Page History
...
After publication of this, we immediately started checking all our products for exposure to this vulnerability. As was to be feared, many of our products use Log4j (or include third-party components that do), are therefore vulnerable, and need to be updated.
Product | Status | Fix Release | Availability | How To Upgrade |
---|---|---|---|---|
ApplicationInsights | vulnerable | 1.6.3 | not yet | Upgrade ApplicationInsights (≥ v1.5.1) |
ConnectionsExpert 2.x | vulnerable | 2.1.3 | not yet | Upgrade ConnectionsExpert (> v2.0) |
ConnectionsExpert 3.x | vulnerable | 3.0.2 | not yet | Upgrade ConnectionsExpert (> v2.0) |
GreenLight | vulnerable | 4.5.0 | yes - Dec 13 | Upgrading GreenLight - only for >=3.5.x |
iDNA | vulnerable | 2.11.1 | not yet | please contact support |
iDNA Applications | vulnerable | 2.1.2 | not yet | Upgrading iDNA Applications |
MarvelClient | safe | |||
OfficeExpert | vulnerable | 4.3.3 | not yet | Upgrading OfficeExpert |
OfficeExpert EPM | safe | |||
SecurityInsider / GroupExplorer | safe | |||
Document Properties Plugin | safe | |||
LogViewer Plugin | safe | |||
Network Monitor Plugin | safe | |||
PrefTree Plugin | safe | |||
Tabzilla Plugin | safe | |||
Timezone Helper Plugin | safe |
What happens now? What do I need to do?
...