Featured

Cryptocurrency mining code exploited dangerous Log4j vulnerability CVE-2021-44228



Published
Vulnerability CVE-2021-44228 allows remote code execution without authentication for several versions of Apache Log4j2 (Log4Shell). Attackers can exploit vulnerable servers by connecting over any protocol, such as HTTPS, and sending a specially crafted string.

Link to articles: https://cryptodeeptech.ru/log4j-vulnerability

This video was created for the CRYPTO DEEP TECH portal to ensure the financial security of data and secp256k1 elliptic curve cryptography against weak ECDSA signatures in the BITCOIN cryptocurrency

The creators of the software are not responsible for the use of materials

Telegram: https://t.me/cryptodeeptech

Donation Address:
♥ BTC: 1Lw2gTnMpxRUNBU85Hg4ruTwnpUPKdf3nV
♥ ETH: 0xaBd66CF90898517573f19184b3297d651f7b90bf

#Биткоин #Bitcoin #PrivateKey
Category
Cryptocurrency Mining
Be the first to comment