RE: Log4Shell 0-day exploit

An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.

Active scanners looking for this vulnerability

Inbound requests attempting the exploit

No impact on UX Forms

Want to know more?

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store