2022-01-12 07:20:52 +00:00
|
|
|
|
---
|
|
|
|
|
version: '1.0'
|
|
|
|
|
owners:
|
|
|
|
|
- name: cisagov
|
|
|
|
|
url: https://github.com/cisagov/log4j-affected-db
|
|
|
|
|
software:
|
|
|
|
|
- vendor: Daktronics
|
|
|
|
|
product: All Sport Pro
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.daktronics.com/en-us/support/kb/000025337
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-06T00:00:00'
|
|
|
|
|
- vendor: Daktronics
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dakronics Media Player
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- DMP (any series)
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.daktronics.com/en-us/support/kb/000025337
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-06T00:00:00'
|
|
|
|
|
- vendor: Daktronics
|
|
|
|
|
product: Dakronics Web Player
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions:
|
2022-02-01 15:41:22 +00:00
|
|
|
|
- 'DWP-1000'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.daktronics.com/en-us/support/kb/000025337
|
2022-02-01 15:41:22 +00:00
|
|
|
|
notes: DWP-1000 is not present in our codebase, but awaiting confirmation from
|
|
|
|
|
LG re webOS platform.
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-06T00:00:00'
|
|
|
|
|
- vendor: Daktronics
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Data Vision Software (DVS)
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
investigated: false
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.daktronics.com/en-us/support/kb/000025337
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: DVS has one microservice that uses Log4j, but it uses a version that is
|
|
|
|
|
not impacted.
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-06T00:00:00'
|
|
|
|
|
- vendor: Daktronics
|
|
|
|
|
product: Dynamic Messaging System (DMS)
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.daktronics.com/en-us/support/kb/000025337
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-06T00:00:00'
|
|
|
|
|
- vendor: Daktronics
|
|
|
|
|
product: Dynamic Messaging System - DMS Core Player
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 15:41:22 +00:00
|
|
|
|
- 'P10'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.daktronics.com/en-us/support/kb/000025337
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-06T00:00:00'
|
|
|
|
|
- vendor: Daktronics
|
|
|
|
|
product: Dynamic Messaging System - DMS Player hardware
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 15:41:22 +00:00
|
|
|
|
- 'AMP-R200'
|
|
|
|
|
- 'AMP-R400'
|
|
|
|
|
- 'AMP-R800'
|
|
|
|
|
- 'AMP-SM100'
|
|
|
|
|
- 'AMP-SE100'
|
|
|
|
|
- 'AMP-SM200'
|
|
|
|
|
- 'AMP-SM400'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.daktronics.com/en-us/support/kb/000025337
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-06T00:00:00'
|
|
|
|
|
- vendor: Daktronics
|
|
|
|
|
product: Dynamic Messaging System - DMS Web Player
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.daktronics.com/en-us/support/kb/000025337
|
2022-02-01 15:41:22 +00:00
|
|
|
|
notes: DMS Web Player not present in our codebase, but awaiting confirmation
|
|
|
|
|
from LG re webOS platform.
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-06T00:00:00'
|
|
|
|
|
- vendor: Daktronics
|
|
|
|
|
product: IBoot - Dataprobe IBoot Devices
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 15:41:22 +00:00
|
|
|
|
- 'A-3257'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- '3256'
|
|
|
|
|
- '2270'
|
|
|
|
|
- '2269'
|
|
|
|
|
- '1978'
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.daktronics.com/en-us/support/kb/000025337
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-06T00:00:00'
|
|
|
|
|
- vendor: Daktronics
|
|
|
|
|
product: Outdoor Smartlink Devices
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 15:41:22 +00:00
|
|
|
|
- 'A-3189335'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- '3128'
|
|
|
|
|
- '3416'
|
|
|
|
|
- '3418'
|
|
|
|
|
- '3707'
|
|
|
|
|
- '3708'
|
|
|
|
|
- '3709'
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.daktronics.com/en-us/support/kb/000025337
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-06T00:00:00'
|
|
|
|
|
- vendor: Daktronics
|
|
|
|
|
product: Routers - Cisco Meraki Z3/Z3c Routers
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 15:41:22 +00:00
|
|
|
|
- 'A-4036028'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.daktronics.com/en-us/support/kb/000025337
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-06T00:00:00'
|
|
|
|
|
- vendor: Daktronics
|
|
|
|
|
product: Routers - Cisco Z1 Routers
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 15:41:22 +00:00
|
|
|
|
- 'A-3665'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.daktronics.com/en-us/support/kb/000025337
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-06T00:00:00'
|
|
|
|
|
- vendor: Daktronics
|
|
|
|
|
product: Routers - Sierra Wireless RV50x/RV50
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions:
|
2022-02-01 15:41:22 +00:00
|
|
|
|
- 'A-3350704'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.daktronics.com/en-us/support/kb/000025337
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-06T00:00:00'
|
|
|
|
|
- vendor: Daktronics
|
|
|
|
|
product: Show Control System (SCS)
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.daktronics.com/en-us/support/kb/000025337
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-06T00:00:00'
|
|
|
|
|
- vendor: Daktronics
|
|
|
|
|
product: Vanguard
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.daktronics.com/en-us/support/kb/000025337
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-06T00:00:00'
|
|
|
|
|
- vendor: Daktronics
|
|
|
|
|
product: Venus 1500
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.daktronics.com/en-us/support/kb/000025337
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-06T00:00:00'
|
|
|
|
|
- vendor: Daktronics
|
|
|
|
|
product: Venus Control Suite (VCS)
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.daktronics.com/en-us/support/kb/000025337
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-06T00:00:00'
|
|
|
|
|
- vendor: Daktronics
|
|
|
|
|
product: Video Image Processors
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- VIP-5060/VIP-5160/VIP-4060
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.daktronics.com/en-us/support/kb/000025337
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-06T00:00:00'
|
|
|
|
|
- vendor: Daktronics
|
|
|
|
|
product: Webcam - Mobotix
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- A-2242
|
|
|
|
|
- A-3127
|
|
|
|
|
- A-3719
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.daktronics.com/en-us/support/kb/000025337
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-06T00:00:00'
|
|
|
|
|
- vendor: DarkTrace
|
2022-02-01 18:12:12 +00:00
|
|
|
|
product: All
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://customerportal.darktrace.com/inside-the-soc/get-article/201
|
2022-02-01 18:12:12 +00:00
|
|
|
|
notes: This advisory is available to customer only and has not been reviewed by CISA.
