|
|
@ -234,10 +234,11 @@ software: |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
cve-2021-44228: |
|
|
|
cve-2021-44228: |
|
|
|
investigated: false |
|
|
|
investigated: true |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -263,10 +264,11 @@ software: |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
cve-2021-44228: |
|
|
|
cve-2021-44228: |
|
|
|
investigated: false |
|
|
|
investigated: true |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -292,10 +294,11 @@ software: |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
cve-2021-44228: |
|
|
|
cve-2021-44228: |
|
|
|
investigated: false |
|
|
|
investigated: true |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -321,10 +324,11 @@ software: |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
cve-2021-44228: |
|
|
|
cve-2021-44228: |
|
|
|
investigated: false |
|
|
|
investigated: true |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -350,10 +354,11 @@ software: |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
cve-2021-44228: |
|
|
|
cve-2021-44228: |
|
|
|
investigated: false |
|
|
|
investigated: true |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -379,10 +384,41 @@ software: |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
cve-2021-44228: |
|
|
|
cve-2021-44228: |
|
|
|
|
|
|
|
investigated: true |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-45105: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
vendor_links: |
|
|
|
|
|
|
|
- https://security.paloaltonetworks.com/CVE-2021-44228 |
|
|
|
|
|
|
|
notes: '' |
|
|
|
|
|
|
|
references: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
|
|
|
|
- vendor: Palo-Alto Networks |
|
|
|
|
|
|
|
product: Exact Data Matching CLI |
|
|
|
|
|
|
|
cves: |
|
|
|
|
|
|
|
cve-2021-4104: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-44228: |
|
|
|
|
|
|
|
investigated: true |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: |
|
|
|
|
|
|
|
- '1.2' |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -408,10 +444,11 @@ software: |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
cve-2021-44228: |
|
|
|
cve-2021-44228: |
|
|
|
investigated: false |
|
|
|
investigated: true |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -437,10 +474,11 @@ software: |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
cve-2021-44228: |
|
|
|
cve-2021-44228: |
|
|
|
investigated: false |
|
|
|
investigated: true |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -466,10 +504,11 @@ software: |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
cve-2021-44228: |
|
|
|
cve-2021-44228: |
|
|
|
investigated: false |
|
|
|
investigated: true |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -495,10 +534,41 @@ software: |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
cve-2021-44228: |
|
|
|
cve-2021-44228: |
|
|
|
|
|
|
|
investigated: true |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
cve-2021-45046: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-45105: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
vendor_links: |
|
|
|
|
|
|
|
- https://security.paloaltonetworks.com/CVE-2021-44228 |
|
|
|
|
|
|
|
notes: '' |
|
|
|
|
|
|
|
references: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
|
|
|
|
- vendor: Palo-Alto Networks |
|
|
|
|
|
|
|
product: Palo-Alto Networks-DB Private Cloud |
|
|
|
|
|
|
|
cves: |
|
|
|
|
|
|
|
cve-2021-4104: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-44228: |
|
|
|
|
|
|
|
investigated: true |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -524,10 +594,11 @@ software: |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
cve-2021-44228: |
|
|
|
cve-2021-44228: |
|
|
|
investigated: false |
|
|
|
investigated: true |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -554,11 +625,11 @@ software: |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
cve-2021-44228: |
|
|
|
cve-2021-44228: |
|
|
|
investigated: true |
|
|
|
investigated: true |
|
|
|
affected_versions: |
|
|
|
affected_versions: [] |
|
|
|
- '9.0' |
|
|
|
fixed_versions: |
|
|
|
- '9.1' |
|
|
|
- '9.0.15' |
|
|
|
- '10.0' |
|
|
|
- '9.1.12-h3' |
|
|
|
fixed_versions: [] |
|
|
|
- '10.0.8-h8' |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
@ -587,10 +658,11 @@ software: |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
cve-2021-44228: |
|
|
|
cve-2021-44228: |
|
|
|
investigated: false |
|
|
|
investigated: true |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -616,10 +688,11 @@ software: |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
cve-2021-44228: |
|
|
|
cve-2021-44228: |
|
|
|
investigated: false |
|
|
|
investigated: true |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -645,10 +718,41 @@ software: |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
cve-2021-44228: |
|
|
|
cve-2021-44228: |
|
|
|
|
|
|
|
investigated: true |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-45105: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
vendor_links: |
|
|
|
|
|
|
|
- https://security.paloaltonetworks.com/CVE-2021-44228 |
|
|
|
|
|
|
|
notes: '' |
|
|
|
|
|
|
|
references: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
|
|
|
|
- vendor: Palo-Alto Networks |
|
|
|
|
|
|
|
product: Prisma SD-WAN (CloudGenix) |
|
|
|
|
|
|
|
cves: |
|
|
|
|
|
|
|
cve-2021-4104: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-44228: |
|
|
|
|
|
|
|
investigated: true |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -674,10 +778,11 @@ software: |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
cve-2021-44228: |
|
|
|
cve-2021-44228: |
|
|
|
investigated: false |
|
|
|
investigated: true |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -703,10 +808,11 @@ software: |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
cve-2021-44228: |
|
|
|
cve-2021-44228: |
|
|
|
investigated: false |
|
|
|
investigated: true |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -732,10 +838,11 @@ software: |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
cve-2021-44228: |
|
|
|
cve-2021-44228: |
|
|
|
investigated: false |
|
|
|
investigated: true |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -761,10 +868,11 @@ software: |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
cve-2021-44228: |
|
|
|
cve-2021-44228: |
|
|
|
investigated: false |
|
|
|
investigated: true |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|