Log4j Remote Code Execution Word Bypassing

Log4j remote code execution exploit with a trick to bypass words blocking patches. Works on Log4j versions 2.14.1 and below.


MD5 | e9d14cbb1c1d1f75fc833cb2df4a3d44


Related Posts