Generate the individual YAML files that are to be edited and then generate the initial comprehensive YAML file that is used to generate the Markdown file for display.pull/433/head
parent
a92c5fbbf6
commit
ff14b54693
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -0,0 +1,326 @@ |
|||||||
|
--- |
||||||
|
version: '1.0' |
||||||
|
owners: |
||||||
|
- name: cisagov |
||||||
|
url: https://github.com/cisagov/log4j-affected-db |
||||||
|
software: |
||||||
|
- vendor: K15t |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://help.k15t.com/k15t-apps-and-log4shell-193401141.html |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:54+00:00' |
||||||
|
- vendor: K6 |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://k6.io/blog/k6-products-not-impacted-by-cve-2021-44228/ |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:54+00:00' |
||||||
|
- vendor: Karakun |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://board.karakun.com/viewtopic.php?f=21&t=8351 |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:54+00:00' |
||||||
|
- vendor: Kaseya |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:54+00:00' |
||||||
|
- vendor: Keeper Security |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.keepersecurity.com/blog/2021/12/15/public-notice-regarding-the-apache-foundation-log4j-vulnerability/ |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:54+00:00' |
||||||
|
- vendor: KEMP |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://support.kemptechnologies.com/hc/en-us/articles/4416430695437-CVE-2021-44228-Log4j2-Exploit |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:54+00:00' |
||||||
|
- vendor: KEMP 2 |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://support.kemptechnologies.com/hc/en-us/articles/4416473820045-Progress-Kemp-LoadMaster-protects-from-security-vulnerability-Apache-Log4j-2-CVE-2021-44228- |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:54+00:00' |
||||||
|
- vendor: Kofax |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://knowledge.kofax.com/MFD_Productivity/SafeCom/Product_Information/SafeCom_and_Log4j_vulnerability_(CVE-2021-44228) |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:54+00:00' |
||||||
|
- vendor: Konica Minolta |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.konicaminolta.de/de-de/support/log4j |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:54+00:00' |
||||||
|
- vendor: Kronos UKG |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://community.kronos.com/s/feed/0D54M00004wJKHiSAO?language=en_US |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:54+00:00' |
||||||
|
- vendor: Kyberna |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.kyberna.com/detail/log4j-sicherheitsluecke |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:54+00:00' |
||||||
|
... |
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -0,0 +1,153 @@ |
|||||||
|
--- |
||||||
|
version: '1.0' |
||||||
|
owners: |
||||||
|
- name: cisagov |
||||||
|
url: https://github.com/cisagov/log4j-affected-db |
||||||
|
software: |
||||||
|
- vendor: 1Password |
||||||
|
product: All products |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://support.1password.com/kb/202112/ |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-23T00:00:00' |
||||||
|
- vendor: 2n |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.2n.com/cs_CZ/novinky/produkty-2n-neohrozuje-zranitelnost-cve-2021-44228-komponenty-log4j-2 |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:50+00:00' |
||||||
|
- vendor: 3CX |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.3cx.com/community/threads/log4j-vulnerability-cve-2021-44228.86436/#post-407911 |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:50+00:00' |
||||||
|
- vendor: 3M Health Information Systems |
||||||
|
product: CGS |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://support.3mhis.com/app/account/updates/ri/5210 |
||||||
|
notes: This advisory is available to customer only and has not been reviewed by |
||||||
|
CISA. |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-15T00:00:00' |
||||||
|
- vendor: 7-Zip |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://sourceforge.net/p/sevenzip/discussion/45797/thread/b977bbd4d1 |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:50+00:00' |
||||||
|
... |
File diff suppressed because it is too large
Load Diff
@ -0,0 +1,39 @@ |
|||||||
|
--- |
||||||
|
version: '1.0' |
||||||
|
owners: |
||||||
|
- name: cisagov |
||||||
|
url: https://github.com/cisagov/log4j-affected-db |
||||||
|
software: |
||||||
|
- vendor: PagerDuty |
||||||
|
product: PagerDuty SaaS |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://support.pagerduty.com/docs/pagerduty-log4j-zero-day-vulnerability |
||||||
|
notes: We currently see no evidence of compromises on our platform. Our teams |
||||||
|
continue to monitor for new developments and for impacts on sub-processors and |
||||||
|
dependent systems. PagerDuty SaaS customers do not need to take any additional |
||||||
|
action for their PagerDuty SaaS environment |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-21T00:00:00' |
