mirror of
https://github.com/cisagov/log4j-affected-db.git
synced 2024-11-05 08:28:27 +00:00
7007 lines
196 KiB
YAML
7007 lines
196 KiB
YAML
|
---
|
|||
|
version: '1.0'
|
|||
|
owners:
|
|||
|
- name: cisagov
|
|||
|
url: https://github.com/cisagov/log4j-affected-db
|
|||
|
software:
|
|||
|
- vendor: I-Net software
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://faq.inetsoftware.de/t/statement-about-cve-2021-44228-log4j-vulnerability-concerning-i-net-software-products/269/3
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|||
|
- vendor: I2P
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://geti2p.net/en/blog/post/2021/12/11/i2p-unaffected-cve-2021-44228
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|||
|
- vendor: IBA-AG
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.iba-ag.com/en/security
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|||
|
- vendor: Ibexa
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://developers.ibexa.co/security-advisories/cve-2021-44228-log4j-vulnerability
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: BigFix Compliance
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links: []
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: BigFix Inventory
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- VM Manager Tool & SAP Tool
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links: []
|
|||
|
notes: To verify if your instance is affected, go to the lib subdirectory of the
|
|||
|
tool (BESClient/LMT/SAPTOOL and BESClient/LMT/VMMAN) and check what version
|
|||
|
of log4j is included. Version is included in the name of the library.
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Analytics Engine
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: App Configuration
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: App Connect
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: App ID
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Application Gateway
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Aspera Endpoint
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Aspera Enterprise
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Aspera fasp.io
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Aspera
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Bare Metal Servers
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Block Storage
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Block Storage for VPC
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Block Storage Snapshots for VPC
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Case Manager
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Certificate Manager
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Client VPN for VPC
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Cloud Activity Tracker
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Cloud Backup
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Cloud Monitoring
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Cloud Object Storage
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Cloud Object Storage
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Cloudant
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Code Engine
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Cognos Command Center
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Cognos Controller
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- 10.4.2
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/support/pages/node/6526468>
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Cognos Integration Server
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Compose Enterprise
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Compose for Elasticsearch
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Compose for etcd
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Compose for MongoDB
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Compose for MySQL
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Compose for PostgreSQL
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Compose for RabbitMQ
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Compose for Redis
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Compose for RethinkDB
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Compose for ScyllaDB
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Container Registry
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Container Security Services
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Content Delivery Network
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Continuous Delivery
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Copy Services Manager
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Databases for DataStax
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Databases for EDB
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Databases for Elasticsearch
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Databases for etcd
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Databases for MongoDB
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Databases for PostgreSQL
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Databases for Redis
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Datapower Gateway
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Dedicated Host for VPC
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Direct Link Connect
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Direct Link Connect on Classic
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Direct Link Dedicated (2.0)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Direct Link Dedicated Hosting on Classic
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Direct Link Dedicated on Classic
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Direct Link Exchange on Classic
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: DNS Services
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Emptoris Contract Management
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Emptoris Program Management
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Emptoris Sourcing
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Emptoris Spend Analysis
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Emptoris Supplier Lifecycle Management
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Enterprise Tape Controller Model C07 (3592) (ETC)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Event Notifications
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Event Streams
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: File Storage
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Flash System 900 (& 840)
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Flow Logs for VPC
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Functions
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: GSKit
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Guardium S-TAP for Data Sets on z/OS
