Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2020-9493

A deserialization flaw was found in Apache Chainsaw versions prior to 2.1.0 which could lead to malicious code execution.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 47.0%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 6.8
Products affected by CVE-2020-9493
  • Apache » Chainsaw » Version: N/A
    cpe:2.3:a:apache:chainsaw:-
  • Apache » Chainsaw » Version: 2.0.0
    cpe:2.3:a:apache:chainsaw:2.0.0
  • Apache » Log4j » Version: 1.2
    cpe:2.3:a:apache:log4j:1.2
  • Apache » Log4j » Version: 1.2.1
    cpe:2.3:a:apache:log4j:1.2.1
  • Apache » Log4j » Version: 1.2.10
    cpe:2.3:a:apache:log4j:1.2.10
  • Apache » Log4j » Version: 1.2.11
    cpe:2.3:a:apache:log4j:1.2.11
  • Apache » Log4j » Version: 1.2.12
    cpe:2.3:a:apache:log4j:1.2.12
  • Apache » Log4j » Version: 1.2.13
    cpe:2.3:a:apache:log4j:1.2.13
  • Apache » Log4j » Version: 1.2.14
    cpe:2.3:a:apache:log4j:1.2.14
  • Apache » Log4j » Version: 1.2.15
    cpe:2.3:a:apache:log4j:1.2.15
  • Apache » Log4j » Version: 1.2.16
    cpe:2.3:a:apache:log4j:1.2.16
  • Apache » Log4j » Version: 1.2.17
    cpe:2.3:a:apache:log4j:1.2.17
  • Apache » Log4j » Version: 1.2.2
    cpe:2.3:a:apache:log4j:1.2.2
  • Apache » Log4j » Version: 1.2.3
    cpe:2.3:a:apache:log4j:1.2.3
  • Apache » Log4j » Version: 1.2.4
    cpe:2.3:a:apache:log4j:1.2.4
  • Apache » Log4j » Version: 1.2.5
    cpe:2.3:a:apache:log4j:1.2.5
  • Apache » Log4j » Version: 1.2.6
    cpe:2.3:a:apache:log4j:1.2.6
  • Apache » Log4j » Version: 1.2.7
    cpe:2.3:a:apache:log4j:1.2.7
  • Apache » Log4j » Version: 1.2.8
    cpe:2.3:a:apache:log4j:1.2.8
  • Apache » Log4j » Version: 1.2.9
    cpe:2.3:a:apache:log4j:1.2.9
  • Qos » Reload4j » Version: 1.0
    cpe:2.3:a:qos:reload4j:1.0
  • Qos » Reload4j » Version: 1.0.1
    cpe:2.3:a:qos:reload4j:1.0.1
  • Qos » Reload4j » Version: 1.0.4
    cpe:2.3:a:qos:reload4j:1.0.4
  • Qos » Reload4j » Version: 1.1
    cpe:2.3:a:qos:reload4j:1.1
  • Qos » Reload4j » Version: 1.1.1
    cpe:2.3:a:qos:reload4j:1.1.1
  • Qos » Reload4j » Version: 1.1.2
    cpe:2.3:a:qos:reload4j:1.1.2
  • Qos » Reload4j » Version: 1.1.3
    cpe:2.3:a:qos:reload4j:1.1.3
  • Qos » Reload4j » Version: 1.2
    cpe:2.3:a:qos:reload4j:1.2
  • Qos » Reload4j » Version: 1.2.1
    cpe:2.3:a:qos:reload4j:1.2.1
  • Qos » Reload4j » Version: 1.2.11
    cpe:2.3:a:qos:reload4j:1.2.11
  • Qos » Reload4j » Version: 1.2.12
    cpe:2.3:a:qos:reload4j:1.2.12
  • Qos » Reload4j » Version: 1.2.13
    cpe:2.3:a:qos:reload4j:1.2.13
  • Qos » Reload4j » Version: 1.2.14
    cpe:2.3:a:qos:reload4j:1.2.14
  • Qos » Reload4j » Version: 1.2.15
    cpe:2.3:a:qos:reload4j:1.2.15
  • Qos » Reload4j » Version: 1.2.16
    cpe:2.3:a:qos:reload4j:1.2.16
  • Qos » Reload4j » Version: 1.2.17
    cpe:2.3:a:qos:reload4j:1.2.17
  • Qos » Reload4j » Version: 1.2.18.0
    cpe:2.3:a:qos:reload4j:1.2.18.0
  • Qos » Reload4j » Version: 1.2.2
    cpe:2.3:a:qos:reload4j:1.2.2
  • Qos » Reload4j » Version: 1.2.3
    cpe:2.3:a:qos:reload4j:1.2.3
  • Qos » Reload4j » Version: 1.2.4
    cpe:2.3:a:qos:reload4j:1.2.4
  • Qos » Reload4j » Version: 1.2.6
    cpe:2.3:a:qos:reload4j:1.2.6
  • Qos » Reload4j » Version: 1.2.7
    cpe:2.3:a:qos:reload4j:1.2.7
  • Qos » Reload4j » Version: 1.2.9
    cpe:2.3:a:qos:reload4j:1.2.9


Contact Us

Shodan ® - All rights reserved