| A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | Vendor | URL | ||||||||||||||||||||||||
2 | Akamai | https://www.akamai.com/blog/news/CVE-2021-44228-Zero-Day-Vulnerability | ||||||||||||||||||||||||
3 | Apache Druid | https://github.com/apache/druid/pull/12051 | ||||||||||||||||||||||||
4 | Apache Flink | https://flink.apache.org/2021/12/10/log4j-cve.html | ||||||||||||||||||||||||
5 | Apache LOG4J | https://logging.apache.org/log4j/2.x/security.html | ||||||||||||||||||||||||
6 | Apache Kafka | https://lists.apache.org/thread/lgbtvvmy68p0059yoyn9qxzosdmx4jdv | ||||||||||||||||||||||||
7 | Apache Solr | https://solr.apache.org/security.html#apache-solr-affected-by-apache-log4j-cve-2021-44228 | ||||||||||||||||||||||||
8 | Apero CAS | https://apereo.github.io/2021/12/11/log4j-vuln/ | ||||||||||||||||||||||||
9 | APPSHEET | https://community.appsheet.com/t/appsheet-statement-on-log4j-vulnerability-cve-2021-44228/59976 | ||||||||||||||||||||||||
10 | Aptible | https://status.aptible.com/incidents/gk1rh440h36s?u=zfbcrbt2lkv4 | ||||||||||||||||||||||||
11 | Atlassian | https://confluence.atlassian.com/kb/faq-for-cve-2021-44228-1103069406.html | ||||||||||||||||||||||||
12 | Automox | https://blog.automox.com/log4j-critical-vulnerability-scores-a-10 | ||||||||||||||||||||||||
13 | Avaya | https://support.avaya.com/helpcenter/getGenericDetails?detailId=1399839287609 | ||||||||||||||||||||||||
14 | AWS | https://aws.amazon.com/security/security-bulletins/AWS-2021-005/ | ||||||||||||||||||||||||
15 | AZURE Datalake store java | https://github.com/Azure/azure-data-lake-store-java/blob/ed5d6304783286c3cfff0a1dee457a922e23ad48/CHANGES.md#version-2310 | ||||||||||||||||||||||||
16 | BACKBLAZE | https://twitter.com/backblaze/status/1469477224277368838 | ||||||||||||||||||||||||
17 | BitDefender | https://businessinsights.bitdefender.com/security-advisory-bitdefender-response-to-critical-0-day-apache-log4j2-vulnerability | ||||||||||||||||||||||||
18 | BitNami By VMware | https://docs.bitnami.com/general/security/security-2021-12-10/ | ||||||||||||||||||||||||
19 | BMC Software | https://community.bmc.com/s/news/aA33n000000TSUdCAO/bmc-security-advisory-for-cve202144228-log4shell-vulnerability | ||||||||||||||||||||||||
20 | Broadcom | https://support.broadcom.com/security-advisory/content/security-advisories/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability/SYMSA19793 | ||||||||||||||||||||||||
21 | CarbonBlack | https://community.carbonblack.com/t5/Threat-Research-Docs/Log4Shell-Log4j-Remote-Code-Execution-CVE-2021-44228/ta-p/109134 | ||||||||||||||||||||||||
22 | Cerberus FTP | https://support.cerberusftp.com/hc/en-us/articles/4412448183571-Cerberus-is-not-affected-by-CVE-2021-44228-log4j-0-day-vulnerability | ||||||||||||||||||||||||
23 | CheckPoint | https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk176865&partition=General&product=IPS | ||||||||||||||||||||||||
24 | Cisco | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd | ||||||||||||||||||||||||
25 | Citrix | https://support.citrix.com/article/CTX335705 | ||||||||||||||||||||||||
26 | CloudFlare | https://blog.cloudflare.com/cve-2021-44228-log4j-rce-0-day-mitigation/ | ||||||||||||||||||||||||
27 | CPanel | https://forums.cpanel.net/threads/log4j-cve-2021-44228-does-it-affect-cpanel.696249/ | ||||||||||||||||||||||||
28 | CommVault | https://community.commvault.com/technical-q-a-2/log4j-been-used-in-commvault-1985?postid=11745#post11745 | ||||||||||||||||||||||||
29 | ConcreteCMS.com | https://www.concretecms.com/about/blog/security/concrete-log4j-zero-day-exploit | ||||||||||||||||||||||||
30 | Connect2id | https://connect2id.com/blog/connect2id-server-12-5-1 | ||||||||||||||||||||||||
31 | ConnectWise | https://www.connectwise.com/company/trust/advisories | ||||||||||||||||||||||||
32 | ContrastSecurity | https://support.contrastsecurity.com/hc/en-us/articles/4412612486548 | ||||||||||||||||||||||||
33 | Coralogix | https://twitter.com/Coralogix/status/1469713430659559425 | ||||||||||||||||||||||||
34 | CouchBase | https://forums.couchbase.com/t/ann-elasticsearch-connector-4-3-3-4-2-13-fixes-log4j-vulnerability/32402 | ||||||||||||||||||||||||
35 | Cybereason | https://www.cybereason.com/blog/cybereason-solutions-are-not-impacted-by-apache-log4j-vulnerability-cve-2021-44228 | ||||||||||||||||||||||||
36 | Datto | https://www.datto.com/blog/dattos-response-to-log4shell | ||||||||||||||||||||||||
37 | Debian | https://security-tracker.debian.org/tracker/CVE-2021-44228 | ||||||||||||||||||||||||
38 | Dell | https://www.dell.com/support/kbdoc/fr-fr/000194372/dsn-2021-007-dell-response-to-apache-log4j-remote-code-execution-vulnerability | ||||||||||||||||||||||||
39 | Docker | https://www.docker.com/blog/apache-log4j-2-cve-2021-44228/ | ||||||||||||||||||||||||
40 | Docusign | https://www.docusign.com/trust/alerts/alert-docusign-statement-on-the-log4j2-vulnerability | ||||||||||||||||||||||||
41 | DropWizard | https://twitter.com/dropwizardio/status/1469285337524580359 | ||||||||||||||||||||||||
42 | DynaTrace | https://community.dynatrace.com/t5/Dynatrace-Open-Q-A/Impact-of-log4j-zero-day-vulnerability/m-p/177259/highlight/true#M19282 | ||||||||||||||||||||||||
43 | Eclipse Foundation | https://git.eclipse.org/r/c/tracecompass/org.eclipse.tracecompass/+/188751 | ||||||||||||||||||||||||
44 | Elastic | https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476 | ||||||||||||||||||||||||
45 | EVLLABS JGAAP | https://github.com/evllabs/JGAAP/releases/tag/v8.0.2 | ||||||||||||||||||||||||
46 | F5 Networks | https://support.f5.com/csp/article/K19026212 | ||||||||||||||||||||||||
47 | F-Secure | https://status.f-secure.com/incidents/sk8vmr0h34pd | ||||||||||||||||||||||||
48 | Fastly | https://www.fastly.com/blog/digging-deeper-into-log4shell-0day-rce-exploit-found-in-log4j | ||||||||||||||||||||||||
49 | ForcePoint | https://support.forcepoint.com/s/article/CVE-2021-44228-Java-log4j-vulnerability-mitigation-with-Forcepoint-Security-Manager | ||||||||||||||||||||||||
50 | Forescout | https://forescout.force.com/support/s/article/Important-security-information-related-to-Apache-Log4j-utility-CVE-2021-44228 | ||||||||||||||||||||||||
51 | FusionAuth | https://fusionauth.io/blog/2021/12/10/log4j-fusionauth/ | ||||||||||||||||||||||||
52 | Genesys | https://www.genesys.com/blog/post/genesys-update-on-the-apache-log4j-vulnerability | ||||||||||||||||||||||||
53 | Ghidra | https://github.com/NationalSecurityAgency/ghidra/blob/2c73c72f0ba2720c6627be4005a721a5ebd64b46/README.md#warning | ||||||||||||||||||||||||
54 | GitHub | https://github.com/advisories/GHSA-jfh8-c2jp-5v3q | ||||||||||||||||||||||||
55 | GoAnywhere | https://www.goanywhere.com/cve-2021-44228-goanywhere-mitigation-steps | ||||||||||||||||||||||||
56 | Google Cloud Armor WAF | https://cloud.google.com/blog/products/identity-security/cloud-armor-waf-rule-to-help-address-apache-log4j-vulnerability | ||||||||||||||||||||||||
57 | GrayLog | https://www.graylog.org/post/graylog-update-for-log4j | ||||||||||||||||||||||||
58 | GuardedBox | https://twitter.com/GuardedBox/status/1469739834117799939 | ||||||||||||||||||||||||
59 | HackerOne | https://twitter.com/jobertabma/status/1469490881854013444 | ||||||||||||||||||||||||
60 | HCL Software | https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0095486 | ||||||||||||||||||||||||
61 | Huawei | https://www.huawei.com/en/psirt/security-notices/huawei-sn-20211210-01-log4j2-en | ||||||||||||||||||||||||
62 | HostiFi | https://twitter.com/hostifi_net/status/1469511114824339464 | ||||||||||||||||||||||||
63 | Imperva | https://www.imperva.com/blog/how-were-protecting-customers-staying-ahead-of-cve-2021-44228/ | ||||||||||||||||||||||||
64 | Inductive Automation | https://support.inductiveautomation.com/hc/en-us/articles/4416204541709-Regarding-CVE-2021-44228-Log4j-RCE-0-day | ||||||||||||||||||||||||
65 | Informatica | https://network.informatica.com/community/informatica-network/blog/2021/12/10/log4j-vulnerability-update | ||||||||||||||||||||||||
66 | Ivanti | https://forums.ivanti.com/s/article/CVE-2021-44228-Java-logging-library-log4j-Ivanti-Products-Impact-Mapping?language=en_US | ||||||||||||||||||||||||
67 | JAMF NATION | https://community.jamf.com/t5/jamf-pro/third-party-security-issue/td-p/253740 | ||||||||||||||||||||||||
68 | JazzSM DASH IBM | https://www.ibm.com/support/pages/node/6525552 | ||||||||||||||||||||||||
69 | Jenkins | https://www.jenkins.io/blog/2021/12/10/log4j2-rce-CVE-2021-44228/ | ||||||||||||||||||||||||
70 | JetBrains Teamcity | https://youtrack.jetbrains.com/issue/TW-74298 | ||||||||||||||||||||||||
71 | JFROG | https://twitter.com/jfrog/status/1469385793823199240 | ||||||||||||||||||||||||
72 | Jitsi | https://github.com/jitsi/security-advisories/blob/4e1ab58585a8a0593efccce77d5d0e22c5338605/advisories/JSA-2021-0004.md | ||||||||||||||||||||||||
73 | Kafka Connect CosmosDB | https://github.com/microsoft/kafka-connect-cosmosdb/blob/0f5d0c9dbf2812400bb480d1ff0672dfa6bb56f0/CHANGELOG.md | ||||||||||||||||||||||||
74 | Kaseya | https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment | ||||||||||||||||||||||||
75 | Keycloak | https://github.com/keycloak/keycloak/discussions/9078 | ||||||||||||||||||||||||
76 | Leanix | https://www.leanix.net/en/blog/log4j-vulnerability-log4shell | ||||||||||||||||||||||||
77 | LucentSKY | https://twitter.com/LucentSky/status/1469358706311974914 | ||||||||||||||||||||||||
78 | Lightbend | https://discuss.lightbend.com/t/regarding-the-log4j2-vulnerability-cve-2021-44228/9275 | ||||||||||||||||||||||||
79 | Macchina io | https://twitter.com/macchina_io/status/1469611606569099269 | ||||||||||||||||||||||||
80 | McAfee | https://kc.mcafee.com/corporate/index?page=content&id=KB95091 | ||||||||||||||||||||||||
81 | Metabase | https://github.com/metabase/metabase/commit/8bfce98beb25e48830ac2bfd57432301c5e3ab37 | ||||||||||||||||||||||||
82 | Microsoft | https://msrc-blog.microsoft.com/2021/12/11/microsofts-response-to-cve-2021-44228-apache-log4j2/ | ||||||||||||||||||||||||
83 | Minecraft | https://www.minecraft.net/en-us/article/important-message--security-vulnerability-java-edition | ||||||||||||||||||||||||
84 | N-able | https://www.n-able.com/security-and-privacy/apache-log4j-vulnerability | ||||||||||||||||||||||||
85 | NELSON | https://github.com/getnelson/nelson/blob/f4d3dd1f1d4f8dfef02487f67aefb9c60ab48bf5/project/custom.scala | ||||||||||||||||||||||||
86 | NetApp | https://security.netapp.com/advisory/ntap-20211210-0007/ | ||||||||||||||||||||||||
87 | Netflix | https://github.com/search?q=org%3ANetflix+CVE-2021-44228&type=commits | ||||||||||||||||||||||||
88 | NextGen Healthcare Mirth | https://github.com/nextgenhealthcare/connect/discussions/4892#discussioncomment-1789526 | ||||||||||||||||||||||||
89 | Newrelic | https://github.com/newrelic/newrelic-java-agent/issues/605 | ||||||||||||||||||||||||
90 | Okta | https://sec.okta.com/articles/2021/12/log4shell | ||||||||||||||||||||||||
91 | OpenHab | https://github.com/openhab/openhab-distro/pull/1343 | ||||||||||||||||||||||||
92 | OpenNMS | https://www.opennms.com/en/blog/2021-12-10-opennms-products-affected-by-apache-log4j-vulnerability-cve-2021-44228/ | ||||||||||||||||||||||||
93 | OpenMRS TALK | https://talk.openmrs.org/t/urgent-security-advisory-2021-12-11-re-apache-log4j-2/35341 | ||||||||||||||||||||||||
94 | OpenSearch | https://discuss.opendistrocommunity.dev/t/log4j-patch-for-cve-2021-44228/7950 | ||||||||||||||||||||||||
95 | Oracle | https://www.oracle.com/security-alerts/alert-cve-2021-44228.html | ||||||||||||||||||||||||
96 | OxygenXML | https://www.oxygenxml.com/security/advisory/CVE-2019-17571.html | ||||||||||||||||||||||||
97 | Palo-Alto Networks | https://security.paloaltonetworks.com/CVE-2021-44228 | ||||||||||||||||||||||||
98 | PaperCut | https://www.papercut.com/support/known-issues/#PO-684 | ||||||||||||||||||||||||
99 | Parse.ly | https://blog.parse.ly/parse-ly-log4shell/ | ||||||||||||||||||||||||
100 | Pega | https://docs.pega.com/security-advisory/security-advisory-apache-log4j-zero-day-vulnerability |