2022-01-12 07:20:52 +00:00
|
|
|
---
|
|
|
|
version: '1.0'
|
|
|
|
owners:
|
|
|
|
- name: cisagov
|
|
|
|
url: https://github.com/cisagov/log4j-affected-db
|
|
|
|
software:
|
|
|
|
- vendor: WAGO
|
|
|
|
product: WAGO Smart Script
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
2022-02-03 16:14:09 +00:00
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
2022-02-03 17:10:07 +00:00
|
|
|
- 4.2.x < 4.8.1.3
|
2022-01-12 07:20:52 +00:00
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.wago.com/de/automatisierungstechnik/psirt#log4j
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-17T00:00:00'
|
|
|
|
- vendor: Wallarm
|
2022-02-03 16:14:09 +00:00
|
|
|
product: All
|
2022-01-12 07:20:52 +00:00
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://lab.wallarm.com/cve-2021-44228-mitigation-update/
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-02-03 16:14:09 +00:00
|
|
|
- vendor: Wallix
|
|
|
|
product: Access Manager
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
|
|
|
- ''
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.wallix.com/fr/support/alerts/
|
2022-02-03 17:10:07 +00:00
|
|
|
notes: Customer Portal for patch found in advisory. This patch is available to
|
|
|
|
customer only and has not been reviewed by CISA.
|
2022-02-03 16:14:09 +00:00
|
|
|
references:
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
- vendor: Wasp Barcode technologies
|
2022-02-03 16:14:09 +00:00
|
|
|
product: All
|
2022-01-12 07:20:52 +00:00
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://support.waspbarcode.com/kb/articles/assetcloud-inventorycloud-are-they-affected-by-the-java-exploit-log4j-no
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-02-03 16:23:00 +00:00
|
|
|
- vendor: Watcher
|
|
|
|
product: All
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- ''
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://twitter.com/felix_hrn/status/1470387338001977344
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
- vendor: WatchGuard
|
2022-02-03 16:23:00 +00:00
|
|
|
product: AuthPoint
|
2022-01-12 07:20:52 +00:00
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
2022-02-03 16:23:00 +00:00
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
2022-02-03 17:10:07 +00:00
|
|
|
- Cloud
|
2022-02-03 16:23:00 +00:00
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
2022-01-12 07:20:52 +00:00
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
2022-02-03 16:23:00 +00:00
|
|
|
vendor_links:
|
|
|
|
- https://techsearch.watchguard.com/KB?type=Security%20Issues&SFDCID=kA16S000000SNnuSAG&lang=en_US
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
|
|
|
- vendor: WatchGuard
|
|
|
|
product: Dimension
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- ''
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://techsearch.watchguard.com/KB?type=Security%20Issues&SFDCID=kA16S000000SNnuSAG&lang=en_US
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
|
|
|
- vendor: WatchGuard
|
|
|
|
product: EDPR and Panda AD360
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- ''
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://techsearch.watchguard.com/KB?type=Security%20Issues&SFDCID=kA16S000000SNnuSAG&lang=en_US
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
|
|
|
- vendor: WatchGuard
|
|
|
|
product: Firebox
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- ''
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://techsearch.watchguard.com/KB?type=Security%20Issues&SFDCID=kA16S000000SNnuSAG&lang=en_US
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
|
|
|
- vendor: WatchGuard
|
|
|
|
product: System Manager, Dimension, and Panda AD360
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- ''
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://techsearch.watchguard.com/KB?type=Security%20Issues&SFDCID=kA16S000000SNnuSAG&lang=en_US
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
|
|
|
- vendor: WatchGuard
|
|
|
|
product: Threat Detection and Response
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
|
|
|
- Cloud
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://techsearch.watchguard.com/KB?type=Security%20Issues&SFDCID=kA16S000000SNnuSAG&lang=en_US
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
|
|
|
