Summary
Part I. Overview
Part II. Cause of Vulnerabilities
Part III. Methods and Types of Exploitation
Part IV. Major Issues
Part V. Security Personnel Efforts
Part VI. Expert’s Contribution
* Appendix
1. Log4j Vulnerability Scanner Distribution Websites
2. Java Naming and Directory Interface (JNDI)
3. Reference Websites for Response to Vulnerabilities
4. Software Vulnerable to Log4Shell
The original post is at:
https://www.boho.or.kr/data/reportView.do?bulletin_writing_sequence=36476
Part I. Overview
Part II. Cause of Vulnerabilities
Part III. Methods and Types of Exploitation
Part IV. Major Issues
Part V. Security Personnel Efforts
Part VI. Expert’s Contribution
* Appendix
1. Log4j Vulnerability Scanner Distribution Websites
2. Java Naming and Directory Interface (JNDI)
3. Reference Websites for Response to Vulnerabilities
4. Software Vulnerable to Log4Shell
The original post is at:
https://www.boho.or.kr/data/reportView.do?bulletin_writing_sequence=36476