2022-01-12 07:20:52 +00:00
|
|
|
|
---
|
|
|
|
|
version: '1.0'
|
|
|
|
|
owners:
|
|
|
|
|
- name: cisagov
|
|
|
|
|
url: https://github.com/cisagov/log4j-affected-db
|
|
|
|
|
software:
|
|
|
|
|
- vendor: Jamasoftware
|
2022-02-03 21:27:52 +00:00
|
|
|
|
product: All
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://community.jamasoftware.com/communities/community-home/digestviewer/viewthread?MessageKey=06d26f9c-2abe-4c10-93d4-c0f6c8a01b22&CommunityKey=c9d20d4c-5bb6-4f19-92eb-e7cee0942d51&tab=digestviewer#bm06d26f9c-2abe-4c10-93d4-c0f6c8a01b22
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Jamf
|
2022-02-03 21:27:52 +00:00
|
|
|
|
product: Jamf Cloud
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-02-03 21:27:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions:
|
|
|
|
|
- ''
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://docs.jamf.com/technical-articles/Mitigating_the_Apache_Log4j_2_Vulnerability.html
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
|
|
|
|
- vendor: Jamf
|
|
|
|
|
product: Jamf Connect
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://docs.jamf.com/technical-articles/Mitigating_the_Apache_Log4j_2_Vulnerability.html
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
|
|
|
|
- vendor: Jamf
|
|
|
|
|
product: Jamf Data Policy
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://docs.jamf.com/technical-articles/Mitigating_the_Apache_Log4j_2_Vulnerability.html
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
|
|
|
|
- vendor: Jamf
|
|
|
|
|
product: Jamf Health Care Listener
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://docs.jamf.com/technical-articles/Mitigating_the_Apache_Log4j_2_Vulnerability.html
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
|
|
|
|
- vendor: Jamf
|
|
|
|
|
product: Jamf Infrastructure Manager
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
2022-02-03 21:27:52 +00:00
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://docs.jamf.com/technical-articles/Mitigating_the_Apache_Log4j_2_Vulnerability.html
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
|
|
|
|
- vendor: Jamf
|
|
|
|
|
product: Jamf Now
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://docs.jamf.com/technical-articles/Mitigating_the_Apache_Log4j_2_Vulnerability.html
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
|
|
|
|
- vendor: Jamf
|
|
|
|
|
product: Jamf Private Access
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://docs.jamf.com/technical-articles/Mitigating_the_Apache_Log4j_2_Vulnerability.html
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
|
|
|
|
- vendor: Jamf
|
|
|
|
|
product: Jamf Pro (On-Prem)
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions:
|
|
|
|
|
- '10.34.1'
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://docs.jamf.com/technical-articles/Mitigating_the_Apache_Log4j_2_Vulnerability.html
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
|
|
|
|
- vendor: Jamf
|
|
|
|
|
product: Jamf Protect
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://docs.jamf.com/technical-articles/Mitigating_the_Apache_Log4j_2_Vulnerability.html
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
|
|
|
|
- vendor: Jamf
|
|
|
|
|
product: Jamf School
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://docs.jamf.com/technical-articles/Mitigating_the_Apache_Log4j_2_Vulnerability.html
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
|
|
|
|
- vendor: Jamf
|
|
|
|
|
product: Jamf Threat Defense
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://docs.jamf.com/technical-articles/Mitigating_the_Apache_Log4j_2_Vulnerability.html
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Janitza
|
|
|
|
|
product: GridVis
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-04 17:46:03 +00:00
|
|
|
|
- '8.0.82'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.janitza.com/us/gridvis-download.html
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-05T00:00:00'
|
|
|
|
|
- vendor: Jaspersoft
|
2022-02-03 21:27:52 +00:00
|
|
|
|
product: All
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://community.jaspersoft.com/wiki/apache-log4j-vulnerability-update-jaspersoft-products
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-02-04 17:46:03 +00:00
|
|
|
|
- vendor: Java Melody
|
|
|
|
|
product: All
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions:
|
|
|
|
|
- '1.90.0'
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://github.com/javamelody/javamelody/wiki/ReleaseNotes
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Jedox
|
2022-02-04 17:46:03 +00:00
|
|
|
|
product: All
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.jedox.com/en/trust/
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Jenkins
|
2022-02-04 17:46:03 +00:00
|
|
|
|
product: CI
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-02-04 17:46:03 +00:00
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
2022-01-12 07:20:52 +00:00
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
2022-02-04 17:46:03 +00:00
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.jenkins.io/blog/2021/12/10/log4j2-rce-CVE-2021-44228/
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
|
|
|
|
- vendor: Jenkins
|
|
|
|
|
product: CI/CD Core
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
2022-02-04 17:46:03 +00:00
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.jenkins.io/blog/2021/12/10/log4j2-rce-CVE-2021-44228/
|
2022-01-12 07:20:52 +00:00
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Jenkins
|
|
|
|
|
product: Plugins
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.jenkins.io/blog/2021/12/10/log4j2-rce-CVE-2021-44228/
|
2022-02-04 17:46:03 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
2022-02-04 17:46:03 +00:00
|
|
|
|
- '[Instructions to test your installations in announcement](https://www.jenkins.io/blog/2021/12/10/log4j2-rce-CVE-2021-44228/)'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
last_updated: '2021-12-16T00:00:00'
|
|
|
|
|
- vendor: JetBrains
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: All .NET tools (ReSharper, Rider, ReSharper C++, dotTrace, dotMemory,
|
|
|
|
|
dotCover, dotPeek)
