mirror of
https://github.com/cisagov/log4j-affected-db.git
synced 2024-10-31 22:28:26 +00:00
4275 lines
123 KiB
YAML
4275 lines
123 KiB
YAML
|
---
|
||
|
version: '1.0'
|
||
|
owners:
|
||
|
- name: cisagov
|
||
|
url: https://github.com/cisagov/log4j-affected-db
|
||
|
software:
|
||
|
- vendor: B&R Industrial Automation
|
||
|
product: APROL
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.br-automation.com/downloads_br_productcatalogue/assets/1639507581859-en-original-1.0.pdf
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-16T00:00:00'
|
||
|
- vendor: Baxter
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.baxter.com/sites/g/files/ebysai746/files/2021-12/Apache_Log4j_Vulnerability.pdf
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: BackBox
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://updates.backbox.com/V6.5/Docs/CVE-2021-44228.pdf
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Balbix
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.balbix.com/blog/broad-exposure-to-log4shell-cve-2021-44228-highlights-how-the-attack-surface-has-exploded/
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Baramundi Products
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://forum.baramundi.com/index.php?threads/baramundi-produkte-von-log4shell-schwachstelle-in-log4j-nicht-betroffen.12539/#post-62875
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Barco
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.barco.com/en/support/knowledge-base/kb12495
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Barracuda
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.barracuda.com/company/legal/trust-center
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BBraun
|
||
|
product: Outlook® Safety Infusion System Pump family
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/21-0894C_Statement_Cybersecurity_Apache_Log4J_Sheet_FINAL_121621.pdf
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: BBraun
|
||
|
product: Space® Infusion Pump family (Infusomat® Space® Infusion Pump, Perfusor®
|
||
|
Space® Infusion
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/21-0894C_Statement_Cybersecurity_Apache_Log4J_Sheet_FINAL_121621.pdf
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: BBraun
|
||
|
product: Pump, SpaceStation, and Space® Wireless Battery)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/21-0894C_Statement_Cybersecurity_Apache_Log4J_Sheet_FINAL_121621.pdf
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: BBraun
|
||
|
product: DoseTrac® Server, DoseLink™ Server, and Space® Online Suite Server software
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/21-0894C_Statement_Cybersecurity_Apache_Log4J_Sheet_FINAL_121621.pdf
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: BBraun
|
||
|
product: Pinnacle® Compounder
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/21-0894C_Statement_Cybersecurity_Apache_Log4J_Sheet_FINAL_121621.pdf
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: BBraun
|
||
|
product: APEX® Compounder
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.bbraunusa.com/content/dam/b-braun/us/website/customer_communications/21-0894C_Statement_Cybersecurity_Apache_Log4J_Sheet_FINAL_121621.pdf
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: BD
|
||
|
product: Arctic Sun™ Analytics
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: BD
|
||
|
product: BD Diabetes Care App Cloud
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: BD
|
||
|
product: BD HealthSight™ Clinical Advisor
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: BD
|
||
|
product: BD HealthSight™ Data Manager
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: BD
|
||
|
product: BD HealthSight™ Diversion Management
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: BD
|
||
|
product: BD HealthSight™ Infection Advisor
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: BD
|
||
|
product: BD HealthSight™ Inventory Optimization Analytics
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: BD
|
||
|
product: BD HealthSight™ Medication Safety
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: BD
|
||
|
product: BD Knowledge Portal for Infusion Technologies
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: BD
|
||
|
product: BD Knowledge Portal for Medication Technologies
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: BD
|
||
|
product: BD Knowledge Portal for BD Pyxis™ Supply
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: BD
|
||
|
product: BD Synapsys™ Informatics Solution
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: BD
|
||
|
product: BD Veritor™ COVID At Home Solution Cloud
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Beckman Coulter
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.beckmancoulter.com/en/about-beckman-coulter/product-security/product-security-updates
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Beijer Electronics
|
||
|
product: acirro+
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www05.beijerelectronics.com/en/news---events/news/2021/Important___information___regarding___Log4Shell
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-22T00:00:00'
|
||
|
- vendor: Beijer Electronics
|
||
|
product: BFI frequency inverters
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www05.beijerelectronics.com/en/news---events/news/2021/Important___information___regarding___Log4Shell
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-22T00:00:00'
|
||
|
- vendor: Beijer Electronics
|
||
|
product: BSD servo drives
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www05.beijerelectronics.com/en/news---events/news/2021/Important___information___regarding___Log4Shell
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-22T00:00:00'
|
||
|
- vendor: Beijer Electronics
|
||
|
product: CloudVPN
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www05.beijerelectronics.com/en/news---events/news/2021/Important___information___regarding___Log4Shell
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-22T00:00:00'
|
||
|
- vendor: Beijer Electronics
|
||
|
product: FnIO-G and M Distributed IO
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www05.beijerelectronics.com/en/news---events/news/2021/Important___information___regarding___Log4Shell
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-22T00:00:00'
|
||
|
- vendor: Beijer Electronics
|
||
|
product: iX Developer
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www05.beijerelectronics.com/en/news---events/news/2021/Important___information___regarding___Log4Shell
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-22T00:00:00'
|
||
|
- vendor: Beijer Electronics
|
||
|
product: Nexto modular PLC
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www05.beijerelectronics.com/en/news---events/news/2021/Important___information___regarding___Log4Shell
