Page History
...
After publication of this, we immediately started checking all our products for exposure to this vulnerability. As was to be feared, many of our products use Log4j (or include third-party components that do), are therefore vulnerable, and need to be updated.
Product | Status | Fix Release | Availability | How To Upgrade |
---|---|---|---|---|
ApplicationInsights | vulnerable | 1.6.3 |
under development | Upgrade ApplicationInsights (≥ v1.5.1) | |
ConnectionsExpert 2.x | vulnerable | 2.1.3 |
under development | Upgrade ConnectionsExpert (> v2.0) | |
ConnectionsExpert 3.x | vulnerable | 3.0.2 |
under development | Upgrade ConnectionsExpert (> v2.0) | |
GreenLight | vulnerable | 4.5.0 |
in testing - available Dec |
16 | Upgrading GreenLight - only for >=3.5.x | |
iDNA | vulnerable | 2.11.1 |
under development | please contact support | |
iDNA Applications | vulnerable | 2.1.2 |
in testing | Upgrading iDNA Applications | |||
MarvelClient | safe | |||
OfficeExpert | vulnerable | 4.3.3 |
in testing | Upgrading OfficeExpert | |||
OfficeExpert EPM | safe | |||
SecurityInsider / GroupExplorer | safe | |||
Document Properties Plugin | safe | |||
LogViewer Plugin | safe | |||
Network Monitor Plugin | safe | |||
PrefTree Plugin | safe | |||
Tabzilla Plugin | safe | |||
Timezone Helper Plugin | safe |
(Table will be continuously updated)
...