Количество 36
Количество 36
ELSA-2022-9419
ELSA-2022-9419: log4j security update (IMPORTANT)
openSUSE-SU-2022:0226-1
Security update for log4j12
openSUSE-SU-2022:0214-1
Security update for log4j
SUSE-SU-2022:14881-1
Security update for log4j
SUSE-SU-2022:0226-1
Security update for log4j12
SUSE-SU-2022:0214-1
Security update for log4j
SUSE-SU-2022:0212-1
Security update for log4j
ELSA-2022-0442
ELSA-2022-0442: log4j security update (IMPORTANT)
openSUSE-SU-2022:0038-1
Security update for kafka
RLSA-2022:0290
Important: parfait:0.5 security update
ELSA-2022-0290
ELSA-2022-0290: parfait:0.5 security update (IMPORTANT)
CVE-2022-23307
CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists.
CVE-2022-23307
CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists.
CVE-2022-23307
CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists.
CVE-2022-23307
CVE-2020-9493 identified a deserialization issue that was present in A ...
GHSA-f7vh-qwp3-x37m
Deserialization of Untrusted Data in Apache Log4j
BDU:2022-01069
Уязвимость библиотеки журналирования Java-программ Log4j, связанная с восстановлением в памяти недостоверных данных, позволяющая нарушителю выполнить произвольный код
CVE-2017-5645
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.
CVE-2017-5645
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.
CVE-2017-5645
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.
Уязвимостей на страницу
Уязвимость  | CVSS  | EPSS  | Опубликовано  | |
|---|---|---|---|---|
ELSA-2022-9419 ELSA-2022-9419: log4j security update (IMPORTANT)  | больше 3 лет назад | |||
openSUSE-SU-2022:0226-1 Security update for log4j12  | почти 4 года назад | |||
openSUSE-SU-2022:0214-1 Security update for log4j  | почти 4 года назад | |||
SUSE-SU-2022:14881-1 Security update for log4j  | почти 4 года назад | |||
SUSE-SU-2022:0226-1 Security update for log4j12  | почти 4 года назад | |||
SUSE-SU-2022:0214-1 Security update for log4j  | почти 4 года назад | |||
SUSE-SU-2022:0212-1 Security update for log4j  | почти 4 года назад | |||
ELSA-2022-0442 ELSA-2022-0442: log4j security update (IMPORTANT)  | больше 3 лет назад | |||
openSUSE-SU-2022:0038-1 Security update for kafka  | больше 3 лет назад | |||
RLSA-2022:0290 Important: parfait:0.5 security update  | почти 4 года назад | |||
ELSA-2022-0290 ELSA-2022-0290: parfait:0.5 security update (IMPORTANT)  | почти 4 года назад | |||
CVE-2022-23307 CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists.  | CVSS3: 8.8  | 1% Низкий | почти 4 года назад | |
CVE-2022-23307 CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists.  | CVSS3: 8.8  | 1% Низкий | почти 4 года назад | |
CVE-2022-23307 CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists.  | CVSS3: 8.8  | 1% Низкий | почти 4 года назад | |
CVE-2022-23307 CVE-2020-9493 identified a deserialization issue that was present in A ...  | CVSS3: 8.8  | 1% Низкий | почти 4 года назад | |
GHSA-f7vh-qwp3-x37m Deserialization of Untrusted Data in Apache Log4j  | CVSS3: 9.8  | 1% Низкий | почти 4 года назад | |
BDU:2022-01069 Уязвимость библиотеки журналирования Java-программ Log4j, связанная с восстановлением в памяти недостоверных данных, позволяющая нарушителю выполнить произвольный код  | CVSS3: 9.8  | 1% Низкий | почти 4 года назад | |
CVE-2017-5645 In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.  | CVSS3: 9.8  | 94% Критический | больше 8 лет назад | |
CVE-2017-5645 In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.  | CVSS3: 8.1  | 94% Критический | больше 8 лет назад | |
CVE-2017-5645 In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.  | CVSS3: 9.8  | 94% Критический | больше 8 лет назад | 
Уязвимостей на страницу