1
0
Fork 0
mirror of https://github.com/cisagov/log4j-affected-db.git synced 2024-11-18 14:57:54 +00:00
log4j-affected-db/data/cisagov_J.yml

4113 lines
110 KiB
YAML
Raw Normal View History

---
version: '1.0'
owners:
- name: cisagov
url: https://github.com/cisagov/log4j-affected-db
software:
- vendor: Jamasoftware
2022-02-03 21:27:52 +00:00
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://community.jamasoftware.com/communities/community-home/digestviewer/viewthread?MessageKey=06d26f9c-2abe-4c10-93d4-c0f6c8a01b22&CommunityKey=c9d20d4c-5bb6-4f19-92eb-e7cee0942d51&tab=digestviewer#bm06d26f9c-2abe-4c10-93d4-c0f6c8a01b22
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Jamf
2022-02-03 21:27:52 +00:00
product: Jamf Cloud
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
2022-02-03 21:27:52 +00:00
affected_versions: []
fixed_versions:
- ''
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://docs.jamf.com/technical-articles/Mitigating_the_Apache_Log4j_2_Vulnerability.html
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Jamf
product: Jamf Connect
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://docs.jamf.com/technical-articles/Mitigating_the_Apache_Log4j_2_Vulnerability.html
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Jamf
product: Jamf Data Policy
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://docs.jamf.com/technical-articles/Mitigating_the_Apache_Log4j_2_Vulnerability.html
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Jamf
product: Jamf Health Care Listener
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://docs.jamf.com/technical-articles/Mitigating_the_Apache_Log4j_2_Vulnerability.html
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Jamf
product: Jamf Infrastructure Manager
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
2022-02-03 21:27:52 +00:00
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://docs.jamf.com/technical-articles/Mitigating_the_Apache_Log4j_2_Vulnerability.html
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Jamf
product: Jamf Now
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://docs.jamf.com/technical-articles/Mitigating_the_Apache_Log4j_2_Vulnerability.html
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Jamf
product: Jamf Private Access
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://docs.jamf.com/technical-articles/Mitigating_the_Apache_Log4j_2_Vulnerability.html
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Jamf
product: Jamf Pro (On-Prem)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
2022-02-04 21:00:55 +00:00
- 10.34.1
2022-02-03 21:27:52 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://docs.jamf.com/technical-articles/Mitigating_the_Apache_Log4j_2_Vulnerability.html
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Jamf
product: Jamf Protect
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://docs.jamf.com/technical-articles/Mitigating_the_Apache_Log4j_2_Vulnerability.html
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Jamf
product: Jamf School
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://docs.jamf.com/technical-articles/Mitigating_the_Apache_Log4j_2_Vulnerability.html
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Jamf
product: Jamf Threat Defense
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://docs.jamf.com/technical-articles/Mitigating_the_Apache_Log4j_2_Vulnerability.html
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Janitza
product: GridVis
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- 8.0.82
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.janitza.com/us/gridvis-download.html
notes: ''
references:
- ''
last_updated: '2022-01-05T00:00:00'
- vendor: Jaspersoft
2022-02-03 21:27:52 +00:00
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://community.jaspersoft.com/wiki/apache-log4j-vulnerability-update-jaspersoft-products
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
2022-02-04 17:46:03 +00:00
- vendor: Java Melody
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
2022-02-04 21:00:55 +00:00
- 1.90.0
2022-02-04 17:46:03 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://github.com/javamelody/javamelody/wiki/ReleaseNotes
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Jedox
2022-02-04 17:46:03 +00:00
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.jedox.com/en/trust/
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Jenkins
2022-02-04 17:46:03 +00:00
product: CI
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-04 17:46:03 +00:00
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
2022-02-04 17:46:03 +00:00
vendor_links:
- https://www.jenkins.io/blog/2021/12/10/log4j2-rce-CVE-2021-44228/
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Jenkins
product: CI/CD Core
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
2022-02-04 17:46:03 +00:00
vendor_links:
- https://www.jenkins.io/blog/2021/12/10/log4j2-rce-CVE-2021-44228/
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Jenkins
product: Plugins
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.jenkins.io/blog/2021/12/10/log4j2-rce-CVE-2021-44228/
2022-02-04 17:46:03 +00:00
notes: ''
references:
2022-02-04 17:46:03 +00:00
- '[Instructions to test your installations in announcement](https://www.jenkins.io/blog/2021/12/10/log4j2-rce-CVE-2021-44228/)'
last_updated: '2021-12-16T00:00:00'
- vendor: JetBrains
2022-01-24 22:27:28 +00:00
product: All .NET tools (ReSharper, Rider, ReSharper C++, dotTrace, dotMemory,
dotCover, dotPeek)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 17:46:03 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
2022-01-24 22:27:28 +00:00
- vendor: Jetbrains
product: Code With Me
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
2022-01-24 22:27:28 +00:00
fixed_versions:
2022-02-04 17:46:03 +00:00
- ''
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: JetBrains
2022-01-24 22:27:28 +00:00
product: Datalore
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 17:46:03 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: JetBrains
2022-02-04 19:17:46 +00:00
product: Floating License Server
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
2022-01-24 22:27:28 +00:00
fixed_versions:
2022-02-04 17:46:03 +00:00
- '30241'
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: JetBrains
2022-01-24 22:27:28 +00:00
product: Gateway
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
2022-01-24 22:27:28 +00:00
fixed_versions: []
unaffected_versions:
2022-02-04 17:46:03 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: JetBrains
2022-01-24 22:27:28 +00:00
product: Hub
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
2022-02-04 21:00:55 +00:00
- 2021.1.14080
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://blog.jetbrains.com/hub/2021/12/14/hub-update-regarding-log4j2-vulnerability/
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: JetBrains
2022-01-24 22:27:28 +00:00
product: IntelliJ platform based IDEs (AppCode, CLion, DataGrip, DataSpell, GoLand,
IntelliJ IDEA Ultimate/Community/Edu, PhpStorm, PyCharm Professional/Community/Edu,
Rider, RubyMine, WebStorm)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
2022-01-24 22:27:28 +00:00
fixed_versions: []
unaffected_versions:
2022-02-04 17:46:03 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: JetBrains
2022-01-24 22:27:28 +00:00
product: Kotlin
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 17:46:03 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: JetBrains
2022-01-24 22:27:28 +00:00
product: Ktor
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 17:46:03 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
2022-01-24 22:27:28 +00:00
- vendor: JetBrains
product: MPS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
2022-01-24 22:27:28 +00:00
fixed_versions: []
unaffected_versions:
2022-02-04 17:46:03 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: JetBrains
2022-01-24 22:27:28 +00:00
product: Space
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 17:46:03 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: JetBrains
2022-01-24 22:27:28 +00:00
product: TeamCity
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 17:46:03 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://youtrack.jetbrains.com/issue/TW-74298
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: JetBrains
2022-01-24 22:27:28 +00:00
product: ToolBox
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 17:46:03 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: JetBrains
2022-01-24 22:27:28 +00:00
product: UpSource
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
2022-01-24 22:27:28 +00:00
fixed_versions:
2022-02-04 21:00:55 +00:00
- 2020.1.1952
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: JetBrains
2022-01-24 22:27:28 +00:00
product: YouTrack InCloud
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
2022-02-04 17:46:03 +00:00
- ''
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: JetBrains
2022-01-24 22:27:28 +00:00
product: YouTrack Standalone
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
2022-02-04 21:00:55 +00:00
- 2021.4.35970
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://blog.jetbrains.com/youtrack/2021/12/youtrack-update-regarding-log4j2-vulnerability/
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
2022-02-04 19:57:43 +00:00
- vendor: JFrog
2022-02-04 17:46:03 +00:00
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-04 17:46:03 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-02-04 19:17:46 +00:00
unaffected_versions:
2022-02-04 17:46:03 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://jfrog.com/knowledge-base/general-jfrog-services-are-not-affected-by-vulnerability-cve-2021-44228/
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
2022-02-04 19:57:43 +00:00
- vendor: JGraph
product: DrawIO
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-04 19:57:43 +00:00
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
2022-02-04 19:57:43 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://github.com/jgraph/drawio/issues/2490
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Jitsi
product: jitsi-videobridge
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
2022-02-04 19:57:43 +00:00
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
2022-02-04 21:00:55 +00:00
- v2.1-595-g3637fda42
2022-02-04 19:57:43 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://github.com/jitsi/security-advisories/blob/4e1ab58585a8a0593efccce77d5d0e22c5338605/advisories/JSA-2021-0004.md
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Jitterbit
2022-02-04 19:57:43 +00:00
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://success.jitterbit.com/display/DOC/Mitigating+the+Apache+Log4j2+JNDI+Vulnerability
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
2022-02-04 19:57:43 +00:00
- vendor: Johnson Controls
product: Athena
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
2022-02-04 19:57:43 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
2022-01-24 22:27:28 +00:00
- vendor: Johnson Controls
product: BCPro
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
2022-02-04 19:57:43 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-02-04 21:00:55 +00:00
product: CEM AC2000
2022-02-04 19:57:43 +00:00
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
2022-02-04 19:57:43 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-02-04 21:00:55 +00:00
product: CEM Hardware Products
2022-02-04 19:57:43 +00:00
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
2022-02-04 19:57:43 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-02-04 21:00:55 +00:00
product: CK721-A (P2000)
2022-02-04 19:57:43 +00:00
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
2022-02-04 19:57:43 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-02-04 21:00:55 +00:00
product: CloudVue Gateway
2022-02-04 19:57:43 +00:00
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
2022-01-24 22:27:28 +00:00
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-02-04 21:00:55 +00:00
product: CloudVue Web
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-02-04 21:00:55 +00:00
product: Connect24
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-02-04 21:00:55 +00:00
product: Connected Equipment Gateway (CEG)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-02-04 21:00:55 +00:00
product: C•CURE Client
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-02-04 21:00:55 +00:00
product: C•CURE Server
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-02-04 21:00:55 +00:00
product: C•CURE Web
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-02-04 21:00:55 +00:00
product: C•CURE-9000
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- 2.90.x
- 2.80.x
- 2.70.x
- 2.60.x
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-02-04 19:57:43 +00:00
product: DataSource
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-01-24 22:27:28 +00:00
product: DLS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-01-24 22:27:28 +00:00
- All versions
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-01-24 22:27:28 +00:00
product: Entrapass
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-01-24 22:27:28 +00:00
product: exacqVision Client
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-01-24 22:27:28 +00:00
product: exacqVision Server
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-01-24 22:27:28 +00:00
product: exacqVision WebService
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-01-24 22:27:28 +00:00
product: Facility Explorer
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- 14.x
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-01-24 22:27:28 +00:00
product: Illustra Cameras
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-01-24 22:27:28 +00:00
product: Illustra Insight
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-01-24 22:27:28 +00:00
product: iSTAR
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
2022-02-04 19:57:43 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
product: Kantech Entrapass
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-01-24 22:27:28 +00:00
product: Metasys Products and Tools
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- All versions
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-02-04 19:57:43 +00:00
product: OpenBlue Active Responder
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-02-04 19:57:43 +00:00
product: OpenBlue Bridge
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-02-04 19:57:43 +00:00
product: OpenBlue Chiller Utility Plant Optimizer
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-02-04 19:57:43 +00:00
product: OpenBlue Cloud
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-02-04 19:57:43 +00:00
product: OpenBlue Connected Chiller
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-02-04 19:57:43 +00:00
product: OpenBlue Enterprise Manager
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-02-04 19:57:43 +00:00
product: OpenBlue Location Manager
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-02-04 19:57:43 +00:00
product: OpenBlue Risk Insight
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
2022-02-04 19:57:43 +00:00
product: OpenBlue Twin
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
2022-02-04 19:57:43 +00:00
- vendor: Johnson Controls
product: OpenBlue Workplace
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
2022-02-04 19:57:43 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
product: P2000
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
2022-02-04 19:57:43 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
product: PowerSeries NEO
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
2022-02-04 19:57:43 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
product: PowerSeries Pro
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
2022-02-04 19:57:43 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
product: Qolsys IQ Panels
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
2022-02-04 19:57:43 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
product: RFID Overhead360 Backend
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
2022-02-04 21:00:55 +00:00
- All
2022-02-04 19:57:43 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
product: S321-IP (P2000)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
2022-02-04 19:57:43 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
product: Shoppertrak Analytics (STaN) - Traffic
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
2022-02-04 19:57:43 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
product: Shoppertrak Market Intelligence
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
2022-02-04 19:57:43 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
product: Shoppertrak Perimeter Apps
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
2022-02-04 19:57:43 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
product: Shoppertrak Shopper Journey
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
2022-02-04 19:57:43 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
product: Shoppertrak Video Analytics
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
2022-02-04 19:57:43 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
product: SurGard Receivers
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
2022-02-04 19:57:43 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
product: TrueVue Cloud
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
2022-02-04 19:57:43 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
product: Tyco AI
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- All versions
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
product: victor
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- 5.x
2022-02-04 19:57:43 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
product: victor/ C•CURE9000 Unified
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- 3.81.x / victor 5.4.1 / C•CURE9000 2.80 and 3.91.x / victor 5.6.1 / C•CURE9000
2.90
2022-02-04 19:57:43 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
product: VideoEdge
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- 5.x
2022-02-04 19:57:43 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Johnson Controls
