics_kernel_library:-:*:*:*:*:*:*:*
*cpe:2.3:a:intel:oneapi_sample_browser:-:*:*:*:*:eclipse:*:*
*cpe:2.3:a:intel:secure_device_onboard:-:*:*:*:*:*:*:*
*cpe:2.3:a:intel:sensor_solution_firmware_development_kit:-:*:*:*:*:*:*:*
*cpe:2.3:a:intel:system_debugger:-:*:</pre>
</td>
<td data-testid="vuln-change-history-6-new">
<strong data-testid="vuln-change-history-6-showing"
>Record truncated, showing 500 of 594 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=02/06/2023T13:53:16.990-0500">View Entire Change Record</a><br />
<pre>OR
*cpe:2.3:a:intel:audio_development_kit:-:*:*:*:*:*:*:*
*cpe:2.3:a:intel:computer_vision_annotation_tool:-:*:*:*:*:*:*:*
*cpe:2.3:a:intel:data_center_manager:*:*:*:*:*:*:*:* versions up to (excluding) 5.1
*cpe:2.3:a:intel:genomics_kernel_library:-:*:*:*:*:*:*:*
*cpe:2.3:a:intel:oneapi_sample_browser:-:*:*:*:*:eclipse:*:*
*cpe:2.3:a:intel:secure_device_onboard:-:*:*:*:*:*:*:*
*cpe:2.3:a:intel:sensor_solution_firmware_development_kit:-:*:*:*:*:*:*:*
*cpe:2</pre>
</td>
</tr>
<tr data-testid="vuln-change-history-6">
<td
data-testid="vuln-change-history-6-action">Changed</td>
<td
data-testid="vuln-change-history-6-type">Reference Type</td>
<td data-testid="vuln-change-history-6-old">
<pre style="word-break: break-all !important">http://seclists.org/fulldisclosure/2022/Dec/2 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-6-new">
<pre style="word-break: break-all !important">http://seclists.org/fulldisclosure/2022/Dec/2 Exploit, Mailing List, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-7">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-7">12/09/2022 12:15:12 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-7">
<td
data-testid="vuln-change-history-7-action">Added</td>
<td
data-testid="vuln-change-history-7-type">Reference</td>
<td data-testid="vuln-change-history-7-old">
</td>
<td data-testid="vuln-change-history-7-new">
<pre style="word-break: break-all !important">http://seclists.org/fulldisclosure/2022/Dec/2 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-8">Reanalysis by NIST</span> <span
data-testid="vuln-change-history-date-8">8/17/2022 1:46:12 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-8">
<td
data-testid="vuln-change-history-8-action">Added</td>
<td
data-testid="vuln-change-history-8-type">CPE Configuration</td>
<td data-testid="vuln-change-history-8-old">
</td>
<td data-testid="vuln-change-history-8-new">
<pre style="word-break: break-all !important">OR
*cpe:2.3:a:percussion:rhythmyx:*:*:*:*:*:*:*:* versions up to (including) 7.3.2</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-9">Modified Analysis by NIST</span> <span
data-testid="vuln-change-history-date-9">8/09/2022 9:17:54 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-9">
<td
data-testid="vuln-change-history-9-action">Added</td>
<td
data-testid="vuln-change-history-9-type">CWE</td>
<td data-testid="vuln-change-history-9-old">
</td>
<td data-testid="vuln-change-history-9-new">
<pre style="word-break: break-all !important">NIST CWE-917</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-9">
<td
data-testid="vuln-change-history-9-action">Removed</td>
<td
data-testid="vuln-change-history-9-type">CWE</td>
<td data-testid="vuln-change-history-9-old">
<pre style="word-break: break-all !important">NIST CWE-502</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-9-new">
</td>
</tr>
<tr data-testid="vuln-change-history-9">
<td
data-testid="vuln-change-history-9-action">Changed</td>
<td
data-testid="vuln-change-history-9-type">Reference Type</td>
<td data-testid="vuln-change-history-9-old">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-9-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html Third Party Advisory, VDB Entry</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-9">
<td
data-testid="vuln-change-history-9-action">Changed</td>
<td
data-testid="vuln-change-history-9-type">Reference Type</td>
<td data-testid="vuln-change-history-9-old">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-9-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html Exploit, Third Party Advisory, VDB Entry</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-9">
<td
data-testid="vuln-change-history-9-action">Changed</td>
<td
data-testid="vuln-change-history-9-type">Reference Type</td>
<td data-testid="vuln-change-history-9-old">
<pre style="word-break: break-all !important">http://seclists.org/fulldisclosure/2022/Jul/11 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-9-new">
<pre style="word-break: break-all !important">http://seclists.org/fulldisclosure/2022/Jul/11 Mailing List, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-10">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-10">8/03/2022 2:15:11 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-10">
<td
data-testid="vuln-change-history-10-action">Added</td>
<td
data-testid="vuln-change-history-10-type">Reference</td>
<td data-testid="vuln-change-history-10-old">
</td>
<td data-testid="vuln-change-history-10-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-11">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-11">7/22/2022 2:15:08 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-11">
<td
data-testid="vuln-change-history-11-action">Added</td>
<td
data-testid="vuln-change-history-11-type">Reference</td>
<td data-testid="vuln-change-history-11-old">
</td>
<td data-testid="vuln-change-history-11-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-12">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-12">7/22/2022 2:15:09 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">Reference</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">http://seclists.org/fulldisclosure/2022/Jul/11 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-13">Modified Analysis by NIST</span> <span
data-testid="vuln-change-history-date-13">6/30/2022 2:26:17 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-13">
<td
data-testid="vuln-change-history-13-action">Changed</td>
<td
data-testid="vuln-change-history-13-type">Reference Type</td>
<td data-testid="vuln-change-history-13-old">
<pre style="word-break: break-all !important">https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-13-new">
<pre style="word-break: break-all !important">https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228 Exploit, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-13">
<td
data-testid="vuln-change-history-13-action">Changed</td>
<td
data-testid="vuln-change-history-13-type">Reference Type</td>
<td data-testid="vuln-change-history-13-old">
<pre style="word-break: break-all !important">https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-13-new">
<pre style="word-break: break-all !important">https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html Exploit, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-13">
<td
data-testid="vuln-change-history-13-action">Changed</td>
<td
data-testid="vuln-change-history-13-type">Reference Type</td>
<td data-testid="vuln-change-history-13-old">
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpuapr2022.html No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-13-new">
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpuapr2022.html Patch, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-14">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-14">5/05/2022 7:15:08 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-14">
<td
data-testid="vuln-change-history-14-action">Added</td>
<td
data-testid="vuln-change-history-14-type">Reference</td>
<td data-testid="vuln-change-history-14-old">
</td>
<td data-testid="vuln-change-history-14-new">
<pre style="word-break: break-all !important">https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-14">
<td
data-testid="vuln-change-history-14-action">Added</td>
<td
data-testid="vuln-change-history-14-type">Reference</td>
<td data-testid="vuln-change-history-14-old">
</td>
<td data-testid="vuln-change-history-14-new">
<pre style="word-break: break-all !important">https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-15">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-15">4/19/2022 8:16:30 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-15">
<td
data-testid="vuln-change-history-15-action">Added</td>
<td
data-testid="vuln-change-history-15-type">Reference</td>
<td data-testid="vuln-change-history-15-old">
</td>
<td data-testid="vuln-change-history-15-new">
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpuapr2022.html [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-16">Reanalysis by NIST</span> <span
data-testid="vuln-change-history-date-16">4/18/2022 9:45:53 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-16">
<td
data-testid="vuln-change-history-16-action">Changed</td>
<td
data-testid="vuln-change-history-16-type">CPE Configuration</td>
<td data-testid="vuln-change-history-16-old">
<strong data-testid="vuln-change-history-16-showing"
>Record truncated, showing 500 of 504 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=04/18/2022T09:45:53.437-0400">View Entire Change Record</a><br/>
<pre>OR
*cpe:2.3:a:apache:log4j:2.0:-:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:2.0:beta9:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:2.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:2.0:rc2:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.0.1 up to (excluding) 2.3.1
