In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag: Apache(2 tweets) MySQL(4 tweets) Oracle(124 tweets) Weblogic(2 tweets)
List of frequently cited URLs
URL | Num of Times Referred to |
---|---|
https://alerts.vulmon.com/?utm_source=twitter&utm_medium=so... | 246 |
http://patrowl.io | 165 |
https://github.com/pimps/CVE-2017-5645 | 3 |
List of frequently cited URLs
URL | Num of Times Referred to |
---|---|
alerts.vulmon.com | 246 |
patrowl.io | 165 |
github.com | 3 |
Name | URL |
---|---|
pimps/CVE-2017-5645 | https://github.com/pimps/CVE-2017-5645 |
HynekPetrak/log4shell-finder | https://github.com/HynekPetrak/log4shell-finder |
Name | URL |
---|---|
pimps/CVE-2017-5645 | github.com |
HynekPetrak/log4shell-finder | github.com |