Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache Log4j 1.x | 1.2.1 ~ unspecified | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-23305, CVE-2022-23307 ... ) instances of log4j library. Excellent performance and low memory footprint. | https://github.com/HynekPetrak/log4shell-finder | POC Details |
| 2 | test 反向辣鸡数据投放 CVE-2022-23305 工具 利用 教程 Exploit POC | https://github.com/AlphabugX/CVE-2022-RCE | POC Details |
| 3 | CVE-2022-23305 Log4J JDBCAppender SQl injection POC | https://github.com/tkomlodi/CVE-2022-23305_POC | POC Details |
No public POC found.
Login to generate AI POC| CVE-2022-23302 | Deserialization of untrusted data in JMSSink in Apache Log4j 1.x | |
| CVE-2022-23307 | A deserialization flaw in the Chainsaw component of Log4j 1 can lead to malicious code exe |
No comments yet