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-04 17:46:03 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- vendor: Jetbrains
|
|
|
|
|
product: Code With Me
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
fixed_versions:
|
2022-02-04 17:46:03 +00:00
|
|
|
|
- ''
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: JetBrains
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Datalore
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-04 17:46:03 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: JetBrains
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Floating license server
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
fixed_versions:
|
2022-02-04 17:46:03 +00:00
|
|
|
|
- '30241'
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/
|
2022-01-12 07:20:52 +00:00
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: JetBrains
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Gateway
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-04 17:46:03 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/
|
2022-01-12 07:20:52 +00:00
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: JetBrains
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Hub
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions:
|
2022-02-04 17:46:03 +00:00
|
|
|
|
- '2021.1.14080'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- https://blog.jetbrains.com/hub/2021/12/14/hub-update-regarding-log4j2-vulnerability/
|
2022-01-12 07:20:52 +00:00
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: JetBrains
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: IntelliJ platform based IDEs (AppCode, CLion, DataGrip, DataSpell, GoLand,
|
|
|
|
|
IntelliJ IDEA Ultimate/Community/Edu, PhpStorm, PyCharm Professional/Community/Edu,
|
|
|
|
|
Rider, RubyMine, WebStorm)
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-04 17:46:03 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: JetBrains
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Kotlin
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-04 17:46:03 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: JetBrains
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Ktor
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-04 17:46:03 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- vendor: JetBrains
|
|
|
|
|
product: MPS
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-04 17:46:03 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: JetBrains
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Space
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-04 17:46:03 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: JetBrains
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: TeamCity
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-04 17:46:03 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- https://youtrack.jetbrains.com/issue/TW-74298
|
2022-01-12 07:20:52 +00:00
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: JetBrains
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: ToolBox
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-04 17:46:03 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: JetBrains
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: UpSource
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
fixed_versions:
|
2022-02-04 17:46:03 +00:00
|
|
|
|
- '2020.1.1952'
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: JetBrains
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: YouTrack InCloud
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions:
|
2022-02-04 17:46:03 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://blog.jetbrains.com/blog/2021/12/13/log4j-vulnerability-and-jetbrains-products-and-services/
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: JetBrains
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: YouTrack Standalone
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions:
|
2022-02-04 17:46:03 +00:00
|
|
|
|
- '2021.4.35970'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- https://blog.jetbrains.com/youtrack/2021/12/youtrack-update-regarding-log4j2-vulnerability/
|
2022-01-12 07:20:52 +00:00
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: JFROG
|
2022-02-04 17:46:03 +00:00
|
|
|
|
product: All
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-02-04 17:46:03 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-04 17:46:03 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://jfrog.com/knowledge-base/general-jfrog-services-are-not-affected-by-vulnerability-cve-2021-44228/
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Jitsi
|
|
|
|
|
product: ''
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://github.com/jitsi/security-advisories/blob/4e1ab58585a8a0593efccce77d5d0e22c5338605/advisories/JSA-2021-0004.md
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Jitterbit
|
|
|
|
|
product: ''
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://success.jitterbit.com/display/DOC/Mitigating+the+Apache+Log4j2+JNDI+Vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- vendor: Johnson Controls
|
|
|
|
|
product: BCPro
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- All versions
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
|
2022-01-12 07:20:52 +00:00
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:27:28 +00:00
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Johnson Controls
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: CEM AC2000
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- All versions
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Johnson Controls
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: CEM Hardware Products
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- All versions
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Johnson Controls
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: CloudVue Gateway
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- All versions
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Johnson Controls
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: CloudVue Web
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- All versions
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Johnson Controls
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: C•CURE‐9000
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- 2.90.x (all 2.90 versions)
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Johnson Controls
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: C•CURE‐9000
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- 2.80.x (all 2.80 versions)
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Johnson Controls
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: C•CURE‐9000
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- 2.70 (All versions)
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Johnson Controls
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: C•CURE‐9000
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- 2.60 (All versions)
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Johnson Controls
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: DLS
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- All versions
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Johnson Controls
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Entrapass
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- All versions
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Johnson Controls
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: exacqVision Client
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- All versions
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Johnson Controls
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: exacqVision Server
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- All versions
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Johnson Controls
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: exacqVision WebService
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- All versions
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Johnson Controls
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Facility Explorer
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- 14.x
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Johnson Controls
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Illustra Cameras
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- All versions
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Johnson Controls
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Illustra Insight
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- All versions
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Johnson Controls
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: iSTAR
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- All versions
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Johnson Controls
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Metasys Products and Tools
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- All versions
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Johnson Controls
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: PowerSeries NEO
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- All versions
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Johnson Controls
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: PowerSeries Pro
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- All versions
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Johnson Controls
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Qolsys IQ Panels
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- All versions
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Johnson Controls
|
|
|
|
|
product: Sur‐Gard Receivers
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- All versions
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Johnson Controls
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Tyco AI
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- All versions
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Johnson Controls
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: victor
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- 5.x
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Johnson Controls
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: victor/ C•CURE‐9000 Unified
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- 3.81.x / victor 5.4.1 / C•CURE‐9000 2.80
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Johnson Controls
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: victor/ C•CURE‐9000 Unified
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- 3.91.x / victor 5.6.1 / C•CURE‐9000 2.90
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Johnson Controls
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: VideoEdge
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- 5.x
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- vendor: Journyx
|
|
|
|
|
product: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
investigated: false
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- https://community.journyx.com/support/solutions/articles/9000209044-apache-log4j-2-vulnerability-cve-2021-44228-
|
2022-01-12 07:20:52 +00:00
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- vendor: jPOS
|
|
|
|
|
product: (ISO-8583) bridge
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- Unknown
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- https://github.com/jpos/jPOS/commit/d615199a1bdd35c35d63c07c10fd0bdbbc96f625
|
2022-01-12 07:20:52 +00:00
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Jump Desktop
|
|
|
|
|
product: ''
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://support.jumpdesktop.com/hc/en-us/articles/4416720395021-Log4j-CVE-2021-44228-CVE-2021-45046-Statement
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Juniper Networks
|
|
|
|
|
product: ''
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11259
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Justice Systems
|
|
|
|
|
product: ''
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.justicesystems.com/services/support/
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
...
|