Apache

Log4j

19 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.17%
  • Veröffentlicht 10.04.2026 15:43:00
  • Zuletzt bearbeitet 24.04.2026 18:24:14

Apache Log4j's JsonTemplateLayout https://logging.apache.org/log4j/2.x/manual/json-template-layout.html , in versions up to and including 2.25.3, produces invalid JSON output when log events contain non-finite floating-point values (NaN, Infinity, o...

  • EPSS 0.17%
  • Veröffentlicht 10.04.2026 15:42:03
  • Zuletzt bearbeitet 24.04.2026 18:21:54

Apache Log4j Core's XmlLayout https://logging.apache.org/log4j/2.x/manual/layouts.html#XmlLayout , in versions up to and including 2.25.3, fails to sanitize characters forbidden by the XML 1.0 specification https://www.w3.org/TR/xml/#charsets prod...

Exploit
  • EPSS 0.17%
  • Veröffentlicht 10.04.2026 15:41:07
  • Zuletzt bearbeitet 06.05.2026 18:21:34

The Log4j1XmlLayout from the Apache Log4j 1-to-Log4j 2 bridge fails to escape characters forbidden by the XML 1.0 standard, producing malformed XML output. Conforming XML parsers are required to reject documents containing such characters with a fata...

  • EPSS 0.17%
  • Veröffentlicht 10.04.2026 15:40:17
  • Zuletzt bearbeitet 24.04.2026 18:10:57

Apache Log4j Core's Rfc5424Layout https://logging.apache.org/log4j/2.x/manual/layouts.html#RFC5424Layout , in versions 2.21.0 through 2.25.3, is vulnerable to log injection via CRLF sequences due to undocumented renames of security-relevant configur...

  • EPSS 0.12%
  • Veröffentlicht 10.04.2026 15:36:19
  • Zuletzt bearbeitet 06.05.2026 16:49:51

The fix for CVE-2025-68161 https://logging.apache.org/security.html#CVE-2025-68161 was incomplete: it addressed hostname verification only when enabled via the log4j2.sslVerifyHostName https://logging.apache.org/log4j/2.x/manual/systemproperties.h...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 18.12.2025 20:47:49
  • Zuletzt bearbeitet 20.01.2026 01:15:55

The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does not perform TLS hostname verification of the peer certificate, even when the verifyHostName https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfigu...

  • EPSS 0.15%
  • Veröffentlicht 10.03.2023 14:15:10
  • Zuletzt bearbeitet 13.02.2025 17:16:12

** UNSUPPORTED WHEN ASSIGNED ** When using the Chainsaw or SocketAppender components with Log4j 1.x on JRE less than 1.7, an attacker that manages to cause a logging entry involving a specially-crafted (ie, deeply nested) hashmap or hashtable (depe...

  • EPSS 0.79%
  • Veröffentlicht 18.01.2022 16:15:08
  • Zuletzt bearbeitet 07.07.2025 18:15:24

JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can prov...

  • EPSS 2.6%
  • Veröffentlicht 18.01.2022 16:15:08
  • Zuletzt bearbeitet 21.11.2024 06:48:22

CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists.

  • EPSS 9.45%
  • Veröffentlicht 18.01.2022 16:15:08
  • Zuletzt bearbeitet 21.11.2024 06:48:22

By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to m...