mirror of
https://github.com/cisagov/log4j-affected-db.git
synced 2024-11-22 00:20:47 +00:00
Fix line length
This commit is contained in:
parent
605e964577
commit
43603ca4f8
1 changed files with 64 additions and 21 deletions
|
@ -146,7 +146,9 @@ software:
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://help.salesforce.com/s/articleView?id=000363736&type=1
|
||||
notes: 'Analytics Cloud was affected by CVE-2021-44228 and CVE-2021-45046. Salesforce-owned services and third-party vendors have been patched to address the issues currently identified in CVE-2021-44228 and CVE-2021-45046.'
|
||||
notes: Analytics Cloud was affected by CVE-2021-44228 and CVE-2021-45046.
|
||||
Salesforce-owned services and third-party vendors have been patched to
|
||||
address the issues currently identified in CVE-2021-44228 and CVE-2021-45046.
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
|
@ -175,7 +177,9 @@ software:
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://help.salesforce.com/s/articleView?id=000363736&type=1
|
||||
notes: 'B2C Commerce Cloud was affected by CVE-2021-44228 and CVE-2021-45046. Salesforce-owned services and third-party vendors have been patched to address the issues currently identified in CVE-2021-44228 and CVE-2021-45046.'
|
||||
notes: B2C Commerce Cloud was affected by CVE-2021-44228 and CVE-2021-45046.
|
||||
Salesforce-owned services and third-party vendors have been patched to address
|
||||
the issues currently identified in CVE-2021-44228 and CVE-2021-45046.
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
|
@ -204,7 +208,10 @@ software:
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://help.salesforce.com/s/articleView?id=000363736&type=1
|
||||
notes: 'ClickSoftware (As-a-Service) was affected by CVE-2021-44228 and CVE-2021-45046. Salesforce-owned services and third-party vendors have been patched to address the issues currently identified in CVE-2021-44228 and CVE-2021-45046.'
|
||||
notes: ClickSoftware (As-a-Service) was affected by CVE-2021-44228
|
||||
and CVE-2021-45046. Salesforce-owned services and third-party vendors
|
||||
have been patched to address the issues currently identified in
|
||||
CVE-2021-44228 and CVE-2021-45046.
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
|
@ -262,7 +269,9 @@ software:
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://help.salesforce.com/s/articleView?id=000363736&type=1
|
||||
notes: '"Experience Cloud was affected by CVE-2021-44228 and CVE-2021-45046. Salesforce-owned services and third-party vendors have been patched to address the issues currently identified in CVE-2021-44228 and CVE-2021-45046.'
|
||||
notes: Experience Cloud was affected by CVE-2021-44228 and CVE-2021-45046.
|
||||
Salesforce-owned services and third-party vendors have been patched to
|
||||
address the issues currently identified in CVE-2021-44228 and CVE-2021-45046.
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
|
@ -291,7 +300,9 @@ software:
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://help.salesforce.com/s/articleView?id=000363736&type=1
|
||||
notes: 'Data.com was affected by CVE-2021-44228 and CVE-2021-45046. Salesforce-owned services and third-party vendors have been patched to address the issues currently identified in CVE-2021-44228 and CVE-2021-45046.'
|
||||
notes: Data.com was affected by CVE-2021-44228 and CVE-2021-45046.
|
||||
Salesforce-owned services and third-party vendors have been patched
|
||||
to address the issues currently identified in CVE-2021-44228 and CVE-2021-45046.
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
|
@ -350,7 +361,9 @@ software:
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://help.salesforce.com/s/articleView?id=000363736&type=1
|
||||
notes: 'Datorama was affected by CVE-2021-44228 and CVE-2021-45046. Salesforce-owned services and third-party vendors have been patched to address the issues currently identified in CVE-2021-44228 and CVE-2021-45046.'
|
||||
notes: Datorama was affected by CVE-2021-44228 and CVE-2021-45046.
|
||||
Salesforce-owned services and third-party vendors have been patched
|
||||
to address the issues currently identified in CVE-2021-44228 and CVE-2021-45046.
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
|
@ -408,9 +421,13 @@ software:
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://help.salesforce.com/s/articleView?id=000363736&type=1
|
||||
notes: 'Force.com was affected by CVE-2021-44228 and CVE-2021-45046. Salesforce-owned services and third-party vendors have been patched to address the issues currently identified in CVE-2021-44228 and CVE-2021-45046.
|
||||
|
||||
The Data Loader tool has been patched to address the issues currently identified in CVE-2021-44228 and CVE-2021-45046. Make sure that you are using Data Loader version 53.0.2 or later. Follow the steps described here to download the latest version of Data Loader.'
|
||||
notes: Force.com was affected by CVE-2021-44228 and CVE-2021-45046.
|
||||
Salesforce-owned services and third-party vendors have been patched
|
||||
to address the issues currently identified in CVE-2021-44228 and CVE-2021-45046.
|
||||
The Data Loader tool has been patched to address the issues currently identified
|
||||
in CVE-2021-44228 and CVE-2021-45046. Make sure that you are using Data Loader
|
||||
version 53.0.2 or later. Follow the steps described here to download the latest
|
||||
version of Data Loader.
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
|
@ -439,7 +456,8 @@ The Data Loader tool has been patched to address the issues currently identified
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://help.salesforce.com/s/articleView?id=000363736&type=1
|
||||
notes: 'Heroku is reported to not be affected by the issues currently identified in CVE-2021-44228 or CVE-2021-45046.'
|
||||
notes: Heroku is reported to not be affected by the issues currently
|
||||
identified in CVE-2021-44228 or CVE-2021-45046.
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
|
@ -468,7 +486,10 @@ The Data Loader tool has been patched to address the issues currently identified
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://help.salesforce.com/s/articleView?id=000363736&type=1
|
||||
notes: 'Salesforce-owned services within Marketing Cloud are not affected by the issues currently identified in CVE-2021-44228 or CVE-2021-45046. Third-party vendors have been patched to address the security issues currently identified in CVE-2021-44228 or CVE-2021-45046.'
|
||||
notes: Salesforce-owned services within Marketing Cloud are not affected
|
||||
by the issues currently identified in CVE-2021-44228 or CVE-2021-45046.
|
||||
Third-party vendors have been patched to address the security issues currently
|
||||
identified in CVE-2021-44228 or CVE-2021-45046.
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
|
@ -497,7 +518,10 @@ The Data Loader tool has been patched to address the issues currently identified
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://help.salesforce.com/s/articleView?id=000363736&type=1
|
||||
notes: 'MuleSoft (Cloud) was affected by CVE-2021-44228 and CVE-2021-45046. Mulesoft services, including dataloader.io, have been updated to mitigate the issues currently identified in CVE-2021-44228 and CVE-2021-45046. Please see additional details here.'
|
||||
notes: MuleSoft (Cloud) was affected by CVE-2021-44228 and CVE-2021-45046.
|
||||
Mulesoft services, including dataloader.io, have been updated to mitigate
|
||||
the issues currently identified in CVE-2021-44228 and CVE-2021-45046.
|
||||
Please see additional details here.
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
|
@ -526,7 +550,11 @@ The Data Loader tool has been patched to address the issues currently identified
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://help.salesforce.com/s/articleView?id=000363736&type=1
|
||||
notes: 'MuleSoft (On-Premise) was affected by CVE-2021-44228 and CVE-2021-45046. Salesforce-owned services and third-party vendors, including Private Cloud Edition (PCE) and Anypoint Studio, have a mitigation in place to address the issues currently identified in CVE-2021-44228 and CVE-2021-45046. Please see additional details here.'
|
||||
notes: 'MuleSoft (On-Premise) was affected by CVE-2021-44228 and CVE-2021-45046.
|
||||
Salesforce-owned services and third-party vendors, including Private Cloud
|
||||
Edition (PCE) and Anypoint Studio, have a mitigation in place to address the
|
||||
issues currently identified in CVE-2021-44228 and CVE-2021-45046.
|
||||
Please see additional details here.
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
|
@ -555,7 +583,9 @@ The Data Loader tool has been patched to address the issues currently identified
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://help.salesforce.com/s/articleView?id=000363736&type=1
|
||||
notes: 'Pardot was affected by CVE-2021-44228 and CVE-2021-45046. Salesforce-owned services and third-party vendors have been patched to address the issues currently identified in CVE-2021-44228 and CVE-2021-45046.'
|
||||
notes: Pardot was affected by CVE-2021-44228 and CVE-2021-45046.
|
||||
Salesforce-owned services and third-party vendors have been patched
|
||||
to address the issues currently identified in CVE-2021-44228 and CVE-2021-45046.
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
|
@ -584,7 +614,9 @@ The Data Loader tool has been patched to address the issues currently identified
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://help.salesforce.com/s/articleView?id=000363736&type=1
|
||||
notes: 'Sales Cloud was affected by CVE-2021-44228 and CVE-2021-45046. Salesforce-owned services and third-party vendors have been patched to address the issues currently identified in CVE-2021-44228 and CVE-2021-45046.'
|
||||
notes: Sales Cloud was affected by CVE-2021-44228 and CVE-2021-45046.
|
||||
Salesforce-owned services and third-party vendors have been patched to
|
||||
address the issues currently identified in CVE-2021-44228 and CVE-2021-45046.
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
|
@ -613,7 +645,9 @@ The Data Loader tool has been patched to address the issues currently identified
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://help.salesforce.com/s/articleView?id=000363736&type=1
|
||||
notes: 'Service Cloud was affected by CVE-2021-44228 and CVE-2021-45046. Salesforce-owned services and third-party vendors have been patched to address the issues currently identified in CVE-2021-44228 and CVE-2021-45046.'
|
||||
notes: Service Cloud was affected by CVE-2021-44228 and CVE-2021-45046.
|
||||
Salesforce-owned services and third-party vendors have been patched to
|
||||
address the issues currently identified in CVE-2021-44228 and CVE-2021-45046.
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
|
@ -642,7 +676,10 @@ The Data Loader tool has been patched to address the issues currently identified
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://help.salesforce.com/s/articleView?id=000363736&type=1
|
||||
notes: 'Slack was affected by CVE-2021-44228 and CVE-2021-45046. Salesforce-owned services and third-party vendors have been patched to address the issues currently identified in both CVE-2021-44228 and CVE-2021-45046. Additional details are available here.'
|
||||
notes: Slack was affected by CVE-2021-44228 and CVE-2021-45046.
|
||||
Salesforce-owned services and third-party vendors have been patched
|
||||
to address the issues currently identified in both CVE-2021-44228 and CVE-2021-45046.
|
||||
Additional details are available here.
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
|
@ -671,7 +708,9 @@ The Data Loader tool has been patched to address the issues currently identified
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://help.salesforce.com/s/articleView?id=000363736&type=1
|
||||
notes: 'Social Studio was affected by CVE-2021-44228 and CVE-2021-45046. Salesforce-owned services and third-party vendors have been patched to address the issues currently identified in CVE-2021-44228 and CVE-2021-45046.'
|
||||
notes: Social Studio was affected by CVE-2021-44228 and CVE-2021-45046.
|
||||
Salesforce-owned services and third-party vendors have been patched to
|
||||
address the issues currently identified in CVE-2021-44228 and CVE-2021-45046.
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
|
@ -701,7 +740,9 @@ The Data Loader tool has been patched to address the issues currently identified
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://kb.tableau.com/articles/issue/Apache-Log4j2-vulnerability-Log4shell
|
||||
notes: Tableau (On-Premise) was affected by CVE-2021-44228 and CVE-2021-45046. Patches to address the issues currently identified in both CVE-2021-44228 and CVE-2021-45046 are available for download. Additional details are available here.
|
||||
notes: Tableau (On-Premise) was affected by CVE-2021-44228 and CVE-2021-45046.
|
||||
Patches to address the issues currently identified in both CVE-2021-44228 and
|
||||
CVE-2021-45046 are available for download. Additional details are available here.
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-16T00:00:00'
|
||||
|
@ -730,7 +771,9 @@ The Data Loader tool has been patched to address the issues currently identified
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://help.salesforce.com/s/articleView?id=000363736&type=1
|
||||
notes: 'Tableau Online was affected by CVE-2021-44228 and CVE-2021-45046. Services have been patched to mitigate the issues currently identified in both CVE-2021-44228 and CVE-2021-45046.'
|
||||
notes: Tableau Online was affected by CVE-2021-44228 and CVE-2021-45046.
|
||||
Services have been patched to mitigate the issues currently identified in
|
||||
both CVE-2021-44228 and CVE-2021-45046.
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
|
|
Loading…
Reference in a new issue