Log4Shell
0 sources
Log4Shell
Summary
Log4Shell is a vulnerability[1]. Log4Shell ranks in the top 4% of vulnerability entities by monthly Wikipedia readership (459 views/month).[2]
Key Facts
- Log4Shell is credited with the discovery of Alibaba Cloud[3].
- Log4Shell's instance of is recorded as vulnerability[4].
- Log4Shell's instance of is recorded as named vulnerability[5].
- operating system shell is named after Log4Shell[6].
- Log4j is named after Log4Shell[7].
- Log4Shell's time of discovery or invention is recorded as +2021-11-24T00:00:00Z[8].
- Log4Shell's official website is recorded as https://log4.sh/[9].
- Log4Shell's product or material produced is recorded as arbitrary code execution[10].
- Log4Shell's Stack Exchange tag is recorded as https://stackoverflow.com/tags/log4shell[11].
- Log4Shell's depends on software is recorded as Log4j[12].
- Log4Shell's uses is recorded as Lightweight Directory Access Protocol[13].
- Log4Shell's uses is recorded as Java Naming and Directory Interface[14].
- Log4Shell's hashtag is recorded as log4shell[15].
- Log4Shell's Common Vulnerabilities and Exposures ID is recorded as CVE-2021-44228[16].
- Log4Shell's announcement date is recorded as +2021-12-09T00:00:00Z[17].
Body
Works and Contributions
Log4Shell is credited with the discovery of Alibaba Cloud[3].
Why It Matters
Log4Shell ranks in the top 4% of vulnerability entities by monthly Wikipedia readership (459 views/month).[2] Log4Shell has Wikipedia articles in 15 language editions, a strong signal of global cultural recognition.[18] Log4Shell is known by 6 alternative names across languages and contexts.[19]