|
|
@ -2094,6 +2094,36 @@ software: |
|
|
|
references: |
|
|
|
references: |
|
|
|
- '' |
|
|
|
- '' |
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
|
|
|
|
- vendor: Cisco |
|
|
|
|
|
|
|
product: Cisco ACI Multi-Site Orchestrator |
|
|
|
|
|
|
|
cves: |
|
|
|
|
|
|
|
cve-2021-4104: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-44228: |
|
|
|
|
|
|
|
investigated: true |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
cve-2021-45046: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-45105: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
vendor_links: |
|
|
|
|
|
|
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd |
|
|
|
|
|
|
|
notes: '' |
|
|
|
|
|
|
|
references: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
- vendor: Cisco |
|
|
|
- vendor: Cisco |
|
|
|
product: Cisco AMP Virtual Private Cloud Appliance |
|
|
|
product: Cisco AMP Virtual Private Cloud Appliance |
|
|
|
cves: |
|
|
|
cves: |
|
|
@ -2551,6 +2581,36 @@ software: |
|
|
|
references: |
|
|
|
references: |
|
|
|
- '' |
|
|
|
- '' |
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
|
|
|
|
- vendor: Cisco |
|
|
|
|
|
|
|
product: Cisco CloudCenter Action Orchestrator |
|
|
|
|
|
|
|
cves: |
|
|
|
|
|
|
|
cve-2021-4104: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-44228: |
|
|
|
|
|
|
|
investigated: true |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
cve-2021-45046: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-45105: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
vendor_links: |
|
|
|
|
|
|
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd |
|
|
|
|
|
|
|
notes: '' |
|
|
|
|
|
|
|
references: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
- vendor: Cisco |
|
|
|
- vendor: Cisco |
|
|
|
product: Cisco CloudCenter Cost Optimizer |
|
|
|
product: Cisco CloudCenter Cost Optimizer |
|
|
|
cves: |
|
|
|
cves: |
|
|
@ -2672,6 +2732,36 @@ software: |
|
|
|
references: |
|
|
|
references: |
|
|
|
- '' |
|
|
|
- '' |
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
|
|
|
|
- vendor: Cisco |
|
|
|
|
|
|
|
product: Cisco Connected Grid Device Manager |
|
|
|
|
|
|
|
cves: |
|
|
|
|
|
|
|
cve-2021-4104: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-44228: |
|
|
|
|
|
|
|
investigated: true |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
cve-2021-45046: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-45105: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
vendor_links: |
|
|
|
|
|
|
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd |
|
|
|
|
|
|
|
notes: '' |
|
|
|
|
|
|
|
references: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
- vendor: Cisco |
|
|
|
- vendor: Cisco |
|
|
|
product: Cisco Connected Mobile Experiences (CMX) |
|
|
|
product: Cisco Connected Mobile Experiences (CMX) |
|
|
|
cves: |
|
|
|
cves: |
|
|
@ -2767,6 +2857,66 @@ software: |
|
|
|
references: |
|
|
|
references: |
|
|
|
- '' |
|
|
|
- '' |
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
|
|
|
|
- vendor: Cisco |
|
|
|
|
|
|
|
product: Cisco Container Platform |
|
|
|
|
|
|
|
cves: |
|
|
|
|
|
|
|
cve-2021-4104: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-44228: |
|
|
|
|
|
|
|
investigated: true |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
cve-2021-45046: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-45105: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
vendor_links: |
|
|
|
|
|
|
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd |
|
|
|
|
|
|
|
notes: '' |
|
|
|
|
|
|
|
references: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
|
|
|
|
- vendor: Cisco |
|
|
|
|
|
|
|
product: Cisco Crosswork Change Automation |
|
|
|
|
|
|
|
cves: |
|
|
|
|
|
|
|
cve-2021-4104: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-44228: |
|
|
|
|
|
|
|
investigated: true |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
cve-2021-45046: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-45105: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
vendor_links: |
|
|
|
|
|
|
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd |
|
|
|
|
|
|
|
notes: '' |
|
|
|
|
|
|
|
references: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
- vendor: Cisco |
|
|
|
- vendor: Cisco |
|
|
|
product: Cisco Crosswork Data Gateway |
|
|
|
product: Cisco Crosswork Data Gateway |
|
|
|
cves: |
|
|
|
cves: |
|
|
@ -2798,6 +2948,36 @@ software: |
|
|
|
references: |
|
|
|
references: |
|
|
|
- '' |
|
|
|
- '' |
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
|
|
|
|
- vendor: Cisco |
|
|
|
|
|
|
|
product: Cisco Crosswork Health Insights |
|
|
|
|
|
|
|
cves: |
|
|
|
|
|
|
|
cve-2021-4104: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-44228: |
|
|
|
|
|
|
|
investigated: true |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
cve-2021-45046: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-45105: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
vendor_links: |
|
|
|
|
|
|
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd |
|
|
|
|
|
|
|
notes: '' |
|
|
|
|
|
|
|
references: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
- vendor: Cisco |
|
|
|
- vendor: Cisco |
|
|
|
product: Cisco Crosswork Network Controller |
|
|
|
product: Cisco Crosswork Network Controller |
|
|
|
cves: |
|
|
|
cves: |
|
|
@ -2891,6 +3071,36 @@ software: |
|
|
|
references: |
|
|
|
references: |
|
|
|
- '' |
|
|
|
- '' |
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
|
|
|
|
- vendor: Cisco |
|
|
|
|
|
|
|
product: Cisco Crosswork Service Health |
|
|
|
|
|
|
|
cves: |
|
|
|
|
|
|
|
cve-2021-4104: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-44228: |
|
|
|
|
|
|
|
investigated: true |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
cve-2021-45046: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-45105: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
vendor_links: |
|
|
|
|
|
|
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd |
|
|
|
|
|
|
|
notes: '' |
|
|
|
|
|
|
|
references: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
- vendor: Cisco |
|
|
|
- vendor: Cisco |
|
|
|
product: Cisco Crosswork Situation Manager |
|
|
|
product: Cisco Crosswork Situation Manager |
|
|
|
cves: |
|
|
|
cves: |
|
|
@ -3110,6 +3320,36 @@ software: |
|
|
|
references: |
|
|
|
references: |
|
|
|
- '' |
|
|
|
- '' |
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
|
|
|
|
- vendor: Cisco |
|
|
|
|
|
|
|
product: Cisco Elastic Services Controller (ESC) |
|
|
|
|
|
|
|
cves: |
|
|
|
|
|
|
|
cve-2021-4104: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-44228: |
|
|
|
|
|
|
|
investigated: true |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
cve-2021-45046: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-45105: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
vendor_links: |
|
|
|
|
|
|
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd |
|
|
|
|
|
|
|
notes: '' |
|
|
|
|
|
|
|
references: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
- vendor: Cisco |
|
|
|
- vendor: Cisco |
|
|
|
product: Cisco Email Security Appliance (ESA) |
|
|
|
product: Cisco Email Security Appliance (ESA) |
|
|
|
cves: |
|
|
|
cves: |
|
|
@ -3514,6 +3754,66 @@ software: |
|
|
|
references: |
|
|
|
references: |
|
|
|
- '' |
|
|
|
- '' |
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
|
|
|
|
- vendor: Cisco |
|
|
|
|
|
|
|
product: Cisco Intelligent Node (iNode) Manager |
|
|
|
|
|
|
|
cves: |
|
|
|
|
|
|
|
cve-2021-4104: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-44228: |
|
|
|
|
|
|
|
investigated: true |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
cve-2021-45046: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-45105: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
vendor_links: |
|
|
|
|
|
|
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd |
|
|
|
|
|
|
|
