Количество 8
Количество 8
GHSA-fxph-q3j8-mv87
Deserialization of Untrusted Data in Log4j

CVE-2017-5645
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.

CVE-2017-5645
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.

CVE-2017-5645
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.
CVE-2017-5645
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or ...
ELSA-2017-2423
ELSA-2017-2423: log4j security update (IMPORTANT)

BDU:2021-01051
Уязвимость библиотеки журналирования Java-программ Log4j, связанная с восстановлением в памяти недостоверных данных, позволяющая нарушителю выполнить произвольный код
ELSA-2022-9419
ELSA-2022-9419: log4j security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-fxph-q3j8-mv87 Deserialization of Untrusted Data in Log4j | CVSS3: 9.8 | 94% Критический | больше 5 лет назад | |
![]() | CVE-2017-5645 In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code. | CVSS3: 9.8 | 94% Критический | около 8 лет назад |
![]() | CVE-2017-5645 In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code. | CVSS3: 8.1 | 94% Критический | около 8 лет назад |
![]() | CVE-2017-5645 In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code. | CVSS3: 9.8 | 94% Критический | около 8 лет назад |
CVE-2017-5645 In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or ... | CVSS3: 9.8 | 94% Критический | около 8 лет назад | |
ELSA-2017-2423 ELSA-2017-2423: log4j security update (IMPORTANT) | почти 8 лет назад | |||
![]() | BDU:2021-01051 Уязвимость библиотеки журналирования Java-программ Log4j, связанная с восстановлением в памяти недостоверных данных, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 94% Критический | около 8 лет назад |
ELSA-2022-9419 ELSA-2022-9419: log4j security update (IMPORTANT) | около 3 лет назад |
Уязвимостей на страницу