{"api_version":"1","generated_at":"2026-04-23T03:26:17+00:00","cve":"CVE-2022-32221","urls":{"html":"https://cve.report/CVE-2022-32221","api":"https://cve.report/api/cve/CVE-2022-32221.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-32221","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-32221"},"summary":{"title":"CVE-2022-32221","description":"When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.","state":"PUBLIC","assigner":"support@hackerone.com","published_at":"2022-12-05 22:15:00","updated_at":"2024-03-27 15:00:00"},"problem_types":["CWE-668"],"metrics":[],"references":[{"url":"http://seclists.org/fulldisclosure/2023/Jan/19","name":"20230123 APPLE-SA-2023-01-23-4 macOS Ventura 13.2","refsource":"FULLDISC","tags":[],"title":"Full Disclosure: APPLE-SA-2023-01-23-4 macOS Ventura 13.2","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://seclists.org/fulldisclosure/2023/Jan/20","name":"20230123 APPLE-SA-2023-01-23-5 macOS Monterey 12.6.3","refsource":"FULLDISC","tags":[],"title":"Full Disclosure: APPLE-SA-2023-01-23-5 macOS Monterey 12.6.3","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.gentoo.org/glsa/202212-01","name":"GLSA-202212-01","refsource":"GENTOO","tags":[],"title":"curl: Multiple Vulnerabilities (GLSA 202212-01) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.netapp.com/advisory/ntap-20230110-0006/","name":"https://security.netapp.com/advisory/ntap-20230110-0006/","refsource":"CONFIRM","tags":[],"title":"December 2022 cURL/libcURL Vulnerabilities in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2023/05/17/4","name":"[oss-security] 20230517 curl: CVE-2023-28322: more POST-after-PUT confusion","refsource":"MLIST","tags":[],"title":"oss-security - curl: CVE-2023-28322: more POST-after-PUT confusion","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html","name":"[debian-lts-announce] 20230128 [SECURITY] [DLA 3288-1] curl security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 3288-1] curl security update","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://hackerone.com/reports/1704017","name":"https://hackerone.com/reports/1704017","refsource":"MISC","tags":[],"title":"HackerOne","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/kb/HT213604","name":"https://support.apple.com/kb/HT213604","refsource":"CONFIRM","tags":[],"title":"About the security content of macOS Monterey 12.6.3 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/kb/HT213605","name":"https://support.apple.com/kb/HT213605","refsource":"CONFIRM","tags":[],"title":"About the security content of macOS Ventura 13.2 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.debian.org/security/2023/dsa-5330","name":"DSA-5330","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-5330-1 curl","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://security.netapp.com/advisory/ntap-20230208-0002/","name":"https://security.netapp.com/advisory/ntap-20230208-0002/","refsource":"CONFIRM","tags":[],"title":"January 2023 MySQL Server Vulnerabilities in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-32221","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-32221","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"32221","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"32221","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"32221","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"32221","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"haxx","cpe5":"curl","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"32221","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"clustered_data_ontap","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"32221","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"netapp","cpe5":"h300s","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"32221","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netapp","cpe5":"h300s_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"32221","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"netapp","cpe5":"h410s","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"32221","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netapp","cpe5":"h410s_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"32221","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"netapp","cpe5":"h500s","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"32221","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netapp","cpe5":"h500s_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"32221","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"netapp","cpe5":"h700s","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"32221","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netapp","cpe5":"h700s_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"32221","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"splunk","cpe5":"universal_forwarder","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"32221","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"splunk","cpe5":"universal_forwarder","cpe6":"9.