@ -600,8 +600,8 @@ software:
- ''
last_updated : '2022-01-31T00:00:00'
- vendor : BBraun
product : Space Infusion Pump family (Infusomat Space Infusion Pump, Perfusor
Space Infusion
product : Space Infusion Pump family (Infusomat Space Infusion Pump, Perfusor Space
Infusion
cves:
cve-2021-4104:
investigated : false
@ -656,7 +656,8 @@ software:
unaffected_versions : [ ]
vendor_links:
- https://support.bctsoftware.com/hc/nl/signin?return_to=https%3A%2F%2Fsupport.bctsoftware.com%2Fhc%2Fnl%2Farticles%2F4413416591761
notes : This advisory is available to customer only and has not been reviewed by CISA.
notes : This advisory is available to customer only and has not been reviewed by
CISA.
references:
- ''
last_updated : '2021-12-20T00:00:00'
@ -686,7 +687,8 @@ software:
unaffected_versions : [ ]
vendor_links:
- https://support.bctsoftware.com/hc/nl/signin?return_to=https%3A%2F%2Fsupport.bctsoftware.com%2Fhc%2Fnl%2Farticles%2F4413416591761
notes : This advisory is available to customer only and has not been reviewed by CISA.
notes : This advisory is available to customer only and has not been reviewed by
CISA.
references:
- ''
last_updated : '2021-12-20T00:00:00'
@ -702,7 +704,7 @@ software:
investigated : true
affected_versions : [ ]
fixed_versions:
- '2.10.210'
- 2.10 .210
unaffected_versions : [ ]
cve-2021-45046:
investigated : false
@ -716,7 +718,8 @@ software:
unaffected_versions : [ ]
vendor_links:
- https://support.bctsoftware.com/hc/nl/signin?return_to=https%3A%2F%2Fsupport.bctsoftware.com%2Fhc%2Fnl%2Farticles%2F4413416591761
notes : This advisory is available to customer only and has not been reviewed by CISA.
notes : This advisory is available to customer only and has not been reviewed by
CISA.
references:
- ''
last_updated : '2021-12-20T00:00:00'
@ -746,7 +749,8 @@ software:
unaffected_versions : [ ]
vendor_links:
- https://support.bctsoftware.com/hc/nl/signin?return_to=https%3A%2F%2Fsupport.bctsoftware.com%2Fhc%2Fnl%2Farticles%2F4413416591761
notes : This advisory is available to customer only and has not been reviewed by CISA.
notes : This advisory is available to customer only and has not been reviewed by
CISA.
references:
- ''
last_updated : '2021-12-20T00:00:00'
@ -776,7 +780,8 @@ software:
unaffected_versions : [ ]
vendor_links:
- https://support.bctsoftware.com/hc/nl/signin?return_to=https%3A%2F%2Fsupport.bctsoftware.com%2Fhc%2Fnl%2Farticles%2F4413416591761
notes : This advisory is available to customer only and has not been reviewed by CISA.
notes : This advisory is available to customer only and has not been reviewed by
CISA.
references:
- ''
last_updated : '2021-12-20T00:00:00'
@ -792,7 +797,7 @@ software:
investigated : true
affected_versions : [ ]
fixed_versions:
- '1.125.3'
- 1.125 .3
unaffected_versions : [ ]
cve-2021-45046:
investigated : false
@ -806,7 +811,8 @@ software:
unaffected_versions : [ ]
vendor_links:
- https://support.bctsoftware.com/hc/nl/signin?return_to=https%3A%2F%2Fsupport.bctsoftware.com%2Fhc%2Fnl%2Farticles%2F4413416591761
notes : This advisory is available to customer only and has not been reviewed by CISA.
notes : This advisory is available to customer only and has not been reviewed by
CISA.
