0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Supplier | Product | Version (see Status) | Status CVE-2021-4104 | Status CVE-2021-44228 | Status CVE-2021-45046 | Status CVE-2021-45105 | Notes | Links |
---|---|---|---|---|---|---|---|---|
SAE-IT | All | SAE-IT News Link | ||||||
SAE IT-systems | codeIT Runtime | All | Not vuln | Not vuln | Not vuln | Not vuln | "source" | |
SAE IT-systems | codeIT Workbench | All | Not vuln | Not vuln | Not vuln | Not vuln | "source" | |
SAE IT-systems | connectIT | All | Not vuln | Not vuln | Not vuln | Not vuln | "source" | |
SAE IT-systems | net-line series5 | All | Not vuln | Not vuln | Not vuln | Not vuln | "source" | |
SAE IT-systems | setIT | All | Not vuln | Not vuln | Not vuln | Not vuln | "source" | |
SAE IT-systems | SG-50 / Kombisafe | All | Investigation | "source" | ||||
SAE IT-systems | Straton Runtime | All | Investigation | "source" | ||||
SAE IT-systems | Straton Workbench | All | Investigation | "source" | ||||
SAE IT-systems | System-4 | All | Not vuln | Not vuln | Not vuln | Not vuln | "source" | |
SAE IT-systems | T10/T7 Touch panel | All | Investigation | "source" | ||||
SAE IT-systems | visIT Runtime | All | Not vuln | Not vuln | Not vuln | Not vuln | "source" | |
SAE IT-systems | visIT Workbench | All | Not vuln | Not vuln | Not vuln | Not vuln | "source" | |
Safe Software | FME Desktop | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Safe Software | FME Server | Investigation | source | |||||
SAFE FME Server | All | SAFE FME Server Community Link | ||||||
Sage | CRM | 2020 R2, 2021 R1, and 2021 R2 | Not vuln | Workaround | Sage has 3 patches in test | "source" | ||
SailPoint | IdentityIQ | 8.0 or later | Not vuln | Workaround | source | |||
Salesforce | All | Investigation | source | |||||
Sangoma | All | Sangoma Community Link | ||||||
SAP | BusinessObjects Business Intelligence | Not vuln | (behind login) | source | ||||
SAP | BusinessObjects Data Services | Not vuln | (behind login) | source | ||||
SAP | BusinessObjects Explorer | Not vuln | (behind login) | source | ||||
SAP | BusinessObjects Financial Information Management | Not vuln | (behind login) | source | ||||
SAP | BusinessObjects Knowledge Accelerator | Not vuln | (behind login) | source | ||||
SAP | Customer Checkout PoS / manager | 2.0 FP09, 2.0 FP10, 2.0 FP11 PL06 (or lower) and 2.0 FP12 PL04 (or lower) | Not vuln | Fix | SAP note 3130499 | source | ||
SAP | Hana Cockpit | <1.1.23 | Not vuln | Fix | Fix | Fix | source | |
SAP | HANA Database | Not vuln | (behind login) | source | ||||
SAP | HANA Smart Data Integration | Not vuln | (behind login) | source | ||||
SAP | HANA Spatial Service | Not vuln | (behind login) | source | ||||
SAP | HANA Streaming Analytics | Not vuln | (behind login) | source | ||||
SAP | Integrated Business Planning for Supply Chain – Customer systems | Not vuln | (behind login) | source | ||||
SAP | NetWeaver Application Server for ABAP | Not vuln | (behind login) | source | ||||
SAP | S/4 HANA Cloud Customer systems | Not vuln | (behind login) | source | ||||
SAP | S/4 HANA Digital Payments Add-On | Not vuln | (behind login) | source | ||||
SAP | S/4 HANA On-Premise on ABAP | Not vuln | source | |||||
SAP | SuccessFactors Litmos | Not vuln | (behind login) | source | ||||
SAP | XS Advanced Runtime | 1.0.140 or lower | Not vuln | Fix | Fix | Fix | SAP note 3130698 | source |
SAP Advanced Platform | All | This advisory is available to customers only and has not been reviewed by CISA | SAP Advanced Platform Support Link | |||||
SAP BusinessObjects | All | The support document is available to customers only and has not been reviewed by CISA | CVE-2021-44228 - Impact of Log4j vulnerability on SAP BusinessObjects SAP BusinessObjects Support Link | |||||
SAS | All | SAS Support Link | ||||||
SAS Institute | JMP | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
SAS Institute | SAS Cloud Solutions | Not vuln | Workaround | source | ||||
SAS Institute | SAS Profile | Not vuln | Fix | source | ||||
SASSAFRAS | All | SASSAFRAS Link | ||||||
Savignano software solutions | All | Savignano Link | ||||||
SBT | All | <1.5.6 | Not vuln | Fix | Release 1.5.7 · sbt/sbt(github.com) | |||
ScaleComputing | All | This advisory is available to customers only and has not been reviewed by CISA | ScaleComputing Community Link | |||||
ScaleFusion MobileLock Pro | All | ScaleFusion MobileLock Pro Help | ||||||
Schneider Electric | All other products | Investigation | Investigation | source | ||||
Schneider Electric | APC PowerChute Business Edition | 9.5,10.0,10.0.1-10.0.4 | Not vuln | Workaround | Workaround | source | ||
Schneider Electric | APC PowerChute Network Shutdown | 4.2-4.4,4.4.1 | Not vuln | Workaround | Workaround | source | ||
Schneider Electric | EASYFIT | Current software and earlier | Vulnerable | Vulnerable | no customer action required | source | ||
Schneider Electric | Ecoreal XL | Current software and earlier | Vulnerable | Vulnerable | no customer action required | source | ||
Schneider Electric | EcoStruxure IT Expert | Not vuln | Fix | Fix | "cloud-based offer; no customer action required" | source | ||
Schneider Electric | EcoStruxure IT Gateway | 1.13.1.5 | Not vuln | Fix | Fix | source | ||
Schneider Electric | Eurotherm Data Reviewer | V3.0.2 and prior | Not vuln | Workaround | source | |||
Schneider Electric | Facility Expert Small Business | Not vuln | Fix | Vulnerable | "cloud-based offer; no customer action required" | source | ||
Schneider Electric | MSE | Current software and earlier | Vulnerable | Vulnerable | no customer action required | source | ||
Schneider Electric | NetBotz750/755 | Software versions 5.0 through 5.3.0 | Vulnerable | Vulnerable | source | |||
Schneider Electric | NEW630 | Current software and earlier | Vulnerable | Vulnerable | no customer action required | source | ||
Schneider Electric | SDK BOM | Current software and earlier | Vulnerable | Vulnerable | no customer action required | source | ||
Schneider Electric | SDK-Docgen | Current software and earlier | Vulnerable | Vulnerable | no customer action required | source | ||
Schneider Electric | SDK-TNC | Current software and earlier | Vulnerable | Vulnerable | no customer action required | source | ||
Schneider Electric | SDK-UMS | Current software and earlier | Vulnerable | Vulnerable | no customer action required | source | ||
Schneider Electric | SDK3D-2DRenderer | Current software and earlier | Vulnerable | Vulnerable | no customer action required | source | ||
Schneider Electric | SDK3D-360Widget | Current software and earlier | Vulnerable | Vulnerable | no customer action required | source | ||
Schneider Electric | SDK3D2DRenderer | Current software and earlier | Vulnerable | SE Cybersecurity Best Practices | ||||
Schneider Electric | SDK3D360Widget | Current software and earlier | Vulnerable | SE Cybersecurity Best Practices | ||||
Schneider Electric | Select and Config DATA | Current software and earlier | Vulnerable | Vulnerable | no customer action required | source | ||
Schneider Electric | SNC-API | Current software and earlier | Vulnerable | Vulnerable | no customer action required | source | ||
Schneider Electric | SNC-CMM | Current software and earlier | Vulnerable | Vulnerable | no customer action required | source | ||
Schneider Electric | SNC-SEMTECH | Current software and earlier | Vulnerable | Vulnerable | no customer action required | source | ||
Schneider Electric | SNCSEMTECH | Current software and earlier | Vulnerable | SE Cybersecurity Best Practices | ||||
Schneider Electric | SPIMV3 | Current software and earlier | Vulnerable | Vulnerable | no customer action required | source | ||
Schneider Electric | SWBEditor | Current software and earlier | Vulnerable | Vulnerable | no customer action required | source | ||
Schneider Electric | SWBEngine | Current software and earlier | Vulnerable | Vulnerable | no customer action required | source | ||
Schneider Electric | Wiser by SE platform | Not vuln | Fix | Fix | "cloud-based offer; no customer action required" | source | ||
Schweitzer Engineering Laboratories | All | Not vuln | Not vuln | Not vuln | Not vuln | SEL Advisory Link | ||
SCM Manager | All | SCM Manager Link | ||||||
Scootersoftware | Beyond Compare | All | Not vuln | source | ||||
ScreenBeam | All | ScreenBeam Article | ||||||
SDL worldServer | All | SDL worldServer Link | ||||||
Seafile | Server | Not vuln | Fix | source | ||||
Seagull Scientific | BarTender | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
SecurePoint | All | SecurePoint News Link | ||||||
Security Onion | All | Security Onion Blog Post | ||||||
Security Onion Solutions | Security Onion | 2.3.90 20211210 | Not vuln | Fix | source | |||
SecurityHive | All | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
SecurityRoots | Dradis Professional | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Seeburger | All | This advisory is avaiable to customers only and has not been reviewed by CISA | "Seeburger Service Desk Link" | |||||
SentinelOne | All | SentinelOne Blog Post | ||||||
Sentry | All | Sentry Blog Post | ||||||
Sentry.io | Self Hosted and SaaS | All | Not vuln | Not affected as it is written in Python and Rust. Makes use of unaffected versions of log4j 1.x in Kafka and Zookeeper subsystems | source | |||
SEP | All | "SEP Support Link" | ||||||
Server Eye | All | Server Eye Blog Post | ||||||
ServiceNow | All | "ServiceNow Support Link" | ||||||
Shibboleth | All | Identity Provider>=3.0, All other software versions | Not vuln | Not vuln | Not vuln | Not vuln | Log4j CVE (non)-impact | |
Shibboleth | IdP/SP | Not vuln | source | |||||
Shopify | All | Shopify Community Link | ||||||
Siebel | All | Siebel Link | ||||||
Siemens | Affected Products | x | Siemens requested to directly refer to their website: See pdf for the complete list of affected products, CSAF for automated parsing of data | pdf CSAF | ||||
Siemens | Affected Products | x | x | Siemens requested to directly refer to their website: See pdf for the complete list of affected products, CSAF for automated parsing of data | pdf CSAF | |||
Siemens Energy | Affected Products | x | x | Siemens requested to directly refer to their website: See pdf for the complete list of affected products, CSAF for automated parsing of data | pdf CSAF | |||
Siemens Healthineers | ATELLICA DATA MANAGER v1.1.1 / v1.2.1 / v1.3.1 | Vulnerable | If you have determined that your Atellica Data Manager has a “Java communication engine” service, and you require an immediate mitigation, then please contact your Siemens Customer Care Center or your local Siemens technical support representative. | Siemens Healthineers | ||||
Siemens Healthineers | CENTRALINK v16.0.2 / v16.0.3 | Vulnerable | If you have determined that your CentraLink has a “Java communication engine” service, and you require a mitigation, then please contact your Siemens Customer Care Center or your local Siemens technical support representative. | Siemens Healthineers | ||||
Siemens Healthineers | Cios Flow S1 / Alpha / Spin VA30 | Vulnerable | evaluation ongoing | Siemens Healthineers | ||||
Siemens Healthineers | Cios Select FD/I.I. VA21 / VA21-S3P | Vulnerable | evaluation ongoing | Siemens Healthineers | ||||
Siemens Healthineers | DICOM Proxy VB10A | Vulnerable | Workaround: remove the vulnerable class from the .jar file | Siemens Healthineers | ||||
Siemens Healthineers | go.All, Som10 VA20 / VA30 / VA40 | Vulnerable | Workaround: In the meantime, we recommend preventing access to port 8090 from other devices by configuration of the hospital network. | Siemens Healthineers | ||||
Siemens Healthineers | go.Fit, Som10 VA30 | Vulnerable | Workaround: In the meantime, we recommend preventing access to port 8090 from other devices by configuration of the hospital network. | Siemens Healthineers | ||||
Siemens Healthineers | go.Now, Som10 VA10 / VA20 / VA30 / VA40 | Vulnerable | Workaround: In the meantime, we recommend preventing access to port 8090 from other devices by configuration of the hospital network. | Siemens Healthineers | ||||
Siemens Healthineers | go.Open Pro, Som10 VA30 / VA40 | Vulnerable | Workaround: In the meantime, we recommend preventing access to port 8090 from other devices by configuration of the hospital network. | Siemens Healthineers | ||||
Siemens Healthineers | go.Sim, Som10 VA30 / VA40 | Vulnerable | Workaround: In the meantime, we recommend preventing access to port 8090 from other devices by configuration of the hospital network. | Siemens Healthineers | ||||
Siemens Healthineers | go.Top, Som10 VA20 / VA20A_SP5 / VA30 / VA40 | Vulnerable | Workaround: In the meantime, we recommend preventing access to port 8090 from other devices by configuration of the hospital network. | Siemens Healthineers | ||||
Siemens Healthineers | go.Up, Som10 VA10 / VA20 / VA30 / VA40 | Vulnerable | Workaround: In the meantime, we recommend preventing access to port 8090 from other devices by configuration of the hospital network. | Siemens Healthineers | ||||
Siemens Healthineers | MAGNETOM AERA 1,5T, MAGNETOM PRISMA, MAGNETOM PRISMA FIT, MAGNETOM SKYRA 3T NUMARIS/X VA30A | Vulnerable | "LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected." | Siemens Healthineers | ||||
Siemens Healthineers | MAGNETOM Altea NUMARIS/X VA20A | Vulnerable | "LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected." | Siemens Healthineers | ||||
Siemens Healthineers | MAGNETOM ALTEA, MAGNETOM LUMINA, MAGNETOM SOLA, MAGNETOM VIDA NUMARIS/X VA31A | Vulnerable | "LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected." | Siemens Healthineers | ||||
Siemens Healthineers | MAGNETOM Amira NUMARIS/X VA12M | Vulnerable | "LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected." | Siemens Healthineers | ||||
Siemens Healthineers | MAGNETOM Free.Max NUMARIS/X VA40 | Vulnerable | "LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected." | Siemens Healthineers | ||||
Siemens Healthineers | MAGNETOM Lumina NUMARIS/X VA20A | Vulnerable | "LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected." | Siemens Healthineers | ||||
Siemens Healthineers | MAGNETOM Sempra NUMARIS/X VA12M | Vulnerable | "LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected." | Siemens Healthineers | ||||
Siemens Healthineers | MAGNETOM Sola fit NUMARIS/X VA20A | Vulnerable | "LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected." | Siemens Healthineers | ||||
Siemens Healthineers | MAGNETOM Sola NUMARIS/X VA20A | Vulnerable | "LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected." | Siemens Healthineers | ||||
Siemens Healthineers | MAGNETOM Vida fit NUMARIS/X VA20A | Vulnerable | "LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected." | Siemens Healthineers | ||||
Siemens Healthineers | MAGNETOM Vida NUMARIS/X VA10A* / VA20A | Vulnerable | "LOG4J is used in the context of the help system. Workaround: close port 8090 for standalone systems. Setup IP whitelisting for "need to access" systems to network port 8090 in case a second console is connected." | Siemens Healthineers | ||||
Siemens Healthineers | SENSIS DMCC / DMCM / TS / VM / PPWS / DS VD12A | Vulnerable | evaluation ongoing | Siemens Healthineers | ||||
Siemens Healthineers | Somatom Emotion Som5 VC50 | Vulnerable | evaluation ongoing | Siemens Healthineers | ||||
Siemens Healthineers | Somatom Scope Som5 VC50 | Vulnerable | evaluation ongoing | Siemens Healthineers | ||||
Siemens Healthineers | Syngo Carbon Space VA10A / VA10A-CUT2 / VA20A | Vulnerable | Workaround: remove the vulnerable class from the .jar file | Siemens Healthineers | ||||
Siemens Healthineers | Syngo MobileViewer VA10A | Vulnerable | The vulnerability will be patch/mitigated in upcoming releases\patches. | Siemens Healthineers | ||||
Siemens Healthineers | syngo Plaza VB20A / VB20A_HF01 - HF07 / VB30A / VB30A_HF01 / VB30A_HF02 / VB30B / VB30C / VB30C_HF01 - HF06 / VB30C_HF91 | Vulnerable | Workaround: remove the vulnerable class from the .jar file | Siemens Healthineers | ||||
Siemens Healthineers | syngo Workflow MLR VB37A / VB37A_HF01 / VB37A_HF02 / VB37B / VB37B_HF01 - HF07 / VB37B_HF93 / VB37B_HF94 / VB37B_HF96 | Vulnerable | Please contact your Customer Service to get support on mitigating the vulnerability. | Siemens Healthineers | ||||
Siemens Healthineers | syngo.via VB20A / VB20A_HF01 - HF08 / VB20A_HF91 / VB20B / VB30A / VB30A_HF01 - VB30A_HF08 / VB30A_HF91VB30B / VB30B_HF01 / VB40A / VB40A_HF01 - HF02 /VB40B / VB40B_HF01 - HF05 / VB50A / VB50A_CUT / VB50A_D4VB50B / VB50B_HF01 - HF03 / VB60A / VB60A_CUT / VB60A_D4 / VB60A_HF01 | Vulnerable | Workaround: remove the vulnerable class from the .jar file | Siemens Healthineers | ||||
Siemens Healthineers | syngo.via WebViewer VA13B / VA20A / VA20B | Vulnerable | Workaround: remove the vulnerable class from the .jar file | Siemens Healthineers | ||||
Siemens Healthineers | X.Ceed Somaris 10 VA40* | Vulnerable | Workaround: In the meantime, we recommend preventing access to port 8090 from other devices by configuration of the hospital network. | Siemens Healthineers | ||||
Siemens Healthineers | X.Cite Somaris 10 VA30*/VA40* | Vulnerable | Workaround: In the meantime, we recommend preventing access to port 8090 from other devices by configuration of the hospital network. | Siemens Healthineers | ||||
Sierra Wireless | All | Sierra Wireless Security Bulletin | ||||||
Signald | All | Signald Gitlab | ||||||
Silver Peak | Orchestrator, Silver Peak GMS | Vulnerable | Customer managed Orchestrator and legacy GMS products are affected by this vulnerability. This includes on-premise and customer managed instances running in public cloud services such as AWS, Azure, Google, or Oracle Cloud. See Corrective Action Required for details about how to mitigate this exploit. | Security Advisory Notice Apache | ||||
SingleWire | All | This advisory is available to customers only and has not been reviewed by CISA | SingleWire Support Link | |||||
Sitecore | Boxever | Not vuln | "source" | |||||
Sitecore | CDP | Not vuln | "source" | |||||
Sitecore | Content Hub | Not vuln | "source" | |||||
Sitecore | Discover | Not vuln | "source" | |||||
Sitecore | Managed Cloud | customers who bring their own Solr | Not vuln | Workaround | "source" | |||
Sitecore | Managed Cloud | customers who do not use Solr | Not vuln | "source" | ||||
Sitecore | Managed Cloud | customers who host Solr using SearchStax | Not vuln | "source" | ||||
Sitecore | Moosend | Not vuln | "source" | |||||
Sitecore | OrderCloud | Not vuln | "source" | |||||
Sitecore | Personalize | Not vuln | "source" | |||||
Sitecore | Send | Not vuln | "source" | |||||
Sitecore | XP | <= 9.1 (with SOLR as Content Search provider) | Not vuln | "source" | ||||
Sitecore | XP | >= 9.2 (with SOLR as Content Search provider) | Not vuln | Workaround | "source" | |||
Sitecore | XP | all (with Azure Search as Content Search provider) | Not vuln | "source" | ||||
Skillable | All | Skillable Link | ||||||
SLF4J | All | SLF4J Link | ||||||
Slurm | All | 20.11.8 | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Smartbear | SoapUI | <= 5.6.0 | Vulnerable | source | ||||
SmileCDR | All | SmileCDR Blog Post | ||||||
Smiths Medical | CADD®-Solis Download Software | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
Smiths Medical | CADD-Solis Ambulatory Infusion Pump Model 2110 | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
Smiths Medical | CADD-Solis Communication Module Model 2130 | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
Smiths Medical | CADD-Solis Communication Module Model 2131 | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
Smiths Medical | CADD-Solis Network Configuration Utility Software | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
Smiths Medical | Medfusion 3500 Pump Download Utility (DL3500) | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
Smiths Medical | Medfusion 3500 Syringe Infusion Pump | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
Smiths Medical | Medfusion 4000 Syringe Infusion Pump | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
Smiths Medical | Medfusion® 4000 Pump Download Utility (DL4000) | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
Smiths Medical | PharmGuard Administrator Medication Safety Software | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
Smiths Medical | PharmGuard Device Reports Software | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
Smiths Medical | PharmGuard Interoperability Software | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
Smiths Medical | PharmGuard Toolbox 2 Software | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
Smiths Medical | PharmGuard® Server Infusion Management Software | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
Sn0m | All | Sn0m Link | ||||||
Snakemake | All | 6.12.1 | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Snow Software | Snow Commander | 8.10.3 | Not vuln | Fix | Fix | Fix | source | |
Snow Software | VM Access Proxy | 3.7 | Not vuln | Fix | Fix | Fix | source | |
Snowflake | All | Not vuln | Not vuln | Not vuln | Not vuln | Snowflake Community Link | ||
Snyk | Cloud Platform | Not vuln | Not vuln | Not vuln | Not vuln | Snyk Updates | ||
Software AG | All | Software AG | ||||||
SolarWinds | Database Performance Analyzer (DPA) | 2021.1.x, 2021.3.x, 2022.1.x | Vulnerable | Workarounds available, hotfix under development | Apache Log4j Critical Vulnerability (CVE-2021-44228) Database Performance Analyzer (DPA) and the Apache Log4j Vulnerability (CVE-2021-44228) | |||
SolarWinds | Orion Platform core | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
SolarWinds | Server & Application Monitor (SAM) | SAM 2020.2.6 and later | Vulnerable | Workarounds available, hotfix under development | "Apache Log4j Critical Vulnerability (CVE-2021-44228) Server & Application Monitor (SAM) and the Apache Log4j Vulnerability (CVE-2021-44228)" | |||
Soliton Systems | MailZen Management - Cloud Service | All | Not vuln | Fix | source | |||
Soliton Systems | MailZen Management Portal - On-Premise | 2.36.2, 2.37.3, 2.38.2 | Not vuln | Fix | source | |||
Soliton Systems | MailZen Push Server | All | Not vuln | Fix | source | |||
Soliton Systems | Other products | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
SonarSource | SonarCloud | Not vuln | Fix | source | ||||
SonarSource | SonarQube | Not vuln | Workaround | source | ||||
Sonatype | All | Sonatype Vulnerability Statement | ||||||
SonicWall | Access Points | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
SonicWall | Analytics | Not vuln | Not vuln | Not vuln | update based on v2.3 of advisory | source | ||
SonicWall | Analyzer | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
SonicWall | Capture Client & Capture Client Portal | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
SonicWall | Capture Security Appliance | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
SonicWall | CAS | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
SonicWall | Cloud Edge | Not vuln | Not vuln | Not vuln | based on v2.3 of advisory | source | ||
SonicWall | CSCMA | Not vuln | Not vuln | Not vuln | based on v2.3 of advisory | source | ||
SonicWall | Email Security | 10.0.13 | Fix | Fix | Fix | based on version 2.3 of advisory | source | |
SonicWall | EPRS | Not vuln | Not vuln | Not vuln | based on version 2.3 of advisory | source | ||
SonicWall | Gen5 Firewalls (EOS) | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
SonicWall | Gen6 Firewalls | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
SonicWall | Gen7 Firewalls | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
SonicWall | GMS | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
SonicWall | MSW | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
SonicWall | NSM On-Premise | 2.3.2-R12-H2 | Fix | Fix | Fix | based on version 2.3 of advisory | source | |
SonicWall | SMA 100 | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
SonicWall | SMA 1000 | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
SonicWall | SonicCore | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
SonicWall | Switch | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
SonicWall | WAF | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
SonicWall | WNM | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
SonicWall | WXA | Not vuln | Not vuln | Not vuln | Not vuln | source | ||
Sophos | Central | Not vuln | source | |||||
Sophos | Cloud Optix | Not vuln | Fix | source | ||||
Sophos | Firewall | All | Not vuln | source | ||||
Sophos | Firewall (all versions) | Not vuln | Not vuln | Not vuln | Not vuln | Sophos Firewall does not use Log4j. | Advisory: Log4J zero-day vulnerability AKA Log4Shell (CVE-2021-44228) Sophos | |
Sophos | Home | Not vuln | source | |||||
Sophos | Mobile | Not vuln | source | |||||
Sophos | Mobile EAS Proxy | 9.7.2 | Not vuln | Fix | source | |||
Sophos | Reflexion | Not vuln | source | |||||
Sophos | SG UTM | All | Not vuln | source | ||||
Sophos | SG UTM (all versions) | Not vuln | Not vuln | Not vuln | Not vuln | Sophos SG UTM does not use Log4j. | Advisory: Log4J zero-day vulnerability AKA Log4Shell (CVE-2021-44228) Sophos | |
Sophos | SG UTM Manager (SUM) | All | Not vuln | source | ||||
Sophos | SG UTM Manager (SUM) (all versions) | All | Not vuln | Not vuln | Not vuln | Not vuln | SUM does not use Log4j. | Advisory: Log4J zero-day vulnerability AKA Log4Shell (CVE-2021-44228) Sophos |
Sophos | ZTNA | Not vuln | source | |||||
SOS (Berlin) | Jobscheduler | 1.12.15, 1.13.10, 2.2.0, 2.1.3 | Not vuln | Fix | source | |||
SOS Berlin | All | SOS Berlin Link | ||||||
Spambrella | All | Spambrella FAQ Link | ||||||
Specops Software | All | Not vuln | source | |||||
Spectralink | All | Not vuln | Not vuln | Not vuln | using version 1.2.17 | "source" | ||
Spigot | All | Spigot Security Release | ||||||
Splunk | Add-On for Java Management Extensions App ID 2647 | 5.2.0 and older | Vulnerable | Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046) | ||||
Splunk | Add-On for JBoss App ID 2954 | 3.0.0 and older | Vulnerable | Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046) | ||||
Splunk | Add-On for Tomcat App ID 2911 | 3.0.0 and older | Vulnerable | Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046) | ||||
Splunk | Add-On: Java Management Extensions | 5.2.1 | Not vuln | Fix | source | |||
Splunk | Add-On: JBoss | 3.0.1 | Not vuln | Fix | source | |||
Splunk | Add-On: Tomcat | 3.0.1 | Not vuln | Fix | source | |||
Splunk | Admin Config Service | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | Analytics Workspace | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | Application Performance Monitoring | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | Augmented Reality | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | Behavior Analytics | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | Cloud Data Manager (SCDM) | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | Connect for Kafka | <2.0.4 | Not vuln | Fix | source | |||
Splunk | Connect for Kubernetes | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | Connect for SNMP | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | Connect for Syslog | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | Dashboard Studio | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | Data Stream Processor | DSP 1.0.x, DSP 1.1.x, DSP 1.2.x | Vulnerable | source | ||||
Splunk | DB Connect | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | Developer Tools: AppInspect | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | Enterprise | All supported non-Windows versions of 8.1.x and 8.2.x only if Hadoop (Hunk) and/or DFS are used. | Not vuln | Workaround | source | |||
Splunk | Enterprise (including instance types like Heavy Forwarders) | All supported non-Windows versions of 8.1.x and 8.2.x only if DFS is used. See Removing Log4j from Splunk Enterprise below for guidance on unsupported versions. | Vulnerable | Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046) | ||||
Splunk | Enterprise Amazon Machine Image (AMI) | see Splunk Enterprise | Not vuln | Workaround | source | |||
Splunk | Enterprise Cloud | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | Enterprise Docker Container | see Splunk Enterprise | Not vuln | Workaround | source | |||
Splunk | Enterprise Security | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | Heavyweight Forwarder (HWF) | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | Infrastructure Monitoring | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | Intelligence Management (TruSTAR) | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | IT Essentials Work App ID 5403 | 4.11, 4.10.x (Cloud only), 4.9.x | Vulnerable | Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046) | ||||
Splunk | IT Service Intelligence (ITSI) | 4.11.2, 4.10.4, 4.9.6, 4.7.4 | Not vuln | Fix | source | |||
Splunk | IT Service Intelligence (ITSI) App ID 1841 | 4.11.0, 4.10.x (Cloud only), 4.9.x, 4.8.x (Cloud only), 4.7.x, 4.6.x, 4.5.x | Vulnerable | Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046) | ||||
Splunk | KV Service | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | Log Observer | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | Logging Library for Java | <1.11.1 | Not vuln | Fix | source | |||
Splunk | Mint | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | Mission Control | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | MLTK | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | Mobile | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | Network Performance Monitoring | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | On-call / VictorOps | Current | Vulnerable | Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046) | ||||
Splunk | On-Call/Victor Ops | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | Open Telemetry Distributions | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | Operator for Kubernetes | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | OVA for VMWare App ID 3216 | 4.0.3 and older | Vulnerable | Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046) | ||||
Splunk | OVA for VMWare Metrics App ID 5096 | 4.2.1 and older | Vulnerable | Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046) | ||||
Splunk | Profiling | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | Real User Monitoring | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | Secure Gateway (Spacebridge) | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | Security Analytics for AWS | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | SignalFx Smart Agent | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | SOAR (On-Premises) | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | SOAR Cloud (Phantom) | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | Stream Processor Service | Current | Vulnerable | source | ||||
Splunk | Synthetics | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | TV | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | UBA OVA Software | 5.0.3a, 5.0.0 | Vulnerable | Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046) | ||||
Splunk | Universal Forwarder (UF) | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | User Behavior Analytics (UBA) | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Splunk | VMWare OVA for ITSI App ID 4760 | 1.1.1 and older | Vulnerable | Splunk Security Advisory for Apache Log4j (CVE-2021-44228 and CVE-2021-45046) | ||||
Sprecher Automation | SPRECON-E | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Sprecher Automation | SPRECON-EDIR | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Sprecher Automation | SPRECON-SG | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Sprecher Automation | SPRECON-V | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Spring | Boot | Spring Boot users are only affected by this vulnerability if they have switched the default logging system to Log4J2 | source | |||||
Spring Boot | All | Spring Boot Vulnerability Statement | ||||||
Stackstate | Agent | Not vuln | Workaround | StackState Agent distributed as an RPM, DEB or MSI package contains a vulnerable Log4j library. | source | |||
Stackstate | All | 4.3.x, 4.4.x, 4.5.x and SaaS | Not vuln | Workaround | StackState ships with a version of Elasticsearch that contains a vulnerable Log4j library. | source | ||
Stardog | All | <7.8.1 | Not vuln | Fix | source | |||
STERIS | Advantage | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | Advantage Plus | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | AMSCO 2000 SERIES WASHER DISINFECTORS | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | AMSCO 3000 SERIES WASHER DISINFECTORS | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | AMSCO 400 MEDIUM STEAM STERILIZER | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | AMSCO 400 SMALL STEAM STERILIZERS | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | AMSCO 5000 SERIES WASHER DISINFECTORS | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | AMSCO 600 MEDIUM STEAM STERILIZER | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | AMSCO 7000 SERIES WASHER DISINFECTORS | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | AMSCO CENTURY MEDIUM STEAM STERILIZER | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | AMSCO CENTURY SMALL STEAM STERILIZER | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | AMSCO EAGLE 3000 SERIES STAGE 3 STEAM STERILIZERS | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | AMSCO EVOLUTION FLOOR LOADER STEAM STERILIZER | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | AMSCO EVOLUTION MEDIUM STEAM STERILIZER | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | Canexis 1.0 | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | CELERITY HP INCUBATOR | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | CELERITY STEAM INCUBATOR | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | CER Optima | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | Clarity Software | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | Connect Software | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | ConnectAssure Technology | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | ConnectoHIS | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | CS-iQ Sterile Processing Workflow | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | DSD Edge | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | DSD-201, | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | EndoDry | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | Endora | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | Harmony iQ Integration Systems | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | Harmony iQ Perspectives Image Management System | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | HexaVue | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | HexaVue Integration System | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | IDSS Integration System | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | RapidAER | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | ReadyTracker | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | RealView Visual Workflow Management System | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | RELIANCE 444 WASHER DISINFECTOR | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | RELIANCE SYNERGY WASHER DISINFECTOR | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | RELIANCE VISION 1300 SERIES CART AND UTENSIL WASHER DISINFECTORS | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | RELIANCE VISION MULTI- CHAMBER WASHER DISINFECTOR | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | RELIANCE VISION SINGLE CHAMBER WASHER DISINFECTOR | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | Renatron | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | ScopeBuddy+ | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | SecureCare ProConnect Technical Support Services | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | Situational Awareness for Everyone Display (S.A.F.E.) | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | SPM Surgical Asset Tracking Software | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | SYSTEM 1 endo LIQUID CHEMICAL STERILANT PROCESSING SYSTEM | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | V-PRO 1 LOW TEMPERATURE STERILIZATION SYSTEM | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | V-PRO 1 PLUS LOW TEMPERATURE STERILIZATION SYSTEM | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | V-PRO MAX 2 LOW TEMPERATURE STERILIZATION SYSTEM | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | V-PRO MAX LOW TEMPERATURE STERILIZATION SYSTEM | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | V-PRO S2 LOW TEMPERATURE STERILIZATION SYSTEM | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
STERIS | VERIFY INCUBATOR FOR ASSERT SELF-CONTAINED BIOLOGICAL INDICATORS | Not vuln | Not vuln | Not vuln | Not vuln | STERIS Advisory Link | ||
Sterling Order IBM | All | IBM Statement | ||||||
Storagement | All | "Storagement" | ||||||
StormShield | All other products | Not vuln | Not vuln | Advisory only mentions CVE-2021-44228, CVE-2021-45046 | StormShield Security Alert | |||
StormShield | Visibility Center | v1.6.1 | Not vuln | Fix | Fix | Not vuln | source | |
StrangeBee TheHive & Cortex | All | StrangeBee Statement | ||||||
Stratodesk | NoTouch | 4.5.231 | Not vuln | Fix | source | |||
Strimzi | All | Strimzi Statement | ||||||
Stripe | All | Stripe Support | ||||||
Styra | All | Styra Security Notice | ||||||
Sumo logic | Sumu logic | 19.361-12 | Not vuln | Fix | source | |||
SumoLogic | All | Sumologic Release Notes | ||||||
Sumologic | All | Sumologic Statement | ||||||
SuperMicro | BIOS | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
SuperMicro | BMC | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
SuperMicro | SCC Analytics | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
SuperMicro | SCC PODM | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
SuperMicro | SMCIPMITool | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
SuperMicro | SUM Service (SUM_SERVER) | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
SuperMicro | Super Diagnostics Offline | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
SuperMicro | SuperCloud Composer (SCC) | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
SuperMicro | Supermicro Power Manager (SPM) | All | Vulnerable | Upgrade to Log4j 2.15.0. Release pending ASAP | source | |||
SuperMicro | Supermicro Server Manager (SSM) | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
SuperMicro | Supermicro SuperDoctor (SD5) | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
SuperMicro | Supermicro Update Manager (SUM) | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
SuperMicro | vCenter Plug-in | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Superna EYEGLASS | All | Superna EYEGLASS Technical Advisory | ||||||
Suprema Inc | All | Suprema Inc | ||||||
SUSE | Linux Enterprise server | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
SUSE | Manager | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
SUSE | Openstack Cloud | All | Vulnerable | will get update | source | |||
SUSE | Rancher | All | Not vuln | Not vuln | Not vuln | Not vuln | source | |
Sweepwidget | All | Sweepwidget Statement | ||||||
Swyx | All | Swyx Advisory | ||||||
Synacor | Zimbra | 8.8.15 and 9.x | Not vuln | Not vuln | Not vuln | Not vuln | Zimbra stated (in their private support portal) they're not vulnerable. Currently supported Zimbra versions ship 1.2.6 | "source" |
Synchro MSP | All | Synchro MSP Advisory | ||||||
Syncplify | All | Syncplify Advisory | ||||||
SyncRO Soft SRL | Batch Document Converter | 3.2.1 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Git Client | 3.0.1 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen Feedback Enterprise | 2.0.1 build 2021122021 | Not vuln | Fix | Fix | Fix | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen License Server | 24.0 build 2021122016 | Not vuln | Fix | Fix | Fix | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen PDF Chemistry | 22.1 build 2021121712 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen PDF Chemistry | 23.1 build 2021121413 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen PDF Chemistry | 24.0 build 2021121611 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen SDK | 22.1.0.6 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen SDK | 23.1.0.4 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen SDK | 24.0.0.2 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen Web Author Test Server Add-on | 22.1.1 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen Web Author Test Server Add-on | 23.1.2 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen Web Author Test Server Add-on | 24.0.1 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen XML Author | 16.1-22.0 | Not vuln | Workaround | Workaround | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen XML Author | 22.1 build 2021121715 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen XML Author | 23.1 build 2021121415 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen XML Author | 24.0 build 2021121518 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen XML Content Fusion | 2.0.3 build 2021121417 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen XML Content Fusion | 3.0.1 build 2021121414 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen XML Content Fusion | 4.1.4 build 2021121611 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen XML Developer | 16.1-22.0 | Not vuln | Workaround | Workaround | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen XML Developer | 22.1 build 2021121715 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen XML Developer | 23.1 build 2021121415 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen XML Developer | 24.0 build 2021121518 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen XML Editor | 16.1-22.0 | Not vuln | Workaround | Workaround | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen XML Editor | 22.1 build 2021121715 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen XML Editor | 23.1 build 2021121415 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen XML Editor | 24.0 build 2021121518 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen XML Publishing Engine | 22.1 build 2021121712 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen XML Publishing Engine | 23.1 build 2021121413 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen XML Publishing Engine | 24.0 build 2021121611 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen XML Web Author | 22.1.0.5 build 2021122014 | Not vuln | Fix | Fix | Fix | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen XML Web Author | 23.1.1.3 build 2021122014 | Not vuln | Fix | Fix | Fix | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen XML Web Author | 24.0.0.3 build 2021122015 | Not vuln | Fix | Fix | Fix | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen XML WebHelp | 22.1 build 2021121712 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen XML WebHelp | 23.1 build 2021121412 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Oxygen XML WebHelp | 24.0 build 2021121511 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Web Author PDF Plugin | 23.1.1.2 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | Web Author PDF Plugin | 24.0.0.2 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | XSD to JSON Schema Converter | 22.1.1 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | XSD to JSON Schema Converter | 23.1.1 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
SyncRO Soft SRL | XSD to JSON Schema Converter | 24.0.1 | Not vuln | Fix | Fix | Vulnerable | CVE-2021-44228 CVE-2021-45046 CVE-2021-450105 | |
Synology | DSM | Not vuln | Not vuln | Not vuln | Not vuln | The base DSM is not affected. Software installed via the package manager may be vulnerable. | source | |
Synopsys | All | Synopsys Advisory | ||||||
syntevo | DeepGit | >= 4.0 | Not vuln | Fix | 3.0.x and older are vulnerable | source | ||
syntevo | SmartGit | >= 18.1 | Not vuln | Fix | 17.1.x and older are vulnerable | source | ||
syntevo | SmartSVN | >= 9.3 | Not vuln | Fix | 9.2.x and older are vulnerable | source | ||
syntevo | SmartSynchronize | >= 3.5 | Not vuln | Fix | 3.4.x and older are vulnerable | source | ||
SysAid | All | Not vuln | Fix | source | ||||
Sysdig | All | source |