Adversaries may attempt to take advantage of a weakness in an Internet-facing computer or program using software, data, or commands.
The Log4Shell vulnerability (CVE-2021-44228) was widely exploited to gain initial access to servers running vulnerable versions of Log4j.