gradient.png
Original on Transparent_edited.png

Log4J 
vulnerability detector from
Scappman

Find applications vulnerable to Log4j flaws in 30 seconds to protect your data 

Microsoft Intune required.
No credit card required.

log4j robot2.png

Log4Shell threat explained

Applications and cloud services that use Log4j logging library are vulnerable now because of the discovered vulnerability (as known as Log4Shell).
Log4Shell is the most critical vulnerability this year.

coding.png

Personal data at risk

Running remote code execution allows hackers can perform ANY action with your data with no authentication 

danger.png

Severity of impact

According to the CVSS scale, Log4Shell is rated with a score of 10 out of 10.

spyware (1).png

More than 1 million of attacks

Attack execution with this vulnerability is very easy. So, experts expect even more attacks in the coming weeks.

Log4Shell vulnerability detector

Protect your applications from Log4j vulnerability with Log4Shell vulnerability detector from Scappman. Just log in to the Scappman portal with a Microsoft Intune account.

snap.png

Simple

 Find vulnerable applications to Log4Shell in seconds

security.png

Secure

Your applications are always up to date and protected

updated.png

Updated to Log4j 2.17 

The latest version of logging library Log4j

 

How it works? 

1

Log in to the Scappman portal*

2

In the AppStore find Log4Shell Vulnerability Detector and install it.

3

Go to Reports to see the results of the vulnerability scan. If the status is 
     Installed - your applications are safe. 
     Failed - there are applications vulnerable to Log4Shell.

4

To see what files are vulnerable download the log file. Go to C_ProgramData_Scappman_Log4Shell_ VulnerabilityCheck and open Log4j-Vulnerabilities

* make sure you have active Microsoft Intune subscription

No credit card required.

Untitled1212.png

The latest version of log4j -

2.17

Try Log4Shell Vulnerability Detector from Scappman now!

  • LinkedIn
  • Twitter
  • YouTube

©2021 Scappman. All rights reserved.