- vendor: WatchGuard
|
|
|
|
product: Wi-Fi Cloud
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
|
|
|
- Cloud
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
2022-02-03 16:23:00 +00:00
|
|
|
- https://techsearch.watchguard.com/KB?type=Security%20Issues&SFDCID=kA16S000000SNnuSAG&lang=en_US
|
2022-01-12 07:20:52 +00:00
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
- vendor: Western Digital
|
|
|
|
product: ''
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.westerndigital.com/support/product-security/wdc-21016-apache-log4j-2-remote-code-execution-vulnerability-analysis
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
- vendor: WIBU Systems
|
2022-01-24 22:27:28 +00:00
|
|
|
product: CodeMeter Cloud Lite
|
2022-01-12 07:20:52 +00:00
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
2022-02-03 16:47:22 +00:00
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
2022-02-03 17:10:07 +00:00
|
|
|
- 2.2 and prior
|
2022-01-12 07:20:52 +00:00
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/Advisory_WIBU-211213-01.pdf
|
2022-01-24 22:27:28 +00:00
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
- vendor: WIBU Systems
|
2022-01-24 22:27:28 +00:00
|
|
|
product: CodeMeter Keyring for TIA Portal
|
2022-01-12 07:20:52 +00:00
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
2022-02-03 16:47:22 +00:00
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
2022-01-24 22:27:28 +00:00
|
|
|
- 1.30 and prior
|
2022-01-12 07:20:52 +00:00
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/Advisory_WIBU-211213-01.pdf
|
2022-01-24 22:27:28 +00:00
|
|
|
notes: Only the Password Manager is affected
|
2022-01-12 07:20:52 +00:00
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
2022-02-03 16:47:22 +00:00
|
|
|
- vendor: WildFly
|
|
|
|
product: All
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- All
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-02-03 17:10:07 +00:00
|
|
|
- < 22
|
2022-02-03 16:47:22 +00:00
|
|
|
- '> 26.0.0.Final'
|
|
|
|
- '>= 22'
|
2022-02-03 17:10:07 +00:00
|
|
|
- <= 26.0.0.Beta1
|
2022-02-03 16:47:22 +00:00
|
|
|
cve-2021-45046:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- All
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
|
|
|
- All
|
|
|
|
vendor_links:
|
|
|
|
- https://www.wildfly.org/news/2021/12/13/Log4j-CVEs/
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-21T00:00:00'
|
2022-01-21 16:37:30 +00:00
|
|
|
- vendor: Wind River
|
2022-01-25 19:58:48 +00:00
|
|
|
product: LTS17
|
2022-01-12 07:20:52 +00:00
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
2022-01-21 16:37:30 +00:00
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
2022-01-21 16:37:30 +00:00
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-12 07:20:52 +00:00
|
|
|
cve-2021-44228:
|
2022-01-21 16:37:30 +00:00
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
2022-01-21 16:37:30 +00:00
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-12 07:20:52 +00:00
|
|
|
cve-2021-45046:
|
2022-01-21 16:37:30 +00:00
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
2022-01-21 16:37:30 +00:00
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-12 07:20:52 +00:00
|
|
|
cve-2021-45105:
|
2022-01-21 16:37:30 +00:00
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
2022-01-21 16:37:30 +00:00
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-21 16:37:30 +00:00
|
|
|
vendor_links:
|
|
|
|
- https://support2.windriver.com/index.php?page=security-notices&on=view&id=7191
|
2022-01-25 19:58:48 +00:00
|
|
|
notes: ''
|
2022-01-21 16:37:30 +00:00
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-21T00:00:00'
|
|
|
|
- vendor: Wind River
|
2022-01-25 19:58:48 +00:00
|
|
|
product: LTS18
|
2022-01-21 16:37:30 +00:00
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-21 16:37:30 +00:00
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-21 16:37:30 +00:00
|
|
|
cve-2021-45046:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-21 16:37:30 +00:00
|
|
|
cve-2021-45105:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-21 16:37:30 +00:00
|
|
|
vendor_links:
|
|
|
|
- https://support2.windriver.com/index.php?page=security-notices&on=view&id=7191
|
2022-01-25 19:58:48 +00:00
|
|
|
notes: ''
|
2022-01-21 16:37:30 +00:00
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-21T00:00:00'
|
|
|
|
- vendor: Wind River
|
2022-01-25 19:58:48 +00:00
|
|
|
product: LTS19
|
2022-01-21 16:37:30 +00:00
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-21 16:37:30 +00:00
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-21 16:37:30 +00:00
|
|
|
cve-2021-45046:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-21 16:37:30 +00:00
|
|
|
cve-2021-45105:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-21 16:37:30 +00:00
|
|
|
vendor_links:
|
|
|
|
- https://support2.windriver.com/index.php?page=security-notices&on=view&id=7191
|
2022-01-25 19:58:48 +00:00
|
|
|
notes: ''
|
2022-01-21 16:37:30 +00:00
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-21T00:00:00'
|
|
|
|
- vendor: Wind River
|
2022-01-25 19:58:48 +00:00
|
|
|
product: LTS21
|
2022-01-21 16:37:30 +00:00
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-21 16:37:30 +00:00
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-21 16:37:30 +00:00
|
|
|
cve-2021-45046:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-21 16:37:30 +00:00
|
|
|
cve-2021-45105:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-12 07:20:52 +00:00
|
|
|
vendor_links:
|
|
|
|
- https://support2.windriver.com/index.php?page=security-notices&on=view&id=7191
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
2022-01-25 19:58:48 +00:00
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-21 16:37:30 +00:00
|
|
|
- vendor: Wind River
|
2022-01-25 19:58:48 +00:00
|
|
|
product: WRL-6
|
2022-01-21 16:37:30 +00:00
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-21 16:37:30 +00:00
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-21 16:37:30 +00:00
|
|
|
cve-2021-45046:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-21 16:37:30 +00:00
|
|
|
cve-2021-45105:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-21 16:37:30 +00:00
|
|
|
vendor_links:
|
|
|
|
- https://support2.windriver.com/index.php?page=security-notices&on=view&id=7191
|
2022-01-25 19:58:48 +00:00
|
|
|
notes: The Wind River Linux Product Versions 8.0 and prior contains the log4j1.2
|
|
|
|
and JMSAppender components, however, JMSAppender is deactivated in the release
|
|
|
|
package and not affected by CVE-2021-4104 customers are advised to NOT manually
|
|
|
|
activate the JMSAppender component.
|
2022-01-21 16:37:30 +00:00
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-21T00:00:00'
|
|
|
|
- vendor: Wind River
|
2022-01-25 19:58:48 +00:00
|
|
|
product: WRL-7
|
2022-01-21 16:37:30 +00:00
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-21 16:37:30 +00:00
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-21 16:37:30 +00:00
|
|
|
cve-2021-45046:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-21 16:37:30 +00:00
|
|
|
cve-2021-45105:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-21 16:37:30 +00:00
|
|
|
vendor_links:
|
|
|
|
- https://support2.windriver.com/index.php?page=security-notices&on=view&id=7191
|
2022-01-25 19:58:48 +00:00
|
|
|
notes: The Wind River Linux Product Versions 8.0 and prior contains the log4j1.2
|
|
|
|
and JMSAppender components, however, JMSAppender is deactivated in the release
|
|
|
|
package and not affected by CVE-2021-4104 customers are advised to NOT manually
|
|
|
|
activate the JMSAppender component.
|
2022-01-21 16:37:30 +00:00
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-21T00:00:00'
|
|
|
|
- vendor: Wind River
|
2022-01-25 19:58:48 +00:00
|
|
|
product: WRL-8
|
2022-01-21 16:37:30 +00:00
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-21 16:37:30 +00:00
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-21 16:37:30 +00:00
|
|
|
cve-2021-45046:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-21 16:37:30 +00:00
|
|
|
cve-2021-45105:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-21 16:37:30 +00:00
|
|
|
vendor_links:
|
|
|
|
- https://support2.windriver.com/index.php?page=security-notices&on=view&id=7191
|
2022-01-25 19:58:48 +00:00
|
|
|
notes: The Wind River Linux Product Versions 8.0 and prior contains the log4j1.2
|
|
|
|
and JMSAppender components, however, JMSAppender is deactivated in the release
|
|
|
|
package and not affected by CVE-2021-4104 customers are advised to NOT manually
|
|
|
|
activate the JMSAppender component.
