PoC-in-GitHub/2019/CVE-2019-17571.json
2021-06-19 12:12:20 +09:00

48 lines
No EOL
1.8 KiB
JSON

[
{
"id": 280048798,
"name": "CVE-2019-17571",
"full_name": "Al1ex\/CVE-2019-17571",
"owner": {
"login": "Al1ex",
"id": 38161463,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
"html_url": "https:\/\/github.com\/Al1ex"
},
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2019-17571",
"description": "Environment for CVE_2019_17571",
"fork": false,
"created_at": "2020-07-16T04:01:40Z",
"updated_at": "2021-05-11T07:38:51Z",
"pushed_at": "2020-10-13T23:36:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 378106138,
"name": "CVE-2019-17571",
"full_name": "PwnCast\/CVE-2019-17571",
"owner": {
"login": "PwnCast",
"id": 86027931,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86027931?v=4",
"html_url": "https:\/\/github.com\/PwnCast"
},
"html_url": "https:\/\/github.com\/PwnCast\/CVE-2019-17571",
"description": "PoC for exploiting CVE-2019-17571 : Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.",
"fork": false,
"created_at": "2021-06-18T09:53:33Z",
"updated_at": "2021-06-18T09:53:41Z",
"pushed_at": "2021-06-18T09:53:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]