mirror of
https://github.com/cisagov/log4j-affected-db.git
synced 2024-11-22 16:40:48 +00:00
712b6f12da
Add HPE/Micro Focus Data Protector
5991 lines
174 KiB
YAML
5991 lines
174 KiB
YAML
---
|
|
version: '1.0'
|
|
owners:
|
|
- name: cisagov
|
|
url: https://github.com/cisagov/log4j-affected-db
|
|
software:
|
|
- vendor: HAProxy
|
|
product: ''
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://www.haproxy.com/blog/december-2021-log4shell-mitigation/
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|
- vendor: HarmanPro AMX
|
|
product: ''
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://help.harmanpro.com/apache-log4j-vulnerability
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|
- vendor: HashiCorp
|
|
product: Boundary
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://discuss.hashicorp.com/t/hcsec-2021-32-hashicorp-response-to-apache-log4j-2-security-issue-cve-2021-44228
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|
- vendor: HashiCorp
|
|
product: Consul
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://discuss.hashicorp.com/t/hcsec-2021-32-hashicorp-response-to-apache-log4j-2-security-issue-cve-2021-44228
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|
- vendor: HashiCorp
|
|
product: Consul Enterprise
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://discuss.hashicorp.com/t/hcsec-2021-32-hashicorp-response-to-apache-log4j-2-security-issue-cve-2021-44228
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|
- vendor: HashiCorp
|
|
product: Nomad
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://discuss.hashicorp.com/t/hcsec-2021-32-hashicorp-response-to-apache-log4j-2-security-issue-cve-2021-44228
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|
- vendor: HashiCorp
|
|
product: Nomad Enterprise
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://discuss.hashicorp.com/t/hcsec-2021-32-hashicorp-response-to-apache-log4j-2-security-issue-cve-2021-44228
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|
- vendor: HashiCorp
|
|
product: Packer
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://discuss.hashicorp.com/t/hcsec-2021-32-hashicorp-response-to-apache-log4j-2-security-issue-cve-2021-44228
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|
- vendor: HashiCorp
|
|
product: Terraform
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://discuss.hashicorp.com/t/hcsec-2021-32-hashicorp-response-to-apache-log4j-2-security-issue-cve-2021-44228
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|
- vendor: HashiCorp
|
|
product: Terraform Enterprise
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://discuss.hashicorp.com/t/hcsec-2021-32-hashicorp-response-to-apache-log4j-2-security-issue-cve-2021-44228
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|
- vendor: HashiCorp
|
|
product: Vagrant
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://discuss.hashicorp.com/t/hcsec-2021-32-hashicorp-response-to-apache-log4j-2-security-issue-cve-2021-44228
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|
- vendor: HashiCorp
|
|
product: Vault
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://discuss.hashicorp.com/t/hcsec-2021-32-hashicorp-response-to-apache-log4j-2-security-issue-cve-2021-44228
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|
- vendor: HashiCorp
|
|
product: Vault Enterprise
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://discuss.hashicorp.com/t/hcsec-2021-32-hashicorp-response-to-apache-log4j-2-security-issue-cve-2021-44228
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|
- vendor: HashiCorp
|
|
product: Waypoint
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://discuss.hashicorp.com/t/hcsec-2021-32-hashicorp-response-to-apache-log4j-2-security-issue-cve-2021-44228
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|
- vendor: HCL Software
|
|
product: BigFix Compliance
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: true
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions:
|
|
- 'All'
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095486
|
|
notes: Not Affected for related CVE-2021-45046
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-15T00:00:00'
|
|
- vendor: HCL Software
|
|
product: BigFix Insights
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: true
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions:
|
|
- 'All'
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095486
|
|
notes: Not Affected for related CVE-2021-45046
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-15T00:00:00'
|
|
- vendor: HCL Software
|
|
product: BigFix Insights for Vulnerability Remediation
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: true
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions:
|
|
- 'All'
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095486
|
|
notes: Not Affected for related CVE-2021-45046
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-15T00:00:00'
|
|
- vendor: HCL Software
|
|
product: BigFix Inventory
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: true
|
|
affected_versions: []
|
|
fixed_versions:
|
|
- '< 10.0.7'
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095486
|
|
notes: Not Affected for related CVE-2021-45046
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-15T00:00:00'
|
|
- vendor: HCL Software
|
|
product: BigFix Lifecycle
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: true
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions:
|
|
- 'All'
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095486
|
|
notes: Not Affected for related CVE-2021-45046
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-15T00:00:00'
|
|
- vendor: HCL Software
|
|
product: BigFix Mobile
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: true
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions:
|
|
- 'All'
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095486
|
|
notes: Not Affected for related CVE-2021-45046
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-15T00:00:00'
|
|
- vendor: HCL Software
|
|
product: BigFix Patch
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: true
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions:
|
|
- 'All'
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095486
|
|
notes: Not Affected for related CVE-2021-45046
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-15T00:00:00'
|
|
- vendor: HelpSystems Clearswift
|
|
product: ''
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://community.helpsystems.com/kb-nav/kb-article/?id=37becc1c-255c-ec11-8f8f-6045bd006687
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|
- vendor: HENIX
|
|
product: Squash TM
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: true
|
|
affected_versions: []
|
|
fixed_versions:
|
|
- '1.21.7-1.22.9'
|
|
- '2.0.3-2.1.5'
|
|
- '2.2.0-3.0.2'
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://tm-en.doc.squashtest.com/v3/downloads.html#download-previous-versions
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-23T00:00:00'
|
|
- vendor: Hexagon
|
|
product: ''
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://supportsi.hexagon.com/help/s/article/Security-Vulnerability-CVE-2021-44228-log4j-2?language=en_US
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|
- vendor: Hikvision
|
|
product: ''
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://video.xortec.de/media/pdf/87/e8/03/kw50_Update-for-Apache-Log4j2-Issue-Hikvision_official.pdf
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|
- vendor: Hitachi Energy
|
|
product: 3rd party - Elastic Search, Kibana
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: true
|
|
affected_versions: []
|
|
fixed_versions:
|
|
- 'Elasticsearch 5.0.0+'
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
|
|
notes: Set the JVM option -Dlog4j2.formatMsgNoLookups=true and restart each node
|
|
of the cluster.
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-05T00:00:00'
|
|
- vendor: Hitachi Energy
|
|
product: Axis
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: true
|
|
affected_versions: []
|
|
fixed_versions:
|
|
- '3.6'
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
|
|
notes: No action is required by customers. Axis is a fully SaaS hosted solution
|
|
and the environment has been patched per the recommendations
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-05T00:00:00'
|
|
- vendor: Hitachi Energy
|
|
product: Counterparty Settlement and Billing (CSB)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: true
|
|
affected_versions: []
|
|
fixed_versions:
|
|
- 'v6'
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-05T00:00:00'
|
|
- vendor: Hitachi Energy
|
|
product: e-Mesh Monitor
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
|
|
notes: No end-user action needed. The affected e-Mesh Monitor part is at the cloud
|
|
offering side of which the remediation is handled by Hitachi Energy team. Remediation
|
|
is currently ongoing, and during this time period, e-Mesh Monitor edge device
|
|
is not able to upload data to cloud.
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-05T00:00:00'
|
|
- vendor: Hitachi Energy
|
|
product: eSOMS
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://www.hitachienergy.com/offering/solutions/cybersecurity/alerts-and-notifications
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|
- vendor: Hitachi Energy
|
|
product: FOXMAN-UN
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: true
|
|
affected_versions: []
|
|
fixed_versions:
|
|
- 'R15A'
|
|
- 'R14B'
|
|
- 'R14A'
|
|
- 'R11B SP1'
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
|
|
notes: A patch is available for releases R15A, R14B, R14A and R11B SP1. . For details on how to apply such patch,
|
|
please refer to the technical bulletin “FOXMAN-UN Installation of Log4j Patch”, version A (1KHW029176)
|
|
available in the Hitachi Energy Customer Connect Portal.
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-05T00:00:00'
|
|
- vendor: Hitachi Energy
|
|
product: FOXMAN-UN
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: true
|
|
affected_versions: []
|
|
fixed_versions:
|
|
- 'R11A and R10 series'
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
|
|
notes: Apply General Mitigations and upgrade to latest version. For upgrades,
|
|
please get in touch with your Hitachi Energy contacts.
