|
7 | 7 |
|
8 | 8 | | Supplier | Product | Version (see Status) | Status CVE-2021-4104 | Status CVE-2021-44228 | Status CVE-2021-45046 | Status CVE-2021-45105 | Notes | Links |
|
9 | 9 | |:---------|:--------|:--------------------:|:--------------------:|:---------------------:|:---------------------:|:---------------------:|:------|------:|
|
10 |
| -|K15t|All| | | | | | |[K15t Statement](https://help.k15t.com/k15t-apps-and-log4shell-193401141.html)| |
11 |
| -|K6|All| | | | | | |[K6 Statement](https://k6.io/blog/k6-products-not-impacted-by-cve-2021-44228/)| |
12 |
| -|Kaltura|Blackboard Learn SaaS in the classic Learn experience|v3900.28.x|Fix|Fix|Fix|Fix| |[source](https://knowledge.kaltura.com/help/blackboard-learn-release-notes#blackboard-learn-december-2021-release-notes-v5412)| |
13 |
| -|Kaltura|Blackboard Learn Self- and Managed-Hosting|v3900.26.x|Fix|Fix|Fix|Fix| |[source](https://knowledge.kaltura.com/help/blackboard-learn-release-notes#blackboard-learn-december-2021-release-notes-v5412)| |
14 |
| -|Karakun|All| | | | | | |"[Karakun Statement](https://board.karakun.com/viewtopic.php?f=21&t=8351)"| |
15 |
| -|Kaseya|AuthAnvil| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| |
16 |
| -|Kaseya|BMS| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| |
17 |
| -|Kaseya|ID Agent DarkWeb ID and BullPhish ID| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| |
18 |
| -|Kaseya|IT Glue| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| |
19 |
| -|Kaseya|MyGlue| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| |
20 |
| -|Kaseya|Network Glue| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| |
21 |
| -|Kaseya|Passly| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| |
22 |
| -|Kaseya|products not listed above| | |Investigation| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| |
23 |
| -|Kaseya|RocketCyber| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| |
24 |
| -|Kaseya|Spannign Salesforce Backup| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| |
25 |
| -|Kaseya|Spanning O365 Backup| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| |
26 |
| -|Kaseya|Unitrends| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| |
27 |
| -|Kaseya|Vorex| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| |
28 |
| -|Kaseya|VSA SaaS and VSA On-Premises| | |Not vuln| | | |[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| |
29 |
| -|KeePass|All|All|Not vuln|Not vuln|Not vuln|Not vuln| |[source](https://sourceforge.net/p/keepass/discussion/329220/thread/4643c5ec4f/?limit=250)| |
30 |
| -|Keeper|All| | |Fix|Fix| | |[source](https://www.keepersecurity.com/blog/2021/12/15/public-notice-regarding-the-apache-foundation-log4j-vulnerability/)| |
31 |
| -|Keeper Security|All| | | | | | |[Keeper Security Notice](https://www.keepersecurity.com/blog/2021/12/15/public-notice-regarding-the-apache-foundation-log4j-vulnerability/)| |
32 |
| -|KEMP|All| | | | | | |[KEMP Support](https://support.kemptechnologies.com/hc/en-us/articles/4416430695437-CVE-2021-44228-Log4j2-Exploit)| |
33 |
| -|KEMP 2|All| | | | | | |[KEMP 2 Support](https://support.kemptechnologies.com/hc/en-us/articles/4416473820045-Progress-Kemp-LoadMaster-protects-from-security-vulnerability-Apache-Log4j-2-CVE-2021-44228-)| |
34 |
| -|Keycloak|All|all version| |Not vuln| | | |[source](https://github.com/keycloak/keycloak/discussions/9078)| |
35 |
| -|Kofax|Capture|All| |Not vuln| | | |[source](https://knowledge.kofax.com/Capture/Kofax_Capture/Reference/Log4J_Vulnerability_CVE-2021-44228_Does_Not_Affect_Kofax_Capture)| |
36 |
| -|Kofax|Communication Manager (KCM)|5.3-5.5|Not vuln|Fix| | | |[source](https://knowledge.kofax.com/Communications_Manager/Troubleshooting/log4j_vulnerability_in_Kofax_Communications_Manager)| |
37 |
| -|Kofax|Robot File System (RFS)|>=10.7|Not vuln|Workaround| | | |[source](https://knowledge.kofax.com/Robotic_Process_Automation/Troubleshooting/Kofax_RPA_CVE-2021-44228_log4j_Security_Exploit_Information)| |
38 |
| -|Kofax|Robotic Process Automation (RPA)|11.1|Not vuln|Workaround| | | |[source](https://knowledge.kofax.com/Robotic_Process_Automation/Troubleshooting/Kofax_RPA_CVE-2021-44228_log4j_Security_Exploit_Information)| |
39 |
| -|Kofax|Robotic Process Automation (RPA)|11.2|Not vuln|Workaround| | | |[source](https://knowledge.kofax.com/Robotic_Process_Automation/Troubleshooting/Kofax_RPA_CVE-2021-44228_log4j_Security_Exploit_Information)| |
40 |
| -|Konica Minolta|All| | | | | | |[Konica Minolta Support](https://www.konicaminolta.de/de-de/support/log4j)| |
41 |
| -|Kronos UKG|All| | | | | | |[Kronos UKG Statement](https://community.kronos.com/s/feed/0D54M00004wJKHiSAO?language=en_US)| |
42 |
| -|Kyberna|All| | | | | | |[Kyberna Statement](https://www.kyberna.com/detail/log4j-sicherheitsluecke)| |
| 10 | +|K15t|All| | | | | ||[K15t Statement](https://help.k15t.com/k15t-apps-and-log4shell-193401141.html)| |
| 11 | +|K6|All| | | | | ||[K6 Statement](https://k6.io/blog/k6-products-not-impacted-by-cve-2021-44228/)| |
| 12 | +|Kaltura|Blackboard Learn SaaS in the classic Learn experience|v3900.28.x|Fix|Fix|Fix|Fix||[source](https://knowledge.kaltura.com/help/blackboard-learn-release-notes#blackboard-learn-december-2021-release-notes-v5412)| |
| 13 | +|Kaltura|Blackboard Learn Self- and Managed-Hosting|v3900.26.x|Fix|Fix|Fix|Fix||[source](https://knowledge.kaltura.com/help/blackboard-learn-release-notes#blackboard-learn-december-2021-release-notes-v5412)| |
| 14 | +|Karakun|All| | | | | ||[Karakun Statement](https://board.karakun.com/viewtopic.php?f=21&t=8351)| |
| 15 | +|Kaseya|AuthAnvil| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| |
| 16 | +|Kaseya|BMS| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| |
| 17 | +|Kaseya|ID Agent DarkWeb ID and BullPhish ID| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| |
| 18 | +|Kaseya|IT Glue| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| |
| 19 | +|Kaseya|MyGlue| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| |
| 20 | +|Kaseya|Network Glue| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| |
| 21 | +|Kaseya|Passly| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| |
| 22 | +|Kaseya|products not listed above| | |Investigation| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| |
| 23 | +|Kaseya|RocketCyber| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| |
| 24 | +|Kaseya|Spannign Salesforce Backup| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| |
| 25 | +|Kaseya|Spanning O365 Backup| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| |
| 26 | +|Kaseya|Unitrends| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| |
| 27 | +|Kaseya|Vorex| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| |
| 28 | +|Kaseya|VSA SaaS and VSA On-Premises| | |Not vuln| | ||[source](https://helpdesk.kaseya.com/hc/en-gb/articles/4413449967377-Log4j2-Vulnerability-Assessment)| |
| 29 | +|KeePass|All|All|Not vuln|Not vuln|Not vuln|Not vuln||[source](https://sourceforge.net/p/keepass/discussion/329220/thread/4643c5ec4f/?limit=250)| |
| 30 | +|Keeper|All| | |Fix|Fix| ||[source](https://www.keepersecurity.com/blog/2021/12/15/public-notice-regarding-the-apache-foundation-log4j-vulnerability/)| |
| 31 | +|Keeper Security|All| | | | | ||[Keeper Security Notice](https://www.keepersecurity.com/blog/2021/12/15/public-notice-regarding-the-apache-foundation-log4j-vulnerability/)| |
| 32 | +|KEMP|All| | | | | ||[KEMP Support](https://support.kemptechnologies.com/hc/en-us/articles/4416430695437-CVE-2021-44228-Log4j2-Exploit)| |
| 33 | +|KEMP 2|All| | | | | ||[KEMP 2 Support](https://support.kemptechnologies.com/hc/en-us/articles/4416473820045-Progress-Kemp-LoadMaster-protects-from-security-vulnerability-Apache-Log4j-2-CVE-2021-44228-)| |
| 34 | +|Keycloak|All|all version| |Not vuln| | ||[source](https://github.com/keycloak/keycloak/discussions/9078)| |
| 35 | +|Kofax|Capture|All| |Not vuln| | ||[source](https://knowledge.kofax.com/Capture/Kofax_Capture/Reference/Log4J_Vulnerability_CVE-2021-44228_Does_Not_Affect_Kofax_Capture)| |
| 36 | +|Kofax|Communication Manager (KCM)|5.3-5.5|Not vuln|Fix| | ||[source](https://knowledge.kofax.com/Communications_Manager/Troubleshooting/log4j_vulnerability_in_Kofax_Communications_Manager)| |
| 37 | +|Kofax|Robot File System (RFS)|>=10.7|Not vuln|Workaround| | ||[source](https://knowledge.kofax.com/Robotic_Process_Automation/Troubleshooting/Kofax_RPA_CVE-2021-44228_log4j_Security_Exploit_Information)| |
| 38 | +|Kofax|Robotic Process Automation (RPA)|11.1|Not vuln|Workaround| | ||[source](https://knowledge.kofax.com/Robotic_Process_Automation/Troubleshooting/Kofax_RPA_CVE-2021-44228_log4j_Security_Exploit_Information)| |
| 39 | +|Kofax|Robotic Process Automation (RPA)|11.2|Not vuln|Workaround| | ||[source](https://knowledge.kofax.com/Robotic_Process_Automation/Troubleshooting/Kofax_RPA_CVE-2021-44228_log4j_Security_Exploit_Information)| |
| 40 | +|Konica Minolta|All| | | | | ||[Konica Minolta Support](https://www.konicaminolta.de/de-de/support/log4j)| |
| 41 | +|Kronos UKG|All| | | | | ||[Kronos UKG Statement](https://community.kronos.com/s/feed/0D54M00004wJKHiSAO?language=en_US)| |
| 42 | +|Kyberna|All| | | | | ||[Kyberna Statement](https://www.kyberna.com/detail/log4j-sicherheitsluecke)| |
0 commit comments