An application is impacted by these vulnerabilities if it consumes untrusted user input and passes this to a vulnerable version of the Log4j logging library.
確定! 回上一頁