Skip to content
This repository has been archived by the owner on Jun 16, 2022. It is now read-only.

Commit

Permalink
Merge update (#889)
Browse files Browse the repository at this point in the history
* Update software lists

* Update software lists

* Update software lists

* Update software lists

* Update software lists
  • Loading branch information
RenoutSchoen committed Jun 15, 2022
1 parent 2481666 commit fd7beba
Show file tree
Hide file tree
Showing 27 changed files with 5,108 additions and 4,977 deletions.
10 changes: 5 additions & 5 deletions software/software_list_0-9.md
Expand Up @@ -7,10 +7,10 @@

| Supplier | Product | Version (see Status) | Status CVE-2021-4104 | Status CVE-2021-44228 | Status CVE-2021-45046 | Status CVE-2021-45105 | Notes | Links |
|:---------|:--------|:--------------------:|:--------------------:|:---------------------:|:---------------------:|:---------------------:|:------|------:|
|1Password|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://1password.community/discussion/comment/622612/#Comment_622612)|
|2Bleftsparks|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](/NCSC-NL/log4shell/blob/main/software/vendor-statements/2Bleftsparks.png)|
|2n|All| | | | | | |[2n Advisory Link](https://www.2n.com/cs_CZ/novinky/produkty-2n-neohrozuje-zranitelnost-cve-2021-44228-komponenty-log4j-2)|
|3CX|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://www.3cx.com/community/threads/log4j-vulnerability-cve-2021-44228.86436/post-407835)|
|1Password|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://1password.community/discussion/comment/622612/#Comment_622612)|
|2Bleftsparks|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](/NCSC-NL/log4shell/blob/main/NCSC-NL/log4shell/blob/main/software/vendor-statements/2Bleftsparks.png)|
|2n|All| | | | | ||[2n Advisory Link](https://www.2n.com/cs_CZ/novinky/produkty-2n-neohrozuje-zranitelnost-cve-2021-44228-komponenty-log4j-2)|
|3CX|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://www.3cx.com/community/threads/log4j-vulnerability-cve-2021-44228.86436/post-407835)|
|3M Health Information Systems|CGS| | |Vulnerable| | |This advisory is available to customer only and has not been reviewed by CISA.|[CGS: Log4j Software Update(login required)](https://support.3mhis.com/app/account/updates/ri/5210)|
|7Signal|Sapphire| |Not vuln|Fix| | |Fix released 2021-12-14||
|7-Zip|All| |Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://sourceforge.net/p/sevenzip/discussion/45797/thread/b977bbd4d1/)|
|7-Zip|All| |Not vuln|Not vuln|Not vuln|Not vuln||[source](https://sourceforge.net/p/sevenzip/discussion/45797/thread/b977bbd4d1/)|
574 changes: 290 additions & 284 deletions software/software_list_a.md

Large diffs are not rendered by default.

1,156 changes: 579 additions & 577 deletions software/software_list_b.md

Large diffs are not rendered by default.

859 changes: 431 additions & 428 deletions software/software_list_c.md

Large diffs are not rendered by default.

638 changes: 329 additions & 309 deletions software/software_list_d.md

Large diffs are not rendered by default.

456 changes: 228 additions & 228 deletions software/software_list_e.md

Large diffs are not rendered by default.

276 changes: 142 additions & 134 deletions software/software_list_f.md

Large diffs are not rendered by default.

94 changes: 48 additions & 46 deletions software/software_list_g.md

Large diffs are not rendered by default.

576 changes: 291 additions & 285 deletions software/software_list_h.md

Large diffs are not rendered by default.

1,120 changes: 560 additions & 560 deletions software/software_list_i.md

Large diffs are not rendered by default.

251 changes: 126 additions & 125 deletions software/software_list_j.md

Large diffs are not rendered by default.

66 changes: 33 additions & 33 deletions software/software_list_k.md
Expand Up @@ -7,36 +7,36 @@

| Supplier | Product | Version (see Status) | Status CVE-2021-4104 | Status CVE-2021-44228 | Status CVE-2021-45046 | Status CVE-2021-45105 | Notes | Links |
|:---------|:--------|:--------------------:|:--------------------:|:---------------------:|:---------------------:|:---------------------:|:------|------:|
|K15t|All| | | | | | |[K15t Statement](https://help.k15t.com/k15t-apps-and-log4shell-193401141.html)|
|K6|All| | | | | | |[K6 Statement](https://k6.io/blog/k6-products-not-impacted-by-cve-2021-44228/)|
|Kaltura|Blackboard Learn SaaS in the classic Learn experience|v3900.28.x|Fix|Fix|Fix|Fix| |[source](https://knowledge.kaltura.com/help/blackboard-learn-release-notes#blackboard-learn-december-2021-release-notes-v5412)|
|Kaltura|Blackboard Learn Self- and Managed-Hosting|v3900.26.x|Fix|Fix|Fix|Fix| |[source](https://knowledge.kaltura.com/help/blackboard-learn-release-notes#blackboard-learn-december-2021-release-notes-v5412)|
|Karakun|All| | | | | | |"[Karakun Statement](https://board.karakun.com/viewtopic.php?f=21&t=8351)"|
|Kaseya|AuthAnvil| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)|
|Kaseya|BMS| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)|
|Kaseya|ID Agent DarkWeb ID and BullPhish ID| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)|
|Kaseya|IT Glue| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)|
|Kaseya|MyGlue| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)|
|Kaseya|Network Glue| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)|
|Kaseya|Passly| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)|
|Kaseya|products not listed above| | |Investigation| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)|
|Kaseya|RocketCyber| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)|
|Kaseya|Spannign Salesforce Backup| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)|
|Kaseya|Spanning O365 Backup| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)|
|Kaseya|Unitrends| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)|
|Kaseya|Vorex| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)|
|Kaseya|VSA SaaS and VSA On-Premises| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)|
|KeePass|All|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://sourceforge.net/p/keepass/discussion/329220/thread/4643c5ec4f/?limit=250)|
|Keeper|All| | |Fix|Fix| | |[source](https://www.keepersecurity.com/blog/2021/12/15/public-notice-regarding-the-apache-foundation-log4j-vulnerability/)|
|Keeper Security|All| | | | | | |[Keeper Security Notice](https://www.keepersecurity.com/blog/2021/12/15/public-notice-regarding-the-apache-foundation-log4j-vulnerability/)|
|KEMP|All| | | | | | |[KEMP Support](https://support.kemptechnologies.com/hc/en-us/articles/4416430695437-CVE-2021-44228-Log4j2-Exploit)|
|KEMP 2|All| | | | | | |[KEMP 2 Support](https://support.kemptechnologies.com/hc/en-us/articles/4416473820045-Progress-Kemp-LoadMaster-protects-from-security-vulnerability-Apache-Log4j-2-CVE-2021-44228-)|
|Keycloak|All|all version| |Not vuln| | | |[source](https://github.com/keycloak/keycloak/discussions/9078)|
|Kofax|Capture|All| |Not vuln| | | |[source](https://knowledge.kofax.com/Capture/Kofax_Capture/Reference/Log4J_Vulnerability_CVE-2021-44228_Does_Not_Affect_Kofax_Capture)|
|Kofax|Communication Manager (KCM)|5.3-5.5|Not vuln|Fix| | | |[source](https://knowledge.kofax.com/Communications_Manager/Troubleshooting/log4j_vulnerability_in_Kofax_Communications_Manager)|
|Kofax|Robot File System (RFS)|>=10.7|Not vuln|Workaround| | | |[source](https://knowledge.kofax.com/Robotic_Process_Automation/Troubleshooting/Kofax_RPA_CVE-2021-44228_log4j_Security_Exploit_Information)|
|Kofax|Robotic Process Automation (RPA)|11.1|Not vuln|Workaround| | | |[source](https://knowledge.kofax.com/Robotic_Process_Automation/Troubleshooting/Kofax_RPA_CVE-2021-44228_log4j_Security_Exploit_Information)|
|Kofax|Robotic Process Automation (RPA)|11.2|Not vuln|Workaround| | | |[source](https://knowledge.kofax.com/Robotic_Process_Automation/Troubleshooting/Kofax_RPA_CVE-2021-44228_log4j_Security_Exploit_Information)|
|Konica Minolta|All| | | | | | |[Konica Minolta Support](https://www.konicaminolta.de/de-de/support/log4j)|
|Kronos UKG|All| | | | | | |[Kronos UKG Statement](https://community.kronos.com/s/feed/0D54M00004wJKHiSAO?language=en_US)|
|Kyberna|All| | | | | | |[Kyberna Statement](https://www.kyberna.com/detail/log4j-sicherheitsluecke)|
|K15t|All| | | | | ||[K15t Statement](https://help.k15t.com/k15t-apps-and-log4shell-193401141.html)|
|K6|All| | | | | ||[K6 Statement](https://k6.io/blog/k6-products-not-impacted-by-cve-2021-44228/)|
|Kaltura|Blackboard Learn SaaS in the classic Learn experience|v3900.28.x|Fix|Fix|Fix|Fix||[source](https://knowledge.kaltura.com/help/blackboard-learn-release-notes#blackboard-learn-december-2021-release-notes-v5412)|
|Kaltura|Blackboard Learn Self- and Managed-Hosting|v3900.26.x|Fix|Fix|Fix|Fix||[source](https://knowledge.kaltura.com/help/blackboard-learn-release-notes#blackboard-learn-december-2021-release-notes-v5412)|
|Karakun|All| | | | | ||[Karakun Statement](https://board.karakun.com/viewtopic.php?f=21&t=8351)|
|Kaseya|AuthAnvil| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)|
|Kaseya|BMS| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)|
|Kaseya|ID Agent DarkWeb ID and BullPhish ID| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)|
|Kaseya|IT Glue| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)|
|Kaseya|MyGlue| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)|
|Kaseya|Network Glue| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)|
|Kaseya|Passly| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)|
|Kaseya|products not listed above| | |Investigation| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)|
|Kaseya|RocketCyber| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)|
|Kaseya|Spannign Salesforce Backup| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)|
|Kaseya|Spanning O365 Backup| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)|
|Kaseya|Unitrends| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)|
|Kaseya|Vorex| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)|
|Kaseya|VSA SaaS and VSA On-Premises| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)|
|KeePass|All|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://sourceforge.net/p/keepass/discussion/329220/thread/4643c5ec4f/?limit=250)|
|Keeper|All| | |Fix|Fix| ||[source](https://www.keepersecurity.com/blog/2021/12/15/public-notice-regarding-the-apache-foundation-log4j-vulnerability/)|
|Keeper Security|All| | | | | ||[Keeper Security Notice](https://www.keepersecurity.com/blog/2021/12/15/public-notice-regarding-the-apache-foundation-log4j-vulnerability/)|
|KEMP|All| | | | | ||[KEMP Support](https://support.kemptechnologies.com/hc/en-us/articles/4416430695437-CVE-2021-44228-Log4j2-Exploit)|
|KEMP 2|All| | | | | ||[KEMP 2 Support](https://support.kemptechnologies.com/hc/en-us/articles/4416473820045-Progress-Kemp-LoadMaster-protects-from-security-vulnerability-Apache-Log4j-2-CVE-2021-44228-)|
|Keycloak|All|all version| |Not vuln| | ||[source](https://github.com/keycloak/keycloak/discussions/9078)|
|Kofax|Capture|All| |Not vuln| | ||[source](https://knowledge.kofax.com/Capture/Kofax_Capture/Reference/Log4J_Vulnerability_CVE-2021-44228_Does_Not_Affect_Kofax_Capture)|
|Kofax|Communication Manager (KCM)|5.3-5.5|Not vuln|Fix| | ||[source](https://knowledge.kofax.com/Communications_Manager/Troubleshooting/log4j_vulnerability_in_Kofax_Communications_Manager)|
|Kofax|Robot File System (RFS)|>=10.7|Not vuln|Workaround| | ||[source](https://knowledge.kofax.com/Robotic_Process_Automation/Troubleshooting/Kofax_RPA_CVE-2021-44228_log4j_Security_Exploit_Information)|
|Kofax|Robotic Process Automation (RPA)|11.1|Not vuln|Workaround| | ||[source](https://knowledge.kofax.com/Robotic_Process_Automation/Troubleshooting/Kofax_RPA_CVE-2021-44228_log4j_Security_Exploit_Information)|
|Kofax|Robotic Process Automation (RPA)|11.2|Not vuln|Workaround| | ||[source](https://knowledge.kofax.com/Robotic_Process_Automation/Troubleshooting/Kofax_RPA_CVE-2021-44228_log4j_Security_Exploit_Information)|
|Konica Minolta|All| | | | | ||[Konica Minolta Support](https://www.konicaminolta.de/de-de/support/log4j)|
|Kronos UKG|All| | | | | ||[Kronos UKG Statement](https://community.kronos.com/s/feed/0D54M00004wJKHiSAO?language=en_US)|
|Kyberna|All| | | | | ||[Kyberna Statement](https://www.kyberna.com/detail/log4j-sicherheitsluecke)|

0 comments on commit fd7beba

Please sign in to comment.