PoC-in-GitHub/2019/CVE-2019-17571.json

104 lines
3.4 KiB
JSON
Raw Normal View History

2020-08-06 05:08:30 +02:00
[
2021-12-19 13:13:54 +01:00
{
"id": 230129409,
"name": "CVE-2019-17571",
"full_name": "shadow-horse\/CVE-2019-17571",
"owner": {
"login": "shadow-horse",
"id": 5432330,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5432330?v=4",
"html_url": "https:\/\/github.com\/shadow-horse"
},
"html_url": "https:\/\/github.com\/shadow-horse\/CVE-2019-17571",
"description": "Apache Log4j 1.2.X存在反序列化远程代码执行漏洞",
"fork": false,
"created_at": "2019-12-25T16:46:11Z",
2022-01-13 13:15:45 +01:00
"updated_at": "2022-01-13T11:57:12Z",
2021-12-19 13:13:54 +01:00
"pushed_at": "2019-12-25T16:48:41Z",
2022-01-13 13:15:45 +01:00
"stargazers_count": 74,
"watchers_count": 74,
2022-01-13 01:14:02 +01:00
"forks_count": 6,
2021-12-19 13:13:54 +01:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-01-13 01:14:02 +01:00
"forks": 6,
2022-01-13 13:15:45 +01:00
"watchers": 74,
2021-12-19 13:13:54 +01:00
"score": 0
},
2021-05-11 11:11:30 +02:00
{
"id": 280048798,
"name": "CVE-2019-17571",
"full_name": "Al1ex\/CVE-2019-17571",
"owner": {
"login": "Al1ex",
"id": 38161463,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
"html_url": "https:\/\/github.com\/Al1ex"
},
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2019-17571",
"description": "Environment for CVE_2019_17571",
"fork": false,
"created_at": "2020-07-16T04:01:40Z",
2022-01-10 01:13:52 +01:00
"updated_at": "2022-01-09T23:44:06Z",
2021-05-11 11:11:30 +02:00
"pushed_at": "2020-10-13T23:36:22Z",
2022-01-10 01:13:52 +01:00
"stargazers_count": 2,
"watchers_count": 2,
2022-03-14 13:14:45 +01:00
"forks_count": 2,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [
"cve-2019-17571"
],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2022-03-14 13:14:45 +01:00
"forks": 2,
2022-01-10 01:13:52 +01:00
"watchers": 2,
2021-05-11 11:11:30 +02:00
"score": 0
2022-01-24 19:14:38 +01:00
},
{
"id": 438418716,
"name": "log4shell-finder",
"full_name": "HynekPetrak\/log4shell-finder",
"owner": {
"login": "HynekPetrak",
"id": 8593983,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8593983?v=4",
"html_url": "https:\/\/github.com\/HynekPetrak"
},
"html_url": "https:\/\/github.com\/HynekPetrak\/log4shell-finder",
"description": "Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-23305, CVE-2022-23307 ... ) instances of log4j library. Excellent performance and low memory footprint.",
"fork": false,
"created_at": "2021-12-14T22:27:14Z",
2022-02-27 07:14:11 +01:00
"updated_at": "2022-02-27T02:30:08Z",
2022-02-23 07:16:12 +01:00
"pushed_at": "2022-02-23T00:44:17Z",
2022-02-27 07:14:11 +01:00
"stargazers_count": 20,
"watchers_count": 20,
2022-02-05 13:13:55 +01:00
"forks_count": 8,
2022-01-24 19:14:38 +01:00
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2017-5645",
"cve-2019-17571",
"cve-2020-9488",
"cve-2021-4104",
"cve-2021-42550",
"cve-2021-44228",
"cve-2021-44832",
"cve-2021-45046",
"cve-2021-45105",
"cve-2022-23302",
"cve-2022-23305",
"cve-2022-23307",
"log4j",
"log4j2",
"log4shell",
"scanner",
"security",
"vulnerability"
],
"visibility": "public",
2022-02-05 13:13:55 +01:00
"forks": 8,
2022-02-27 07:14:11 +01:00
"watchers": 20,
2022-01-24 19:14:38 +01:00
"score": 0
2020-08-06 05:08:30 +02:00
}
]