CVE-2021-45046

Vulnerability updated 4 months ago (2024-05-04T18:40:50.654Z)
Download STIX
Preview STIX
Not enough context has been learned about CVE-2021-45046 for a description yet. However we're tracking it as a Vulnerability profile. Vulnerability: A flaw in software design or implementation
Description last updated:
What's your take? (Question 1 of 2)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Vulnerability
Log4j
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Vulnerabilities
To see the evidence that has resulted in these vulnerability associations, create a free account
IDTypeVotesProfile Description
Log4Shellis / was
2
Log4Shell is a significant software vulnerability that exists within the Log4j Java-based logging utility. The vulnerability, officially designated as CVE-2021-44228, allows potential attackers to execute arbitrary code on targeted systems. Advanced Persistent Threat (APT) actors, including LockBit
Source Document References
Information about the CVE-2021-45046 Vulnerability was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
MITRE
9 months ago
RaaS AvosLocker Incident Response Analysis
MITRE
9 months ago
Avos ransomware group expands with new attack arsenal
CERT-EU
a year ago
Celebrity Vulnerabilities: Effective Response to Critical Production Threats
CERT-EU
a year ago
How to detect and patch a Log4J vulnerability - MC Press Online
CISA
a year ago
2022 Top Routinely Exploited Vulnerabilities | CISA
CISA
2 years ago
Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Data Extortion and Disk Encryption for Ransom Operations | CISA
GovCERT CH
2 years ago
Zero-Day Exploit Targeting Popular Java Library Log4j
CERT-EU
2 years ago
Most vulnerabilities associated with ransomware are old | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware – National Cyber Security Consulting
CERT-EU
2 years ago
Multiple vulnerabilities in Automation Assets in IBM Cloud Pak for Integration
CISA
a year ago
CISA Adds Three Known Exploited Vulnerabilities to Catalog | CISA
Securityaffairs
a year ago
CISA adds TP-Link, Apache, and Oracle bugs to its Known Exploited Vulnerabilities catalog
CERT-EU
a year ago
CISA Adds Three Known Exploited Vulnerabilities to Catalog – Cyber Security Review
CERT-EU
a year ago
Alert: Active Exploitation of TP-Link, Apache, and Oracle Vulnerabilities Detected | IT Security News
CERT-EU
a year ago
CISA warns of Mirai botnet exploiting TP-Link routers
CERT-EU
a year ago
Mirai Botnet operators are using TP-Link routers for DDoS attacks, says US government
CERT-EU
a year ago
Multiple vulnerabilities in IBM Maximo Application Suite
CERT-EU
a year ago
CISA Adds Three Known Exploited Vulnerabilities to Catalog | CISA