2022-01-12 07:20:52 +00:00
|
|
|
---
|
|
|
|
version: '1.0'
|
|
|
|
owners:
|
|
|
|
- name: cisagov
|
|
|
|
url: https://github.com/cisagov/log4j-affected-db
|
|
|
|
software:
|
2022-02-03 15:35:31 +00:00
|
|
|
- vendor: Qconference
|
|
|
|
product: FaceTalk
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
|
|
|
- ''
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://qconferencing.com/status-vulnerability-log4j-en-qconferencing/
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-16T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
- vendor: QF-Test
|
2022-02-03 15:35:31 +00:00
|
|
|
product: All
|
2022-01-12 07:20:52 +00:00
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.qfs.de/en/blog/article/no-log4j-vulnerability-in-qf-test.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
- vendor: Qlik
|
2022-02-03 15:35:31 +00:00
|
|
|
product: AIS, including ARC
|
2022-01-12 07:20:52 +00:00
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
2022-02-03 15:35:31 +00:00
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-02-03 16:05:36 +00:00
|
|
|
- All
|
2022-02-03 15:35:31 +00:00
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
|
|
|
- vendor: Qlik
|
|
|
|
product: Attunity Visibility
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
2022-01-12 07:20:52 +00:00
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
2022-02-03 15:35:31 +00:00
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-02-03 16:05:36 +00:00
|
|
|
- All
|
2022-01-12 07:20:52 +00:00
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
2022-02-03 15:35:31 +00:00
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
|
|
|
- vendor: Qlik
|
|
|
|
product: AutoML
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-02-03 16:05:36 +00:00
|
|
|
- All
|
2022-02-03 15:35:31 +00:00
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
|
|
|
- vendor: Qlik
|
|
|
|
product: Blendr
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-02-03 16:05:36 +00:00
|
|
|
- All
|
2022-02-03 15:35:31 +00:00
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
|
|
|
- vendor: Qlik
|
|
|
|
product: C4DL
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
|
|
|
- '6.6'
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
|
|
|
- vendor: Qlik
|
|
|
|
product: C4DW
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
|
|
|
- '6.6'
|
2022-02-03 16:05:36 +00:00
|
|
|
- 6.6.1
|
2022-02-03 15:35:31 +00:00
|
|
|
- '7.0'
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
|
|
|
- vendor: Qlik
|
|
|
|
product: Catalog
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
2022-02-03 16:05:36 +00:00
|
|
|
- 4.10.0
|
|
|
|
- 4.10.1
|
|
|
|
- 4.10.2
|
|
|
|
- 4.11.0
|
|
|
|
- 4.11.1
|
|
|
|
- 4.12.0
|
|
|
|
- 4.12.1
|
2022-02-03 15:35:31 +00:00
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
|
|
|
- vendor: Qlik
|
|
|
|
product: Compose
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
|
|
|
- '2021.2'
|
|
|
|
- '2021.5'
|
|
|
|
- '2021.8'
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
|
|
|
- vendor: Qlik
|
|
|
|
product: Compose for Data Lakes
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- '6.6'
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://community.qlik.com/t5/Knowledge/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/ta-p/1869987
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
|
|
|
- vendor: Qlik
|
|
|
|
product: Compose for Data Wharehouses
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- '6.6'
|
2022-02-03 16:05:36 +00:00
|
|
|
- 6.6.1
|
2022-02-03 15:35:31 +00:00
|
|
|
- '7.0'
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://community.qlik.com/t5/Knowledge/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/ta-p/1869990
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
|
|
|
- vendor: Qlik
|
|
|
|
product: GeoAnalytics Plus
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
2022-02-03 16:05:36 +00:00
|
|
|
- 5.26.5
|
|
|
|
- 5.27.5 - 5.28.2
|
|
|
|
- 5.29.4 - 5.30.1
|
|
|
|
- 5.31.1
|
|
|
|
- 5.31.2
|
2022-02-03 15:35:31 +00:00
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
|
|
|
- vendor: Qlik
|
|
|
|
product: GeoAnalytics Server
