mirror of
https://github.com/cisagov/log4j-affected-db.git
synced 2024-11-22 08:30:48 +00:00
Update cisagov_O.yml
Added Opto 22
This commit is contained in:
parent
6ce0502844
commit
aba33b5f05
1 changed files with 124 additions and 0 deletions
|
@ -586,6 +586,130 @@ software:
|
||||||
references:
|
references:
|
||||||
- ''
|
- ''
|
||||||
last_updated: '2021-12-23T00:00:00'
|
last_updated: '2021-12-23T00:00:00'
|
||||||
|
- vendor: Opto 22
|
||||||
|
product: GRV-EPIC-PR1, GRV-EPIC-PR2
|
||||||
|
cves:
|
||||||
|
cve-2021-4104:
|
||||||
|
investigated: false
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions: []
|
||||||
|
cve-2021-44228:
|
||||||
|
investigated: true
|
||||||
|
affected_versions:
|
||||||
|
- < 3.3.2
|
||||||
|
fixed_versions:
|
||||||
|
- 3.3.2
|
||||||
|
unaffected_versions: []
|
||||||
|
cve-2021-45046:
|
||||||
|
investigated: false
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions: []
|
||||||
|
cve-2021-45105:
|
||||||
|
investigated: false
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions: []
|
||||||
|
vendor_links:
|
||||||
|
- https://blog.opto22.com/optoblog/new-update-to-address-log4shell/log4j-exploit
|
||||||
|
notes: The Log4j vulnerability affects all products running groov View software
|
||||||
|
references:
|
||||||
|
- ''
|
||||||
|
last_updated: '2022-01-13T00:00:00'
|
||||||
|
- vendor: Opto 22
|
||||||
|
product: GROOV-AR1, GROOV-AR1-BASE, GROOV-AR1-SNAP
|
||||||
|
cves:
|
||||||
|
cve-2021-4104:
|
||||||
|
investigated: false
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions: []
|
||||||
|
cve-2021-44228:
|
||||||
|
investigated: true
|
||||||
|
affected_versions:
|
||||||
|
- < 4.3g
|
||||||
|
fixed_versions:
|
||||||
|
- 4.3g
|
||||||
|
unaffected_versions: []
|
||||||
|
cve-2021-45046:
|
||||||
|
investigated: false
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions: []
|
||||||
|
cve-2021-45105:
|
||||||
|
investigated: false
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions: []
|
||||||
|
vendor_links:
|
||||||
|
- https://blog.opto22.com/optoblog/new-update-to-address-log4shell/log4j-exploit
|
||||||
|
notes: The Log4j vulnerability affects all products running groov View software
|
||||||
|
references:
|
||||||
|
- ''
|
||||||
|
last_updated: '2022-01-13T00:00:00'
|
||||||
|
- vendor: Opto 22
|
||||||
|
product: GROOV-AT1, GROOV-AT1-SNAP
|
||||||
|
cves:
|
||||||
|
cve-2021-4104:
|
||||||
|
investigated: false
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions: []
|
||||||
|
cve-2021-44228:
|
||||||
|
investigated: true
|
||||||
|
affected_versions:
|
||||||
|
- < 4.3g
|
||||||
|
fixed_versions:
|
||||||
|
- 4.3g
|
||||||
|
unaffected_versions: []
|
||||||
|
cve-2021-45046:
|
||||||
|
investigated: false
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions: []
|
||||||
|
cve-2021-45105:
|
||||||
|
investigated: false
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions: []
|
||||||
|
vendor_links:
|
||||||
|
- https://blog.opto22.com/optoblog/new-update-to-address-log4shell/log4j-exploit
|
||||||
|
notes: The Log4j vulnerability affects all products running groov View software
|
||||||
|
references:
|
||||||
|
- ''
|
||||||
|
last_updated: '2022-01-13T00:00:00'
|
||||||
|
- vendor: Opto 22
|
||||||
|
product: GROOV-SVR-WIN, GROOV-SVR-WIN-BASE, GROOV-SVR-WIN-SNAP
|
||||||
|
cves:
|
||||||
|
cve-2021-4104:
|
||||||
|
investigated: false
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions: []
|
||||||
|
cve-2021-44228:
|
||||||
|
investigated: true
|
||||||
|
affected_versions:
|
||||||
|
- < 4.3g
|
||||||
|
fixed_versions:
|
||||||
|
- 4.3g
|
||||||
|
unaffected_versions: []
|
||||||
|
cve-2021-45046:
|
||||||
|
investigated: false
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions: []
|
||||||
|
cve-2021-45105:
|
||||||
|
investigated: false
|
||||||
|
affected_versions: []
|
||||||
|
fixed_versions: []
|
||||||
|
unaffected_versions: []
|
||||||
|
vendor_links:
|
||||||
|
- https://blog.opto22.com/optoblog/new-update-to-address-log4shell/log4j-exploit
|
||||||
|
notes: The Log4j vulnerability affects all products running groov View software
|
||||||
|
references:
|
||||||
|
- ''
|
||||||
|
last_updated: '2022-01-13T00:00:00'
|
||||||
- vendor: Oracle
|
- vendor: Oracle
|
||||||
product: ''
|
product: ''
|
||||||
cves:
|
cves:
|
||||||
|
|
Loading…
Reference in a new issue