product: Xaap
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- All
2022-02-04 19:57:43 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
notes: ''
references:
- ''
last_updated: '2021-12-21T00:00:00'
- vendor: Journyx
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: false
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://community.journyx.com/support/solutions/articles/9000209044-apache-log4j-2-vulnerability-cve-2021-44228-
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
2022-01-24 22:27:28 +00:00
- vendor: jPOS
product: (ISO-8583) bridge
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-01-24 22:27:28 +00:00
investigated: true
affected_versions: []
fixed_versions: []
2022-01-24 22:27:28 +00:00
unaffected_versions:
2022-02-04 20:49:25 +00:00
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
2022-01-24 22:27:28 +00:00
- https://github.com/jpos/jPOS/commit/d615199a1bdd35c35d63c07c10fd0bdbbc96f625
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Jump Desktop
2022-02-04 20:49:25 +00:00
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://support.jumpdesktop.com/hc/en-us/articles/4416720395021-Log4j-CVE-2021-44228-CVE-2021-45046-Statement
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
2022-02-04 20:49:25 +00:00
product: Advanced Threat Prevention (JATP)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: AppFormix
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
2022-02-04 20:49:25 +00:00
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: Apstra System
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
2022-02-04 20:49:25 +00:00
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
2022-02-04 20:49:25 +00:00
- vendor: Juniper Networks
product: Apstra System
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: Connectivity Services Director
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: Contrail Analytics
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: Contrail Cloud
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: Contrail Networking
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: Contrail Service Orchestration
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: Cross Provisioning Platform
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: CTPOS and CTPView
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: ICEAAA Manager
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: JATP Cloud
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: Juniper Identity Management Services (JIMS)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: Juniper Mist Edge
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: Juniper Sky Enterprise
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: Junos OS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: Junos OS Evolved
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: Junos Space Network Management Platform
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions:
- ''
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
2022-02-04 21:00:55 +00:00
product: MIST - Juniper Networks Marvis Virtual Network Assistant (VNA)
2022-02-04 20:49:25 +00:00
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- ''
2022-02-04 20:49:25 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
2022-02-04 21:00:55 +00:00
product: MIST - Juniper Networks Mist AI
2022-02-04 20:49:25 +00:00
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
2022-02-04 21:00:55 +00:00
product: MIST - Juniper Networks Wi-Fi Assurance
2022-02-04 20:49:25 +00:00
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
2022-02-04 21:00:55 +00:00
product: MIST - Juniper Networks Wired Assurance
2022-02-04 20:49:25 +00:00
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
2022-02-04 21:00:55 +00:00
product: Mist Access Points
2022-02-04 20:49:25 +00:00
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
2022-02-04 21:00:55 +00:00
- Any version on AP12, AP21, AP32, AP33, AP34, AP41, AP43, AP45, AP61, AP63
2022-02-04 20:49:25 +00:00
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: Network Director
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: Northstar Controller
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions:
- ''
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: Northstar Planner
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: Paragon Insights
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions:
- '>= 21 version 21.1 ; >= 22 version 22.2'
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: Paragon Pathfinder
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions:
- '>= 21 version 21.1 ; >= 22 version 22.2'
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: Paragon Planner
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions:
- '>= 21 version 21.1 ; >= 22 version 22.2'
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: Policy Enforcer
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: Products using Wind River Linux in Junos OS and Junos OS Evolved
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: ScreenOS
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: SecIntel
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: Secure Analytics
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: Security Director
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: Security Director Insights
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: Session Smart Router (Formerly 128T)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: Space SDK
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: Standalone Log Collector 20.1 (as also used by Space Security Director)
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Juniper Networks
product: User Engagement Virtual BLE
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions: []
unaffected_versions:
- ''
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Justice Systems
product: All
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.justicesystems.com/services/support/
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:50+00:00'
...