{"id":51897,"date":"2021-12-15T08:30:23","date_gmt":"2021-12-15T07:30:23","guid":{"rendered":"https:\/\/nolabnoparty.com\/?p=51897"},"modified":"2021-12-15T13:42:41","modified_gmt":"2021-12-15T12:42:41","slug":"runecast-free-log4shell-vulnerability-scan","status":"publish","type":"post","link":"https:\/\/nolabnoparty.com\/en\/runecast-free-log4shell-vulnerability-scan\/","title":{"rendered":"Runecast: free Log4Shell vulnerability scan"},"content":{"rendered":"<p><img decoding=\"async\" class=\"aligncenter wp-image-51898 size-full\" title=\"runecast-free-log4shell-vulnerability-scan-01\" src=\"https:\/\/nolabnoparty.com\/wp-content\/uploads\/2021\/12\/runecast-free-log4shell-vulnerability-scan-01.jpg\" alt=\"runecast-free-log4shell-vulnerability-scan-01\" width=\"602\" height=\"202\" \/><\/p>\n<p>Following the Log4J vulnerability, Runecast is offering a <strong>free Log4Shell vulnerability scan<\/strong> to check if the environment is affected by Log4J.<\/p>\n<p>Latest <a href=\"https:\/\/nolabnoparty.com\/en\/runecast-analyzer-5-1-with-configuration-vault-and-remediation\/\">Runecast Analyzer<\/a> version (6.0.1.0) has already implemented the <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-44228\" target=\"_blank\" rel=\"noopener\">CVE-2021-44228<\/a> that detects which VMware products are affected. <!--more--><\/p>\n<p>&nbsp;<\/p>\n<h2>Log4Shell vulnerability scan<\/h2>\n<p>If <strong>automatic updates<\/strong> are enabled in Runecast, the Analyzer is already able to scan the environment against Log4J vulnerability.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-51900\" src=\"https:\/\/nolabnoparty.com\/wp-content\/uploads\/2021\/12\/runecast-free-log4shell-vulnerability-scan-02.jpg\" alt=\"\" width=\"570\" height=\"191\" title=\"\"><\/p>\n<p>Runecast is offering a free vulnerability scan to help customers <strong>discover vulnerable Log4J instances<\/strong> in their Windows, Linux and <wbr \/>VMware environments.<\/p>\n<p>You just need to fill this form at <a href=\"https:\/\/www.runecast.com\/log4shell-assessment\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.runecast.com\/log4shell-assessment&amp;source=gmail&amp;ust=1639648876047000&amp;usg=AOvVaw2CTe3SFHIkwtak13Hb0Q-X\">https:\/\/www.<wbr \/>runecast.com\/log4shell-<wbr \/>assessment<\/a>.<\/p>\n<p><img decoding=\"async\" title=\"signature\" src=\"https:\/\/nolabnoparty.com\/wp-content\/uploads\/images\/firma.jpg\" alt=\"signature\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Following the Log4J vulnerability, Runecast is offering a free Log4Shell vulnerability scan to check if the environment is affected by Log4J. Latest Runecast Analyzer version (6.0.1.0) has already implemented the CVE-2021-44228 that detects which VMware products are affected.<\/p>\n","protected":false},"author":3,"featured_media":51898,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rop_custom_images_group":[],"rop_custom_messages_group":[],"rop_publish_now":"initial","rop_publish_now_accounts":{"linkedin_93tdZWzMZc_93tdZWzMZc":"","facebook_2879994398731222_17841400390232720":"","twitter_113568041_113568041":"","mastodon_115463926174894442_115463926174894442":""},"rop_publish_now_history":[],"rop_publish_now_status":"pending","footnotes":""},"categories":[1729,903],"tags":[2424,2423,2425],"class_list":["post-51897","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-runecast-en","category-vmware-en","tag-log4j","tag-log4shell","tag-vulnerability","has_thumb"],"_links":{"self":[{"href":"https:\/\/nolabnoparty.com\/en\/wp-json\/wp\/v2\/posts\/51897","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nolabnoparty.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nolabnoparty.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nolabnoparty.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/nolabnoparty.com\/en\/wp-json\/wp\/v2\/comments?post=51897"}],"version-history":[{"count":0,"href":"https:\/\/nolabnoparty.com\/en\/wp-json\/wp\/v2\/posts\/51897\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nolabnoparty.com\/en\/wp-json\/wp\/v2\/media\/51898"}],"wp:attachment":[{"href":"https:\/\/nolabnoparty.com\/en\/wp-json\/wp\/v2\/media?parent=51897"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nolabnoparty.com\/en\/wp-json\/wp\/v2\/categories?post=51897"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nolabnoparty.com\/en\/wp-json\/wp\/v2\/tags?post=51897"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}