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.4.0 up to (excluding) 2.12.2
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.13.0 up to (excluding) 2.</pre>
</td>
<td data-testid="vuln-change-history-16-new">
<strong data-testid="vuln-change-history-16-showing"
>Record truncated, showing 500 of 504 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=04/18/2022T09:45:53.437-0400">View Entire Change Record</a><br />
<pre>OR
*cpe:2.3:a:apache:log4j:2.0:-:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:2.0:beta9:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:2.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:2.0:rc2:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.0.1 up to (excluding) 2.3.1
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.4.0 up to (excluding) 2.12.2
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.13.0 up to (excluding) 2.</pre>
</td>
</tr>
<tr data-testid="vuln-change-history-16">
<td
data-testid="vuln-change-history-16-action">Changed</td>
<td
data-testid="vuln-change-history-16-type">Reference Type</td>
<td data-testid="vuln-change-history-16-old">
<pre style="word-break: break-all !important">http://seclists.org/fulldisclosure/2022/Mar/23 Third Party Advisory</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-16-new">
<pre style="word-break: break-all !important">http://seclists.org/fulldisclosure/2022/Mar/23 Mailing List, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-17">Modified Analysis by NIST</span> <span
data-testid="vuln-change-history-date-17">4/12/2022 2:14:48 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-17">
<td
data-testid="vuln-change-history-17-action">Changed</td>
<td
data-testid="vuln-change-history-17-type">CPE Configuration</td>
<td data-testid="vuln-change-history-17-old">
<strong data-testid="vuln-change-history-17-showing"
>Record truncated, showing 500 of 504 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=04/12/2022T14:14:48.383-0400">View Entire Change Record</a><br/>
<pre>OR
*cpe:2.3:a:apache:log4j:2.0:-:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:2.0:beta9:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:2.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:2.0:rc2:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.0.1 up to (excluding) 2.3.1
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.4.0 up to (excluding) 2.12.2
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.13.0 up to (excluding) 2.</pre>
</td>
<td data-testid="vuln-change-history-17-new">
<strong data-testid="vuln-change-history-17-showing"
>Record truncated, showing 500 of 504 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=04/12/2022T14:14:48.383-0400">View Entire Change Record</a><br />
<pre>OR
*cpe:2.3:a:apache:log4j:2.0:-:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:2.0:beta9:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:2.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:2.0:rc2:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.0.1 up to (excluding) 2.3.1
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.4.0 up to (excluding) 2.12.2
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.13.0 up to (excluding) 2.</pre>
</td>
</tr>
<tr data-testid="vuln-change-history-17">
<td
data-testid="vuln-change-history-17-action">Added</td>
<td
data-testid="vuln-change-history-17-type">CPE Configuration</td>
<td data-testid="vuln-change-history-17-old">
</td>
<td data-testid="vuln-change-history-17-new">
<pre style="word-break: break-all !important">OR
*cpe:2.3:a:bentley:synchro:*:*:*:*:pro:*:*:* versions from (including) 6.1 up to (excluding) 6.4.3.2
*cpe:2.3:a:bentley:synchro_4d:*:*:*:*:pro:*:*:* versions up to (excluding) 6.2.4.2</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-17">
<td
data-testid="vuln-change-history-17-action">Changed</td>
<td
data-testid="vuln-change-history-17-type">Reference Type</td>
<td data-testid="vuln-change-history-17-old">
<pre style="word-break: break-all !important">http://seclists.org/fulldisclosure/2022/Mar/23 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-17-new">
<pre style="word-break: break-all !important">http://seclists.org/fulldisclosure/2022/Mar/23 Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-17">
<td
data-testid="vuln-change-history-17-action">Changed</td>
<td
data-testid="vuln-change-history-17-type">Reference Type</td>
<td data-testid="vuln-change-history-17-old">
<pre style="word-break: break-all !important">https://github.com/cisagov/log4j-affected-db No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-17-new">
<pre style="word-break: break-all !important">https://github.com/cisagov/log4j-affected-db Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-17">
<td
data-testid="vuln-change-history-17-action">Changed</td>
<td
data-testid="vuln-change-history-17-type">Reference Type</td>
<td data-testid="vuln-change-history-17-old">
<pre style="word-break: break-all !important">https://support.apple.com/kb/HT213189 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-17-new">
<pre style="word-break: break-all !important">https://support.apple.com/kb/HT213189 Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-17">
<td
data-testid="vuln-change-history-17-action">Changed</td>
<td
data-testid="vuln-change-history-17-type">Reference Type</td>
<td data-testid="vuln-change-history-17-old">
<pre style="word-break: break-all !important">https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-17-new">
<pre style="word-break: break-all !important">https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001 Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-18">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-18">3/15/2022 2:15:15 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-18">
<td
data-testid="vuln-change-history-18-action">Added</td>
<td
data-testid="vuln-change-history-18-type">Reference</td>
<td data-testid="vuln-change-history-18-old">
</td>
<td data-testid="vuln-change-history-18-new">
<pre style="word-break: break-all !important">http://seclists.org/fulldisclosure/2022/Mar/23 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-19">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-19">3/14/2022 4:15:08 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-19">
<td
data-testid="vuln-change-history-19-action">Added</td>
<td
data-testid="vuln-change-history-19-type">Reference</td>
<td data-testid="vuln-change-history-19-old">
</td>
<td data-testid="vuln-change-history-19-new">
<pre style="word-break: break-all !important">https://support.apple.com/kb/HT213189 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-20">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-20">3/01/2022 6:15:08 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-20">
<td
data-testid="vuln-change-history-20-action">Added</td>
<td
data-testid="vuln-change-history-20-type">Reference</td>
<td data-testid="vuln-change-history-20-old">
</td>
<td data-testid="vuln-change-history-20-new">
<pre style="word-break: break-all !important">https://github.com/cisagov/log4j-affected-db [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-20">
<td
data-testid="vuln-change-history-20-action">Added</td>
<td
data-testid="vuln-change-history-20-type">Reference</td>
<td data-testid="vuln-change-history-20-old">
</td>
<td data-testid="vuln-change-history-20-new">
<pre style="word-break: break-all !important">https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-21">Modified Analysis by NIST</span> <span
data-testid="vuln-change-history-date-21">2/18/2022 11:23:10 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-21">
<td
data-testid="vuln-change-history-21-action">Changed</td>
<td
data-testid="vuln-change-history-21-type">Reference Type</td>
<td data-testid="vuln-change-history-21-old">
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpujan2022.html No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-21-new">
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpujan2022.html Patch, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-22">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-22">2/07/2022 11:16:32 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-22">
<td
data-testid="vuln-change-history-22-action">Added</td>
<td
data-testid="vuln-change-history-22-type">Reference</td>
<td data-testid="vuln-change-history-22-old">
</td>
<td data-testid="vuln-change-history-22-new">
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpujan2022.html [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-23">Modified Analysis by NIST</span> <span
data-testid="vuln-change-history-date-23">2/01/2022 3:31:54 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-23">
<td
data-testid="vuln-change-history-23-action">Changed</td>
<td
data-testid="vuln-change-history-23-type">CPE Configuration</td>
<td data-testid="vuln-change-history-23-old">
<pre style="word-break: break-all !important">OR
*cpe:2.3:a:apache:log4j:2.0:-:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:2.0:beta9:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:2.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:2.0:rc2:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.0.1 up to (excluding) 2.12.2
