This is an automated email from the ASF dual-hosted git repository.

ppkarwasz pushed a commit to branch feat/vdr-generation
in repository https://gitbox.apache.org/repos/asf/logging-site.git

commit dc7f5f42a34ad97477b902c43a167c6289df7c27
Author: Piotr P. Karwasz <[email protected]>
AuthorDate: Fri Apr 24 12:32:40 2026 +0200

    feat: splits VDR into per-CVE documents
---
 .../CVE-2017-5645/log4j-core.cdx.xml               | 101 +++++++++++++++++
 src/vulnerabilities/CVE-2018-1285/log4net.cdx.xml  | 113 +++++++++++++++++++
 .../CVE-2020-9488/log4j-core.cdx.xml               | 106 ++++++++++++++++++
 .../CVE-2021-44228/log4j-core.cdx.xml              | 108 +++++++++++++++++++
 .../CVE-2021-44832/log4j-core.cdx.xml              |  85 +++++++++++++++
 .../CVE-2021-45046/log4j-core.cdx.xml              | 120 +++++++++++++++++++++
 .../CVE-2021-45105/log4j-core.cdx.xml              | 109 +++++++++++++++++++
 src/vulnerabilities/CVE-2025-54812/log4cxx.cdx.xml | 111 +++++++++++++++++++
 src/vulnerabilities/CVE-2025-54813/log4cxx.cdx.xml | 104 ++++++++++++++++++
 .../CVE-2025-68161/log4j-core.cdx.xml              |  86 +++++++++++++++
 .../CVE-2026-34477/log4j-core.cdx.xml              | 119 ++++++++++++++++++++
 .../CVE-2026-34478/log4j-core.cdx.xml              |  95 ++++++++++++++++
 .../CVE-2026-34479/log4j-1.2-api.cdx.xml           | 102 ++++++++++++++++++
 .../CVE-2026-34480/log4j-core.cdx.xml              | 101 +++++++++++++++++
 .../log4j-layout-template-json.cdx.xml             |  96 +++++++++++++++++
 src/vulnerabilities/CVE-2026-40021/log4net.cdx.xml |  90 ++++++++++++++++
 src/vulnerabilities/CVE-2026-40023/log4cxx.cdx.xml | 106 ++++++++++++++++++
 17 files changed, 1752 insertions(+)

diff --git a/src/vulnerabilities/CVE-2017-5645/log4j-core.cdx.xml 
b/src/vulnerabilities/CVE-2017-5645/log4j-core.cdx.xml
new file mode 100644
index 00000000..4aa51f36
--- /dev/null
+++ b/src/vulnerabilities/CVE-2017-5645/log4j-core.cdx.xml
@@ -0,0 +1,101 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!--
+  ~ Licensed to the Apache Software Foundation (ASF) under one or more
+  ~ contributor license agreements.  See the NOTICE file distributed with
+  ~ this work for additional information regarding copyright ownership.
+  ~ The ASF licenses this file to you under the Apache License, Version 2.0
+  ~ (the "License"); you may not use this file except in compliance with
+  ~ the License.  You may obtain a copy of the License at
+  ~
+  ~      http://www.apache.org/licenses/LICENSE-2.0
+  ~
+  ~ Unless required by applicable law or agreed to in writing, software
+  ~ distributed under the License is distributed on an "AS IS" BASIS,
+  ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+  ~ See the License for the specific language governing permissions and
+  ~ limitations under the License.
+  -->
+<bom xmlns="http://cyclonedx.org/schema/bom/1.7";
+     xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";
+     xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 
https://cyclonedx.org/schema/bom-1.7.xsd";
+     serialNumber="urn:uuid:98f7f9a1-a51d-4f98-85be-aed565b8f2f9"
+     version="1">
+  <metadata>
+    <timestamp>2022-04-04T00:00:00Z</timestamp>
+    <component type="library" bom-ref="log4j-core">
+      <group>org.apache.logging.log4j</group>
+      <name>log4j-core</name>
+      <cpe>cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*</cpe>
+      <purl>pkg:maven/org.apache.logging.log4j/log4j-core?type=jar</purl>
+    </component>
+    <manufacturer>
+      <name>Apache Logging Services</name>
+      <url>https://logging.apache.org</url>
+    </manufacturer>
+  </metadata>
+  <vulnerabilities>
+    <vulnerability>
+      <id>CVE-2017-5645</id>
+      <source>
+        <name>NVD</name>
+        <url>https://nvd.nist.gov/vuln/detail/CVE-2017-5645</url>
+      </source>
+      <references>
+        <reference>
+          <id>LOG4J2-1863</id>
+          <source>
+            <name>Issue tracker</name>
+            <url>https://issues.apache.org/jira/browse/LOG4J2-1863</url>
+          </source>
+        </reference>
+        <reference>
+          <id>the security fix commit</id>
+          <source>
+            <name>Source code repository</name>
+            <url>https://github.com/apache/logging-log4j2/commit/5dcc192</url>
+          </source>
+        </reference>
+      </references>
+      <ratings>
+        <rating>
+          <source>
+            <name>NVD</name>
+            
<url><![CDATA[https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)&version=2.0]]></url>
+          </source>
+          <score>7.5</score>
+          <severity>high</severity>
+          <method>CVSSv2</method>
+          <vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</vector>
+        </rating>
+      </ratings>
+      <cwes>
+        <cwe>502</cwe>
+      </cwes>
+      <description><![CDATA[When using the TCP socket server or UDP socket 
server to receive serialized log events from another application, a specially 
crafted binary payload can be sent that, when deserialized, can execute 
arbitrary code.]]></description>
+      <recommendation><![CDATA[Java 7 and above users should migrate to 
version `2.8.2` or avoid using the socket server classes.
+Java 6 users should avoid using the TCP or UDP socket server classes, or they 
can manually backport the security fix commit[1] from `2.8.2`.
+
+[1] https://github.com/apache/logging-log4j2/commit/5dcc192]]></recommendation>
+      <created>2017-04-17T00:00:00Z</created>
+      <published>2017-04-17T00:00:00Z</published>
+      <updated>2022-04-04T00:00:00Z</updated>
+      <credits>
+        <individuals>
+          <individual>
+            <name>Marcio Almeida de Macedo</name>
+          </individual>
+        </individuals>
+      </credits>
+      <affects>
+        <target>
+          <ref>log4j-core</ref>
+          <versions>
+            <version>
+              <range><![CDATA[vers:maven/>=2.0-alpha1|<2.8.2]]></range>
+            </version>
+          </versions>
+        </target>
+      </affects>
+    </vulnerability>
+  </vulnerabilities>
+</bom>
diff --git a/src/vulnerabilities/CVE-2018-1285/log4net.cdx.xml 
b/src/vulnerabilities/CVE-2018-1285/log4net.cdx.xml
new file mode 100644
index 00000000..90aef0ae
--- /dev/null
+++ b/src/vulnerabilities/CVE-2018-1285/log4net.cdx.xml
@@ -0,0 +1,113 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!--
+  ~ Licensed to the Apache Software Foundation (ASF) under one or more
+  ~ contributor license agreements.  See the NOTICE file distributed with
+  ~ this work for additional information regarding copyright ownership.
+  ~ The ASF licenses this file to you under the Apache License, Version 2.0
+  ~ (the "License"); you may not use this file except in compliance with
+  ~ the License.  You may obtain a copy of the License at
+  ~
+  ~      http://www.apache.org/licenses/LICENSE-2.0
+  ~
+  ~ Unless required by applicable law or agreed to in writing, software
+  ~ distributed under the License is distributed on an "AS IS" BASIS,
+  ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+  ~ See the License for the specific language governing permissions and
+  ~ limitations under the License.
+  -->
+<bom xmlns="http://cyclonedx.org/schema/bom/1.7";
+     xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";
+     xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 
https://cyclonedx.org/schema/bom-1.7.xsd";
+     serialNumber="urn:uuid:ca5196e2-dedb-4528-b093-200cdc0a54a5"
+     version="1">
+  <metadata>
+    <timestamp>2026-04-17T00:00:00Z</timestamp>
+    <component type="library" bom-ref="log4net">
+      <name>Log4net</name>
+      <cpe>cpe:2.3:a:apache:log4net:*:*:*:*:*:*:*:*</cpe>
+      <purl>pkg:nuget/log4net</purl>
+    </component>
+    <manufacturer>
+      <name>Apache Logging Services</name>
+      <url>https://logging.apache.org</url>
+    </manufacturer>
+  </metadata>
+  <vulnerabilities>
+    <vulnerability>
+      <id>CVE-2018-1285</id>
+      <source>
+        <name>NVD</name>
+        <url>https://nvd.nist.gov/vuln/detail/CVE-2018-1285</url>
+      </source>
+      <references>
+        <reference>
+          <id>LOG4NET-575</id>
+          <source>
+            <name>Issue tracker</name>
+            <url>https://issues.apache.org/jira/browse/LOG4NET-575</url>
+          </source>
+        </reference>
+        <reference>
+          <id>Security fix commit</id>
+          <source>
+            <name>Source code repository</name>
+            
<url>https://github.com/apache/logging-log4net/commit/3242db510c27e825af7164415402f5012df521a2</url>
+          </source>
+        </reference>
+        <reference>
+          <id>Pull request</id>
+          <source>
+            <name>Pull request that fixes the issue</name>
+            <url>https://github.com/apache/logging-log4net/pull/64</url>
+          </source>
+        </reference>
+      </references>
+      <ratings>
+        <rating>
+          <source>
+            <name>NVD</name>
+            
<url><![CDATA[https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&version=3.1]]></url>
+          </source>
+          <score>9.8</score>
+          <severity>high</severity>
+          <method>CVSSv3</method>
+          <vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vector>
+        </rating>
+      </ratings>
+      <cwes>
+        <cwe>611</cwe>
+      </cwes>
+      <description><![CDATA[Apache log4net versions before 2.0.10 do not 
disable XML external entities
+        when parsing log4net configuration files. This allows for XXE-based 
attacks
+        in applications that accept attacker-controlled log4net configuration 
files.]]></description>
+      <recommendation><![CDATA[Users are advised to upgrade to Apache Log4net 
version `2.0.10`, which fixes this issue.]]></recommendation>
+      <analysis>
+        <state>not_affected</state>
+        <justification>protected_by_mitigating_control</justification>
+        <detail><![CDATA[According to the current threat model, this is no 
longer considered a
+        vulnerability. The attack requires an attacker-controlled log4net 
configuration
+        file, which is outside the scope of the threat model.]]></detail>
+      </analysis>
+      <created>2020-05-11T00:00:00Z</created>
+      <published>2020-05-11T00:00:00Z</published>
+      <updated>2026-04-17T00:00:00Z</updated>
+      <credits>
+        <individuals>
+          <individual>
+            <name>Karthik Kumar Balasundaram</name>
+          </individual>
+        </individuals>
+      </credits>
+      <affects>
+        <target>
+          <ref>log4net</ref>
+          <versions>
+            <version>
+              <range><![CDATA[vers:nuget/>=0|<2.0.10]]></range>
+            </version>
+          </versions>
+        </target>
+      </affects>
+    </vulnerability>
+  </vulnerabilities>
+</bom>
diff --git a/src/vulnerabilities/CVE-2020-9488/log4j-core.cdx.xml 
b/src/vulnerabilities/CVE-2020-9488/log4j-core.cdx.xml
new file mode 100644
index 00000000..00163505
--- /dev/null
+++ b/src/vulnerabilities/CVE-2020-9488/log4j-core.cdx.xml
@@ -0,0 +1,106 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!--
+  ~ Licensed to the Apache Software Foundation (ASF) under one or more
+  ~ contributor license agreements.  See the NOTICE file distributed with
+  ~ this work for additional information regarding copyright ownership.
+  ~ The ASF licenses this file to you under the Apache License, Version 2.0
+  ~ (the "License"); you may not use this file except in compliance with
+  ~ the License.  You may obtain a copy of the License at
+  ~
+  ~      http://www.apache.org/licenses/LICENSE-2.0
+  ~
+  ~ Unless required by applicable law or agreed to in writing, software
+  ~ distributed under the License is distributed on an "AS IS" BASIS,
+  ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+  ~ See the License for the specific language governing permissions and
+  ~ limitations under the License.
+  -->
+<bom xmlns="http://cyclonedx.org/schema/bom/1.7";
+     xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";
+     xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 
https://cyclonedx.org/schema/bom-1.7.xsd";
+     serialNumber="urn:uuid:ca3a212d-6ec2-4bac-8810-777313f0da85"
+     version="1">
+  <metadata>
+    <timestamp>2025-08-17T11:18:06Z</timestamp>
+    <component type="library" bom-ref="log4j-core">
+      <group>org.apache.logging.log4j</group>
+      <name>log4j-core</name>
+      <cpe>cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*</cpe>
+      <purl>pkg:maven/org.apache.logging.log4j/log4j-core?type=jar</purl>
+    </component>
+    <manufacturer>
+      <name>Apache Logging Services</name>
+      <url>https://logging.apache.org</url>
+    </manufacturer>
+  </metadata>
+  <vulnerabilities>
+    <vulnerability>
+      <id>CVE-2020-9488</id>
+      <source>
+        <name>NVD</name>
+        <url>https://nvd.nist.gov/vuln/detail/CVE-2020-9488</url>
+      </source>
+      <references>
+        <reference>
+          <id>LOG4J2-2819</id>
+          <source>
+            <name>Issue tracker</name>
+            <url>https://issues.apache.org/jira/browse/LOG4J2-2819</url>
+          </source>
+        </reference>
+      </references>
+      <ratings>
+        <rating>
+          <source>
+            <name>NVD</name>
+            
<url><![CDATA[https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N&version=3.1]]></url>
+          </source>
+          <score>3.7</score>
+          <severity>low</severity>
+          <method>CVSSv3</method>
+          <vector>AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</vector>
+        </rating>
+      </ratings>
+      <cwes>
+        <cwe>295</cwe>
+      </cwes>
+      <description><![CDATA[Improper validation of certificate with host 
mismatch in SMTP appender.
+This could allow an SMTPS connection to be intercepted by a man-in-the-middle 
attack which could leak any log
+messages sent through that appender.
+
+The reported issue was caused by an error in `SslConfiguration`.
+Any element using `SslConfiguration` in the Log4j `Configuration` is also 
affected by this issue.
+This includes `HttpAppender`, `SocketAppender`, and `SyslogAppender`.
+Usages of `SslConfiguration` that are configured via system properties are not 
affected.]]></description>
+      <recommendation><![CDATA[Upgrade to `2.3.2` (Java 6), `2.12.3` (Java 7) 
or `2.13.2` (Java 8 and later).
+
+Alternatively, users can set the `mail.smtp.ssl.checkserveridentity` system 
property to `true` to enable SMTPS hostname verification for all SMTPS mail 
sessions.]]></recommendation>
+      <created>2017-04-27T00:00:00Z</created>
+      <published>2017-04-27T00:00:00Z</published>
+      <updated>2025-08-17T11:18:06Z</updated>
+      <credits>
+        <individuals>
+          <individual>
+            <name>Peter Stöckli</name>
+          </individual>
+        </individuals>
+      </credits>
+      <affects>
+        <target>
+          <ref>log4j-core</ref>
+          <versions>
+            <version>
+              <range><![CDATA[vers:maven/>=2.0-beta1|<2.3.2]]></range>
+            </version>
+            <version>
+              <range><![CDATA[vers:maven/>=2.4|<2.12.3]]></range>
+            </version>
+            <version>
+              <version><![CDATA[vers:maven/>=2.13.0|<2.13.2]]></version>
+            </version>
+          </versions>
+        </target>
+      </affects>
+    </vulnerability>
+  </vulnerabilities>
+</bom>
diff --git a/src/vulnerabilities/CVE-2021-44228/log4j-core.cdx.xml 
b/src/vulnerabilities/CVE-2021-44228/log4j-core.cdx.xml
new file mode 100644
index 00000000..4c0f3859
--- /dev/null
+++ b/src/vulnerabilities/CVE-2021-44228/log4j-core.cdx.xml
@@ -0,0 +1,108 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!--
+  ~ Licensed to the Apache Software Foundation (ASF) under one or more
+  ~ contributor license agreements.  See the NOTICE file distributed with
+  ~ this work for additional information regarding copyright ownership.
+  ~ The ASF licenses this file to you under the Apache License, Version 2.0
+  ~ (the "License"); you may not use this file except in compliance with
+  ~ the License.  You may obtain a copy of the License at
+  ~
+  ~      http://www.apache.org/licenses/LICENSE-2.0
+  ~
+  ~ Unless required by applicable law or agreed to in writing, software
+  ~ distributed under the License is distributed on an "AS IS" BASIS,
+  ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+  ~ See the License for the specific language governing permissions and
+  ~ limitations under the License.
+  -->
+<bom xmlns="http://cyclonedx.org/schema/bom/1.7";
+     xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";
+     xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 
https://cyclonedx.org/schema/bom-1.7.xsd";
+     serialNumber="urn:uuid:6893e032-dba4-4db0-8ed2-2bd0c2009b05"
+     version="1">
+  <metadata>
+    <timestamp>2025-08-17T11:18:06Z</timestamp>
+    <component type="library" bom-ref="log4j-core">
+      <group>org.apache.logging.log4j</group>
+      <name>log4j-core</name>
+      <cpe>cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*</cpe>
+      <purl>pkg:maven/org.apache.logging.log4j/log4j-core?type=jar</purl>
+    </component>
+    <manufacturer>
+      <name>Apache Logging Services</name>
+      <url>https://logging.apache.org</url>
+    </manufacturer>
+  </metadata>
+  <vulnerabilities>
+    <vulnerability>
+      <id>CVE-2021-44228</id>
+      <source>
+        <name>NVD</name>
+        <url>https://nvd.nist.gov/vuln/detail/CVE-2021-44228</url>
+      </source>
+      <references>
+        <reference>
+          <id>LOG4J2-3198</id>
+          <source>
+            <name>Issue tracker</name>
+            <url>https://issues.apache.org/jira/browse/LOG4J2-3198</url>
+          </source>
+        </reference>
+        <reference>
+          <id>LOG4J2-3201</id>
+          <source>
+            <name>Issue tracker</name>
+            <url>https://issues.apache.org/jira/browse/LOG4J2-3201</url>
+          </source>
+        </reference>
+      </references>
+      <ratings>
+        <rating>
+          <source>
+            <name>NVD</name>
+            
<url><![CDATA[https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H&version=3.1]]></url>
+          </source>
+          <score>10.0</score>
+          <severity>critical</severity>
+          <method>CVSSv3</method>
+          <vector>AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H</vector>
+        </rating>
+      </ratings>
+      <cwes>
+        <cwe>20</cwe>
+        <cwe>400</cwe>
+        <cwe>502</cwe>
+        <cwe>917</cwe>
+      </cwes>
+      <description><![CDATA[In Log4j, the JNDI features used in 
configurations, log messages, and parameters do not protect against 
attacker-controlled LDAP and other JNDI related endpoints.
+An attacker who can control log messages or log message parameters can execute 
arbitrary code loaded from LDAP servers.]]></description>
+      <recommendation><![CDATA[Upgrade to Log4j `2.3.1` (for Java 6), `2.12.2` 
(for Java 7), or `2.15.0` (for Java 8 and later).]]></recommendation>
+      <created>2021-12-10T00:00:00Z</created>
+      <published>2021-12-10T00:00:00Z</published>
+      <updated>2025-08-17T11:18:06Z</updated>
+      <credits>
+        <individuals>
+          <individual>
+            <name>Chen Zhaojun</name>
+          </individual>
+        </individuals>
+      </credits>
+      <affects>
+        <target>
+          <ref>log4j-core</ref>
+          <versions>
+            <version>
+              <range><![CDATA[vers:maven/>=2.0-beta9|<2.3.1]]></range>
+            </version>
+            <version>
+              <range><![CDATA[vers:maven/>=2.4|<2.12.2]]></range>
+            </version>
+            <version>
+              <range><![CDATA[vers:maven/>=2.13.0|<2.15.0]]></range>
+            </version>
+          </versions>
+        </target>
+      </affects>
+    </vulnerability>
+  </vulnerabilities>
+</bom>
diff --git a/src/vulnerabilities/CVE-2021-44832/log4j-core.cdx.xml 
b/src/vulnerabilities/CVE-2021-44832/log4j-core.cdx.xml
new file mode 100644
index 00000000..f7d1bf3c
--- /dev/null
+++ b/src/vulnerabilities/CVE-2021-44832/log4j-core.cdx.xml
@@ -0,0 +1,85 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!--
+  ~ Licensed to the Apache Software Foundation (ASF) under one or more
+  ~ contributor license agreements.  See the NOTICE file distributed with
+  ~ this work for additional information regarding copyright ownership.
+  ~ The ASF licenses this file to you under the Apache License, Version 2.0
+  ~ (the "License"); you may not use this file except in compliance with
+  ~ the License.  You may obtain a copy of the License at
+  ~
+  ~      http://www.apache.org/licenses/LICENSE-2.0
+  ~
+  ~ Unless required by applicable law or agreed to in writing, software
+  ~ distributed under the License is distributed on an "AS IS" BASIS,
+  ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+  ~ See the License for the specific language governing permissions and
+  ~ limitations under the License.
+  -->
+<bom xmlns="http://cyclonedx.org/schema/bom/1.7";
+     xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";
+     xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 
https://cyclonedx.org/schema/bom-1.7.xsd";
+     serialNumber="urn:uuid:9cda751a-5464-4d33-aca1-9046a27047ca"
+     version="1">
+  <metadata>
+    <timestamp>2025-08-17T11:18:06Z</timestamp>
+    <component type="library" bom-ref="log4j-core">
+      <group>org.apache.logging.log4j</group>
+      <name>log4j-core</name>
+      <cpe>cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*</cpe>
+      <purl>pkg:maven/org.apache.logging.log4j/log4j-core?type=jar</purl>
+    </component>
+    <manufacturer>
+      <name>Apache Logging Services</name>
+      <url>https://logging.apache.org</url>
+    </manufacturer>
+  </metadata>
+  <vulnerabilities>
+    <vulnerability>
+      <id>CVE-2021-44832</id>
+      <source>
+        <name>NVD</name>
+        <url>https://nvd.nist.gov/vuln/detail/CVE-2021-44832</url>
+      </source>
+      <ratings>
+        <rating>
+          <source>
+            <name>NVD</name>
+            
<url><![CDATA[https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H&version=3.1]]></url>
+          </source>
+          <score>6.6</score>
+          <severity>medium</severity>
+          <method>CVSSv3</method>
+          <vector>AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</vector>
+        </rating>
+      </ratings>
+      <cwes>
+        <cwe>20</cwe>
+        <cwe>74</cwe>
+      </cwes>
+      <description><![CDATA[An attacker with write access to the logging 
configuration can construct a malicious configuration using a JDBC Appender 
with a data source referencing a JNDI URI which can execute remote code.
+This issue is fixed by limiting JNDI data source names to the `java` 
protocol.]]></description>
+      <recommendation><![CDATA[Upgrade to `2.3.1` (for Java 6), `2.12.3` (for 
Java 7), or `2.17.0` (for Java 8 and later).
+
+In prior releases confirm that if the JDBC Appender is being used it is not 
configured to use any protocol other than `java`.]]></recommendation>
+      <created>2021-12-28T00:00:00Z</created>
+      <published>2021-12-28T00:00:00Z</published>
+      <updated>2025-08-17T11:18:06Z</updated>
+      <affects>
+        <target>
+          <ref>log4j-core</ref>
+          <versions>
+            <version>
+              <range><![CDATA[vers:maven/>=2.0-beta7|<2.3.1]]></range>
+            </version>
+            <version>
+              <range><![CDATA[vers:maven/>=2.4|<2.12.3]]></range>
+            </version>
+            <version>
+              <range><![CDATA[vers:maven/>=2.13.0|<2.17.0]]></range>
+            </version>
+          </versions>
+        </target>
+      </affects>
+    </vulnerability>
+  </vulnerabilities>
+</bom>
diff --git a/src/vulnerabilities/CVE-2021-45046/log4j-core.cdx.xml 
b/src/vulnerabilities/CVE-2021-45046/log4j-core.cdx.xml
new file mode 100644
index 00000000..ff50239e
--- /dev/null
+++ b/src/vulnerabilities/CVE-2021-45046/log4j-core.cdx.xml
@@ -0,0 +1,120 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!--
+  ~ Licensed to the Apache Software Foundation (ASF) under one or more
+  ~ contributor license agreements.  See the NOTICE file distributed with
+  ~ this work for additional information regarding copyright ownership.
+  ~ The ASF licenses this file to you under the Apache License, Version 2.0
+  ~ (the "License"); you may not use this file except in compliance with
+  ~ the License.  You may obtain a copy of the License at
+  ~
+  ~      http://www.apache.org/licenses/LICENSE-2.0
+  ~
+  ~ Unless required by applicable law or agreed to in writing, software
+  ~ distributed under the License is distributed on an "AS IS" BASIS,
+  ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+  ~ See the License for the specific language governing permissions and
+  ~ limitations under the License.
+  -->
+<bom xmlns="http://cyclonedx.org/schema/bom/1.7";
+     xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";
+     xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 
https://cyclonedx.org/schema/bom-1.7.xsd";
+     serialNumber="urn:uuid:2a910e8a-9842-4bec-8e4a-ccf1d7a227d1"
+     version="1">
+  <metadata>
+    <timestamp>2025-08-17T11:18:06Z</timestamp>
+    <component type="library" bom-ref="log4j-core">
+      <group>org.apache.logging.log4j</group>
+      <name>log4j-core</name>
+      <cpe>cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*</cpe>
+      <purl>pkg:maven/org.apache.logging.log4j/log4j-core?type=jar</purl>
+    </component>
+    <manufacturer>
+      <name>Apache Logging Services</name>
+      <url>https://logging.apache.org</url>
+    </manufacturer>
+  </metadata>
+  <vulnerabilities>
+    <vulnerability>
+      <id>CVE-2021-45046</id>
+      <source>
+        <name>NVD</name>
+        <url>https://nvd.nist.gov/vuln/detail/CVE-2021-45046</url>
+      </source>
+      <references>
+        <reference>
+          <id>LOG4J2-3221</id>
+          <source>
+            <name>Issue tracker</name>
+            <url>https://issues.apache.org/jira/browse/LOG4J2-3221</url>
+          </source>
+        </reference>
+      </references>
+      <ratings>
+        <rating>
+          <source>
+            <name>NVD</name>
+            
<url><![CDATA[https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H&version=3.1]]></url>
+          </source>
+          <score>9.0</score>
+          <severity>critical</severity>
+          <method>CVSSv3</method>
+          <vector>AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H</vector>
+        </rating>
+      </ratings>
+      <cwes>
+        <cwe>917</cwe>
+      </cwes>
+      <description><![CDATA[It was found that the fix to address 
CVE-2021-44228 in Log4j `2.15.0` was incomplete in certain non-default 
configurations.
+When the logging configuration uses a non-default Pattern Layout with a Thread 
Context Lookup (for example, `$${ctx:loginId}`), attackers with control over 
Thread Context Map (MDC) can craft malicious input data using a JNDI Lookup 
pattern, resulting in an information leak and remote code execution in some 
environments and local code execution in all environments.
+Remote code execution has been demonstrated on macOS, Fedora, Arch Linux, and 
Alpine Linux.
+
+Note that this vulnerability is not limited to just the JNDI lookup.
+Any other Lookup could also be included in a Thread Context Map variable and 
possibly have private details exposed to anyone with access to the 
logs.]]></description>
+      <recommendation><![CDATA[Upgrade to Log4j `2.3.1` (for Java 6), `2.12.3` 
(for Java 7), or `2.16.0` (for Java 8 and later).]]></recommendation>
+      <created>2021-12-14T00:00:00Z</created>
+      <published>2021-12-14T00:00:00Z</published>
+      <updated>2025-08-17T11:18:06Z</updated>
+      <credits>
+        <individuals>
+          <individual>
+            <name>Kai Mindermann</name>
+          </individual>
+          <individual>
+            <name>4ra1n</name>
+          </individual>
+          <individual>
+            <name>Ash Fox</name>
+          </individual>
+          <individual>
+            <name>Alvaro Muñoz</name>
+          </individual>
+          <individual>
+            <name>Tony Torralba</name>
+          </individual>
+          <individual>
+            <name>Anthony Weems</name>
+          </individual>
+          <individual>
+            <name>RyotaK</name>
+          </individual>
+        </individuals>
+      </credits>
+      <affects>
+        <target>
+          <ref>log4j-core</ref>
+          <versions>
+            <version>
+              <range><![CDATA[vers:maven/>=2.0-beta9|<2.3.1]]></range>
+            </version>
+            <version>
+              <range><![CDATA[vers:maven/>=2.4|<2.12.3]]></range>
+            </version>
+            <version>
+              <range><![CDATA[vers:maven/>=2.13.0|<2.16.0]]></range>
+            </version>
+          </versions>
+        </target>
+      </affects>
+    </vulnerability>
+  </vulnerabilities>
+</bom>
diff --git a/src/vulnerabilities/CVE-2021-45105/log4j-core.cdx.xml 
b/src/vulnerabilities/CVE-2021-45105/log4j-core.cdx.xml
new file mode 100644
index 00000000..39c1f364
--- /dev/null
+++ b/src/vulnerabilities/CVE-2021-45105/log4j-core.cdx.xml
@@ -0,0 +1,109 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!--
+  ~ Licensed to the Apache Software Foundation (ASF) under one or more
+  ~ contributor license agreements.  See the NOTICE file distributed with
+  ~ this work for additional information regarding copyright ownership.
+  ~ The ASF licenses this file to you under the Apache License, Version 2.0
+  ~ (the "License"); you may not use this file except in compliance with
+  ~ the License.  You may obtain a copy of the License at
+  ~
+  ~      http://www.apache.org/licenses/LICENSE-2.0
+  ~
+  ~ Unless required by applicable law or agreed to in writing, software
+  ~ distributed under the License is distributed on an "AS IS" BASIS,
+  ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+  ~ See the License for the specific language governing permissions and
+  ~ limitations under the License.
+  -->
+<bom xmlns="http://cyclonedx.org/schema/bom/1.7";
+     xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";
+     xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 
https://cyclonedx.org/schema/bom-1.7.xsd";
+     serialNumber="urn:uuid:439aec1b-2139-4a8e-8167-7550e904b8f8"
+     version="1">
+  <metadata>
+    <timestamp>2022-10-06T00:00:00Z</timestamp>
+    <component type="library" bom-ref="log4j-core">
+      <group>org.apache.logging.log4j</group>
+      <name>log4j-core</name>
+      <cpe>cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*</cpe>
+      <purl>pkg:maven/org.apache.logging.log4j/log4j-core?type=jar</purl>
+    </component>
+    <manufacturer>
+      <name>Apache Logging Services</name>
+      <url>https://logging.apache.org</url>
+    </manufacturer>
+  </metadata>
+  <vulnerabilities>
+    <vulnerability>
+      <id>CVE-2021-45105</id>
+      <source>
+        <name>NVD</name>
+        <url>https://nvd.nist.gov/vuln/detail/CVE-2021-45105</url>
+      </source>
+      <references>
+        <reference>
+          <id>LOG4J2-3230</id>
+          <source>
+            <name>Issue tracker</name>
+            <url>https://issues.apache.org/jira/browse/LOG4J2-3230</url>
+          </source>
+        </reference>
+      </references>
+      <ratings>
+        <rating>
+          <source>
+            <name>NVD</name>
+            
<url><![CDATA[https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1]]></url>
+          </source>
+          <score>5.9</score>
+          <severity>medium</severity>
+          <method>CVSSv3</method>
+          <vector>AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</vector>
+        </rating>
+      </ratings>
+      <cwes>
+        <cwe>20</cwe>
+        <cwe>674</cwe>
+      </cwes>
+      <description><![CDATA[Log4j versions `2.0-alpha1` through `2.16.0` 
(excluding `2.3.1` and `2.12.3`), did not protect from uncontrolled recursion 
that can be implemented using self-referential lookups.
+When the logging configuration uses a non-default Pattern Layout with a 
Context Lookup (for example, `$${ctx:loginId}`), attackers with control over 
Thread Context Map (MDC) input data can craft malicious input data that 
contains a recursive lookup, resulting in a `StackOverflowError` that will 
terminate the process.]]></description>
+      <recommendation><![CDATA[Upgrade to `2.3.1` (for Java 6), `2.12.3` (for 
Java 7), or `2.17.0` (for Java 8 and later).
+
+Alternatively, this infinite recursion issue can be mitigated in configuration:
+
+* In PatternLayout in the logging configuration, replace Context Lookups like 
`${ctx:loginId}` or `$${ctx:loginId}` with Thread Context Map patterns (`%X`, 
`%mdc`, or `%MDC`).
+* Otherwise, in the configuration, remove references to Context Lookups like 
`${ctx:loginId}` or `$${ctx:loginId}` where they originate
+from sources external to the application such as HTTP headers or user input.
+Note that this mitigation is insufficient in releases older than `2.12.2` (for 
Java 7), and `2.16.0` (for Java 8 and later) as the issues fixed in those 
releases will still be present.]]></recommendation>
+      <created>2021-12-18T00:00:00Z</created>
+      <published>2021-12-18T00:00:00Z</published>
+      <updated>2022-10-06T00:00:00Z</updated>
+      <credits>
+        <individuals>
+          <individual>
+            <name>Hideki Okamoto</name>
+          </individual>
+          <individual>
+            <name>Guy Lederfein</name>
+          </individual>
+        </individuals>
+      </credits>
+      <affects>
+        <target>
+          <ref>log4j-core</ref>
+          <versions>
+            <version>
+              <range><![CDATA[vers:maven/>=2.0-alpha1|<2.3.1]]></range>
+            </version>
+            <version>
+              <range><![CDATA[vers:maven/>=2.4|<2.12.3]]></range>
+            </version>
+            <version>
+              <range><![CDATA[vers:maven/>=2.13.0|<2.17.0]]></range>
+            </version>
+          </versions>
+        </target>
+      </affects>
+    </vulnerability>
+  </vulnerabilities>
+</bom>
diff --git a/src/vulnerabilities/CVE-2025-54812/log4cxx.cdx.xml 
b/src/vulnerabilities/CVE-2025-54812/log4cxx.cdx.xml
new file mode 100644
index 00000000..b6cbb9ea
--- /dev/null
+++ b/src/vulnerabilities/CVE-2025-54812/log4cxx.cdx.xml
@@ -0,0 +1,111 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!--
+  ~ Licensed to the Apache Software Foundation (ASF) under one or more
+  ~ contributor license agreements.  See the NOTICE file distributed with
+  ~ this work for additional information regarding copyright ownership.
+  ~ The ASF licenses this file to you under the Apache License, Version 2.0
+  ~ (the "License"); you may not use this file except in compliance with
+  ~ the License.  You may obtain a copy of the License at
+  ~
+  ~      http://www.apache.org/licenses/LICENSE-2.0
+  ~
+  ~ Unless required by applicable law or agreed to in writing, software
+  ~ distributed under the License is distributed on an "AS IS" BASIS,
+  ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+  ~ See the License for the specific language governing permissions and
+  ~ limitations under the License.
+  -->
+<bom xmlns="http://cyclonedx.org/schema/bom/1.7";
+     xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";
+     xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 
https://cyclonedx.org/schema/bom-1.7.xsd";
+     serialNumber="urn:uuid:e3f4189d-9ba5-4d6c-916b-caf3cb428085"
+     version="1">
+  <metadata>
+    <timestamp>2026-04-10T11:53:17Z</timestamp>
+    <component type="library" bom-ref="log4cxx">
+      <name>Log4cxx</name>
+      <cpe>cpe:2.3:a:apache:log4cxx:*:*:*:*:*:*:*:*</cpe>
+    </component>
+    <manufacturer>
+      <name>Apache Logging Services</name>
+      <url>https://logging.apache.org</url>
+    </manufacturer>
+  </metadata>
+  <components>
+    <component type="library" bom-ref="log4cxx-conan">
+      <name>Log4cxx</name>
+      <purl>pkg:conan/log4cxx</purl>
+    </component>
+  </components>
+  <dependencies>
+    <dependency ref="log4cxx-conan">
+      <dependency ref="log4cxx"/>
+    </dependency>
+  </dependencies>
+  <vulnerabilities>
+    <vulnerability>
+      <id>CVE-2025-54812</id>
+      <source>
+        <name>NVD</name>
+        <url>https://nvd.nist.gov/vuln/detail/CVE-2025-54812</url>
+      </source>
+      <ratings>
+        <rating>
+          <source>
+            <name>NVD</name>
+            <url>
+              
https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
+            </url>
+          </source>
+          <score>2.1</score>
+          <severity>low</severity>
+          <method>CVSSv4</method>
+          
<vector>AV:N/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N</vector>
+        </rating>
+      </ratings>
+      <cwes>
+        <cwe>117</cwe>
+      </cwes>
+      <description><![CDATA[When using `HTMLLayout`, logger names are not 
properly escaped when writing out to the HTML file.
+If untrusted data is used to retrieve the name of a logger, an attacker could 
theoretically inject HTML or JavaScript in order to hide information from logs 
or steal data from the user.
+In order to activate this, the following sequence must occur:
+
+* Log4cxx is configured to use `HTMLLayout`.
+* Logger name comes from an untrusted string.
+* Logger with compromised name logs a message.
+* User opens the generated HTML log file in their browser, leading to 
potential XSS.
+
+Because logger names are generally constant strings, we assess the impact to 
users as LOW.]]></description>
+      <recommendation><![CDATA[Users are recommended to upgrade to version 
`1.5.0`, which fixes the issue.]]></recommendation>
+      <created>2025-08-22T07:31:10Z</created>
+      <published>2025-08-22T07:31:10Z</published>
+      <updated>2026-04-10T11:53:17Z</updated>
+      <credits>
+        <organizations>
+          <organization>
+            <name>Sovereign Tech Agency</name>
+            <url>https://www.sovereign.tech/</url>
+          </organization>
+        </organizations>
+      </credits>
+      <affects>
+        <target>
+          <ref>log4cxx</ref>
+          <versions>
+            <version>
+              <range><![CDATA[vers:semver/<1.5.0]]></range>
+            </version>
+          </versions>
+        </target>
+        <target>
+          <ref>log4cxx-conan</ref>
+          <versions>
+            <version>
+              <range><![CDATA[vers:semver/<1.5.0]]></range>
+            </version>
+          </versions>
+        </target>
+      </affects>
+    </vulnerability>
+  </vulnerabilities>
+</bom>
diff --git a/src/vulnerabilities/CVE-2025-54813/log4cxx.cdx.xml 
b/src/vulnerabilities/CVE-2025-54813/log4cxx.cdx.xml
new file mode 100644
index 00000000..3d6923a4
--- /dev/null
+++ b/src/vulnerabilities/CVE-2025-54813/log4cxx.cdx.xml
@@ -0,0 +1,104 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!--
+  ~ Licensed to the Apache Software Foundation (ASF) under one or more
+  ~ contributor license agreements.  See the NOTICE file distributed with
+  ~ this work for additional information regarding copyright ownership.
+  ~ The ASF licenses this file to you under the Apache License, Version 2.0
+  ~ (the "License"); you may not use this file except in compliance with
+  ~ the License.  You may obtain a copy of the License at
+  ~
+  ~      http://www.apache.org/licenses/LICENSE-2.0
+  ~
+  ~ Unless required by applicable law or agreed to in writing, software
+  ~ distributed under the License is distributed on an "AS IS" BASIS,
+  ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+  ~ See the License for the specific language governing permissions and
+  ~ limitations under the License.
+  -->
+<bom xmlns="http://cyclonedx.org/schema/bom/1.7";
+     xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";
+     xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 
https://cyclonedx.org/schema/bom-1.7.xsd";
+     serialNumber="urn:uuid:b65cdbe3-6fb9-4ce9-9d70-55690bb1b11a"
+     version="1">
+  <metadata>
+    <timestamp>2026-04-10T11:53:17Z</timestamp>
+    <component type="library" bom-ref="log4cxx">
+      <name>Log4cxx</name>
+      <cpe>cpe:2.3:a:apache:log4cxx:*:*:*:*:*:*:*:*</cpe>
+    </component>
+    <manufacturer>
+      <name>Apache Logging Services</name>
+      <url>https://logging.apache.org</url>
+    </manufacturer>
+  </metadata>
+  <components>
+    <component type="library" bom-ref="log4cxx-conan">
+      <name>Log4cxx</name>
+      <purl>pkg:conan/log4cxx</purl>
+    </component>
+  </components>
+  <dependencies>
+    <dependency ref="log4cxx-conan">
+      <dependency ref="log4cxx"/>
+    </dependency>
+  </dependencies>
+  <vulnerabilities>
+    <vulnerability>
+      <id>CVE-2025-54813</id>
+      <source>
+        <name>NVD</name>
+        <url>https://nvd.nist.gov/vuln/detail/CVE-2025-54813</url>
+      </source>
+      <ratings>
+        <rating>
+          <source>
+            <name>NVD</name>
+            <url>
+              
https://nvd.nist.gov/vuln-metrics/cvss/v4-calculator?vector=AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N
+            </url>
+          </source>
+          <score>6.3</score>
+          <severity>medium</severity>
+          <method>CVSSv4</method>
+          
<vector>AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N</vector>
+        </rating>
+      </ratings>
+      <cwes>
+        <cwe>117</cwe>
+      </cwes>
+      <description><![CDATA[When using `JSONLayout`, not all payload bytes are 
properly escaped.
+If an attacker-supplied message contains certain non-printable characters, 
these will be passed along in the message and written out as part of the JSON 
message.
+This may prevent applications that consume these logs from correctly 
interpreting the information within them.]]></description>
+      <recommendation><![CDATA[Users are recommended to upgrade to version 
`1.5.0`, which fixes the issue.]]></recommendation>
+      <created>2025-08-22T07:31:10Z</created>
+      <published>2025-08-22T07:31:10Z</published>
+      <updated>2026-04-10T11:53:17Z</updated>
+      <credits>
+        <organizations>
+          <organization>
+            <name>Sovereign Tech Agency</name>
+            <url>https://www.sovereign.tech/</url>
+          </organization>
+        </organizations>
+      </credits>
+      <affects>
+        <target>
+          <ref>log4cxx</ref>
+          <versions>
+            <version>
+              <range><![CDATA[vers:semver/>=0.11.0|<1.5.0]]></range>
+            </version>
+          </versions>
+        </target>
+        <target>
+          <ref>log4cxx-conan</ref>
+          <versions>
+            <version>
+              <range><![CDATA[vers:semver/>=0.11.0|<1.5.0]]></range>
+            </version>
+          </versions>
+        </target>
+      </affects>
+    </vulnerability>
+  </vulnerabilities>
+</bom>
diff --git a/src/vulnerabilities/CVE-2025-68161/log4j-core.cdx.xml 
b/src/vulnerabilities/CVE-2025-68161/log4j-core.cdx.xml
new file mode 100644
index 00000000..4f9243c3
--- /dev/null
+++ b/src/vulnerabilities/CVE-2025-68161/log4j-core.cdx.xml
@@ -0,0 +1,86 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!--
+  ~ Licensed to the Apache Software Foundation (ASF) under one or more
+  ~ contributor license agreements.  See the NOTICE file distributed with
+  ~ this work for additional information regarding copyright ownership.
+  ~ The ASF licenses this file to you under the Apache License, Version 2.0
+  ~ (the "License"); you may not use this file except in compliance with
+  ~ the License.  You may obtain a copy of the License at
+  ~
+  ~      http://www.apache.org/licenses/LICENSE-2.0
+  ~
+  ~ Unless required by applicable law or agreed to in writing, software
+  ~ distributed under the License is distributed on an "AS IS" BASIS,
+  ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+  ~ See the License for the specific language governing permissions and
+  ~ limitations under the License.
+  -->
+<bom xmlns="http://cyclonedx.org/schema/bom/1.7";
+     xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";
+     xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 
https://cyclonedx.org/schema/bom-1.7.xsd";
+     serialNumber="urn:uuid:78b4d9a0-9d3e-47cb-93d9-d31689de2bbb"
+     version="1">
+  <metadata>
+    <timestamp>2025-12-18T16:09:38Z</timestamp>
+    <component type="library" bom-ref="log4j-core">
+      <group>org.apache.logging.log4j</group>
+      <name>log4j-core</name>
+      <cpe>cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*</cpe>
+      <purl>pkg:maven/org.apache.logging.log4j/log4j-core?type=jar</purl>
+    </component>
+    <manufacturer>
+      <name>Apache Logging Services</name>
+      <url>https://logging.apache.org</url>
+    </manufacturer>
+  </metadata>
+  <vulnerabilities>
+    <vulnerability>
+      <id>CVE-2025-68161</id>
+      <source>
+        <name>NVD</name>
+        <url>https://nvd.nist.gov/vuln/detail/CVE-2025-68161</url>
+      </source>
+      <ratings>
+        <rating>
+          <source>
+            <name>The Apache Software Foundation</name>
+            
<url><![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N]]></url>
+          </source>
+          <score>6.3</score>
+          <severity>medium</severity>
+          <method>CVSSv4</method>
+          
<vector>AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N</vector>
+        </rating>
+      </ratings>
+      <cwes>
+        <cwe>297</cwe>
+      </cwes>
+      <description><![CDATA[The Socket Appender in Log4j Core versions 
`2.0-beta9` through `2.25.2` does not perform TLS hostname verification of the 
peer certificate, even when the
+https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName[`verifyHostName`]
+configuration attribute or the
+https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName[`log4j2.sslVerifyHostName`]
+system property is set to `true`.
+
+This issue may allow a man-in-the-middle attacker to intercept or redirect log 
traffic under the following conditions:
+
+* The attacker is able to intercept or redirect network traffic between the 
client and the log receiver.
+* The attacker can present a server certificate issued by a certification 
authority trusted by the Socket Appender’s configured trust store (or by the 
default Java trust store if no custom trust store is 
configured).]]></description>
+      <recommendation><![CDATA[Users are advised to upgrade to Log4j Core 
version `2.25.3`, which fully addresses this issue.
+
+For earlier versions, the risk can be reduced by carefully restricting the 
trust store used by the Socket Appender.]]></recommendation>
+      <created>2025-12-18T16:09:38Z</created>
+      <published>2025-12-18T16:09:38Z</published>
+      <updated>2025-12-18T16:09:38Z</updated>
+      <affects>
+        <target>
+          <ref>log4j-core</ref>
+          <versions>
+            <version>
+              <range><![CDATA[vers:maven/>=2.0-beta9|<2.25.3]]></range>
+            </version>
+          </versions>
+        </target>
+      </affects>
+    </vulnerability>
+  </vulnerabilities>
+</bom>
diff --git a/src/vulnerabilities/CVE-2026-34477/log4j-core.cdx.xml 
b/src/vulnerabilities/CVE-2026-34477/log4j-core.cdx.xml
new file mode 100644
index 00000000..7625b200
--- /dev/null
+++ b/src/vulnerabilities/CVE-2026-34477/log4j-core.cdx.xml
@@ -0,0 +1,119 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!--
+  ~ Licensed to the Apache Software Foundation (ASF) under one or more
+  ~ contributor license agreements.  See the NOTICE file distributed with
+  ~ this work for additional information regarding copyright ownership.
+  ~ The ASF licenses this file to you under the Apache License, Version 2.0
+  ~ (the "License"); you may not use this file except in compliance with
+  ~ the License.  You may obtain a copy of the License at
+  ~
+  ~      http://www.apache.org/licenses/LICENSE-2.0
+  ~
+  ~ Unless required by applicable law or agreed to in writing, software
+  ~ distributed under the License is distributed on an "AS IS" BASIS,
+  ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+  ~ See the License for the specific language governing permissions and
+  ~ limitations under the License.
+  -->
+<bom xmlns="http://cyclonedx.org/schema/bom/1.7";
+     xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";
+     xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 
https://cyclonedx.org/schema/bom-1.7.xsd";
+     serialNumber="urn:uuid:85f8bc61-8ec0-4c05-9185-16676480cc5b"
+     version="1">
+  <metadata>
+    <timestamp>2026-04-10T11:53:17Z</timestamp>
+    <component type="library" bom-ref="log4j-core">
+      <group>org.apache.logging.log4j</group>
+      <name>log4j-core</name>
+      <cpe>cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*</cpe>
+      <purl>pkg:maven/org.apache.logging.log4j/log4j-core?type=jar</purl>
+    </component>
+    <manufacturer>
+      <name>Apache Logging Services</name>
+      <url>https://logging.apache.org</url>
+    </manufacturer>
+  </metadata>
+  <vulnerabilities>
+    <vulnerability>
+      <id>CVE-2026-34477</id>
+      <source>
+        <name>NVD</name>
+        <url>https://nvd.nist.gov/vuln/detail/CVE-2026-34477</url>
+      </source>
+      <ratings>
+        <rating>
+          <source>
+            <name>The Apache Software Foundation</name>
+            
<url><![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N]]></url>
+          </source>
+          <score>6.3</score>
+          <severity>medium</severity>
+          <method>CVSSv4</method>
+          
<vector>AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N</vector>
+        </rating>
+      </ratings>
+      <cwes>
+        <cwe>297</cwe>
+      </cwes>
+      <description><![CDATA[The fix for CVE-2025-68161 was incomplete: it 
addressed hostname verification only when enabled via the
+https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName[`log4j2.sslVerifyHostName`]
+system property, but not when configured through the
+https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName[`verifyHostName`]
+attribute of the `<Ssl>` element.
