U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2021-20078

Change History

Initial Analysis by NIST 4/06/2021 11:36:34 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:* versions up to (excluding) 12.5
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125000:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125002:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125100:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125101:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125102:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125108:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125110:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125111:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125112:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125113:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125114:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125116:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125117:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125118:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125120:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125121:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125123:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125124:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125125:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125136:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125137:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125139:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125140:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125143:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125144:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125145:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125156:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125157:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125158:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125159:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125161:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125163:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125174:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125175:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125176:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125177:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125178:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125180:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125181:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125192:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125193:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125194:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125195:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125196:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125197:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125198:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125201:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125204:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125212:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125213:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125214:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125215:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125216:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125228:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125229:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125230:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125231:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125232:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125233:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125312:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125323:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125324:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125326:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125328:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125329:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125340:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125341:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125342:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125343:*:*:*:*:*:*
     *cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:125344:*:*:*:*:*:*
Added CVSS V2

								
							
							
						
NIST (AV:N/AC:L/Au:N/C:N/I:C/A:C)
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Added CWE

								
							
							
						
NIST CWE-22
Changed Reference Type
https://www.tenable.com/security/research/tra-2021-10 No Types Assigned
https://www.tenable.com/security/research/tra-2021-10 Exploit, Third Party Advisory