Log4j: Difference between revisions
Created page with "Log4J 1.2.17 <nowiki>https://mvnrepository.com/artifact/log4j/log4j</nowiki> <nowiki>https://nvd.nist.gov/vuln/detail/CVE-2022-23307</nowiki> <nowiki>https://nvd.nist.gov/vuln/detail/CVE-2022-23305</nowiki> <nowiki>https://nvd.nist.gov/vuln/detail/CVE-2022-23302</nowiki> <nowiki>https://nvd.nist.gov/vuln/detail/CVE-2021-4104</nowiki> <nowiki>https://nvd.nist.gov/vuln/detail/CVE-2019-17571</nowiki> https://mvnrepository.com/artifact/ch.qos.reload4j/reload4j Log4J..." |
(No difference)
|
Latest revision as of 09:24, 13 February 2024
Log4J 1.2.17
https://mvnrepository.com/artifact/log4j/log4j
https://nvd.nist.gov/vuln/detail/CVE-2022-23307
https://nvd.nist.gov/vuln/detail/CVE-2022-23305
https://nvd.nist.gov/vuln/detail/CVE-2022-23302
https://nvd.nist.gov/vuln/detail/CVE-2021-4104
https://nvd.nist.gov/vuln/detail/CVE-2019-17571
https://mvnrepository.com/artifact/ch.qos.reload4j/reload4j
Log4J 2
https://mvnrepository.com/artifact/org.apache.logging.log4j/log4j-core
https://logging.apache.org/log4j/2.x/security.html#vulnerabilities
https://nvd.nist.gov/vuln/detail/CVE-2021-44228 Log4Shell had a vulnerability in the JNDI, which allows attackers to connect an LDAP server they controlled and allows for a remote shell into the JVM, giving them full control over the application.
<groupId>org.apache.logging.log4j</groupId>
<artifactId>log4j-core</artifactId>
<version>2.22.1</version>