Security for everyone

CVE-2021-45046 Scanner

Detects 'Remote Code Execution (RCE)' vulnerability in Apache Log4j affects v. before 2.16.0.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one

Domain, Ipv4

Parent Category

CVE-2021-45046 Scanner Detail

Apache Log4j is a popular logging utility in the Java-based application development world. It allows developers to customize the logging output in their applications, making it easier to identify and debug issues. This tool is widely used in enterprise-level Java applications and has become an essential component of many software projects.

However, recently, a severe security vulnerability was detected in Apache Log4j, titled CVE-2021-45046. It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This vulnerability could allow attackers with control over Thread Context Map (MDC) input data to craft malicious input data using a JNDI Lookup pattern, resulting in information leakage and remote code execution in some environments and local code execution in all environments.

When exploited, CVE-2021-45046 could lead to disastrous consequences. Hackers could gain complete control of the victim's system and access sensitive information such as usernames, passwords, and intellectual property. The attacker could also use the compromised system to launch further attacks, causing even more harm. Therefore, it is essential to protect systems against this vulnerability.

Thanks to the pro features of the platform, those who read this article can easily and quickly learn about vulnerabilities in their digital assets. The platform offers a host of security tools such as vulnerability scanners, threat intelligence, and penetration testing, making it easier for organizations to detect and prevent cybersecurity threats. With, you can stay ahead of the game and keep your systems secure.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture