mirror of
https://github.com/cisagov/log4j-affected-db.git
synced 2024-11-23 09:00:48 +00:00
1818 lines
49 KiB
YAML
1818 lines
49 KiB
YAML
|
---
|
||
|
version: '1.0'
|
||
|
owners:
|
||
|
- name: cisagov
|
||
|
url: https://github.com/cisagov/log4j-affected-db
|
||
|
software:
|
||
|
- vendor: N-able
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.n-able.com/security-and-privacy/apache-log4j-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:54+00:00'
|
||
|
- vendor: Nagios
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.nagios.com/news/2021/12/update-on-apache-log4j-vulnerability/
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:54+00:00'
|
||
|
- vendor: NAKIVO
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://forum.nakivo.com/index.php?/topic/7574-log4j-cve-2021-44228/&do=findComment&comment=9145
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:54+00:00'
|
||
|
- vendor: National Instruments
|
||
|
product: OptimalPlus
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.ni.com/en-us/support/documentation/supplemental/21/ni-response-to-apache-log4j-vulnerability-.html
|
||
|
notes: (Limited to deployments running Veritas, Cloudera, or Logstash) Contact
|
||
|
Technical Support
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-05T00:00:00'
|
||
|
- vendor: Neo4j
|
||
|
product: Neo4j Graph Database
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions:
|
||
|
- Version >4.2
|
||
|
- <4..2.12
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links: []
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-13T00:00:00'
|
||
|
- vendor: Netapp
|
||
|
product: Multiple NetApp products
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://security.netapp.com/advisory/ntap-20211210-0007/
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:54+00:00'
|
||
|
- vendor: Netcup
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.netcup-news.de/2021/12/14/pruefung-log4j-sicherheitsluecken-abgeschlossen/
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:54+00:00'
|
||
|
- vendor: NetGate PFSense
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://forum.netgate.com/topic/168417/java-log4j-vulnerability-is-pfsense-affected/35
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:54+00:00'
|
||
|
- vendor: Netwrix
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.netwrix.com/netwrix_statement_on_cve_2021_44228_the_apache_log4j_vulnerability.html
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:54+00:00'
|
||
|
- vendor: New Relic
|
||
|
product: Containerized Private Minion (CPM)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions: []
|
||
|
fixed_versions:
|
||
|
- 3.0.57
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr21-04/
|
||
|
notes: New Relic is in the process of revising guidance/documentation, however
|
||
|
the fix version remains sufficient.
|
||
|
references:
|
||
|
- '[Security Bulletin NR21-04](https://docs.newrelic.com/docs/security/new-relic-security/security-bulletins/security-bulletin-nr21-04/)'
|
||
|
last_updated: '2021-12-18T00:00:00'
|
||
|
- vendor: New Relic
|
||
|
product: New Relic Java Agent
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions:
|
||
|
- <7.4.3
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://docs.newrelic.com/docs/release-notes/agent-release-notes/java-release-notes/java-agent-743/
|
||
|
notes: Initially fixed in 7.4.2, but additional vulnerability found
|
||
|
references:
|
||
|
- '[New Relic tracking](https://github.com/newrelic/newrelic-java-agent/issues/605),
|
||
|
covers CVE-2021-44228, CVE-2021-45046'
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: NextCloud
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://help.nextcloud.com/t/apache-log4j-does-not-affect-nextcloud/129244
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:54+00:00'
|
||
|
- vendor: Nextflow
|
||
|
product: Nextflow
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions:
|
||
|
- 21.04.0.5552
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.nextflow.io/docs/latest/index.html
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-21T00:00:00'
|
||
|
- vendor: Nexus Group
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://doc.nexusgroup.com/pages/viewpage.action?pageId=83133294
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:54+00:00'
|
||
|
- vendor: NI (National Instruments)
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.ni.com/en-us/support/documentation/supplemental/21/ni-response-to-apache-log4j-vulnerability-.html
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:54+00:00'
|
||
|
- vendor: Nice Software (AWS) EnginFRAME
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.enginframe.com/
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:54+00:00'
|
||
|
- vendor: NinjaRMM
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://ninjarmm.zendesk.com/hc/en-us/articles/4416226194189-12-10-21-Security-Declaration-NinjaOne-not-affected-by-CVE-2021-44228-log4j-
|
||
|
notes: This advisory is available to customers only and has not been reviewed
|
||
|
by CISA
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:54+00:00'
|
||
|
- vendor: Nomachine
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://forums.nomachine.com/topic/apache-log4j-notification
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:54+00:00'
|
||
|
- vendor: NoviFlow
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://noviflow.com/noviflow-products-and-the-log4shell-exploit-cve-2021-44228/
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:54+00:00'
|
||
|
- vendor: Nulab
|
||
|
product: Backlog
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions: []
|
||
|
fixed_versions:
|
||
|
- N/A (SaaS)
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://nulab.com/blog/company-news/log4shell/
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:54+00:00'
|
||
|
- vendor: Nulab
|
||
|
product: Backlog Enterprise (On-premises)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions: []
|
||
|
fixed_versions:
|
||
|
- < 1.11.7
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://nulab.com/blog/company-news/log4shell/
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:54+00:00'
|
||
|
- vendor: Nulab
|
||
|
product: Cacoo
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions: []
|
||
|
fixed_versions:
|
||
|
- N/A (SaaS)
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://nulab.com/blog/company-news/log4shell/
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:54+00:00'
|
||
|
- vendor: Nulab
|
||
|
product: Cacoo Enterprise (On-premises)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions: []
|
||
|
fixed_versions:
|
||
|
- < 4.0.4
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://nulab.com/blog/company-news/log4shell/
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:54+00:00'
|
||
|
- vendor: Nulab
|
||
|
product: Typetalk
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions: []
|
||
|
fixed_versions:
|
||
|
- N/A (SaaS)
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://nulab.com/blog/company-news/log4shell/
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:54+00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: AHV
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions:
|
||
|
- All
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: AOS
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions:
|
||
|
- LTS (including Prism Element)
|
||
|
- Community Edition
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: AOS
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions: []
|
||
|
fixed_versions:
|
||
|
- STS (including Prism Element)
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: Patched in 6.0.2.4, available on the Portal for download.
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: Beam
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: Saas-Based Procuct. See Advisory.
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: BeamGov
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: Saas-Based Procuct. See Advisory.
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: Calm
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions:
|
||
|
- All
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: Calm Tunnel VM
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions:
|
||
|
- All
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: Collector
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions:
|
||
|
- All
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: Collector Portal
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: Saas-Based Procuct. See Advisory.
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: Data Lens
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: Saas-Based Procuct. See Advisory.
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: Era
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions:
|
||
|
- All
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: File Analytics
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions:
|
||
|
- 2.1.x
|
||
|
- 2.2.x
|
||
|
- 3.0+
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: Mitigated in version 3.0.1 which is available on the Portal for download.
|
||
|
Mitigation is available [here](https://portal.nutanix.com/kb/12499)
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: Files
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions:
|
||
|
- All
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: Flow
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions:
|
||
|
- All
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: Flow Security Cental
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: Saas-Based Procuct. See Advisory.
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: Foundation
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions:
|
||
|
- All
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: Frame
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: Saas-Based Procuct. See Advisory.
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: FrameGov
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: Saas-Based Procuct. See Advisory.
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: FSCVM
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions:
|
||
|
- All
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: Insights
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: Saas-Based Procuct. See Advisory.
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: Karbon
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions:
|
||
|
- All
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: Mitigation is available [here](https://portal.nutanix.com/kb/12483)
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: Karbon Platform Service
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: Saas-Based Procuct. See Advisory.
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: Leap
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: Saas-Based Procuct. See Advisory.
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: LCM
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions:
|
||
|
- All
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: Mine
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions:
|
||
|
- All
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: Mitigation is available [here](https://portal.nutanix.com/kb/12484)
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: Move
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions:
|
||
|
- All
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: MSP
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions:
|
||
|
- All
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: Mitigation is available [here](https://portal.nutanix.com/kb/12482)
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: NCC
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions:
|
||
|
- All
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: NGT
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions:
|
||
|
- All
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: Objects
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions:
|
||
|
- All
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: Mitigation is available [here](https://portal.nutanix.com/kb/12482)
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: Prism Central
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions: []
|
||
|
fixed_versions:
|
||
|
- All
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: Patched in 2021-9.0.3, available on the Portal for download.
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: Sizer
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: Saas-Based Procuct. See Advisory.
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: Volumes
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions:
|
||
|
- All
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: Witness VM
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions:
|
||
|
- All
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: Mitigation is available [here](https://portal.nutanix.com/kb/12491)
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nutanix
|
||
|
product: X-Ray
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions:
|
||
|
- All
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://download.nutanix.com/alerts/Security_Advisory_0023.pdf
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Nvidia
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://nvidia.custhelp.com/app/answers/detail/a_id/5294
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:54+00:00'
|
||
|
- vendor: NXLog
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://nxlog.co/news/apache-log4j-vulnerability-cve-2021-44228
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:54+00:00'
|
||
|
...
|