mirror of
https://github.com/cisagov/log4j-affected-db.git
synced 2024-11-17 06:17:55 +00:00
Add/Update through DUP
This commit is contained in:
parent
f5f56dfe7d
commit
09c0725de1
1 changed files with 240 additions and 109 deletions
|
@ -4271,7 +4271,37 @@ software:
|
|||
- '[DSA-2021-295](https://www.dell.com/support/kbdoc/en-us/000194739/dsa-2021-295-dell-emc-powerstore-family-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228-and-cve-2021-45046)'
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: Dell EMC PowerVault MD3 Series Storage Arrays
|
||||
product: Dell EMC PowerSwitch Z9264F-ON BMC
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: Dell EMC PowerSwitch Z9432F-ON BMC
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
|
@ -4313,7 +4343,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -4331,7 +4361,7 @@ software:
|
|||
- ''
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: Dell EMC RecoverPoint Classic
|
||||
product: Dell EMC RecoverPoint
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
|
@ -4341,7 +4371,7 @@ software:
|
|||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions:
|
||||
- All 5.1.x and later versions
|
||||
- 'All'
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
|
@ -4356,39 +4386,9 @@ software:
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
||||
notes: Patch pending
|
||||
notes: See DSA 2021-284.
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: Dell EMC RecoverPoint for Virtual Machine
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions:
|
||||
- All 5.0.x and later versions
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
||||
notes: Patch pending
|
||||
references:
|
||||
- ''
|
||||
- '[DSA 2021-284](https://www.dell.com/support/kbdoc/en-us/000194531/dsa-2021-284-dell-emc-recoverpoint-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: Dell EMC Repository Manager (DRM)
|
||||
|
@ -4403,7 +4403,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -4429,9 +4429,10 @@ software:
|
|||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: false
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
fixed_versions:
|
||||
- ''
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
|
@ -4447,7 +4448,7 @@ software:
|
|||
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
||||
notes: See DSA-2021-303
|
||||
references:
|
||||
- ''
|
||||
- '[DSA-2021-303](https://www.dell.com/support/kbdoc/en-us/000194616/dsa-2021-303-dell-emc-ruckus-wireless-controller-and-virtual-software-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: Dell EMC Ruckus SmartZone 300 Controller
|
||||
|
@ -4458,9 +4459,10 @@ software:
|
|||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: false
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
fixed_versions:
|
||||
- ''
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
|
@ -4476,7 +4478,7 @@ software:
|
|||
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
||||
notes: See DSA-2021-303
|
||||
references:
|
||||
- ''
|
||||
- '[DSA-2021-303](https://www.dell.com/support/kbdoc/en-us/000194616/dsa-2021-303-dell-emc-ruckus-wireless-controller-and-virtual-software-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: Dell EMC Ruckus Virtual Software
|
||||
|
@ -4487,9 +4489,10 @@ software:
|
|||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: false
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
fixed_versions:
|
||||
- ''
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
|
@ -4505,7 +4508,7 @@ software:
|
|||
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
||||
notes: See DSA-2021-303
|
||||
references:
|
||||
- ''
|
||||
- '[DSA-2021-303](https://www.dell.com/support/kbdoc/en-us/000194616/dsa-2021-303-dell-emc-ruckus-wireless-controller-and-virtual-software-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: Dell EMC SourceOne
|
||||
|
@ -4520,7 +4523,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -4538,7 +4541,7 @@ software:
|
|||
- ''
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: Dell EMC SRM vApp
|
||||
product: Dell EMC SRM
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
|
@ -4547,9 +4550,9 @@ software:
|
|||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions:
|
||||
- Versions before 4.6.0.2
|
||||
fixed_versions: []
|
||||
affected_versions: []
|
||||
fixed_versions:
|
||||
- 'Versions before 4.6.0.2'
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
|
@ -4563,9 +4566,9 @@ software:
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
||||
notes: Patch expected by 1/25/2022
|
||||
notes: See DSA-2021-301.
|
||||
references:
|
||||
- ''
|
||||
- '[DSA-2021-301](https://www.dell.com/support/kbdoc/en-us/000194613/dsa-2021-301)'
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: Dell EMC Streaming Data Platform
|
||||
|
@ -4576,8 +4579,13 @@ software:
|
|||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
investigated: true
|
||||
affected_versions:
|
||||
- '1.1'
|
||||
- '1.2'
|
||||
- '1.2 HF1'
|
||||
- '1.3'
|
||||
- '1.3.1'
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
|
@ -4592,9 +4600,9 @@ software:
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
||||
notes: Patch expected by 12/18/21
|
||||
notes: See DSA-2021-297.
