Логотип exploitDog
product: "log4j"
Консоль
Логотип exploitDog

exploitDog

product: "log4j"
Apache Log4j

Apache Log4jбиблиотека журналирования (логирования) Java-программ

Релизный цикл, информация об уязвимостях

Продукт: Apache Log4j
Вендор: apache

График релизов

122.32.1220012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026

Недавние уязвимости Apache Log4j

Количество 106

suse-cvrf логотип

openSUSE-SU-2020:0051-1

больше 5 лет назад

Security update for log4j

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2020:14267-1

больше 5 лет назад

Security update for log4j

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2020:0054-1

больше 5 лет назад

Security update for log4j

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2020:0053-1

больше 5 лет назад

Security update for log4j

EPSS: Средний
github логотип

GHSA-2qrg-x229-3v8q

больше 5 лет назад

Deserialization of Untrusted Data in Log4j

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-fxph-q3j8-mv87

больше 5 лет назад

Deserialization of Untrusted Data in Log4j

CVSS3: 9.8
EPSS: Критический
nvd логотип

CVE-2019-17571

больше 5 лет назад

Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.

CVSS3: 9.8
EPSS: Средний
debian логотип

CVE-2019-17571

больше 5 лет назад

Included in Log4j 1.2 is a SocketServer class that is vulnerable to de ...

CVSS3: 9.8
EPSS: Средний
ubuntu логотип

CVE-2019-17571

больше 5 лет назад

Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.

CVSS3: 9.8
EPSS: Средний
redhat логотип

CVE-2019-17571

больше 5 лет назад

Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
suse-cvrf логотип
openSUSE-SU-2020:0051-1

Security update for log4j

53%
Средний
больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:14267-1

Security update for log4j

53%
Средний
больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:0054-1

Security update for log4j

53%
Средний
больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:0053-1

Security update for log4j

53%
Средний
больше 5 лет назад
github логотип
GHSA-2qrg-x229-3v8q

Deserialization of Untrusted Data in Log4j

CVSS3: 9.8
53%
Средний
больше 5 лет назад
github логотип
GHSA-fxph-q3j8-mv87

Deserialization of Untrusted Data in Log4j

CVSS3: 9.8
94%
Критический
больше 5 лет назад
nvd логотип
CVE-2019-17571

Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.

CVSS3: 9.8
53%
Средний
больше 5 лет назад
debian логотип
CVE-2019-17571

Included in Log4j 1.2 is a SocketServer class that is vulnerable to de ...

CVSS3: 9.8
53%
Средний
больше 5 лет назад
ubuntu логотип
CVE-2019-17571

Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.

CVSS3: 9.8
53%
Средний
больше 5 лет назад
redhat логотип
CVE-2019-17571

Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.

CVSS3: 9.8
53%
Средний
больше 5 лет назад

Уязвимостей на страницу


Поделиться