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Dassault Systèmes
|
2022-02-01 18:15:18 +00:00
|
|
|
|
product: All
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://kb.dsxclient.3ds.com/mashup-ui/page/resultqa?id=QA00000102301e
|
2022-02-01 18:15:18 +00:00
|
|
|
|
notes: This advisory is available to customer only and has not been reviewed by CISA.
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Databricks
|
2022-02-01 18:15:18 +00:00
|
|
|
|
product: All
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://docs.google.com/document/d/e/2PACX-1vREjwZk17BAHGwj5Phizi4DPFS9EIUbAMX-CswlgbFwqwKXNKZC8MrT-L6wUgfIChsSHtvd_QD3-659/pub
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Datadog
|
2022-02-01 18:24:17 +00:00
|
|
|
|
product: Datadog Agent
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
2022-02-01 18:15:18 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 18:24:17 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions:
|
|
|
|
|
- '>=6.17.0'
|
2022-02-01 18:15:18 +00:00
|
|
|
|
- '<=6.32.2'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- '>=7.17.0'
|
2022-02-01 18:15:18 +00:00
|
|
|
|
- '<=7.32.2'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.datadoghq.com/log4j-vulnerability/
|
2022-02-01 18:24:17 +00:00
|
|
|
|
notes: JMX monitoring component leverages an impacted version of log4j.
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
|
|
|
|
- vendor: Datadog
|
|
|
|
|
product: datadog-kafka-connect-logs
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions:
|
|
|
|
|
- '< 1.0.2'
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.datadoghq.com/log4j-vulnerability/
|
|
|
|
|
notes: Version 1.0.2 of the library uses version 2.16.0 of Log4j.
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
|
|
|
|
- vendor: Datadog
|
|
|
|
|
product: datadog-lambda-java
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions:
|
|
|
|
|
- '< 1.0.2'
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.datadoghq.com/log4j-vulnerability/
|
2022-02-01 18:42:22 +00:00
|
|
|
|
notes: Following AWS recommendation, library updated using the latest version of amazon-lambda-java-log4j2 (1.4.0).
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Dataminer
|
2022-02-01 18:34:54 +00:00
|
|
|
|
product: All
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://community.dataminer.services/responding-to-log4shell-vulnerability/
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Datev
|
|
|
|
|
product: ''
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.datev-community.de/t5/Freie-Themen/Log4-J-Schwachstelle/m-p/258185/highlight/true#M14308
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Datto
|
2022-02-01 18:34:54 +00:00
|
|
|
|
product: All
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.datto.com/blog/dattos-response-to-log4shell
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-02-01 18:34:54 +00:00
|
|
|
|
- vendor: DBeaver
|
|
|
|
|
product: All
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dcache.org/post/log4j-vulnerability/
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: dCache.org
|
2022-02-01 18:34:54 +00:00
|
|
|
|
product: All
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dcache.org/post/log4j-vulnerability/
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Debian
|
2022-02-01 18:38:08 +00:00
|
|
|
|
product: Apache-log4j.1.2
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
2022-02-01 18:38:08 +00:00
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- stretch, buster, bullseye
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- stretch, buster, bullseye
|
|
|
|
|
cve-2021-45046:
|
2022-01-12 07:20:52 +00:00
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
2022-02-01 18:38:08 +00:00
|
|
|
|
cve-2021-45105:
|
2022-01-12 07:20:52 +00:00
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
2022-02-01 18:38:08 +00:00
|
|
|
|
vendor_links:
|
|
|
|
|
- https://security-tracker.debian.org/tracker/CVE-2021-44228
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
|
|
|
|
- vendor: Debian
|
|
|
|
|
product: Apache-log4j2
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- stretch, buster, bullseye
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- stretch, buster, bullseye
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://security-tracker.debian.org/tracker/CVE-2021-44228
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-02-01 18:52:44 +00:00
|
|
|
|
- vendor: Decos
|
|
|
|
|
product: Cloud
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- 'All'
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- 'All'
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- 'All'
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- 'All'
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://decos.freshdesk.com/nl/support/solutions/articles/17000121598
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-02-01T07:18:50+00:00'
|
|
|
|
|
- vendor: Decos
|
|
|
|
|
product: EvenementenAssistent + InkomensAssistent + Leerlingenvervoer + AIM online
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- 'All'
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- 'All'
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- 'All'
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- 'All'
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://decos.freshdesk.com/nl/support/solutions/articles/17000121598
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-02-01T07:18:50+00:00'
|
|
|
|
|
- vendor: Decos
|
|
|
|
|
product: Fixi
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- 'All'
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- 'All'
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- 'All'
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- 'All'
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://decos.freshdesk.com/nl/support/solutions/articles/17000121598
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-02-01T07:18:50+00:00'
|
|
|
|
|
- vendor: Decos
|
|
|
|
|
product: Integrations (StUF/ZGW/Doclogic-DataIntegrator)
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- 'All'
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- 'All'
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- 'All'
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- 'All'
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://decos.freshdesk.com/nl/support/solutions/articles/17000121598
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-02-01T07:18:50+00:00'
|
|
|
|
|
- vendor: Decos
|
|
|
|
|
product: JOIN Klant Contact
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- 'All'
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- 'All'
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- 'All'
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- 'All'
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://decos.freshdesk.com/nl/support/solutions/articles/17000121598
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-02-01T07:18:50+00:00'
|
|
|
|
|
- vendor: Decos
|
|
|
|
|
product: JOIN Zaak &I Document (on-premise)
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- 'All'
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions:
|
|
|
|
|
- 'All'
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://decos.freshdesk.com/nl/support/solutions/articles/17000121598
|
|
|
|
|
notes: The solution contains Elasticsearch (vulnerable). Mitigating actions available on our WIKI.
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-02-01T07:18:50+00:00'
|
|
|
|
|
- vendor: Decos
|
|
|
|
|
product: JOIN Zaak &I Document (on-premise)
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- 'All'
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions:
|
|
|
|
|
- 'All'
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://decos.freshdesk.com/nl/support/solutions/articles/17000121598
|
|
|
|
|
notes: The SaaS hosted solution contains Logstash + Elasticsearch (vulnerable). Mitigating actions taken.
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-02-01T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Deepinstinct
|
2022-02-01 19:13:46 +00:00
|
|
|
|
product: All
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.deepinstinct.com/blog/log4shell-cve-2021-44228-what-you-need-to-know
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Dell
|
2022-02-01 19:13:46 +00:00
|
|
|
|
product: Alienware Command Center
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45105:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:13:46 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Alienware OC Controls
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:13:46 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:13:46 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45105:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:13:46 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Alienware On Screen Display
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:13:46 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:13:46 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45105:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:13:46 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Alienware Update
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:13:46 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:13:46 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45105:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:13:46 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: APEX Console
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:13:46 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
fixed_versions:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
- ''
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
2022-02-01 19:13:46 +00:00
|
|
|
|
fixed_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
2022-02-01 19:13:46 +00:00
|
|
|
|
fixed_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-02-01 19:13:46 +00:00
|
|
|
|
notes: Cloud environment patched.
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: APEX Data Storage Services
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:13:46 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-44228:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-02-01 19:13:46 +00:00
|
|
|
|
notes: Cloud environment patch in progress.
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Atmos
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:13:46 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:13:46 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45105:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:13:46 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-02-01 19:13:46 +00:00
|
|
|
|
product: Avamar vproxy
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:13:46 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:13:46 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45105:
|
2022-02-01 19:13:46 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:13:46 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: CalMAN Powered Calibration Firmware
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:29:49 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:29:49 +00:00
|
|
|
|
unaffected_versions:
|
2022-02-01 19:33:56 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45105:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:29:49 +00:00
|
|
|
|
unaffected_versions:
|
2022-02-01 19:33:56 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: CalMAN Ready for Dell
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:29:49 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:29:49 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45105:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:29:49 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Centera
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:29:49 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:29:49 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45105:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:29:49 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Chameleon Linux Based Diagnostics
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:29:49 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:29:49 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45105:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:29:49 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Chassis Management Controller (CMC)
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:29:49 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:29:49 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45105:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:29:49 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: China HDD Deluxe
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:29:49 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:29:49 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45105:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:29:49 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Cloud IQ
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
2022-02-01 19:29:49 +00:00
|
|
|
|
fixed_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
2022-02-01 19:29:49 +00:00
|
|
|
|
fixed_versions:
|
|
|
|
|
- ''
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
2022-02-01 19:29:49 +00:00
|
|
|
|
fixed_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
2022-02-01 19:29:49 +00:00
|
|
|
|
fixed_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-02-01 19:29:49 +00:00
|
|
|
|
notes: Cloud environment patched.
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Cloud Mobility for Dell EMC Storage
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:29:49 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:29:49 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45105:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:29:49 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Cloud Tiering Appliance
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:29:49 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:29:49 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45105:
|
2022-02-01 19:29:49 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 19:29:49 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
|
|
|
|
product: CloudIQ Collector
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
|
|
|
|
product: Common Event Enabler
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Connectrix (Cisco MDS 9000 switches)
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
2022-02-01 20:47:55 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 20:47:55 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 20:47:55 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
2022-02-01 20:47:55 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 20:47:55 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45105:
|
2022-02-01 20:47:55 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-02-01 20:47:55 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Connectrix (Cisco MDS DCNM)
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
2022-02-01 20:47:55 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-02-03 17:37:44 +00:00
|
|
|
|
investigated: true
|
2022-02-01 20:47:55 +00:00
|
|
|
|
affected_versions:
|
|
|
|
|
'Versions prior to 11.5(1x)'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
2022-02-01 20:47:55 +00:00
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
2022-02-01 20:47:55 +00:00
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-02-01 20:47:55 +00:00
|
|
|
|
notes: Patch expected by 12/23/21.
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
2022-02-03 17:37:44 +00:00
|
|
|
|
- '[DSA-2021-302](https://www.dell.com/support/kbdoc/en-us/000194797/dsa-2021-302-dell-connectrix-mds-dcnm-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Connectrix B-Series SANnav
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
2022-02-01 20:47:55 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions:
|
|
|
|
|
- 2.1.1
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
2022-02-01 20:47:55 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
2022-02-01 20:47:55 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-02-01 20:47:55 +00:00
|
|
|
|
notes: Patch expected by 2/28/2022.