references:
- ''
last_updated : '2021-12-20T00:00:00'
@ -2011,7 +2017,7 @@ software:
- ''
last_updated : '2021-12-20T00:00:00'
- vendor : BD
product : BD FACSAria Fusion
product : BD FACS Lyse Wash Assistant
cves:
cve-2021-4104:
investigated : false
@ -2041,7 +2047,7 @@ software:
- ''
last_updated : '2021-12-20T00:00:00'
- vendor : BD
product : BD FACSAria II
product : BD FACS Sample Prep Assistant (SPA) I II
cves:
cve-2021-4104:
investigated : false
@ -2071,7 +2077,7 @@ software:
- ''
last_updated : '2021-12-20T00:00:00'
- vendor : BD
product : BD FACSAria III
product : BD FACS Workflow Manager
cves:
cve-2021-4104:
investigated : false
@ -2101,7 +2107,7 @@ software:
- ''
last_updated : '2021-12-20T00:00:00'
- vendor : BD
product : BD FACSCalibur
product : BD FACSAria Fusion
cves:
cve-2021-4104:
investigated : false
@ -2131,7 +2137,7 @@ software:
- ''
last_updated : '2021-12-20T00:00:00'
- vendor : BD
product : BD FACSCanto 10-color
product : BD FACSAria II
cves:
cve-2021-4104:
investigated : false
@ -2161,7 +2167,7 @@ software:
- ''
last_updated : '2021-12-20T00:00:00'
- vendor : BD
product : BD FACSCanto 10-color clinical
product : BD FACSAria III
cves:
cve-2021-4104:
investigated : false
@ -2191,7 +2197,7 @@ software:
- ''
last_updated : '2021-12-20T00:00:00'
- vendor : BD
product : BD FACSCanto II (w Diva 9.0)
product : BD FACSCalibur
cves:
cve-2021-4104:
investigated : false
@ -2221,7 +2227,7 @@ software:
- ''
last_updated : '2021-12-20T00:00:00'
- vendor : BD
product : BD FACSCanto II clinical
product : BD FACSCanto 10-color
cves:
cve-2021-4104:
investigated : false
@ -2251,7 +2257,7 @@ software:
- ''
last_updated : '2021-12-20T00:00:00'
- vendor : BD
product : BD FACSCelesta
product : BD FACSCanto 10-color clinical
cves:
cve-2021-4104:
investigated : false
@ -2281,7 +2287,7 @@ software:
- ''
last_updated : '2021-12-20T00:00:00'
- vendor : BD
product : BD FACSCount
product : BD FACSCanto II (w Diva 9.0)
cves:
cve-2021-4104:
investigated : false
@ -2311,7 +2317,7 @@ software:
- ''
last_updated : '2021-12-20T00:00:00'
- vendor : BD
product : BD FACSDuet
product : BD FACSCanto II clinical
cves:
cve-2021-4104:
investigated : false
@ -2341,7 +2347,7 @@ software:
- ''
last_updated : '2021-12-20T00:00:00'
- vendor : BD
product : BD FACSLink
product : BD FACSCelesta
cves:
cve-2021-4104:
investigated : false
@ -2371,7 +2377,7 @@ software:
- ''
last_updated : '2021-12-20T00:00:00'
- vendor : BD
product : BD FACSLyric
product : BD FACSCount
cves:
cve-2021-4104:
investigated : false
@ -2401,7 +2407,7 @@ software:
- ''
last_updated : '2021-12-20T00:00:00'
- vendor : BD
product : BD FACSMelody
product : BD FACSDuet
cves:
cve-2021-4104:
investigated : false
@ -2431,7 +2437,7 @@ software:
- ''
last_updated : '2021-12-20T00:00:00'
- vendor : BD
product : BD FACSPresto
product : BD FACSLink
cves:
cve-2021-4104:
investigated : false
@ -2461,7 +2467,7 @@ software:
- ''
last_updated : '2021-12-20T00:00:00'
- vendor : BD
product : BD FACSVerse
product : BD FACSLyric
cves:
cve-2021-4104:
investigated : false
@ -2491,7 +2497,7 @@ software:
- ''
last_updated : '2021-12-20T00:00:00'
- vendor : BD
product : BD FACSVia
product : BD FACSMelody
cves:
cve-2021-4104:
investigated : false
@ -2521,7 +2527,7 @@ software:
- ''
last_updated : '2021-12-20T00:00:00'
- vendor : BD
product : BD FACSymphony A1
product : BD FACSPresto
cves:
cve-2021-4104:
investigated : false
@ -2551,7 +2557,7 @@ software:
- ''
last_updated : '2021-12-20T00:00:00'
- vendor : BD
product : BD FACSymphony A3
product : BD FACSVerse
cves:
cve-2021-4104:
investigated : false
@ -2581,7 +2587,7 @@ software:
- ''
last_updated : '2021-12-20T00:00:00'
- vendor : BD
product : BD FACSymphony A5
product : BD FACSVia
cves:
cve-2021-4104:
investigated : false
@ -2611,7 +2617,7 @@ software:
- ''
last_updated : '2021-12-20T00:00:00'
- vendor : BD
product : BD FACSymphony S6
product : BD FACSymphony A1
cves:
cve-2021-4104:
investigated : false
@ -2641,7 +2647,7 @@ software:
- ''
last_updated : '2021-12-20T00:00:00'
- vendor : BD
product : BD FACS Lyse Wash Assistant
product : BD FACSymphony A3
cves:
cve-2021-4104:
investigated : false
@ -2671,7 +2677,7 @@ software:
- ''
last_updated : '2021-12-20T00:00:00'
- vendor : BD
product : BD FACS Sample Prep Assistant (SPA) III
product : BD FACSymphony A5
cves:
cve-2021-4104:
investigated : false
@ -2701,7 +2707,7 @@ software:
- ''
last_updated : '2021-12-20T00:00:00'
- vendor : BD
product : BD FACS Workflow Manager
product : BD FACSymphony S6
cves:
cve-2021-4104:
investigated : false
@ -2971,7 +2977,7 @@ software:
- ''
last_updated : '2021-12-20T00:00:00'
- vendor : BD
product : BD Intelliport Medication Management System
product : BD Intelliport
cves:
cve-2021-4104:
investigated : false
@ -3001,7 +3007,7 @@ software:
- ''
last_updated : '2021-12-20T00:00:00'
- vendor : BD
product : BD Inventory Connect
product : BD Intelliport Medication Management System
cves:
cve-2021-4104:
investigated : false
@ -3031,7 +3037,7 @@ software:
- ''
last_updated : '2021-12-20T00:00:00'
- vendor : BD
product : BD Intellipor t
product : BD Inventory Connec t
cves:
cve-2021-4104:
investigated : false
@ -4081,7 +4087,7 @@ software:
- ''
last_updated : '2021-12-20T00:00:00'
- vendor : BD
product : BD Rowa Dose (Windows 7 Workstations only )
product : BD Rowa Dose (Windows 10 platform )
cves:
cve-2021-4104:
investigated : false
@ -4111,7 +4117,7 @@ software:
- ''
last_updated : '2021-12-20T00:00:00'
- vendor : BD
product : BD Rowa Dose (Windows 10 platform )
product : BD Rowa Dose (Windows 7 Workstations only )
cves:
cve-2021-4104:
investigated : false
@ -7385,7 +7391,7 @@ software:
affected_versions : [ ]
fixed_versions : [ ]
unaffected_versions:
- 'All'
- All
cve-2021-45046:
investigated : false
affected_versions : [ ]
@ -7801,7 +7807,7 @@ software:
affected_versions : [ ]
fixed_versions : [ ]
unaffected_versions:
- 'All'
- All
cve-2021-45046:
investigated : false
affected_versions : [ ]
@ -7889,7 +7895,7 @@ software:
investigated : true
affected_versions : [ ]
fixed_versions:
- 'All'
- All
unaffected_versions : [ ]
cve-2021-45046:
investigated : false
@ -7903,7 +7909,8 @@ software:
unaffected_versions : [ ]
vendor_links:
- https://login.blackberry.com/sso/SSORedirect/metaAlias/idp?SAMLRequest=fZNdc6owEIb%2FCpN7JFIqlal2KKio%2BFGgar05EyCWKCRAgqK%2F%2FlA9zvT0ojuzF5l9s%2B9u5snzS52l0hGXnDDaA%2B0WBBKmEYsJ%2FeyB92AoP4GX%2FjNHWZobZiUS6uGiwlxIzT3KjWuhB6qSGgxxwg2KMswNERm%2BOXMNtQWNvGSCRSwFksk5LkVjZDHKqwyXPi6PJMLvntsDiRA5NxSFV3nOStEKUxQdQlyW51bEMqXJrKJEnJWUfRL6wlkPQvuhA68Rdi8XINnNXIQicV3l3u8q%2F9mNc6b4%2FsLDMSlxJJQMC2SmBHGFxDmQxnYP%2FFEts4mNvEhOfDSzzdPP%2FCrr9vFjMig0OBtGswiZ52H6mK9Gbtev5FnViZ2HV3dnV3lSOPvSn2YCboaeFV5Q4Yx2K%2FQ%2B1RcPUzWin0%2F7j%2FlEI1OtULfqpNnC8arkIjaD3X6%2BtlVvF8JJvQqznJlx4MfWIQuC1HJhklLH1m2vA9PHbjgSaB2K3YbND5a3X2%2BLfD48DbofVaIlfBSiLt5qS67P6pW87%2FD4SAaqfDzVzLbrQWGdhq7pkG6AdNt0k4ofMj1Zs7Jeio4%2FpuQURwMtHC%2BdGtZvRVD7Vg7jt%2Ba1OK%2FwmHKBqOgBFaqqDFW5%2FRi0dQO2DbXb0qC6BdLyHwivhN7w%2Bo2a8CbihhMES3m58AMgre6YNgJwg9K4mpffaPy9LbojCPp3QL6hkZ1bHKWY71gZ4S9QnpVvJv3b6f9%2F0P8L&RelayState=%2Fcommunity%2Fs%2Farticle%2F90708&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&Signature=ThznbsjgVwDX5E2fOcNREcaH%2FaSSD9EIp6MP3c9O9BRVFL%2BETG3n1WQKapplpISRgUkLEs2XvRpJ4%2FfEmynkr5laH4rrAIgMNL%2FauqYIGWvzbdzfp44PkOGUBkHxgo52GjhshHBPyHqJjnvzIoNyIK2zhDBQXevq9etV7wnX7SprJpHX%2B6Ivskj5wAXJzi9SiMafMvUiUFyVq9YBhzd2ZpiTyiYia%2Bdgq4Z74sUIqOyz6bn2KjCKT%2FMqeFqyYYp5JU9CnQk%2BHAH2juQU%2F8MlrGtrRRtgf6fACGMOGria0Vu1wUDwnJiSdI%2BZSzShr%2Fg6Cl9mfaKuTItwlxiqQlbx7hvHEhgg2SNqyrRnJDzpYImSeIMjgHuUy2Iaf6O6J90GdKF4%2BDkCpyXVsm%2FkZhBA6D7uo9rj8tPfE7ml6Njhm9pFZxjuicbCI%2F4Zj66aC52RlpUZwlMgS2HpXOdbILUX8H2FXnm%2FCjDHEDGv49HusCmQehes1g0LzTXXwKkC1hWOYjwWb8uxNneaR0e552R6fjRns%2B2kG04C%2B8COLbJ7v7s3WlUDGBN%2BUa%2BE5q0QNpIYmIW1daXmOx%2FXRBoBdBwWZ1b3GtaBmRiEarb4rF1DgKa9P3SdQBb1M6SvjprcyHRtai7AxnIBW1KMFWB6mETzESVSFwO5KA80co5Aau7HfhM%3D
notes : This advisory is available to customer only and has not been reviewed by CISA.
notes : This advisory is available to customer only and has not been reviewed by
CISA.
references:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
@ -7919,7 +7926,7 @@ software:
investigated : true
affected_versions : [ ]
fixed_versions:
- '2.12 and above'
- 2.12 and above
unaffected_versions : [ ]
cve-2021-45046:
investigated : false
@ -7933,7 +7940,8 @@ software:
unaffected_versions : [ ]
vendor_links:
- https://login.blackberry.com/sso/SSORedirect/metaAlias/idp?SAMLRequest=fZNdc6owEIb%2FCpN7JFIqlal2KKio%2BFGgar05EyCWKCRAgqK%2F%2FlA9zvT0ojuzF5l9s%2B9u5snzS52l0hGXnDDaA%2B0WBBKmEYsJ%2FeyB92AoP4GX%2FjNHWZobZiUS6uGiwlxIzT3KjWuhB6qSGgxxwg2KMswNERm%2BOXMNtQWNvGSCRSwFksk5LkVjZDHKqwyXPi6PJMLvntsDiRA5NxSFV3nOStEKUxQdQlyW51bEMqXJrKJEnJWUfRL6wlkPQvuhA68Rdi8XINnNXIQicV3l3u8q%2F9mNc6b4%2FsLDMSlxJJQMC2SmBHGFxDmQxnYP%2FFEts4mNvEhOfDSzzdPP%2FCrr9vFjMig0OBtGswiZ52H6mK9Gbtev5FnViZ2HV3dnV3lSOPvSn2YCboaeFV5Q4Yx2K%2FQ%2B1RcPUzWin0%2F7j%2FlEI1OtULfqpNnC8arkIjaD3X6%2BtlVvF8JJvQqznJlx4MfWIQuC1HJhklLH1m2vA9PHbjgSaB2K3YbND5a3X2%2BLfD48DbofVaIlfBSiLt5qS67P6pW87%2FD4SAaqfDzVzLbrQWGdhq7pkG6AdNt0k4ofMj1Zs7Jeio4%2FpuQURwMtHC%2BdGtZvRVD7Vg7jt%2Ba1OK%2FwmHKBqOgBFaqqDFW5%2FRi0dQO2DbXb0qC6BdLyHwivhN7w%2Bo2a8CbihhMES3m58AMgre6YNgJwg9K4mpffaPy9LbojCPp3QL6hkZ1bHKWY71gZ4S9QnpVvJv3b6f9%2F0P8L&RelayState=%2Fcommunity%2Fs%2Farticle%2F90708&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&Signature=ThznbsjgVwDX5E2fOcNREcaH%2FaSSD9EIp6MP3c9O9BRVFL%2BETG3n1WQKapplpISRgUkLEs2XvRpJ4%2FfEmynkr5laH4rrAIgMNL%2FauqYIGWvzbdzfp44PkOGUBkHxgo52GjhshHBPyHqJjnvzIoNyIK2zhDBQXevq9etV7wnX7SprJpHX%2B6Ivskj5wAXJzi9SiMafMvUiUFyVq9YBhzd2ZpiTyiYia%2Bdgq4Z74sUIqOyz6bn2KjCKT%2FMqeFqyYYp5JU9CnQk%2BHAH2juQU%2F8MlrGtrRRtgf6fACGMOGria0Vu1wUDwnJiSdI%2BZSzShr%2Fg6Cl9mfaKuTItwlxiqQlbx7hvHEhgg2SNqyrRnJDzpYImSeIMjgHuUy2Iaf6O6J90GdKF4%2BDkCpyXVsm%2FkZhBA6D7uo9rj8tPfE7ml6Njhm9pFZxjuicbCI%2F4Zj66aC52RlpUZwlMgS2HpXOdbILUX8H2FXnm%2FCjDHEDGv49HusCmQehes1g0LzTXXwKkC1hWOYjwWb8uxNneaR0e552R6fjRns%2B2kG04C%2B8COLbJ7v7s3WlUDGBN%2BUa%2BE5q0QNpIYmIW1daXmOx%2FXRBoBdBwWZ1b3GtaBmRiEarb4rF1DgKa9P3SdQBb1M6SvjprcyHRtai7AxnIBW1KMFWB6mETzESVSFwO5KA80co5Aau7HfhM%3D
notes : This advisory is available to customer only and has not been reviewed by CISA.
notes : This advisory is available to customer only and has not been reviewed by
CISA.
references:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
@ -7949,7 +7957,7 @@ software:
investigated : true
affected_versions : [ ]
fixed_versions:
- 'All'
- All
unaffected_versions : [ ]
cve-2021-45046:
investigated : false
@ -7963,7 +7971,8 @@ software:
unaffected_versions : [ ]
vendor_links:
- https://login.blackberry.com/sso/SSORedirect/metaAlias/idp?SAMLRequest=fZNdc6owEIb%2FCpN7JFIqlal2KKio%2BFGgar05EyCWKCRAgqK%2F%2FlA9zvT0ojuzF5l9s%2B9u5snzS52l0hGXnDDaA%2B0WBBKmEYsJ%2FeyB92AoP4GX%2FjNHWZobZiUS6uGiwlxIzT3KjWuhB6qSGgxxwg2KMswNERm%2BOXMNtQWNvGSCRSwFksk5LkVjZDHKqwyXPi6PJMLvntsDiRA5NxSFV3nOStEKUxQdQlyW51bEMqXJrKJEnJWUfRL6wlkPQvuhA68Rdi8XINnNXIQicV3l3u8q%2F9mNc6b4%2FsLDMSlxJJQMC2SmBHGFxDmQxnYP%2FFEts4mNvEhOfDSzzdPP%2FCrr9vFjMig0OBtGswiZ52H6mK9Gbtev5FnViZ2HV3dnV3lSOPvSn2YCboaeFV5Q4Yx2K%2FQ%2B1RcPUzWin0%2F7j%2FlEI1OtULfqpNnC8arkIjaD3X6%2BtlVvF8JJvQqznJlx4MfWIQuC1HJhklLH1m2vA9PHbjgSaB2K3YbND5a3X2%2BLfD48DbofVaIlfBSiLt5qS67P6pW87%2FD4SAaqfDzVzLbrQWGdhq7pkG6AdNt0k4ofMj1Zs7Jeio4%2FpuQURwMtHC%2BdGtZvRVD7Vg7jt%2Ba1OK%2FwmHKBqOgBFaqqDFW5%2FRi0dQO2DbXb0qC6BdLyHwivhN7w%2Bo2a8CbihhMES3m58AMgre6YNgJwg9K4mpffaPy9LbojCPp3QL6hkZ1bHKWY71gZ4S9QnpVvJv3b6f9%2F0P8L&RelayState=%2Fcommunity%2Fs%2Farticle%2F90708&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&Signature=ThznbsjgVwDX5E2fOcNREcaH%2FaSSD9EIp6MP3c9O9BRVFL%2BETG3n1WQKapplpISRgUkLEs2XvRpJ4%2FfEmynkr5laH4rrAIgMNL%2FauqYIGWvzbdzfp44PkOGUBkHxgo52GjhshHBPyHqJjnvzIoNyIK2zhDBQXevq9etV7wnX7SprJpHX%2B6Ivskj5wAXJzi9SiMafMvUiUFyVq9YBhzd2ZpiTyiYia%2Bdgq4Z74sUIqOyz6bn2KjCKT%2FMqeFqyYYp5JU9CnQk%2BHAH2juQU%2F8MlrGtrRRtgf6fACGMOGria0Vu1wUDwnJiSdI%2BZSzShr%2Fg6Cl9mfaKuTItwlxiqQlbx7hvHEhgg2SNqyrRnJDzpYImSeIMjgHuUy2Iaf6O6J90GdKF4%2BDkCpyXVsm%2FkZhBA6D7uo9rj8tPfE7ml6Njhm9pFZxjuicbCI%2F4Zj66aC52RlpUZwlMgS2HpXOdbILUX8H2FXnm%2FCjDHEDGv49HusCmQehes1g0LzTXXwKkC1hWOYjwWb8uxNneaR0e552R6fjRns%2B2kG04C%2B8COLbJ7v7s3WlUDGBN%2BUa%2BE5q0QNpIYmIW1daXmOx%2FXRBoBdBwWZ1b3GtaBmRiEarb4rF1DgKa9P3SdQBb1M6SvjprcyHRtai7AxnIBW1KMFWB6mETzESVSFwO5KA80co5Aau7HfhM%3D
notes : This advisory is available to customer only and has not been reviewed by CISA.
notes : This advisory is available to customer only and has not been reviewed by
CISA.
references:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
@ -8009,8 +8018,8 @@ software:
affected_versions : [ ]
fixed_versions : [ ]
unaffected_versions:
- '3.5.x'
- '4.x'
- 3.5 .x
- 4. x
cve-2021-45046:
investigated : false
affected_versions : [ ]
@ -8023,7 +8032,8 @@ software:
unaffected_versions : [ ]
vendor_links:
- https://twitter.com/bluemind/status/1470379923034578946?s=20A
notes : This advisory is available to customer only and has not been reviewed by CISA.
notes : This advisory is available to customer only and has not been reviewed by
CISA.
references:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
@ -8236,36 +8246,6 @@ software:
references:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC Application Accelerator for IMS
cves:
cve-2021-4104:
investigated : false
affected_versions : [ ]
fixed_versions : [ ]
unaffected_versions : [ ]
cve-2021-44228:
investigated : true
affected_versions : [ ]
fixed_versions : [ ]
unaffected_versions:
- ''
cve-2021-45046:
investigated : false
affected_versions : [ ]
fixed_versions : [ ]
unaffected_versions : [ ]
cve-2021-45105:
investigated : false
affected_versions : [ ]
fixed_versions : [ ]
unaffected_versions : [ ]
vendor_links:
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
notes : ''
references:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC AMI Apptune for Db2
cves:
@ -8867,7 +8847,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC AMI Integrity for IMS
product : BMC AMI Database Performance for Db2
cves:
cve-2021-4104:
investigated : false
@ -8897,7 +8877,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC AMI Database Performance for Db2
product : BMC AMI Datastream for Ops
cves:
cve-2021-4104:
investigated : false
@ -8927,7 +8907,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC AMI Datastream for Ops
product : BMC AMI Defender for Db2
cves:
cve-2021-4104:
investigated : false
@ -8957,7 +8937,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC AMI Defender for Db2
product : BMC AMI Defender for IMS
cves:
cve-2021-4104:
investigated : false
@ -8987,7 +8967,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC AMI Defender for IMS
product : BMC AMI Defender for McAfee DAM
cves:
cve-2021-4104:
investigated : false
@ -9017,7 +8997,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC AMI Defender for McAfee DAM
product : BMC AMI Defender for Ops Insight
cves:
cve-2021-4104:
investigated : false
@ -9047,7 +9027,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC AMI Defender for Ops Insight
product : BMC AMI Defender for z/Linux
cves:
cve-2021-4104:
investigated : false
@ -9077,7 +9057,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC AMI Defender for z/Linux
product : BMC AMI Defender for z/OS
cves:
cve-2021-4104:
investigated : false
@ -9107,7 +9087,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC AMI Defender for z/OS
product : BMC AMI Defender for z/OS GSIP Package
cves:
cve-2021-4104:
investigated : false
@ -9137,7 +9117,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC AMI Defender for z/OS GSIP Package
product : BMC AMI Defender TCP/IP Receiver
cves:
cve-2021-4104:
investigated : false
@ -9197,7 +9177,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC AMI Defender TCP/IP Receiver
product : BMC AMI DevOps for Db2
cves:
cve-2021-4104:
investigated : false
@ -9227,7 +9207,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC AMI DevOps for Db2
product : BMC AMI Energizer for IMS Connect
cves:
cve-2021-4104:
investigated : false
@ -9257,7 +9237,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC AMI Energizer for IMS Connect
product : BMC AMI Enterprise Connector
cves:
cve-2021-4104:
investigated : false
@ -9287,7 +9267,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC AMI Enterprise Connector
product : BMC AMI Extended Terminal Assist for IMS
cves:
cve-2021-4104:
investigated : false
@ -9317,7 +9297,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC AMI Extended Terminal Assist for IMS
product : BMC AMI Fast Path Indexer for IMS
cves:
cve-2021-4104:
investigated : false
@ -9347,7 +9327,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC AMI Fast Path Index er for IMS
product : BMC AMI Fast Path Online Analyz er for IMS
cves:
cve-2021-4104:
investigated : false
@ -9377,7 +9357,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC AMI Fast Path Online Analyzer for IMS
product : BMC AMI Fast Path Online Image Copy for IMS
cves:
cve-2021-4104:
investigated : false
@ -9407,7 +9387,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC AMI Fast Path Online Image Copy for IMS
product : BMC AMI Fast Path Online Reorg for IMS
cves:
cve-2021-4104:
investigated : false
@ -9437,7 +9417,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC AMI Fast Path Online Reorg for IMS
product : BMC AMI Fast Path Online Restructure for IMS
cves:
cve-2021-4104:
investigated : false
@ -9467,7 +9447,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC AMI Fast Path Online Restructure for IMS
product : BMC AMI Fast Path Recovery for IMS
cves:
cve-2021-4104:
investigated : false
@ -9497,7 +9477,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC AMI Fast Path Recovery for IMS
product : BMC AMI Fast Path Restart for IMS
cves:
cve-2021-4104:
investigated : false
@ -9527,7 +9507,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC AMI Fast Path Restart for IMS
product : BMC AMI Integrity for IMS
cves:
cve-2021-4104:
investigated : false
@ -10847,7 +10827,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC AMI Utlities for Db2
product : BMC AMI Utility Mangement for Db2
cves:
cve-2021-4104:
investigated : false
@ -10877,7 +10857,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC AMI Utility Mangement for Db2
product : BMC AMI Utility Mangemer for Db2
cves:
cve-2021-4104:
investigated : false
@ -10907,7 +10887,37 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC AMI Utility Mangemer for Db2
product : BMC AMI Utlities for Db2
cves:
cve-2021-4104:
investigated : false
affected_versions : [ ]
fixed_versions : [ ]
unaffected_versions : [ ]
cve-2021-44228:
investigated : true
affected_versions : [ ]
fixed_versions : [ ]
unaffected_versions:
- ''
cve-2021-45046:
investigated : false
affected_versions : [ ]
fixed_versions : [ ]
unaffected_versions : [ ]
cve-2021-45105:
investigated : false
affected_versions : [ ]
fixed_versions : [ ]
unaffected_versions : [ ]
vendor_links:
- https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability
notes : ''
references:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC Application Accelerator for IMS
cves:
cve-2021-4104:
investigated : false
@ -12377,7 +12387,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC Digital Workplace Basic (DWP )
product : BMC Digital Workplace Advanced (DWPA )
cves:
cve-2021-4104:
investigated : false
@ -12407,7 +12417,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC Digital Workplace Catalog (DWPC )
product : BMC Digital Workplace Basic (DWP )
cves:
cve-2021-4104:
investigated : false
@ -12437,7 +12447,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC Digital Workplace Advanced (DWPA )
product : BMC Digital Workplace Catalog (DWPC )
cves:
cve-2021-4104:
investigated : false
@ -12719,7 +12729,7 @@ software:
affected_versions : [ ]
fixed_versions : [ ]
unaffected_versions:
- '21.x and below'
- 21. x and below
cve-2021-45046:
investigated : false
affected_versions : [ ]
@ -12748,7 +12758,7 @@ software:
investigated : true
affected_versions : [ ]
fixed_versions:
- '21.x'
- 21. x
unaffected_versions : [ ]
cve-2021-45046:
investigated : false
@ -13247,7 +13257,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC PATROL for Sybase
product : BMC PATROL for Linux KM
cves:
cve-2021-4104:
investigated : false
@ -13277,7 +13287,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : BMC PATROL for Linux KM
product : BMC PATROL for Sybase
cves:
cve-2021-4104:
investigated : false
@ -14747,7 +14757,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : FASTCPK
product : FASTCOPY
cves:
cve-2021-4104:
investigated : false
@ -14777,7 +14787,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : FASTCOPY
product : FASTCPK
