Log4Shell

2021 software security vulnerability
Event vulnerability Q110068433
Press Enter · cited answer in seconds

Log4Shell

Summary

Log4Shell is a vulnerability[1]. Log4Shell ranks in the top 4% of vulnerability entities by monthly Wikipedia readership (459 views/month).[2]

Key Facts

  • Log4Shell is credited with the discovery of Alibaba Cloud[3].
  • Log4Shell's instance of is recorded as vulnerability[4].
  • Log4Shell's instance of is recorded as named vulnerability[5].
  • operating system shell is named after Log4Shell[6].
  • Log4j is named after Log4Shell[7].
  • Log4Shell's time of discovery or invention is recorded as +2021-11-24T00:00:00Z[8].
  • Log4Shell's official website is recorded as https://log4.sh/[9].
  • Log4Shell's product or material produced is recorded as arbitrary code execution[10].
  • Log4Shell's Stack Exchange tag is recorded as https://stackoverflow.com/tags/log4shell[11].
  • Log4Shell's depends on software is recorded as Log4j[12].
  • Log4Shell's uses is recorded as Lightweight Directory Access Protocol[13].
  • Log4Shell's uses is recorded as Java Naming and Directory Interface[14].
  • Log4Shell's hashtag is recorded as log4shell[15].
  • Log4Shell's Common Vulnerabilities and Exposures ID is recorded as CVE-2021-44228[16].
  • Log4Shell's announcement date is recorded as +2021-12-09T00:00:00Z[17].

Body

Works and Contributions

Log4Shell is credited with the discovery of Alibaba Cloud[3].

Why It Matters

Log4Shell ranks in the top 4% of vulnerability entities by monthly Wikipedia readership (459 views/month).[2] Log4Shell has Wikipedia articles in 15 language editions, a strong signal of global cultural recognition.[18] Log4Shell is known by 6 alternative names across languages and contexts.[19]

References

Programmatic citations — every numbered marker resolves to a verifiable graph row below.

Direct Wikidata claims

  1. [4] . wikidata.org.
  2. [5] . wikidata.org.
  3. [3] . wikidata.org.
  4. [6] . wikidata.org.
  5. [7] . wikidata.org.
  6. [8] . wikidata.org.
  7. [9] . wikidata.org.
  8. [10] . wikidata.org.
  9. [11] . wikidata.org.
  10. [12] . wikidata.org.
  11. [13] . lunasec.io. Retrieved . lunasec.io. Provenance: wikidata.org.
  12. [14] . lunasec.io. Retrieved . lunasec.io. Provenance: wikidata.org.
  13. [15] . wikidata.org.
  14. [16] . wikidata.org.
  15. [17] . Wired. wired.com. Provenance: wikidata.org.

Class ancestry

  1. [1] . Wikidata. wikidata.org.

Aggregate / graph-position facts

  1. [2] . Wikimedia Foundation. dumps.wikimedia.org.
  2. [18] . Wikidata sitelinks. wikidata.org.
  3. [19] . Wikidata aliases. wikidata.org.

📑 Cite this page

Use these citations when quoting this entity in research, articles, AI prompts, or wherever provenance matters. We aggregate Wikidata + Wikipedia + authoritative open-data sources; the stitched, scored, cross-referenced view is what 4ort.xyz contributes.

APA 4ort.xyz Knowledge Graph. (2026). Log4Shell. Retrieved May 3, 2026, from https://4ort.xyz/entity/log4shell
MLA “Log4Shell.” 4ort.xyz Knowledge Graph, 4ort.xyz, 3 May. 2026, https://4ort.xyz/entity/log4shell.
BibTeX @misc{4ortxyz_log4shell_2026, author = {{4ort.xyz Knowledge Graph}}, title = {{Log4Shell}}, year = {2026}, url = {https://4ort.xyz/entity/log4shell}, note = {Accessed: 2026-05-03}}
LLM prompt According to 4ort.xyz Knowledge Graph (aggregator of Wikidata, Wikipedia, and authoritative open-data sources): Log4Shell — https://4ort.xyz/entity/log4shell (retrieved 2026-05-03)

Canonical URL: https://4ort.xyz/entity/log4shell · Last refreshed: