Log4Shell in a nutshell ➟ An attacker is able to conduct a completely unauthenticated Remote Code Execution on a publicly-exposed service. ➟ If a JVM-based service (Java, Scala, etc.) is using the log4j logging library (very popular), the service is vulnerable….

➤ Read More: https://chasersystems.com/discrimiNAT/blog/log4shell-and-its-traces-in-a-network-egress-filter/

Go to Source of this post
Author Of this post:

By admin