Page History
...
After publication of this, we immediately started checking all our products for exposure to this vulnerability. As was to be feared, many of our products use Log4j (or include third-party components that do), are therefore vulnerable, and need to be updated.
ProductStatus | Log4Shell vulnerable? | Fix Release | Availability | How To Upgrade |
---|---|---|---|---|
ApplicationInsights | vulnerable | 1.6.3 | under development | Upgrade ApplicationInsights (≥ v1.5.1) |
ConnectionsExpert 2.x | vulnerable | 2.1.3 | under development | Upgrade ConnectionsExpert (> v2.0) |
ConnectionsExpert 3.x | vulnerable | 3.0.2 | under development | Upgrade ConnectionsExpert (> v2.0) |
GreenLight | vulnerable | 4.5.0 | in testing - available Dec 16 | Upgrading GreenLight - only for >=3.5.x |
iDNA | vulnerable | 2.11.1 | under development | please contact support |
iDNA Applications | vulnerable | 2.1.2 | released - Dec 13 | Upgrading iDNA Applications |
MarvelClient | safe | |||
OfficeExpert | vulnerable | 4.3.3 | in testing | Upgrading OfficeExpert |
OfficeExpert EPM | safe | |||
SecurityInsider / GroupExplorer | safe | |||
Document Properties Plugin | safe | |||
LogViewer Plugin | safe | |||
Network Monitor Plugin | safe | |||
PrefTree Plugin | safe | |||
Tabzilla Plugin | safe | |||
Timezone Helper Plugin | safe |
...