{"api_version":"1","generated_at":"2026-04-19T08:31:36+00:00","cve":"CVE-2021-44790","urls":{"html":"https://cve.report/CVE-2021-44790","api":"https://cve.report/api/cve/CVE-2021-44790.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-44790","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-44790"},"summary":{"title":"CVE-2021-44790","description":"A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.","state":"PUBLIC","assigner":"security@apache.org","published_at":"2021-12-20 12:15:00","updated_at":"2023-11-07 03:39:00"},"problem_types":["CWE-787"],"metrics":[],"references":[{"url":"http://httpd.apache.org/security/vulnerabilities_24.html","name":"http://httpd.apache.org/security/vulnerabilities_24.html","refsource":"MISC","tags":[],"title":"Apache HTTP Server 2.4 vulnerabilities - The Apache HTTP Server Project","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/202208-20","name":"GLSA-202208-20","refsource":"GENTOO","tags":[],"title":"Apache HTTPD: Multiple Vulnerabilities (GLSA 202208-20) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/","name":"FEDORA-2022-78e3211c55","refsource":"","tags":[],"title":"[SECURITY] Fedora 36 Update: httpd-2.4.53-1.fc36 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/kb/HT213256","name":"https://support.apple.com/kb/HT213256","refsource":"CONFIRM","tags":[],"title":"About the security content of macOS Big Sur 11.6.6 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/fulldisclosure/2022/May/38","name":"20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4","refsource":"FULLDISC","tags":[],"title":"Full Disclosure: APPLE-SA-2022-05-16-2 macOS Monterey 12.4","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.apple.com/kb/HT213257","name":"https://support.apple.com/kb/HT213257","refsource":"CONFIRM","tags":[],"title":"About the security content of macOS Monterey 12.4 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.openwall.com/lists/oss-security/2021/12/20/4","name":"[oss-security] 20211220 CVE-2021-44790: Apache HTTP Server: Possible buffer overflow when parsing multipart content in mod_lua of Apache HTTP Server 2.4.51 and earlier","refsource":"MLIST","tags":[],"title":"oss-security - CVE-2021-44790: Apache HTTP Server: Possible buffer overflow when parsing multipart\n content in mod_lua of Apache HTTP Server 2.4.51 and earlier","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.tenable.com/security/tns-2022-01","name":"https://www.tenable.com/security/tns-2022-01","refsource":"CONFIRM","tags":[],"title":"[R1] Tenable.sc 5.20.0 Fixes Multiple Vulnerabilities - Security Advisory | Tenable®","mime":"text/html","httpstatus":"200","archivestatus":"503"},{"url":"https://www.oracle.com/security-alerts/cpuapr2022.html","name":"https://www.oracle.com/security-alerts/cpuapr2022.html","refsource":"MISC","tags":[],"title":"Oracle Critical Patch Update Advisory - April 2022","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/","name":"FEDORA-2022-21264ec6db","refsource":"","tags":[],"title":"[SECURITY] Fedora 34 Update: httpd-2.4.53-1.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://packetstormsecurity.com/files/171631/Apache-2.4.x-Buffer-Overflow.html","name":"http://packetstormsecurity.com/files/171631/Apache-2.4.x-Buffer-Overflow.html","refsource":"MISC","tags":[],"title":"Apache 2.4.x Buffer Overflow ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.debian.org/security/2022/dsa-5035","name":"DSA-5035","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-5035-1 apache2","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.apple.com/kb/HT213255","name":"https://support.apple.com/kb/HT213255","refsource":"CONFIRM","tags":[],"title":"About the security content of Security Update 2022-004 Catalina - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/","name":"FEDORA-2022-b4103753e9","refsource":"","tags":[],"title":"[SECURITY] Fedora 35 Update: httpd-2.4.53-1.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.tenable.com/security/tns-2022-03","name":"https://www.tenable.com/security/tns-2022-03","refsource":"CONFIRM","tags":[],"title":"[R1] Stand-alone Security Patch Available for Tenable.sc versions 5.16.0 to 5.19.1: Patch 202201.1 - Security Advisory | Tenable®","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.oracle.com/security-alerts/cpujan2022.html","name":"https://www.oracle.com/security-alerts/cpujan2022.html","refsource":"MISC","tags":[],"title":"Oracle Critical Patch Update Advisory - January 2022","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/","name":"FEDORA-2022-78e3211c55","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 36 Update: httpd-2.4.53-1.fc36 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://seclists.org/fulldisclosure/2022/May/35","name":"20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6","refsource":"FULLDISC","tags":[],"title":"Full Disclosure: APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/","name":"FEDORA-2022-21264ec6db","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 34 Update: httpd-2.4.53-1.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/","name":"FEDORA-2021-29a536c2ae","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 35 Update: httpd-2.4.52-1.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://seclists.org/fulldisclosure/2022/May/33","name":"20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina","refsource":"FULLDISC","tags":[],"title":"Full Disclosure: APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/","name":"FEDORA-2022-b4103753e9","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 35 Update: httpd-2.4.53-1.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.netapp.com/advisory/ntap-20211224-0001/","name":"https://security.netapp.com/advisory/ntap-20211224-0001/","refsource":"CONFIRM","tags":[],"title":"December 2021 Apache HTTP Server Vulnerabilities in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/","name":"FEDORA-2021-29a536c2ae","refsource":"","tags":[],"title":"[SECURITY] Fedora 35 Update: httpd-2.4.52-1.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-44790","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44790","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Chamal","lang":""},{"source":"LEGACY","value":"Anonymous working with Trend Micro Zero Day Initiative","lang":""}],"nvd_cpes":[{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"2.4.51","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apache","cpe5":"http_server","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"10.15.7","cpe7":"security_update_2020-001","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"10.15.7","cpe7":"security_update_2021-001","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"10.15.7","cpe7":"security_update_2021-002","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"10.15.7","cpe7":"security_update_2021-003","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"10.15.7","cpe7":"security_update_2021-004","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"10.15.7","cpe7":"security_update_2021-005","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"10.15.7","cpe7":"security_update_2021-006","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"10.15.7","cpe7":"security_update_2021-007","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"10.15.7","cpe7":"security_update_2021-008","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"10.15.7","cpe7":"security_update_2022-001","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"10.15.7","cpe7":"security_update_2022-002","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"10.15.7","cpe7":"security_update_2022-003","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"mac_os_x","cpe6":"10.15.7","cpe7":"security_update_2020-001","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"mac_os_x","cpe6":"10.15.7","cpe7":"security_update_2021-001","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"mac_os_x","cpe6":"10.15.7","cpe7":"security_update_2021-002","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"mac_os_x","cpe6":"10.15.7","cpe7":"security_update_2021-003","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"mac_os_x","cpe6":"10.15.7","cpe7":"security_update_2021-004","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"mac_os_x","cpe6":"10.15.7","cpe7":"security_update_2021-005","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"mac_os_x","cpe6":"10.15.7","cpe7":"security_update_2021-006","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"mac_os_x","cpe6":"10.15.7","cpe7":"security_update_2021-007","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"mac_os_x","cpe6":"10.15.7","cpe7":"security_update_2021-008","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"mac_os_x","cpe6":"10.15.7","cpe7":"security_update_2022-001","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"mac_os_x","cpe6":"10.15.7","cpe7":"security_update_2022-002","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"mac_os_x","cpe6":"10.15.7","cpe7":"security_update_2022-003","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"34","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"35","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"36","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"cloud_backup","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"9.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_element_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_operations_monitor","cpe6":"4.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_operations_monitor","cpe6":"4.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_operations_monitor","cpe6":"5.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"9.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_session_report_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"9.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_session_route_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"http_server","cpe6":"12.2.1.3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"http_server","cpe6":"12.2.1.4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"instantis_enterprisetrack","cpe6":"17.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"instantis_enterprisetrack","cpe6":"17.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"instantis_enterprisetrack","cpe6":"17.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"zfs_storage_appliance_kit","cpe6":"8.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"44790","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"tenable","cpe5":"tenable.sc","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-44790","qid":"150462","title":"Apache HTTP Server Buffer Overflow Vulnerability (CVE-2021-44790)"},{"cve":"CVE-2021-44790","qid":"159594","title":"Oracle Enterprise Linux Security Update for httpd (ELSA-2022-0143)"},{"cve":"CVE-2021-44790","qid":"159602","title":"Oracle Enterprise Linux Security Update for httpd:2.4 (ELSA-2022-0258)"},{"cve":"CVE-2021-44790","qid":"178985","title":"Debian Security Update for apache2 (DSA 5035-1)"},{"cve":"CVE-2021-44790","qid":"179048","title":"Debian Security Update for apache2 (DLA 2907-1)"},{"cve":"CVE-2021-44790","qid":"184936","title":"Debian Security Update for apache2 (CVE-2021-44790)"},{"cve":"CVE-2021-44790","qid":"198620","title":"Ubuntu Security Notification for Apache Hypertext Transfer Protocol (HTTP) Server Vulnerabilities (USN-5212-1)"},{"cve":"CVE-2021-44790","qid":"240007","title":"Red Hat Update for httpd (RHSA-2022:0143)"},{"cve":"CVE-2021-44790","qid":"240038","title":"Red Hat Update for httpd:2.4 (RHSA-2022:0258)"},{"cve":"CVE-2021-44790","qid":"240041","title":"Red Hat Update for httpd24-httpd (RHSA-2022:0303)"},{"cve":"CVE-2021-44790","qid":"240426","title":"Red Hat Update for httpd:2.4 (RHSA-2022:0288)"},{"cve":"CVE-2021-44790","qid":"257148","title":"CentOS Security Update for httpd (CESA-2022:0143)"},{"cve":"CVE-2021-44790","qid":"282186","title":"Fedora Security Update for httpd (FEDORA-2021-29a536c2ae)"},{"cve":"CVE-2021-44790","qid":"282500","title":"Fedora Security Update for httpd (FEDORA-2022-b4103753e9)"},{"cve":"CVE-2021-44790","qid":"282521","title":"Fedora Security Update for httpd (FEDORA-2022-21264ec6db)"},{"cve":"CVE-2021-44790","qid":"296061","title":"Oracle Solaris 11.4 Support Repository Update (SRU) 42.113.1 Missing (CPUJAN2022)"},{"cve":"CVE-2021-44790","qid":"353114","title":"Amazon Linux Security Advisory for httpd24 : ALAS-2022-1560"},{"cve":"CVE-2021-44790","qid":"353126","title":"Amazon Linux Security Advisory for httpd : ALAS2-2022-1737"},{"cve":"CVE-2021-44790","qid":"354343","title":"Amazon Linux Security Advisory for httpd : ALAS2022-2022-018"},{"cve":"CVE-2021-44790","qid":"354482","title":"Amazon Linux Security Advisory for httpd : ALAS2022-2022-202"},{"cve":"CVE-2021-44790","qid":"354577","title":"Amazon Linux Security Advisory for httpd : ALAS2022-2022-202"},{"cve":"CVE-2021-44790","qid":"355264","title":"Amazon Linux Security Advisory for httpd : ALAS2023-2023-072"},{"cve":"CVE-2021-44790","qid":"376607","title":"Apple macOS Security Update 2022-004 Catalina (HT213255)"},{"cve":"CVE-2021-44790","qid":"376608","title":"Apple MacOS Big Sur 11.6.6 Not Installed (HT213256)"},{"cve":"CVE-2021-44790","qid":"376612","title":"Apple macOS Monterey 12.4 Not Installed (HT213257)"},{"cve":"CVE-2021-44790","qid":"377218","title":"Alibaba Cloud Linux Security Update for httpd (ALINUX2-SA-2022:0004)"},{"cve":"CVE-2021-44790","qid":"377378","title":"Alibaba Cloud Linux Security Update for httpd:2.4 (ALINUX3-SA-2022:0017)"},{"cve":"CVE-2021-44790","qid":"378371","title":"IBM Hypertext Transfer Protocol (HTTP) Server Multiple Vulnerabilities (6540288)"},{"cve":"CVE-2021-44790","qid":"500025","title":"Alpine Linux Security Update for apache2"},{"cve":"CVE-2021-44790","qid":"503716","title":"Alpine Linux Security Update for apache2"},{"cve":"CVE-2021-44790","qid":"590870","title":"Mitsubishi Electric MELSOFT iQ AppPortal Multiple Vulnerabilities (ICSA-22-132-02)"},{"cve":"CVE-2021-44790","qid":"671368","title":"EulerOS Security Update for httpd (EulerOS-SA-2022-1306)"},{"cve":"CVE-2021-44790","qid":"671389","title":"EulerOS Security Update for httpd (EulerOS-SA-2022-1290)"},{"cve":"CVE-2021-44790","qid":"671402","title":"EulerOS Security Update for httpd (EulerOS-SA-2022-1326)"},{"cve":"CVE-2021-44790","qid":"671419","title":"EulerOS Security Update for httpd (EulerOS-SA-2022-1349)"},{"cve":"CVE-2021-44790","qid":"671509","title":"EulerOS Security Update for httpd (EulerOS-SA-2022-1488)"},{"cve":"CVE-2021-44790","qid":"671515","title":"EulerOS Security Update for httpd (EulerOS-SA-2022-1507)"},{"cve":"CVE-2021-44790","qid":"671659","title":"EulerOS Security Update for httpd (EulerOS-SA-2022-1730)"},{"cve":"CVE-2021-44790","qid":"690751","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for apache httpd (ca982e2d-61a9-11ec-8be6-d4c9ef517024)"},{"cve":"CVE-2021-44790","qid":"710595","title":"Gentoo Linux Apache HTTPD Multiple Vulnerabilities (GLSA 202208-20)"},{"cve":"CVE-2021-44790","qid":"730312","title":"Apache Hypertext Transfer Protocol (HTTP) Server Buffer Overflow Vulnerability"},{"cve":"CVE-2021-44790","qid":"751596","title":"SUSE Enterprise Linux Security Update for apache2 (SUSE-SU-2022:0065-1)"},{"cve":"CVE-2021-44790","qid":"751604","title":"OpenSUSE Security Update for apache2 (openSUSE-SU-2022:0091-1)"},{"cve":"CVE-2021-44790","qid":"751606","title":"SUSE Enterprise Linux Security Update for apache2 (SUSE-SU-2022:0119-1)"},{"cve":"CVE-2021-44790","qid":"751711","title":"SUSE Enterprise Linux Security Update for apache2 (SUSE-SU-2022:0440-1)"},{"cve":"CVE-2021-44790","qid":"752001","title":"SUSE Enterprise Linux Security Update for apache2 (SUSE-SU-2022:0091-1)"},{"cve":"CVE-2021-44790","qid":"753104","title":"SUSE Enterprise Linux Security Update for apache2 (SUSE-SU-2022:0091-2)"},{"cve":"CVE-2021-44790","qid":"900337","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for httpd (7035)"},{"cve":"CVE-2021-44790","qid":"901425","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for httpd (7044-1)"},{"cve":"CVE-2021-44790","qid":"940438","title":"AlmaLinux Security Update for httpd:2.4 (ALSA-2022:0258)"},{"cve":"CVE-2021-44790","qid":"960730","title":"Rocky Linux Security Update for httpd:2.4 (RLSA-2022:0258)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@apache.org","ID":"CVE-2021-44790","STATE":"PUBLIC","TITLE":"Possible buffer overflow when parsing multipart content in mod_lua of Apache HTTP Server 2.4.51 and earlier"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Apache HTTP Server","version":{"version_data":[{"version_affected":"<=","version_name":"Apache HTTP Server 2.4","version_value":"2.4.51"}]}}]},"vendor_name":"Apache Software