org.ops4j.pax.logging:pax-logging-log4j2 Security... | GeekWala
Loading...
Skip to main content
Maven (Java)

org.ops4j.pax.logging:pax-logging-log4j2

org.ops4j.pax.logging:pax-logging-log4j2 has 4 known security vulnerabilities in Maven (Java). Upgrade to version 2.0.14 or later to resolve all known issues. Data sourced from OSV, enriched with EPSS exploit probability and CISA KEV.

4 Vulnerabilities

Recommended safe version: 2.0.14

Upgrading to 2.0.14 or later resolves all 4 known vulnerabilities in org.ops4j.pax.logging:pax-logging-log4j2. Update your pom.xml or build.gradle to version 2.0.14.

Is org.ops4j.pax.logging:pax-logging-log4j2 in your project?

Check if you're affected and upgrade to 2.0.14 to stay secure.

4
Total
0
Critical
0
High
0
Medium
0
Low

Active Exploitation Warning

One or more vulnerabilities in this package are known to be actively exploited in the wild. Immediate action is recommended.

Vulnerabilities

4 unique vulnerabilities — sorted by severity. Click a CVE/GHSA ID for full details.

CVE / GHSASeverityAffectedFixed In
GHSA-7rjr-3q55-vv33
Incomplete fix for Apache Log4j vulnerability
CRITICAL
1.8.0, 1.8.1, 1.8.2, 1.8.3 (+37 more)1.9.2, 1.10.8, 1.11.11 (+1 more)
GHSA-jfh8-c2jp-5v3q
Remote code injection in Log4j
CRITICAL
1.8.0, 1.8.1, 1.8.2, 1.8.3 (+35 more)1.9.2, 1.10.8, 1.11.10 (+1 more)
GHSA-p6xc-xr62-6r2g
Apache Log4j2 vulnerable to Improper Input Validation and Uncontrolled Recursion
HIGH
1.8.0, 1.8.1, 1.8.2, 1.8.3 (+40 more)1.9.2, 1.10.9, 1.11.12 (+1 more)
GHSA-8489-44mv-ggj8
Improper Input Validation and Injection in Apache Log4j2
MODERATE
1.8.0, 1.8.1, 1.8.2, 1.8.3 (+42 more)1.9.2, 1.10.9, 1.11.13 (+1 more)

About This Data

Vulnerability data for org.ops4j.pax.logging:pax-logging-log4j2 is sourced from the Open Source Vulnerability (OSV) database, aggregating reports from GitHub Advisory Database, NIST NVD, and ecosystem-specific sources.

CVSS (Common Vulnerability Scoring System) scores reflect exploitability and impact. EPSS (Exploit Prediction Scoring System) scores indicate the probability of exploitation within the next 30 days. Vulnerabilities marked with are listed in the CISA Known Exploited Vulnerabilities (KEV) catalog.

Check Your Dependencies

Scan your project to check if you're using a vulnerable version of org.ops4j.pax.logging:pax-logging-log4j2.

Data from OSV DatabaseUpdated daily200K+ vulnerabilities indexed