|
||||
references:
|
||||
- ''
|
||||
- '[DSA-2021-297](https://www.dell.com/support/kbdoc/en-us/000194627/dsa-2021-297-dell-emc-streaming-data-platform-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228-cve-2021-45046)'
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: Dell EMC Systems Update (DSU)
|
||||
|
@ -4609,7 +4617,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -4639,7 +4647,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -4665,9 +4673,10 @@ software:
|
|||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: false
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
fixed_versions:
|
||||
- ''
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
|
@ -4681,9 +4690,9 @@ software:
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
||||
notes: Patch expected by 12/29/21
|
||||
notes: See DSA-2021-294.
|
||||
references:
|
||||
- ''
|
||||
- '[DSA-2021-294](https://www.dell.com/support/kbdoc/en-us/000194826/dsa-2021-294-dell-emc-unity-dell-emc-unityvsa-and-dell-emc-unity-xt-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228-cve-2021-45046-and-cve-2021-45105)'
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: Dell EMC Virtual Storage Integrator
|
||||
|
@ -4698,7 +4707,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -4728,7 +4737,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -4746,7 +4755,7 @@ software:
|
|||
- ''
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: Dell EMC VxRail
|
||||
product: Dell EMC vProtect
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
|
@ -4756,7 +4765,7 @@ software:
|
|||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions:
|
||||
- '"4.5.x 4.7.x 7.0.x"'
|
||||
- '19.5-19.9'
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
|
@ -4771,9 +4780,71 @@ software:
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
||||
notes: Patch pending
|
||||
notes: See DSA-2022-007.
|
||||
references:
|
||||
- ''
|
||||
- '[DSA-2022-007](https://www.dell.com/support/kbdoc/en-us/000195003/title-dsa-2022-007-dell-emc-vprotect-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228-cve-2021-45046)'
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: Dell EMC VxRail
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions:
|
||||
- '4.5.x'
|
||||
- '4.7.x'
|
||||
- '7.0.x'
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
||||
notes: See DSA-2021-265.
|
||||
references:
|
||||
- '[DSA-2021-265](https://www.dell.com/support/kbdoc/en-us/000194466/dsa-2021-265-dell-emc-vxrail-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: Dell EMC XC
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions:
|
||||
- ''
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
||||
notes: See DSA-2021-311.
|
||||
references:
|
||||
- '[DSA-2021-311](https://www.dell.com/support/kbdoc/en-us/000194822/dsa-2021-311-dell-emc-xc-series-and-core-appliance-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228-cve-2021-45046-and-cve-2021-45105)'
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: Dell EMC XtremIO
|
||||
|
@ -4788,7 +4859,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -4818,7 +4889,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -4848,7 +4919,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -4878,7 +4949,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -4908,7 +4979,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -4938,7 +5009,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -4968,7 +5039,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -4998,7 +5069,37 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: Dell Memory Solutions
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5028,7 +5129,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5058,7 +5159,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5088,7 +5189,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5118,7 +5219,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5148,7 +5249,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5178,7 +5279,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5208,7 +5309,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5226,7 +5327,7 @@ software:
|
|||
- ''
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: Dell OpenManage Enterprise Power Manager Plugin
|
||||
product: Dell OpenManage Enterprise Power Manager plugin
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
|
@ -5238,7 +5339,37 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: Dell OpenManage Enterprise CloudIQ plugin
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5268,7 +5399,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5298,7 +5429,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5328,7 +5459,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5358,7 +5489,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5388,7 +5519,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5418,7 +5549,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5448,7 +5579,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5478,7 +5609,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5508,7 +5639,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5538,7 +5669,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5568,7 +5699,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5598,7 +5729,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5628,7 +5759,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5658,7 +5789,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5688,7 +5819,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5718,7 +5849,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5748,7 +5879,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5778,7 +5909,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5808,7 +5939,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5838,7 +5969,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5868,7 +5999,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5898,7 +6029,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5928,7 +6059,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
|
Loading…
Reference in a new issue