1
0
Fork 0
mirror of https://github.com/cisagov/log4j-affected-db.git synced 2024-11-25 09:50:47 +00:00

Update F5, FedEx entries

This commit is contained in:
justmurphy 2022-02-07 13:10:07 -05:00 committed by GitHub
parent 1cd0242393
commit 27b95db9f2
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23

View file

@ -167,7 +167,7 @@ software:
affected_versions: [] affected_versions: []
fixed_versions: [] fixed_versions: []
unaffected_versions: unaffected_versions:
- 11.x - 16.x - '11.x - 16.x'
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
affected_versions: [] affected_versions: []
@ -197,7 +197,7 @@ software:
affected_versions: [] affected_versions: []
fixed_versions: [] fixed_versions: []
unaffected_versions: unaffected_versions:
- 7.x-8.x - '7.x - 8.x'
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
affected_versions: [] affected_versions: []
@ -227,7 +227,7 @@ software:
affected_versions: [] affected_versions: []
fixed_versions: [] fixed_versions: []
unaffected_versions: unaffected_versions:
- 1.x - '1.x'
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
affected_versions: [] affected_versions: []
@ -257,7 +257,7 @@ software:
affected_versions: [] affected_versions: []
fixed_versions: [] fixed_versions: []
unaffected_versions: unaffected_versions:
- 3.x - '3.x'
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
affected_versions: [] affected_versions: []
@ -287,7 +287,7 @@ software:
affected_versions: [] affected_versions: []
fixed_versions: [] fixed_versions: []
unaffected_versions: unaffected_versions:
- 3.x - '3.x'
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
affected_versions: [] affected_versions: []
@ -317,7 +317,7 @@ software:
affected_versions: [] affected_versions: []
fixed_versions: [] fixed_versions: []
unaffected_versions: unaffected_versions:
- 1.x - 2.x - '1.x - 2.x'
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
affected_versions: [] affected_versions: []
@ -347,7 +347,7 @@ software:
affected_versions: [] affected_versions: []
fixed_versions: [] fixed_versions: []
unaffected_versions: unaffected_versions:
- 1.x - '1.x'
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
affected_versions: [] affected_versions: []
@ -377,7 +377,7 @@ software:
affected_versions: [] affected_versions: []
fixed_versions: [] fixed_versions: []
unaffected_versions: unaffected_versions:
- 1.x - '1.x'
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
affected_versions: [] affected_versions: []
@ -407,7 +407,7 @@ software:
affected_versions: [] affected_versions: []
fixed_versions: [] fixed_versions: []
unaffected_versions: unaffected_versions:
- R19 - R25 - 'R19 - R25'
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
affected_versions: [] affected_versions: []
@ -437,7 +437,7 @@ software:
affected_versions: [] affected_versions: []
fixed_versions: [] fixed_versions: []
unaffected_versions: unaffected_versions:
- 1.x - '1.x'
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
affected_versions: [] affected_versions: []
@ -467,7 +467,7 @@ software:
affected_versions: [] affected_versions: []
fixed_versions: [] fixed_versions: []
unaffected_versions: unaffected_versions:
- 1.x - '1.x'
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
affected_versions: [] affected_versions: []
@ -495,8 +495,9 @@ software:
cve-2021-44228: cve-2021-44228:
investigated: true investigated: true
affected_versions: affected_versions:
- 5.x (5.2.0 CF1 - '5.x'
- 5.1.0 CF-30 - 5.1.0 CF-33) - '5.2.0 CF1'
- '5.1.0 CF-30 - 5.1.0 CF-33'
fixed_versions: [] fixed_versions: []
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
@ -517,7 +518,7 @@ software:
- '' - ''
last_updated: '2022-01-12T07:18:50+00:00' last_updated: '2022-01-12T07:18:50+00:00'
- vendor: FAST LTA - vendor: FAST LTA
product: '' product: All
cves: cves:
cve-2021-4104: cve-2021-4104:
investigated: false investigated: false
@ -546,7 +547,7 @@ software:
- '' - ''
last_updated: '2022-01-12T07:18:50+00:00' last_updated: '2022-01-12T07:18:50+00:00'
- vendor: Fastly - vendor: Fastly
product: '' product: All
cves: cves:
cve-2021-4104: cve-2021-4104:
investigated: false investigated: false
@ -585,7 +586,7 @@ software:
cve-2021-44228: cve-2021-44228:
investigated: false investigated: false
affected_versions: affected_versions:
- Unknown - '340x'
fixed_versions: [] fixed_versions: []
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
@ -600,14 +601,51 @@ software:
unaffected_versions: [] unaffected_versions: []
vendor_links: vendor_links:
- https://www.fedex.com/en-us/shipping/ship-manager/software.html#tab-4 - https://www.fedex.com/en-us/shipping/ship-manager/software.html#tab-4
notes: 'Note: FedEx is aware of the issue related to the Log4j Remote Code Execution notes: Note - FedEx is aware of the issue related to the Log4j Remote Code Execution
vulnerability affecting various Apache products. We are actively assessing the vulnerability affecting various Apache products. We are actively assessing the
situation and taking necessary action as appropriate. As a result, we are temporarily situation and taking necessary action as appropriate. As a result, we are temporarily
unable to provide a link to download the FedEx Ship Manager software or generate unable to provide a link to download the FedEx Ship Manager software or generate
product keys needed for registration of FedEx Ship Manager software. We are product keys needed for registration of FedEx Ship Manager software. We are
working to have this resolved as quickly as possible and apologize for the inconvenience. working to have this resolved as quickly as possible and apologize for the inconvenience.
For related questions or the most updated information, customers should check For related questions or the most updated information, customers should check
FedEx Updates for Apache Log4j Issue or contact their Customer Technology representative.' FedEx Updates for Apache Log4j Issue or contact their Customer Technology representative.
references:
- ''
last_updated: '2021-12-15T00:00:00'
- vendor: FedEx
product: Ship Manager Software
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions:
- '3509'
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://www.fedex.com/en-us/shipping/ship-manager/software.html#tab-4
notes: Note - FedEx is aware of the issue related to the Log4j Remote Code Execution
vulnerability affecting various Apache products. We are actively assessing the
situation and taking necessary action as appropriate. As a result, we are temporarily
unable to provide a link to download the FedEx Ship Manager software or generate
product keys needed for registration of FedEx Ship Manager software. We are
working to have this resolved as quickly as possible and apologize for the inconvenience.
For related questions or the most updated information, customers should check
FedEx Updates for Apache Log4j Issue or contact their Customer Technology representative.
references: references:
- '' - ''
last_updated: '2021-12-15T00:00:00' last_updated: '2021-12-15T00:00:00'