mirror of
https://github.com/cisagov/log4j-affected-db.git
synced 2024-11-06 00:48:28 +00:00
331 lines
8.9 KiB
YAML
331 lines
8.9 KiB
YAML
|
---
|
||
|
version: '1.0'
|
||
|
owners:
|
||
|
- name: cisagov
|
||
|
url: https://github.com/cisagov/log4j-affected-db
|
||
|
software:
|
||
|
- vendor: QF-Test
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.qfs.de/en/blog/article/no-log4j-vulnerability-in-qf-test.html
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:55+00:00'
|
||
|
- vendor: Qlik
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:55+00:00'
|
||
|
- vendor: QMATIC
|
||
|
product: Orchestra Central
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions:
|
||
|
- 6.0+
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.qmatic.com/meet-qmatic/news/qmatic-statement-on-log4j-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-21T00:00:00'
|
||
|
- vendor: QMATIC
|
||
|
product: Appointment Booking
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions:
|
||
|
- 2.4+
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.qmatic.com/meet-qmatic/news/qmatic-statement-on-log4j-vulnerability
|
||
|
notes: Update to v. 2.8.2 which contains log4j 2.16
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-21T00:00:00'
|
||
|
- vendor: QMATIC
|
||
|
product: Insights
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions:
|
||
|
- Cloud
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.qmatic.com/meet-qmatic/news/qmatic-statement-on-log4j-vulnerability
|
||
|
notes: log4j 2.16 applied 2021-12-16
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-21T00:00:00'
|
||
|
- vendor: QMATIC
|
||
|
product: Appointment Booking
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions:
|
||
|
- Cloud/Managed Service
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.qmatic.com/meet-qmatic/news/qmatic-statement-on-log4j-vulnerability
|
||
|
notes: log4j 2.16 applied 2021-12-15
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-21T00:00:00'
|
||
|
- vendor: QNAP
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.qnap.com/en-uk/security-advisory/qsa-21-58
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:55+00:00'
|
||
|
- vendor: QOPPA
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://kbdeveloper.qoppa.com/cve-2021-44228-apache-log4j-vulnerability/
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:55+00:00'
|
||
|
- vendor: QSC Q-SYS
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://qscprod.force.com/selfhelpportal/s/article/Are-Q-SYS-products-affected-by-the-Log4j-vulnerability-CVE-2021-44228
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:55+00:00'
|
||
|
- vendor: QT
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.qt.io/blog/the-qt-company-products-not-affected-by-cve-2021-44228-log4j-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:55+00:00'
|
||
|
- vendor: Quest Global
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.quest.com/fr-fr/search#q=CVE-2021-44228&t=Global
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:55+00:00'
|
||
|
...
|