|
2022-01-21 16:37:30 +00:00
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-21T00:00:00'
|
|
|
|
- vendor: Wind River
|
2022-01-25 19:58:48 +00:00
|
|
|
product: WRL-9
|
2022-01-21 16:37:30 +00:00
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-21 16:37:30 +00:00
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-21 16:37:30 +00:00
|
|
|
cve-2021-45046:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-21 16:37:30 +00:00
|
|
|
cve-2021-45105:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions:
|
2022-01-25 19:58:48 +00:00
|
|
|
- All
|
2022-01-21 16:37:30 +00:00
|
|
|
vendor_links:
|
|
|
|
- https://support2.windriver.com/index.php?page=security-notices&on=view&id=7191
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
2022-01-25 19:58:48 +00:00
|
|
|
last_updated: '2022-01-21T00:00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
- vendor: WireShark
|
2022-02-03 16:47:22 +00:00
|
|
|
product: All
|
2022-01-12 07:20:52 +00:00
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
2022-02-03 16:47:22 +00:00
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
2022-02-03 16:47:22 +00:00
|
|
|
unaffected_versions:
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
2022-02-03 16:47:22 +00:00
|
|
|
- https://www.wireshark.org/news/20211215.html
|
2022-01-12 07:20:52 +00:00
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
2022-02-03 16:47:22 +00:00
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
- vendor: Wistia
|
2022-02-03 16:47:22 +00:00
|
|
|
product: All
|
2022-01-12 07:20:52 +00:00
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://status.wistia.com/incidents/jtg0dfl5l224
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
- vendor: WitFoo
|
2022-02-03 16:47:22 +00:00
|
|
|
product: Precinct
|
2022-01-12 07:20:52 +00:00
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
2022-02-03 16:47:22 +00:00
|
|
|
fixed_versions:
|
2022-02-03 17:10:07 +00:00
|
|
|
- 6.x
|
2022-01-12 07:20:52 +00:00
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.witfoo.com/blog/emergency-update-for-cve-2021-44228-log4j/
|
2022-02-03 17:10:07 +00:00
|
|
|
notes: WitFoo Streamer & Apache Kafka Docker containers are/were vulnerable. See
|
|
|
|
advisory.
|
2022-01-12 07:20:52 +00:00
|
|
|
references:
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
- vendor: WordPress
|
2022-02-03 16:47:22 +00:00
|
|
|
product: All
|
2022-01-12 07:20:52 +00:00
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
2022-02-03 16:47:22 +00:00
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
2022-02-03 16:47:22 +00:00
|
|
|
unaffected_versions:
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://wordpress.org/support/topic/is-the-log4j-vulnerability-an-issue/
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
- vendor: Worksphere
|
2022-02-03 16:47:22 +00:00
|
|
|
product: All
|
2022-01-12 07:20:52 +00:00
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.worksphere.com/product/security-update-on-log4j-cve-2021-44228
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
- vendor: Wowza
|
2022-02-03 16:47:22 +00:00
|
|
|
product: Streaming Engine
|
2022-01-12 07:20:52 +00:00
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
2022-02-03 16:47:22 +00:00
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
affected_versions: []
|
2022-02-03 16:47:22 +00:00
|
|
|
fixed_versions:
|
2022-02-03 17:10:07 +00:00
|
|
|
- 4.7.8
|
|
|
|
- 4.8.x
|
2022-01-12 07:20:52 +00:00
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.wowza.com/docs/known-issues-with-wowza-streaming-engine#log4j2-cve
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
- vendor: WSO2
|
2022-02-03 17:03:15 +00:00
|
|
|
product: API Manager
|
2022-01-12 07:20:52 +00:00
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
2022-02-03 17:03:15 +00:00
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
|
|
|
- '>= 3.0.0'
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
2022-02-03 17:03:15 +00:00
|
|
|
vendor_links:
|
|
|
|
- https://docs.wso2.com/pages/viewpage.action?pageId=180948677
|
|
|
|
notes: A temporary mitigation is available while vendor works on update.
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-26T07:18:50+00:00'
|
|
|
|
- vendor: WSO2
|
|
|
|
product: API Manager Analytics
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
|
|
|
- '>= 2.6.0'
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://docs.wso2.com/pages/viewpage.action?pageId=180948677
|
2022-02-03 17:03:15 +00:00
|
|
|
notes: A temporary mitigation is available while vendor works on update.
|
2022-01-12 07:20:52 +00:00
|
|
|
references:
|
|
|
|
- ''
|
2022-02-03 17:03:15 +00:00
|
|
|
last_updated: '2022-01-26T07:18:50+00:00'
|
|
|
|
- vendor: WSO2
|
|
|
|
product: Enterprise Integrator
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
|
|
|
- '>= 6.1.0'
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://docs.wso2.com/pages/viewpage.action?pageId=180948677
|
|
|
|
notes: A temporary mitigation is available while vendor works on update.
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-26T07:18:50+00:00'
|
|
|
|
- vendor: WSO2
|
|
|
|
product: Enterprise Integrator Analytics
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
|
|
|
- '>= 6.6.0'
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://docs.wso2.com/pages/viewpage.action?pageId=180948677
|
|
|
|
notes: A temporary mitigation is available while vendor works on update.
