Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
|
Configuration 9 (hide)
|
Configuration 10 (hide)
|
Configuration 11 (hide)
|
Configuration 12 (hide)
|
Configuration 13 (hide)
|
Configuration 14 (hide)
|
Configuration 15 (hide)
AND |
|
Configuration 16 (hide)
|
Configuration 17 (hide)
|
Configuration 18 (hide)
|
Configuration 19 (hide)
|
Configuration 20 (hide)
|
03 Apr 2025, 20:53
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:siemens:captial:2019.1:sp1912:*:*:*:*:*:* cpe:2.3:a:siemens:siguard_dsa:4.2:*:*:*:*:*:*:* cpe:2.3:a:siemens:captial:2019.1:-:*:*:*:*:*:* cpe:2.3:a:siemens:siguard_dsa:4.3:*:*:*:*:*:*:* cpe:2.3:a:intel:data_center_manager:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:siguard_dsa:4.4:*:*:*:*:*:*:* cpe:2.3:a:siemens:captial:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:energyip_prepay:3.7:*:*:*:*:*:*:* cpe:2.3:a:siemens:energyip_prepay:3.8:*:*:*:*:*:*:* cpe:2.3:a:intel:system_debugger:-:*:*:*:*:*:*:* cpe:2.3:a:intel:audio_development_kit:-:*:*:*:*:*:*:* |
cpe:2.3:a:siemens:siguard_dsa:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:capital:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:capital:2019.1:-:*:*:*:*:*:* cpe:2.3:h:siemens:6bk1602-0aa42-0tp0:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:6bk1602-0aa22-0tp0_firmware:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:vesys:2020.1:-:*:*:*:*:*:* cpe:2.3:o:siemens:6bk1602-0aa42-0tp0_firmware:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:vesys:2021.1:-:*:*:*:*:*:* cpe:2.3:o:siemens:6bk1602-0aa52-0tp0_firmware:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:energyip_prepay:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:desigo_cc_advanced_reports:3.0:*:*:*:*:*:*:* cpe:2.3:h:siemens:6bk1602-0aa12-0tp0:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:solidfire_enterprise_sds:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:6bk1602-0aa32-0tp0_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:6bk1602-0aa32-0tp0:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:solidfire_\&_hci_storage_node:-:*:*:*:*:*:*:* cpe:2.3:a:intel:datacenter_manager:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:capital:2019.1:sp1912:*:*:*:*:*:* cpe:2.3:h:siemens:6bk1602-0aa22-0tp0:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:6bk1602-0aa12-0tp0_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:6bk1602-0aa52-0tp0:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:brocade_san_navigator:-:*:*:*:*:*:*:* |
First Time |
Netapp brocade San Navigator
Netapp solidfire \& Hci Storage Node Siemens 6bk1602-0aa42-0tp0 Firmware Siemens 6bk1602-0aa42-0tp0 Siemens 6bk1602-0aa12-0tp0 Siemens 6bk1602-0aa12-0tp0 Firmware Siemens 6bk1602-0aa52-0tp0 Intel datacenter Manager Siemens 6bk1602-0aa32-0tp0 Siemens 6bk1602-0aa32-0tp0 Firmware Siemens 6bk1602-0aa52-0tp0 Firmware Siemens capital Siemens 6bk1602-0aa22-0tp0 Siemens 6bk1602-0aa22-0tp0 Firmware Netapp solidfire Enterprise Sds |
|
References | () http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html - Third Party Advisory, VDB Entry, Broken Link |
21 Nov 2024, 06:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html - Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165260/VMware-Security-Advisory-2021-0028.html - Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165261/Apache-Log4j2-2.14.1-Information-Disclosure.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165270/Apache-Log4j2-2.14.1-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165281/Log4j2-Log4Shell-Regexes.html - Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165282/Log4j-Payload-Generator.html - Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165306/L4sh-Log4j-Remote-Code-Execution.html - Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165307/Log4j-Remote-Code-Execution-Word-Bypassing.html - Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165311/log4j-scan-Extensive-Scanner.html - Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html - Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/167917/MobileIron-Log4Shell-Remote-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html - Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2022/Dec/2Â - Exploit, Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2022/Jul/11Â - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2022/Mar/23Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2021/12/10/1Â - Mailing List, Mitigation, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2021/12/10/2Â - Mailing List, Mitigation, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2021/12/10/3Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2021/12/13/1Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2021/12/13/2Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2021/12/14/4Â - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2021/12/15/3Â - Mailing List, Third Party Advisory | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf - Third Party Advisory | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf - Third Party Advisory | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf - Third Party Advisory | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf - Third Party Advisory | |
References | () https://github.com/cisagov/log4j-affected-db - Third Party Advisory | |
References | () https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md - Broken Link, Product, US Government Resource | |
References | () https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-44228Â - Exploit, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/12/msg00007.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/Â - Release Notes | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/Â - Release Notes | |
References | () https://logging.apache.org/log4j/2.x/security.html - Release Notes, Vendor Advisory | |
References | () https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/Â - Patch, Third Party Advisory, Vendor Advisory | |
References | () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032Â - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20211210-0007/Â - Third Party Advisory | |
References | () https://support.apple.com/kb/HT213189Â - Third Party Advisory | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd - Third Party Advisory | |
References | () https://twitter.com/kurtseifried/status/1469345530182455296Â - Broken Link, Exploit, Third Party Advisory | |
References | () https://www.bentley.com/en/common-vulnerability-exposure/be-2022-0001Â - Third Party Advisory | |
References | () https://www.debian.org/security/2021/dsa-5020Â - Mailing List, Third Party Advisory | |
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html - Third Party Advisory | |
References | () https://www.kb.cert.org/vuls/id/930724Â - Third Party Advisory, US Government Resource | |
References | () https://www.nu11secur1ty.com/2021/12/cve-2021-44228.html - Exploit, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/alert-cve-2021-44228.html - Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory |
24 Jul 2024, 17:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/165371/VMware-Security-Advisory-2021-0028.4.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165532/Log4Shell-HTTP-Header-Injection.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165642/VMware-vCenter-Server-Unauthenticated-Log4Shell-JNDI-Injection-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165673/UniFi-Network-Application-Unauthenticated-Log4Shell-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/171626/AD-Manager-Plus-7122-Remote-Code-Execution.html - Third Party Advisory, VDB Entry | |
References | () https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md - Broken Link, Product, US Government Resource | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M5CSVUNV4HWZZXGOKNSK6L7RPM7BOKIB/Â - Release Notes | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU57UJDCFIASIO35GC55JMKSRXJMCDFM/Â - Release Notes | |
References | () https://security.netapp.com/advisory/ntap-20211210-0007/Â - Third Party Advisory | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd - Third Party Advisory | |
References | () https://twitter.com/kurtseifried/status/1469345530182455296Â - Broken Link, Exploit, Third Party Advisory | |
References | () https://www.debian.org/security/2021/dsa-5020Â - Mailing List, Third Party Advisory | |
CPE | cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:* | |
First Time |
Apple
Apple xcode |
07 Nov 2023, 03:39
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd - Third Party Advisory |
03 Apr 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Published : 2021-12-10 10:15
Updated : 2025-04-03 20:53
NVD link : CVE-2021-44228
Mitre link : CVE-2021-44228
CVE.ORG link : CVE-2021-44228
JSON object : View
siemens
- logo\!_soft_comfort
- energy_engage
- industrial_edge_management_hub
- mindsphere
- 6bk1602-0aa22-0tp0_firmware
- industrial_edge_management
- sentron_powermanager
- 6bk1602-0aa32-0tp0
- xpedition_package_integrator
- mendix
- nx
- opcenter_intelligence
- teamcenter
- sppa-t3000_ses3000_firmware
- comos
- siguard_dsa
- sppa-t3000_ses3000
- xpedition_enterprise
- 6bk1602-0aa22-0tp0
- siveillance_identity
- 6bk1602-0aa12-0tp0
- siveillance_command
- navigator
- siveillance_control_pro
- gma-manager
- spectrum_power_4
- 6bk1602-0aa32-0tp0_firmware
- energyip_prepay
- siveillance_viewpoint
- desigo_cc_info_center
- desigo_cc_advanced_reports
- solid_edge_cam_pro
- capital
- spectrum_power_7
- e-car_operation_center
- 6bk1602-0aa42-0tp0_firmware
- energyip
- 6bk1602-0aa42-0tp0
- head-end_system_universal_device_integration_system
- sipass_integrated
- 6bk1602-0aa12-0tp0_firmware
- siveillance_vantage
- 6bk1602-0aa52-0tp0_firmware
- operation_scheduler
- 6bk1602-0aa52-0tp0
- solid_edge_harness_design
- vesys
debian
- debian_linux
cisco
- video_surveillance_manager
- cyber_vision_sensor_management_extension
- network_dashboard_fabric_controller
- firepower_2140
- connected_analytics_for_network_deployment
- crosswork_platform_infrastructure
- network_insights_for_data_center
- firepower_4120
- broadworks
- ucs_central
- crosswork_network_controller
- intersight_virtual_appliance
- video_surveillance_operations_manager
- firepower_9300
- crosswork_network_automation
- dna_spaces
- business_process_automation
- unified_communications_manager_im_and_presence_service
- unified_customer_voice_portal
- unified_workforce_optimization
- firepower_2130
- paging_server
- firepower_4115
- virtual_topology_system
- fxos
- virtualized_infrastructure_manager
- unified_computing_system
- firepower_4110
- firepower_4125
- firepower_1150
- contact_center_management_portal
- firepower_4145
- finesse
- webex_meetings_server
- common_services_platform_collector
- firepower_4112
- cloudcenter_workload_manager
- connected_mobile_experiences
- cloudcenter_suite_admin
- nexus_insights
- dna_center
- network_services_orchestrator
- cloud_connect
- firepower_1140
- unified_communications_manager
- firepower_1120
- firepower_4150
- packaged_contact_center_enterprise
- data_center_network_manager
- crosswork_optimization_engine
- cloudcenter_suite
- advanced_malware_protection_virtual_private_cloud_appliance
- integrated_management_controller_supervisor
- cloudcenter
- ucs_central_software
- workload_optimization_manager
- network_assurance_engine
- unified_sip_proxy
- cloudcenter_cost_optimizer
- unity_connection
- ucs_director
- dna_spaces_connector
- wan_automation_engine
- enterprise_chat_and_email
- firepower_1010
- firepower_threat_defense
- unified_contact_center_express
- firepower_2110
- customer_experience_cloud_agent
- evolved_programmable_network_manager
- sd-wan_vmanage
- identity_services_engine
- automated_subsea_tuning
- contact_center_domain_manager
- unified_contact_center_management_portal
- emergency_responder
- fog_director
- unified_contact_center_enterprise
- nexus_dashboard
- smart_phy
- unified_intelligence_center
- optical_network_controller
- dna_spaces\
- iot_operations_dashboard
- firepower_4140
- cx_cloud_agent
- crosswork_zero_touch_provisioning
- firepower_2120
- cyber_vision
- prime_service_catalog
- virtualized_voice_browser
- mobility_services_engine
- unified_communications_manager_im_\&_presence_service
- crosswork_data_gateway
intel
- computer_vision_annotation_tool
- secure_device_onboard
- oneapi_sample_browser
- datacenter_manager
- system_studio
- genomics_kernel_library
netapp
- snapcenter
- brocade_san_navigator
- cloud_secure_agent
- active_iq_unified_manager
- solidfire_\&_hci_storage_node
- solidfire_enterprise_sds
- cloud_manager
- cloud_insights
- ontap_tools
- oncommand_insight
sonicwall
- email_security
snowsoftware
- snow_commander
- vm_access_proxy
fedoraproject
- fedora
bentley
- synchro
- synchro_4d
percussion
- rhythmyx
apache
- log4j
apple
- xcode