Get a demo
Get a demo
Product
Overview
Features
Why Invicti?
Solutions
INDUSTRIES
IT & Telecom
Government
Financial
Education
Healthcare
ROLES
CTO & CISO
Engineering Manager
Security Engineer
DevSecOps
Comparison
Case studies
Customers
Testimonials
Pricing
About Us
Our Story
In the news
Careers
Contact us
Resources
Blog
White Papers
Webinars
Resource Library
Partners
Support
Home
Support
Issues
FAQ
FAQ
Contact Support
OPEN A TICKET
FAQ
Log4J FAQ
Q: How do I ensure my Java application is not vulnerable to Log4Shell?
Q: What is the fastest way for Invicti to scan for vulnerable Log4j implementations?
Q: Do Invicti products detect Log4Shell?
Q: How do Invicti products detect Log4j?
Q: How can I tell Invicti DAST probing attempts from an actual attack?
Q: Do Invicti products use Log4j?
Q: How do I ensure my Invicti products do not call a vulnerable version of Log4j?
Q: Does Invicti scan for Log4j CVE-2021-44832?
How Does Invicti Licensing Work?
CONTACT SUPPORT
OPEN A TICKET
TOP ARTICLES
What is Invicti?
Overview of Scan Policies
Scheduling Scans
Managing Integrations
Built-In Reports
CATEGORIES
Getting Started
Your Account
Settings
Scans
Issues
Notifications
Integrations
Reports
Team Management
Highly accurate, fast & easy-to-use Web Application Security Scanner
Get a demo
By using this website you agree with our use of cookies to improve its performance and enhance your experience. More information in our
Privacy Policy
.
OK