• Request IT Security
  • OPENVAS PRODUCTS
  • Newsletter
  • Deutsch Deutsch German de
  • English English English en
  • Italiano Italiano Italian it
  • Nederlands Nederlands Dutch nl
Greenbone
  • Products
    • OPENVAS SCAN
    • OPENVAS REPORT
    • OPENVAS BASIC
      • OPENVAS BASIC: Order
    • Greenbone Cloud Service
    • Greenbone Web App Scanning
    • Solutions for Your Sector
      • Educational Sector
      • Healthcare Sector
      • Public Sector
    • Technology
      • Feed Comparison
      • Product Comparison
        • OPENVAS vs. Nessus
      • Roadmap & Lifecycle
  • Upcoming Solutions
    • OPENVAS AI
    • OPENVAS CONTROL
  • Service & Support
    • Technical Support
    • Self-Learning Courses
    • Documents
  • Events
    • Webinars
  • About Greenbone
    • Partners
    • Careers
    • Contact
  • Blog
    • Know-how
      • Attack Vector Timeline
      • Cyber Attacks Defense
      • Cyber Defense Security
      • Cyber Resilience Act
      • Data Security
      • Exposure Management
      • IT Security
      • Open Source Vulnerability Management
      • The Vulnerability Timeline
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu
  • Products
    • OPENVAS SCAN
    • OPENVAS REPORT
    • OPENVAS BASIC
      • OPENVAS BASIC: Order
    • Greenbone Cloud Service
    • Greenbone Web App Scanning
    • Solutions for your sector
      • Educational Sector
      • Healthcare Sector
      • Public Sector
    • Technology
      • Feed Comparison
      • Product Comparison
        • OPENVAS vs. Nessus
      • Roadmap and Lifecycle
    • Request IT Security
  • Upcoming Solutions
    • OPENVAS AI
    • OPENVAS CONTROL
  • Service & Support
    • Technical Support
    • Self-Learning Courses
    • Documents
  • Events
    • Webinars
  • About Greenbone
    • Partners
    • Careers
    • Contact
    • Newsletter
  • Our Blog
    • Know-how
      • Attack Vector Timeline
      • Cyber Attacks Defense
      • Cyber Defense Security
      • Cyber Resilience Act
      • Data Security
      • Exposure Management
      • IT Security
      • Open Source Vulnerability Management
      • The Vulnerability Timeline
  • German
  • English
  • Italian
  • Dutch

Latest Cybersecurity News and IT Security Insights

Stay informed about emerging threats, practical protection strategies and innovations in vulnerability management. Benefit from the expertise of the Greenbone specialists and strengthen your IT security.

Subscribe to the Newsletter Now

Elmar Geese

Additional Log4j Vulnerabilities Published

Blog

Log4j was affected by a vulnerability that allowed Remote Code Execution (RCE) attacks. In short, user inputs into a software could lead to a code execution on a remote server. This represents a severe security risk. It was named “Log4Shell” (CVE-2021-44228) and immediately addressed by the Log4j team, who provided a fix. In the following […]

Read more
20. December 2021/by Elmar Geese
https://www.greenbone.net/wp-content/uploads/greenbone-logo-2025.png 0 0 Elmar Geese https://www.greenbone.net/wp-content/uploads/greenbone-logo-2025.png Elmar Geese2021-12-20 16:14:472025-12-22 14:01:10Additional Log4j Vulnerabilities Published
Elmar Geese

Scanning for Vulnerabilities like Log4Shell – How Does It Work?

Blog

Greenbone’s vulnerability management finds applications with Log4j vulnerabilities in systems that definitely need to be patched or otherwise protected. Depending on the type of systems and vulnerability, these can be found better or worse. Detection is also constantly improving and being updated. New breaches are found. Therefore, there may always be more systems with Log4Shell […]

Read more
17. December 2021/by Elmar Geese
https://www.greenbone.net/wp-content/uploads/greenbone-logo-2025.png 0 0 Elmar Geese https://www.greenbone.net/wp-content/uploads/greenbone-logo-2025.png Elmar Geese2021-12-17 09:42:112025-12-15 11:59:59Scanning for Vulnerabilities like Log4Shell – How Does It Work?
Elmar Geese

In-Depth Information About Greenbone’s Log4j Vulnerability Test Coverage

Blog

Update from 2021-12-20: information about additional vulnerabilities found for Log4j can be found here. Update from 2021-12-20: vulnerability tests for products running on Microsoft Windows are now available. Note: The tests check the existence of Log4j and its version. A separate vulnerability test may not be available for each affected application, but all Log4j files […]

Read more
14. December 2021/by Elmar Geese
https://www.greenbone.net/wp-content/uploads/greenbone-logo-2025.png 0 0 Elmar Geese https://www.greenbone.net/wp-content/uploads/greenbone-logo-2025.png Elmar Geese2021-12-14 18:22:392025-12-16 12:44:32In-Depth Information About Greenbone’s Log4j Vulnerability Test Coverage
Page 50 of 56«‹4849505152›»

Search

Search Search

Archive

  • 2026
  • 2025

Newsletter

Subscribe Now

OPENVAS BASIC

Our entry-level enterprise product

Test 14 Days Free of Charge

Products & Solutions

  • OPENVAS SCAN
  • OPENVAS REPORT
  • OPENVAS BASIC
  • OPENVAS FREE
  • OPENVAS AI
  • Greenbone Cloud Service
ISO9001-EN

Service & Support

  • Technical Support
  • FAQ
  • Documents
  • Warranty
  • Open Source Vulnerability Management
  • Cyber Resilience Act
ISO27001-EN

About us

  • About Greenbone
  • Partners
  • Newsletter
  • License information
  • Privacy Statement
  • Terms & Conditions
ISO14001-EN

Contact with us

  • Contact
  • Media Contact
  • Careers
  • Security Response
  • Imprint

Community

  • Community Portal
  • Community Forum
© Copyright - Greenbone AG 2020-2026
  • Link to LinkedIn
Scroll to top Scroll to top Scroll to top
Contact
Request IT Security Contact Us Subscribe to Newsletter Follow on LinkedIn