|
|
|
@ -423,7 +423,7 @@ software: |
|
|
|
|
affected_versions: [] |
|
|
|
|
fixed_versions: [] |
|
|
|
|
unaffected_versions: |
|
|
|
|
- All |
|
|
|
|
- 'All' |
|
|
|
|
cve-2021-45046: |
|
|
|
|
investigated: false |
|
|
|
|
affected_versions: [] |
|
|
|
@ -453,7 +453,7 @@ software: |
|
|
|
|
affected_versions: [] |
|
|
|
|
fixed_versions: [] |
|
|
|
|
unaffected_versions: |
|
|
|
|
- All |
|
|
|
|
- 'All' |
|
|
|
|
cve-2021-45046: |
|
|
|
|
investigated: false |
|
|
|
|
affected_versions: [] |
|
|
|
@ -483,7 +483,7 @@ software: |
|
|
|
|
affected_versions: [] |
|
|
|
|
fixed_versions: [] |
|
|
|
|
unaffected_versions: |
|
|
|
|
- All |
|
|
|
|
- 'All' |
|
|
|
|
cve-2021-45046: |
|
|
|
|
investigated: false |
|
|
|
|
affected_versions: [] |
|
|
|
@ -512,7 +512,7 @@ software: |
|
|
|
|
investigated: true |
|
|
|
|
affected_versions: [] |
|
|
|
|
fixed_versions: |
|
|
|
|
- < 10.0.7 |
|
|
|
|
- '< 10.0.7' |
|
|
|
|
unaffected_versions: [] |
|
|
|
|
cve-2021-45046: |
|
|
|
|
investigated: false |
|
|
|
@ -543,7 +543,7 @@ software: |
|
|
|
|
affected_versions: [] |
|
|
|
|
fixed_versions: [] |
|
|
|
|
unaffected_versions: |
|
|
|
|
- All |
|
|
|
|
- 'All' |
|
|
|
|
cve-2021-45046: |
|
|
|
|
investigated: false |
|
|
|
|
affected_versions: [] |
|
|
|
@ -573,7 +573,7 @@ software: |
|
|
|
|
affected_versions: [] |
|
|
|
|
fixed_versions: [] |
|
|
|
|
unaffected_versions: |
|
|
|
|
- All |
|
|
|
|
- 'All' |
|
|
|
|
cve-2021-45046: |
|
|
|
|
investigated: false |
|
|
|
|
affected_versions: [] |
|
|
|
@ -603,7 +603,7 @@ software: |
|
|
|
|
affected_versions: [] |
|
|
|
|
fixed_versions: [] |
|
|
|
|
unaffected_versions: |
|
|
|
|
- All |
|
|
|
|
- 'All' |
|
|
|
|
cve-2021-45046: |
|
|
|
|
investigated: false |
|
|
|
|
affected_versions: [] |
|
|
|
@ -661,9 +661,9 @@ software: |
|
|
|
|
investigated: true |
|
|
|
|
affected_versions: [] |
|
|
|
|
fixed_versions: |
|
|
|
|
- 1.21.7 - 1.22.9 |
|
|
|
|
- 2.0.3 - 2.1.5 |
|
|
|
|
- 2.2.0 - 3.0.2 |
|
|
|
|
- '1.21.7-1.22.9' |
|
|
|
|
- '2.0.3-2.1.5' |
|
|
|
|
- '2.2.0-3.0.2' |
|
|
|
|
unaffected_versions: [] |
|
|
|
|
cve-2021-45046: |
|
|
|
|
investigated: false |
|
|
|
@ -751,7 +751,7 @@ software: |
|
|
|
|
investigated: true |
|
|
|
|
affected_versions: [] |
|
|
|
|
fixed_versions: |
|
|
|
|
- Elasticsearch 5.0.0+ |
|
|
|
|
- 'Elasticsearch 5.0.0+' |
|
|
|
|
unaffected_versions: [] |
|
|
|
|
cve-2021-45046: |
|
|
|
|
investigated: false |
|
|
|
@ -813,7 +813,7 @@ software: |
|
|
|
|
investigated: true |
|
|
|
|
affected_versions: [] |
|
|
|
|
fixed_versions: |
|
|
|
|
- v6 |
|
|
|
|
- 'v6' |
|
|
|
|
unaffected_versions: [] |
|
|
|
|
cve-2021-45046: |
|
|
|
|
investigated: false |
|
|
|
@ -904,10 +904,10 @@ software: |
|
|
|
|
investigated: true |
|
|
|
|
affected_versions: [] |
|
|
|
|
fixed_versions: |
|
|
|
|
- R15A |
|
|
|
|
- R14B |
|
|
|
|
- R14A |
|
|
|
|
- R11B SP1 |
|
|
|
|
- 'R15A' |
|
|
|
|
- 'R14B' |
|
|
|
|
- 'R14A' |
|
|
|
|
- 'R11B SP1' |
|
|
|
|
unaffected_versions: [] |
|
|
|
|
cve-2021-45046: |
|
|
|
|
investigated: false |
|
|
|
@ -940,7 +940,7 @@ software: |
|
|
|
|
investigated: true |
|
|
|
|
affected_versions: [] |
|
|
|
|
fixed_versions: |
|
|
|
|
- R11A and R10 series |
|
|
|
|
- 'R11A and R10 series' |
|
|
|
|
unaffected_versions: [] |
|
|
|
|
cve-2021-45046: |
|
|
|
|
investigated: false |
|
|
|
@ -1030,9 +1030,9 @@ software: |
|
|
|
|
investigated: true |
|
|
|
|
affected_versions: [] |
|
|
|
|
fixed_versions: |
|
|
|
|
- v1.7.x |
|
|
|
|
- v1.8.x |
|
|
|
|
- v1.9.x |
|
|
|
|
- 'v1.7.x' |
|
|
|
|
- 'v1.8.x' |
|
|
|
|
- 'v1.9.x' |
|
|
|
|
unaffected_versions: [] |
|
|
|
|
cve-2021-45046: |
|
|
|
|
investigated: false |
|
|
|
@ -1091,9 +1091,9 @@ software: |
|
|
|
|
investigated: true |
|
|
|
|
affected_versions: [] |
|
|
|
|
fixed_versions: |
|
|
|
|
- 9.0 - 9.10.44 |
|
|
|
|
- 9.1.1 |
|
|
|
|
- 10.3.4 |
|
|
|
|
- '9.0-9.10.44' |
|
|
|
|
- '9.1.1' |
|
|
|
|
- '10.3.4' |
|
|
|
|
unaffected_versions: [] |
|
|
|
|
cve-2021-45046: |
|
|
|
|
investigated: false |
|
|
|
@ -1123,7 +1123,7 @@ software: |
|
|
|
|
investigated: true |
|
|
|
|
affected_versions: [] |
|
|
|
|
fixed_versions: |
|
|
|
|
- 9.1.0.32 - 9.1.0.44 |
|
|
|
|
- '9.1.0.32-9.1.0.44' |
|
|
|
|
unaffected_versions: [] |
|
|
|
|
cve-2021-45046: |
|
|
|
|
investigated: false |
|
|
|
@ -1155,7 +1155,7 @@ software: |
|
|
|
|
fixed_versions: |
|
|
|
|
- '12.1' |
|
|
|
|
- '12.2' |
|
|
|
|
- 19c |
|
|
|
|
- '19c' |
|
|
|
|
unaffected_versions: [] |
|
|
|
|
cve-2021-45046: |
|
|
|
|
investigated: false |
|
|
|
@ -1187,8 +1187,8 @@ software: |
|
|
|
|
investigated: true |
|
|
|
|
affected_versions: [] |
|
|
|
|
fixed_versions: |
|
|
|
|
- 3.7.15 |
|
|
|
|
- 3.7.16 |
|
|
|
|
- '3.7.15' |
|
|
|
|
- '3.7.16' |
|
|
|
|
unaffected_versions: [] |
|
|
|
|
cve-2021-45046: |
|
|
|
|
investigated: false |
|
|
|
@ -1218,7 +1218,7 @@ software: |
|
|
|
|
investigated: true |
|
|
|
|
affected_versions: [] |
|
|
|
|
fixed_versions: |
|
|
|
|
- 2.0.0 |
|
|
|
|
- '2.0.0' |
|
|
|
|
unaffected_versions: [] |
|
|
|
|
cve-2021-45046: |
|
|
|
|
investigated: false |
|
|
|
@ -1249,10 +1249,10 @@ software: |
|
|
|
|
investigated: true |
|
|
|
|
affected_versions: [] |
|
|
|
|
fixed_versions: |
|
|
|
|
- R15A |
|
|
|
|
- R14B |
|
|
|
|
- R14A |
|
|
|
|
- R11B SP1 |
|
|
|
|
- 'R15A' |
|
|
|
|
- 'R14B' |
|
|
|
|
- 'R14A' |
|
|
|
|
- 'R11B SP1' |
|
|
|
|
unaffected_versions: [] |
|
|
|
|
cve-2021-45046: |
|
|
|
|
investigated: false |
|
|
|
@ -1285,7 +1285,7 @@ software: |
|
|
|
|
investigated: true |
|
|
|
|
affected_versions: [] |
|
|
|
|
fixed_versions: |
|
|
|
|
- R11A and R10 series |
|
|
|
|
- 'R11A and R10 series' |
|
|
|
|
unaffected_versions: [] |
|
|
|
|
cve-2021-45046: |
|
|
|
|
investigated: false |
|
|
|
@ -1519,7 +1519,7 @@ software: |
|
|
|
|
investigated: true |
|
|
|
|
affected_versions: [] |
|
|
|
|
fixed_versions: |
|
|
|
|
- < v113 |
|
|
|
|
- '< v113' |
|
|
|
|
unaffected_versions: [] |
|
|
|
|
cve-2021-45046: |
|
|
|
|
investigated: false |
|
|
|
@ -1549,7 +1549,7 @@ software: |
|
|
|
|
investigated: true |
|
|
|
|
affected_versions: [] |
|
|
|
|
fixed_versions: |
|
|
|
|
- < 1.0.6 |
|
|
|
|
- '< 1.0.6' |
|
|
|
|
unaffected_versions: [] |
|
|
|
|
cve-2021-45046: |
|
|
|
|
investigated: false |
|
|
|
@ -1579,7 +1579,7 @@ software: |
|
|
|
|
investigated: true |
|
|
|
|
affected_versions: [] |
|
|
|
|
fixed_versions: |
|
|
|
|
- < 21.10.3 |
|
|
|
|
- '< 21.10.3' |
|
|
|
|
unaffected_versions: [] |
|
|
|
|
cve-2021-45046: |
|
|
|
|
investigated: false |
|
|
|
@ -1609,8 +1609,8 @@ software: |
|
|
|
|
investigated: true |
|
|
|
|
affected_versions: [] |
|
|
|
|
fixed_versions: |
|
|
|
|
- < 21.03.6 |
|
|
|
|
- < 20.07.4 |
|
|
|
|
- '< 21.03.6' |
|
|
|
|
- '< 20.07.4' |
|
|
|
|
unaffected_versions: [] |
|
|
|
|
cve-2021-45046: |
|
|
|
|
investigated: false |
|
|
|
@ -5400,6 +5400,36 @@ software: |
|
|
|
|
references: |
|
|
|
|
- '' |
|
|
|
|
last_updated: '2021-12-12T00:00:00' |
|
|
|
|
- vendor: HPE/Micro Focus |
|
|
|
|
product: Data Protector |
|
|
|
|
cves: |
|
|
|
|
cve-2021-4104: |
|
|
|
|
investigated: false |
|
|
|
|
affected_versions: [] |
|
|
|
|
fixed_versions: [] |
|
|
|
|
unaffected_versions: [] |
|
|
|
|
cve-2021-44228: |
|
|
|
|
investigated: true |
|
|
|
|
affected_versions: [] |
|
|
|
|
fixed_versions: |
|
|
|
|
- '9.09' |
|
|
|
|
unaffected_versions: [] |
|
|
|
|
cve-2021-45046: |
|
|
|
|
investigated: false |
|
|
|
|
affected_versions: [] |
|
|
|
|
fixed_versions: [] |
|
|
|
|
unaffected_versions: [] |
|
|
|
|
cve-2021-45105: |
|
|
|
|
investigated: false |
|
|
|
|
affected_versions: [] |
|
|
|
|
fixed_versions: [] |
|
|
|
|
unaffected_versions: [] |
|
|
|
|
vendor_links: |
|
|
|
|
- https://portal.microfocus.com/s/article/KM000003243 |
|
|
|
|
notes: '' |
|
|
|
|
references: |
|
|
|
|
- '[https://portal.microfocus.com/s/article/KM000003050](https://portal.microfocus.com/s/article/KM000003050)' |
|
|
|
|
last_updated: '2021-12-17T00:00:00' |
|
|
|
|
- vendor: HOLOGIC |
|
|
|
|
product: Advanced Workflow Manager (AWM) |
|
|
|
|
cves: |
|
|
|
|