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-32221","qid":"160415","title":"Oracle Enterprise Linux Security Update for curl (ELSA-2023-0333)"},{"cve":"CVE-2022-32221","qid":"181508","title":"Debian Security Update for curl (DSA 5330-1)"},{"cve":"CVE-2022-32221","qid":"181512","title":"Debian Security Update for curl (DLA 3288-1)"},{"cve":"CVE-2022-32221","qid":"183626","title":"Debian Security Update for curl (CVE-2022-32221)"},{"cve":"CVE-2022-32221","qid":"199008","title":"Ubuntu Security Notification for curl Vulnerabilities (USN-5702-1)"},{"cve":"CVE-2022-32221","qid":"199129","title":"Ubuntu Security Notification for MySQL Vulnerabilities (USN-5823-1)"},{"cve":"CVE-2022-32221","qid":"20316","title":"Oracle MySQL January 2023 Critical Patch Update (CPUJAN2023)"},{"cve":"CVE-2022-32221","qid":"240996","title":"Red Hat Update for JBoss Core Services (RHSA-2022:8840)"},{"cve":"CVE-2022-32221","qid":"241107","title":"Red Hat Update for curl (RHSA-2023:0333)"},{"cve":"CVE-2022-32221","qid":"241829","title":"Red Hat Update for curl (RHSA-2023:4139)"},{"cve":"CVE-2022-32221","qid":"283261","title":"Fedora Security Update for curl (FEDORA-2022-01ffde372c)"},{"cve":"CVE-2022-32221","qid":"283302","title":"Fedora Security Update for curl (FEDORA-2022-39688a779d)"},{"cve":"CVE-2022-32221","qid":"283449","title":"Fedora Security Update for curl (FEDORA-2022-e9d65906c4)"},{"cve":"CVE-2022-32221","qid":"330139","title":"IBM AIX Security restrictions bypass due to curl (curl_advisory)"},{"cve":"CVE-2022-32221","qid":"354115","title":"Amazon Linux Security Advisory for curl : ALAS2-2022-1882"},{"cve":"CVE-2022-32221","qid":"354289","title":"Amazon Linux Security Advisory for curl : ALAS2022-2022-246"},{"cve":"CVE-2022-32221","qid":"354553","title":"Amazon Linux Security Advisory for curl : ALAS-2022-246"},{"cve":"CVE-2022-32221","qid":"355059","title":"Amazon Linux Security Advisory for curl : AL2012-2023-383"},{"cve":"CVE-2022-32221","qid":"355207","title":"Amazon Linux Security Advisory for curl : ALAS2023-2023-083"},{"cve":"CVE-2022-32221","qid":"377927","title":"Apple macOS Ventura 13.2 Not Installed (HT213605)"},{"cve":"CVE-2022-32221","qid":"377928","title":"Apple macOS Monterey 12.6.3 Not Installed (HT213604)"},{"cve":"CVE-2022-32221","qid":"378090","title":"NetApp Clustered Data Open Network Technology for Appliance Products (ONTAP) Disclosure of Sensitive Information Denial of Service (DoS) Vulnerability (NTAP-20230110-0006)"},{"cve":"CVE-2022-32221","qid":"378599","title":"Splunk Enterprise Third Party Package Updates for June (SVD-2023-0613)"},{"cve":"CVE-2022-32221","qid":"378883","title":"Splunk Enterprise August Third Party Package Updates (SVD-2023-0808)"},{"cve":"CVE-2022-32221","qid":"502573","title":"Alpine Linux Security Update for curl"},{"cve":"CVE-2022-32221","qid":"502575","title":"Alpine Linux Security Update for curl"},{"cve":"CVE-2022-32221","qid":"502717","title":"Alpine Linux Security Update for curl"},{"cve":"CVE-2022-32221","qid":"505613","title":"Alpine Linux Security Update for curl"},{"cve":"CVE-2022-32221","qid":"672494","title":"EulerOS Security Update for curl (EulerOS-SA-2023-1005)"},{"cve":"CVE-2022-32221","qid":"672512","title":"EulerOS Security Update for curl (EulerOS-SA-2023-1030)"},{"cve":"CVE-2022-32221","qid":"672531","title":"EulerOS Security Update for curl (EulerOS-SA-2023-1119)"},{"cve":"CVE-2022-32221","qid":"672567","title":"EulerOS Security Update for curl (EulerOS-SA-2023-1095)"},{"cve":"CVE-2022-32221","qid":"672614","title":"EulerOS Security Update for curl (EulerOS-SA-2023-1309)"},{"cve":"CVE-2022-32221","qid":"672615","title":"EulerOS Security Update for curl (EulerOS-SA-2023-1379)"},{"cve":"CVE-2022-32221","qid":"672636","title":"EulerOS Security Update for curl (EulerOS-SA-2023-1351)"},{"cve":"CVE-2022-32221","qid":"672701","title":"EulerOS Security Update for curl (EulerOS-SA-2023-1496)"},{"cve":"CVE-2022-32221","qid":"691009","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for curl (0f99a30c-7b4b-11ed-9168-080027f5fec9)"},{"cve":"CVE-2022-32221","qid":"691034","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for mysql (dc49f6dc-99d2-11ed-86e9-d4c9ef517024)"},{"cve":"CVE-2022-32221","qid":"710693","title":"Gentoo Linux curl Multiple Vulnerabilities (GLSA 202212-01)"},{"cve":"CVE-2022-32221","qid":"752727","title":"SUSE Enterprise Linux Security Update for curl (SUSE-SU-2022:3774-1)"},{"cve":"CVE-2022-32221","qid":"752732","title":"SUSE Enterprise Linux Security Update for curl (SUSE-SU-2022:3772-1)"},{"cve":"CVE-2022-32221","qid":"752733","title":"SUSE Enterprise Linux Security Update for curl (SUSE-SU-2022:3769-1)"},{"cve":"CVE-2022-32221","qid":"752736","title":"SUSE Enterprise Linux Security Update for curl (SUSE-SU-2022:3773-1)"},{"cve":"CVE-2022-32221","qid":"752739","title":"SUSE Enterprise Linux Security Update for curl (SUSE-SU-2022:3785-1)"},{"cve":"CVE-2022-32221","qid":"904841","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for mysql (12384)"},{"cve":"CVE-2022-32221","qid":"904878","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for rust (12434)"},{"cve":"CVE-2022-32221","qid":"904920","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for cmake (12313)"},{"cve":"CVE-2022-32221","qid":"905006","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for rust (12638)"},{"cve":"CVE-2022-32221","qid":"905103","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for cmake (12467)"},{"cve":"CVE-2022-32221","qid":"905160","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for mysql (12570)"},{"cve":"CVE-2022-32221","qid":"940899","title":"AlmaLinux Security Update for curl (ALSA-2023:0333)"},{"cve":"CVE-2022-32221","qid":"960506","title":"Rocky Linux Security Update for curl (RLSA-2023:0333)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2022-32221","ASSIGNER":"support@hackerone.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"https://github.com/curl/curl","version":{"version_data":[{"version_value":"Fixed in 7.86.0"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Information Disclosure (CWE-200)"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://hackerone.com/reports/1704017","url":"https://hackerone.com/reports/1704017"},{"refsource":"GENTOO","name":"GLSA-202212-01","url":"https://security.gentoo.org/glsa/202212-01"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20230110-0006/","url":"https://security.netapp.com/advisory/ntap-20230110-0006/"},{"refsource":"CONFIRM","name":"https://support.apple.com/kb/HT213604","url":"https://support.apple.com/kb/HT213604"},{"refsource":"CONFIRM","name":"https://support.apple.com/kb/HT213605","url":"https://support.apple.com/kb/HT213605"},{"refsource":"FULLDISC","name":"20230123 APPLE-SA-2023-01-23-5 macOS Monterey 12.6.3","url":"http://seclists.org/fulldisclosure/2023/Jan/20"},{"refsource":"FULLDISC","name":"20230123 APPLE-SA-2023-01-23-4 macOS Ventura 13.2","url":"http://seclists.org/fulldisclosure/2023/Jan/19"},{"refsource":"DEBIAN","name":"DSA-5330","url":"https://www.debian.org/security/2023/dsa-5330"},{"refsource":"MLIST","name":"[debian-lts-announce] 20230128 [SECURITY] [DLA 3288-1] curl security update","url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20230208-0002/","url":"https://security.netapp.com/advisory/ntap-20230208-0002/"},{"refsource":"MLIST","name":"[oss-security] 20230517 curl: CVE-2023-28322: more POST-after-PUT confusion","url":"http://www.openwall.com/lists/oss-security/2023/05/17/4"}]},"description":{"description_data":[{"lang":"eng","value":"When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST."}]}},"nvd":{"publishedDate":"2022-12-05 22:15:00","lastModifiedDate":"2024-03-27 15:00:00","problem_types":["CWE-668"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","versionEndExcluding":"7.86.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionEndExcluding":"12.6.3","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*","versionStartIncluding":"9.0.0","versionEndExcluding":"9.0.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*","versionStartIncluding":"8.2.0","versionEndExcluding":"8.2.12","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}