2022-01-12 07:20:52 +00:00
|
|
|
---
|
|
|
|
version: '1.0'
|
|
|
|
owners:
|
|
|
|
- name: cisagov
|
|
|
|
url: https://github.com/cisagov/log4j-affected-db
|
|
|
|
software:
|
|
|
|
- vendor: VArmour
|
|
|
|
product: ''
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://support.varmour.com/hc/en-us/articles/4416396248717-Log4j2-Emergency-Configuration-Change-for-Critical-Auth-Free-Code-Execution-in-Logging-Utility
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-12T07:18:56+00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: Acuity
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions:
|
|
|
|
- All
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: DITC
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions:
|
|
|
|
- All
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: ARIA Connect (Cloverleaf)
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- All
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: ARIA oncology information system for Medical Oncology
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- All
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: XMediusFax for ARIA oncology information system for Medical Oncology
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions:
|
|
|
|
- All
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: ARIA oncology information system for Radiation Oncology
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- All
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: ARIA eDOC
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- All
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: XMediusFax for ARIA oncology information system for Radiation Oncology
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions:
|
|
|
|
- All
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: ARIA Radiation Therapy Management System (RTM)
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- All
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: Bravos Console
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- All
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: Clinac
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions:
|
|
|
|
- All
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: Cloud Planner
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- All
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: DoseLab
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- All
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: Eclipse treatment planning software
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- All
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: ePeerReview
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions:
|
|
|
|
- All
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: Ethos
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- All
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: FullScale oncology IT solutions
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions:
|
|
|
|
- All
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: Halcyon system
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions:
|
|
|
|
- All
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: Identify
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- All
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: Information Exchange Manager (IEM)
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- All
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: InSightive Analytics
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions:
|
|
|
|
- All
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: Large Integrated Oncology Network (LION)
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- All
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: ICAP
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- All
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: Mobius3D platform
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- All
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: ProBeam
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- All
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: Qumulate
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- All
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: Real-time Position Management (RPM)
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- All
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: Respiratory Gating for Scanners (RGSC)
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- All
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: SmartConnect solution
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- All
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: 'See Knowledge Article: 000038850 on MyVarian'
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: SmartConnect solution Policy Server
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- All
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: 'See Knowledge Articles: 000038831 and 000038832 on MyVarian'
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: PaaS
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- All
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: TrueBeam radiotherapy system
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- All
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: UNIQUE system
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions:
|
|
|
|
- All
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: Varian Authentication and Identity Server (VAIS)
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- All
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: Varian Managed Services Cloud
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions:
|
|
|
|
- All
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: Varian Mobile App
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- '2.0'
|
|
|
|
- '2.5'
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: VariSeed
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- All
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: Velocity
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- All
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: VitalBeam radiotherapy system
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- All
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varian
|
|
|
|
product: Vitesse
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- All
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.varian.com/resources-support/services/cybersecurity-varian/java-log4j-vulnerabilities
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: Varnish Software
|
|
|
|
product: ''
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://docs.varnish-software.com/security/CVE-2021-44228-45046/
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-12T07:18:56+00:00'
|
|
|
|
- vendor: Varonis
|
|
|
|
product: ''
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://help.varonis.com/s/article/Apache-Log4j-Zero-Day-Vulnerability-CVE-2021-44228
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-12T07:18:56+00:00'
|
|
|
|
- vendor: Veeam
|
|
|
|
product: ''
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.veeam.com/kb4254
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-12T07:18:56+00:00'
|
|
|
|
- vendor: Venafi
|
|
|
|
product: ''
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://support.venafi.com/hc/en-us/articles/4416213022733-Log4j-Zero-Day-Vulnerability-notice
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-12T07:18:56+00:00'
|
|
|
|
- vendor: Veritas NetBackup
|
|
|
|
product: ''
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.veritas.com/content/support/en_US/article.100052070
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-12T07:18:56+00:00'
|
|
|
|
- vendor: Vertica
|
|
|
|
product: ''
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://forum.vertica.com/discussion/242512/vertica-security-bulletin-a-potential-vulnerability-has-been-identified-apache-log4j-library-used
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-12T07:18:56+00:00'
|
2022-01-19 18:03:31 +00:00
|
|
|
- vendor: Video Insight Inc.
|
|
|
|
product: Video Insight
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: ''
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- 'All'
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: ''
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: ''
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://i-pro.com/eu/en/surveillance/news/i-pro-products-and-log4j-2x-vulnerability
|
|
|
|
notes: Video Insight is a part of Panasonic I-Pro.
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-19T00:00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
- vendor: Viso Trust
|
|
|
|
product: ''
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://blog.visotrust.com/viso-trust-statement-re-cve-2021-44228-log4j-a4b9b5767492
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-12T07:18:56+00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: API Portal for VMware Tanzu
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 1.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: App Metrics
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 2.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: Healthwatch for Tanzu Application Service
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 2.x
|
|
|
|
- 1.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: Single Sign-On for VMware Tanzu Application Service
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 1.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: Spring Cloud Gateway for Kubernetes
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 1.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: Spring Cloud Gateway for VMware Tanzu
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 1.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: Spring Cloud Services for VMware Tanzu
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 3.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: VMware Carbon Black Cloud Workload Appliance
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 1.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: VMware Carbon Black EDR Server
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 7.x
|
|
|
|
- 6.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: VMware Cloud Foundation
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 4.x
|
|
|
|
- 3.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: VMware HCX
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 4.x
|
|
|
|
- 3.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: VMware Horizon
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 8.x
|
|
|
|
- 7.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- '[VMware KB 87073 (vmware.com)](https://kb.vmware.com/s/article/87073)'
|
|
|
|
last_updated: '2021-12-17T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: VMware Horizon Cloud Connector
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 1.x
|
|
|
|
- 2.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: VMware Horizon DaaS
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 9.1.x
|
|
|
|
- 9.0.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: VMware Identity Manager
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 3.3.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: VMware NSX-T Data Centern
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 3.x
|
|
|
|
- 2.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: VMware Site Recovery Manager
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 8.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: VMware Tanzu Application Service for VMs
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 2.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: VMware Tanzu GemFire
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 9.x
|
|
|
|
- 8.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: VMware Tanzu Greenplum
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 6.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: VMware Tanzu Kubernetes Grid Integrated Edition
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 1.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: VMware Tanzu Observability by Wavefront Nozzle
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 3.x
|
|
|
|
- 2.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: VMware Tanzu Operations Manager
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 2.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: VMware Tanzu SQL with MySQL for VMs
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 2.x
|
|
|
|
- 1.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: VMware Telco Cloud Automation
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 2.x
|
|
|
|
- 1.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: VMware Unified Access Gateway
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 21.x
|
|
|
|
- 20.x
|
|
|
|
- 3.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: VMware vCenter Cloud Gateway
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 1.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: vCenter Server - OVA
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 7.x
|
|
|
|
- 6.7.x
|
|
|
|
- 6.5.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: '[Workaround @ KB87081 (vmware.com)](https://kb.vmware.com/s/article/87081
|
|
|
|
)'
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-17T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: vCenter Server - Windows
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 6.7.x
|
|
|
|
- 6.5.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: '[Workaround @ KB87096 (vmware.com)](https://kb.vmware.com/s/article/87096
|
|
|
|
)'
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-17T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: VMware vRealize Automation
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 8.x
|
|
|
|
- 7.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: VMware vRealize Lifecycle Manager
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 8.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: VMware vRealize Log Insight
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 8.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: VMware vRealize Operations
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 8.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: VMware vRealize Operations Cloud Proxy
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- Any
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: VMware vRealize Orchestrator
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 8.x
|
|
|
|
- 7.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: VMware Workspace ONE Access
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 21.x
|
|
|
|
- 20.10.x
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
|
|
|
- vendor: VMware
|
|
|
|
product: VMware Workspace ONE Access Connector (VMware Identity Manager Connector)
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
|
|
|
- 21.x
|
|
|
|
- 20.10.x
|
|
|
|
- 19.03.0.1
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vmware.com/security/advisories/VMSA-2021-0028.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-12T00:00:00'
|
2022-01-17 22:29:30 +00:00
|
|
|
- vendor: VTScada
|
|
|
|
product: All
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: ''
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-01-18 19:37:03 +00:00
|
|
|
- 'All'
|
2022-01-17 22:29:30 +00:00
|
|
|
cve-2021-45046:
|
|
|
|
investigated: ''
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: ''
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vtscada.com/vtscada-unaffected-by-log4j/
|
|
|
|
notes: Java is not utilized within VTScada software, and thus our users are unaffected.
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-17T00:00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
- vendor: Vyaire
|
|
|
|
product: ''
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.vyaire.com/sites/us/files/2021-12/2021-12-15-product-security-bulletin-for-log4shell-vulnerability.pdf
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
...
|