Guest

Preview Tool

Cisco Bug: CSCvv33250 - CIAM: jackson-databind mongodb ncurses open source vulnerabilities

Last Modified

Oct 16, 2020

Products (1)

  • Cisco Policy Suite for Mobile

Known Affected Releases

20.2.0

Description (partial)

Symptom:
This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2016-5017 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5017
CVE-2017-11112 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11112
CVE-2017-11113 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11113
CVE-2017-13728 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13728
CVE-2017-15095 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15095
CVE-2017-15131 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15131
CVE-2017-16879 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16879
CVE-2017-18342 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18342
CVE-2017-5637 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5637
CVE-2018-14718 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14718
CVE-2018-19360 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19360
CVE-2018-19361 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19361
CVE-2018-19362 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19362
CVE-2018-5968 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5968
CVE-2018-7489 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7489
CVE-2019-12086 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12086
CVE-2019-12384 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12384
CVE-2019-13734 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13734
CVE-2019-14379 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379
CVE-2019-14439 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14439
CVE-2019-14540 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540
CVE-2019-14892 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14892
CVE-2019-14893 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893
CVE-2019-16335 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16335
CVE-2019-16942 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942
CVE-2019-16943 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943
CVE-2019-17267 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17267
CVE-2019-17531 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531
CVE-2019-20330 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20330
CVE-2019-2386 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2386
CVE-2019-2390 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2390
CVE-2020-10672 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10672
CVE-2020-10673 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10673
CVE-2020-10968 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10968
CVE-2020-10969 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10969
CVE-2020-11111 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11111
CVE-2020-11112 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11112
CVE-2020-11113 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113
CVE-2020-11619 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11619
CVE-2020-11620 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11620
CVE-2020-14060 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14060
CVE-2020-14061 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14061
CVE-2020-14062 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14062
CVE-2020-14195 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14195
CVE-2020-16845 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
CVE-2020-8840 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8840
CVE-2020-9546 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546
CVE-2020-9547 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547
CVE-2020-9548 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548

These bugs were opened proactively to investigate potential security impact(s) on the product. At this time, the product is not confirmed to be affected by any of the CVE(s).

Conditions:
Device with default configuration.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.