||||||
|
... |
@ -0,0 +1,330 @@ |
|||||||
|
--- |
||||||
|
version: '1.0' |
||||||
|
owners: |
||||||
|
- name: cisagov |
||||||
|
url: https://github.com/cisagov/log4j-affected-db |
||||||
|
software: |
||||||
|
- vendor: QF-Test |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.qfs.de/en/blog/article/no-log4j-vulnerability-in-qf-test.html |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:55+00:00' |
||||||
|
- vendor: Qlik |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368 |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:55+00:00' |
||||||
|
- vendor: QMATIC |
||||||
|
product: Orchestra Central |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: true |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: |
||||||
|
- 6.0+ |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.qmatic.com/meet-qmatic/news/qmatic-statement-on-log4j-vulnerability |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-21T00:00:00' |
||||||
|
- vendor: QMATIC |
||||||
|
product: Appointment Booking |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: true |
||||||
|
affected_versions: |
||||||
|
- 2.4+ |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.qmatic.com/meet-qmatic/news/qmatic-statement-on-log4j-vulnerability |
||||||
|
notes: Update to v. 2.8.2 which contains log4j 2.16 |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-21T00:00:00' |
||||||
|
- vendor: QMATIC |
||||||
|
product: Insights |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: true |
||||||
|
affected_versions: |
||||||
|
- Cloud |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.qmatic.com/meet-qmatic/news/qmatic-statement-on-log4j-vulnerability |
||||||
|
notes: log4j 2.16 applied 2021-12-16 |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-21T00:00:00' |
||||||
|
- vendor: QMATIC |
||||||
|
product: Appointment Booking |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: true |
||||||
|
affected_versions: |
||||||
|
- Cloud/Managed Service |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.qmatic.com/meet-qmatic/news/qmatic-statement-on-log4j-vulnerability |
||||||
|
notes: log4j 2.16 applied 2021-12-15 |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-21T00:00:00' |
||||||
|
- vendor: QNAP |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.qnap.com/en-uk/security-advisory/qsa-21-58 |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:55+00:00' |
||||||
|
- vendor: QOPPA |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://kbdeveloper.qoppa.com/cve-2021-44228-apache-log4j-vulnerability/ |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:55+00:00' |
||||||
|
- vendor: QSC Q-SYS |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://qscprod.force.com/selfhelpportal/s/article/Are-Q-SYS-products-affected-by-the-Log4j-vulnerability-CVE-2021-44228 |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:55+00:00' |
||||||
|
- vendor: QT |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.qt.io/blog/the-qt-company-products-not-affected-by-cve-2021-44228-log4j-vulnerability |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:55+00:00' |
||||||
|
- vendor: Quest Global |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://support.quest.com/fr-fr/search#q=CVE-2021-44228&t=Global |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:55+00:00' |
||||||
|
... |
@ -0,0 +1,37 @@ |
|||||||
|
--- |
||||||
|
version: '1.0' |
||||||
|
owners: |
||||||
|
- name: cisagov |
||||||
|
url: https://github.com/cisagov/log4j-affected-db |
||||||
|
software: |
||||||
|
- vendor: Runecast |
||||||
|
product: Runecast Analyzer |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: true |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: |
||||||
|
- 6.0.3 |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.runecast.com/release-notes |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:55+00:00' |
||||||
|
... |
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -0,0 +1,272 @@ |
|||||||
|
--- |
||||||
|
version: '1.0' |
||||||
|
owners: |
||||||
|
- name: cisagov |
||||||
|
url: https://github.com/cisagov/log4j-affected-db |
||||||
|
software: |
||||||
|
- vendor: Ubiquiti |
||||||
|
product: UniFi Network Application |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: true |
||||||
|
affected_versions: |
||||||
|
- 6.5.53 & lower versions |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://community.ui.com/releases/UniFi-Network-Application-6-5-54/d717f241-48bb-4979-8b10-99db36ddabe1 |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: Ubiquiti |
||||||
|
product: UniFi Network Controller |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: true |
||||||
|
affected_versions: |
||||||
|
- 6.5.54 & lower versions |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://community.ui.com/releases/UniFi-Network-Application-6-5-55/48c64137-4a4a-41f7-b7e4-3bee505ae16e |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- 6.5.54 is reported to still be vulnerable. 6.5.55 is the new recommendation |
||||||
|
for mitigatin log4j vulnerabilities by updating to log4j 2.16.0 |
