mirror of
https://github.com/cisagov/log4j-affected-db.git
synced 2024-11-22 00:20:47 +00:00
Merge pull request #437 from inl-ics/develop
Added ARC Informatique and Opto 22
This commit is contained in:
commit
acf6018066
2 changed files with 153 additions and 0 deletions
|
@ -2958,6 +2958,35 @@ software:
|
|||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-22T00:00:00'
|
||||
- vendor: ARC Informatique
|
||||
product: All
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://www.pcvuesolutions.com/support/index.php/en/security-bulletin/1141-security-bulletin-2021-1
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2022-01-13T00:00:00'
|
||||
- vendor: Arca Noae
|
||||
product: ''
|
||||
cves:
|
||||
|
|
|
@ -586,6 +586,130 @@ software:
|
|||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-23T00:00:00'
|
||||
- vendor: Opto 22
|
||||
product: GRV-EPIC-PR1, GRV-EPIC-PR2
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions:
|
||||
- < 3.3.2
|
||||
fixed_versions:
|
||||
- 3.3.2
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://blog.opto22.com/optoblog/new-update-to-address-log4shell/log4j-exploit
|
||||
notes: The Log4j vulnerability affects all products running groov View software
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2022-01-13T00:00:00'
|
||||
- vendor: Opto 22
|
||||
product: GROOV-AR1, GROOV-AR1-BASE, GROOV-AR1-SNAP
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions:
|
||||
- < 4.3g
|
||||
fixed_versions:
|
||||
- 4.3g
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://blog.opto22.com/optoblog/new-update-to-address-log4shell/log4j-exploit
|
||||
notes: The Log4j vulnerability affects all products running groov View software
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2022-01-13T00:00:00'
|
||||
- vendor: Opto 22
|
||||
product: GROOV-AT1, GROOV-AT1-SNAP
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions:
|
||||
- < 4.3g
|
||||
fixed_versions:
|
||||
- 4.3g
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://blog.opto22.com/optoblog/new-update-to-address-log4shell/log4j-exploit
|
||||
notes: The Log4j vulnerability affects all products running groov View software
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2022-01-13T00:00:00'
|
||||
- vendor: Opto 22
|
||||
product: GROOV-SVR-WIN, GROOV-SVR-WIN-BASE, GROOV-SVR-WIN-SNAP
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions:
|
||||
- < 4.3g
|
||||
fixed_versions:
|
||||
- 4.3g
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://blog.opto22.com/optoblog/new-update-to-address-log4shell/log4j-exploit
|
||||
notes: The Log4j vulnerability affects all products running groov View software
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2022-01-13T00:00:00'
|
||||
- vendor: Oracle
|
||||
product: ''
|
||||
cves:
|
||||
|
|
Loading…
Reference in a new issue