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-05T00:00:00'
|
|
- vendor: Hitachi Energy
|
|
product: Lumada APM SaaS offering
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
|
|
notes: No action is required by customers. The SaaS offering has been patched
|
|
per the recommendations.
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-05T00:00:00'
|
|
- vendor: Hitachi Energy
|
|
product: Lumada APM On-premises
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
|
|
notes: See vendor advisory for instructions for various versions.
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-05T00:00:00'
|
|
- vendor: Hitachi Energy
|
|
product: Lumada EAM / FSM
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: true
|
|
affected_versions: []
|
|
fixed_versions:
|
|
- 'v1.7.x'
|
|
- 'v1.8.x'
|
|
- 'v1.9.x'
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
|
|
notes: See Section Mitigation Strategy in vendor advisory.
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-05T00:00:00'
|
|
- vendor: Hitachi Energy
|
|
product: MMS Internal facing subcomponent.
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-05T00:00:00'
|
|
- vendor: Hitachi Energy
|
|
product: Network Manager Outage Management Interface (CMI)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: true
|
|
affected_versions: []
|
|
fixed_versions:
|
|
- '9.0-9.10.44'
|
|
- '9.1.1'
|
|
- '10.3.4'
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
|
|
notes: See vendor advisory for instructions on mitigation steps.
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-05T00:00:00'
|
|
- vendor: Hitachi Energy
|
|
product: Network Manager ADMS Network Model Server
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: true
|
|
affected_versions: []
|
|
fixed_versions:
|
|
- '9.1.0.32-9.1.0.44'
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
|
|
notes: See vendor advisory for instructions on mitigation steps.
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-05T00:00:00'
|
|
- vendor: Hitachi Energy
|
|
product: 3rd party - Oracle Database Components
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: true
|
|
affected_versions: []
|
|
fixed_versions:
|
|
- '12.1'
|
|
- '12.2'
|
|
- '19c'
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
|
|
notes: As this is a third-party component, a separate patch management report
|
|
will be provided to customers with the steps to apply the Oracle provided patches
|
|
for these components.
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-05T00:00:00'
|
|
- vendor: Hitachi Energy
|
|
product: nMarket Global I-SEM
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: true
|
|
affected_versions: []
|
|
fixed_versions:
|
|
- '3.7.15'
|
|
- '3.7.16'
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-05T00:00:00'
|
|
- vendor: Hitachi Energy
|
|
product: RelCare
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: true
|
|
affected_versions: []
|
|
fixed_versions:
|
|
- '2.0.0'
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
|
|
notes: No action is required by customers. The RelCare SaaS hosted solution and
|
|
the on-premises have been patched per the recommendations.
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-05T00:00:00'
|
|
- vendor: Hitachi Energy
|
|
product: UNEM
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: true
|
|
affected_versions: []
|
|
fixed_versions:
|
|
- 'R15A'
|
|
- 'R14B'
|
|
- 'R14A'
|
|
- 'R11B SP1'
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
|
|
notes: A patch is available for releases R15A, R14B, R14A and R11B SP1. For details
|
|
on how to apply such patch, please refer to the technical bulletin “UNEM - Installation
|
|
of Log4j Patch”, version A (1KHW029176) available in the Hitachi Energy Customer
|
|
Connect Portal.
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-05T00:00:00'
|
|
- vendor: Hitachi Energy
|
|
product: UNEM
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: true
|
|
affected_versions: []
|
|
fixed_versions:
|
|
- 'R11A and R10 series'
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD003132&LanguageCode=en&DocumentPartId=&Action=Launch
|
|
notes: Apply General Mitigations and upgrade to latest version. For upgrades,
|
|
please get in touch with your Hitachi Energy contacts.
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-05T00:00:00'
|
|
- vendor: Hitachi Vantara
|
|
product: ''
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://knowledge.hitachivantara.com/Support_Information/Hitachi_Vantara_Security_Advisories/CVE-2021-44228_-_Apache_Log4j2
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|
- vendor: HMS Industrial Networks AB
|
|
product: Talk2M including M2Web
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://www.hms-networks.com/docs/librariesprovider6/cybersecurity/hms-security-advisory-2021-12-13-001---ewon-information-log4shell.pdf?sfvrsn=55d7f4d7_11
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-05T00:00:00'
|
|
- vendor: HMS Industrial Networks AB
|
|
product: Cosy, Flexy and Ewon CD
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://www.hms-networks.com/docs/librariesprovider6/cybersecurity/hms-security-advisory-2021-12-13-001---ewon-information-log4shell.pdf?sfvrsn=55d7f4d7_11
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-05T00:00:00'
|
|
- vendor: HMS Industrial Networks AB
|
|
product: eCatcher Windows software
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://www.hms-networks.com/docs/librariesprovider6/cybersecurity/hms-security-advisory-2021-12-13-001---ewon-information-log4shell.pdf?sfvrsn=55d7f4d7_11
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-05T00:00:00'
|
|
- vendor: HMS Industrial Networks AB
|
|
product: eCatcher Mobile applications
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://www.hms-networks.com/docs/librariesprovider6/cybersecurity/hms-security-advisory-2021-12-13-001---ewon-information-log4shell.pdf?sfvrsn=55d7f4d7_11
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-05T00:00:00'
|
|
- vendor: HMS Industrial Networks AB
|
|
product: Netbiter Hardware including EC, WS, and LC
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://www.hms-networks.com/docs/librariesprovider6/cybersecurity/hms-security-advisory-2021-12-13-001---ewon-information-log4shell.pdf?sfvrsn=55d7f4d7_11
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-05T00:00:00'
|
|
- vendor: Honeywell
|
|
product: ''
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://www.honeywell.com/us/en/press/2021/12/honeywells-statement-on-java-apache-log4j-logging-framework-vulnerability
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|
- vendor: HP
|
|
product: Teradici Cloud Access Controller
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: true
|
|
affected_versions: []
|
|
fixed_versions:
|
|
- '< v113'
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hp.com/us-en/document/ish_5268006-5268030-16
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-17T00:00:00'
|
|
- vendor: HP
|
|
product: Teradici EMSDK
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: true
|
|
affected_versions: []
|
|
fixed_versions:
|
|
- '< 1.0.6'
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hp.com/us-en/document/ish_5268006-5268030-16
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-17T00:00:00'
|
|
- vendor: HP
|
|
product: Teradici Management Console
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: true
|
|
affected_versions: []
|
|
fixed_versions:
|
|
- '< 21.10.3'
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hp.com/us-en/document/ish_5268006-5268030-16
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-17T00:00:00'
|
|
- vendor: HP
|
|
product: Teradici PCoIP Connection Manager
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: true
|
|
affected_versions: []
|
|
fixed_versions:
|
|
- '< 21.03.6'
|
|
- '< 20.07.4'
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hp.com/us-en/document/ish_5268006-5268030-16
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-17T00:00:00'
|
|
- vendor: HP
|
|
product: Teradici PCoIP License Server
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hp.com/us-en/document/ish_5268006-5268030-16
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-17T00:00:00'
|
|
- vendor: HPE
|
|
product: 3PAR StoreServ Arrays
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: AirWave Management Platform
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Alletra 6000
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Alletra 9k
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Aruba Central
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Aruba ClearPass Policy Manager
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Aruba ClearPass Policy Manager
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Aruba Instant (IAP)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Aruba Location Services
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Aruba NetEdit
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Aruba PVOS Switches
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Aruba SDN VAN Controller
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Aruba User Experience Insight (UXI)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Aruba VIA Client
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: ArubaOS-CX switches
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: ArubaOS-S switches
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: ArubaOS SD-WAN Controllers and Gateways
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: ArubaOS Wi-Fi Controllers and Gateways
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: BladeSystem Onboard Administrator
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Brocade 16Gb Fibre Channel SAN Switch for HPE Synergy
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Brocade 16Gb SAN Switch for HPE BladeSystem c-Class
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Brocade 32Gb Fibre Channel SAN Switch for HPE Synergy
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Brocade Network Advisor
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: CloudAuth
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: CloudPhysics
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Compute Cloud Console
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Compute operations manager- FW UPDATE SERVICE
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: COS (Cray Operating System)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Cray Systems Management (CSM)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Custom SPP Portal [Link](https://spp.hpe.com/custom)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Data Services Cloud Console
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Harmony Data Platform
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: HOP public services (grafana, vault, rancher, Jenkins)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE B-series SN2600B SAN Extension Switch
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE B-series SN4000B SAN Extension Switch
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE B-series SN6000B Fibre Channel Switch
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE B-series SN6500B Fibre Channel Switch
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE B-series SN6600B Fibre Channel Switch
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE B-series SN6650B Fibre Channel Switch
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE B-series SN6700B Fibre Channel Switch
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Customer Experience Assurance (CEA)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Hardware Support Manager plug-in for VMware vSphere Lifecycle Manager
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Home Location Register (HLR/I-HLR)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Infosight for Servers
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Integrated Home Subscriber Server (I-HSS)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Intelligent Messaging (IM)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Intelligent Network Server (INS)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Multimedia Services Environment (MSE)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE OC Convergent Communications Platform (OCCP)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE OC Media Platform Media Resource Function (OCMP-MRF)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE OC Service Access Controller (OC SAC)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE OC Service Controller (OCSC)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE OC Universal Signaling Platform (OC-USP-M)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE OneView
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE OneView for VMware vRealize Operations (vROps)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE OneView Global Dashboard
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Performance Cluster Manager (HPCM)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Performance Manager (PM)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Position Determination Entity (PDE)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Secure Identity Broker (SIB)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Service Activator (SA)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Service Governance Framework (SGF)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Service Orchestration Manager (SOM)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Service Provisioner (SP)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Short Message Point-to-Point Gateway (SMPP)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Slingshot
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Smart Interaction Server (SIS)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE SN3000B Fibre Channel Switch
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE SN8000B 4-Slot SAN Director Switch
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE SN8000B 8-Slot SAN Backbone Director Switch
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE SN8600B 4-Slot SAN Director Switch
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE SN8600B 8-Slot SAN Director Switch
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE SN8700B 4-Slot Director Switch
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE SN8700B 8-Slot Director Switch
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Subscriber, Network, and Application Policy (SNAP)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Subscription Manager (SM)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Synergy Image Streamer
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Systems Insight Manager (SIM)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Telecom Application Server (TAS)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Unified Correlation and Automation (UCA)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Unified Mediation Bus (UMB)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Unified OSS Console (UOC)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Unified Topology Manager (UTM)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Universal Identity Repository (VIR)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Universal SLA Manager (uSLAM)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Virtual Connect
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Virtual Connect Enterprise Manager (VCEM)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Virtual Provisioning Gateway (vPGW)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Virtual Server Environment (VSE)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Virtual Subscriber Data Management (vSDM)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE WebRTC Gateway Controller (WGW)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-14T00:00:00'
|
|
- vendor: HPE
|
|
product: HPE Wi-Fi Authentication Gateway (WauG)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Insight Cluster Management Utility (CMU)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Integrated Lights-Out (iLO) Amplifier Pack
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Integrated Lights-Out 4 (iLO 4)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: true
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions:
|
|
- '4'
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Integrated Lights-Out 5 (iLO 5)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: true
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions:
|
|
- '5'
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Integrity BL860c, BL870c, BL890c
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Integrity Rx2800/Rx2900
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Integrity Superdome 2
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Integrity Superdome X
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Intelligent Provisioning
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: iSUT integrated smart update tool
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Maven Artifacts (Atlas)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: MSA
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: NetEdit
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Nimble Storage
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: NS-T0634-OSM CONSOLE TOOLS
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: NS-T0977-SCHEMA VALIDATOR
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: OfficeConnect
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Primera Storage
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: RepoServer part of OPA (on Premises aggregator)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Resource Aggregator for Open Distributed Infrastructure Management
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: RESTful Interface Tool (iLOREST)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: SAT (System Admin Toolkit)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Scripting Tools for Windows PowerShell (HPEiLOCmdlets)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: SGI MC990 X Server
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: SGI UV 2000 Server
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: SGI UV 300, 300H, 300RL, 30EX
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: SGI UV 3000 Server
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: SN8700B 8-Slot Director Switch
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: StoreEasy
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: StoreEver CVTL
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: StoreEver LTO Tape Drives
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: StoreEver MSL Tape Libraries
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: StoreOnce
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: SUM (Smart Update Manager)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Superdome Flex 280
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: Superdome Flex Server
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE
|
|
product: UAN (User Access Node)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00120086en_us
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-12T00:00:00'
|
|
- vendor: HPE/Micro Focus
|
|
product: Data Protector
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions:
|
|
- '9.09'
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://portal.microfocus.com/s/article/KM000003243
|
|
notes: 'Support Communication Cross Reference ID: SIK7387'
|
|
references:
|
|
- https://portal.microfocus.com/s/article/KM000003050
|
|
last_updated: '2021-12-17T00:00:00'
|
|
- vendor: HOLOGIC
|
|
product: Advanced Workflow Manager (AWM)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
|
|
notes: While the Hologic software itself does not utilize Java/Log4J, the installed
|
|
APC PowerChute UPS with Business Edition v9.5 software installed may. APC is
|
|
still assessing its PowerChute software to determine if it is vulnerable.
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-20T00:00:00'
|
|
- vendor: HOLOGIC
|
|
product: Unifi Workspace
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
|
|
notes: While the Hologic software itself does not utilize Java/Log4J, the installed
|
|
APC PowerChute UPS with Business Edition v9.5 software installed may. APC is
|
|
still assessing its PowerChute software to determine if it is vulnerable.
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-20T00:00:00'
|
|
- vendor: HOLOGIC
|
|
product: Faxitron CT Specimen Radiography System
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
|
|
notes: While the Hologic software itself does not utilize Java/Log4J, there is
|
|
a utility program installed that may utilize Java and Log4J. This utility program
|
|
does not run on startup and is not required for system operation. Please contact
|
|
Hologic Service for assistance in removing this program.
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-20T00:00:00'
|
|
- vendor: HOLOGIC
|
|
product: Dimensions / 3Dimensions Mammography System
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-20T00:00:00'
|
|
- vendor: HOLOGIC
|
|
product: Affirm Prone Biopsy System
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-20T00:00:00'
|
|
- vendor: HOLOGIC
|
|
product: Brevera Breast Biopsy System
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-20T00:00:00'
|
|
- vendor: HOLOGIC
|
|
product: Trident HD Specimen Radiography System
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-20T00:00:00'
|
|
- vendor: HOLOGIC
|
|
product: SecurView DX Workstation
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-20T00:00:00'
|
|
- vendor: HOLOGIC
|
|
product: Cenova Image Analytics Server
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-20T00:00:00'
|
|
- vendor: HOLOGIC
|
|
product: SecurXChange Router
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-20T00:00:00'
|
|
- vendor: HOLOGIC
|
|
product: Rosetta DC Tomosynthesis Data Converter
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-20T00:00:00'
|
|
- vendor: HOLOGIC
|
|
product: Faxitron Specimen Radiography Systems
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-20T00:00:00'
|
|
- vendor: HOLOGIC
|
|
product: Horizon DXA Bone Densitometer
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-20T00:00:00'
|
|
- vendor: HOLOGIC
|
|
product: Discovery Bone Densitometer
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-20T00:00:00'
|
|
- vendor: HOLOGIC
|
|
product: Fluoroscan Insight Mini C-Arm
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-20T00:00:00'
|
|
- vendor: HOLOGIC
|
|
product: SuperSonic Imagine Ultrasound Products (Aixplorer & Aixplorer Mach)
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-20T00:00:00'
|
|
- vendor: HOLOGIC
|
|
product: Windows Selenia Mammography System
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://www.hologic.com/support/usa/breast-skeletal-products-cybersecurity
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2021-12-20T00:00:00'
|
|
- vendor: Huawei
|
|
product: ''
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://www.huawei.com/en/psirt/security-notices/huawei-sn-20211210-01-log4j2-en
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|
- vendor: Hubspot
|
|
product: ''
|
|
cves:
|
|
cve-2021-4104:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-44228:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45046:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
cve-2021-45105:
|
|
investigated: false
|
|
affected_versions: []
|
|
fixed_versions: []
|
|
unaffected_versions: []
|
|
vendor_links:
|
|
- https://community.hubspot.com/t5/APIs-Integrations/Log4J-day-zero-exploit-CVE-2021-44228/td-p/541949
|
|
notes: ''
|
|
references:
|
|
- ''
|
|
last_updated: '2022-01-12T07:18:53+00:00'
|
|
...
|