Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
|
Configuration 9 (hide)
|
Configuration 10 (hide)
|
Configuration 11 (hide)
|
Configuration 12 (hide)
|
Configuration 13 (hide)
|
Configuration 14 (hide)
|
Configuration 15 (hide)
AND |
|
Configuration 16 (hide)
|
Configuration 17 (hide)
|
Configuration 18 (hide)
|
Configuration 19 (hide)
|
Configuration 20 (hide)
|
03 Apr 2025, 20:53
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:siemens:energyip_prepay:3.7:*:*:*:*:*:*:* cpe:2.3:a:intel:audio_development_kit:-:*:*:*:*:*:*:* cpe:2.3:a:siemens:captial:2019.1:sp1912:*:*:*:*:*:* cpe:2.3:a:siemens:captial:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:captial:2019.1:-:*:*:*:*:*:* cpe:2.3:a:siemens:energyip_prepay:3.8:*:*:*:*:*:*:* cpe:2.3:a:intel:data_center_manager:*:*:*:*:*:*:*:* cpe:2.3:a:intel:system_debugger:-:*:*:*:*:*:*:* cpe:2.3:a:siemens:siguard_dsa:4.4:*:*:*:*:*:*:* cpe:2.3:a:intel:sensor_solution_firmware_development_kit:-:*:*:*:*:*:*:* cpe:2.3:a:siemens:siguard_dsa:4.3:*:*:*:*:*:*:* |
cpe:2.3:a:netapp:solidfire_enterprise_sds:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:6bk1602-0aa52-0tp0:-:*:*:*:*:*:*:* cpe:2.3:a:siemens:vesys:2020.1:-:*:*:*:*:*:* cpe:2.3:o:siemens:6bk1602-0aa12-0tp0_firmware:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:siguard_dsa:*:*:*:*:*:*:*:* cpe:2.3:a:intel:datacenter_manager:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:6bk1602-0aa42-0tp0_firmware:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:capital:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:6bk1602-0aa32-0tp0_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:6bk1602-0aa12-0tp0:-:*:*:*:*:*:*:* cpe:2.3:a:siemens:vesys:2021.1:-:*:*:*:*:*:* cpe:2.3:a:siemens:desigo_cc_advanced_reports:3.0:*:*:*:*:*:*:* cpe:2.3:a:siemens:capital:2019.1:sp1912:*:*:*:*:*:* cpe:2.3:a:netapp:brocade_san_navigator:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:6bk1602-0aa42-0tp0:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:solidfire_\&_hci_storage_node:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:6bk1602-0aa32-0tp0:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:6bk1602-0aa52-0tp0_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:6bk1602-0aa22-0tp0:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:6bk1602-0aa22-0tp0_firmware:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:capital:2019.1:-:*:*:*:*:*:* cpe:2.3:a:siemens:energyip_prepay:*:*:*:*:*:*:*:* |
References | () http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html - Third Party Advisory, VDB Entry, Broken Link | |
First Time |
Siemens 6bk1602-0aa32-0tp0 Firmware
Siemens 6bk1602-0aa32-0tp0 Intel datacenter Manager Siemens 6bk1602-0aa42-0tp0 Netapp solidfire \& Hci Storage Node Siemens 6bk1602-0aa42-0tp0 Firmware Siemens 6bk1602-0aa12-0tp0 Firmware Siemens 6bk1602-0aa52-0tp0 Siemens 6bk1602-0aa12-0tp0 Siemens 6bk1602-0aa22-0tp0 Siemens 6bk1602-0aa52-0tp0 Firmware Siemens capital Netapp brocade San Navigator Netapp solidfire Enterprise Sds Siemens 6bk1602-0aa22-0tp0 Firmware |
21 Nov 2024, 06:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html - Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html - Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html - Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html - Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html - Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html - Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html - Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html - Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html - Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2022/Dec/2Â - Exploit, Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2022/Jul/11Â - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2022/Mar/23Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2021/12/10/1Â - Mailing List, Mitigation, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2021/12/10/2Â - Mailing List, Mitigation, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2021/12/10/3Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2021/12/13/1Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2021/12/13/2Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2021/12/14/4Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2021/12/15/3Â - Mailing List, Third Party Advisory | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf - Third Party Advisory | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf - Third Party Advisory | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf - Third Party Advisory | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf - Third Party Advisory | |
References | () https://github.com/cisagov/log4j-affected-db - Third Party Advisory | |
References | () https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md - Broken Link, Product, US Government Resource | |
References | () https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228Â - Exploit, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/Â - Release Notes | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/Â - Release Notes | |
References | () https://logging.apache.org/log4j/2.x/security.html - Release Notes, Vendor Advisory | |
References | () https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/Â - Patch, Third Party Advisory, Vendor Advisory | |
References | () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032Â - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20211210-0007/Â - Third Party Advisory | |
References | () https://support.apple.com/kb/HT213189Â - Third Party Advisory | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd - Third Party Advisory | |
References | () https://twitter.com/kurtseifried/status/1469345530182455296Â - Broken Link, Exploit, Third Party Advisory | |
References | () https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001Â - Third Party Advisory | |
References | () https://www.debian.org/security/2021/dsa-5020Â - Mailing List, Third Party Advisory | |
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html - Third Party Advisory | |
References | () https://www.kb.cert.org/vuls/id/930724Â - Third Party Advisory, US Government Resource | |
References | () https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html - Exploit, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/alert-cve-2021-44228.html - Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory |
24 Jul 2024, 17:08
Type | Values Removed | Values Added |
---|---|---|
First Time |
Apple
Apple xcode |
|
CPE | cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:* | |
References | () http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html - Third Party Advisory, VDB Entry | |
References | () https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md - Broken Link, Product, US Government Resource | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/Â - Release Notes | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/Â - Release Notes | |
References | () https://security.netapp.com/advisory/ntap-20211210-0007/Â - Third Party Advisory | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd - Third Party Advisory | |
References | () https://twitter.com/kurtseifried/status/1469345530182455296Â - Broken Link, Exploit, Third Party Advisory | |
References | () https://www.debian.org/security/2021/dsa-5020Â - Mailing List, Third Party Advisory |
Published : 2021-12-10 10:15
Updated : 2025-04-03 20:53
NVD link : CVE-2021-44228
Mitre link : CVE-2021-44228
CVE.ORG link : CVE-2021-44228
JSON object : View
cisco
- fxos
- cloudcenter_suite_admin
- common_services_platform_collector
- firepower_2120
- contact_center_management_portal
- connected_analytics_for_network_deployment
- emergency_responder
- firepower_4140
- firepower_1010
- workload_optimization_manager
- cx_cloud_agent
- video_surveillance_manager
- dna_center
- network_services_orchestrator
- crosswork_zero_touch_provisioning
- virtualized_infrastructure_manager
- fog_director
- advanced_malware_protection_virtual_private_cloud_appliance
- automated_subsea_tuning
- firepower_4110
- firepower_4112
- video_surveillance_operations_manager
- unified_intelligence_center
- contact_center_domain_manager
- identity_services_engine
- unified_contact_center_management_portal
- enterprise_chat_and_email
- webex_meetings_server
- crosswork_data_gateway
- paging_server
- unified_computing_system
- firepower_4125
- network_assurance_engine
- nexus_insights
- cloudcenter_cost_optimizer
- firepower_4120
- ucs_central
- connected_mobile_experiences
- ucs_director
- firepower_4150
- dna_spaces\
- cyber_vision_sensor_management_extension
- business_process_automation
- firepower_4145
- broadworks
- unified_communications_manager_im_and_presence_service
- unity_connection
- firepower_2110
- crosswork_network_controller
- firepower_1150
- cyber_vision
- data_center_network_manager
- prime_service_catalog
- network_dashboard_fabric_controller
- integrated_management_controller_supervisor
- mobility_services_engine
- sd-wan_vmanage
- firepower_1120
- evolved_programmable_network_manager
- firepower_9300
- intersight_virtual_appliance
- unified_contact_center_express
- unified_contact_center_enterprise
- smart_phy
- dna_spaces
- unified_sip_proxy
- wan_automation_engine
- iot_operations_dashboard
- firepower_4115
- crosswork_platform_infrastructure
- network_insights_for_data_center
- cloudcenter
- finesse
- nexus_dashboard
- unified_customer_voice_portal
- firepower_2140
- crosswork_network_automation
- cloudcenter_suite
- firepower_2130
- packaged_contact_center_enterprise
- unified_workforce_optimization
- unified_communications_manager_im_\&_presence_service
- customer_experience_cloud_agent
- optical_network_controller
- firepower_threat_defense
- unified_communications_manager
- firepower_1140
- virtualized_voice_browser
- ucs_central_software
- dna_spaces_connector
- crosswork_optimization_engine
- cloudcenter_workload_manager
- virtual_topology_system
- cloud_connect
intel
- computer_vision_annotation_tool
- genomics_kernel_library
- secure_device_onboard
- system_studio
- datacenter_manager
- oneapi_sample_browser
siemens
- solid_edge_cam_pro
- mendix
- teamcenter
- siveillance_identity
- nx
- 6bk1602-0aa12-0tp0_firmware
- siguard_dsa
- sipass_integrated
- 6bk1602-0aa32-0tp0
- energyip_prepay
- desigo_cc_info_center
- xpedition_package_integrator
- vesys
- solid_edge_harness_design
- 6bk1602-0aa42-0tp0_firmware
- opcenter_intelligence
- e-car_operation_center
- sppa-t3000_ses3000
- sppa-t3000_ses3000_firmware
- 6bk1602-0aa52-0tp0
- logo\!_soft_comfort
- energy_engage
- siveillance_command
- siveillance_viewpoint
- 6bk1602-0aa12-0tp0
- spectrum_power_4
- navigator
- comos
- head-end_system_universal_device_integration_system
- xpedition_enterprise
- spectrum_power_7
- 6bk1602-0aa22-0tp0_firmware
- gma-manager
- energyip
- 6bk1602-0aa42-0tp0
- industrial_edge_management
- mindsphere
- 6bk1602-0aa52-0tp0_firmware
- siveillance_vantage
- 6bk1602-0aa32-0tp0_firmware
- sentron_powermanager
- industrial_edge_management_hub
- 6bk1602-0aa22-0tp0
- desigo_cc_advanced_reports
- siveillance_control_pro
- operation_scheduler
- capital
netapp
- cloud_secure_agent
- cloud_manager
- active_iq_unified_manager
- solidfire_enterprise_sds
- solidfire_\&_hci_storage_node
- snapcenter
- brocade_san_navigator
- ontap_tools
- cloud_insights
- oncommand_insight
apple
- xcode
fedoraproject
- fedora
bentley
- synchro
- synchro_4d
debian
- debian_linux
snowsoftware
- snow_commander
- vm_access_proxy
percussion
- rhythmyx
sonicwall
- email_security
apache
- log4j