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-26T07:18:50+00:00'
|
|
|
|
- vendor: WSO2
|
|
|
|
product: Identity Server
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
|
|
|
- '>= 5.9.0'
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://docs.wso2.com/pages/viewpage.action?pageId=180948677
|
|
|
|
notes: A temporary mitigation is available while vendor works on update.
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-26T07:18:50+00:00'
|
|
|
|
- vendor: WSO2
|
|
|
|
product: Identity Server Analytics
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
|
|
|
- '>= 5.7.0'
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://docs.wso2.com/pages/viewpage.action?pageId=180948677
|
|
|
|
notes: A temporary mitigation is available while vendor works on update.
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-26T07:18:50+00:00'
|
|
|
|
- vendor: WSO2
|
|
|
|
product: Identity Server as Key Manager
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
|
|
|
- '>= 5.9.0'
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://docs.wso2.com/pages/viewpage.action?pageId=180948677
|
|
|
|
notes: A temporary mitigation is available while vendor works on update.
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-26T07:18:50+00:00'
|
|
|
|
- vendor: WSO2
|
|
|
|
product: Micro Gateway
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
|
|
|
- '>= 3.2.0'
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://docs.wso2.com/pages/viewpage.action?pageId=180948677
|
|
|
|
notes: A temporary mitigation is available while vendor works on update.
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-26T07:18:50+00:00'
|
|
|
|
- vendor: WSO2
|
|
|
|
product: Micro Integrator
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
|
|
|
- '>= 1.1.0'
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://docs.wso2.com/pages/viewpage.action?pageId=180948677
|
|
|
|
notes: A temporary mitigation is available while vendor works on update.
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-26T07:18:50+00:00'
|
|
|
|
- vendor: WSO2
|
|
|
|
product: Micro Integrator Dashboard
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
|
|
|
- '>= 4.0.0'
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://docs.wso2.com/pages/viewpage.action?pageId=180948677
|
|
|
|
notes: A temporary mitigation is available while vendor works on update.
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-26T07:18:50+00:00'
|
|
|
|
- vendor: WSO2
|
|
|
|
product: Micro Integrator Monitoring Dashboard
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
|
|
|
- '>= 1.0.0'
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://docs.wso2.com/pages/viewpage.action?pageId=180948677
|
|
|
|
notes: A temporary mitigation is available while vendor works on update.
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-26T07:18:50+00:00'
|
|
|
|
- vendor: WSO2
|
|
|
|
product: Open Banking AM
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
|
|
|
- '>= 2.0.0'
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://docs.wso2.com/pages/viewpage.action?pageId=180948677
|
|
|
|
notes: A temporary mitigation is available while vendor works on update.
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-26T07:18:50+00:00'
|
|
|
|
- vendor: WSO2
|
|
|
|
product: Open Banking BI
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
|
|
|
- '>= 1.3.0'
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://docs.wso2.com/pages/viewpage.action?pageId=180948677
|
|
|
|
notes: A temporary mitigation is available while vendor works on update.
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-26T07:18:50+00:00'
|
|
|
|
- vendor: WSO2
|
|
|
|
product: Open Banking KM
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
|
|
|
- '>= 2.0.0'
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://docs.wso2.com/pages/viewpage.action?pageId=180948677
|
|
|
|
notes: A temporary mitigation is available while vendor works on update.
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-26T07:18:50+00:00'
|
|
|
|
- vendor: WSO2
|
|
|
|
product: Stream Integrator
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
|
|
|
- '>= 1.0.0'
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://docs.wso2.com/pages/viewpage.action?pageId=180948677
|
|
|
|
notes: A temporary mitigation is available while vendor works on update.
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-26T07:18:50+00:00'
|
|
|
|
- vendor: WSO2
|
|
|
|
product: Stream Integrator Tooling
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
|
|
|
- '>= 1.0.0'
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://docs.wso2.com/pages/viewpage.action?pageId=180948677
|
|
|
|
notes: A temporary mitigation is available while vendor works on update.
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-26T07:18:50+00:00'
|
|
|
|
- vendor: WSO2
|
|
|
|
product: Stream Processor
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions:
|
|
|
|
- '>= 4.0.0'
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://docs.wso2.com/pages/viewpage.action?pageId=180948677
|
|
|
|
notes: A temporary mitigation is available while vendor works on update.
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2022-01-26T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
...
|