mirror of
https://github.com/cisagov/log4j-affected-db.git
synced 2024-11-22 08:30:48 +00:00
commit
332c479e66
1 changed files with 251 additions and 10 deletions
|
@ -210,29 +210,270 @@ software:
|
||||||
references:
|
references:
|
||||||
- ''
|
- ''
|
||||||
last_updated: '2021-12-22T00:00:00'
|
last_updated: '2021-12-22T00:00:00'
|
||||||
- vendor: WindRiver
|
- vendor: Wind River
|
||||||
product: ''
|
product: WRL-6
|
||||||
cves:
|
cves:
|
||||||
cve-2021-4104:
|
cve-2021-4104:
|
||||||
investigated: false
|
investigated: true
|
||||||
affected_versions: []
|
affected_versions: []
|
||||||
fixed_versions: []
|
fixed_versions: []
|
||||||
unaffected_versions: []
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
cve-2021-44228:
|
cve-2021-44228:
|
||||||
investigated: false
|
investigated: true
|
||||||
affected_versions: []
|
affected_versions: []
|
||||||
fixed_versions: []
|
fixed_versions: []
|
||||||
unaffected_versions: []
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
cve-2021-45046:
|
cve-2021-45046:
|
||||||
investigated: false
|
investigated: true
|
||||||
affected_versions: []
|
affected_versions: []
|
||||||
fixed_versions: []
|
fixed_versions: []
|
||||||
unaffected_versions: []
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
cve-2021-45105:
|
cve-2021-45105:
|
||||||
investigated: false
|
investigated: true
|
||||||
affected_versions: []
|
affected_versions: []
|
||||||
fixed_versions: []
|
fixed_versions: []
|
||||||
unaffected_versions: []
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
|
vendor_links:
|
||||||
|
- https://support2.windriver.com/index.php?page=security-notices&on=view&id=7191
|
||||||
|
notes: The Wind River Linux Product Versions 8.0 and prior contains the log4j1.2 and JMSAppender
|
||||||
|
components, however, JMSAppender is deactivated in the release package and not affected by
|
||||||
|
CVE-2021-4104 customers are advised to NOT manually activate the JMSAppender component.
|
||||||
|
references:
|
||||||
|
- ''
|
||||||
|
last_updated: '2022-01-21T00:00:00'
|
||||||
|
- vendor: Wind River
|
||||||
|
product: WRL-7
|
||||||
|
cves:
|
||||||
|
cve-2021-4104:
|
||||||
|
investigated: true
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
|
cve-2021-44228:
|
||||||
|
investigated: true
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
|
cve-2021-45046:
|
||||||
|
investigated: true
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
|
cve-2021-45105:
|
||||||
|
investigated: true
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
|
vendor_links:
|
||||||
|
- https://support2.windriver.com/index.php?page=security-notices&on=view&id=7191
|
||||||
|
notes: The Wind River Linux Product Versions 8.0 and prior contains the log4j1.2 and JMSAppender
|
||||||
|
components, however, JMSAppender is deactivated in the release package and not affected by
|
||||||
|
CVE-2021-4104 customers are advised to NOT manually activate the JMSAppender component.
|
||||||
|
references:
|
||||||
|
- ''
|
||||||
|
last_updated: '2022-01-21T00:00:00'
|
||||||
|
- vendor: Wind River
|
||||||
|
product: WRL-8
|
||||||
|
cves:
|
||||||
|
cve-2021-4104:
|
||||||
|
investigated: true
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
|
cve-2021-44228:
|
||||||
|
investigated: true
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
|
cve-2021-45046:
|
||||||
|
investigated: true
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
|
cve-2021-45105:
|
||||||
|
investigated: true
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
|
vendor_links:
|
||||||
|
- https://support2.windriver.com/index.php?page=security-notices&on=view&id=7191
|
||||||
|
notes: The Wind River Linux Product Versions 8.0 and prior contains the log4j1.2 and JMSAppender
|
||||||
|
components, however, JMSAppender is deactivated in the release package and not affected by
|
||||||
|
CVE-2021-4104 customers are advised to NOT manually activate the JMSAppender component.
|
||||||
|
references:
|
||||||
|
- ''
|
||||||
|
last_updated: '2022-01-21T00:00:00'
|
||||||
|
- vendor: Wind River
|
||||||
|
product: WRL-9
|
||||||
|
cves:
|
||||||
|
cve-2021-4104:
|
||||||
|
investigated: true
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
|
cve-2021-44228:
|
||||||
|
investigated: true
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
|
cve-2021-45046:
|
||||||
|
investigated: true
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
|
cve-2021-45105:
|
||||||
|
investigated: true
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
|
vendor_links:
|
||||||
|
- https://support2.windriver.com/index.php?page=security-notices&on=view&id=7191
|
||||||
|
notes: ''
|
||||||
|
references:
|
||||||
|
- ''
|
||||||
|
last_updated: '2022-01-21T00:00:00'
|
||||||
|
- vendor: Wind River
|
||||||
|
product: LTS17
|
||||||
|
cves:
|
||||||
|
cve-2021-4104:
|
||||||
|
investigated: true
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
|
cve-2021-44228:
|
||||||
|
investigated: true
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
|
cve-2021-45046:
|
||||||
|
investigated: true
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
|
cve-2021-45105:
|
||||||
|
investigated: true
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
|
vendor_links:
|
||||||
|
- https://support2.windriver.com/index.php?page=security-notices&on=view&id=7191
|
||||||
|
notes: ''
|
||||||
|
references:
|
||||||
|
- ''
|
||||||
|
last_updated: '2022-01-21T00:00:00'
|
||||||
|
- vendor: Wind River
|
||||||
|
product: LTS18
|
||||||
|
cves:
|
||||||
|
cve-2021-4104:
|
||||||
|
investigated: true
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
|
cve-2021-44228:
|
||||||
|
investigated: true
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
|
cve-2021-45046:
|
||||||
|
investigated: true
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
|
cve-2021-45105:
|
||||||
|
investigated: true
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
|
vendor_links:
|
||||||
|
- https://support2.windriver.com/index.php?page=security-notices&on=view&id=7191
|
||||||
|
notes: ''
|
||||||
|
references:
|
||||||
|
- ''
|
||||||
|
last_updated: '2022-01-21T00:00:00'
|
||||||
|
- vendor: Wind River
|
||||||
|
product: LTS19
|
||||||
|
cves:
|
||||||
|
cve-2021-4104:
|
||||||
|
investigated: true
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
|
cve-2021-44228:
|
||||||
|
investigated: true
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
|
cve-2021-45046:
|
||||||
|
investigated: true
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
|
cve-2021-45105:
|
||||||
|
investigated: true
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
|
vendor_links:
|
||||||
|
- https://support2.windriver.com/index.php?page=security-notices&on=view&id=7191
|
||||||
|
notes: ''
|
||||||
|
references:
|
||||||
|
- ''
|
||||||
|
last_updated: '2022-01-21T00:00:00'
|
||||||
|
- vendor: Wind River
|
||||||
|
product: LTS21
|
||||||
|
cves:
|
||||||
|
cve-2021-4104:
|
||||||
|
investigated: true
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
|
cve-2021-44228:
|
||||||
|
investigated: true
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
|
cve-2021-45046:
|
||||||
|
investigated: true
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
|
cve-2021-45105:
|
||||||
|
investigated: true
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions:
|
||||||
|
- 'All'
|
||||||
vendor_links:
|
vendor_links:
|
||||||
- https://support2.windriver.com/index.php?page=security-notices&on=view&id=7191
|
- https://support2.windriver.com/index.php?page=security-notices&on=view&id=7191
|
||||||
notes: ''
|
notes: ''
|
||||||
|
|
Loading…
Reference in a new issue