+
+Although the `verifyHostName` configuration attribute was introduced in Log4j 
Core 2.12.0, it was silently ignored in all versions through 2.25.3, leaving 
TLS connections vulnerable to interception regardless of the configured value.
+
+A network-based attacker may be able to perform a man-in-the-middle attack 
when *all* of the following conditions are met:
+
+* An SMTP, Socket, or Syslog appender is in use.
+* TLS is configured via a nested `<Ssl>` element.
+* The attacker can present a certificate issued by a CA trusted by the 
appender's configured trust store, or by the default Java trust store if none 
is configured.
+
+This issue does not affect users of the HTTP appender, which uses a separate
+https://logging.apache.org/log4j/2.x/manual/appenders/network.html#HttpAppender-attr-verifyHostName[`verifyHostname`]
+attribute that was not subject to this bug and verifies host names by 
default.]]></description>
+      <recommendation><![CDATA[Users are advised to upgrade to Apache Log4j 
Core version `2.25.4`, which corrects this issue.]]></recommendation>
+      <created>2026-04-10T11:53:17Z</created>
+      <published>2026-04-10T11:53:17Z</published>
+      <updated>2026-04-10T11:53:17Z</updated>
+      <credits>
+        <individuals>
+          <individual>
+            <name>Samuli Leinonen</name>
+          </individual>
+          <individual>
+            <name>Naresh Kandula</name>
+          </individual>
+          <individual>
+            <name>Vitaly Simonovich</name>
+          </individual>
+          <individual>
+            <name>Raijuna</name>
+          </individual>
+          <individual>
+            <name>Danish Siddiqui</name>
+          </individual>
+          <individual>
+            <name>Markus Magnuson</name>
+          </individual>
+          <individual>
+            <name>Haruki Oyama</name>
+          </individual>
+        </individuals>
+      </credits>
+      <affects>
+        <target>
+          <ref>log4j-core</ref>
+          <versions>
+            <version>
+              <range><![CDATA[vers:maven/>=2.12.0|<2.25.4]]></range>
+            </version>
+            <version>
+              
<range><![CDATA[vers:maven/>=3.0.0-alpha1|<=3.0.0-beta3]]></range>
+            </version>
+          </versions>
+        </target>
+      </affects>
+    </vulnerability>
+  </vulnerabilities>
+</bom>
diff --git a/src/vulnerabilities/CVE-2026-34478/log4j-core.cdx.xml 
b/src/vulnerabilities/CVE-2026-34478/log4j-core.cdx.xml
new file mode 100644
index 00000000..34c800b5
--- /dev/null
+++ b/src/vulnerabilities/CVE-2026-34478/log4j-core.cdx.xml
@@ -0,0 +1,95 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!--
+  ~ Licensed to the Apache Software Foundation (ASF) under one or more
+  ~ contributor license agreements.  See the NOTICE file distributed with
+  ~ this work for additional information regarding copyright ownership.
+  ~ The ASF licenses this file to you under the Apache License, Version 2.0
+  ~ (the "License"); you may not use this file except in compliance with
+  ~ the License.  You may obtain a copy of the License at
+  ~
+  ~      http://www.apache.org/licenses/LICENSE-2.0
+  ~
+  ~ Unless required by applicable law or agreed to in writing, software
+  ~ distributed under the License is distributed on an "AS IS" BASIS,
+  ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+  ~ See the License for the specific language governing permissions and
+  ~ limitations under the License.
+  -->
+<bom xmlns="http://cyclonedx.org/schema/bom/1.7";
+     xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";
+     xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 
https://cyclonedx.org/schema/bom-1.7.xsd";
+     serialNumber="urn:uuid:0b9835b2-6bf0-4c2e-bc40-e2ce623a34c7"
+     version="1">
+  <metadata>
+    <timestamp>2026-04-10T11:53:17Z</timestamp>
+    <component type="library" bom-ref="log4j-core">
+      <group>org.apache.logging.log4j</group>
+      <name>log4j-core</name>
+      <cpe>cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*</cpe>
+      <purl>pkg:maven/org.apache.logging.log4j/log4j-core?type=jar</purl>
+    </component>
+    <manufacturer>
+      <name>Apache Logging Services</name>
+      <url>https://logging.apache.org</url>
+    </manufacturer>
+  </metadata>
+  <vulnerabilities>
+    <vulnerability>
+      <id>CVE-2026-34478</id>
+      <source>
+        <name>NVD</name>
+        <url>https://nvd.nist.gov/vuln/detail/CVE-2026-34478</url>
+      </source>
+      <ratings>
+        <rating>
+          <source>
+            <name>The Apache Software Foundation</name>
+            
<url><![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N]]></url>
+          </source>
+          <score>6.9</score>
+          <severity>medium</severity>
+          <method>CVSSv4</method>
+          
<vector>AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N</vector>
+        </rating>
+      </ratings>
+      <cwes>
+        <cwe>684</cwe>
+        <cwe>117</cwe>
+      </cwes>
+      <description><![CDATA[Apache Log4j Core's
+https://logging.apache.org/log4j/2.x/manual/layouts.html#RFC5424Layout[`Rfc5424Layout`],
+in versions 2.21.0 through 2.25.3, is vulnerable to log injection via CRLF 
sequences due to undocumented renames of security-relevant configuration 
attributes.
+
+Two distinct issues affect users of stream-based syslog services who configure 
`Rfc5424Layout` directly:
+
+* The `newLineEscape` attribute was silently renamed, causing newline escaping 
to stop working for users of TCP framing (RFC 6587), exposing them to CRLF 
injection in log output.
+* The `useTlsMessageFormat` attribute was silently renamed, causing users of 
TLS framing (RFC 5425) to be silently downgraded to unframed TCP (RFC 6587), 
without newline escaping.
+
+Users of the `SyslogAppender` are not affected, as its configuration 
attributes were not modified.]]></description>
+      <recommendation><![CDATA[Users are advised to upgrade to Apache Log4j 
Core version `2.25.4`, which corrects this issue.]]></recommendation>
+      <created>2026-04-10T11:53:17Z</created>
+      <published>2026-04-10T11:53:17Z</published>
+      <updated>2026-04-10T11:53:17Z</updated>
+      <credits>
+        <individuals>
+          <individual>
+            <name>Samuli Leinonen</name>
+          </individual>
+        </individuals>
+      </credits>
+      <affects>
+        <target>
+          <ref>log4j-core</ref>
+          <versions>
+            <version>
+              <range><![CDATA[vers:maven/>=2.21.0|<2.25.4]]></range>
+            </version>
+            <version>
+              <range><![CDATA[vers:maven/>=3.0.0-beta1|<=3.0.0-beta3]]></range>
+            </version>
+          </versions>
+        </target>
+      </affects>
+    </vulnerability>
+  </vulnerabilities>
+</bom>
diff --git a/src/vulnerabilities/CVE-2026-34479/log4j-1.2-api.cdx.xml 
b/src/vulnerabilities/CVE-2026-34479/log4j-1.2-api.cdx.xml
new file mode 100644
index 00000000..00d71226
--- /dev/null
+++ b/src/vulnerabilities/CVE-2026-34479/log4j-1.2-api.cdx.xml
@@ -0,0 +1,102 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!--
+  ~ Licensed to the Apache Software Foundation (ASF) under one or more
+  ~ contributor license agreements.  See the NOTICE file distributed with
+  ~ this work for additional information regarding copyright ownership.
+  ~ The ASF licenses this file to you under the Apache License, Version 2.0
+  ~ (the "License"); you may not use this file except in compliance with
+  ~ the License.  You may obtain a copy of the License at
+  ~
+  ~      http://www.apache.org/licenses/LICENSE-2.0
+  ~
+  ~ Unless required by applicable law or agreed to in writing, software
+  ~ distributed under the License is distributed on an "AS IS" BASIS,
+  ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+  ~ See the License for the specific language governing permissions and
+  ~ limitations under the License.
+  -->
+<bom xmlns="http://cyclonedx.org/schema/bom/1.7";
+     xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";
+     xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 
https://cyclonedx.org/schema/bom-1.7.xsd";
+     serialNumber="urn:uuid:4c8d43b2-f154-4d72-a801-525289431a2a"
+     version="1">
+  <metadata>
+    <timestamp>2026-04-10T11:53:17Z</timestamp>
+    <component type="library" bom-ref="log4j-1.2-api">
+      <group>org.apache.logging.log4j</group>
+      <name>log4j-1.2-api</name>
+      <cpe>cpe:2.3:a:apache:log4j_1_2_api:*:*:*:*:*:*:*:*</cpe>
+      <purl>pkg:maven/org.apache.logging.log4j/log4j-1.2-api?type=jar</purl>
+    </component>
+    <manufacturer>
+      <name>Apache Logging Services</name>
+      <url>https://logging.apache.org</url>
+    </manufacturer>
+  </metadata>
+  <vulnerabilities>
+    <vulnerability>
+      <id>CVE-2026-34479</id>
+      <source>
+        <name>NVD</name>
+        <url>https://nvd.nist.gov/vuln/detail/CVE-2026-34479</url>
+      </source>
+      <ratings>
+        <rating>
+          <source>
+            <name>The Apache Software Foundation</name>
+            
<url><![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N]]></url>
+          </source>
+          <score>6.9</score>
+          <severity>medium</severity>
+          <method>CVSSv4</method>
+          
<vector>AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N</vector>
+        </rating>
+      </ratings>
+      <cwes>
+        <cwe>116</cwe>
+      </cwes>
+      <description><![CDATA[The `Log4j1XmlLayout` from the Apache Log4j 
1-to-Log4j 2 bridge fails to escape characters forbidden by the XML 1.0 
standard, producing malformed XML output.
+Conforming XML parsers are required to reject documents containing such 
characters with a fatal error, which may cause downstream log processing 
systems to drop or fail to index affected records.
+
+Two groups of users are affected:
+
+* Those using `Log4j1XmlLayout` directly in a Log4j Core 2 configuration file.
+* Those using the Log4j 1 configuration compatibility layer with 
`org.apache.log4j.xml.XMLLayout` specified as the layout class.]]></description>
+      <recommendation><![CDATA[Users are advised to upgrade to Apache Log4j 
1-to-Log4j 2 bridge version `2.25.4`, which corrects this issue.
+
+NOTE: The Apache Log4j 1-to-Log4j 2 bridge is deprecated and will not be 
present in Log4j 3.
+Users are encouraged to consult the
+https://logging.apache.org/log4j/2.x/migrate-from-log4j1.html[Log4j 1 to Log4j 
2 migration guide],
+and specifically the section on eliminating reliance on the 
bridge.]]></recommendation>
+      <created>2026-04-10T11:53:17Z</created>
+      <published>2026-04-10T11:53:17Z</published>
+      <updated>2026-04-10T11:53:17Z</updated>
+      <credits>
+        <individuals>
+          <individual>
+            <name>Ap4sh (Samy Medjahed)</name>
+          </individual>
+          <individual>
+            <name>Ethicxz (Eliott Laurie)</name>
+          </individual>
+          <individual>
+            <name>jabaltarik1</name>
+          </individual>
+        </individuals>
+      </credits>
+      <affects>
+        <target>
+          <ref>log4j-1.2-api</ref>
+          <versions>
+            <version>
+              <range><![CDATA[vers:maven/>=2.7|<2.25.4]]></range>
+            </version>
+            <version>
+              
<range><![CDATA[vers:maven/>=3.0.0-alpha1|<=3.0.0-beta2]]></range>
+            </version>
+          </versions>
+        </target>
+      </affects>
+    </vulnerability>
+  </vulnerabilities>
+</bom>
diff --git a/src/vulnerabilities/CVE-2026-34480/log4j-core.cdx.xml 
b/src/vulnerabilities/CVE-2026-34480/log4j-core.cdx.xml
new file mode 100644
index 00000000..74555afe
--- /dev/null
+++ b/src/vulnerabilities/CVE-2026-34480/log4j-core.cdx.xml
@@ -0,0 +1,101 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!--
+  ~ Licensed to the Apache Software Foundation (ASF) under one or more
+  ~ contributor license agreements.  See the NOTICE file distributed with
+  ~ this work for additional information regarding copyright ownership.
+  ~ The ASF licenses this file to you under the Apache License, Version 2.0
+  ~ (the "License"); you may not use this file except in compliance with
+  ~ the License.  You may obtain a copy of the License at
+  ~
+  ~      http://www.apache.org/licenses/LICENSE-2.0
+  ~
+  ~ Unless required by applicable law or agreed to in writing, software
+  ~ distributed under the License is distributed on an "AS IS" BASIS,
+  ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+  ~ See the License for the specific language governing permissions and
+  ~ limitations under the License.
+  -->
+<bom xmlns="http://cyclonedx.org/schema/bom/1.7";
+     xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";
+     xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 
https://cyclonedx.org/schema/bom-1.7.xsd";
+     serialNumber="urn:uuid:79b538cc-2f8a-4484-83e1-c7803218241b"
+     version="1">
+  <metadata>
+    <timestamp>2026-04-10T11:53:17Z</timestamp>
+    <component type="library" bom-ref="log4j-core">
+      <group>org.apache.logging.log4j</group>
+      <name>log4j-core</name>
+      <cpe>cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*</cpe>
+      <purl>pkg:maven/org.apache.logging.log4j/log4j-core?type=jar</purl>
+    </component>
+    <manufacturer>
+      <name>Apache Logging Services</name>
+      <url>https://logging.apache.org</url>
+    </manufacturer>
+  </metadata>
+  <vulnerabilities>
+    <vulnerability>
+      <id>CVE-2026-34480</id>
+      <source>
+        <name>NVD</name>
+        <url>https://nvd.nist.gov/vuln/detail/CVE-2026-34480</url>
+      </source>
+      <ratings>
+        <rating>
+          <source>
+            <name>The Apache Software Foundation</name>
+            
<url><![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N]]></url>
+          </source>
+          <score>6.9</score>
+          <severity>medium</severity>
+          <method>CVSSv4</method>
+          
<vector>AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N</vector>
+        </rating>
+      </ratings>
+      <cwes>
+        <cwe>116</cwe>
+      </cwes>
+      <description><![CDATA[Apache Log4j Core's
+https://logging.apache.org/log4j/2.x/manual/layouts.html#XmlLayout[`XmlLayout`],
+in versions up to and including 2.25.3, fails to sanitize characters forbidden 
by the
+https://www.w3.org/TR/xml/#charsets[XML 1.0 specification]
+producing invalid XML output whenever a log message or MDC value contains such 
characters.
+
+The impact depends on the StAX implementation in use:
+
+* *JRE built-in StAX:* Forbidden characters are silently written to the 
output, producing malformed XML.
+Conforming parsers must reject such documents with a fatal error, which may 
cause downstream log-processing systems to drop the affected records.
+* *Alternative StAX implementations* (e.g., 
https://github.com/FasterXML/woodstox[Woodstox], a transitive dependency of the 
Jackson XML Dataformat module): An exception is thrown during the logging call, 
and the log event is never delivered to its intended appender, only to Log4j's 
internal status logger.]]></description>
+      <recommendation><![CDATA[Users are advised to upgrade to Apache Log4j 
Core version `2.25.4`, which corrects this issue by sanitizing forbidden 
characters before XML output.]]></recommendation>
+      <created>2026-04-10T11:53:17Z</created>
+      <published>2026-04-10T11:53:17Z</published>
+      <updated>2026-04-10T11:53:17Z</updated>
+      <credits>
+        <individuals>
+          <individual>
+            <name>Ap4sh (Samy Medjahed)</name>
+          </individual>
+          <individual>
+            <name>Ethicxz (Eliott Laurie)</name>
+          </individual>
+          <individual>
+            <name>jabaltarik1</name>
+          </individual>
+        </individuals>
+      </credits>
+      <affects>
+        <target>
+          <ref>log4j-core</ref>
+          <versions>
+            <version>
+              <range><![CDATA[vers:maven/>=2.0-alpha1|<2.25.4]]></range>
+            </version>
+            <version>
+              
<range><![CDATA[vers:maven/>=3.0.0-alpha1|<=3.0.0-beta3]]></range>
+            </version>
+          </versions>
+        </target>
+      </affects>
+    </vulnerability>
+  </vulnerabilities>
+</bom>
diff --git 
a/src/vulnerabilities/CVE-2026-34481/log4j-layout-template-json.cdx.xml 
b/src/vulnerabilities/CVE-2026-34481/log4j-layout-template-json.cdx.xml
new file mode 100644
index 00000000..ea338337
--- /dev/null
+++ b/src/vulnerabilities/CVE-2026-34481/log4j-layout-template-json.cdx.xml
@@ -0,0 +1,96 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!--
+  ~ Licensed to the Apache Software Foundation (ASF) under one or more
+  ~ contributor license agreements.  See the NOTICE file distributed with
+  ~ this work for additional information regarding copyright ownership.
+  ~ The ASF licenses this file to you under the Apache License, Version 2.0
+  ~ (the "License"); you may not use this file except in compliance with
+  ~ the License.  You may obtain a copy of the License at
+  ~
+  ~      http://www.apache.org/licenses/LICENSE-2.0
+  ~
+  ~ Unless required by applicable law or agreed to in writing, software
+  ~ distributed under the License is distributed on an "AS IS" BASIS,
+  ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+  ~ See the License for the specific language governing permissions and
+  ~ limitations under the License.
+  -->
+<bom xmlns="http://cyclonedx.org/schema/bom/1.7";
+     xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";
+     xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 
https://cyclonedx.org/schema/bom-1.7.xsd";
+     serialNumber="urn:uuid:a3302fbc-45c3-47e7-9b93-20166b1a4070"
+     version="1">
+  <metadata>
+    <timestamp>2026-04-10T11:53:17Z</timestamp>
+    <component type="library" bom-ref="log4j-layout-template-json">
+      <group>org.apache.logging.log4j</group>
+      <name>log4j-layout-template-json</name>
+      <cpe>cpe:2.3:a:apache:log4j_layout_template_json:*:*:*:*:*:*:*:*</cpe>
+      
<purl>pkg:maven/org.apache.logging.log4j/log4j-layout-template-json?type=jar</purl>
+    </component>
+    <manufacturer>
+      <name>Apache Logging Services</name>
+      <url>https://logging.apache.org</url>
+    </manufacturer>
+  </metadata>
+  <vulnerabilities>
+    <vulnerability>
+      <id>CVE-2026-34481</id>
+      <source>
+        <name>NVD</name>
+        <url>https://nvd.nist.gov/vuln/detail/CVE-2026-34481</url>
+      </source>
+      <ratings>
+        <rating>
+          <source>
+            <name>The Apache Software Foundation</name>
+            
<url><![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N]]></url>
+          </source>
+          <score>6.3</score>
+          <severity>medium</severity>
+          <method>CVSSv4</method>
+          
<vector>AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N</vector>
+        </rating>
+      </ratings>
+      <cwes>
+        <cwe>116</cwe>
+      </cwes>
+      <description><![CDATA[Apache Log4j's
+https://logging.apache.org/log4j/2.x/manual/json-template-layout.html[`JsonTemplateLayout`],
+in versions up to and including 2.25.3, produces invalid JSON output when log 
events contain non-finite floating-point values (`NaN`, `Infinity`, or 
`-Infinity`), which are prohibited by RFC 8259.
+This may cause downstream log processing systems to reject or fail to index 
affected records.
+
+An attacker can exploit this issue only if both of the following conditions 
are met:
+
+* The application uses `JsonTemplateLayout`.
+* The application logs a `MapMessage` containing an attacker-controlled 
floating-point value.]]></description>
+      <recommendation><![CDATA[Users are advised to upgrade to Apache Log4j 
JSON Template Layout version `2.25.4`, which corrects this 
issue.]]></recommendation>
+      <created>2026-04-10T11:53:17Z</created>
+      <published>2026-04-10T11:53:17Z</published>
+      <updated>2026-04-10T11:53:17Z</updated>
+      <credits>
+        <individuals>
+          <individual>
+            <name>Ap4sh (Samy Medjahed)</name>
+          </individual>
+          <individual>
+            <name>Ethicxz (Eliott Laurie)</name>
+          </individual>
+        </individuals>
+      </credits>
+      <affects>
+        <target>
+          <ref>log4j-layout-template-json</ref>
+          <versions>
+            <version>
+              <range><![CDATA[vers:maven/>=2.14.0|<2.25.4]]></range>
+            </version>
+            <version>
+              
<range><![CDATA[vers:maven/>=3.0.0-alpha1|<=3.0.0-beta3]]></range>
+            </version>
+          </versions>
+        </target>
+      </affects>
+    </vulnerability>
+  </vulnerabilities>
+</bom>
diff --git a/src/vulnerabilities/CVE-2026-40021/log4net.cdx.xml 
b/src/vulnerabilities/CVE-2026-40021/log4net.cdx.xml
new file mode 100644
index 00000000..c412b144
--- /dev/null
+++ b/src/vulnerabilities/CVE-2026-40021/log4net.cdx.xml
@@ -0,0 +1,90 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!--
+  ~ Licensed to the Apache Software Foundation (ASF) under one or more
+  ~ contributor license agreements.  See the NOTICE file distributed with
+  ~ this work for additional information regarding copyright ownership.
+  ~ The ASF licenses this file to you under the Apache License, Version 2.0
+  ~ (the "License"); you may not use this file except in compliance with
+  ~ the License.  You may obtain a copy of the License at
+  ~
+  ~      http://www.apache.org/licenses/LICENSE-2.0
+  ~
+  ~ Unless required by applicable law or agreed to in writing, software
+  ~ distributed under the License is distributed on an "AS IS" BASIS,
+  ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+  ~ See the License for the specific language governing permissions and
+  ~ limitations under the License.
+  -->
+<bom xmlns="http://cyclonedx.org/schema/bom/1.7";
+     xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";
+     xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 
https://cyclonedx.org/schema/bom-1.7.xsd";
+     serialNumber="urn:uuid:2dcb287c-5b4d-4633-98b8-8a86d0949460"
+     version="1">
+  <metadata>
+    <timestamp>2026-04-10T11:53:17Z</timestamp>
+    <component type="library" bom-ref="log4net">
+      <name>Log4net</name>
+      <cpe>cpe:2.3:a:apache:log4net:*:*:*:*:*:*:*:*</cpe>
+      <purl>pkg:nuget/log4net</purl>
+    </component>
+    <manufacturer>
+      <name>Apache Logging Services</name>
+      <url>https://logging.apache.org</url>
+    </manufacturer>
+  </metadata>
+  <vulnerabilities>
+    <vulnerability>
+      <id>CVE-2026-40021</id>
+      <source>
+        <name>NVD</name>
+        <url>https://nvd.nist.gov/vuln/detail/CVE-2026-40021</url>
+      </source>
+      <ratings>
+        <rating>
+          <source>
+            <name>The Apache Software Foundation</name>
+            
<url><![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N]]></url>
+          </source>
+          <score>6.3</score>
+          <severity>medium</severity>
+          <method>CVSSv4</method>
+          
<vector>AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N</vector>
+        </rating>
+      </ratings>
+      <cwes>
+        <cwe>116</cwe>
+      </cwes>
+      <description><![CDATA[Apache Log4net's
+https://logging.apache.org/log4net/manual/configuration/layouts.html#layout-list[`XmlLayout`]
+and
+https://logging.apache.org/log4net/manual/configuration/layouts.html#layout-list[`XmlLayoutSchemaLog4J`],
+in versions before 3.3.0, fail to sanitize characters forbidden by the
+https://www.w3.org/TR/xml/#charsets[XML 1.0 specification]
+in MDC property keys and values, as well as the identity field that may carry 
attacker-influenced data.
+This causes an exception during serialization and the silent loss of the 
affected log event.
+
+An attacker who can influence any of these fields can exploit this to suppress 
individual log records, impairing audit trails and detection of malicious 
activity.]]></description>
+      <recommendation><![CDATA[Users are advised to upgrade to Apache Log4net 
version `3.3.0`, which fixes this issue.]]></recommendation>
+      <created>2026-04-10T11:53:17Z</created>
+      <published>2026-04-10T11:53:17Z</published>
+      <updated>2026-04-10T11:53:17Z</updated>
+      <credits>
+        <individuals>
+          <individual>
+            <name>f00dat</name>
+          </individual>
+        </individuals>
+      </credits>
+      <affects>
+        <target>
+          <ref>log4net</ref>
+          <versions>
+            <version>
+              <range><![CDATA[vers:nuget/>=0|<3.3.0]]></range>
+            </version>
+          </versions>
+        </target>
+      </affects>
+    </vulnerability>
+  </vulnerabilities>
+</bom>
diff --git a/src/vulnerabilities/CVE-2026-40023/log4cxx.cdx.xml 
b/src/vulnerabilities/CVE-2026-40023/log4cxx.cdx.xml
new file mode 100644
index 00000000..21b70039
--- /dev/null
+++ b/src/vulnerabilities/CVE-2026-40023/log4cxx.cdx.xml
@@ -0,0 +1,106 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!--
+  ~ Licensed to the Apache Software Foundation (ASF) under one or more
+  ~ contributor license agreements.  See the NOTICE file distributed with
+  ~ this work for additional information regarding copyright ownership.
+  ~ The ASF licenses this file to you under the Apache License, Version 2.0
+  ~ (the "License"); you may not use this file except in compliance with
+  ~ the License.  You may obtain a copy of the License at
+  ~
+  ~      http://www.apache.org/licenses/LICENSE-2.0
+  ~
+  ~ Unless required by applicable law or agreed to in writing, software
+  ~ distributed under the License is distributed on an "AS IS" BASIS,
+  ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+  ~ See the License for the specific language governing permissions and
+  ~ limitations under the License.
+  -->
+<bom xmlns="http://cyclonedx.org/schema/bom/1.7";
+     xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";
+     xsi:schemaLocation="http://cyclonedx.org/schema/bom/1.7 
https://cyclonedx.org/schema/bom-1.7.xsd";
+     serialNumber="urn:uuid:564f80b5-ce22-4145-bca1-c13a4fbd2070"
+     version="1">
+  <metadata>
+    <timestamp>2026-04-10T11:53:17Z</timestamp>
+    <component type="library" bom-ref="log4cxx">
+      <name>Log4cxx</name>
+      <cpe>cpe:2.3:a:apache:log4cxx:*:*:*:*:*:*:*:*</cpe>
+    </component>
+    <manufacturer>
+      <name>Apache Logging Services</name>
+      <url>https://logging.apache.org</url>
+    </manufacturer>
+  </metadata>
+  <components>
+    <component type="library" bom-ref="log4cxx-conan">
+      <name>Log4cxx</name>
+      <purl>pkg:conan/log4cxx</purl>
+    </component>
+  </components>
+  <dependencies>
+    <dependency ref="log4cxx-conan">
+      <dependency ref="log4cxx"/>
+    </dependency>
+  </dependencies>
+  <vulnerabilities>
+    <vulnerability>
+      <id>CVE-2026-40023</id>
+      <source>
+        <name>NVD</name>
+        <url>https://nvd.nist.gov/vuln/detail/CVE-2026-40023</url>
+      </source>
+      <ratings>
+        <rating>
+          <source>
+            <name>The Apache Software Foundation</name>
+            
<url><![CDATA[https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N]]></url>
+          </source>
+          <score>6.3</score>
+          <severity>medium</severity>
+          <method>CVSSv4</method>
+          
<vector>AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N</vector>
+        </rating>
+      </ratings>
+      <cwes>
+        <cwe>116</cwe>
+      </cwes>
+      <description><![CDATA[Apache Log4cxx's
+https://logging.apache.org/log4cxx/1.7.0/classlog4cxx_1_1xml_1_1XMLLayout.html[`XMLLayout`],
+in versions before 1.7.0, fails to sanitize characters forbidden by the
+https://www.w3.org/TR/xml/#charsets[XML 1.0 specification]
+in log messages, NDC, and MDC property keys and values, producing invalid XML 
output.
+Conforming XML parsers must reject such documents with a fatal error, which 
may cause downstream log processing systems to drop or fail to index affected 
records.
+
+An attacker who can influence logged data can exploit this to suppress 
individual log records, impairing audit trails and detection of malicious 
activity.]]></description>
+      <recommendation><![CDATA[Users are advised to upgrade to Apache Log4cxx 
version `1.7.0`, which fixes this issue.]]></recommendation>
+      <created>2026-04-10T11:53:17Z</created>
+      <published>2026-04-10T11:53:17Z</published>
+      <updated>2026-04-10T11:53:17Z</updated>
+      <credits>
+        <individuals>
+          <individual>
+            <name>Olawale Titiloye</name>
+          </individual>
+        </individuals>
+      </credits>
+      <affects>
+        <target>
+          <ref>log4cxx</ref>
+          <versions>
+            <version>
+              <range><![CDATA[vers:semver/>=0|<1.7.0]]></range>
+            </version>
+          </versions>
+        </target>
+        <target>
+          <ref>log4cxx-conan</ref>
+          <versions>
+            <version>
+              <range><![CDATA[vers:semver/>=0|<1.7.0]]></range>
+            </version>
+          </versions>
+        </target>
+      </affects>
+    </vulnerability>
+  </vulnerabilities>
+</bom>

Reply via email to