JBoss CVE-2021-44228 관련 SW보안권고문 (S-Z) 페이지 정보 작성자 ilillillili 작성일 21-12-14 00:05 조회 34,973 댓글 1 본문 CVE-2021-44228관련 SW보안권고문 (S-Z) (Log4Shell,log4j,vulnerability - Cheat-sheet Reference Guide, S-Z) S SAFE FME Server : https://community.safe.com/s/article/Is-FME-Server-Affected-by-the-Security-Vulnerability-Reported-Against-log4j SailPoint : https://community.sailpoint.com/t5/IdentityIQ-Blog/IdentityIQ-log4j-Remote-Code-Execution-Vulnerability/ba-p/206681 Salesforce : https://help.salesforce.com/s/articleView?id=000363736&type=1 SAP BusinessObjects : https://launchpad.support.sap.com/#/notes/3129956 SAP Global coverage : https://launchpad.support.sap.com/#/notes/3129930 SAS : https://support.sas.com/content/support/en/security-bulletins/remote-code-execution-vulnerability-cve-2021-44228.html Security Onion : https://blog.securityonion.net/2021/12/security-onion-2390-20211210-hotfix-now.html ServiceNow : https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1000959 Sesam Info : https://twitter.com/sesam_info/status/1469711992122486791 Shibboleth : http://shibboleth.net/pipermail/announce/2021-December/000253.html Signald : https://gitlab.com/signald/signald/-/issues/259 Skillable : https://skillable.com/log4shell/ SLF4J : http://slf4j.org/log4shell.html SmileCDR : https://www.smilecdr.com/our-blog/a-statement-on-log4shell-cve-2021-44228 Software AG : https://tech.forums.softwareag.com/t/log4j-zero-day-vulnerability/253849 SolarWinds : https://www.solarwinds.com/trust-center/security-advisories/cve-2021-44228 SonarSource : https://community.sonarsource.com/t/sonarqube-and-the-log4j-vulnerability/54721 Sonatype : https://blog.sonatype.com/a-new-0-day-log4j-vulnerability-discovered-in-the-wild SonicWall : https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032 Sophos : https://www.sophos.com/en-us/security-advisories/sophos-sa-20211210-log4j-rce Splunk : https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html Spring Boot : https://spring.io/blog/2021/12/10/log4j2-vulnerability-and-spring-boot SUSE : https://www.suse.com/security/cve/CVE-2021-44228.html Sterling Order IBM : https://www.ibm.com/support/pages/node/6525544 Swingset : https://github.com/bpangburn/swingset/blob/017452b2d0d8370871f43a68043dacf53af7f759/swingset/CHANGELOG.txt#L10 Synopsys : https://community.synopsys.com/s/article/SIG-Security-Advisory-for-Apache-Log4J2-CVE-2021-44228 T Talend : https://jira.talendforge.org/browse/TCOMP-2054 TealiumIQ : https://community.tealiumiq.com/t5/Announcements-Blog/Update-on-Log4j-Security-Vulnerability/ba-p/36824 TrendMicro : https://success.trendmicro.com/solution/000289940 U Ubiquiti-UniFi-UI : https://community.ui.com/releases/UniFi-Network-Application-6-5-54/d717f241-48bb-4979-8b10-99db36ddabe1 Ubuntu : https://ubuntu.com/security/CVE-2021-44228 USSIGNAL MSP : https://ussignal.com/blog/apache-log4j-vulnerability V Varonis : https://help.varonis.com/s/article/Apache-Log4j-Zero-Day-Vulnerability-CVE-2021-44228 Veeam : https://forums.veeam.com/veeam-backup-for-azure-f59/log4j-cve-2021-44228-vulnerability-t78225.html#p438231 Vespa ENGINE : https://github.com/vespa-engine/blog/blob/f281ce4399ed3e97b4fed32fcc36f9ba4b17b1e2/_posts/2021-12-10-log4j-vulnerability.md VMware : https://www.vmware.com/security/advisories/VMSA-2021-0028.html W Wallarm : https://lab.wallarm.com/cve-2021-44228-mitigation-update/ WatchGuard / Secplicity / https://www.secplicity.org/2021/12/10/critical-rce-vulnerability-in-log4js/ WitFoo : https://www.witfoo.com/blog/emergency-update-for-cve-2021-44228-log4j/ Wowza : https://www.wowza.com/docs/known-issues-with-wowza-streaming-engine#log4j2-cve WSO2 : https://github.com/wso2/security-tools/pull/169 X XCP-ng : https://xcp-ng.org/forum/topic/5315/log4j-vulnerability-impact Y Yandex-Cloud : https://github.com/yandex-cloud/docs/blob/6ff6c676787756e7dd6101c53b051e4cd04b3e85/ru/overview/security-bulletins/index.md#10122021--cve-2021-44228--%D1%83%D0%B4%D0%B0%D0%BB%D0%B5%D0%BD%D0%BD%D0%BE%D0%B5-%D0%B2%D1%8B%D0%BF%D0%BE%D0%BB%D0%BD%D0%B5%D0%BD%D0%B8%D0%B5-%D0%BA%D0%BE%D0%B4%D0%B0-log4shell-apache-log4j Z ZAMMAD : https://community.zammad.org/t/cve-2021-44228-elasticsearch-users-be-aware/8256 Zaproxy : https://www.zaproxy.org/blog/2021-12-10-zap-and-log4shell/ Zerto : https://help.zerto.com/kb/000004822 Zesty : https://www.zesty.io/mindshare/company-announcements/log4j-exploit/ ZSCALER : https://www.zscaler.fr/blogs/security-research/security-advisory-log4j-0-day-remote-code-execution-vulnerability-cve-2021 Other great resources https://www.techsolvency.com/story-so-far/cve-2021-44228-log4j-log4shell/ https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592#file-20211210-tlp-white_log4j-md 이전글 log4j2 취약점 스캐너 다음글 CVE-2021-44228 관련 SW보안권고문 (A-R) 댓글목록 1 최고관리자님의 댓글 최고관리자 작성일 21-12-17 16:21 좋은글 감사합니다. ^^ 좋은글 감사합니다. ^^
최고관리자님의 댓글
최고관리자 작성일좋은글 감사합니다. ^^