パトコア Official site

  • OTHER

ChemAxon's response to the "Log4Shell" vulnerability.

パトコア

パトコア

▶ChemAxon's Response to CVE-2021-44228 ("Log4Shell") and CVE-2021-45046 Initial Release: December 15, 2021 Update: January 3, 2022 This vulnerability was disclosed by the Apache Log4j project on December 9, 2021 (Thursday). If exploited, it could allow remote attackers to execute code on the server if the system logs a string value controlled by the attacker to the affected endpoint. Immediately upon recognizing this vulnerability, ChemAxon evaluated all cloud hosting systems and on-premises software for customers, identified those that could be affected, and systematically began to address any exposures. All affected ChemAxon products have been updated to use log4j2.16, so no new incidents pose additional threats. For more details, please visit the Patcore or ChemAxon website.

Related Links

ChemAxon's response to the vulnerability of "Log4Shell"
This document details ChemAxon's response to the disclosed vulnerability of "Log4Shell". We are continuously updating information on Patcore's website in line with ChemAxon's information updates.
ChemAxon's response to CVE-2021-44228 (
This is the page from ChemAxon that contains the original text of the updates being made on Patcore's website. It is presented in English.