|
|
@ -6085,9 +6085,15 @@ software: |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
cve-2021-44228: |
|
|
|
cve-2021-44228: |
|
|
|
investigated: false |
|
|
|
investigated: true |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: |
|
|
|
|
|
|
|
- '3.3.x' |
|
|
|
|
|
|
|
- '3.4.x' |
|
|
|
|
|
|
|
- '3.5.x' |
|
|
|
|
|
|
|
- '3.6.0.x' |
|
|
|
|
|
|
|
- '3.6.1.x' |
|
|
|
|
|
|
|
- '3.6.2.0' |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
@ -6101,9 +6107,9 @@ software: |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
vendor_links: |
|
|
|
vendor_links: |
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability |
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability |
|
|
|
notes: Patch expected by 12/18/21 |
|
|
|
notes: See DSA-2021-273. |
|
|
|
references: |
|
|
|
references: |
|
|
|
- '' |
|
|
|
- '[DSA-2021-273](https://www.dell.com/support/kbdoc/en-us/000194612/dsa-2021-273-dell-emc-ecs-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)' |
|
|
|
last_updated: '2021-12-15T00:00:00' |
|
|
|
last_updated: '2021-12-15T00:00:00' |
|
|
|
- vendor: Dell |
|
|
|
- vendor: Dell |
|
|
|
product: Embedded NAS |
|
|
|
product: Embedded NAS |
|
|
@ -6118,7 +6124,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -6148,7 +6154,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -6174,10 +6180,11 @@ software: |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
cve-2021-44228: |
|
|
|
cve-2021-44228: |
|
|
|
investigated: false |
|
|
|
investigated: true |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -6190,9 +6197,9 @@ software: |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
vendor_links: |
|
|
|
vendor_links: |
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability |
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability |
|
|
|
notes: '[link](https://www.dell.com/support/kbdoc/en-us/000194490/dsa-2021-270-enterprise-hybrid-cloud-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)' |
|
|
|
notes: See DSA-2021-270. |
|
|
|
references: |
|
|
|
references: |
|
|
|
- '' |
|
|
|
- '[DSA-2021-270](https://www.dell.com/support/kbdoc/en-us/000194490/dsa-2021-270-enterprise-hybrid-cloud-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)' |
|
|
|
last_updated: '2021-12-15T00:00:00' |
|
|
|
last_updated: '2021-12-15T00:00:00' |
|
|
|
- vendor: Dell |
|
|
|
- vendor: Dell |
|
|
|
product: Equallogic PS |
|
|
|
product: Equallogic PS |
|
|
@ -6207,7 +6214,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -6237,7 +6244,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -6267,7 +6274,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -6297,7 +6304,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -6327,7 +6334,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -6357,7 +6364,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -6387,7 +6394,37 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
|
|
|
|
cve-2021-45046: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-45105: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
vendor_links: |
|
|
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability |
|
|
|
|
|
|
|
notes: '' |
|
|
|
|
|
|
|
references: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
last_updated: '2021-12-15T00:00:00' |
|
|
|
|
|
|
|
- vendor: Dell |
|
|
|
|
|
|
|
product: ISG Drive & Storage Media |
|
|
|
|
|
|
|
cves: |
|
|
|
|
|
|
|
cve-2021-4104: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-44228: |
|
|
|
|
|
|
|
investigated: true |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -6417,7 +6454,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -6447,7 +6484,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -6477,7 +6514,37 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
|
|
|
|
cve-2021-45046: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-45105: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
vendor_links: |
|
|
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability |
|
|
|
|
|
|
|
notes: '' |
|
|
|
|
|
|
|
references: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
last_updated: '2021-12-15T00:00:00' |
|
|
|
|
|
|
|
- vendor: Dell |
|
|
|
|
|
|
|
product: MDS |
|
|
|
|
|
|
|
cves: |
|
|
|
|
|
|
|
cve-2021-4104: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-44228: |
|
|
|
|
|
|
|
investigated: true |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -6507,7 +6574,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -6537,7 +6604,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -6567,7 +6634,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -6597,7 +6664,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -6627,7 +6694,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -6657,7 +6724,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -6675,7 +6742,7 @@ software: |
|
|
|
- '' |
|
|
|
- '' |
|
|
|
last_updated: '2021-12-15T00:00:00' |
|
|
|
last_updated: '2021-12-15T00:00:00' |
|
|
|
- vendor: Dell |
|
|
|
- vendor: Dell |
|
|
|
product: Networking OS 10 |
|
|
|
product: Networking OS 9 |
|
|
|
cves: |
|
|
|
cves: |
|
|
|
cve-2021-4104: |
|
|
|
