Find out if you have vulnerabilities that put you at risk

Test your applications
Toggle filtering controls
Report a new vulnerability
VULNERABILITYAFFECTSTYPEPUBLISHED
  • H
Open Redirect
eap8-log4j<0:2.22.1-1.redhat_00002.1.el8eaprhel:85 Nov 2024
  • H
Improper Verification of Cryptographic Signature
eap8-log4j<0:2.22.1-1.redhat_00002.1.el8eaprhel:85 Nov 2024
  • H
Memory Leak
eap8-log4j<0:2.22.1-1.redhat_00002.1.el8eaprhel:85 Nov 2024
  • H
Allocation of Resources Without Limits or Throttling
eap8-log4j<0:2.22.1-1.redhat_00002.1.el8eaprhel:85 Nov 2024
  • H
Resource Exhaustion
eap8-log4j<0:2.22.1-1.redhat_00002.1.el8eaprhel:85 Nov 2024
  • H
Integer Coercion Error
eap8-log4j<0:2.22.1-1.redhat_00002.1.el8eaprhel:85 Nov 2024
  • H
Open Redirect
eap8-log4j<0:2.22.1-1.redhat_00002.1.el9eaprhel:95 Nov 2024
  • H
Improper Verification of Cryptographic Signature
eap8-log4j<0:2.22.1-1.redhat_00002.1.el9eaprhel:95 Nov 2024
  • H
Memory Leak
eap8-log4j<0:2.22.1-1.redhat_00002.1.el9eaprhel:95 Nov 2024
  • H
Allocation of Resources Without Limits or Throttling
eap8-log4j<0:2.22.1-1.redhat_00002.1.el9eaprhel:95 Nov 2024
  • H
Resource Exhaustion
eap8-log4j<0:2.22.1-1.redhat_00002.1.el9eaprhel:95 Nov 2024
  • H
Integer Coercion Error
eap8-log4j<0:2.22.1-1.redhat_00002.1.el9eaprhel:95 Nov 2024
  • M
Truncation of Security-relevant Information
eap8-log4j<0:2.19.0-2.redhat_00001.1.el8eaprhel:88 Mar 2024
  • M
Link Following
eap8-log4j<0:2.19.0-2.redhat_00001.1.el8eaprhel:88 Mar 2024
  • M
Excessive Iteration
eap8-log4j<0:2.19.0-2.redhat_00001.1.el8eaprhel:88 Mar 2024
  • M
Directory Traversal
eap8-log4j<0:2.19.0-2.redhat_00001.1.el8eaprhel:88 Mar 2024
  • M
Truncation of Security-relevant Information
eap8-log4j<0:2.19.0-2.redhat_00001.1.el9eaprhel:98 Mar 2024
  • M
Link Following
eap8-log4j<0:2.19.0-2.redhat_00001.1.el9eaprhel:98 Mar 2024
  • M
Excessive Iteration
eap8-log4j<0:2.19.0-2.redhat_00001.1.el9eaprhel:98 Mar 2024
  • M
Directory Traversal
eap8-log4j<0:2.19.0-2.redhat_00001.1.el9eaprhel:98 Mar 2024
  • M
Server-Side Request Forgery (SSRF)
eap8-log4j2-jboss-logmanager<0:1.1.2-1.Final_redhat_00002.1.el8eaprhel:85 Jun 2024
  • M
Unprotected Transport of Credentials
eap8-log4j2-jboss-logmanager<0:1.1.2-1.Final_redhat_00002.1.el8eaprhel:85 Jun 2024
  • M
Insufficient Verification of Data Authenticity
eap8-log4j2-jboss-logmanager<0:1.1.2-1.Final_redhat_00002.1.el8eaprhel:85 Jun 2024
  • M
Improper Initialization
eap8-log4j2-jboss-logmanager<0:1.1.2-1.Final_redhat_00002.1.el8eaprhel:85 Jun 2024
  • M
Server-Side Request Forgery (SSRF)
eap8-log4j2-jboss-logmanager<0:1.1.2-1.Final_redhat_00002.1.el9eaprhel:95 Jun 2024
  • M
Unprotected Transport of Credentials
eap8-log4j2-jboss-logmanager<0:1.1.2-1.Final_redhat_00002.1.el9eaprhel:95 Jun 2024
  • M
Insufficient Verification of Data Authenticity
eap8-log4j2-jboss-logmanager<0:1.1.2-1.Final_redhat_00002.1.el9eaprhel:95 Jun 2024
  • M
Improper Initialization
eap8-log4j2-jboss-logmanager<0:1.1.2-1.Final_redhat_00002.1.el9eaprhel:95 Jun 2024
  • M
Allocation of Resources Without Limits or Throttling
log4j*centos:819 Jun 2025
  • L
Authentication Bypass
log4j*centos:919 Jun 2025