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Guardium S-TAP for DB2 on z/OS
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Guardium S-TAP for IMS on z/OS
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Hyper Protect Crypto Services
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Hyper Protect DBaaS for MongoDB
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Hyper Protect DBaaS for PostgreSQL
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Hyper Protect Virtual Server
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: i2 Analyst’s Notebook
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: i2 Base
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: IBM Application Runtime Expert for i
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: IBM Backup, Recovery and Media Services for i
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: IBM Db2 Mirror for i
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: IBM HTTP Server
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: IBM i Access Family
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: IBM i Portfolio of products under the Group SWMA
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: IBM PowerHA System Mirror for i
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: IBM Sterling Connect:Direct Browser User Interface
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: IBM Sterling Connect:Direct File Agent
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- See Vendor Links
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/security-bulletin-apache-log4j-vulnerability-affects-ibm-sterling-connectdirect-for-unix-cve-2021-44228/
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- '[https://www.ibm.com/support/pages/node/6526688](https://www.ibm.com/support/pages/node/6526688),
|
|||
|
[https://www.ibm.com/support/pages/node/6528324](https://www.ibm.com/support/pages/node/6528324),
|
|||
|
[https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/](https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/)'
|
|||
|
last_updated: '2021-12-20T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: IBM Sterling Connect:Direct for HP NonStop
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: IBM Sterling Connect:Direct for i5/OS
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: IBM Sterling Connect:Direct for OpenVMS
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: IBM Sterling Connect:Express for Microsoft Windows
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: IBM Sterling Connect:Express for UNIX
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: IBM Sterling Connect:Express for z/OS
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Instana Agent
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- Timestamp lower than 12-11-2021
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://status.instana.io/incidents/4zgcd2gzf4jw
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-14T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Internet Services
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Key Lifecycle Manager for z/OS
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Key Protect
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Knowledge Studio
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Kubernetes Service
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Load Balancer for VPC
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Log Analysis
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Managed VMware Service
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Management Extender for VMware vCenter
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links: []
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Mass Data Migration
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Maximo EAM SaaS
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Message Hub
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: MQ Appliance
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: MQ on IBM Cloud
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Natural Language Understanding
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: OmniFind Text Search Server for DB2 for i
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: OPENBMC
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Planning Analytics Workspace
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- '>2.0.57'
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/support/pages/node/6525700
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Power HMC
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- V9.2.950.0 & V10.1.1010.0
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/support/pages/node/6526172?myns=pwrsmc&mynp=OCSGGSNP&mync=E&cm_sp=pwrsmc-_-OCSGGSNP-_-E
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: PowerSC
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: PowerVM Hypervisor
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: PowerVM VIOS
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: QRadar Advisor
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Qradar Network Threat Analytics
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: QRadar SIEM
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Quantum Services
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Rational Developer for AIX and Linux
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Rational Developer for i
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Red Hat OpenShift on IBM Cloud
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Resilient
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links: []
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Robotic Process Automation
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: SAN Volume Controller and Storwize Family
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Satellite Infrastructure Service
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Schematics
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Secrets Manager
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Secure Gateway
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Server Automation
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links: []
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Spectrum Archive Library Edition
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Spectrum Discover
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Spectrum Protect Client Management Service
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: 'Spectrum Protect for Databases: Data Protection for Oracle'
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: 'Spectrum Protect for Databases: Data Protection for SQL'
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Spectrum Protect for Enterprise Resource Planning
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: 'Spectrum Protect for Mail: Data Protection for Domino'
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: 'Spectrum Protect for Mail: Data Protection for Exchange'
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Spectrum Protect for Workstations
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Spectrum Protect for z/OS USS Client and API
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Spectrum Protect Plus Db2 Agent
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Spectrum Protect Plus Exchange Agent
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Spectrum Protect Plus File Systems Agent
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Spectrum Protect Plus MongoDB Agent
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Spectrum Protect Plus O365 Agent
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Spectrum Protect Server
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Spectrum Protect Snapshot for UNIX
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Spectrum Protect Snapshot for UNIX
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: SQL Query
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Sterling Gentran
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Sterling Order Management
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Sterling Transformation Extender Pack for ACORD
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Sterling Transformation Extender Pack for Financial Services
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Sterling Transformation Extender Pack for FIX
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Sterling Transformation Extender Pack for NACHA
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Sterling Transformation Extender Pack for PeopleSoft
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Sterling Transformation Extender Pack for SAP R/3
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Sterling Transformation Extender Pack for SEPA
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Sterling Transformation Extender Pack for Siebel
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Sterling Transformation Extender Pack for SWIFT
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Sterling Transformation Extender Packs for EDI
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Sterling Transformation Extender Packs for Healthcare
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Sterling Transformation Extender Trading Manager
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Storage TS1160
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Storage TS2280
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Storage TS2900 Library
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Storage TS3100-TS3200 Library
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Storage TS4500 Library
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Storage Virtualization Engine TS7700
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Tape System Library Manager
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: TDMF for zOS
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Total Storage Service Console (TSSC) / TS4500 IMC
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Transit Gateway
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Tririga Anywhere
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: TS4300
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Urbancode Deploy
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Virtual Private Cloud
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Virtual Server for Classic
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Virtualization Management Interface
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: VMware Solutions
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: VMware vCenter Server
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: VMware vSphere
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: VPN for VPC
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: vRealize Operations and Log Insight
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: IBM
|
|||
|
product: Workload Automation
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ibm.com/blogs/psirt/an-update-on-the-apache-log4j-cve-2021-44228-vulnerability/#list-of-products
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-15T00:00:00'
|
|||
|
- vendor: ICONICS
|
|||
|
product: All
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://iconics.com/News/Press-Releases/2021/ICONICS-Not-Subject-to-Apache-Log4j-Vulnerability
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-21T00:00:00'
|
|||
|
- vendor: IFS
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://community.ifs.com/announcements-278/urgent-bulletin-ifs-advisory-ifs-products-services-and-log4j-cve-2021-44228-16436
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|||
|
- vendor: IGEL
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://kb.igel.com/securitysafety/en/isn-2021-11-ums-log4j-vulnerability-54086712.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|||
|
- vendor: Ignite Realtime
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://discourse.igniterealtime.org/t/openfire-4-6-5-released/91108
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|||
|
- vendor: iGrafx
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.igrafx.com/igrafx-thwarts-log4j-vulnerability/
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|||
|
- vendor: Illuminated Cloud
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://illuminatedcloud.blogspot.com/2021/12/illuminated-cloud-2-and-log4j-security.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|||
|
- vendor: Illumio
|
|||
|
product: C-VEN
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-16T00:00:00'
|
|||
|
- vendor: Illumio
|
|||
|
product: CLI
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-16T00:00:00'
|
|||
|
- vendor: Illumio
|
|||
|
product: CloudSecure
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-16T00:00:00'
|
|||
|
- vendor: Illumio
|
|||
|
product: Core on-premise PCE
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-16T00:00:00'
|
|||
|
- vendor: Illumio
|
|||
|
product: Core SaaS PCE
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-16T00:00:00'
|
|||
|
- vendor: Illumio
|
|||
|
product: Edge SaaS PCE
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-16T00:00:00'
|
|||
|
- vendor: Illumio
|
|||
|
product: Edge-CrowdStrike
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-16T00:00:00'
|
|||
|
- vendor: Illumio
|
|||
|
product: Flowlink
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-16T00:00:00'
|
|||
|
- vendor: Illumio
|
|||
|
product: Kubelink
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-16T00:00:00'
|
|||
|
- vendor: Illumio
|
|||
|
product: NEN
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-16T00:00:00'
|
|||
|
- vendor: Illumio
|
|||
|
product: QRadar App
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-16T00:00:00'
|
|||
|
- vendor: Illumio
|
|||
|
product: Splunk App