cve-2021-4104: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
@ -6687,7 +6754,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -6705,7 +6772,7 @@ software: |
|
|
|
- '' |
|
|
|
- '' |
|
|
|
last_updated: '2021-12-15T00:00:00' |
|
|
|
last_updated: '2021-12-15T00:00:00' |
|
|
|
- vendor: Dell |
|
|
|
- vendor: Dell |
|
|
|
product: Networking OS9 |
|
|
|
product: Networking OS 10 |
|
|
|
cves: |
|
|
|
cves: |
|
|
|
cve-2021-4104: |
|
|
|
cve-2021-4104: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
@ -6717,7 +6784,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -6747,7 +6814,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -6777,7 +6844,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -6807,7 +6874,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -6837,7 +6904,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -6867,7 +6934,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -6897,7 +6964,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -6927,7 +6994,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -6957,7 +7024,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -6987,7 +7054,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -7017,7 +7084,37 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
|
|
|
|
cve-2021-45046: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-45105: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
vendor_links: |
|
|
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability |
|
|
|
|
|
|
|
notes: '' |
|
|
|
|
|
|
|
references: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
last_updated: '2021-12-15T00:00:00' |
|
|
|
|
|
|
|
- vendor: Dell |
|
|
|
|
|
|
|
product: OpenManage Power Center |
|
|
|
|
|
|
|
cves: |
|
|
|
|
|
|
|
cve-2021-4104: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-44228: |
|
|
|
|
|
|
|
investigated: true |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -7047,7 +7144,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -7077,7 +7174,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -7107,7 +7204,37 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
|
|
|
|
cve-2021-45046: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-45105: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
vendor_links: |
|
|
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability |
|
|
|
|
|
|
|
notes: '' |
|
|
|
|
|
|
|
references: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
last_updated: '2021-12-15T00:00:00' |
|
|
|
|
|
|
|
- vendor: Dell |
|
|
|
|
|
|
|
product: PowerEdge Accelerator Solutions |
|
|
|
|
|
|
|
cves: |
|
|
|
|
|
|
|
cve-2021-4104: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-44228: |
|
|
|
|
|
|
|
investigated: true |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -7137,7 +7264,37 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
|
|
|
|
cve-2021-45046: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-45105: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
vendor_links: |
|
|
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability |
|
|
|
|
|
|
|
notes: '' |
|
|
|
|
|
|
|
references: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
last_updated: '2021-12-15T00:00:00' |
|
|
|
|
|
|
|
- vendor: Dell |
|
|
|
|
|
|
|
product: PowerEdge Networking Solutions |
|
|
|
|
|
|
|
cves: |
|
|
|
|
|
|
|
cve-2021-4104: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-44228: |
|
|
|
|
|
|
|
investigated: true |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -7167,7 +7324,37 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
|
|
|
|
cve-2021-45046: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-45105: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
vendor_links: |
|
|
|
|
|
|
|
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability |
|
|
|
|
|
|
|
notes: '' |
|
|
|
|
|
|
|
references: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
last_updated: '2021-12-15T00:00:00' |
|
|
|
|
|
|
|
- vendor: Dell |
|
|
|
|
|
|
|
product: PowerEdge RAID Controller Solutions |
|
|
|
|
|
|
|
cves: |
|
|
|
|
|
|
|
cve-2021-4104: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-44228: |
|
|
|
|
|
|
|
investigated: true |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -7197,7 +7384,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -7227,7 +7414,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -7257,7 +7444,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -7287,7 +7474,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -7317,7 +7504,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -7347,7 +7534,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -7377,7 +7564,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -7407,7 +7594,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
@ -7437,7 +7624,7 @@ software: |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
fixed_versions: [] |
|
|
|
unaffected_versions: |
|
|
|
unaffected_versions: |
|
|
|
- N/A |
|
|
|
- '' |
|
|
|
cve-2021-45046: |
|
|
|
cve-2021-45046: |
|
|
|
investigated: false |
|
|
|
investigated: false |
|
|
|
affected_versions: [] |
|
|
|
affected_versions: [] |
|
|
|