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
2022-02-03 16:05:36 +00:00
|
|
|
- 4.19.1 - 4.27.3
|
|
|
|
- 4.23.4
|
|
|
|
- 4.32.3
|
2022-02-03 15:35:31 +00:00
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
|
|
|
- vendor: Qlik
|
|
|
|
product: Nodegraph
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- ''
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
|
|
|
- vendor: Qlik
|
|
|
|
product: Nprinting
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-02-03 16:05:36 +00:00
|
|
|
- All
|
2022-02-03 15:35:31 +00:00
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
|
|
|
- vendor: Qlik
|
|
|
|
product: ODBC Connector Package
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- ''
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
|
|
|
- vendor: Qlik
|
|
|
|
product: QEM
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
|
|
|
- '6.6'
|
|
|
|
- '7.0'
|
|
|
|
- '2021.5'
|
|
|
|
- '2021.11'
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
|
|
|
- vendor: Qlik
|
|
|
|
product: Qlik Alerting
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-02-03 16:05:36 +00:00
|
|
|
- All
|
2022-02-03 15:35:31 +00:00
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
|
|
|
- vendor: Qlik
|
|
|
|
product: Qlik Catalog
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-02-03 16:05:36 +00:00
|
|
|
- May 2021 release and after
|
2022-02-03 15:35:31 +00:00
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
|
|
|
- vendor: Qlik
|
|
|
|
product: Qlik Data Transfer
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- ''
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
|
|
|
- vendor: Qlik
|
|
|
|
product: Qlik Enterprise Manager
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
|
|
|
- '6.6'
|
|
|
|
- '7.0'
|
|
|
|
- '2021.5'
|
|
|
|
- '2021.11'
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://community.qlik.com/t5/Knowledge/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/ta-p/1869994
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
|
|
|
- vendor: Qlik
|
|
|
|
product: Qlik Forts
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- ''
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
|
|
|
- vendor: Qlik
|
|
|
|
product: Qlik RepliWeb and ARC
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-02-03 16:05:36 +00:00
|
|
|
- All
|
2022-02-03 15:35:31 +00:00
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
|
|
|
- vendor: Qlik
|
|
|
|
product: Qlik Sense Business
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- ''
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
|
|
|
- vendor: Qlik
|
|
|
|
product: Qlik Sense Enterprise
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-02-03 16:05:36 +00:00
|
|
|
- All
|
2022-02-03 15:35:31 +00:00
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
|
|
|
- vendor: Qlik
|
|
|
|
product: Qlik Sense Enterprise SaaS
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- ''
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
|
|
|
- vendor: Qlik
|
|
|
|
product: Qlik View
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-02-03 16:05:36 +00:00
|
|
|
- All
|
2022-02-03 15:35:31 +00:00
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
|
|
|
- vendor: Qlik
|
|
|
|
product: Qlik Web Connectors
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-02-03 16:05:36 +00:00
|
|
|
- All
|
2022-02-03 15:35:31 +00:00
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
|
|
|
- vendor: Qlik
|
|
|
|
product: Replicate
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
|
|
|
- '6.6'
|
|
|
|
- '7.0'
|
|
|
|
- '2021.5'
|
|
|
|
- '2021.11'
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
|
|
|
- vendor: Qlik
|
|
|
|
product: REST Connectors
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-02-03 16:05:36 +00:00
|
|
|
- All
|
2022-02-03 15:35:31 +00:00
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
|
|
|
- vendor: Qlik
|
|
|
|
product: Salesforce and SAP Connectors
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-02-03 16:05:36 +00:00
|
|
|
- All
|
2022-02-03 15:35:31 +00:00
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368
|
|
|
|
notes: Connectos are not affected.
