mirror of
https://github.com/cisagov/log4j-affected-db.git
synced 2024-11-17 06:17:55 +00:00
Update Dell products through EMC PowerShell
This commit is contained in:
parent
ac0bbc41e4
commit
c7d20ebfde
1 changed files with 72 additions and 61 deletions
|
@ -3658,6 +3658,36 @@ software:
|
|||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: Dell OpenManage Enterprise
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions:
|
||||
- 'Versions before 3.8.2'
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
||||
notes: See DSA-2021-275
|
||||
references:
|
||||
- '[DSA-2021-275](https://www.dell.com/support/kbdoc/en-us/000194638/dsa-2021-275-dell-emc-openmanage-enterprise-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: Dell OpenManage Enterprise Modular
|
||||
cves:
|
||||
|
@ -3850,8 +3880,7 @@ software:
|
|||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions:
|
||||
- '"All versions up to Intelligent Catalog 38_356_00_r10.zip All versions
|
||||
up to Intelligent Catalog 38_362_00_r7.zip"'
|
||||
- ''
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
|
@ -3866,9 +3895,9 @@ software:
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
||||
notes: Patch pending
|
||||
notes: See DSA-2021-293.
|
||||
references:
|
||||
- ''
|
||||
- '[DSA-2021-293](https://www.dell.com/support/kbdoc/en-us/000194579/dsa-2021-293-dell-powerflex-appliance-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: Dell EMC PowerFlex Rack
|
||||
|
@ -3881,7 +3910,10 @@ software:
|
|||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions:
|
||||
- N/A
|
||||
- 'RCM 3.3 train - all versions up to 3.3.11.0'
|
||||
- 'RCM 3.4 train - all versions up to 3.4.6.0'
|
||||
- 'RCM 3.5 train - all versions up to 3.5.6.0'
|
||||
- 'RCM 3.6 train - all versions up to 3.6.2.0'
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
|
@ -3896,9 +3928,9 @@ software:
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
||||
notes: Patch pending
|
||||
notes: See DSA-2021-292.
|
||||
references:
|
||||
- ''
|
||||
- '[DSA-2021-292](https://www.dell.com/support/kbdoc/en-us/000194578/dsa-2021-292-dell-powerflex-rack-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: Dell EMC PowerFlex Software (SDS)
|
||||
|
@ -3911,7 +3943,15 @@ software:
|
|||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions:
|
||||
- '"3.5 3.5.1 3.5.1.1 3.5.1.2 3.5.1.3 3.5.1.4 3.6 3.6.0.1 3.6.0.2"'
|
||||
- '3.5'
|
||||
- '3.5.1'
|
||||
- '3.5.1.1'
|
||||
- '3.5.1.2'
|
||||
- '3.5.1.3'
|
||||
- '3.5.1.4'
|
||||
- '3.6'
|
||||
- '3.6.0.1'
|
||||
- '3.6.0.2'
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
|
@ -3926,9 +3966,9 @@ software:
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
||||
notes: Patch pending
|
||||
notes: See DSA-2021-272.
|
||||
references:
|
||||
- ''
|
||||
- '[DSA-2021-272](https://www.dell.com/support/kbdoc/en-us/000194548/dsa-2021-272-dell-powerflex-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: Dell EMC PowerPath
|
||||
|
@ -3943,7 +3983,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -3973,7 +4013,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -4003,7 +4043,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -4031,7 +4071,7 @@ software:
|
|||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions:
|
||||
- All versions 19.9 and earlier
|
||||
- 'All versions 19.9 and earlier'
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
|
@ -4046,9 +4086,9 @@ software:
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
||||
notes: Patch pending
|
||||
notes: See DSA-2021-286.
|
||||
references:
|
||||
- ''
|
||||
- '[DSA-2021-286](https://www.dell.com/support/kbdoc/en-us/000194549/dsa-2021-286-dell-emc-power-protect-data-manager-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: Dell EMC PowerProtect DP Series Appliance (iDPA)
|
||||
|
@ -4061,7 +4101,7 @@ software:
|
|||
cve-2021-44228:
|
||||
investigated: true
|
||||
affected_versions:
|
||||
- 2.7.0 and earlier
|
||||
- '2.7.0 and earlier'
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
|
@ -4076,9 +4116,9 @@ software:
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
||||
notes: Patch pending
|
||||
notes: See DSA 2021-285.
|
||||
references:
|
||||
- ''
|
||||
- '[DSA-2021-285](https://www.dell.com/support/kbdoc/en-us/000194532/dsa-2021-285-dell-emc-integrated-data-protection-appliance-powerprotect-dp-series-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228)'
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: Dell EMC PowerScale OneFS
|
||||
|
@ -4093,7 +4133,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -4123,7 +4163,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -4153,7 +4193,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -4183,7 +4223,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -4209,8 +4249,9 @@ software:
|
|||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
investigated: true
|
||||
affected_versions:
|
||||
- 'Versions before 2.0.1.3-1538564'
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
|
@ -4225,9 +4266,9 @@ software:
|
|||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
||||
notes: Patch expected by 12/23/21
|
||||
notes: See DSA-2021-295.
|
||||
references:
|
||||
- ''
|
||||
- '[DSA-2021-295](https://www.dell.com/support/kbdoc/en-us/000194739/dsa-2021-295-dell-emc-powerstore-family-security-update-for-apache-log4j-remote-code-execution-vulnerability-cve-2021-44228-and-cve-2021-45046)'
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: Dell EMC PowerVault MD3 Series Storage Arrays
|
||||
|
@ -4242,7 +4283,7 @@ software:
|
|||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions:
|
||||
- N/A
|
||||
- ''
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
|
@ -5095,7 +5136,7 @@ software:
|
|||
- ''
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: Dell Open Manage Mobile
|
||||
product: Dell OpenManage Mobile
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
|
@ -5125,7 +5166,7 @@ software:
|
|||
- ''
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: Dell Open Manage Server Administrator
|
||||
product: Dell OpenManage Server Administrator
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
|
@ -6773,37 +6814,7 @@ software:
|
|||
- ''
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: OpenManage Enterprise
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-44228:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45046:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
cve-2021-45105:
|
||||
investigated: false
|
||||
affected_versions: []
|
||||
fixed_versions: []
|
||||
unaffected_versions: []
|
||||
vendor_links:
|
||||
- https://www.dell.com/support/kbdoc/en-us/000194414/dell-response-to-apache-log4j-remote-code-execution-vulnerability
|
||||
notes: Patch expected by 12/19/21
|
||||
references:
|
||||
- ''
|
||||
last_updated: '2021-12-15T00:00:00'
|
||||
- vendor: Dell
|
||||
product: OpenManage Integration for Microsoft System Center for System Center
|
||||
Operations Manager
|
||||
product: OpenManage Integration for Microsoft System Center for System Center Operations Manager
|
||||
cves:
|
||||
cve-2021-4104:
|
||||
investigated: false
|
||||
|
|
Loading…
Reference in a new issue