||||||
|
last_updated: '2021-12-15T00:00:00' |
||||||
|
- vendor: Ubuntu |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://ubuntu.com/security/CVE-2021-44228 |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: Umbraco |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://umbraco.com/blog/security-advisory-december-15-2021-umbraco-cms-and-cloud-not-affected-by-cve-2021-44228-log4j-rce-0-day-mitigation/ |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: UniFlow |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.uniflow.global/en/security/security-and-maintenance/ |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: Unify ATOS |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://networks.unify.com/security/advisories/OBSO-2112-01.pdf |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: Unimus |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://forum.unimus.net/viewtopic.php?f=7&t=1390#top |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: UiPath |
||||||
|
product: InSights |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: true |
||||||
|
affected_versions: |
||||||
|
- '20.10' |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.uipath.com/legal/trust-and-security/cve-2021-44228 |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-15T00:00:00' |
||||||
|
- vendor: USSIGNAL MSP |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://ussignal.com/blog/apache-log4j-vulnerability |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
... |
File diff suppressed because it is too large
Load Diff
@ -0,0 +1,446 @@ |
|||||||
|
--- |
||||||
|
version: '1.0' |
||||||
|
owners: |
||||||
|
- name: cisagov |
||||||
|
url: https://github.com/cisagov/log4j-affected-db |
||||||
|
software: |
||||||
|
- vendor: WAGO |
||||||
|
product: WAGO Smart Script |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: true |
||||||
|
affected_versions: |
||||||
|
- 4.2.x < 4.8.1.3 |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.wago.com/de/automatisierungstechnik/psirt#log4j |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-17T00:00:00' |
||||||
|
- vendor: Wallarm |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://lab.wallarm.com/cve-2021-44228-mitigation-update/ |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: Wasp Barcode technologies |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://support.waspbarcode.com/kb/articles/assetcloud-inventorycloud-are-they-affected-by-the-java-exploit-log4j-no |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: WatchGuard |
||||||
|
product: Secplicity |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.secplicity.org/2021/12/10/critical-rce-vulnerability-in-log4js/ |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: Western Digital |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.westerndigital.com/support/product-security/wdc-21016-apache-log4j-2-remote-code-execution-vulnerability-analysis |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: WIBU Systems |
||||||
|
product: CodeMeter Keyring for TIA Portal |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: true |
||||||
|
affected_versions: |
||||||
|
- 1.30 and prior |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/Advisory_WIBU-211213-01.pdf |
||||||
|
notes: Only the Password Manager is affected |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-22T00:00:00' |
||||||
|
- vendor: WIBU Systems |
||||||
|
product: CodeMeter Cloud Lite |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: true |
||||||
|
affected_versions: |
||||||
|
- 2.2 and prior |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/Advisory_WIBU-211213-01.pdf |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-22T00:00:00' |
||||||
|
- vendor: WindRiver |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://support2.windriver.com/index.php?page=security-notices&on=view&id=7191 |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: WireShark |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://gitlab.com/wireshark/wireshark/-/issues/17783 |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: Wistia |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://status.wistia.com/incidents/jtg0dfl5l224 |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: WitFoo |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.witfoo.com/blog/emergency-update-for-cve-2021-44228-log4j/ |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: WordPress |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://wordpress.org/support/topic/is-the-log4j-vulnerability-an-issue/ |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: Worksphere |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.worksphere.com/product/security-update-on-log4j-cve-2021-44228 |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: Wowza |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.wowza.com/docs/known-issues-with-wowza-streaming-engine#log4j2-cve |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: WSO2 |
||||||
|
product: WSO2 Enterprise Integrator |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: true |
