About 1,070 results
Open links in new tab
  1. Log4Shell - Wikipedia

    Most notably, the "log4j-api" package was marked as vulnerable, while in reality further research showed that only the main "log4j-core" package was vulnerable.

    Missing:
    • hack
    Must include:
  2. What is the Log4j vulnerability? - IBM

    What is the Log4j vulnerability? The Log4j vulnerability, also known as Log4Shell, is a critical vulnerability discovered in the Apache Log4j logging library in November 2021. Log4Shell …

  3. Log4j Vulnerability: What It Is and How to Fix It | Built In

    Feb 18, 2025 · The Log4j vulnerability is a software vulnerability in some versions of the Apache Log4j framework. Here's what to know about it and how to fix it.

  4. A Log4J Vulnerability Has Set the Internet 'On Fire' | WIRED

    Dec 10, 2021 · All an attacker has to do to exploit the flaw is strategically send a malicious code string that eventually gets logged by Log4j version 2.0 or higher. The exploit lets an attacker …

  5. Log4j: How to Exploit this Critical Vulnerability on Pentests

    In this article Raxis, a top tier provider in cybersecurity penetration testing, demonstrates how a remote shell can be obtained on a target system using a Log4j open source exploit that is …

  6. Log4Shell: The Log4j Vulnerability Emergency Clearly Explained

    Nov 26, 2025 · A concise overview of the Apache Log4j vulnerability, its implications, and how to secure your sensitive data against its exploitation.

  7. The Apache Log4j vulnerabilities: A timeline - CSO Online

    Jan 7, 2022 · The Apache Log4j vulnerability has impacted organizations around the globe. Here is a timeline of the key events surrounding the Log4j exploit as they have unfolded.

  8. What is the Log4j/Log4Shell Vulnerability | CrowdStrike

    Log4Shell is a critical zero-day vulnerability (CVE-2021-44228) in Log4j that was uncovered in December 2021. It allows attackers to execute arbitrary code remotely on affected systems.

  9. Log4j Vulnerability Guide: Detection and Remediation | Contrast

    Nov 7, 2025 · This guide explains what Log4j is, how attackers exploit it, why traditional tools failed, and how to protect your applications with modern security approaches.

  10. Log4j Vulnerability Cheat Sheet: Detection, Exploitation, And ...

    The Log4j vulnerability (CVE-2021-44228) shook the cybersecurity world due to its widespread impact on Java-based applications. This remote code execution (RCE) flaw allows attackers to …