{"uuid": "2028ec6e-4912-4e43-bd19-3f49d5a1a2bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/cKure/8406", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 OWASP ZAP Zero-Day due to Log4Shell.\n\nA vulnerability has been found in Log4j which can result in Remote Code Execution (RCE):\u00a0CVE-2021-44228\u00a0also known as\u00a0Log4Shell.\nZAP 2.11.0 and the previous weekly and dev versions of ZAP use Log4j 2.14.1 which is known to be vulnerable.\n\nhttps://www.zaproxy.org/blog/2021-12-10-zap-and-log4shell/", "creation_timestamp": "2021-12-11T19:11:35.000000Z"}