{"version":"1.0","provider_name":"Evolphin Documentation","provider_url":"https:\/\/evolphin.com\/help","author_name":"Pedro Rodriguez","author_url":"https:\/\/evolphin.com\/help\/author\/pedro\/","title":"Evolphin Response to CVE-2021-44228 (Log4j) - Evolphin Documentation","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"uNEUUdTyXk\"><a href=\"https:\/\/evolphin.com\/help\/administration-server\/security\/evolphin-response-to-cve-2021-44228-log4j\/\">Evolphin Response to CVE-2021-44228 (Log4j)<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/evolphin.com\/help\/administration-server\/security\/evolphin-response-to-cve-2021-44228-log4j\/embed\/#?secret=uNEUUdTyXk\" width=\"600\" height=\"338\" title=\"&#8220;Evolphin Response to CVE-2021-44228 (Log4j)&#8221; &#8212; Evolphin Documentation\" data-secret=\"uNEUUdTyXk\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/evolphin.com\/help\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"At Evolphin, our engineering team has conducted preliminary investigations and have concluded that this vulnerability does not DIRECTLY affect our flagship product Zoom. However, like many other software products, Zoom uses several third-party software like Jetty, Solr etc. which use Log4j internally, and may have exposure to this vulnerability. Therefore as a matter of caution, [&hellip;]"}