1
0
Fork 0
mirror of https://github.com/cisagov/log4j-affected-db.git synced 2024-11-25 18:00:48 +00:00

Merge pull request #451 from cisagov/revert-450-micro-focus

Revert "Add Micro Focus products, Issue #421 & #422"
This commit is contained in:
justmurphy 2022-01-19 12:59:33 -05:00 committed by GitHub
commit 9c94233f74
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
2 changed files with 96 additions and 135 deletions

View file

@ -423,7 +423,7 @@ software:
affected_versions: [] affected_versions: []
fixed_versions: [] fixed_versions: []
unaffected_versions: unaffected_versions:
- 'All' - All
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
affected_versions: [] affected_versions: []
@ -453,7 +453,7 @@ software:
affected_versions: [] affected_versions: []
fixed_versions: [] fixed_versions: []
unaffected_versions: unaffected_versions:
- 'All' - All
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
affected_versions: [] affected_versions: []
@ -483,7 +483,7 @@ software:
affected_versions: [] affected_versions: []
fixed_versions: [] fixed_versions: []
unaffected_versions: unaffected_versions:
- 'All' - All
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
affected_versions: [] affected_versions: []
@ -512,7 +512,7 @@ software:
investigated: true investigated: true
affected_versions: [] affected_versions: []
fixed_versions: fixed_versions:
- '< 10.0.7' - < 10.0.7
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
@ -543,7 +543,7 @@ software:
affected_versions: [] affected_versions: []
fixed_versions: [] fixed_versions: []
unaffected_versions: unaffected_versions:
- 'All' - All
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
affected_versions: [] affected_versions: []
@ -573,7 +573,7 @@ software:
affected_versions: [] affected_versions: []
fixed_versions: [] fixed_versions: []
unaffected_versions: unaffected_versions:
- 'All' - All
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
affected_versions: [] affected_versions: []
@ -603,7 +603,7 @@ software:
affected_versions: [] affected_versions: []
fixed_versions: [] fixed_versions: []
unaffected_versions: unaffected_versions:
- 'All' - All
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
affected_versions: [] affected_versions: []
@ -661,9 +661,9 @@ software:
investigated: true investigated: true
affected_versions: [] affected_versions: []
fixed_versions: fixed_versions:
- '1.21.7-1.22.9' - 1.21.7 - 1.22.9
- '2.0.3-2.1.5' - 2.0.3 - 2.1.5
- '2.2.0-3.0.2' - 2.2.0 - 3.0.2
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
@ -751,7 +751,7 @@ software:
investigated: true investigated: true
affected_versions: [] affected_versions: []
fixed_versions: fixed_versions:
- 'Elasticsearch 5.0.0+' - Elasticsearch 5.0.0+
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
@ -813,7 +813,7 @@ software:
investigated: true investigated: true
affected_versions: [] affected_versions: []
fixed_versions: fixed_versions:
- 'v6' - v6
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
@ -904,10 +904,10 @@ software:
investigated: true investigated: true
affected_versions: [] affected_versions: []
fixed_versions: fixed_versions:
- 'R15A' - R15A
- 'R14B' - R14B
- 'R14A' - R14A
- 'R11B SP1' - R11B SP1
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
@ -921,9 +921,10 @@ software:
unaffected_versions: [] unaffected_versions: []
vendor_links: vendor_links:
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch - https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
notes: A patch is available for releases R15A, R14B, R14A and R11B SP1. . For details on how to apply such patch, notes: A patch is available for releases R15A, R14B, R14A and R11B SP1. . For
please refer to the technical bulletin “FOXMAN-UN Installation of Log4j Patch”, version A (1KHW029176) details on how to apply such patch, please refer to the technical bulletin “FOXMAN-UN
available in the Hitachi Energy Customer Connect Portal. - Installation of Log4j Patch”, version A (1KHW029176) available in the Hitachi
Energy Customer Connect Portal.
references: references:
- '' - ''
last_updated: '2022-01-05T00:00:00' last_updated: '2022-01-05T00:00:00'
@ -939,7 +940,7 @@ software:
investigated: true investigated: true
affected_versions: [] affected_versions: []
fixed_versions: fixed_versions:
- 'R11A and R10 series' - R11A and R10 series
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
@ -1029,9 +1030,9 @@ software:
investigated: true investigated: true
affected_versions: [] affected_versions: []
fixed_versions: fixed_versions:
- 'v1.7.x' - v1.7.x
- 'v1.8.x' - v1.8.x
- 'v1.9.x' - v1.9.x
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
@ -1090,9 +1091,9 @@ software:
investigated: true investigated: true
affected_versions: [] affected_versions: []
fixed_versions: fixed_versions:
- '9.0-9.10.44' - 9.0 - 9.10.44
- '9.1.1' - 9.1.1
- '10.3.4' - 10.3.4
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
@ -1122,7 +1123,7 @@ software:
investigated: true investigated: true
affected_versions: [] affected_versions: []
fixed_versions: fixed_versions:
- '9.1.0.32-9.1.0.44' - 9.1.0.32 - 9.1.0.44
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
@ -1154,7 +1155,7 @@ software:
fixed_versions: fixed_versions:
- '12.1' - '12.1'
- '12.2' - '12.2'
- '19c' - 19c
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
@ -1186,8 +1187,8 @@ software:
investigated: true investigated: true
affected_versions: [] affected_versions: []
fixed_versions: fixed_versions:
- '3.7.15' - 3.7.15
- '3.7.16' - 3.7.16
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
@ -1217,7 +1218,7 @@ software:
investigated: true investigated: true
affected_versions: [] affected_versions: []
fixed_versions: fixed_versions:
- '2.0.0' - 2.0.0
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
@ -1248,10 +1249,10 @@ software:
investigated: true investigated: true
affected_versions: [] affected_versions: []
fixed_versions: fixed_versions:
- 'R15A' - R15A
- 'R14B' - R14B
- 'R14A' - R14A
- 'R11B SP1' - R11B SP1
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
@ -1284,7 +1285,7 @@ software:
investigated: true investigated: true
affected_versions: [] affected_versions: []
fixed_versions: fixed_versions:
- 'R11A and R10 series' - R11A and R10 series
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
@ -1518,7 +1519,7 @@ software:
investigated: true investigated: true
affected_versions: [] affected_versions: []
fixed_versions: fixed_versions:
- '< v113' - < v113
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
@ -1548,7 +1549,7 @@ software:
investigated: true investigated: true
affected_versions: [] affected_versions: []
fixed_versions: fixed_versions:
- '< 1.0.6' - < 1.0.6
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
@ -1578,7 +1579,7 @@ software:
investigated: true investigated: true
affected_versions: [] affected_versions: []
fixed_versions: fixed_versions:
- '< 21.10.3' - < 21.10.3
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
@ -1608,8 +1609,8 @@ software:
investigated: true investigated: true
affected_versions: [] affected_versions: []
fixed_versions: fixed_versions:
- '< 21.03.6' - < 21.03.6
- '< 20.07.4' - < 20.07.4
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
@ -5399,36 +5400,6 @@ software:
references: references:
- '' - ''
last_updated: '2021-12-12T00:00:00' last_updated: '2021-12-12T00:00:00'
- vendor: HPE/Micro Focus
product: Data Protector
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- '9.09'
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://portal.microfocus.com/s/article/KM000003243
notes: 'Support Communication Cross Reference ID: SIK7387'
references:
- https://portal.microfocus.com/s/article/KM000003050
last_updated: '2021-12-17T00:00:00'
- vendor: HOLOGIC - vendor: HOLOGIC
product: Advanced Workflow Manager (AWM) product: Advanced Workflow Manager (AWM)
cves: cves:

View file

@ -73,7 +73,7 @@ software:
cve-2021-44228: cve-2021-44228:
investigated: true investigated: true
affected_versions: affected_versions:
- '< 11305' - 11305 and below
fixed_versions: [] fixed_versions: []
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
@ -105,7 +105,7 @@ software:
affected_versions: [] affected_versions: []
fixed_versions: [] fixed_versions: []
unaffected_versions: unaffected_versions:
- 'Build 6.1 build 6114' - Build 6.1 build 6114
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
affected_versions: [] affected_versions: []
@ -161,7 +161,7 @@ software:
cve-2021-44228: cve-2021-44228:
investigated: false investigated: false
affected_versions: affected_versions:
- 'On-Prem' - On-Prem
fixed_versions: [] fixed_versions: []
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
@ -191,7 +191,7 @@ software:
cve-2021-44228: cve-2021-44228:
investigated: false investigated: false
affected_versions: affected_versions:
- 'On-Prem' - On-Prem
fixed_versions: [] fixed_versions: []
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
@ -221,7 +221,7 @@ software:
cve-2021-44228: cve-2021-44228:
investigated: false investigated: false
affected_versions: affected_versions:
- 'On-Prem' - On-Prem
fixed_versions: [] fixed_versions: []
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
@ -251,7 +251,7 @@ software:
cve-2021-44228: cve-2021-44228:
investigated: false investigated: false
affected_versions: affected_versions:
- 'On-Prem' - On-Prem
fixed_versions: [] fixed_versions: []
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
@ -281,7 +281,7 @@ software:
cve-2021-44228: cve-2021-44228:
investigated: false investigated: false
affected_versions: affected_versions:
- 'On-Prem' - On-Prem
fixed_versions: [] fixed_versions: []
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
@ -311,7 +311,7 @@ software:
cve-2021-44228: cve-2021-44228:
investigated: false investigated: false
affected_versions: affected_versions:
- 'On-Prem' - On-Prem
fixed_versions: [] fixed_versions: []
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
@ -341,7 +341,7 @@ software:
cve-2021-44228: cve-2021-44228:
investigated: false investigated: false
affected_versions: affected_versions:
- 'On-Prem' - On-Prem
fixed_versions: [] fixed_versions: []
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
@ -371,7 +371,7 @@ software:
cve-2021-44228: cve-2021-44228:
investigated: false investigated: false
affected_versions: affected_versions:
- 'On-Prem' - On-Prem
fixed_versions: [] fixed_versions: []
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
@ -401,7 +401,7 @@ software:
cve-2021-44228: cve-2021-44228:
investigated: false investigated: false
affected_versions: affected_versions:
- 'On-Prem' - On-Prem
fixed_versions: [] fixed_versions: []
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
@ -431,7 +431,7 @@ software:
cve-2021-44228: cve-2021-44228:
investigated: false investigated: false
affected_versions: affected_versions:
- 'On-Prem' - On-Prem
fixed_versions: [] fixed_versions: []
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
@ -461,7 +461,7 @@ software:
cve-2021-44228: cve-2021-44228:
investigated: false investigated: false
affected_versions: affected_versions:
- 'On-Prem' - On-Prem
fixed_versions: [] fixed_versions: []
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
@ -491,7 +491,7 @@ software:
cve-2021-44228: cve-2021-44228:
investigated: false investigated: false
affected_versions: affected_versions:
- 'On-Prem' - On-Prem
fixed_versions: [] fixed_versions: []
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
@ -610,7 +610,7 @@ software:
investigated: true investigated: true
affected_versions: [] affected_versions: []
fixed_versions: fixed_versions:
- '1.59.10+' - 1.59.10+
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
@ -950,7 +950,7 @@ software:
investigated: true investigated: true
affected_versions: [] affected_versions: []
fixed_versions: fixed_versions:
- '5.10 CU11' - 5.10 CU11
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
@ -1344,7 +1344,7 @@ software:
investigated: true investigated: true
affected_versions: [] affected_versions: []
fixed_versions: fixed_versions:
- '11.5.3' - 11.5.3
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
investigated: false investigated: false
@ -1649,6 +1649,35 @@ software:
references: references:
- '' - ''
last_updated: '2022-01-12T07:18:54+00:00' last_updated: '2022-01-12T07:18:54+00:00'
- vendor: MicroFocus
product: ''
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://portal.microfocus.com/s/customportalsearch?language=en_US&searchtext=CVE-2021-44228
notes: ''
references:
- ''
last_updated: '2022-01-12T07:18:54+00:00'
- vendor: Microsoft - vendor: Microsoft
product: Azure Application Gateway product: Azure Application Gateway
cves: cves:
@ -1718,7 +1747,7 @@ software:
cve-2021-44228: cve-2021-44228:
investigated: true investigated: true
affected_versions: affected_versions:
- '< 2.3.10' - < 2.3.10
fixed_versions: [] fixed_versions: []
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
@ -1748,7 +1777,7 @@ software:
cve-2021-44228: cve-2021-44228:
investigated: true investigated: true
affected_versions: affected_versions:
- '< 2.3.10' - < 2.3.10
fixed_versions: [] fixed_versions: []
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
@ -1778,7 +1807,7 @@ software:
cve-2021-44228: cve-2021-44228:
investigated: true investigated: true
affected_versions: affected_versions:
- '2019.0 - 2020.1' - 2019.0 - 2020.1
fixed_versions: [] fixed_versions: []
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
@ -1866,7 +1895,7 @@ software:
cve-2021-44228: cve-2021-44228:
investigated: true investigated: true
affected_versions: affected_versions:
- '2018.2+' - 2018.2+
fixed_versions: [] fixed_versions: []
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
@ -1914,45 +1943,6 @@ software:
references: references:
- '' - ''
last_updated: '2022-01-12T07:18:54+00:00' last_updated: '2022-01-12T07:18:54+00:00'
- vendor: Micro Focus
product: Data Protector
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions: []
fixed_versions:
- '10.20'
- '10.30'
- '10.40'
- '10.50'
- '10.60'
- '10.70'
- '10.80'
- '10.90'
- '10.91'
- '11.00'
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://portal.microfocus.com/s/article/KM000003052
notes: ''
references:
- https://portal.microfocus.com/s/article/KM000003050
last_updated: '2021-12-13T00:00:00'
- vendor: Midori Global - vendor: Midori Global
product: '' product: ''
cves: cves:
@ -2578,8 +2568,8 @@ software:
cve-2021-44228: cve-2021-44228:
investigated: true investigated: true
affected_versions: affected_versions:
- '3.x' - 3.x
- '4.x' - 4.x
fixed_versions: [] fixed_versions: []
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
@ -2610,7 +2600,7 @@ software:
cve-2021-44228: cve-2021-44228:
investigated: true investigated: true
affected_versions: affected_versions:
- '6.x' - 6.x
fixed_versions: [] fixed_versions: []
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046:
@ -2671,7 +2661,7 @@ software:
cve-2021-44228: cve-2021-44228:
investigated: true investigated: true
affected_versions: affected_versions:
- '7.x' - 7.x
fixed_versions: [] fixed_versions: []
unaffected_versions: [] unaffected_versions: []
cve-2021-45046: cve-2021-45046: