mirror of
https://github.com/cisagov/log4j-affected-db.git
synced 2024-11-22 00:20:47 +00:00
Add BD products, complete
This commit is contained in:
parent
48bafa1479
commit
b551c3d68a
1 changed files with 720 additions and 0 deletions
|
@ -4260,6 +4260,66 @@ software:
|
|||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: BD
|
||||
product: BD Sensica Urine Output System
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: BD
|
||||
product: BD Site~Rite 8 Ultrasound Systems
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: BD
|
||||
product: BD Synapsys Informatics Solution
|
||||
cves:
|
||||
|
@ -4290,6 +4350,126 @@ software:
|
|||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: BD
|
||||
product: BD Totalys DataLink
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: BD
|
||||
product: BD Totalys Multiprocessor
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: BD
|
||||
product: BD Totalys SlidePrep
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: BD
|
||||
product: BD Veritor
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: BD
|
||||
product: BD Veritor COVID At Home Solution Cloud
|
||||
cves:
|
||||
|
@ -4320,6 +4500,546 @@ software:
|
|||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: BD
|
||||
product: BD Viper LT
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: BD
|
||||
product: BD Viper XTR
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: BD
|
||||
product: CoreLite
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: BD
|
||||
product: EnCor Enspire Breast Biopsy System
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: BD
|
||||
product: EnCor Ultra Breast Biopsy System
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: BD
|
||||
product: FlowJo Portal
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: BD
|
||||
product: FlowJo Software
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: BD
|
||||
product: Influx
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: BD
|
||||
product: LSRFortessa
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: BD
|
||||
product: LSRFortessa X-20
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: BD
|
||||
product: PleurX
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: BD
|
||||
product: QUANTAFLO Peripheral Arterial Disease Test
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: BD
|
||||
product: Restock Order
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: BD
|
||||
product: SeqGeq Software
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: BD
|
||||
product: Sherlock 3CG Standalone Tip Confirmation Systems
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: BD
|
||||
product: Site~Rite PICC Ultrasound Systems
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: BD
|
||||
product: Site~Rite Prevue Plus Ultrasound Systems
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: BD
|
||||
product: Specimen Collection Verification
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-apache-log4j
|
||||
notes: ''
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: Beckman Coulter
|
||||
product: Access 2 (Immunoassay System)
|
||||
cves:
|
||||
|
|
Loading…
Reference in a new issue