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-22T00:00:00'
|
||
|
- vendor: Beijer Electronics
|
||
|
product: Nexto Xpress compact controller
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www05.beijerelectronics.com/en/news---events/news/2021/Important___information___regarding___Log4Shell
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-22T00:00:00'
|
||
|
- vendor: Beijer Electronics
|
||
|
product: WARP Engineering Studio
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www05.beijerelectronics.com/en/news---events/news/2021/Important___information___regarding___Log4Shell
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-22T00:00:00'
|
||
|
- vendor: BioMerieux
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.biomerieux.com/en/cybersecurity-data-privacy
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-22T00:00:00'
|
||
|
- vendor: Bender
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.bender.de/en/cert
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Best Practical Request Tracker (RT) and Request Tracker for Incident Response
|
||
|
(RTIR)
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://bestpractical.com/blog/2021/12/request-tracker-rt-and-request-tracker-for-incident-response-rtir-do-not-use-log4j
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BeyondTrust
|
||
|
product: Privilege Management Cloud
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions: []
|
||
|
fixed_versions:
|
||
|
- Unknown
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.beyondtrust.com/blog/entry/security-advisory-apache-log4j2-cve-2021-44228-log4shell
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-17T00:00:00'
|
||
|
- vendor: BeyondTrust
|
||
|
product: Privilege Management Reporting in BeyondInsight
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions: []
|
||
|
fixed_versions:
|
||
|
- '21.2'
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.beyondtrust.com/blog/entry/security-advisory-apache-log4j2-cve-2021-44228-log4shell
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-17T00:00:00'
|
||
|
- vendor: BeyondTrust
|
||
|
product: Secure Remote Access appliances
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions:
|
||
|
- Unknown
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.beyondtrust.com/blog/entry/security-advisory-apache-log4j2-cve-2021-44228-log4shell
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-17T00:00:00'
|
||
|
- vendor: BeyondTrust Bomgar
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://beyondtrustcorp.service-now.com/kb_view.do?sysparm_article=KB0016542
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BisectHosting
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.bisecthosting.com/clients/index.php?rp=/knowledgebase/205/Java-Log4j-Vulnerability.html
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BitDefender
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://businessinsights.bitdefender.com/security-advisory-bitdefender-response-to-critical-0-day-apache-log4j2-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BitNami By VMware
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://docs.bitnami.com/general/security/security-2021-12-10/
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BitRise
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://blog.bitrise.io/post/bitrises-response-to-log4j-vulnerability-cve-2021-44228
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Bitwarden
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bitwarden.com/t/log4j-log4shell-cve-is-bitwarden-affected-due-to-docker-image/36177/2
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Biztory
|
||
|
product: Fivetran
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.biztory.com/blog/apache-log4j2-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- Vendor review indicated Fivetran is not vulnerable to Log4j2
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Black Kite
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://blackkite.com/log4j-rce-vulnerability-log4shell-puts-millions-at-risk/
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Blancco
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.blancco.com/display/NEWS/2021/12/12/CVE-2021-44228+-+Critical+vulnerability+in+Apache+Log4j+library
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Blumira
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.blumira.com/cve-2021-44228-log4shell/
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: Bladelogic Database Automation
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: BMC AMI Ops
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: BMC AMI Products
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: BMC Compuware
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: BMC Helix Automation Console
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: BMC Helix Business Workflows
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: BMC Helix Client Management
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: BMC Helix Cloud Cost
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: BMC Helix Cloud Security
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: BMC Helix CMDB
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: BMC Helix Continuous Optimization
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: BMC Helix Control-M
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: BMC Helix Digital Workplace
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: BMC Helix Discovery
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: BMC Helix ITSM
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: BMC Helix Knowledge Management
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: BMC Helix Operations Management with AIOps
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: BMC Helix Platform
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: BMC Helix platform
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: BMC Helix Remediate
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: BMC Helix Remediate
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: BMC Helix Remedyforce
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: BMC Helix Virtual Agent
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: Cloud Lifecycle Management
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: Control-M
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: Footprints
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: MainView Middleware Administrator
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: MainView Middleware Monitor
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: Remedy ITSM (IT Service Management)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: SmartIT
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: Track-It!