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.13.0 up to (excluding) 2.15.0</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-23-new">
<strong data-testid="vuln-change-history-23-showing"
>Record truncated, showing 500 of 504 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=02/01/2022T15:31:54.840-0500">View Entire Change Record</a><br />
<pre>OR
*cpe:2.3:a:apache:log4j:2.0:-:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:2.0:beta9:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:2.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:2.0:rc2:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.0.1 up to (excluding) 2.3.1
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.4.0 up to (excluding) 2.12.2
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.13.0 up to (excluding) 2.</pre>
</td>
</tr>
<tr data-testid="vuln-change-history-23">
<td
data-testid="vuln-change-history-23-action">Changed</td>
<td
data-testid="vuln-change-history-23-type">CPE Configuration</td>
<td data-testid="vuln-change-history-23-old">
<pre style="word-break: break-all !important">OR
*cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-23-new">
<pre style="word-break: break-all !important">OR
*cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
*cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-23">
<td
data-testid="vuln-change-history-23-action">Changed</td>
<td
data-testid="vuln-change-history-23-type">Reference Type</td>
<td data-testid="vuln-change-history-23-old">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-23-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html Third Party Advisory, VDB Entry</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-23">
<td
data-testid="vuln-change-history-23-action">Changed</td>
<td
data-testid="vuln-change-history-23-type">Reference Type</td>
<td data-testid="vuln-change-history-23-old">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-23-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html Third Party Advisory, VDB Entry</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-23">
<td
data-testid="vuln-change-history-23-action">Changed</td>
<td
data-testid="vuln-change-history-23-type">Reference Type</td>
<td data-testid="vuln-change-history-23-old">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-23-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html Third Party Advisory, VDB Entry</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-23">
<td
data-testid="vuln-change-history-23-action">Changed</td>
<td
data-testid="vuln-change-history-23-type">Reference Type</td>
<td data-testid="vuln-change-history-23-old">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-23-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html Third Party Advisory, VDB Entry</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-23">
<td
data-testid="vuln-change-history-23-action">Changed</td>
<td
data-testid="vuln-change-history-23-type">Reference Type</td>
<td data-testid="vuln-change-history-23-old">
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-23-new">
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-23">
<td
data-testid="vuln-change-history-23-action">Changed</td>
<td
data-testid="vuln-change-history-23-type">Reference Type</td>
<td data-testid="vuln-change-history-23-old">
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-23-new">
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-23">
<td
data-testid="vuln-change-history-23-action">Changed</td>
<td
data-testid="vuln-change-history-23-type">Reference Type</td>
<td data-testid="vuln-change-history-23-old">
<pre style="word-break: break-all !important">https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-23-new">
<pre style="word-break: break-all !important">https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md Product, US Government Resource</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-23">
<td
data-testid="vuln-change-history-23-action">Changed</td>
<td
data-testid="vuln-change-history-23-type">Reference Type</td>
<td data-testid="vuln-change-history-23-old">
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/ No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-23-new">
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/ Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-23">
<td
data-testid="vuln-change-history-23-action">Changed</td>
<td
data-testid="vuln-change-history-23-type">Reference Type</td>
<td data-testid="vuln-change-history-23-old">
<pre style="word-break: break-all !important">https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ Patch, Third Party Advisory</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-23-new">
<pre style="word-break: break-all !important">https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ Patch, Third Party Advisory, Vendor Advisory</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-24">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-24">1/24/2022 12:15:09 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-24">
<td
data-testid="vuln-change-history-24-action">Added</td>
<td
data-testid="vuln-change-history-24-type">Reference</td>
<td data-testid="vuln-change-history-24-old">
</td>
<td data-testid="vuln-change-history-24-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-25">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-25">1/20/2022 4:15:11 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-25">
<td
data-testid="vuln-change-history-25-action">Added</td>
<td
data-testid="vuln-change-history-25-type">Reference</td>
<td data-testid="vuln-change-history-25-old">
</td>
<td data-testid="vuln-change-history-25-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-26">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-26">1/18/2022 11:15:08 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-26">
<td
data-testid="vuln-change-history-26-action">Added</td>
<td
data-testid="vuln-change-history-26-type">Reference</td>
<td data-testid="vuln-change-history-26-old">
</td>
<td data-testid="vuln-change-history-26-new">
<pre style="word-break: break-all !important">https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-27">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-27">1/12/2022 1:15:07 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-27">
<td
data-testid="vuln-change-history-27-action">Changed</td>
<td
data-testid="vuln-change-history-27-type">Description</td>
<td data-testid="vuln-change-history-27-old">
<strong data-testid="vuln-change-history-27-showing"
>Record truncated, showing 500 of 644 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=01/12/2022T13:15:07.827-0500">View Entire Change Record</a><br/>
<pre>Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0, this functionality has been completely </pre>
</td>
<td data-testid="vuln-change-history-27-new">
<strong data-testid="vuln-change-history-27-showing"
>Record truncated, showing 500 of 713 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=01/12/2022T13:15:07.827-0500">View Entire Change Record</a><br />
<pre>Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along wit</pre>
</td>
</tr>
<tr data-testid="vuln-change-history-27">
<td
data-testid="vuln-change-history-27-action">Added</td>
<td
data-testid="vuln-change-history-27-type">Reference</td>
<td data-testid="vuln-change-history-27-old">
</td>
<td data-testid="vuln-change-history-27-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-27">
<td
data-testid="vuln-change-history-27-action">Added</td>
<td
data-testid="vuln-change-history-27-type">Reference</td>
<td data-testid="vuln-change-history-27-old">
</td>
<td data-testid="vuln-change-history-27-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-27">
<td
data-testid="vuln-change-history-27-action">Added</td>
<td
data-testid="vuln-change-history-27-type">Reference</td>
<td data-testid="vuln-change-history-27-old">
</td>
<td data-testid="vuln-change-history-27-new">
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-27">
<td
data-testid="vuln-change-history-27-action">Added</td>
<td
data-testid="vuln-change-history-27-type">Reference</td>
<td data-testid="vuln-change-history-27-old">
</td>
<td data-testid="vuln-change-history-27-new">
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-27">
<td
data-testid="vuln-change-history-27-action">Added</td>
<td
data-testid="vuln-change-history-27-type">Reference</td>
<td data-testid="vuln-change-history-27-old">
</td>
<td data-testid="vuln-change-history-27-new">
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/ [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-28">Reanalysis by NIST</span> <span
data-testid="vuln-change-history-date-28">12/28/2021 2:32:40 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-28">
<td
data-testid="vuln-change-history-28-action">Added</td>
<td
data-testid="vuln-change-history-28-type">CPE Configuration</td>
<td data-testid="vuln-change-history-28-old">
</td>
<td data-testid="vuln-change-history-28-new">
<pre style="word-break: break-all !important">OR
*cpe:2.3:a:snowsoftware:snow_commander:*:*:*:*:*:*:*:* versions up to (excluding) 8.10.0
*cpe:2.3:a:snowsoftware:vm_access_proxy:*:*:*:*:*:*:*:* versions up to (excluding) 3.6</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-28">
<td
data-testid="vuln-change-history-28-action">Changed</td>
