Log4j

From Braindump
Revision as of 09:24, 13 February 2024 by Jan (talk | contribs) (Created page with "Log4J 1.2.17 <nowiki>https://mvnrepository.com/artifact/log4j/log4j</nowiki> <nowiki>https://nvd.nist.gov/vuln/detail/CVE-2022-23307</nowiki> <nowiki>https://nvd.nist.gov/vuln/detail/CVE-2022-23305</nowiki> <nowiki>https://nvd.nist.gov/vuln/detail/CVE-2022-23302</nowiki> <nowiki>https://nvd.nist.gov/vuln/detail/CVE-2021-4104</nowiki> <nowiki>https://nvd.nist.gov/vuln/detail/CVE-2019-17571</nowiki> https://mvnrepository.com/artifact/ch.qos.reload4j/reload4j Log4J...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Log4J 1.2.17

https://mvnrepository.com/artifact/log4j/log4j

https://nvd.nist.gov/vuln/detail/CVE-2022-23307

https://nvd.nist.gov/vuln/detail/CVE-2022-23305

https://nvd.nist.gov/vuln/detail/CVE-2022-23302

https://nvd.nist.gov/vuln/detail/CVE-2021-4104

https://nvd.nist.gov/vuln/detail/CVE-2019-17571

https://mvnrepository.com/artifact/ch.qos.reload4j/reload4j


Log4J 2

https://mvnrepository.com/artifact/org.apache.logging.log4j/log4j-core

https://logging.apache.org/log4j/2.x/security.html#vulnerabilities

https://nvd.nist.gov/vuln/detail/CVE-2021-44228 Log4Shell had a vulnerability in the JNDI, which allows attackers to connect an LDAP server they controlled and allows for a remote shell into the JVM, giving them full control over the application.

<groupId>org.apache.logging.log4j</groupId>

<artifactId>log4j-core</artifactId>

<version>2.22.1</version>