mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
48 lines
No EOL
1.8 KiB
JSON
48 lines
No EOL
1.8 KiB
JSON
[
|
|
{
|
|
"id": 280048798,
|
|
"name": "CVE-2019-17571",
|
|
"full_name": "Al1ex\/CVE-2019-17571",
|
|
"owner": {
|
|
"login": "Al1ex",
|
|
"id": 38161463,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
|
|
"html_url": "https:\/\/github.com\/Al1ex"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2019-17571",
|
|
"description": "Environment for CVE_2019_17571",
|
|
"fork": false,
|
|
"created_at": "2020-07-16T04:01:40Z",
|
|
"updated_at": "2021-05-11T07:38:51Z",
|
|
"pushed_at": "2020-10-13T23:36:22Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 378106138,
|
|
"name": "CVE-2019-17571",
|
|
"full_name": "PwnCast\/CVE-2019-17571",
|
|
"owner": {
|
|
"login": "PwnCast",
|
|
"id": 86027931,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86027931?v=4",
|
|
"html_url": "https:\/\/github.com\/PwnCast"
|
|
},
|
|
"html_url": "https:\/\/github.com\/PwnCast\/CVE-2019-17571",
|
|
"description": "PoC for exploiting CVE-2019-17571 : Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.",
|
|
"fork": false,
|
|
"created_at": "2021-06-18T09:53:33Z",
|
|
"updated_at": "2021-06-18T09:53:41Z",
|
|
"pushed_at": "2021-06-18T09:53:38Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
}
|
|
] |