CVE-2021-4104

JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:log4j:1.2:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:redhat:codeready_studio:12.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:integration_camel_quarkus:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_a-mq:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_a-mq_streaming:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_data_virtualization:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_fuse_service_works:6.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_web_server:3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_application_runtimes:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.7:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.8:*:*:*:*:*:*:*
cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:oracle:advanced_supply_chain_planning:12.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:advanced_supply_chain_planning:12.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:business_intelligence:5.9.0.0.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:business_intelligence:12.2.1.3.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:business_process_management_suite:12.2.1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:business_process_management_suite:12.2.1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_eagle_ftp_table_base_retrieval:4.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:e-business_suite_cloud_manager_and_cloud_backup_module:2.2.1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager_base_platform:13.5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.8.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:fusion_middleware_common_libraries_and_tools:12.2.1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:goldengate:-:*:*:*:*:*:*:*
cpe:2.3:a:oracle:healthcare_data_repository:8.1.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:hyperion_data_relationship_management:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:hyperion_infrastructure_technology:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:identity_management_suite:12.2.1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:identity_management_suite:12.2.1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdeveloper:12.2.1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_allocation:14.1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_allocation:15.0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_allocation:16.0.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_allocation:19.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_extract_transform_and_load:13.2.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:stream_analytics:-:*:*:*:*:*:*:*
cpe:2.3:a:oracle:timesten_grid:-:*:*:*:*:*:*:*
cpe:2.3:a:oracle:tuxedo:12.2.2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.2.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*

History

22 Dec 2023, 09:15

Type Values Removed Values Added
References
  • () https://security.gentoo.org/glsa/202312-04 -

20 Dec 2023, 08:15

Type Values Removed Values Added
References
  • () https://security.gentoo.org/glsa/202312-02 -

07 Nov 2023, 03:40

Type Values Removed Values Added
References (GENTOO) https://security.gentoo.org/glsa/202310-16 - () https://security.gentoo.org/glsa/202310-16 -
References (MLIST) http://www.openwall.com/lists/oss-security/2022/01/18/3 - Mailing List () http://www.openwall.com/lists/oss-security/2022/01/18/3 -
References (MISC) https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory () https://www.oracle.com/security-alerts/cpujan2022.html -
References (CERT-VN) https://www.kb.cert.org/vuls/id/930724 - Mitigation, Patch, Third Party Advisory, US Government Resource () https://www.kb.cert.org/vuls/id/930724 -
References (MISC) https://access.redhat.com/security/cve/CVE-2021-4104 - Mitigation, Third Party Advisory () https://access.redhat.com/security/cve/CVE-2021-4104 -
References (GENTOO) https://security.gentoo.org/glsa/202209-02 - Third Party Advisory () https://security.gentoo.org/glsa/202209-02 -
References (CONFIRM) https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033 - Third Party Advisory () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033 -
References (MISC) https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory () https://www.oracle.com/security-alerts/cpuapr2022.html -
References (MISC) https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126 - Issue Tracking, Patch, Third Party Advisory () https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126 -
References (N/A) https://www.oracle.com/security-alerts/cpujul2022.html - Third Party Advisory () https://www.oracle.com/security-alerts/cpujul2022.html -
References (CONFIRM) https://security.netapp.com/advisory/ntap-20211223-0007/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20211223-0007/ -
References (MISC) https://www.cve.org/CVERecord?id=CVE-2021-44228 - Not Applicable, Third Party Advisory () https://www.cve.org/CVERecord?id=CVE-2021-44228 -

26 Oct 2023, 07:15

Type Values Removed Values Added
References
  • (GENTOO) https://security.gentoo.org/glsa/202310-16 -

05 Oct 2022, 17:53

Type Values Removed Values Added
References (N/A) https://www.oracle.com/security-alerts/cpujul2022.html - (N/A) https://www.oracle.com/security-alerts/cpujul2022.html - Third Party Advisory
References (GENTOO) https://security.gentoo.org/glsa/202209-02 - (GENTOO) https://security.gentoo.org/glsa/202209-02 - Third Party Advisory
References (MISC) https://www.oracle.com/security-alerts/cpuapr2022.html - (MISC) https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory
CPE cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:business_intelligence:5.9.0.0.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:timesten_grid:-:*:*:*:*:*:*:*
cpe:2.3:a:oracle:goldengate:-:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:advanced_supply_chain_planning:12.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager_base_platform:13.5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:tuxedo:12.2.2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdeveloper:12.2.1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:identity_management_suite:12.2.1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:business_process_management_suite:12.2.1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.8.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:e-business_suite_cloud_manager_and_cloud_backup_module:2.2.1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:fusion_middleware_common_libraries_and_tools:12.2.1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:advanced_supply_chain_planning:12.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:stream_analytics:-:*:*:*:*:*:*:*
cpe:2.3:a:oracle:healthcare_data_repository:8.1.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_extract_transform_and_load:13.2.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:hyperion_data_relationship_management:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:financial_services_revenue_management_and_billing_analytics:2.7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:business_intelligence:12.2.1.3.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_eagle_ftp_table_base_retrieval:4.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:business_process_management_suite:12.2.1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:identity_management_suite:12.2.1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:hyperion_infrastructure_technology:*:*:*:*:*:*:*:*
First Time Oracle stream Analytics
Oracle goldengate
Oracle communications Offline Mediation Controller
Oracle mysql Enterprise Monitor
Oracle financial Services Revenue Management And Billing Analytics
Oracle hyperion Infrastructure Technology
Oracle communications Network Integrity
Oracle hyperion Data Relationship Management
Oracle business Process Management Suite
Oracle communications Messaging Server
Oracle timesten Grid
Oracle healthcare Data Repository
Oracle e-business Suite Cloud Manager And Cloud Backup Module
Oracle identity Management Suite
Oracle communications Eagle Ftp Table Base Retrieval
Oracle retail Extract Transform And Load
Oracle communications Unified Inventory Management
Oracle tuxedo
Oracle advanced Supply Chain Planning
Oracle business Intelligence
Oracle fusion Middleware Common Libraries And Tools
Oracle jdeveloper
Oracle enterprise Manager Base Platform

07 Sep 2022, 05:15

Type Values Removed Values Added
References
  • (GENTOO) https://security.gentoo.org/glsa/202209-02 -

25 Jul 2022, 18:18

Type Values Removed Values Added
References
  • (N/A) https://www.oracle.com/security-alerts/cpujul2022.html -

20 Apr 2022, 00:16

Type Values Removed Values Added
References
  • (MISC) https://www.oracle.com/security-alerts/cpuapr2022.html -

19 Feb 2022, 04:35

Type Values Removed Values Added
References (MLIST) http://www.openwall.com/lists/oss-security/2022/01/18/3 - (MLIST) http://www.openwall.com/lists/oss-security/2022/01/18/3 - Mailing List
References (MISC) https://www.oracle.com/security-alerts/cpujan2022.html - (MISC) https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory
First Time Oracle
Oracle utilities Testing Accelerator
Oracle weblogic Server
Oracle retail Allocation
CPE cpe:2.3:a:oracle:retail_allocation:19.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.2.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_allocation:16.0.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_allocation:15.0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_allocation:14.1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*

07 Feb 2022, 16:16

Type Values Removed Values Added
References
  • (MISC) https://www.oracle.com/security-alerts/cpujan2022.html -

18 Jan 2022, 19:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2022/01/18/3 -

06 Jan 2022, 13:45

Type Values Removed Values Added
CVSS v2 : 6.8
v3 : 8.1
v2 : 6.0
v3 : 7.5
References (CONFIRM) https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033 - (CONFIRM) https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033 - Third Party Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20211223-0007/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20211223-0007/ - Third Party Advisory

23 Dec 2021, 13:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20211223-0007/ -

21 Dec 2021, 23:15

Type Values Removed Values Added
References
  • (CONFIRM) https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033 -

16 Dec 2021, 21:18

Type Values Removed Values Added
CPE cpe:2.3:a:redhat:openshift_application_runtimes:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_a-mq:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:integration_camel_quarkus:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_data_virtualization:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_fuse_service_works:6.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_studio:12.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:log4j:1.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_a-mq_streaming:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.8:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_web_server:3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.7:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 6.8
v3 : 8.1
References (CERT-VN) https://www.kb.cert.org/vuls/id/930724 - (CERT-VN) https://www.kb.cert.org/vuls/id/930724 - Mitigation, Patch, Third Party Advisory, US Government Resource
References (MISC) https://www.cve.org/CVERecord?id=CVE-2021-44228 - (MISC) https://www.cve.org/CVERecord?id=CVE-2021-44228 - Not Applicable, Third Party Advisory
References (MISC) https://access.redhat.com/security/cve/CVE-2021-4104 - (MISC) https://access.redhat.com/security/cve/CVE-2021-4104 - Mitigation, Third Party Advisory
References (MISC) https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126 - (MISC) https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126 - Issue Tracking, Patch, Third Party Advisory

16 Dec 2021, 05:15

Type Values Removed Values Added
References
  • (CERT-VN) https://www.kb.cert.org/vuls/id/930724 -

14 Dec 2021, 12:28

Type Values Removed Values Added
New CVE

Information

Published : 2021-12-14 12:15

Updated : 2023-12-22 09:15


NVD link : CVE-2021-4104

Mitre link : CVE-2021-4104

CVE.ORG link : CVE-2021-4104


JSON object : View

Products Affected

redhat

  • single_sign-on
  • jboss_web_server
  • jboss_fuse_service_works
  • process_automation
  • jboss_fuse
  • jboss_a-mq
  • enterprise_linux
  • jboss_operations_network
  • codeready_studio
  • jboss_a-mq_streaming
  • integration_camel_k
  • openshift_application_runtimes
  • jboss_data_grid
  • software_collections
  • integration_camel_quarkus
  • jboss_data_virtualization
  • openshift_container_platform
  • jboss_enterprise_application_platform

oracle

  • retail_allocation
  • tuxedo
  • stream_analytics
  • e-business_suite_cloud_manager_and_cloud_backup_module
  • identity_management_suite
  • utilities_testing_accelerator
  • jdeveloper
  • mysql_enterprise_monitor
  • communications_unified_inventory_management
  • timesten_grid
  • enterprise_manager_base_platform
  • communications_eagle_ftp_table_base_retrieval
  • communications_messaging_server
  • financial_services_revenue_management_and_billing_analytics
  • goldengate
  • communications_offline_mediation_controller
  • business_intelligence
  • communications_network_integrity
  • hyperion_infrastructure_technology
  • healthcare_data_repository
  • fusion_middleware_common_libraries_and_tools
  • advanced_supply_chain_planning
  • business_process_management_suite
  • weblogic_server
  • retail_extract_transform_and_load
  • hyperion_data_relationship_management

fedoraproject

  • fedora

apache

  • log4j
CWE
CWE-502

Deserialization of Untrusted Data