As such, using log4j 2.x, even via SLF4J does not mitigate the vulnerability. ... input is injected via "log message data" versus a "configuration file".
確定! 回上一頁