From 2be2880d1fc43d01800a529cef108d958f08c81b Mon Sep 17 00:00:00 2001 From: justmurphy <96064251+justmurphy@users.noreply.github.com> Date: Wed, 2 Mar 2022 08:34:21 -0500 Subject: [PATCH] Add Chef products --- data/cisagov_C.yml | 131 +++++++++++++++++++++++++++++++++++++++++++-- 1 file changed, 126 insertions(+), 5 deletions(-) diff --git a/data/cisagov_C.yml b/data/cisagov_C.yml index aa95b17..19fa649 100644 --- a/data/cisagov_C.yml +++ b/data/cisagov_C.yml @@ -1468,7 +1468,37 @@ software: - '' last_updated: '2022-01-12T07:18:50+00:00' - vendor: Check Point - product: Harmony Endpoint & Harmony Mobile + product: Harmony Endpoint + cves: + cve-2021-4104: + investigated: false + affected_versions: [] + fixed_versions: [] + unaffected_versions: [] + cve-2021-44228: + investigated: true + affected_versions: [] + fixed_versions: [] + unaffected_versions: + - All + cve-2021-45046: + investigated: false + affected_versions: [] + fixed_versions: [] + unaffected_versions: [] + cve-2021-45105: + investigated: false + affected_versions: [] + fixed_versions: [] + unaffected_versions: [] + vendor_links: + - https://supportcontent.checkpoint.com/solutions?id=sk176865 + notes: '' + references: + - '' + last_updated: '2022-01-12T07:18:50+00:00' + - vendor: Check Point + product: Harmony Mobile cves: cve-2021-4104: investigated: false @@ -1626,10 +1656,11 @@ software: fixed_versions: [] unaffected_versions: [] cve-2021-44228: - investigated: false + investigated: true affected_versions: [] fixed_versions: [] - unaffected_versions: [] + unaffected_versions: + - 'All' cve-2021-45046: investigated: false affected_versions: [] @@ -1647,7 +1678,7 @@ software: - '' last_updated: '2022-01-12T07:18:50+00:00' - vendor: CheckMK - product: '' + product: All cves: cve-2021-4104: investigated: false @@ -1675,8 +1706,98 @@ software: references: - '' last_updated: '2022-01-12T07:18:50+00:00' + - vendor: Chef + product: Automate + cves: + cve-2021-4104: + investigated: false + affected_versions: [] + fixed_versions: [] + unaffected_versions: [] + cve-2021-44228: + investigated: true + affected_versions: [] + fixed_versions: [] + unaffected_versions: + - All + cve-2021-45046: + investigated: false + affected_versions: [] + fixed_versions: [] + unaffected_versions: [] + cve-2021-45105: + investigated: false + affected_versions: [] + fixed_versions: [] + unaffected_versions: [] + vendor_links: + - https://www.chef.io/blog/is-chef-vulnerable-to-cve-2021-44228-(log4j) + notes: '' + references: + - '' + last_updated: '2022-01-12T07:18:50+00:00' + - vendor: Chef + product: Backend + cves: + cve-2021-4104: + investigated: false + affected_versions: [] + fixed_versions: [] + unaffected_versions: [] + cve-2021-44228: + investigated: true + affected_versions: [] + fixed_versions: [] + unaffected_versions: + - All + cve-2021-45046: + investigated: false + affected_versions: [] + fixed_versions: [] + unaffected_versions: [] + cve-2021-45105: + investigated: false + affected_versions: [] + fixed_versions: [] + unaffected_versions: [] + vendor_links: + - https://www.chef.io/blog/is-chef-vulnerable-to-cve-2021-44228-(log4j) + notes: '' + references: + - '' + last_updated: '2022-01-12T07:18:50+00:00' + - vendor: Chef + product: Infra Server + cves: + cve-2021-4104: + investigated: false + affected_versions: [] + fixed_versions: [] + unaffected_versions: [] + cve-2021-44228: + investigated: true + affected_versions: [] + fixed_versions: [] + unaffected_versions: + - All + cve-2021-45046: + investigated: false + affected_versions: [] + fixed_versions: [] + unaffected_versions: [] + cve-2021-45105: + investigated: false + affected_versions: [] + fixed_versions: [] + unaffected_versions: [] + vendor_links: + - https://www.chef.io/blog/is-chef-vulnerable-to-cve-2021-44228-(log4j) + notes: '' + references: + - '' + last_updated: '2022-01-12T07:18:50+00:00' - vendor: Ciphermail - product: '' + product: All cves: cve-2021-4104: investigated: false