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: TrueSight Automation for Networks
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: TrueSight Automation for Servers
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: TrueSight Capacity Optimization
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: TrueSight Infrastructure Management
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: TrueSight Operations Management
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BMC
|
||
|
product: TrueSight Orchestration
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Boston Scientific
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.bostonscientific.com/content/dam/bostonscientific/corporate/product-security/bsc_statement_on_apache_log4j-v1.pdf
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-20T00:00:00'
|
||
|
- vendor: Bosch
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://bosch-iot-suite.com/news/apache-log4j-rce-vulnerability/
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2021-12-22T00:00:00'
|
||
|
- vendor: Box
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://blog.box.com/boxs-statement-recent-log4j-vulnerability-cve-2021-44228
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Brainworks
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://www.brainworks.de/log4j-exploit-kerio-connect-workaround/
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: BrightSign
|
||
|
product: ''
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://brightsign.atlassian.net/wiki/spaces/DOC/pages/370679198/Security+Statement+Log4J+Meltdown+and+Spectre+Vulnerabilities#SecurityStatement%3ALog4J%2CMeltdownandSpectreVulnerabilities-JavaApacheLog4j
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Advanced Secure Gateway (ASG)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Automic Automation
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://knowledge.broadcom.com/external/article?articleId=230308
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: BCAAA
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: CA Advanced Authentication
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions:
|
||
|
- '9.1'
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links: []
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: CA Risk Authentication
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links: []
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: CA Strong Authentication
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links: []
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Cloud Workload Protection (CWP)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Cloud Workload Protection for Storage (CWP:S)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: CloudSOC Cloud Access Security Broker (CASB)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Content Analysis (CA)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Critical System Protection (CSP)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Data Center Security (DCS)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Data Loss Prevention (DLP)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Email Security Service (ESS)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Ghost Solution Suite (GSS)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: HSM Agent
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Industrial Control System Protection (ICSP)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Integrated Cyber Defense Manager (ICDm)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Integrated Secure Gateway (ISG)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: IT Management Suite
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Layer7 API Developer Portal
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Layer7 API Gateway
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Layer7 Mobile API Gateway
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Management Center (MC)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: PacketShaper (PS) S-Series
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: PolicyCenter (PC) S-Series
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Privileged Access Manager
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Privileged Access Manager Server Control
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Privileged Identity Manager
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: ProxySG
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Reporter
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Secure Access Cloud (SAC)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Security Analytics (SA)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: SiteMinder (CA Single Sign-On)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: SSL Visibility (SSLV)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Symantec Control Compliance Suite (CCS)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Symantec Directory
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Symantec Endpoint Detection and Response (EDR)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Symantec Endpoint Encryption (SEE)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Symantec Endpoint Protection (SEP)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Symantec Endpoint Protection (SEP) for Mobile
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Symantec Endpoint Protection Manager (SEPM)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: true
|
||
|
affected_versions:
|
||
|
- '14.3'
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Symantec Identity Governance and Administration (IGA)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Symantec Mail Security for Microsoft Exchange (SMSMSE)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Symantec Messaging Gateway (SMG)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:50+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Symantec PGP Solutions
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Symantec Protection Engine (SPE)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Symantec Protection for SharePoint Servers (SPSS)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: VIP
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: VIP Authentication Hub
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Web Isolation (WI)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: Web Security Service (WSS)
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
||
|
- vendor: Broadcom
|
||
|
product: WebPulse
|
||
|
cves:
|
||
|
cve-2021-4104:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-44228:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45046:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
cve-2021-45105:
|
||
|
investigated: false
|
||
|
affected_versions: []
|
||
|
fixed_versions: []
|
||
|
unaffected_versions: []
|
||
|
vendor_links:
|
||
|
- https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793
|
||
|
notes: ''
|
||
|
references:
|
||
|
- ''
|
||
|
last_updated: '2022-01-12T07:18:51+00:00'
|
||
|
...
|