News

Unfortunately, this kind of code can be used for more than just formatting log messages. Log4j allows third-party servers to submit software code that can perform all kinds of actions on the ...
Earlier this month, cybersecurity experts found that by asking Log4j to log a line of malicious code, Log4j executes that code in the process. This gives bad actors access to controlling servers that ...
However, an additional 3.8% use a version of Log4j 2.x vulnerable to another high-severity issue tracked as CVE-2021-44832 and a third of all applications that include Log4j continue to use the ...
Checking every occurrence of programming code that uses the name “log” to see if it’s affected by Log4j seems an obvious task for an AI, but not necessarily to do the search and replace.