Логотип exploitDog
product: "log4j"
Консоль
Логотип exploitDog

exploitDog

product: "log4j"
Apache Log4j

Apache Log4jбиблиотека журналирования (логирования) Java-программ

Релизный цикл, информация об уязвимостях

Продукт: Apache Log4j
Вендор: apache

График релизов

122.32.12200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027

Недавние уязвимости Apache Log4j

Количество 111

fstec логотип

BDU:2022-00526

около 4 лет назад

Уязвимость реализации класса JMSSink библиотеки журналирования Java-программ Log4j, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.6
EPSS: Низкий
github логотип

GHSA-8489-44mv-ggj8

около 4 лет назад

Improper Input Validation and Injection in Apache Log4j2

CVSS3: 6.6
EPSS: Средний
suse-cvrf логотип

openSUSE-SU-2022:0002-1

около 4 лет назад

Security update for log4j

EPSS: Средний
suse-cvrf логотип

openSUSE-SU-2021:4208-1

около 4 лет назад

Security update for log4j

EPSS: Средний
nvd логотип

CVE-2021-44832

около 4 лет назад

Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.

CVSS3: 6.6
EPSS: Средний
debian логотип

CVE-2021-44832

около 4 лет назад

Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fi ...

CVSS3: 6.6
EPSS: Средний
ubuntu логотип

CVE-2021-44832

около 4 лет назад

Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.

CVSS3: 6.6
EPSS: Средний
suse-cvrf логотип

openSUSE-SU-2021:1631-1

около 4 лет назад

Security update for kafka

EPSS: Высокий
redhat логотип

CVE-2021-44832

около 4 лет назад

Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.

CVSS3: 6.6
EPSS: Средний
suse-cvrf логотип

openSUSE-SU-2021:1613-1

около 4 лет назад

Security update for logback

EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
fstec логотип
BDU:2022-00526

Уязвимость реализации класса JMSSink библиотеки журналирования Java-программ Log4j, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.6
0%
Низкий
около 4 лет назад
github логотип
GHSA-8489-44mv-ggj8

Improper Input Validation and Injection in Apache Log4j2

CVSS3: 6.6
35%
Средний
около 4 лет назад
suse-cvrf логотип
openSUSE-SU-2022:0002-1

Security update for log4j

35%
Средний
около 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:4208-1

Security update for log4j

35%
Средний
около 4 лет назад
nvd логотип
CVE-2021-44832

Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.

CVSS3: 6.6
35%
Средний
около 4 лет назад
debian логотип
CVE-2021-44832

Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fi ...

CVSS3: 6.6
35%
Средний
около 4 лет назад
ubuntu логотип
CVE-2021-44832

Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.

CVSS3: 6.6
35%
Средний
около 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:1631-1

Security update for kafka

74%
Высокий
около 4 лет назад
redhat логотип
CVE-2021-44832

Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.

CVSS3: 6.6
35%
Средний
около 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:1613-1

Security update for logback

94%
Критический
около 4 лет назад

Уязвимостей на страницу


Поделиться