Challenge: Update B4 It's 2Late

Course Content
Update to mitigate!
>In this NCAM weekly challenge, you will analyze a web server log reviewing an exploitation attempt. This challenge aims to look beyond the basics of simply updating software by focusing on how stealthy an exploit can be and how it can slip through the cracks when software is not updated. It is common knowledge to patch your systems, products, and devices, but let’s see why it is essential to adhere to them!1. What is the name of the web application in the logs? 2. What is the name of the vulnerable page? 3. What is the CVE associated with this vulnerability? 4. Is this attack authenticated or unauthenticated?
