Количество 8
Количество 8
BDU:2021-01051
Уязвимость библиотеки журналирования Java-программ Log4j, связанная с восстановлением в памяти недостоверных данных, позволяющая нарушителю выполнить произвольный код
CVE-2017-5645
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.
CVE-2017-5645
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.
CVE-2017-5645
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.
CVE-2017-5645
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or ...
GHSA-fxph-q3j8-mv87
Deserialization of Untrusted Data in Log4j
ELSA-2017-2423
ELSA-2017-2423: log4j security update (IMPORTANT)
ELSA-2022-9419
ELSA-2022-9419: log4j security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость  | CVSS  | EPSS  | Опубликовано  | |
|---|---|---|---|---|
BDU:2021-01051 Уязвимость библиотеки журналирования Java-программ Log4j, связанная с восстановлением в памяти недостоверных данных, позволяющая нарушителю выполнить произвольный код  | CVSS3: 9.8  | 94% Критический | больше 8 лет назад | |
CVE-2017-5645 In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.  | CVSS3: 9.8  | 94% Критический | больше 8 лет назад | |
CVE-2017-5645 In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.  | CVSS3: 8.1  | 94% Критический | больше 8 лет назад | |
CVE-2017-5645 In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.  | CVSS3: 9.8  | 94% Критический | больше 8 лет назад | |
CVE-2017-5645 In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or ...  | CVSS3: 9.8  | 94% Критический | больше 8 лет назад | |
GHSA-fxph-q3j8-mv87 Deserialization of Untrusted Data in Log4j  | CVSS3: 9.8  | 94% Критический | почти 6 лет назад | |
ELSA-2017-2423 ELSA-2017-2423: log4j security update (IMPORTANT)  | около 8 лет назад | |||
ELSA-2022-9419 ELSA-2022-9419: log4j security update (IMPORTANT)  | больше 3 лет назад | 
Уязвимостей на страницу