A flaw in Log4j allows remote code execution via untrusted data deserializatio
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | RHEL 5 / 6 : Red Hat JBoss Enterprise Application Platform 5.2 (RHSA-2017:3399) | 13 Dec 201700:00 | β | nessus |
![]() | RHEL 5 : log4j (Unpatched Vulnerability) | 3 Jun 202400:00 | β | nessus |
![]() | RHEL 7 : log4j (RHSA-2017:2423) | 10 Aug 201700:00 | β | nessus |
![]() | CentOS 7 : log4j (CESA-2017:2423) | 1 Sep 201700:00 | β | nessus |
![]() | Amazon Linux AMI : log4j (ALAS-2022-1562) | 20 Jan 202200:00 | β | nessus |
![]() | Amazon Linux 2 : log4j (ALAS-2022-1739) | 23 Aug 202300:00 | β | nessus |
![]() | RHEL 6 : jboss-ec2-eap (RHSA-2017:2638) | 8 Sep 201700:00 | β | nessus |
![]() | Ubuntu 18.04 LTS : Apache Log4j vulnerability (USN-4495-1) | 15 Sep 202000:00 | β | nessus |
![]() | Debian DLA-2065-1 : apache-log4j1.2 security update | 13 Jan 202000:00 | β | nessus |
![]() | SUSE SLES11 Security Update : log4j (SUSE-SU-2020:14267-1) | 10 Jun 202100:00 | β | nessus |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo