


These include: 1: Data from the User gets sent to the server (via any protocol). This vulnerability affects millions of users and exploitation proof-of-concept code exists via LunaSec explains how to exploit it in five simple steps. Cisco Talos has observed malicious activity related to CVE-2021-44228 beginning on December 2, 2021. The Apache Software Foundation (ASF) rates the vulnerability as a 10 on the common vulnerability scoring system (CVSS) scale. Countless Servers Are Vulnerable to Apache Log4j Zero-Day ExploitĪ critical vulnerability, registered as CVE-2021-44228, has been identified in Apache Log4j 2, which is an open source Java package used to enable logging in.