Foundation"}]}},"credit":[{"lang":"eng","value":"Chamal"},{"lang":"eng","value":"Anonymous working with Trend Micro Zero Day Initiative"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":[{"other":"high"}],"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-787 Out-of-bounds Write"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"http://httpd.apache.org/security/vulnerabilities_24.html","name":"http://httpd.apache.org/security/vulnerabilities_24.html"},{"refsource":"MLIST","name":"[oss-security] 20211220 CVE-2021-44790: Apache HTTP Server: Possible buffer overflow when parsing multipart content in mod_lua of Apache HTTP Server 2.4.51 and earlier","url":"http://www.openwall.com/lists/oss-security/2021/12/20/4"},{"refsource":"FEDORA","name":"FEDORA-2021-29a536c2ae","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/"},{"refsource":"DEBIAN","name":"DSA-5035","url":"https://www.debian.org/security/2022/dsa-5035"},{"url":"https://www.oracle.com/security-alerts/cpujan2022.html","refsource":"MISC","name":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20211224-0001/","url":"https://security.netapp.com/advisory/ntap-20211224-0001/"},{"refsource":"CONFIRM","name":"https://www.tenable.com/security/tns-2022-01","url":"https://www.tenable.com/security/tns-2022-01"},{"refsource":"CONFIRM","name":"https://www.tenable.com/security/tns-2022-03","url":"https://www.tenable.com/security/tns-2022-03"},{"refsource":"FEDORA","name":"FEDORA-2022-b4103753e9","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/"},{"refsource":"FEDORA","name":"FEDORA-2022-21264ec6db","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/"},{"refsource":"FEDORA","name":"FEDORA-2022-78e3211c55","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/"},{"url":"https://www.oracle.com/security-alerts/cpuapr2022.html","refsource":"MISC","name":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"refsource":"CONFIRM","name":"https://support.apple.com/kb/HT213257","url":"https://support.apple.com/kb/HT213257"},{"refsource":"CONFIRM","name":"https://support.apple.com/kb/HT213256","url":"https://support.apple.com/kb/HT213256"},{"refsource":"CONFIRM","name":"https://support.apple.com/kb/HT213255","url":"https://support.apple.com/kb/HT213255"},{"refsource":"FULLDISC","name":"20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina","url":"http://seclists.org/fulldisclosure/2022/May/33"},{"refsource":"FULLDISC","name":"20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6","url":"http://seclists.org/fulldisclosure/2022/May/35"},{"refsource":"FULLDISC","name":"20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4","url":"http://seclists.org/fulldisclosure/2022/May/38"},{"refsource":"GENTOO","name":"GLSA-202208-20","url":"https://security.gentoo.org/glsa/202208-20"},{"refsource":"MISC","name":"http://packetstormsecurity.com/files/171631/Apache-2.4.x-Buffer-Overflow.html","url":"http://packetstormsecurity.com/files/171631/Apache-2.4.x-Buffer-Overflow.html"}]},"source":{"discovery":"UNKNOWN"},"timeline":[{"lang":"eng","time":"2021-12-07","value":"Reported to security team"},{"lang":"eng","time":"2021-12-16","value":"Fixed by r1896039 in 2.4.x"}]},"nvd":{"publishedDate":"2021-12-20 12:15:00","lastModifiedDate":"2023-11-07 03:39:00","problem_types":["CWE-787"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*","versionEndIncluding":"2.4.51","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*","versionStartIncluding":"5.16.0","versionEndExcluding":"5.20.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_operations_monitor:4.4:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*","versionEndIncluding":"9.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*","versionEndIncluding":"9.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*","versionEndIncluding":"9.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionEndExcluding":"10.15.7","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"11.0","versionEndExcluding":"11.6.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0","versionEndExcluding":"12.4","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"44790","Ordinal":"222621","Title":"CVE-2021-44790","CVE":"CVE-2021-44790","Year":"2021"},"notes":[]}}}