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
2022-02-03 17:37:44 +00:00
|
|
|
|
- '[DSA-2021-266](https://www.dell.com/support/kbdoc/en-us/000194461/dsa-2021-266-dell-emc-connectrix-b-series-sannav-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Connextrix B Series
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
2022-02-01 20:47:55 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 20:47:55 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
2022-02-01 20:47:55 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
2022-02-01 20:47:55 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: CyberSecIQ Application
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 20:47:55 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: CyberSense for PowerProtect Cyber Recovery
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 20:47:55 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Data Domain OS
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions:
|
2022-02-03 17:37:44 +00:00
|
|
|
|
- 'Versions from 7.3.0.5 to 7.7.0.6'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: See DSA-2021-274
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
2022-02-03 17:37:44 +00:00
|
|
|
|
- '[DSA-2021-274](https://www.dell.com/support/kbdoc/en-us/000194503/dsa-2021-274-dell-emc-data-domain-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell BSAFE Crypto-C Micro Edition
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell BSAFE Crypto-J
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell BSAFE Micro Edition Suite
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Calibration Assistant
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Cinema Color
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- ''
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
|
|
|
|
product: Client Platforms (Latitude, OptiPlex, Alienware, Inspiron, Precision, XPS, Vostro, ChengMing) BIOS
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Cloud Command Repository Manager
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Cloud Management Agent
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Color Management
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Command Configure
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Command Integration Suite for System Center
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Command Intel vPro Out of Band
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Command Monitor
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Command Power Manager
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Command PowerShell Provider
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Command Update
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Customer Connect
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Data Guardian*
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Data Protection*
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Data Recovery Environment
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Data Vault
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Data Vault for Chrome OS
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Deployment Agent
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Digital Delivery
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Direct USB Key
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Display Manager 1.5 for Windows / macOS
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Display Manager 2.0 for Windows / macOS
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC AppSync
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-03 17:37:44 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC Avamar
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- '18.2'
|
|
|
|
|
- '19.1'
|
|
|
|
|
- '19.2'
|
|
|
|
|
- '19.3'
|
|
|
|
|
- '19.4'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-02-01 21:05:32 +00:00
|
|
|
|
notes: Patch expected by 12/20/21.
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
2022-02-03 17:37:44 +00:00
|
|
|
|
- '[DSA-2021-277](https://www.dell.com/support/kbdoc/en-us/000194480/dsa-2021-277-dell-emc-avamar-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC BSN Controller Node
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-02-03 17:37:44 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
2022-02-01 21:05:32 +00:00
|
|
|
|
fixed_versions:
|
|
|
|
|
- ''
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: See DSA-2021-305
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
2022-02-03 17:37:44 +00:00
|
|
|
|
- '[DSA-2021-305](https://www.dell.com/support/kbdoc/en-us/000194631/dsa-2021-305-dell-emc-bsn-controller-node-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC Cloud Disaster Recovery
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- 'Versions from 19.6 and later'
|
2022-01-24 22:27:28 +00:00
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: Patch pending
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
2022-02-03 17:37:44 +00:00
|
|
|
|
- '[DSA-2021-289](https://www.dell.com/support/kbdoc/en-us/000194663/dsa-2021-289-dell-emc-cloud-disaster-recovery-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228-and-cve-2021-45046)'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC Cloudboost
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC CloudLink
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC Container Storage Modules
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC Data Computing Appliance (DCA)
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-01 21:05:32 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC Data Protection Advisor
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
2022-02-03 17:37:44 +00:00
|
|
|
|
fixed_versions:
|
|
|
|
|
- '18.x (or earlier) -standalone DPA is EOSL'
|
|
|
|
|
- '18.2.x (IDPA)'
|
|
|
|
|
- '19.1.x'
|
|
|
|
|
- '19.2.x'
|
|
|
|
|
- '19.3.x'
|
|
|
|
|
- '19.4.x'
|
|
|
|
|
- '19.5.x'
|
|
|
|
|
- '19.6.0'
|
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
2022-02-03 17:37:44 +00:00
|
|
|
|
- '[DSA-2021-309](https://www.dell.com/support/kbdoc/en-us/000194651/dsa-2021-309-dell-emc-dpa-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC Data Protection Central
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-02-03 17:37:44 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
2022-02-03 17:37:44 +00:00
|
|
|
|
fixed_versions:
|
|
|
|
|
- '18.2.x-19.4.x'
|
|
|
|
|
- '19.5.0-19.5.0.7'
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-02-03 17:37:44 +00:00
|
|
|
|
notes: See DSA-2021-269
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
2022-02-03 17:37:44 +00:00
|
|
|
|
- '[DSA-2021-269](https://www.dell.com/support/kbdoc/en-us/000194557/dsa-2021-269-dell-emc-data-protection-central-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC Data Protection Search
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions:
|
2022-02-03 17:37:44 +00:00
|
|
|
|
- 'Versions before 19.6'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: See DSA-2021-279
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
2022-02-03 17:37:44 +00:00
|
|
|
|
- '[DSA-2021-279](https://www.dell.com/support/kbdoc/en-us/000194629/dsa-2021-279-dell-emc-data-protection-search-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC DataIQ
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-03 17:37:44 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC Disk Library for Mainframe
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-03 17:37:44 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC Enterprise Storage Analytics for vRealize Operations
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions:
|
2022-02-03 17:54:51 +00:00
|
|
|
|
- '<6.0.0'
|
|
|
|
|
- '6.1.0'
|
|
|
|
|
- '6.2.x'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: See DSA-2021-278
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
2022-02-03 17:54:51 +00:00
|
|
|
|
- '[DSA-2021-278](https://www.dell.com/support/kbdoc/en-us/000194488/dsa-2021-278)'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC GeoDrive
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-03 17:54:51 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC Integrated System for Azure Stack HCI
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions:
|
2022-02-03 17:54:51 +00:00
|
|
|
|
- ''
|
2022-01-24 22:27:28 +00:00
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-02-03 17:54:51 +00:00
|
|
|
|
notes: Dell EMC Integrated System for Azure Stack HCI is not impacted by this
|
2022-01-24 22:27:28 +00:00
|
|
|
|
advisory. If Dell EMC SupportAssist Enterprise (SAE) or Dell EMC Secure Connect
|
|
|
|
|
Gateway (SCG) were optionally installed with Dell EMC Integrated System for
|
2022-02-03 17:54:51 +00:00
|
|
|
|
Azure Stack HCI monitor the following advisories. See DSA-2021-307.
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
2022-02-03 17:54:51 +00:00
|
|
|
|
- '[DSA-2021-307](https://www.dell.com/support/kbdoc/en-us/000194622/dsa-2021-307-dell-emc-integrated-system-for-azure-stack-hci-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC Integrated System for Microsoft Azure Stack Hub
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions:
|
2022-02-03 17:54:51 +00:00
|
|
|
|
- ''
|
2022-01-24 22:27:28 +00:00
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-02-03 17:54:51 +00:00
|
|
|
|
notes: Patch expected by 2022-01-31.
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC Isilon InsightIQ
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-03 17:54:51 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC License Manager
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-03 17:54:51 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC Metro Node
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions:
|
2022-02-03 17:54:51 +00:00
|
|
|
|
- 'Versions before 7.0.1 P2'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: See DSA-2021-308
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
2022-02-03 17:54:51 +00:00
|
|
|
|
- '[DSA-2021-308](https://www.dell.com/support/kbdoc/en-us/000194630/dsa-2021)'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-02-03 17:54:51 +00:00
|
|
|
|
product: Dell EMC NetWorker
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions:
|
2022-02-03 17:54:51 +00:00
|
|
|
|
- '19.4.x'
|
|
|
|
|
- '19.5.x'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: Patch expected by 12/20/21
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
2022-02-03 17:54:51 +00:00
|
|
|
|
- '[DSA-2021-280](https://www.dell.com/support/kbdoc/en-us/000194541/dsa-2021-280-dell-emc-networker-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-02-03 17:54:51 +00:00
|
|
|
|
product: Dell EMC NetWorker VE
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions:
|
2022-02-03 17:54:51 +00:00
|
|
|
|
- '19.4.x'
|
|
|
|
|
- '19.5.x'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: Patch expected by 12/20/21
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
2022-02-03 17:54:51 +00:00
|
|
|
|
- '[DSA-2021-280](https://www.dell.com/support/kbdoc/en-us/000194541/dsa-2021-280-dell-emc-networker-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC Networking Onie
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-03 17:54:51 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC Networking Virtual Edge Platform with VersaOS
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-02-03 17:54:51 +00:00
|
|
|
|
affected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-02-03 17:54:51 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-02-03 17:54:51 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC OpenManage Ansible Modules
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-03 17:54:51 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
2022-02-03 18:59:51 +00:00
|
|
|
|
- vendor: Dell
|
|
|
|
|
product: Dell OpenManage Enterprise
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions:
|
|
|
|
|
- 'Versions before 3.8.2'
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: See DSA-2021-275
|
|
|
|
|
references:
|
|
|
|
|
- '[DSA-2021-275](https://www.dell.com/support/kbdoc/en-us/000194638/dsa-2021-275-dell-emc-openmanage-enterprise-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
2022-02-03 18:19:55 +00:00
|
|
|
|
- vendor: Dell
|
|
|
|
|
product: Dell OpenManage Enterprise Modular
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions:
|
|
|
|
|
- 'Versions before 1.40.10'
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: See DSA-2021-268
|
|
|
|
|
references:
|
|
|
|
|
- '[DSA-2021-268](https://www.dell.com/support/kbdoc/en-us/000194625/dsa-2021-268-dell-emc-openmanage-enterprise-modular-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
|
|
|
|
product: Dell EMC OpenManage Enterprise Services
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions:
|
|
|
|
|
- 'Version 1.2 and earlier'
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: Patch expected by 12/20/21
|
|
|
|
|
references:
|
|
|
|
|
- '[DSA-2021-276](https://www.dell.com/support/kbdoc/en-us/000194652/dsa-2021-276-dell-emc-openmanage-enterprise-services-security-update-for-apache-log4j-remote-code-execution-vulnerabilities-cve-2021-44228-cve-2021-45046)'
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC OpenManage integration for Splunk
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-03 18:19:55 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC OpenManage Integration for VMware vCenter
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-03 18:19:55 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC OpenManage Management pack for vRealize Operations
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-03 18:19:55 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC OpenManage Operations Connector for Micro Focus Operations Bridge
|
|
|
|
|
Manager
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-03 18:19:55 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC PowerFlex Appliance
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions:
|
2022-02-03 18:59:51 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-02-03 18:59:51 +00:00
|
|
|
|
notes: See DSA-2021-293.
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
2022-02-03 18:59:51 +00:00
|
|
|
|
- '[DSA-2021-293](https://www.dell.com/support/kbdoc/en-us/000194579/dsa-2021-293-dell-powerflex-appliance-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC PowerFlex Rack
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions:
|
2022-02-03 18:59:51 +00:00
|
|
|
|
- 'RCM 3.3 train - all versions up to 3.3.11.0'
|
|
|
|
|
- 'RCM 3.4 train - all versions up to 3.4.6.0'
|
|
|
|
|
- 'RCM 3.5 train - all versions up to 3.5.6.0'
|
|
|
|
|
- 'RCM 3.6 train - all versions up to 3.6.2.0'
|
2022-01-24 22:27:28 +00:00
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-02-03 18:59:51 +00:00
|
|
|
|
notes: See DSA-2021-292.
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
2022-02-03 18:59:51 +00:00
|
|
|
|
- '[DSA-2021-292](https://www.dell.com/support/kbdoc/en-us/000194578/dsa-2021-292-dell-powerflex-rack-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC PowerFlex Software (SDS)
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions:
|
2022-02-03 18:59:51 +00:00
|
|
|
|
- '3.5'
|
|
|
|
|
- '3.5.1'
|
|
|
|
|
- '3.5.1.1'
|
2022-02-03 19:04:05 +00:00
|
|
|
|
- '3.5.1.2'
|
|
|
|
|
- '3.5.1.3'
|
|
|
|
|
- '3.5.1.4'
|
2022-02-03 18:59:51 +00:00
|
|
|
|
- '3.6'
|
|
|
|
|
- '3.6.0.1'
|
|
|
|
|
- '3.6.0.2'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-02-03 18:59:51 +00:00
|
|
|
|
notes: See DSA-2021-272.
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
2022-02-03 18:59:51 +00:00
|
|
|
|
- '[DSA-2021-272](https://www.dell.com/support/kbdoc/en-us/000194548/dsa-2021-272-dell-powerflex-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC PowerPath
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-03 18:59:51 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC PowerPath Management Appliance
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-03 18:59:51 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC PowerProtect Cyber Recovery
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-03 18:59:51 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC PowerProtect Data Manager
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions:
|
2022-02-03 18:59:51 +00:00
|
|
|
|
- 'All versions 19.9 and earlier'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-02-03 18:59:51 +00:00
|
|
|
|
notes: See DSA-2021-286.
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
2022-02-03 18:59:51 +00:00
|
|
|
|
- '[DSA-2021-286](https://www.dell.com/support/kbdoc/en-us/000194549/dsa-2021-286-dell-emc-power-protect-data-manager-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC PowerProtect DP Series Appliance (iDPA)
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions:
|
2022-02-03 18:59:51 +00:00
|
|
|
|
- '2.7.0 and earlier'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-02-03 18:59:51 +00:00
|
|
|
|
notes: See DSA 2021-285.
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
2022-02-03 18:59:51 +00:00
|
|
|
|
- '[DSA-2021-285](https://www.dell.com/support/kbdoc/en-us/000194532/dsa-2021-285-dell-emc-integrated-data-protection-appliance-powerprotect-dp-series-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC PowerScale OneFS
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-03 18:59:51 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC PowerShell for PowerMax
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-03 18:59:51 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC PowerShell for Powerstore
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-03 18:59:51 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC PowerShell for Unity
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-03 18:59:51 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC PowerStore
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-02-03 18:59:51 +00:00
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions:
|
|
|
|
|
- 'Versions before 2.0.1.3-1538564'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-02-03 18:59:51 +00:00
|
|
|
|
notes: See DSA-2021-295.
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
2022-02-03 18:59:51 +00:00
|
|
|
|
- '[DSA-2021-295](https://www.dell.com/support/kbdoc/en-us/000194739/dsa-2021-295-dell-emc-powerstore-family-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228-and-cve-2021-45046)'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC PowerVault MD3 Series Storage Arrays
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-02-03 18:59:51 +00:00
|
|
|
|
- ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC PowerVault ME4 Series Storage Arrays
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC RecoverPoint Classic
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions:
|
|
|
|
|
- All 5.1.x and later versions
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: Patch pending
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC RecoverPoint for Virtual Machine
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions:
|
|
|
|
|
- All 5.0.x and later versions
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: Patch pending
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC Repository Manager (DRM)
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC Ruckus SmartZone 100 Controller
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
investigated: false
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: See DSA-2021-303
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC Ruckus SmartZone 300 Controller
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
investigated: false
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: See DSA-2021-303
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC Ruckus Virtual Software
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
investigated: false
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: See DSA-2021-303
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC SourceOne
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC SRM vApp
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions:
|
|
|
|
|
- Versions before 4.6.0.2
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: Patch expected by 1/25/2022
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC Streaming Data Platform
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
investigated: false
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: Patch expected by 12/18/21
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC Systems Update (DSU)
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC Unisphere 360
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC Unity
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
investigated: false
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: Patch expected by 12/29/21
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC Virtual Storage Integrator
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC VPLEX
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC VxRail
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions:
|
|
|
|
|
- '"4.5.x 4.7.x 7.0.x"'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: Patch pending
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell EMC XtremIO
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Encryption Enterprise*
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Encryption Personal*
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Endpoint Security Suite Enterprise*
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Hybrid Client
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell ImageAssist
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Insights Client
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Linux Assistant
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Mobile Connect
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Monitor ISP (Windows/Mac/Linux)
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Monitor SDK
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Networking X-Series
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-02-03 18:59:51 +00:00
|
|
|
|
product: Dell OpenManage Mobile
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-02-03 18:59:51 +00:00
|
|
|
|
product: Dell OpenManage Server Administrator
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell OpenManage Change Management
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell OpenManage Enterprise Power Manager Plugin
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Optimizer
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell OS Recovery Tool
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Peripheral Manager 1.4 / 1.5 for Windows
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Platform Service
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Power Manager
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Power Manager Lite
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Precision Optimizer
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Precision Optimizer for Linux
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Premier Color
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Recovery (Linux)
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Remediation Platform
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Remote Execution Engine (DRONE)
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Security Advisory Update - DSA-2021-088
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Security Management Server & Dell Security Management Server Virtual*
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell SupportAssist SOS
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Thin OS
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Threat Defense
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell True Color
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Trusted Device
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dell Update
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dream Catcher
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: DUP Creation Service
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: DUP Framework (ISG)
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
2022-02-03 17:37:44 +00:00
|
|
|
|
- vendor: Dell
|
|
|
|
|
product: ECS
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: Patch expected by 12/18/21
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Embedded NAS
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Embedded Service Enabler
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Enterprise Hybrid Cloud
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
investigated: false
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: '[link](https://www.dell.com/support/kbdoc/en-us/000194490/dsa-2021-270-enterprise-hybrid-cloud-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Equallogic PS
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Fluid FS
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: iDRAC Service Module (iSM)
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Infinity MLK (firmware)
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Integrated Dell Remote Access Controller (iDRAC)
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: ISG Accelerators
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: ISG Board & Electrical
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: IsilonSD Management Server
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: IVE-WinDiag
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Mainframe Enablers
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: My Dell
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: MyDell Mobile
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: NetWorker Management Console
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Networking BIOS
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Networking DIAG
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Networking N-Series
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Networking OS 10
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Networking OS9
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Networking SD-WAN Edge SD-WAN
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Networking W-Series
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Networking X-Series
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: OMIMSSC (OpenManage Integration for Microsoft System Center)
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: OMNIA
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: OpenManage Connections - Nagios
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: OpenManage Connections - ServiceNow
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-02-03 18:59:51 +00:00
|
|
|
|
product: OpenManage Integration for Microsoft System Center for System Center Operations Manager
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: OpenManage Integration with Microsoft Windows Admin Center
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: OpenManage Network Integration
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: PowerConnect N3200
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: PowerConnect PC2800
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: PowerConnect PC8100
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: PowerEdge BIOS
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: PowerEdge Operating Systems
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: PowerTools Agent
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: PPDM Kubernetes cProxy
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: PPDM VMware vProxy
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Redtail
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Remotely Anywhere
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Riptide (firmware)
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Rugged Control Center (RCC)
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: SD ROM Utility
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: SDNAS
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Secure Connect Gateway (SCG) Appliance
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- '"5.00.00 5.00.05 and 4.0.06 and earlier versions (OVF and VHD)"'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: See DSA-2021-282
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Secure Connect Gateway (SCG) Policy Manager
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- '"5.00.00.10 5.00.05.10"'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: See DSA-2021-281
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Server Storage
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Smart Fabric Storage Software
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: SmartByte
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: SMI-S
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Software RAID
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Solutions Enabler
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Solutions Enabler vApp
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Sonic
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: SRS Policy Manager
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- '7'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: Patch pending
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: SRS VE
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Storage Center - Dell Storage Manager
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: Patch pending
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Storage Center OS and additional SC applications unless otherwise noted
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: SupportAssist Client Commercial
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: SupportAssist Client Consumer
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: SupportAssist Enterprise
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: Patch expected by 12/23/21
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: UCC Edge
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Unisphere Central
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: Patch expected by 1/10/2022
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Unisphere for PowerMax
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Unisphere for PowerMax vApp
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Unisphere for VMAX
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Unisphere for VNX
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Update Manager Plugin
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Vblock
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: Patch pending See vce6771 (requires customer login)
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: ViPR Controller
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: VMware vRealize Automation 8.x
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- '"8.2 8.3 8.4 8.5 and 8.6"'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: Patch expected by 12/19/21
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: VMware vRealize Orchestrator 8.x
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- '"8.2 8.3 8.4 8.5 and 8.6"'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: Patch expected by 12/19/21
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: VNX1
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: VNX2
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
investigated: true
|
2022-01-12 07:20:52 +00:00
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: VNXe 1600
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions:
|
|
|
|
|
- Versions 3.1.16.10220572 and earlier
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: Patch expected by 12/19/21
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: VNXe 3200
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions:
|
|
|
|
|
- Version 3.1.15.10216415 and earlier
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: Patch expected by 12/19/21
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: VPLEX VS2/VS6 / VPLEX Witness
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: vRealize Data Protection Extension Data Management
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: Patch expected by 12/19/21
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: vRealize Data Protection Extension for vRealize Automation (vRA) 8.x
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions:
|
|
|
|
|
- '"version 19.6 version 19.7 version 19.8 and version 19.9"'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: Patch expected by 12/19/21
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
|
|
|
|
product: vRealize Orchestrator (vRO) Plug-ins for Dell EMC Storage
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions:
|
|
|
|
|
- Various
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: See DSA-2021-300
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
|
|
|
|
product: vRO Plugin for Dell EMC PowerMax
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions:
|
|
|
|
|
- Version 1.2.3 or earlier
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: See DSA-2021-300
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
|
|
|
|
product: vRO Plugin for Dell EMC PowerScale
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions:
|
|
|
|
|
- Version 1.1.0 or earlier
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: See DSA-2021-300
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
|
|
|
|
product: vRO Plugin for Dell EMC PowerStore
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions:
|
|
|
|
|
- Version 1.1.4 or earlier
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: See DSA-2021-300
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
|
|
|
|
product: vRO Plugin for Dell EMC Unity
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions:
|
|
|
|
|
- Version 1.0.6 or earlier
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: See DSA-2021-300
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
|
|
|
|
product: vRO Plugin for Dell EMC XtremIO
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions:
|
|
|
|
|
- Version 4.1.2 or earlier
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: See DSA-2021-300
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Vsan Ready Nodes
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
|
|
|
|
product: VxBlock
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: '"Patch pending See vce6771 (requires customer login) "'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Warnado MLK (firmware)
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Wyse Management Suite
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions:
|
2022-01-24 22:27:28 +00:00
|
|
|
|
- <3.5
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: See DSA-2021-267
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Wyse Proprietary OS (ThinOS)
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Dell
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Wyse Windows Embedded Suite
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
2022-01-24 22:27:28 +00:00
|
|
|
|
affected_versions: []
|
2022-01-12 07:20:52 +00:00
|
|
|
|
fixed_versions: []
|
2022-01-24 22:27:28 +00:00
|
|
|
|
unaffected_versions:
|
|
|
|
|
- N/A
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: Deltares
|
|
|
|
|
product: Delft-FEWS
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: true
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions:
|
|
|
|
|
- '>2018.02'
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://publicwiki.deltares.nl/display/FEWSDOC/Delft-FEWS+and+Log4J+vulnerability
|
|
|
|
|
notes: Mitigations Only
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-22T00:00:00'
|
|
|
|
|
- vendor: Denequa
|
|
|
|
|
product: ''
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://denequa.de/log4j-information.html
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Device42
|
|
|
|
|
product: ''
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://blog.device42.com/2021/12/13/log4j-zero-day/
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Devolutions
|
|
|
|
|
product: All products
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://blog.devolutions.net/2021/12/critical-vulnerability-in-log4j/
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Diebold Nixdorf
|
|
|
|
|
product: ''
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dieboldnixdorf.com/en-us/apache
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: AnywhereUSB Manager
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: ARMT
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Aview
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: AVWOB
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: CTEK G6200 family
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: CTEK SkyCloud
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: CTEK Z45 family
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Digi 54xx family
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Digi 63xx family
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Digi AnywhereUSB (G2) family
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Digi AnywhereUSB Plus family
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Digi Connect EZ family
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Digi Connect family
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Digi Connect IT family
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Digi Connect Sensor family
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Digi Connect WS family
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Digi ConnectPort family
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Digi ConnectPort LTS family
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Digi Embedded Android
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Digi Embedded Yocto
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Digi EX routers
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Digi IX routers
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Digi LR54
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Digi Navigator
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Digi One family
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Digi Passport family
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Digi PortServer TS family
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Digi Remote Manager
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Digi TX routers
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Digi WR11
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Digi WR21
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Digi WR31
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Digi WR44R/RR
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Digi WR54
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Digi WR64
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
|
|
|
|
product: Digi Xbee mobile app
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
|
|
|
|
product: Lighthouse
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
|
|
|
|
product: Realport
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digi International
|
|
|
|
|
product: Remote Hub Config Utility
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digi.com/resources/security
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Digicert
|
|
|
|
|
product: ''
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://knowledge.digicert.com/alerts/digicert-log4j-response.html
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Digital AI
|
|
|
|
|
product: ''
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://support.digital.ai/hc/en-us/articles/4412377686674-Log4J-Vulnerability-to-Zero-Day-Exploit-and-Digital-ai#overview-0-1
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Digital Alert Systems
|
|
|
|
|
product: All
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.digitalalertsystems.com/default-2.htm
|
|
|
|
|
notes: Formerly Monroe Electronics, Inc.
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2022-01-05T00:00:00'
|
|
|
|
|
- vendor: DNSFilter
|
|
|
|
|
product: ''
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dnsfilter.com/blog/dnsfilter-response-to-log4j-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Docker
|
|
|
|
|
product: ''
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.docker.com/blog/apache-log4j-2-cve-2021-44228/
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Docusign
|
|
|
|
|
product: ''
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.docusign.com/trust/alerts/alert-docusign-statement-on-the-log4j2-vulnerability
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: DrayTek
|
|
|
|
|
product: Vigor Routers, Access Points, Switches, VigorACS Central Management Software,
|
|
|
|
|
MyVigor Platform
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.draytek.com/about/security-advisory/log4shell-vulnerability-(cve-2021-44228)/
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-15T00:00:00'
|
|
|
|
|
- vendor: DSpace
|
|
|
|
|
product: ''
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://groups.google.com/g/dspace-community/c/Fa4VdjiiNyE
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
2022-01-24 22:40:46 +00:00
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00'
|
2022-01-12 07:20:52 +00:00
|
|
|
|
- vendor: Dynatrace
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: ActiveGate
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Dynatrace
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Dynatrace Extensions
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: Please see Dynatrace Communication for details
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Dynatrace
|
|
|
|
|
product: FedRamp SAAS
|
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Dynatrace
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Managed cluster nodes
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: Please see Dynatrace Communication for details
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Dynatrace
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: OneAgent
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Dynatrace
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: SAAS
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/
|
|
|
|
|
notes: ''
|
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Dynatrace
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Synthetic Private ActiveGate
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: Please see Dynatrace Communication for details
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
- vendor: Dynatrace
|
2022-01-24 22:27:28 +00:00
|
|
|
|
product: Synthetic public locations
|
2022-01-12 07:20:52 +00:00
|
|
|
|
cves:
|
|
|
|
|
cve-2021-4104:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-44228:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45046:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
cve-2021-45105:
|
|
|
|
|
investigated: false
|
|
|
|
|
affected_versions: []
|
|
|
|
|
fixed_versions: []
|
|
|
|
|
unaffected_versions: []
|
|
|
|
|
vendor_links:
|
|
|
|
|
- https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/
|
2022-01-24 22:27:28 +00:00
|
|
|
|
notes: ''
|
2022-01-12 07:20:52 +00:00
|
|
|
|
references:
|
|
|
|
|
- ''
|
|
|
|
|
last_updated: '2021-12-21T00:00:00'
|
|
|
|
|
...
|