Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache Log4j | Apache Log4j2 ~ 2.16.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Windows Server Log4j Scanner - Powershell - CVE-2021-45046 and CVE-2021-44228 | https://github.com/X1pe0/Log4J-Scan-Win | POC Details |
| 2 | Log4j 2.15.0 Privilege Escalation -- CVE-2021-45046 | https://github.com/cckuailong/Log4j_CVE-2021-45046 | POC Details |
| 3 | Oh no another one | https://github.com/BobTheShoplifter/CVE-2021-45046-Info | POC Details |
| 4 | Replicating CVE-2021-45046 | https://github.com/tejas-nagchandi/CVE-2021-45046 | POC Details |
| 5 | None | https://github.com/pravin-pp/log4j2-CVE-2021-45046 | POC Details |
| 6 | Public testing data. Samples of log4j library versions to help log4j scanners / detectors improve their accuracy for detecting CVE-2021-45046 and CVE-2021-44228. TAG_TESTING, OWNER_KEN, DC_PUBLIC | https://github.com/mergebase/log4j-samples | POC Details |
| 7 | A simple script to remove Log4J JndiLookup.class from jars in a given directory, to temporarily protect from CVE-2021-45046 and CVE-2021-44228. | https://github.com/lukepasek/log4jjndilookupremove | POC Details |
| 8 | None | https://github.com/ludy-dev/cve-2021-45046 | POC Details |
| 9 | Log4j 漏洞本地检测脚本。 Scan all java processes on your host to check whether it's affected by log4j2 remote code execution vulnerability (CVE-2021-45046) | https://github.com/lijiejie/log4j2_vul_local_scanner | POC Details |
| 10 | Log4Shell(CVE-2021-45046) Sandbox Signature | https://github.com/CaptanMoss/Log4Shell-Sandbox-Signature | POC Details |
| 11 | None | https://github.com/shaily29-eng/CyberSecurity_CVE-2021-45046 | POC Details |
| 12 | Apache Log4j2 Thread Context Lookup Pattern is vulnerable to remote code execution in certain non-default configurations. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-45046.yaml | POC Details |
| 13 | Apache Log4j2 Thread Context Lookup Pattern is vulnerable to remote code execution in certain non-default configurations. | https://github.com/projectdiscovery/nuclei-templates/blob/main/dast/cves/2021/CVE-2021-45046.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2021-4104 | Deserialization of untrusted data in JMSAppender in Apache Log4j 1.2 | |
| CVE-2021-44549 | SMTPS server hostname not checked when making TLS connection to SMTPS server |
No comments yet