cves:
cve-2021-4104:
investigated : false
@ -15467,7 +15477,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : Release Process Manage ment
product : Release Package and Deploy ment
cves:
cve-2021-4104:
investigated : false
@ -15497,7 +15507,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : BMC
product : Release Package and Deploy ment
product : Release Process Manage ment
cves:
cve-2021-4104:
investigated : false
@ -15857,7 +15867,7 @@ software:
- ''
last_updated : '2022-01-12T07:18:50+00:00'
- vendor : Bosch
product : Bosch IoT Suite
product : Bosch IoT Gateway
cves:
cve-2021-4104:
investigated : false
@ -15868,7 +15878,7 @@ software:
investigated : true
affected_versions : [ ]
fixed_versions:
- ''
- 3.7 .0
unaffected_versions : [ ]
cve-2021-45046:
investigated : false
@ -15881,13 +15891,13 @@ software:
fixed_versions : [ ]
unaffected_versions : [ ]
vendor_links:
- https://bosch-iot-suite.com/news/apache-log4j-rce-vulnerability/
- https://psirt.bosch.com/security-advisories/bosch-sa-572602.html
notes : ''
references:
- ''
last_updated : '2021-12-22T00:00:00'
- vendor : Bosch
product : Bosch IoT Gateway
product : Bosch IoT Suite
cves:
cve-2021-4104:
investigated : false
@ -15898,7 +15908,7 @@ software:
investigated : true
affected_versions : [ ]
fixed_versions:
- '3.7.0 '
- ''
unaffected_versions : [ ]
cve-2021-45046:
investigated : false
@ -15911,7 +15921,7 @@ software:
fixed_versions : [ ]
unaffected_versions : [ ]
vendor_links:
- https://psirt.bosch.com/security-advisories/bosch-sa-572602.html
- https://bosch-iot-suite.com/news/apache-log4j-rce-vulnerability/
notes : ''
references:
- ''
@ -15958,7 +15968,7 @@ software:
investigated : true
affected_versions : [ ]
fixed_versions:
- '1.0.32'
- 1.0 .32
unaffected_versions : [ ]
cve-2021-45046:
investigated : false
@ -16572,8 +16582,8 @@ software:
affected_versions : [ ]
fixed_versions:
- '9.1'
- '9.1.01'
- '9.1.02'
- 9.1 .01
- 9.1 .02
unaffected_versions : [ ]
cve-2021-45046:
investigated : false
@ -17263,9 +17273,9 @@ software:
- '4.4'
- '4.5'
- '5.0'
- '5.0 CR1'
- '5.0.2'
- '5.0.2.1'
- 5.0 CR1
- 5.0 .2
- 5.0 .2 .1
unaffected_versions : [ ]
cve-2021-45046:
investigated : false
@ -17295,7 +17305,7 @@ software:
investigated : true
affected_versions : [ ]
fixed_versions:
- '5.0.3'
- 5.0 .3
unaffected_versions : [ ]
cve-2021-45046:
investigated : false
@ -17358,7 +17368,7 @@ software:
affected_versions : [ ]
fixed_versions:
- '5.4'
- '5.1 - 5.3 (EOS)'
- 5.1 - 5.3 (EOS)
unaffected_versions : [ ]
cve-2021-45046:
investigated : false
@ -17418,7 +17428,7 @@ software:
investigated : true
affected_versions : [ ]
fixed_versions:
- '2.3.10'
- 2.3 .10
unaffected_versions : [ ]
cve-2021-45046:
investigated : false
@ -17808,12 +17818,12 @@ software:
investigated : true
affected_versions : [ ]
fixed_versions:
- '12.8.x Policy Server'
- '12.8.04 or later Administrative UI'
- '12.8.x Access Gateway'
- '12.8.x SDK'
- '12.7 ASA Agents'
- '12.8 ASA Agents'
- 12.8 .x Policy Server
- 12.8 .04 or later Administrative UI
- 12.8 .x Access Gateway
- 12.8 .x SDK
- 12.7 ASA Agents
- 12.8 ASA Agents
unaffected_versions : [ ]
cve-2021-45046:
investigated : false
@ -17874,8 +17884,8 @@ software:
affected_versions : [ ]
fixed_versions:
- '9.1'
- '9.1.01'
- '9.1.02'
- 9.1 .01
- 9.1 .02
unaffected_versions : [ ]
cve-2021-45046:
investigated : false
@ -17995,10 +18005,10 @@ software:
investigated : true
affected_versions : [ ]
fixed_versions:
- '4.6.0'
- '4.6.5'
- '4.6.7'
- '4.6.8'
- 4.6 .0
- 4.6 .5
- 4.6 .7
- 4.6 .8
unaffected_versions : [ ]
cve-2021-45046:
investigated : false
@ -18300,9 +18310,9 @@ software:
investigated : true
affected_versions : [ ]
fixed_versions:
- '3.4.6'
- 3.4 .6
- '4.0'
- '4.0.1'
- 4.0 .1
unaffected_versions : [ ]
cve-2021-45046:
investigated : false
@ -18362,7 +18372,7 @@ software:
investigated : true
affected_versions : [ ]
fixed_versions:
- '12.9.x'
- 12.9 .x
- '14.0'
unaffected_versions : [ ]
cve-2021-45046:
@ -18483,7 +18493,7 @@ software:
investigated : true
affected_versions : [ ]
fixed_versions:
- '3.6.2.4'
- 3.6 .2 .4
unaffected_versions : [ ]
cve-2021-45046:
investigated : false