Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-5645 PoC — Apache Log4j 代码问题漏洞

Source
Associated Vulnerability
Title:Apache Log4j 代码问题漏洞 (CVE-2017-5645)
Description:In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.
Description
CVE-2017-5645 - Apache Log4j RCE due Insecure Deserialization
Readme
# CVE-2017-5645
CVE-2017-5645 - Apache Log4j RCE due Insecure Deserialization
File Snapshot

[4.0K] /data/pocs/257b80d3577022db7ef50d3b01ccea57cd285c12 ├── [6.4K] log4j advisory.txt ├── [1.9M] Log4jSocketServer.jar ├── [ 78] README.md └── [2.1K] touch_payload.bin 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →