mirror of
https://github.com/cisagov/log4j-affected-db.git
synced 2024-11-25 01:40:47 +00:00
Update cisagov_M.yml
Remove duplicate mobile iron entries
This commit is contained in:
parent
7cfadd6eff
commit
bee5ac6aea
1 changed files with 0 additions and 137 deletions
|
@ -2233,143 +2233,6 @@ software:
|
|||
references:
|
||||
- ''
|
||||
last_updated: '2022-01-05T00:00:00'
|
||||
- vendor: MobileIron
|
||||
product: Core
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions:
|
||||
- All Versions
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://forums.ivanti.com/s/article/Security-Bulletin-CVE-2021-44228-Remote-code-injection-in-Log4j?language=en_US
|
||||
notes: The mitigation instructions listed in a subsequent section removes a vulnerable
|
||||
Java class (JNDILookUp.class) from the affected Log4J Java library and as a
|
||||
result removes the ability to perform the RCE attack. The workaround needs
|
||||
to be applied in a maintenance window. You will not be able to access the admin
|
||||
portal during the procedure, however, end user devices will continue to function.
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: MobileIron
|
||||
product: Core Connector
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions:
|
||||
- All Versions
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://forums.ivanti.com/s/article/Security-Bulletin-CVE-2021-44228-Remote-code-injection-in-Log4j?language=en_US
|
||||
notes: The mitigation instructions listed in a subsequent section removes a vulnerable
|
||||
Java class (JNDILookUp.class) from the affected Log4J Java library and as a
|
||||
result removes the ability to perform the RCE attack. The workaround needs
|
||||
to be applied in a maintenance window. You will not be able to access the admin
|
||||
portal during the procedure, however, end user devices will continue to function.
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: MobileIron
|
||||
product: Reporting Database (RDB)
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions:
|
||||
- All Versions
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://forums.ivanti.com/s/article/Security-Bulletin-CVE-2021-44228-Remote-code-injection-in-Log4j?language=en_US
|
||||
notes: The mitigation instructions listed in a subsequent section removes a vulnerable
|
||||
Java class (JNDILookUp.class) from the affected Log4J Java library and as a
|
||||
result removes the ability to perform the RCE attack. The workaround needs
|
||||
to be applied in a maintenance window. You will not be able to access the admin
|
||||
portal during the procedure, however, end user devices will continue to function.
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: MobileIron
|
||||
product: Sentry
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions:
|
||||
- '9.13'
|
||||
- '9.14'
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://forums.ivanti.com/s/article/Security-Bulletin-CVE-2021-44228-Remote-code-injection-in-Log4j?language=en_US
|
||||
notes: The mitigation instructions listed in a subsequent section removes a vulnerable
|
||||
Java class (JNDILookUp.class) from the affected Log4J Java library and as a
|
||||
result removes the ability to perform the RCE attack. The workaround needs
|
||||
to be applied in a maintenance window. You will not be able to access the admin
|
||||
portal during the procedure, however, end user devices will continue to function.
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-20T00:00:00'
|
||||
- vendor: MongoDB
|
||||
product: All other components of MongoDB Atlas (including Atlas Database, Data
|
||||
Lake, Charts)
|
||||
|
|
Loading…
Reference in a new issue