notes: '' |
|
|
|
|
|
|
|
references: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
|
|
|
|
- vendor: Cisco |
|
|
|
|
|
|
|
product: Cisco Intersight Mobile App |
|
|
|
|
|
|
|
cves: |
|
|
|
|
|
|
|
cve-2021-4104: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-44228: |
|
|
|
|
|
|
|
investigated: true |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
cve-2021-45046: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-45105: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
vendor_links: |
|
|
|
|
|
|
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd |
|
|
|
|
|
|
|
notes: '' |
|
|
|
|
|
|
|
references: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
- vendor: Cisco |
|
|
|
- vendor: Cisco |
|
|
|
product: Cisco Intersight Virtual Appliance |
|
|
|
product: Cisco Intersight Virtual Appliance |
|
|
|
cves: |
|
|
|
cves: |
|
|
@ -3544,6 +3844,36 @@ software: |
|
|
|
references: |
|
|
|
references: |
|
|
|
- '' |
|
|
|
- '' |
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
|
|
|
|
- vendor: Cisco |
|
|
|
|
|
|
|
product: Cisco IoT Field Network Director |
|
|
|
|
|
|
|
cves: |
|
|
|
|
|
|
|
cve-2021-4104: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-44228: |
|
|
|
|
|
|
|
investigated: true |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
cve-2021-45046: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-45105: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
vendor_links: |
|
|
|
|
|
|
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd |
|
|
|
|
|
|
|
notes: '' |
|
|
|
|
|
|
|
references: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
- vendor: Cisco |
|
|
|
- vendor: Cisco |
|
|
|
product: Cisco IOx Fog Director |
|
|
|
product: Cisco IOx Fog Director |
|
|
|
cves: |
|
|
|
cves: |
|
|
@ -3875,6 +4205,36 @@ software: |
|
|
|
references: |
|
|
|
references: |
|
|
|
- '' |
|
|
|
- '' |
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
|
|
|
|
- vendor: Cisco |
|
|
|
|
|
|
|
product: Cisco Modeling Labs |
|
|
|
|
|
|
|
cves: |
|
|
|
|
|
|
|
cve-2021-4104: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-44228: |
|
|
|
|
|
|
|
investigated: true |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
cve-2021-45046: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
cve-2021-45105: |
|
|
|
|
|
|
|
investigated: false |
|
|
|
|
|
|
|
affected_versions: [] |
|
|
|
|
|
|
|
fixed_versions: [] |
|
|
|
|
|
|
|
unaffected_versions: [] |
|
|
|
|
|
|
|
vendor_links: |
|
|
|
|
|
|
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd |
|
|
|
|
|
|
|
notes: '' |
|
|
|
|
|
|
|
references: |
|
|
|
|
|
|
|
- '' |
|
|
|
|
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
- vendor: Cisco |
|
|
|
- vendor: Cisco |
|
|
|
product: Cisco Network Assurance Engine |
|
|
|
product: Cisco Network Assurance Engine |
|
|
|
cves: |
|
|
|
cves: |
|
|
@ -4388,7 +4748,7 @@ software: |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
vendor_links: |
|
|
|
vendor_links: |
|
|
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd |
|
|
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd |
|
|
|
notes: Formerly Stealthwatch Enterprise, Advanced Host Group Automation (AGHA) |
|
|
|
notes: Formerly Stealthwatch Enterprise, Advanced Host Group Automation (AHGA) |
|
|
|
references: |
|
|
|
references: |
|
|
|
- '' |
|
|
|
- '' |
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
@ -5356,7 +5716,7 @@ software: |
|
|
|
unaffected_versions: [] |
|
|
|
unaffected_versions: [] |
|
|
|
vendor_links: |
|
|
|
vendor_links: |
|
|
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd |
|
|
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd |
|
|
|
notes: Formerly Stealthwatch Enterprise, Advanced Host Group Automation (AGHA) |
|
|
|
notes: '' |
|
|
|
references: |
|
|
|
references: |
|
|
|
- '' |
|
|
|
- '' |
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|
last_updated: '2022-01-12T07:18:50+00:00' |
|
|
|