Lucene search

K

CVE-2021-44228

🗓️ 10 Dec 2021 10:09:15Reported by apacheType 
cve
 cve
🔗 web.nvd.nist.gov📰️ 429 Media mentions👁 4467 Views🌐 WEB

CVE-2021-44228 - Apache Log4j2 JNDI features vulnerabilit

Show more
Related
Detection
Affected
Refs
Paths
Social
Nvd
Vulners
Node
apachelog4jRange2.0.12.3.1
OR
apachelog4jRange2.4.02.12.2
OR
apachelog4jRange2.13.02.15.0
OR
apachelog4jMatch2.0-
OR
apachelog4jMatch2.0beta9
OR
apachelog4jMatch2.0rc1
OR
apachelog4jMatch2.0rc2
Node
siemenscaptialRange<2019.1
OR
siemenscaptialMatch2019.1-
OR
siemenscaptialMatch2019.1sp1912
OROROROROROROROROROROROROROROROROR
siemensgma-managerRange<8.6.2j-398
OROROROROROR
siemensmindsphereRange<2021-12-11
OR
siemensnavigatorRange<2021-12-13
OROROROROROROROROROROROROROROROROROROROROROROROROROROROROROROR
siemensvesysRange<2019.1
OR
siemensvesysMatch2019.1
OR
siemensvesysMatch2019.1-
OR
siemensvesysMatch2019.1sp1912
OROR
Node
Node
OROR
ciscobroadworksRange<2021.11_1.162
OROR
ciscobusiness_process_automationRange3.1.000.0003.1.000.044
OR
ciscobusiness_process_automationRange3.2.000.0003.2.000.009
OR
ciscocloud_connectRange<12.6\(1\)
OR
ciscocloudcenterRange<4.10.0.16
OROROROROROROROROROROROROROROROROROROROROROROR
ciscodna_centerRange<2.1.2.8
OR
ciscodna_centerRange2.2.2.02.2.2.8
OR
ciscodna_centerRange2.2.3.02.2.3.4
OR
ciscodna_spaces\Match_connector
OROROROR
ciscofinesseRange<12.6\(1\)
OR
ciscofinesseMatch12.6\(1\)
OROROROROROROROROROROROROROROROROR
ciscopaging_serverRange<14.4.1
OROR
ciscosd-wan_vmanageRange<20.3.4.1
OR
ciscosd-wan_vmanageRange20.420.4.2.1
OR
ciscosd-wan_vmanageRange20.520.5.1.1
OR
ciscosd-wan_vmanageRange20.620.6.2.1
OR
ciscosmart_phyRange<3.2.1
OR
ciscoucs_centralRange<2.0\(1p\)
OR
ciscoucs_directorRange<6.8.2.0
OROR
ciscounified_communications_managerRange<11.5\(1\)session_management
OROROR
ciscounified_communications_managerMatch11.5\(1\)session_management
OROROROROROROROROROROR
ciscounity_connectionRange<11.5\(1\)
OROROROROROROROROR
ciscowebex_meetings_serverMatch3.0maintenance_release1
OR
ciscowebex_meetings_serverMatch3.0maintenance_release2
OR
ciscowebex_meetings_serverMatch3.0maintenance_release3
OR
ciscowebex_meetings_serverMatch3.0maintenance_release3-
OR
ciscowebex_meetings_serverMatch3.0maintenance_release3_security_patch4
OR
ciscowebex_meetings_serverMatch3.0maintenance_release3_security_patch5
OR
ciscowebex_meetings_serverMatch3.0maintenance_release3_service_pack_2
OR
ciscowebex_meetings_serverMatch3.0maintenance_release3_service_pack_3
OR
ciscowebex_meetings_serverMatch3.0maintenance_release4
OROR
ciscowebex_meetings_serverMatch4.0maintenance_release1
OR
ciscowebex_meetings_serverMatch4.0maintenance_release2
OR
ciscowebex_meetings_serverMatch4.0maintenance_release3
OROROROR
Node
OROR
ciscocloudcenter_suiteMatch4.10\(0.15\)
OROROROROROROROROROROROROROROROROROROROROROROROROROROROROROROROR
ciscodna_centerMatch2.2.2.8
OROROROR
ciscoemergency_responderMatch11.5\(4.65000.14\)
OR
ciscoemergency_responderMatch11.5\(4.66000.14\)
OROROROROROROROROROR
ciscofinesseMatch12.5\(1\)su1
OR
ciscofinesseMatch12.5\(1\)su2
OR
ciscofinesseMatch12.6\(1\)-
OR
ciscofinesseMatch12.6\(1\)es01
OR
ciscofinesseMatch12.6\(1\)es02
OR
ciscofinesseMatch12.6\(1\)es03
OROROROROROROROROR
ciscoidentity_services_engineMatch002.004\(000.914\)-
OR
ciscoidentity_services_engineMatch002.006\(000.156\)-
OR
ciscoidentity_services_engineMatch002.007\(000.356\)-
OR
ciscoidentity_services_engineMatch003.000\(000.458\)-
OR
ciscoidentity_services_engineMatch003.001\(000.518\)-
OR
ciscoidentity_services_engineMatch003.002\(000.116\)-
OROROROROROROROROROROROROROROROROR
ciscopaging_serverMatch8.3\(1\)
OR
ciscopaging_serverMatch8.4\(1\)
OR
ciscopaging_serverMatch8.5\(1\)
OR
ciscopaging_serverMatch9.0\(1\)
OR
ciscopaging_serverMatch9.0\(2\)
OR
ciscopaging_serverMatch9.1\(1\)
OR
ciscopaging_serverMatch12.5\(2\)
OR
ciscopaging_serverMatch14.0\(1\)
OROROROROROROROROR
ciscosmart_phyMatch3.1.2
OR
ciscosmart_phyMatch3.1.3
OR
ciscosmart_phyMatch3.1.4
OR
ciscosmart_phyMatch3.1.5
OR
ciscosmart_phyMatch3.2.1
OROROROROROROROROROROROROROROROROROROROR
ciscounified_computing_systemMatch006.008\(001.000\)
OROROROROROROROROROROROROROROROROROROR
ciscounified_sip_proxyMatch010.000\(000\)
OR
ciscounified_sip_proxyMatch010.000\(001\)
OR
ciscounified_sip_proxyMatch010.002\(000\)
OR
ciscounified_sip_proxyMatch010.002\(001\)
OROROR
ciscounity_connectionMatch11.5\(1.10000.6\)
OROROROROROROROROROROROROROROR
Node
bentleysynchroRange6.16.4.3.2pro
OR
bentleysynchro_4dRange<6.2.4.2pro
Node
percussionrhythmyxRange7.3.2
Node
applexcodeRange<13.3
[
  {
    "vendor": "Apache Software Foundation",
    "product": "Apache Log4j2",
    "versions": [
      {
        "version": "2.0-beta9",
        "status": "affected",
        "lessThan": "log4j-core*",
        "versionType": "custom",
        "changes": [
          {
            "at": "2.3.1",
            "status": "unaffected"
          },
          {
            "at": "2.4",
            "status": "affected"
          },
          {
            "at": "2.12.2",
            "status": "unaffected"
          },
          {
            "at": "2.13.0",
            "status": "affected"
          },
          {
            "at": "2.15.0",
            "status": "unaffected"
          }
        ]
      }
    ]
  }
]
ParameterPositionPathDescriptionCWE
methodToCallquery param/ADSearch.ccThe parameter 'methodToCall' can be exploited to control log messages, allowing for potential remote code execution via the Log4j vulnerability.CWE-20CWE-400CWE-502
Rows per page

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo