mirror of
https://github.com/cisagov/log4j-affected-db.git
synced 2024-10-18 00:22:13 +00:00
Normalize YAML files and update the software lists
This commit is contained in:
parent
b80d47be13
commit
2fe01a0abd
3 changed files with 10 additions and 0 deletions
|
@ -30493,6 +30493,7 @@ software:
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://www.caseware.com/us/case-knowledge/caseware-ensuring-customers-protected-log4j-vulnerabilities
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2022-01-12T07:18:50+00:00'
|
||||
|
@ -30522,6 +30523,7 @@ software:
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://www.caseware.com/us/case-knowledge/caseware-ensuring-customers-protected-log4j-vulnerabilities
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2022-01-12T07:18:50+00:00'
|
||||
|
@ -30551,6 +30553,7 @@ software:
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://www.caseware.com/us/case-knowledge/caseware-ensuring-customers-protected-log4j-vulnerabilities
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2022-01-12T07:18:50+00:00'
|
||||
|
@ -30580,6 +30583,7 @@ software:
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://www.catalogicsoftware.com/blog/category/dpx/
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2022-01-12T07:18:50+00:00'
|
||||
|
@ -127629,6 +127633,7 @@ software:
|
|||
customer only and has not been reviewed by CISA.
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2022-02-03T16:14:09+00:00'
|
||||
- vendor: Wasp Barcode technologies
|
||||
product: All
|
||||
cves:
|
||||
|
|
|
@ -68,6 +68,10 @@ NOTE: This file is automatically generated. To submit updates, please refer to
|
|||
| Carestream | All | | | Not Affected | [link](https://www.carestream.com/en/us/services-and-support/cybersecurity-and-privacy) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
|
||||
| Carrier | | | | Not Affected | [link](https://www.corporate.carrier.com/product-security/advisories-resources/) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
|
||||
| CAS genesisWorld | All | | | Unknown | [link](https://helpdesk.cas.de/CASHelpdesk/FAQDetails.aspx?gguid=0x79F9E881EE3C46C1A71BE9EB3E480446) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
|
||||
| CaseWare | Cloud | | All | Fixed | [link](https://www.caseware.com/us/case-knowledge/caseware-ensuring-customers-protected-log4j-vulnerabilities) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
|
||||
| CaseWare | IDEA | | | Not Affected | [link](https://www.caseware.com/us/case-knowledge/caseware-ensuring-customers-protected-log4j-vulnerabilities) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
|
||||
| CaseWare | WorkingPapers | | | Not Affected | [link](https://www.caseware.com/us/case-knowledge/caseware-ensuring-customers-protected-log4j-vulnerabilities) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
|
||||
| Catalogic | All | | | Not Affected | [link](https://www.catalogicsoftware.com/blog/category/dpx/) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
|
||||
| Cato Networks | All | | | Unknown | [link](https://www.catonetworks.com/blog/cato-networks-rapid-response-to-the-apache-log4j-remote-code-execution-vulnerability/) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
|
||||
| Cendio | ThinLinc | | | Not Affected | [link](https://community.thinlinc.com/t/log4shell-vulnerability/286) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
|
||||
| Cepheid | C360 | | | Not Affected | [link](https://www.cepheid.com/en_US/legal/product-security-updates) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-20 |
|
||||
|
|
|
@ -35,6 +35,7 @@ NOTE: This file is automatically generated. To submit updates, please refer to
|
|||
| ------ | ------- | ----------------- | ---------------- | ------ | ------------ | ----- | ---------- | -------- | ------------ |
|
||||
| WAGO | WAGO Smart Script | | 4.2.x < 4.8.1.3 | Fixed | [link](https://www.wago.com/de/automatisierungstechnik/psirt#log4j) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2021-12-17 |
|
||||
| Wallarm | All | | | Unknown | [link](https://lab.wallarm.com/cve-2021-44228-mitigation-update/) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
|
||||
| Wallix | Access Manager | | | Fixed | [link](https://www.wallix.com/fr/support/alerts/) | Customer Portal for patch found in advisory. This patch is available to customer only and has not been reviewed by CISA. | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-02-03 |
|
||||
| Wasp Barcode technologies | All | | | Unknown | [link](https://support.waspbarcode.com/kb/articles/assetcloud-inventorycloud-are-they-affected-by-the-java-exploit-log4j-no) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
|
||||
| Watcher | All | | | Not Affected | [link](https://twitter.com/felix_hrn/status/1470387338001977344) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
|
||||
| WatchGuard | AuthPoint | | Cloud | Fixed | [link](https://techsearch.watchguard.com/KB?type=Security%20Issues&SFDCID=kA16S000000SNnuSAG&lang=en_US) | | | [cisagov](https://github.com/cisagov/log4j-affected-db) | 2022-01-12 |
|
||||
|
|
Loading…
Reference in a new issue