Search for packages
| purl | pkg:maven/org.ops4j.pax.logging/pax-logging-log4j2@1.10.9 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-gnhu-4afv-pfhy
Aliases: GHSA-xxfh-x98p-j8fr GMS-2021-75 |
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in org.ops4j.pax.logging:pax-logging-log4j2. |
Affected by 3 other vulnerabilities. Affected by 3 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-r67p-yqg2-9bbq | Improper Input Validation and Injection in Apache Log4j2 Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to an attack where an attacker with permission to modify the logging configuration file can construct a malicious configuration using a JDBC Appender with a data source referencing a JNDI URI which can execute remote code. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2. |
CVE-2021-44832
GHSA-8489-44mv-ggj8 |
| VCID-sjuz-dd96-sqe3 | Uncontrolled Recursion This advisory has been marked as a false positive. |
CVE-2021-45105
GHSA-p6xc-xr62-6r2g |