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
- vendor: QMATIC
|
2022-01-24 22:27:28 +00:00
|
|
|
product: Appointment Booking
|
2022-01-12 07:20:52 +00:00
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
2022-02-03 15:44:06 +00:00
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
2022-02-03 16:05:36 +00:00
|
|
|
- 2.4+
|
2022-01-24 22:27:28 +00:00
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.qmatic.com/meet-qmatic/news/qmatic-statement-on-log4j-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
notes: Update to v. 2.8.2 which contains log4j 2.16
|
2022-01-12 07:20:52 +00:00
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
- vendor: QMATIC
|
|
|
|
product: Appointment Booking
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
2022-02-03 15:44:06 +00:00
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
2022-01-24 22:27:28 +00:00
|
|
|
- Cloud/Managed Service
|
2022-01-12 07:20:52 +00:00
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.qmatic.com/meet-qmatic/news/qmatic-statement-on-log4j-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
notes: log4j 2.16 applied 2021-12-15
|
2022-01-12 07:20:52 +00:00
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
- vendor: QMATIC
|
|
|
|
product: Insights
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
2022-02-03 15:44:06 +00:00
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
2022-01-12 07:20:52 +00:00
|
|
|
- Cloud
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.qmatic.com/meet-qmatic/news/qmatic-statement-on-log4j-vulnerability
|
|
|
|
notes: log4j 2.16 applied 2021-12-16
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
- vendor: QMATIC
|
2022-01-24 22:27:28 +00:00
|
|
|
product: Orchestra Central
|
2022-01-12 07:20:52 +00:00
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
affected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
unaffected_versions:
|
|
|
|
- 6.0+
|
2022-01-12 07:20:52 +00:00
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.qmatic.com/meet-qmatic/news/qmatic-statement-on-log4j-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
- vendor: QNAP
|
2022-02-03 15:44:06 +00:00
|
|
|
product: QES Operating System
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- ''
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.qnap.com/en-uk/security-advisory/qsa-21-58
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
|
|
|
- vendor: QNAP
|
|
|
|
product: Qsirch
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- ''
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.qnap.com/en-uk/security-advisory/qsa-21-58
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
|
|
|
- vendor: QNAP
|
|
|
|
product: QTS Operating System
|
2022-01-12 07:20:52 +00:00
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
2022-02-03 15:44:06 +00:00
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- ''
|
|
|
|
cve-2021-45046:
|
2022-01-12 07:20:52 +00:00
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
2022-02-03 15:44:06 +00:00
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.qnap.com/en-uk/security-advisory/qsa-21-58
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
|
|
|
- vendor: QNAP
|
|
|
|
product: QuTS Hero Operating System
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.qnap.com/en-uk/security-advisory/qsa-21-58
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
- vendor: QOPPA
|
2022-02-03 15:44:06 +00:00
|
|
|
product: All
|
2022-01-12 07:20:52 +00:00
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://kbdeveloper.qoppa.com/cve-2021-44228-apache-log4j-vulnerability/
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-02-03 15:58:54 +00:00
|
|
|
- vendor: QOS.ch
|
|
|
|
product: SLF4J Simple Logging Facade for Java
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.slf4j.org/log4shell.html
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
- vendor: QSC Q-SYS
|
2022-02-03 15:58:54 +00:00
|
|
|
product: All
|
2022-01-12 07:20:52 +00:00
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://qscprod.force.com/selfhelpportal/s/article/Are-Q-SYS-products-affected-by-the-Log4j-vulnerability-CVE-2021-44228
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
- vendor: QT
|
2022-02-03 15:58:54 +00:00
|
|
|
product: All
|
2022-01-12 07:20:52 +00:00
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.qt.io/blog/the-qt-company-products-not-affected-by-cve-2021-44228-log4j-vulnerability
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-02-03 15:58:54 +00:00
|
|
|
- vendor: Quest
|
|
|
|
product: Foglight
|
2022-01-12 07:20:52 +00:00
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
2022-02-03 15:58:54 +00:00
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- '5.9'
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
2022-01-12 07:20:52 +00:00
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
2022-02-03 15:58:54 +00:00
|
|
|
vendor_links:
|
|
|
|
- https://support.quest.com/fr-fr/search#q=CVE-2021-44228&t=Global
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
|
|
|
- vendor: Quest
|
|
|
|
product: Foglight
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
|
|
|
- '6.0'
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://support.quest.com/fr-fr/search#q=CVE-2021-44228&t=Global
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
|
|
|
- vendor: Quest
|
|
|
|
product: Quest KACE SMA
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://support.quest.com/fr-fr/search#q=CVE-2021-44228&t=Global
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
...
|