From 6ce0502844489e5cd6c9098a3e41e71299e5f33c Mon Sep 17 00:00:00 2001 From: inl-ics <96266975+inl-ics@users.noreply.github.com> Date: Thu, 13 Jan 2022 16:02:16 -0700 Subject: [PATCH 1/7] Update cisagov_A.yml Added ARC Informatique --- data/cisagov_A.yml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) diff --git a/data/cisagov_A.yml b/data/cisagov_A.yml index d7019ba..7a6ce38 100644 --- a/data/cisagov_A.yml +++ b/data/cisagov_A.yml @@ -2958,6 +2958,35 @@ software: references: - '' last_updated: '2021-12-22T00:00:00' + - vendor: ARC Informatique + product: All + cves: + cve-2021-4104: + investigated: false + affected_versions: [] + fixed_versions: [] + unaffected_versions: [] + cve-2021-44228: + investigated: true + affected_versions: [] + fixed_versions: [] + unaffected_versions: [] + cve-2021-45046: + investigated: false + affected_versions: [] + fixed_versions: [] + unaffected_versions: [] + cve-2021-45105: + investigated: false + affected_versions: [] + fixed_versions: [] + unaffected_versions: [] + vendor_links: + - https://www.pcvuesolutions.com/support/index.php/en/security-bulletin/1141-security-bulletin-2021-1 + notes: '' + references: + - '' + last_updated: '2022-01-13T00:00:00' - vendor: Arca Noae product: '' cves: From aba33b5f056b8711c26546de7a808e8210b297d4 Mon Sep 17 00:00:00 2001 From: inl-ics <96266975+inl-ics@users.noreply.github.com> Date: Thu, 13 Jan 2022 16:04:36 -0700 Subject: [PATCH 2/7] Update cisagov_O.yml Added Opto 22 --- data/cisagov_O.yml | 124 +++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 124 insertions(+) diff --git a/data/cisagov_O.yml b/data/cisagov_O.yml index 06d60ae..a0ee5b5 100644 --- a/data/cisagov_O.yml +++ b/data/cisagov_O.yml @@ -586,6 +586,130 @@ software: references: - '' last_updated: '2021-12-23T00:00:00' + - vendor: Opto 22 + product: GRV-EPIC-PR1, GRV-EPIC-PR2 + cves: + cve-2021-4104: + investigated: false + affected_versions: [] + fixed_versions: [] + unaffected_versions: [] + cve-2021-44228: + investigated: true + affected_versions: + - < 3.3.2 + fixed_versions: + - 3.3.2 + unaffected_versions: [] + cve-2021-45046: + investigated: false + affected_versions: [] + fixed_versions: [] + unaffected_versions: [] + cve-2021-45105: + investigated: false + affected_versions: [] + fixed_versions: [] + unaffected_versions: [] + vendor_links: + - https://blog.opto22.com/optoblog/new-update-to-address-log4shell/log4j-exploit + notes: The Log4j vulnerability affects all products running groov View software + references: + - '' + last_updated: '2022-01-13T00:00:00' + - vendor: Opto 22 + product: GROOV-AR1, GROOV-AR1-BASE, GROOV-AR1-SNAP + cves: + cve-2021-4104: + investigated: false + affected_versions: [] + fixed_versions: [] + unaffected_versions: [] + cve-2021-44228: + investigated: true + affected_versions: + - < 4.3g + fixed_versions: + - 4.3g + unaffected_versions: [] + cve-2021-45046: + investigated: false + affected_versions: [] + fixed_versions: [] + unaffected_versions: [] + cve-2021-45105: + investigated: false + affected_versions: [] + fixed_versions: [] + unaffected_versions: [] + vendor_links: + - https://blog.opto22.com/optoblog/new-update-to-address-log4shell/log4j-exploit + notes: The Log4j vulnerability affects all products running groov View software + references: + - '' + last_updated: '2022-01-13T00:00:00' + - vendor: Opto 22 + product: GROOV-AT1, GROOV-AT1-SNAP + cves: + cve-2021-4104: + investigated: false + affected_versions: [] + fixed_versions: [] + unaffected_versions: [] + cve-2021-44228: + investigated: true + affected_versions: + - < 4.3g + fixed_versions: + - 4.3g + unaffected_versions: [] + cve-2021-45046: + investigated: false + affected_versions: [] + fixed_versions: [] + unaffected_versions: [] + cve-2021-45105: + investigated: false + affected_versions: [] + fixed_versions: [] + unaffected_versions: [] + vendor_links: + - https://blog.opto22.com/optoblog/new-update-to-address-log4shell/log4j-exploit + notes: The Log4j vulnerability affects all products running groov View software + references: + - '' + last_updated: '2022-01-13T00:00:00' + - vendor: Opto 22 + product: GROOV-SVR-WIN, GROOV-SVR-WIN-BASE, GROOV-SVR-WIN-SNAP + cves: + cve-2021-4104: + investigated: false + affected_versions: [] + fixed_versions: [] + unaffected_versions: [] + cve-2021-44228: + investigated: true + affected_versions: + - < 4.3g + fixed_versions: + - 4.3g + unaffected_versions: [] + cve-2021-45046: + investigated: false + affected_versions: [] + fixed_versions: [] + unaffected_versions: [] + cve-2021-45105: + investigated: false + affected_versions: [] + fixed_versions: [] + unaffected_versions: [] + vendor_links: + - https://blog.opto22.com/optoblog/new-update-to-address-log4shell/log4j-exploit + notes: The Log4j vulnerability affects all products running groov View software + references: + - '' + last_updated: '2022-01-13T00:00:00' - vendor: Oracle product: '' cves: From 92552d44a5b071e09607d948690f6faee9cc83a7 Mon Sep 17 00:00:00 2001 From: inl-ics <96266975+inl-ics@users.noreply.github.com> Date: Thu, 13 Jan 2022 16:34:51 -0700 Subject: [PATCH 3/7] Update cisagov_O.yml fixed the spaces --- data/cisagov_O.yml | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/data/cisagov_O.yml b/data/cisagov_O.yml index a0ee5b5..aa27a52 100644 --- a/data/cisagov_O.yml +++ b/data/cisagov_O.yml @@ -597,9 +597,9 @@ software: cve-2021-44228: investigated: true affected_versions: - - < 3.3.2 + - < 3.3.2 fixed_versions: - - 3.3.2 + - 3.3.2 unaffected_versions: [] cve-2021-45046: investigated: false @@ -628,9 +628,9 @@ software: cve-2021-44228: investigated: true affected_versions: - - < 4.3g + - < 4.3g fixed_versions: - - 4.3g + - 4.3g unaffected_versions: [] cve-2021-45046: investigated: false @@ -659,9 +659,9 @@ software: cve-2021-44228: investigated: true affected_versions: - - < 4.3g + - < 4.3g fixed_versions: - - 4.3g + - 4.3g unaffected_versions: [] cve-2021-45046: investigated: false @@ -690,9 +690,9 @@ software: cve-2021-44228: investigated: true affected_versions: - - < 4.3g + - < 4.3g fixed_versions: - - 4.3g + - 4.3g unaffected_versions: [] cve-2021-45046: investigated: false From 19ae9a99c9a0969ce17777670bbb34eb3f73f036 Mon Sep 17 00:00:00 2001 From: Lcerkov <96153185+Lcerkov@users.noreply.github.com> Date: Fri, 14 Jan 2022 11:57:04 -0500 Subject: [PATCH 4/7] Update data/cisagov_O.yml --- data/cisagov_O.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/data/cisagov_O.yml b/data/cisagov_O.yml index aa27a52..2948402 100644 --- a/data/cisagov_O.yml +++ b/data/cisagov_O.yml @@ -598,7 +598,7 @@ software: investigated: true affected_versions: - < 3.3.2 - fixed_versions: + fixed_versions: - 3.3.2 unaffected_versions: [] cve-2021-45046: From 2e864bc42c8a5e37de3c21a04e96d0721859e4cb Mon Sep 17 00:00:00 2001 From: Lcerkov <96153185+Lcerkov@users.noreply.github.com> Date: Fri, 14 Jan 2022 11:57:10 -0500 Subject: [PATCH 5/7] Update data/cisagov_O.yml --- data/cisagov_O.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/data/cisagov_O.yml b/data/cisagov_O.yml index 2948402..ee69877 100644 --- a/data/cisagov_O.yml +++ b/data/cisagov_O.yml @@ -629,7 +629,7 @@ software: investigated: true affected_versions: - < 4.3g - fixed_versions: + fixed_versions: - 4.3g unaffected_versions: [] cve-2021-45046: From 99517e7087af4e568185ac1bc71f9fdc4d2c0369 Mon Sep 17 00:00:00 2001 From: Lcerkov <96153185+Lcerkov@users.noreply.github.com> Date: Fri, 14 Jan 2022 11:57:16 -0500 Subject: [PATCH 6/7] Update data/cisagov_O.yml --- data/cisagov_O.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/data/cisagov_O.yml b/data/cisagov_O.yml index ee69877..8ef5f5c 100644 --- a/data/cisagov_O.yml +++ b/data/cisagov_O.yml @@ -691,7 +691,7 @@ software: investigated: true affected_versions: - < 4.3g - fixed_versions: + fixed_versions: - 4.3g unaffected_versions: [] cve-2021-45046: From 5ff0d8469be1a34d8747835cf4e8e23909c7d488 Mon Sep 17 00:00:00 2001 From: Lcerkov <96153185+Lcerkov@users.noreply.github.com> Date: Fri, 14 Jan 2022 11:57:21 -0500 Subject: [PATCH 7/7] Update data/cisagov_O.yml --- data/cisagov_O.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/data/cisagov_O.yml b/data/cisagov_O.yml index 8ef5f5c..4751f7c 100644 --- a/data/cisagov_O.yml +++ b/data/cisagov_O.yml @@ -660,7 +660,7 @@ software: investigated: true affected_versions: - < 4.3g - fixed_versions: + fixed_versions: - 4.3g unaffected_versions: [] cve-2021-45046: