CVE-2021-40438

Scores

EPSS Score

0.9443

CVSS

3.x 9.0

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

All CVSS Scores

CVSS 4.0
0.0
CVSS 3.x
9.0

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

CVSS 2.0
6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Description

A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.

Sources

astradebiannvdredhatubuntu

CWEs

CWE-918

Related Vulnerabilities

Exploits

Exploit ID: CVE-2021-40438

Source: github-poc

URL: https://github.com/Cappricio-Securities/CVE-2021-40438

Reference Links

Vulnerable Software

Type: Configuration

Product: apache2

Operating System: ubuntu trusty 14.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: apache2

Operating System: ubuntu focal 20.04

Trait:
{
  "fixed": "2.4.41-4ubuntu3.6"
}

Source: ubuntu

Type: Configuration

Product: apache2

Operating System: ubuntu xenial 16.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: apache2

Operating System: astra 1.6.10

Trait:
{
  "unaffected": true
}

Source: astra

Type: Configuration

Product: apache2

Operating System: astra 1.6.10

Trait:
{
  "unaffected": true
}

Source: astra

Type: Configuration

Product: apache2

Operating System: ubuntu bionic 18.04

Trait:
{
  "fixed": "2.4.29-1ubuntu4.18"
}

Source: ubuntu

Type: Configuration

Product: apache2

Operating System: debian

Trait:
{
  "fixed": "2.4.49-1"
}

Source: debian

Type: Configuration

Product: apache2

Operating System: ubuntu hirsute 21.04

Trait:
{
  "fixed": "2.4.46-4ubuntu1.3"
}

Source: ubuntu

Type: Configuration

Product: apache2

Operating System: ubuntu impish 21.10

Trait:
{
  "fixed": "2.4.48-3.1ubuntu2"
}

Source: ubuntu

Type: Configuration

Product: apache2

Operating System: ubuntu jammy 22.04

Trait:
{
  "fixed": "2.4.48-3.1ubuntu2"
}

Source: ubuntu

Type: Configuration

Product: httpd

Operating System: rhel 7

Trait:
{
  "fixed": "2.4.6-97.el7_9.1"
}

Source: redhat

Type: Configuration

Product: httpd

Operating System: rhel 7.2

Trait:
{
  "fixed": "2.4.6-40.el7_2.7"
}

Source: redhat

Type: Configuration

Product: httpd

Operating System: rhel 7.3

Trait:
{
  "fixed": "2.4.6-45.el7_3.6"
}

Source: redhat

Type: Configuration

Product: httpd

Operating System: rhel 7.4

Trait:
{
  "fixed": "2.4.6-67.el7_4.7"
}

Source: redhat

Type: Configuration

Product: httpd

Operating System: rhel 7.6

Trait:
{
  "fixed": "2.4.6-89.el7_6.2"
}

Source: redhat

Type: Configuration

Product: httpd

Operating System: rhel 7.6

Trait:
{
  "fixed": "2.4.6-89.el7_6.2"
}

Source: redhat

Type: Configuration

Product: httpd

Operating System: rhel 7.6

Trait:
{
  "fixed": "2.4.6-89.el7_6.2"
}

Source: redhat

Type: Configuration

Product: httpd

Operating System: rhel 7.7

Trait:
{
  "fixed": "2.4.6-90.el7_7.1"
}

Source: redhat

Type: Configuration

Product: httpd

Operating System: rhel 7.7

Trait:
{
  "fixed": "2.4.6-90.el7_7.1"
}

Source: redhat

Type: Configuration

Product: httpd

Operating System: rhel

Trait:
{
  "fixed": "2.4-8040020211008164252.522a0ee4"
}

Source: redhat

Type: Configuration

Product: httpd

Operating System: rhel

Trait:
{
  "fixed": "2.4-8020020211008164029.4cda2c84"
}

Source: redhat

Type: Configuration

Product: httpd

Operating System: rhel 7.7

Trait:
{
  "fixed": "2.4.6-90.el7_7.1"
}

Source: redhat

Type: Configuration

Product: httpd

Operating System: rhel

Trait:
{
  "fixed": "2.4-8010020211008125020.c27ad7f8"
}

Source: redhat

Type: Configuration

Product: httpd24-httpd

Operating System: rhel

Trait:
{
  "fixed": "2.4.34-22.el7.1"
}

Source: redhat

Type: Configuration

Product: jbcs-httpd24-httpd

Operating System: rhel

Trait:
{
  "fixed": "2.4.37-76.el8jbcs"
}

Source: redhat

Type: Configuration

Product: jbcs-httpd24-httpd

Operating System: rhel

Trait:
{
  "fixed": "2.4.37-76.jbcs.el7"
}

Source: redhat

Type: Configuration

Product: jbcs-httpd24-mod_cluster-native

Operating System: rhel

Trait:
{
  "fixed": "1.3.16-7.Final_redhat_2.el8jbcs"
}

Source: redhat

Type: Configuration

Product: jbcs-httpd24-mod_cluster-native

Operating System: rhel

Trait:
{
  "fixed": "1.3.16-7.Final_redhat_2.jbcs.el7"
}

Source: redhat

Type: Configuration

Product: jbcs-httpd24-mod_http2

Operating System: rhel

Trait:
{
  "fixed": "1.15.7-19.el8jbcs"
}

Source: redhat

Type: Configuration

Product: jbcs-httpd24-mod_http2

Operating System: rhel

Trait:
{
  "fixed": "1.15.7-19.jbcs.el7"
}

Source: redhat

Type: Configuration

Product: jbcs-httpd24-mod_jk

Operating System: rhel

Trait:
{
  "fixed": "1.2.48-18.redhat_1.el8jbcs"
}

Source: redhat

Type: Configuration

Product: jbcs-httpd24-mod_jk

Operating System: rhel

Trait:
{
  "fixed": "1.2.48-18.redhat_1.jbcs.el7"
}

Source: redhat

Type: Configuration

Product: jbcs-httpd24-mod_md

Operating System: rhel

Trait:
{
  "fixed": "2.0.8-38.el8jbcs"
}

Source: redhat

Type: Configuration

Product: jbcs-httpd24-mod_md

Operating System: rhel

Trait:
{
  "fixed": "2.0.8-38.jbcs.el7"
}

Source: redhat

Type: Configuration

Product: jbcs-httpd24-mod_security

Operating System: rhel

Trait:
{
  "fixed": "2.9.2-65.GA.el8jbcs"
}

Source: redhat

Type: Configuration

Product: jbcs-httpd24-mod_security

Operating System: rhel

Trait:
{
  "fixed": "2.9.2-65.GA.jbcs.el7"
}

Source: redhat

Type: Configuration

Vendor: apache

Product: http_server

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.48",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: broadcom

Product: brocade_fabric_operating_system_firmware

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: debian

Product: debian_linux

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: f5

Product: f5os

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:o:f5:f5os:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.1.4",
      "versionStartIncluding": "1.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:f5:f5os:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.2.1",
      "versionStartIncluding": "1.2.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: fedoraproject

Product: fedora

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: netapp

Product: cloud_backup

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: netapp

Product: clustered_data_ontap

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: netapp

Product: storagegrid

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:broadcom:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: oracle

Product: enterprise_manager_ops_center

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:secure_global_desktop:5.6:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: oracle

Product: http_server

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:secure_global_desktop:5.6:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: oracle

Product: instantis_enterprisetrack

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:secure_global_desktop:5.6:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: oracle

Product: secure_global_desktop

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:secure_global_desktop:5.6:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: oracle

Product: zfs_storage_appliance_kit

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:secure_global_desktop:5.6:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: siemens

Product: ruggedcom_nms

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:siemens:ruggedcom_nms:*:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:siemens:sinec_nms:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.0.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:siemens:sinema_remote_connect_server:3.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:siemens:sinema_server:14.0:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: siemens

Product: sinec_nms

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:siemens:ruggedcom_nms:*:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:siemens:sinec_nms:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.0.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:siemens:sinema_remote_connect_server:3.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:siemens:sinema_server:14.0:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: siemens

Product: sinema_remote_connect_server

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:siemens:ruggedcom_nms:*:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:siemens:sinec_nms:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.0.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:siemens:sinema_remote_connect_server:3.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:siemens:sinema_server:14.0:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: siemens

Product: sinema_server

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:siemens:ruggedcom_nms:*:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:siemens:sinec_nms:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.0.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:siemens:sinema_remote_connect_server:3.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:siemens:sinema_server:14.0:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: tenable

Product: tenable.sc

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "5.19.1",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd