Page History
...
After publication of this, we immediately started checking all our products for exposure to this vulnerability. As was to be feared, many of our products use Log4j (or include third-party components that do), are therefore vulnerable, and need to be updated.
Product | Log4Shell vulnerable? | Fix Status | Fix Release | How To Upgrade |
---|---|---|---|---|
ApplicationInsights | vulnerable | in testing | 1.6.3 | Upgrade ApplicationInsights (≥ v1.5.1) |
ConnectionsExpert 2.x | vulnerable | under development | 2.1.3 | Upgrade ConnectionsExpert (> v2.0) |
ConnectionsExpert 3.x | vulnerable | in testing | 3.0.2 | Upgrade ConnectionsExpert (> v2.0) |
GreenLight | vulnerable | in testing - available Dec 16 | 4.5.0 | Upgrading GreenLight - only for >=3.5.x |
iDNA | vulnerable | in testing | 2.11.1 | please contact support |
iDNA Applications | vulnerable - fix available | released - Dec 13 | 2.1.2 | Upgrading iDNA Applications |
MarvelClient | safe | |||
OfficeExpert | vulnerable | in testing | 4.3.3 | Upgrading OfficeExpert |
OfficeExpert EPM | safe | |||
SecurityInsider / GroupExplorer | safe | |||
Document Properties Plugin | safe | |||
LogViewer Plugin | safe | |||
Network Monitor Plugin | safe | |||
PrefTree Plugin | safe | |||
Tabzilla Plugin | safe | |||
Timezone Helper Plugin | safe |
(Table will be continuously updated)
...