U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2018-11776

Change History

Modified Analysis by NIST 7/25/2024 10:48:56 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:* versions from (including) 7.3
     *cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:* versions from (including) 9.5
     *cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:oracle:communications_policy_management:*:*:*:*:*:*:*:* versions up to (excluding) 12.5.0
     *cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:* versions up to (including) 3.4.9.4237
     *cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:* versions from (including) 4.0.0 up to (including) 4.0.6.5281
     *cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:* versions from (including) 8.0.0 up to (including) 8.0.2.8191
Changed CPE Configuration
OR
     *cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:* versions from (including) 2.3.1 up to (including) 2.3.34
     *cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:* versions from (including) 2.5.0 up to (including) 2.5.16
OR
     *cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:* versions from (including) 2.0.4 up to (excluding) 2.3.35
     *cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:* versions from (including) 2.5.0 up to (excluding) 2.5.17
Removed CVSS V3
NIST AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

								
						
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
NIST NVD-CWE-noinfo
Removed CWE
NIST CWE-20

								
						
Changed Reference Type
http://packetstormsecurity.com/files/172830/Apache-Struts-Remote-Code-Execution.html No Types Assigned
http://packetstormsecurity.com/files/172830/Apache-Struts-Remote-Code-Execution.html Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securityfocus.com/bid/105125 Third Party Advisory, VDB Entry
http://www.securityfocus.com/bid/105125 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id/1041547 Third Party Advisory, VDB Entry
http://www.securitytracker.com/id/1041547 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id/1041888 Third Party Advisory, VDB Entry
http://www.securitytracker.com/id/1041888 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E Mailing List
Changed Reference Type
https://www.oracle.com/security-alerts/cpujul2020.html No Types Assigned
https://www.oracle.com/security-alerts/cpujul2020.html Third Party Advisory