[
    {
        "id": 230129409,
        "name": "CVE-2019-17571",
        "full_name": "shadow-horse\/CVE-2019-17571",
        "owner": {
            "login": "shadow-horse",
            "id": 5432330,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5432330?v=4",
            "html_url": "https:\/\/github.com\/shadow-horse"
        },
        "html_url": "https:\/\/github.com\/shadow-horse\/CVE-2019-17571",
        "description": "Apache Log4j 1.2.X存在反序列化远程代码执行漏洞",
        "fork": false,
        "created_at": "2019-12-25T16:46:11Z",
        "updated_at": "2021-03-28T14:34:48Z",
        "pushed_at": "2019-12-25T16:48:41Z",
        "stargazers_count": 69,
        "watchers_count": 69,
        "forks_count": 3,
        "forks": 3,
        "watchers": 69,
        "score": 0
    },
    {
        "id": 280048798,
        "name": "CVE-2019-17571",
        "full_name": "Al1ex\/CVE-2019-17571",
        "owner": {
            "login": "Al1ex",
            "id": 38161463,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
            "html_url": "https:\/\/github.com\/Al1ex"
        },
        "html_url": "https:\/\/github.com\/Al1ex\/CVE-2019-17571",
        "description": "Environment for CVE_2019_17571",
        "fork": false,
        "created_at": "2020-07-16T04:01:40Z",
        "updated_at": "2021-05-11T07:38:51Z",
        "pushed_at": "2020-10-13T23:36:22Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "forks": 0,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 378106138,
        "name": "CVE-2019-17571",
        "full_name": "PwnCast\/CVE-2019-17571",
        "owner": {
            "login": "PwnCast",
            "id": 86027931,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86027931?v=4",
            "html_url": "https:\/\/github.com\/PwnCast"
        },
        "html_url": "https:\/\/github.com\/PwnCast\/CVE-2019-17571",
        "description": "PoC for exploiting CVE-2019-17571 : Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.",
        "fork": false,
        "created_at": "2021-06-18T09:53:33Z",
        "updated_at": "2021-06-18T09:53:41Z",
        "pushed_at": "2021-06-18T09:53:38Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "forks": 0,
        "watchers": 0,
        "score": 0
    }
]