• OPENVAS SECURITY INTELLIGENCE
  • Buy Here
  • Newsletter
  • Deutsch Deutsch German de
  • English English English en
  • Italiano Italiano Italian it
  • Nederlands Nederlands Dutch nl
Greenbone
  • Products
    • OPENVAS SCAN
    • OPENVAS REPORT
    • OPENVAS BASIC
      • OPENVAS BASIC: Order
    • Greenbone Cloud Service
    • Greenbone Web App Scanning
    • Solutions for Your Sector
      • Educational Sector
      • Healthcare Sector
      • Public Sector
    • Technology
      • Feed Comparison
      • Product Comparison
        • OPENVAS vs. Nessus
      • Roadmap & Lifecycle
  • Upcoming Solutions
    • OPENVAS AI
    • OPENVAS CONTROL
  • Service & Support
    • Technical Support
    • Self-Learning Courses
    • Documents
  • Events
    • Webinars
  • About Greenbone
    • Greenbone Group
    • Partners
    • Careers
    • Contact
  • Blog
    • Know-how
      • Cyber Attacks Defense
      • Cyber Defense Security
      • Cyber Resilience Act
      • Data Security
      • IT Security
      • Open Source Vulnerability Management
      • Attack Vector Timeline
      • The Vulnerability Timeline
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu
  • Products
    • OPENVAS SCAN
    • OPENVAS REPORT
    • OPENVAS BASIC
      • OPENVAS BASIC: Order
    • Greenbone Cloud Service
    • Greenbone Web App Scanning
    • Solutions for your sector
      • Educational Sector
      • Healthcare Sector
      • Public Sector
    • Technology
      • Feed Comparison
      • Product Comparison
        • OPENVAS vs. Nessus
      • Roadmap and Lifecycle
    • Buy Here
  • Upcoming Solutions
    • OPENVAS AI
    • OPENVAS CONTROL
  • Service & Support
    • Technical Support
    • Self-Learning Courses
    • Documents
  • Events
    • Webinars
  • About Greenbone
    • Greenbone Group
    • Partners
    • Careers
    • Contact
    • Newsletter
  • Our Blog
    • Know-how
      • Cyber Attacks Defense
      • Cyber Defense Security
      • Cyber Resilience Act
      • Data Security
      • IT Security
      • Open Source Vulnerability Management
      • The Vulnerability Timeline
      • Attack Vector Timeline

Latest Cybersecurity News and IT Security Insights

Stay informed about emerging threats, practical protection strategies and innovations in vulnerability management. Benefit from the expertise of the Greenbone specialists and strengthen your IT security.

Subscribe to the Newsletter Now

Elmar Geese

Scanning for Vulnerabilities like Log4Shell – How Does It Work?

Blog

Greenbone’s vulnerability management finds applications with Log4j vulnerabilities in systems that definitely need to be patched or otherwise protected. Depending on the type of systems and vulnerability, these can be found better or worse. Detection is also constantly improving and being updated. New breaches are found. Therefore, there may always be more systems with Log4Shell […]

Read more
17. December 2021/by Elmar Geese
https://www.greenbone.net/wp-content/uploads/greenbone-logo-2025.png 0 0 Elmar Geese https://www.greenbone.net/wp-content/uploads/greenbone-logo-2025.png Elmar Geese2021-12-17 09:42:112025-12-15 11:59:59Scanning for Vulnerabilities like Log4Shell – How Does It Work?
Elmar Geese

In-Depth Information About Greenbone’s Log4j Vulnerability Test Coverage

Blog

Update from 2021-12-20: information about additional vulnerabilities found for Log4j can be found here. Update from 2021-12-20: vulnerability tests for products running on Microsoft Windows are now available. Note: The tests check the existence of Log4j and its version. A separate vulnerability test may not be available for each affected application, but all Log4j files […]

Read more
14. December 2021/by Elmar Geese
https://www.greenbone.net/wp-content/uploads/greenbone-logo-2025.png 0 0 Elmar Geese https://www.greenbone.net/wp-content/uploads/greenbone-logo-2025.png Elmar Geese2021-12-14 18:22:392025-12-16 12:44:32In-Depth Information About Greenbone’s Log4j Vulnerability Test Coverage
Elmar Geese

Log4j Vulnerability Detection Available in Greenbone Feeds

Blog

Update from 2021-12-20: information about additional vulnerabilities found for Log4j can be found here. Update from 2021-12-15: the most important FAQ about the Log4j vulnerability detection with Greenbone can be found here. A critical vulnerability (Log4Shell, CVE-2021-44228) in the widely used Java library Log4j has been discovered. Greenbone has integrated local security checks and active […]

Read more
13. December 2021/by Elmar Geese
https://www.greenbone.net/wp-content/uploads/greenbone-logo-2025.png 0 0 Elmar Geese https://www.greenbone.net/wp-content/uploads/greenbone-logo-2025.png Elmar Geese2021-12-13 10:12:222025-10-02 11:41:26Log4j Vulnerability Detection Available in Greenbone Feeds
Page 49 of 54«‹4748495051›»

Search

Search Search

Archive

  • 2025
  • 2024

Newsletter

Subscribe Now

OPENVAS BASIC

Our entry-level enterprise product

Test 14 Days Free of Charge

Products & Solutions

  • OPENVAS SCAN
  • OPENVAS REPORT
  • OPENVAS BASIC
  • OPENVAS FREE
  • OPENVAS AI
  • Greenbone Cloud Service
ISO9001-EN

Service & Support

  • Technical Support
  • FAQ
  • Documents
  • Warranty
  • Open Source Vulnerability Management
  • Cyber Resilience Act
ISO27001-EN

About us

  • About Greenbone
  • Greenbone Group
  • Newsletter
  • License information
  • Privacy Statement
  • Terms & Conditions
ISO14001-EN

Contact with us

  • Contact
  • Media Contact
  • Careers
  • Partners
  • Security Response
  • Imprint

Community

  • Community Portal
  • Community Forum
© Copyright - Greenbone AG 2020-2025
  • Link to LinkedIn
Scroll to top Scroll to top Scroll to top