<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CVE-2021-31805 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cve-2021-31805/m-p/4597987#M1089423</link>
    <description>&lt;P&gt;CVE-2021-31805 - Has a Cisco Product Impact list been announced?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It describes Affected system: Apache Struts version 2.0.0 - 2.5.29.&lt;/P&gt;&lt;P&gt;How do I check the current apache version running on Cisco ISE?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 22 Apr 2022 16:08:14 GMT</pubDate>
    <dc:creator>ygao</dc:creator>
    <dc:date>2022-04-22T16:08:14Z</dc:date>
    <item>
      <title>CVE-2021-31805</title>
      <link>https://community.cisco.com/t5/network-security/cve-2021-31805/m-p/4597987#M1089423</link>
      <description>&lt;P&gt;CVE-2021-31805 - Has a Cisco Product Impact list been announced?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It describes Affected system: Apache Struts version 2.0.0 - 2.5.29.&lt;/P&gt;&lt;P&gt;How do I check the current apache version running on Cisco ISE?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Apr 2022 16:08:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2021-31805/m-p/4597987#M1089423</guid>
      <dc:creator>ygao</dc:creator>
      <dc:date>2022-04-22T16:08:14Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-31805</title>
      <link>https://community.cisco.com/t5/network-security/cve-2021-31805/m-p/4598010#M1089424</link>
      <description>&lt;P&gt;i have not come across any command to check what apache version, other than opensource used version of ISE document :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;example ISE 2.7 :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/dam/en/us/td/docs/security/ise/2-7/open_source/IdentityServicesEngine27v10.pdf" target="_blank"&gt;https://www.cisco.com/c/dam/en/us/td/docs/security/ise/2-7/open_source/IdentityServicesEngine27v10.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Apr 2022 16:35:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2021-31805/m-p/4598010#M1089424</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-04-22T16:35:23Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-31805</title>
      <link>https://community.cisco.com/t5/network-security/cve-2021-31805/m-p/4598207#M1089458</link>
      <description>&lt;P&gt;You can use this tool:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://tools.cisco.com/security/center/Search.x?publicationTypeIDs=1&amp;amp;cves=CVE-2021-31805" target="_blank"&gt;https://tools.cisco.com/security/center/Search.x?publicationTypeIDs=1&amp;amp;cves=CVE-2021-31805&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;It confirms that no Cisco products have been identified as affected by the subject CVE.&lt;/P&gt;</description>
      <pubDate>Sat, 23 Apr 2022 03:59:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2021-31805/m-p/4598207#M1089458</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-04-23T03:59:18Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-31805</title>
      <link>https://community.cisco.com/t5/network-security/cve-2021-31805/m-p/4654264#M1092031</link>
      <description>&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jul 2022 23:27:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cve-2021-31805/m-p/4654264#M1092031</guid>
      <dc:creator>ygao</dc:creator>
      <dc:date>2022-07-20T23:27:02Z</dc:date>
    </item>
  </channel>
</rss>

