mirror of
https://github.com/cisagov/log4j-affected-db.git
synced 2024-11-22 08:30:48 +00:00
commit
c29b5e2bac
6 changed files with 49 additions and 47 deletions
|
@ -3718,7 +3718,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- All
|
||||
- 'All'
|
||||
cve-2021-45046:
|
||||
investigated: ''
|
||||
affected_versions: []
|
||||
|
@ -3731,7 +3731,7 @@ software:
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://www.atvise.com/en/articles/at-log4j-sicherheitsluecke-atvise-produkte-und-terminals-nicht-betroffen
|
||||
notes: The security vulnerability does NOT affect our applications and products or pose any threat. This applies to all Bachmann applications and products, including atvise® solutions.
|
||||
notes: The security vulnerability does NOT affect our applications and products or pose any threat. This applies to all Bachmann applications and products, including atvise solutions.
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2022-01-17T00:00:00'
|
||||
|
|
|
@ -6985,8 +6985,8 @@ software:
|
|||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions:
|
||||
- 6.2.2
|
||||
- 6.3.0 to 6.3.3
|
||||
- '6.2.2'
|
||||
- '6.3.0 to 6.3.3'
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
|
@ -7016,15 +7016,15 @@ software:
|
|||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions:
|
||||
- 2019.1.*
|
||||
- 2020.1.*
|
||||
- 2020.3.*
|
||||
- 2021.1.*
|
||||
- 4.4.*
|
||||
- '2019.1.*'
|
||||
- '2020.1.*'
|
||||
- '2020.3.*'
|
||||
- '2021.1.*'
|
||||
- '4.4.*'
|
||||
fixed_versions:
|
||||
- 2021.3 HF2
|
||||
- 2021.1 HF1
|
||||
- 2020.3 HF2
|
||||
- '2021.3 HF2'
|
||||
- '2021.1 HF1'
|
||||
- '2020.3 HF2'
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
investigated: ''
|
||||
|
@ -7053,7 +7053,7 @@ software:
|
|||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions:
|
||||
- All
|
||||
- 'All'
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
|
@ -7083,8 +7083,8 @@ software:
|
|||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions:
|
||||
- 9.13
|
||||
- 9.14
|
||||
- '9.13'
|
||||
- '9.14'
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
|
@ -7114,7 +7114,7 @@ software:
|
|||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions:
|
||||
- All
|
||||
- 'All'
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
|
|
|
@ -102,7 +102,9 @@ software:
|
|||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions:
|
||||
-Limited to deployments running Vertica, Cloudera, or Logstash
|
||||
- 'Vertica'
|
||||
- 'Cloudera'
|
||||
- 'Logstash'
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
|
@ -133,8 +135,8 @@ software:
|
|||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions:
|
||||
- Version >4.2
|
||||
- <4..2.12
|
||||
- '>4.2'
|
||||
- '<4..2.12'
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
|
@ -280,7 +282,7 @@ software:
|
|||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions:
|
||||
- 3.0.57
|
||||
- '3.0.57'
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
|
@ -310,7 +312,7 @@ software:
|
|||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions:
|
||||
- <7.4.3
|
||||
- '<7.4.3'
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
|
@ -372,7 +374,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- 21.04.0.5552
|
||||
- '21.04.0.5552'
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
|
|
@ -12,25 +12,25 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ">= 1.0.0"
|
||||
- '>= 1.0.0'
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ">= 1.0.0"
|
||||
- '>= 1.0.0'
|
||||
cve-2021-45046:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ">= 1.0.0"
|
||||
- '>= 1.0.0'
|
||||
cve-2021-45105:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- ">= 1.0.0"
|
||||
- '>= 1.0.0'
|
||||
vendor_links:
|
||||
- https://support.1password.com/kb/202112/
|
||||
notes: ''
|
||||
|
|
|
@ -767,13 +767,13 @@ software:
|
|||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions:
|
||||
- Cloud
|
||||
- 'Cloud'
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions:
|
||||
- Cloud
|
||||
- 'Cloud'
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
|
@ -798,13 +798,13 @@ software:
|
|||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions:
|
||||
- Cloud
|
||||
- 'Cloud'
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions:
|
||||
- Cloud
|
||||
- 'Cloud'
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
|
@ -830,13 +830,13 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- All
|
||||
- 'All'
|
||||
cve-2021-45046:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- All
|
||||
- 'All'
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -861,13 +861,13 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- All
|
||||
- 'All'
|
||||
cve-2021-45046:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- All
|
||||
- 'All'
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -892,13 +892,13 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- All
|
||||
- 'All'
|
||||
cve-2021-45046:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- All
|
||||
- 'All'
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -923,13 +923,13 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- All
|
||||
- 'All'
|
||||
cve-2021-45046:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- All
|
||||
- 'All'
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -954,13 +954,13 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- All
|
||||
- 'All'
|
||||
cve-2021-45046:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- All
|
||||
- 'All'
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -985,13 +985,13 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- All
|
||||
- 'All'
|
||||
cve-2021-45046:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- All
|
||||
- 'All'
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -1016,13 +1016,13 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- All
|
||||
- 'All'
|
||||
cve-2021-45046:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- All
|
||||
- 'All'
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -1047,13 +1047,13 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- All
|
||||
- 'All'
|
||||
cve-2021-45046:
|
||||
investigated: true
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- All
|
||||
- 'All'
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
|
|
@ -2584,7 +2584,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- All
|
||||
- 'All'
|
||||
cve-2021-45046:
|
||||
investigated: ''
|
||||
affected_versions: []
|
||||
|
|
Loading…
Reference in a new issue