Search for packages
| purl | pkg:maven/org.apache.logging.log4j/log4j@2.0-alpha1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-bbq3-tx7c-yucn
Aliases: CVE-2022-23307 GHSA-f7vh-qwp3-x37m |
This advisory has been marked as False Positive and removed. |
Affected by 4 other vulnerabilities. |
|
VCID-mz9r-j78c-dfe3
Aliases: CVE-2020-9488 GHSA-vwqq-5vrc-xw9h |
Improper validation of certificate with host mismatch in Apache Log4j SMTP appender prior to version 2.13.2. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender. |
Affected by 2 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 2 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-zbwq-f71w-jqhy | Deserialization of Untrusted Data in Log4j Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions 1.2 up to 1.2.17. Users are advised to migrate to `org.apache.logging.log4j:log4j-core`. |
CVE-2019-17571
GHSA-2qrg-x229-3v8q |