CVE-2017-5645 vulnerability in Apache and Other Products
Published on April 17, 2017
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
Vendor Advisory
NVD
Products Associated with CVE-2017-5645
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2017-5645 are published in these products:
Affected Versions
Apache Software Foundation Apache Log4j Version All versions between 2.0-alpha1 and 2.8.1 is affected by CVE-2017-5645Exploit Probability
EPSS
94.01%
Percentile
99.89%
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.