<td
data-testid="vuln-change-history-28-type">Reference Type</td>
<td data-testid="vuln-change-history-28-old">
<pre style="word-break: break-all !important">https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ Third Party Advisory</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-28-new">
<pre style="word-break: break-all !important">https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ Patch, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-29">Reanalysis by NIST</span> <span
data-testid="vuln-change-history-date-29">12/20/2021 1:13:50 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-29">
<td
data-testid="vuln-change-history-29-action">Added</td>
<td
data-testid="vuln-change-history-29-type">CPE Configuration</td>
<td data-testid="vuln-change-history-29-old">
</td>
<td data-testid="vuln-change-history-29-new">
<strong data-testid="vuln-change-history-29-showing"
>Record truncated, showing 500 of 11978 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/20/2021T13:13:50.153-0500">View Entire Change Record</a><br />
<pre>OR
*cpe:2.3:a:cisco:automated_subsea_tuning:02.01.00:*:*:*:*:*:*:*
*cpe:2.3:a:cisco:broadworks:-:*:*:*:*:*:*:*
*cpe:2.3:a:cisco:cloudcenter_suite:4.10\(0.15\):*:*:*:*:*:*:*
*cpe:2.3:a:cisco:cloudcenter_suite:5.3\(0\):*:*:*:*:*:*:*
*cpe:2.3:a:cisco:cloudcenter_suite:5.4\(1\):*:*:*:*:*:*:*
*cpe:2.3:a:cisco:cloudcenter_suite:5.5\(0\):*:*:*:*:*:*:*
*cpe:2.3:a:cisco:cloudcenter_suite:5.5\(1\):*:*:*:*:*:*:*
*cpe:2.3:a:cisco:common_services_platform_collector:002</pre>
</td>
</tr>
<tr data-testid="vuln-change-history-29">
<td
data-testid="vuln-change-history-29-action">Changed</td>
<td
data-testid="vuln-change-history-29-type">Reference Type</td>
<td data-testid="vuln-change-history-29-old">
<pre style="word-break: break-all !important">https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ Mitigation, Third Party Advisory</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-29-new">
<pre style="word-break: break-all !important">https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-30">Modified Analysis by NIST</span> <span
data-testid="vuln-change-history-date-30">12/16/2021 2:56:45 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Changed</td>
<td
data-testid="vuln-change-history-30-type">CPE Configuration</td>
<td data-testid="vuln-change-history-30-old">
<pre style="word-break: break-all !important">OR
*cpe:2.3:a:apache:log4j:2.0:-:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:2.0:beta9:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:2.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:2.0:rc2:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.0.1 up to (excluding) 2.15.0</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-30-new">
<pre style="word-break: break-all !important">OR
*cpe:2.3:a:apache:log4j:2.0:-:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:2.0:beta9:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:2.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:2.0:rc2:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.0.1 up to (excluding) 2.12.2
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.13.0 up to (excluding) 2.15.0</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Added</td>
<td
data-testid="vuln-change-history-30-type">CPE Configuration</td>
<td data-testid="vuln-change-history-30-old">
</td>
<td data-testid="vuln-change-history-30-new">
<strong data-testid="vuln-change-history-30-showing"
>Record truncated, showing 500 of 1404 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/16/2021T14:56:45.773-0500">View Entire Change Record</a><br />
<pre>AND
OR
*cpe:2.3:o:cisco:fxos:6.2.3:*:*:*:*:*:*:*
*cpe:2.3:o:cisco:fxos:6.3.0:*:*:*:*:*:*:*
*cpe:2.3:o:cisco:fxos:6.4.0:*:*:*:*:*:*:*
*cpe:2.3:o:cisco:fxos:6.5.0:*:*:*:*:*:*:*
*cpe:2.3:o:cisco:fxos:6.6.0:*:*:*:*:*:*:*
*cpe:2.3:o:cisco:fxos:6.7.0:*:*:*:*:*:*:*
*cpe:2.3:o:cisco:fxos:7.0.0:*:*:*:*:*:*:*
*cpe:2.3:o:cisco:fxos:7.1.0:*:*:*:*:*:*:*
OR
cpe:2.3:h:cisco:firepower_1010:-:*:*:*:*:*:*:*
</pre>
</td>
</tr>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Added</td>
<td
data-testid="vuln-change-history-30-type">CPE Configuration</td>
<td data-testid="vuln-change-history-30-old">
</td>
<td data-testid="vuln-change-history-30-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:siemens:sppa-t3000_ses3000_firmware:*:*:*:*:*:*:*:*
OR
cpe:2.3:h:siemens:sppa-t3000_ses3000:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Added</td>
<td
data-testid="vuln-change-history-30-type">CPE Configuration</td>
<td data-testid="vuln-change-history-30-old">
</td>
<td data-testid="vuln-change-history-30-new">
<strong data-testid="vuln-change-history-30-showing"
>Record truncated, showing 500 of 9929 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/16/2021T14:56:45.773-0500">View Entire Change Record</a><br />
<pre>OR
*cpe:2.3:a:cisco:advanced_malware_protection_virtual_private_cloud_appliance:*:*:*:*:*:*:*:* versions up to (excluding) 3.5.4
*cpe:2.3:a:cisco:automated_subsea_tuning:*:*:*:*:*:*:*:* versions up to (excluding) 2.1.0
*cpe:2.3:a:cisco:broadworks:*:*:*:*:*:*:*:* versions up to (excluding) 2021.11_1.162
*cpe:2.3:a:cisco:business_process_automation:*:*:*:*:*:*:*:* versions up to (excluding) 3.0.000.115
*cpe:2.3:a:cisco:business_process_automation:*:*:*:*:*:*:*:* versions f</pre>
</td>
</tr>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Added</td>
<td
data-testid="vuln-change-history-30-type">CPE Configuration</td>
<td data-testid="vuln-change-history-30-old">
</td>
<td data-testid="vuln-change-history-30-new">
<strong data-testid="vuln-change-history-30-showing"
>Record truncated, showing 500 of 563 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/16/2021T14:56:45.773-0500">View Entire Change Record</a><br />
<pre>OR
*cpe:2.3:a:intel:audio_development_kit:-:*:*:*:*:*:*:*
*cpe:2.3:a:intel:computer_vision_annotation_tool:-:*:*:*:*:*:*:*
*cpe:2.3:a:intel:data_center_manager:-:*:*:*:*:*:*:*
*cpe:2.3:a:intel:genomics_kernel_library:-:*:*:*:*:*:*:*
*cpe:2.3:a:intel:oneapi_sample_browser:-:*:*:*:*:eclipse:*:*
*cpe:2.3:a:intel:secure_device_onboard:-:*:*:*:*:*:*:*
*cpe:2.3:a:intel:sensor_solution_firmware_development_kit:-:*:*:*:*:*:*:*
*cpe:2.3:a:intel:system_debugger:-:*:</pre>
</td>
</tr>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Added</td>
<td
data-testid="vuln-change-history-30-type">CPE Configuration</td>
<td data-testid="vuln-change-history-30-old">
</td>
<td data-testid="vuln-change-history-30-new">
<strong data-testid="vuln-change-history-30-showing"
>Record truncated, showing 500 of 569 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/16/2021T14:56:45.773-0500">View Entire Change Record</a><br />
<pre>OR
*cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*
*cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
*cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
*cpe:2.3:a:netapp:cloud_insights:-:*:*:*:*:*:*:*
*cpe:2.3:a:netapp:cloud_manager:-:*:*:*:*:*:*:*
*cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*
*cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
*cpe:2.3:a:netapp:ontap_tools:-:*:*:*:*:vmware_vsphe</pre>
</td>
</tr>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Added</td>
<td
data-testid="vuln-change-history-30-type">CPE Configuration</td>
<td data-testid="vuln-change-history-30-old">
</td>
<td data-testid="vuln-change-history-30-new">
<strong data-testid="vuln-change-history-30-showing"
>Record truncated, showing 500 of 4212 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/16/2021T14:56:45.773-0500">View Entire Change Record</a><br />
<pre>OR
*cpe:2.3:a:siemens:captial:*:*:*:*:*:*:*:* versions up to (excluding) 2019.1
*cpe:2.3:a:siemens:captial:2019.1:-:*:*:*:*:*:*
*cpe:2.3:a:siemens:captial:2019.1:sp1912:*:*:*:*:*:*
*cpe:2.3:a:siemens:comos:*:*:*:*:*:*:*:*
*cpe:2.3:a:siemens:desigo_cc_advanced_reports:4.0:*:*:*:*:*:*:*
*cpe:2.3:a:siemens:desigo_cc_advanced_reports:4.1:*:*:*:*:*:*:*
*cpe:2.3:a:siemens:desigo_cc_advanced_reports:4.2:*:*:*:*:*:*:*
*cpe:2.3:a:siemens:desigo_cc_advanced_reports:</pre>
</td>
</tr>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Added</td>
<td
data-testid="vuln-change-history-30-type">CPE Configuration</td>
<td data-testid="vuln-change-history-30-old">
</td>
<td data-testid="vuln-change-history-30-new">
<pre style="word-break: break-all !important">OR
*cpe:2.3:a:sonicwall:email_security:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.12</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Added</td>
<td
data-testid="vuln-change-history-30-type">CPE Configuration</td>
<td data-testid="vuln-change-history-30-old">
</td>
<td data-testid="vuln-change-history-30-new">
<pre style="word-break: break-all !important">OR
*cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
*cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
*cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Added</td>
<td
data-testid="vuln-change-history-30-type">CPE Configuration</td>
<td data-testid="vuln-change-history-30-old">
</td>
<td data-testid="vuln-change-history-30-new">
<pre style="word-break: break-all !important">OR
*cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Changed</td>
<td
data-testid="vuln-change-history-30-type">Reference Type</td>
<td data-testid="vuln-change-history-30-old">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-30-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html Third Party Advisory, VDB Entry</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Changed</td>
<td
data-testid="vuln-change-history-30-type">Reference Type</td>
<td data-testid="vuln-change-history-30-old">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-30-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html Exploit, Third Party Advisory, VDB Entry</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Changed</td>
<td
data-testid="vuln-change-history-30-type">Reference Type</td>
<td data-testid="vuln-change-history-30-old">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-30-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html Exploit, Third Party Advisory, VDB Entry</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Changed</td>
<td
data-testid="vuln-change-history-30-type">Reference Type</td>
<td data-testid="vuln-change-history-30-old">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-30-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html Third Party Advisory, VDB Entry</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Changed</td>
<td
data-testid="vuln-change-history-30-type">Reference Type</td>
<td data-testid="vuln-change-history-30-old">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-30-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html Third Party Advisory, VDB Entry</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Changed</td>
<td
data-testid="vuln-change-history-30-type">Reference Type</td>
<td data-testid="vuln-change-history-30-old">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-30-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html Third Party Advisory, VDB Entry</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Changed</td>
<td
data-testid="vuln-change-history-30-type">Reference Type</td>
<td data-testid="vuln-change-history-30-old">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-30-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html Third Party Advisory, VDB Entry</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Changed</td>
<td
data-testid="vuln-change-history-30-type">Reference Type</td>
<td data-testid="vuln-change-history-30-old">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-30-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html Third Party Advisory, VDB Entry</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Changed</td>
<td
data-testid="vuln-change-history-30-type">Reference Type</td>
<td data-testid="vuln-change-history-30-old">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/13/1 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-30-new">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/13/1 Mailing List, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Changed</td>
<td
data-testid="vuln-change-history-30-type">Reference Type</td>
<td data-testid="vuln-change-history-30-old">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/13/2 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-30-new">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/13/2 Mailing List, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Changed</td>
<td
data-testid="vuln-change-history-30-type">Reference Type</td>
<td data-testid="vuln-change-history-30-old">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/14/4 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-30-new">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/14/4 Mailing List, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Changed</td>
<td
data-testid="vuln-change-history-30-type">Reference Type</td>
<td data-testid="vuln-change-history-30-old">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/15/3 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-30-new">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/15/3 Mailing List, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Changed</td>
<td
data-testid="vuln-change-history-30-type">Reference Type</td>
<td data-testid="vuln-change-history-30-old">
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-30-new">
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Changed</td>
<td
data-testid="vuln-change-history-30-type">Reference Type</td>
<td data-testid="vuln-change-history-30-old">
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-30-new">
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Changed</td>
<td
data-testid="vuln-change-history-30-type">Reference Type</td>
<td data-testid="vuln-change-history-30-old">
<pre style="word-break: break-all !important">https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-30-new">
<pre style="word-break: break-all !important">https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html Mailing List, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Changed</td>
<td
data-testid="vuln-change-history-30-type">Reference Type</td>
<td data-testid="vuln-change-history-30-old">
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/ No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-30-new">
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/ Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Changed</td>
<td
data-testid="vuln-change-history-30-type">Reference Type</td>
<td data-testid="vuln-change-history-30-old">
<pre style="word-break: break-all !important">https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-30-new">
<pre style="word-break: break-all !important">https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ Mitigation, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Changed</td>
<td
data-testid="vuln-change-history-30-type">Reference Type</td>
<td data-testid="vuln-change-history-30-old">
<pre style="word-break: break-all !important">https://twitter.com/kurtseifried/status/1469345530182455296 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-30-new">
<pre style="word-break: break-all !important">https://twitter.com/kurtseifried/status/1469345530182455296 Exploit, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Changed</td>
<td
data-testid="vuln-change-history-30-type">Reference Type</td>
<td data-testid="vuln-change-history-30-old">
<pre style="word-break: break-all !important">https://www.debian.org/security/2021/dsa-5020 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-30-new">
<pre style="word-break: break-all !important">https://www.debian.org/security/2021/dsa-5020 Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Changed</td>
<td
data-testid="vuln-change-history-30-type">Reference Type</td>
<td data-testid="vuln-change-history-30-old">
<pre style="word-break: break-all !important">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-30-new">
<pre style="word-break: break-all !important">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-30">
<td
data-testid="vuln-change-history-30-action">Changed</td>
<td
data-testid="vuln-change-history-30-type">Reference Type</td>
<td data-testid="vuln-change-history-30-old">
<pre style="word-break: break-all !important">https://www.kb.cert.org/vuls/id/930724 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-30-new">
<pre style="word-break: break-all !important">https://www.kb.cert.org/vuls/id/930724 Third Party Advisory, US Government Resource</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-31">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-31">12/16/2021 12:15:08 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-31">
<td
data-testid="vuln-change-history-31-action">Added</td>
<td
data-testid="vuln-change-history-31-type">Reference</td>
<td data-testid="vuln-change-history-31-old">
</td>
<td data-testid="vuln-change-history-31-new">
<pre style="word-break: break-all !important">https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-32">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-32">12/16/2021 9:15:08 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-32">
<td
data-testid="vuln-change-history-32-action">Added</td>
<td
data-testid="vuln-change-history-32-type">Reference</td>
<td data-testid="vuln-change-history-32-old">
</td>
<td data-testid="vuln-change-history-32-new">
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-33">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-33">12/15/2021 5:15:07 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-33">
<td
data-testid="vuln-change-history-33-action">Added</td>
<td
data-testid="vuln-change-history-33-type">Reference</td>
<td data-testid="vuln-change-history-33-old">
</td>
<td data-testid="vuln-change-history-33-new">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/15/3 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-34">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-34">12/15/2021 1:15:07 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-34">
<td
data-testid="vuln-change-history-34-action">Added</td>
<td
data-testid="vuln-change-history-34-type">Reference</td>
<td data-testid="vuln-change-history-34-old">
</td>
<td data-testid="vuln-change-history-34-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-34">
<td
data-testid="vuln-change-history-34-action">Added</td>
<td
data-testid="vuln-change-history-34-type">Reference</td>
<td data-testid="vuln-change-history-34-old">
</td>
<td data-testid="vuln-change-history-34-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-34">
<td
data-testid="vuln-change-history-34-action">Added</td>
<td
data-testid="vuln-change-history-34-type">Reference</td>
<td data-testid="vuln-change-history-34-old">
</td>
<td data-testid="vuln-change-history-34-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-35">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-35">12/15/2021 12:15:07 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-35">
<td
data-testid="vuln-change-history-35-action">Changed</td>
<td
data-testid="vuln-change-history-35-type">Description</td>
<td data-testid="vuln-change-history-35-old">
<strong data-testid="vuln-change-history-35-showing"
>Record truncated, showing 500 of 645 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/15/2021T12:15:07.953-0500">View Entire Change Record</a><br/>
<pre>Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0, this functionality has been completely </pre>
</td>
<td data-testid="vuln-change-history-35-new">
<strong data-testid="vuln-change-history-35-showing"
>Record truncated, showing 500 of 644 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/15/2021T12:15:07.953-0500">View Entire Change Record</a><br />
<pre>Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0, this functionality has been completely </pre>
</td>
</tr>
<tr data-testid="vuln-change-history-35">
<td
data-testid="vuln-change-history-35-action">Added</td>
<td
data-testid="vuln-change-history-35-type">Reference</td>
<td data-testid="vuln-change-history-35-old">
</td>
<td data-testid="vuln-change-history-35-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-35">
<td
data-testid="vuln-change-history-35-action">Added</td>
<td
data-testid="vuln-change-history-35-type">Reference</td>
<td data-testid="vuln-change-history-35-old">
</td>
<td data-testid="vuln-change-history-35-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-35">
<td
data-testid="vuln-change-history-35-action">Removed</td>
<td
data-testid="vuln-change-history-35-type">Reference</td>
<td data-testid="vuln-change-history-35-old">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/15/1 [No Types Assigned]</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-35-new">
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-36">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-36">12/15/2021 11:15:07 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-36">
<td
data-testid="vuln-change-history-36-action">Changed</td>
<td
data-testid="vuln-change-history-36-type">Description</td>
<td data-testid="vuln-change-history-36-old">
<strong data-testid="vuln-change-history-36-showing"
>Record truncated, showing 500 of 716 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/15/2021T11:15:07.653-0500">View Entire Change Record</a><br/>
<pre>Apache Log4j2 &lt;=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (&gt;2.10) this behavior can be mitigated by setting system property &quot;log4j2.formatM</pre>
</td>
<td data-testid="vuln-change-history-36-new">
<strong data-testid="vuln-change-history-36-showing"
>Record truncated, showing 500 of 645 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/15/2021T11:15:07.653-0500">View Entire Change Record</a><br />
<pre>Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0, this functionality has been completely </pre>
</td>
</tr>
<tr data-testid="vuln-change-history-36">
<td
data-testid="vuln-change-history-36-action">Added</td>
<td
data-testid="vuln-change-history-36-type">Reference</td>
<td data-testid="vuln-change-history-36-old">
</td>
<td data-testid="vuln-change-history-36-new">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/15/1 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-37">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-37">12/14/2021 11:15:06 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-37">
<td
data-testid="vuln-change-history-37-action">Added</td>
<td
data-testid="vuln-change-history-37-type">Reference</td>
<td data-testid="vuln-change-history-37-old">
</td>
<td data-testid="vuln-change-history-37-new">
<pre style="word-break: break-all !important">https://www.kb.cert.org/vuls/id/930724 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-38">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-38">12/14/2021 10:15:06 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-38">
<td
data-testid="vuln-change-history-38-action">Added</td>
<td
data-testid="vuln-change-history-38-type">Reference</td>
<td data-testid="vuln-change-history-38-old">
</td>
<td data-testid="vuln-change-history-38-new">
<pre style="word-break: break-all !important">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-39">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-39">12/14/2021 2:15:07 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-39">
<td
data-testid="vuln-change-history-39-action">Added</td>
<td
data-testid="vuln-change-history-39-type">Reference</td>
<td data-testid="vuln-change-history-39-old">
</td>
<td data-testid="vuln-change-history-39-new">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/14/4 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-40">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-40">12/14/2021 1:15:08 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-40">
<td
data-testid="vuln-change-history-40-action">Added</td>
<td
data-testid="vuln-change-history-40-type">Reference</td>
<td data-testid="vuln-change-history-40-old">
</td>
<td data-testid="vuln-change-history-40-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-40">
<td
data-testid="vuln-change-history-40-action">Added</td>
<td
data-testid="vuln-change-history-40-type">Reference</td>
<td data-testid="vuln-change-history-40-old">
</td>
<td data-testid="vuln-change-history-40-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-40">
<td
data-testid="vuln-change-history-40-action">Added</td>
<td
data-testid="vuln-change-history-40-type">Reference</td>
<td data-testid="vuln-change-history-40-old">
</td>
<td data-testid="vuln-change-history-40-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-41">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-41">12/13/2021 8:15:08 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-41">
<td
data-testid="vuln-change-history-41-action">Added</td>
<td
data-testid="vuln-change-history-41-type">Reference</td>
<td data-testid="vuln-change-history-41-old">
</td>
<td data-testid="vuln-change-history-41-new">
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-42">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-42">12/13/2021 7:15:07 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-42">
<td
data-testid="vuln-change-history-42-action">Changed</td>
<td
data-testid="vuln-change-history-42-type">Description</td>
<td data-testid="vuln-change-history-42-old">
<strong data-testid="vuln-change-history-42-showing"
>Record truncated, showing 500 of 916 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/13/2021T19:15:07.230-0500">View Entire Change Record</a><br/>
<pre>Apache Log4j2 &lt;=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (&gt;2.10) this behavior can be mitigated by setting system property &quot;log4j2.formatM</pre>
</td>
<td data-testid="vuln-change-history-42-new">
<strong data-testid="vuln-change-history-42-showing"
>Record truncated, showing 500 of 716 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/13/2021T19:15:07.230-0500">View Entire Change Record</a><br />
<pre>Apache Log4j2 &lt;=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (&gt;2.10) this behavior can be mitigated by setting system property &quot;log4j2.formatM</pre>
</td>
</tr>
<tr data-testid="vuln-change-history-42">
<td
data-testid="vuln-change-history-42-action">Added</td>
<td
data-testid="vuln-change-history-42-type">Reference</td>
<td data-testid="vuln-change-history-42-old">
</td>
<td data-testid="vuln-change-history-42-new">
<pre style="word-break: break-all !important">https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-42">
<td
data-testid="vuln-change-history-42-action">Added</td>
<td
data-testid="vuln-change-history-42-type">Reference</td>
<td data-testid="vuln-change-history-42-old">
</td>
<td data-testid="vuln-change-history-42-new">
<pre style="word-break: break-all !important">https://twitter.com/kurtseifried/status/1469345530182455296 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-42">
<td
data-testid="vuln-change-history-42-action">Added</td>
<td
data-testid="vuln-change-history-42-type">Reference</td>
<td data-testid="vuln-change-history-42-old">
</td>
<td data-testid="vuln-change-history-42-new">
<pre style="word-break: break-all !important">https://www.debian.org/security/2021/dsa-5020 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-43">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-43">12/13/2021 5:15:07 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-43">
<td
data-testid="vuln-change-history-43-action">Added</td>
<td
data-testid="vuln-change-history-43-type">Reference</td>
<td data-testid="vuln-change-history-43-old">
</td>
<td data-testid="vuln-change-history-43-new">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/13/1 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-43">
<td
data-testid="vuln-change-history-43-action">Added</td>
<td
data-testid="vuln-change-history-43-type">Reference</td>
<td data-testid="vuln-change-history-43-old">
</td>
<td data-testid="vuln-change-history-43-new">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/13/2 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-44">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-44">12/13/2021 3:15:07 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-44">
<td
data-testid="vuln-change-history-44-action">Added</td>
<td
data-testid="vuln-change-history-44-type">Reference</td>
<td data-testid="vuln-change-history-44-old">
</td>
<td data-testid="vuln-change-history-44-new">
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/ [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-45">Initial Analysis by NIST</span> <span
data-testid="vuln-change-history-date-45">12/13/2021 10:00:11 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-45">
<td
data-testid="vuln-change-history-45-action">Added</td>
<td
data-testid="vuln-change-history-45-type">CVSS V3.1</td>
<td data-testid="vuln-change-history-45-old">
</td>
<td data-testid="vuln-change-history-45-new">
<pre style="word-break: break-all !important">NIST AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-45">
<td
data-testid="vuln-change-history-45-action">Added</td>
<td
data-testid="vuln-change-history-45-type">CVSS V2</td>
<td data-testid="vuln-change-history-45-old">
</td>
<td data-testid="vuln-change-history-45-new">
<pre style="word-break: break-all !important">NIST (AV:N/AC:M/Au:N/C:C/I:C/A:C)</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-45">
<td
data-testid="vuln-change-history-45-action">Added</td>
<td
data-testid="vuln-change-history-45-type">CWE</td>
<td data-testid="vuln-change-history-45-old">
</td>
<td data-testid="vuln-change-history-45-new">
<pre style="word-break: break-all !important">NIST CWE-502</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-45">
<td
data-testid="vuln-change-history-45-action">Added</td>
<td
data-testid="vuln-change-history-45-type">CPE Configuration</td>
<td data-testid="vuln-change-history-45-old">
</td>
<td data-testid="vuln-change-history-45-new">
<pre style="word-break: break-all !important">OR
*cpe:2.3:a:apache:log4j:2.0:-:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:2.0:beta9:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:2.0:rc1:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:2.0:rc2:*:*:*:*:*:*
*cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:* versions from (including) 2.0.1 up to (excluding) 2.15.0</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-45">
<td
data-testid="vuln-change-history-45-action">Changed</td>
<td
data-testid="vuln-change-history-45-type">Reference Type</td>
<td data-testid="vuln-change-history-45-old">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-45-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html Third Party Advisory, VDB Entry</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-45">
<td
data-testid="vuln-change-history-45-action">Changed</td>
<td
data-testid="vuln-change-history-45-type">Reference Type</td>
<td data-testid="vuln-change-history-45-old">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/10/1 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-45-new">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/10/1 Mailing List, Mitigation, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-45">
<td
data-testid="vuln-change-history-45-action">Changed</td>
<td
data-testid="vuln-change-history-45-type">Reference Type</td>
<td data-testid="vuln-change-history-45-old">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/10/2 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-45-new">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/10/2 Mailing List, Mitigation, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-45">
<td
data-testid="vuln-change-history-45-action">Changed</td>
<td
data-testid="vuln-change-history-45-type">Reference Type</td>
<td data-testid="vuln-change-history-45-old">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/10/3 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-45-new">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/10/3 Mailing List, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-45">
<td
data-testid="vuln-change-history-45-action">Changed</td>
<td
data-testid="vuln-change-history-45-type">Reference Type</td>
<td data-testid="vuln-change-history-45-old">
<pre style="word-break: break-all !important">https://logging.apache.org/log4j/2.x/security.html No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-45-new">
<pre style="word-break: break-all !important">https://logging.apache.org/log4j/2.x/security.html Release Notes, Vendor Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-45">
<td
data-testid="vuln-change-history-45-action">Changed</td>
<td
data-testid="vuln-change-history-45-type">Reference Type</td>
<td data-testid="vuln-change-history-45-old">
<pre style="word-break: break-all !important">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-45-new">
<pre style="word-break: break-all !important">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032 Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-45">
<td
data-testid="vuln-change-history-45-action">Changed</td>
<td
data-testid="vuln-change-history-45-type">Reference Type</td>
<td data-testid="vuln-change-history-45-old">
<pre style="word-break: break-all !important">https://security.netapp.com/advisory/ntap-20211210-0007/ No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-45-new">
<pre style="word-break: break-all !important">https://security.netapp.com/advisory/ntap-20211210-0007/ Vendor Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-45">
<td
data-testid="vuln-change-history-45-action">Changed</td>
<td
data-testid="vuln-change-history-45-type">Reference Type</td>
<td data-testid="vuln-change-history-45-old">
<pre style="word-break: break-all !important">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-45-new">
<pre style="word-break: break-all !important">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-45">
<td
data-testid="vuln-change-history-45-action">Changed</td>
<td
data-testid="vuln-change-history-45-type">Reference Type</td>
<td data-testid="vuln-change-history-45-old">
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/alert-cve-2021-44228.html No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-45-new">
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/alert-cve-2021-44228.html Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-46">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-46">12/13/2021 7:15:07 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-46">
<td
data-testid="vuln-change-history-46-action">Changed</td>
<td
data-testid="vuln-change-history-46-type">Description</td>
<td data-testid="vuln-change-history-46-old">
<strong data-testid="vuln-change-history-46-showing"
>Record truncated, showing 500 of 716 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/13/2021T07:15:07.637-0500">View Entire Change Record</a><br/>
<pre>Apache Log4j2 &lt;=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (&gt;2.10) this behavior can be mitigated by setting system property &quot;log4j2.formatM</pre>
</td>
<td data-testid="vuln-change-history-46-new">
<strong data-testid="vuln-change-history-46-showing"
>Record truncated, showing 500 of 916 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/13/2021T07:15:07.637-0500">View Entire Change Record</a><br />
<pre>Apache Log4j2 &lt;=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (&gt;2.10) this behavior can be mitigated by setting system property &quot;log4j2.formatM</pre>
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-47">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-47">12/13/2021 6:15:10 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-47">
<td
data-testid="vuln-change-history-47-action">Added</td>
<td
data-testid="vuln-change-history-47-type">Reference</td>
<td data-testid="vuln-change-history-47-old">
</td>
<td data-testid="vuln-change-history-47-new">
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/alert-cve-2021-44228.html [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-48">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-48">12/12/2021 12:15:07 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-48">
<td
data-testid="vuln-change-history-48-action">Changed</td>
<td
data-testid="vuln-change-history-48-type">Description</td>
<td data-testid="vuln-change-history-48-old">
<strong data-testid="vuln-change-history-48-showing"
>Record truncated, showing 500 of 916 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/12/2021T12:15:07.630-0500">View Entire Change Record</a><br/>
<pre>Apache Log4j2 &lt;=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (&gt;2.10) this behavior can be mitigated by setting system property &quot;log4j2.formatM</pre>
</td>
<td data-testid="vuln-change-history-48-new">
<strong data-testid="vuln-change-history-48-showing"
>Record truncated, showing 500 of 716 characters.</strong> <br/>
<a href="/vuln/detail/CVE-2021-44228/change-record?changeRecordedOn=12/12/2021T12:15:07.630-0500">View Entire Change Record</a><br />
<pre>Apache Log4j2 &lt;=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (&gt;2.10) this behavior can be mitigated by setting system property &quot;log4j2.formatM</pre>
</td>
</tr>
<tr data-testid="vuln-change-history-48">
<td
data-testid="vuln-change-history-48-action">Removed</td>
<td
data-testid="vuln-change-history-48-type">Reference</td>
<td data-testid="vuln-change-history-48-old">
<pre style="word-break: break-all !important">https://www.debian.org/security/2021/dsa-5020 [No Types Assigned]</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-48-new">
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-49">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-49">12/12/2021 6:15:08 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-49">
<td
data-testid="vuln-change-history-49-action">Added</td>
<td
data-testid="vuln-change-history-49-type">Reference</td>
<td data-testid="vuln-change-history-49-old">
</td>
<td data-testid="vuln-change-history-49-new">
<pre style="word-break: break-all !important">https://www.debian.org/security/2021/dsa-5020 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-50">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-50">12/11/2021 12:15:12 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-50">
<td
data-testid="vuln-change-history-50-action">Added</td>
<td
data-testid="vuln-change-history-50-type">Reference</td>
<td data-testid="vuln-change-history-50-old">
</td>
<td data-testid="vuln-change-history-50-new">
<pre style="word-break: break-all !important">https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-51">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-51">12/10/2021 5:15:08 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-51">
<td
data-testid="vuln-change-history-51-action">Added</td>
<td
data-testid="vuln-change-history-51-type">Reference</td>
<td data-testid="vuln-change-history-51-old">
</td>
<td data-testid="vuln-change-history-51-new">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/10/3 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-51">
<td
data-testid="vuln-change-history-51-action">Added</td>
<td
data-testid="vuln-change-history-51-type">Reference</td>
<td data-testid="vuln-change-history-51-old">
</td>
<td data-testid="vuln-change-history-51-new">
<pre style="word-break: break-all !important">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-52">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-52">12/10/2021 1:15:08 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-52">
<td
data-testid="vuln-change-history-52-action">Added</td>
<td
data-testid="vuln-change-history-52-type">Reference</td>
<td data-testid="vuln-change-history-52-old">
</td>
<td data-testid="vuln-change-history-52-new">
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-52">
<td
data-testid="vuln-change-history-52-action">Added</td>
<td
data-testid="vuln-change-history-52-type">Reference</td>
<td data-testid="vuln-change-history-52-old">
</td>
<td data-testid="vuln-change-history-52-new">
<pre style="word-break: break-all !important">https://security.netapp.com/advisory/ntap-20211210-0007/ [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-53">CVE Modified by Apache Software Foundation</span> <span
data-testid="vuln-change-history-date-53">12/10/2021 8:15:07 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-53">
<td
data-testid="vuln-change-history-53-action">Added</td>
<td
data-testid="vuln-change-history-53-type">Reference</td>
<td data-testid="vuln-change-history-53-old">
</td>
<td data-testid="vuln-change-history-53-new">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/10/1 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-53">
<td
data-testid="vuln-change-history-53-action">Added</td>
<td
data-testid="vuln-change-history-53-type">Reference</td>
<td data-testid="vuln-change-history-53-old">
</td>
<td data-testid="vuln-change-history-53-new">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2021/12/10/2 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
</div>
</div>
</div>
</div>
<div class="col-lg-3 col-md-5 col-sm-12">
<div class="bs-callout bs-callout-info">
<h4>Quick Info</h4>
<strong>CVE Dictionary Entry:</strong><br/> <a
target="_blank" rel="noopener noreferrer" data-testid="vuln-cve-dictionary-entry"
href="https://cve.org/CVERecord?id=CVE-2021-44228">CVE-2021-44228</a><br/> <strong>NVD
Published Date:</strong><br/> <span
data-testid="vuln-published-on">12/10/2021</span><br/> <strong>NVD
Last Modified:</strong><br/> <span
data-testid="vuln-last-modified-on">02/04/2025</span><br/> <strong>
Source:</strong><br/> <span
data-testid="vuln-current-description-source">Apache Software Foundation</span><br/>
</div>
</div>
</div>
</td>
</tr>
</table>
</div>
<!-- Hidden input for padding -->
<input type="hidden" value="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" id="padding" name="padding"/>
</div>
</div>
</div>
</main>
<footer id="footer" role="contentinfo">
<div class="container">
<div class="row">
<div class="col-sm-12">
<ul class="social-list pull-right">
<li class="field-item service-twitter list-horiz"><a
href="https://twitter.com/NISTCyber" target="_blank" rel="noopener noreferrer"
class="social-btn social-btn--large extlink ext"> <i
class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span
class="ext"><span class="element-invisible"> (link
is external)</span></span>
</a></li>
<li class="field-item service-facebook list-horiz"><a
href="https://www.facebook.com/NIST" target="_blank" rel="noopener noreferrer"
class="social-btn social-btn--large extlink ext"> <i
class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span
class="ext"><span class="element-invisible"> (link
is external)</span></span></a></li>
<li class="field-item service-linkedin list-horiz"><a
href="https://www.linkedin.com/company/nist" target="_blank" rel="noopener noreferrer"
class="social-btn social-btn--large extlink ext"> <i
class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span
class="ext"><span class="element-invisible"> (link
is external)</span></span></a></li>
<li class="field-item service-youtube list-horiz"><a
href="https://www.youtube.com/user/USNISTGOV" target="_blank" rel="noopener noreferrer"
class="social-btn social-btn--large extlink ext"> <i
class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span
class="ext"><span class="element-invisible"> (link
is external)</span></span></a></li>
<li class="field-item service-rss list-horiz"><a
href="https://www.nist.gov/news-events/nist-rss-feeds"
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink">
<i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i>
</a></li>
<li class="field-item service-govdelivery list-horiz last"><a
href="https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3"
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink ext">
<i class="fa fa-envelope fa-fw"><span
class="element-invisible">govdelivery</span></i><span class="ext"><span
class="element-invisible"> (link is external)</span></span>
</a></li>
</ul>
<span class="hidden-xs"> <a
title="National Institute of Standards and Technology" rel="home"
class="footer-nist-logo"> <img
src="/site-media/images/nist/nist-logo.png"
alt="National Institute of Standards and Technology logo" />
</a>
</span>
</div>
</div>
<div class="row hidden-sm hidden-md hidden-lg">
<div class="col-sm-12">
<a href="https://www.nist.gov"
title="National Institute of Standards and Technology" rel="home"
target="_blank" rel="noopener noreferrer" class="footer-nist-logo"> <img
src="/site-media/images/nist/nist-logo.png"
alt="National Institute of Standards and Technology logo" />
</a>
</div>
</div>
<div class="row footer-contact-container">
<div class="col-sm-6">
<strong>HEADQUARTERS</strong>
<br>
100 Bureau Drive
<br>
Gaithersburg, MD 20899
<br>
<a href="tel:301-975-2000">(301) 975-2000</a>
<br>
<br>
<a href="mailto:nvd@nist.gov">Webmaster</a> | <a
href="https://www.nist.gov/about-nist/contact-us">Contact Us</a>
| <a href="https://www.nist.gov/about-nist/visit"
style="display: inline-block;">Our Other Offices</a>
</div>
<div class="col-sm-6">
<div class="pull-right"
style="text-align:right">
<strong>Incident Response Assistance and Non-NVD Related<br>Technical Cyber Security Questions:</strong>
<br>
US-CERT Security Operations Center
<br> Email: <a href="mailto:soc@us-cert.gov">soc@us-cert.gov</a>
<br> Phone: 1-888-282-0870
</div>
</div>
</div>
<div class="row">
<nav title="Footer Navigation" role="navigation"
class="row footer-bottom-links-container">
<!-- https://github.com/usnistgov/nist-header-footer/blob/nist-pages/boilerplate-footer.html -->
<p>
<a href="https://www.nist.gov/oism/site-privacy">Site Privacy</a>
|
<a href="https://www.nist.gov/oism/accessibility">Accessibility</a>
|
<a href="https://www.nist.gov/privacy">Privacy Program</a>
|
<a href="https://www.nist.gov/oism/copyrights">Copyrights</a>
|
<a href="https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a>
|
<a href="https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a>
|
<a href="https://www.nist.gov/foia">FOIA</a>
|
<a href="https://www.nist.gov/environmental-policy-statement">Environmental Policy</a>
|
<a href="https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a>
|
<a href="https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a>
|
<a href="https://www.commerce.gov/">Commerce.gov</a>
|
<a href="https://www.science.gov/">Science.gov</a>
|
<a href="https://www.usa.gov/">USA.gov</a>
</p>
</nav>
</div>
</div>
</footer>
</body>
</html>