Количество 10
Количество 10
CVE-2019-17571
Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.
CVE-2019-17571
Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.
CVE-2019-17571
Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.
CVE-2019-17571
Included in Log4j 1.2 is a SocketServer class that is vulnerable to de ...
openSUSE-SU-2020:0051-1
Security update for log4j
SUSE-SU-2020:14267-1
Security update for log4j
SUSE-SU-2020:0054-1
Security update for log4j
SUSE-SU-2020:0053-1
Security update for log4j
GHSA-2qrg-x229-3v8q
Deserialization of Untrusted Data in Log4j
BDU:2020-02355
Уязвимость библиотеки журналирования Java-программ Log4j, связанная с восстановлением в памяти недостоверных данных, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2019-17571 Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17. | CVSS3: 9.8 | 43% Средний | почти 6 лет назад | |
CVE-2019-17571 Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17. | CVSS3: 9.8 | 43% Средний | почти 6 лет назад | |
CVE-2019-17571 Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17. | CVSS3: 9.8 | 43% Средний | почти 6 лет назад | |
CVE-2019-17571 Included in Log4j 1.2 is a SocketServer class that is vulnerable to de ... | CVSS3: 9.8 | 43% Средний | почти 6 лет назад | |
openSUSE-SU-2020:0051-1 Security update for log4j | 43% Средний | почти 6 лет назад | ||
SUSE-SU-2020:14267-1 Security update for log4j | 43% Средний | почти 6 лет назад | ||
SUSE-SU-2020:0054-1 Security update for log4j | 43% Средний | почти 6 лет назад | ||
SUSE-SU-2020:0053-1 Security update for log4j | 43% Средний | почти 6 лет назад | ||
GHSA-2qrg-x229-3v8q Deserialization of Untrusted Data in Log4j | CVSS3: 9.8 | 43% Средний | почти 6 лет назад | |
BDU:2020-02355 Уязвимость библиотеки журналирования Java-программ Log4j, связанная с восстановлением в памяти недостоверных данных, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 43% Средний | почти 6 лет назад |
Уязвимостей на страницу