||||||
|
affected_versions: |
||||||
|
- 6.1.0 and above |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://docs.wso2.com/pages/viewpage.action?pageId=180948677 |
||||||
|
notes: A temporary mitigation is available while vendor works on update |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
... |
@ -0,0 +1,651 @@ |
|||||||
|
--- |
||||||
|
version: '1.0' |
||||||
|
owners: |
||||||
|
- name: cisagov |
||||||
|
url: https://github.com/cisagov/log4j-affected-db |
||||||
|
software: |
||||||
|
- vendor: XCP-ng |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://xcp-ng.org/forum/topic/5315/log4j-vulnerability-impact |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: XenForo |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://xenforo.com/community/threads/psa-potential-security-vulnerability-in-elasticsearch-5-via-apache-log4j-log4shell.201145/ |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: Xerox |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://securitydocs.business.xerox.com/wp-content/uploads/2021/12/Xerox-Special-Bulletin-XRX21-021-Regarding-CVE-2021-44228-CVE-2021-45046-and-CVE-2021-45105-v1.6.pdf |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: XPertDoc |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://kb.xpertdoc.com/pages/viewpage.action?pageId=87622727 |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: XPLG |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.xplg.com/log4j-vulnerability-exploit-log4shell-xplg-secure/ |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: XWIKI |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://forum.xwiki.org/t/log4j-cve-2021-44228-log4shell-zero-day-vulnerability/9557 |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: Xylem |
||||||
|
product: Aquatalk |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-22T00:00:00' |
||||||
|
- vendor: Xylem |
||||||
|
product: Avensor |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-22T00:00:00' |
||||||
|
- vendor: Xylem |
||||||
|
product: Sensus Analytics |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-22T00:00:00' |
||||||
|
- vendor: Xylem |
||||||
|
product: Sensus Automation Control Configuration change complete |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-22T00:00:00' |
||||||
|
- vendor: Xylem |
||||||
|
product: Sensus Cathodic Protection Mitigation in process Mitigation in process |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-22T00:00:00' |
||||||
|
- vendor: Xylem |
||||||
|
product: Sensus FieldLogic LogServer |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-22T00:00:00' |
||||||
|
- vendor: Xylem |
||||||
|
product: Sensus Lighting Control |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-22T00:00:00' |
||||||
|
- vendor: Xylem |
||||||
|
product: Sensus NetMetrics Configuration change complete |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-22T00:00:00' |
||||||
|
- vendor: Xylem |
||||||
|
product: Sensus RNI Saas |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: true |
||||||
|
affected_versions: |
||||||
|
- 4.7 through 4.10 |
||||||
|
- 4.4 through 4.6 |
||||||
|
- '4.2' |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-22T00:00:00' |
||||||
|
- vendor: Xylem |
||||||
|
product: Sensus RNI On Prem |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: true |
||||||
|
affected_versions: |
||||||
|
- 4.7 through 4.10 |
||||||
|
- 4.4 through 4.6 |
||||||
|
- '4.2' |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-22T00:00:00' |
||||||
|
- vendor: Xylem |
||||||
|
product: Sensus SCS |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-22T00:00:00' |
||||||
|
- vendor: Xylem |
||||||
|
product: Smart Irrigation |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-22T00:00:00' |
||||||
|
- vendor: Xylem |
||||||
|
product: Water Loss Management (Visenti) |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-22T00:00:00' |
||||||
|
- vendor: Xylem |
||||||
|
product: Configuration change complete |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-22T00:00:00' |
||||||
|
- vendor: Xylem |
||||||
|
product: Xylem Cloud |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-22T00:00:00' |
||||||
|
- vendor: Xylem |
||||||
|
product: Xylem Edge Gateway (xGW) |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-apache-log4j-xpsa-2021-005.pdf |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-22T00:00:00' |
||||||
|
... |
@ -0,0 +1,123 @@ |
|||||||
|
--- |
||||||
|
version: '1.0' |
||||||
|
owners: |
||||||
|
- name: cisagov |
||||||
|
url: https://github.com/cisagov/log4j-affected-db |
||||||
|
software: |
||||||
|
- vendor: Yellowbrick |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://support.yellowbrick.com/hc/en-us/articles/4412586575379-Security-Advisory-Yellowbrick-is-NOT-Affected-by-the-Log4Shell-Vulnerability |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: YellowFin |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://community.yellowfinbi.com/announcement/notice-critical-vulnerability-in-log4j2 |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: YOKOGAWA |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.yokogawa.com/us/solutions/products-platforms/announcements/important-notice/log4shell/ |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-22T00:00:00' |
||||||
|
- vendor: YSoft SAFEQ |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.ysoft.com/getattachment/Products/Security/Standards-Compliance/text/Information-Security-Policy-Statement/YSOFT-SAFEQ-LOG4J-VULNERABILITY-PRODUCT-UPDATE-WORKAROUND-1.pdf |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
... |
@ -0,0 +1,477 @@ |
|||||||
|
--- |
||||||
|
version: '1.0' |
||||||
|
owners: |
||||||
|
- name: cisagov |
||||||
|
url: https://github.com/cisagov/log4j-affected-db |
||||||
|
software: |
||||||
|
- vendor: Zabbix |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://blog.zabbix.com/zabbix-not-affected-by-the-log4j-exploit/17873/ |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: ZAMMAD |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://community.zammad.org/t/cve-2021-44228-elasticsearch-users-be-aware/8256 |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: Zaproxy |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.zaproxy.org/blog/2021-12-10-zap-and-log4shell/ |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: Zebra |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.zebra.com/us/en/support-downloads/lifeguard-security/cve-2021-442280-dubbed-log4shell-or-logjam-vulnerability.html |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: Zendesk |
||||||
|
product: All Products |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: true |
||||||
|
affected_versions: |
||||||
|
- All Versions |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://support.zendesk.com/hc/en-us/articles/4413583476122 |
||||||
|
notes: Zendesk products are all cloud-based; thus there are no updates for the |
||||||
|
customers to install as the company is working on patching their infrastructure |
||||||
|
and systems. |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-13T00:00:00' |
||||||
|
- vendor: Zenoss |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://support.zenoss.com/hc/en-us |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: Zentera Systems, Inc. |
||||||
|
product: CoIP Access Platform |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: true |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: |
||||||
|
- All |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://support.zentera.net/hc/en-us/articles/4416227743511--CVE-2021-44228-Log4Shell-Vulnerability-in-Apache-Log4j |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-17T00:00:00' |
||||||
|
- vendor: Zerto |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://help.zerto.com/kb/000004822 |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: Zesty |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.zesty.io/mindshare/company-announcements/log4j-exploit/ |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: Zimbra |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://bugzilla.zimbra.com/show_bug.cgi?id=109428 |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: Zix |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://status.appriver.com/ |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-16T00:00:00' |
||||||
|
- vendor: Zoom |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://explore.zoom.us/en/trust/security/security-bulletin/security-bulletin-log4j/?=nocache |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: ZPE systems Inc |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://support.zpesystems.com/portal/en/kb/articles/is-nodegrid-os-and-zpe-cloud-affected-by-cve-2021-44228-apache-log4j |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: Zscaler |
||||||
|
product: See Link (Multiple Products) |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://trust.zscaler.com/posts/9581 |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-15T00:00:00' |
||||||
|
- vendor: Zyxel |
||||||
|
product: '' |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://www.zyxel.com/support/Zyxel_security_advisory_for_Apache_Log4j_RCE_vulnerability.shtml |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2022-01-12T07:18:56+00:00' |
||||||
|
- vendor: Zyxel |
||||||
|
product: Security Firewall/Gateways |
||||||
|
cves: |
||||||
|
cve-2021-4104: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-44228: |
||||||
|
investigated: true |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: |
||||||
|
- ZLD Firmware Security Services |
||||||
|
- Nebula |
||||||
|
cve-2021-45046: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
cve-2021-45105: |
||||||
|
investigated: false |
||||||
|
affected_versions: [] |
||||||
|
fixed_versions: [] |
||||||
|
unaffected_versions: [] |
||||||
|
vendor_links: |
||||||
|
- https://community.zyxel.com/en/discussion/12229/zyxel-security-advisory-for-apache-log4j-rce-vulnerability |
||||||
|
notes: '' |
||||||
|
references: |
||||||
|
- '' |
||||||
|
last_updated: '2021-12-14T00:00:00' |
||||||
|
... |
Loading…
Reference in new issue