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-16T00:00:00'
|
|||
|
- vendor: Illumio
|
|||
|
product: VEN
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.illumio.com/knowledge-base/articles/Customer-Security-Advisory-on-log4j-RCE-CVE-2021-44228.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-16T00:00:00'
|
|||
|
- vendor: IManage
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://help.imanage.com/hc/en-us/articles/4412696236699-ADVISORY-Security-vulnerability-CVE-2021-44228-in-third-party-component-Apache-Log4j2#h_3164fa6c-4717-4aa1-b2dc-d14d4112595e
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|||
|
- vendor: Imperva
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.imperva.com/blog/how-were-protecting-customers-staying-ahead-of-cve-2021-44228/
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|||
|
- vendor: Inductive Automation
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.inductiveautomation.com/hc/en-us/articles/4416204541709-Regarding-CVE-2021-44228-Log4j-RCE-0-day
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|||
|
- vendor: IndustrialDefender
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.industrialdefender.com/cve-2021-44228-log4j/
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|||
|
- vendor: infinidat
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.infinidat.com/hc/en-us/articles/4413483145489-INFINIDAT-Support-Announcement-2021-010-Log4Shell-CVE-2021-44228
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|||
|
- vendor: InfluxData
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.influxdata.com/blog/apache-log4j-vulnerability-cve-2021-44228/
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|||
|
- vendor: Infoblox
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://support.infoblox.com/articles/Knowledge/Infoblox-NIOS-and-BloxOne-products-not-vulnerable-to-CVE-2021-44228
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|||
|
- vendor: Informatica
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://network.informatica.com/community/informatica-network/blog/2021/12/10/log4j-vulnerability-update
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|||
|
- vendor: Instana
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://status.instana.io/incidents/4zgcd2gzf4jw
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|||
|
- vendor: Instructure
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://community.canvaslms.com/t5/Community-Users/Instructure-amp-the-Apache-Log4j2-Vulnerability/ba-p/501907
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|||
|
- vendor: Intel
|
|||
|
product: Audio Development Kit
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-16T00:00:00'
|
|||
|
- vendor: Intel
|
|||
|
product: Datacenter Manager
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-16T00:00:00'
|
|||
|
- vendor: Intel
|
|||
|
product: oneAPI sample browser plugin for Eclipse
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-16T00:00:00'
|
|||
|
- vendor: Intel
|
|||
|
product: System Debugger
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-16T00:00:00'
|
|||
|
- vendor: Intel
|
|||
|
product: Secure Device Onboard
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-16T00:00:00'
|
|||
|
- vendor: Intel
|
|||
|
product: Genomics Kernel Library
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-16T00:00:00'
|
|||
|
- vendor: Intel
|
|||
|
product: System Studio
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-16T00:00:00'
|
|||
|
- vendor: Intel
|
|||
|
product: Computer Vision Annotation Tool maintained by Intel
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-16T00:00:00'
|
|||
|
- vendor: Intel
|
|||
|
product: Sensor Solution Firmware Development Kit
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-16T00:00:00'
|
|||
|
- vendor: Internet Systems Consortium(ISC)
|
|||
|
product: ISC DHCP, aka dhcpd
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions:
|
|||
|
- All
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.isc.org/blogs/2021-log4j/
|
|||
|
notes: no JAVA Code
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-17T00:00:00'
|
|||
|
- vendor: Internet Systems Consortium(ISC)
|
|||
|
product: Kea DHCP
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions:
|
|||
|
- All
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.isc.org/blogs/2021-log4j/
|
|||
|
notes: no JAVA Code
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-17T00:00:00'
|
|||
|
- vendor: Internet Systems Consortium(ISC)
|
|||
|
product: BIND 9
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions:
|
|||
|
- All
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.isc.org/blogs/2021-log4j/
|
|||
|
notes: no JAVA Code
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2021-12-17T00:00:00'
|
|||
|
- vendor: InterSystems
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.intersystems.com/gt/apache-log4j2/
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:54+00:00'
|
|||
|
- vendor: Intland
|
|||
|
product: codebeamer
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: true
|
|||
|
affected_versions:
|
|||
|
- <= 20.11-SP11
|
|||
|
- <= 21.09-SP3
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://codebeamer.com/cb/wiki/19872365
|
|||
|
notes: A fix has been released for [20.11](https://codebeamer.com/cb/wiki/13134438)
|
|||
|
and [21.09](https://codebeamer.com/cb/wiki/19418497), but not yet for [21.04](https://codebeamer.com/cb/wiki/16937839)
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:54+00:00'
|
|||
|
- vendor: IPRO
|
|||
|
product: Netgovern
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links: []
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:54+00:00'
|
|||
|
- vendor: iRedMail
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://forum.iredmail.org/topic18605-log4j-cve202144228.html
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:54+00:00'
|
|||
|
- vendor: Ironnet
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://www.ironnet.com/blog/ironnet-security-notifications-related-to-log4j-vulnerability
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:54+00:00'
|
|||
|
- vendor: ISLONLINE
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://blog.islonline.com/2021/12/13/isl-online-is-not-affected-by-log4shell-vulnerability/
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:54+00:00'
|
|||
|
- vendor: Ivanti
|
|||
|
product: ''
|
|||
|
cves:
|
|||
|
cve-2021-4104:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-44228:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45046:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
cve-2021-45105:
|
|||
|
investigated: false
|
|||
|
affected_versions: []
|
|||
|
fixed_versions: []
|
|||
|
unaffected_versions: []
|
|||
|
vendor_links:
|
|||
|
- https://forums.ivanti.com/s/article/CVE-2021-44228-Java-logging-library-log4j-Ivanti-Products-Impact-Mapping?language=en_US
|
|||
|
notes: ''
|
|||
|
references:
|
|||
|
- ''
|
|||
|
last_updated: '2022-01-12T07:18:54+00:00'
|
|||
|
...
|