Simple proof of concept of Log4Shell vulnerability in a spring boot vulnerable application environment.
-
Updated
May 12, 2025 - Java
The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. The United States’ National Cybersecurity FFRDC, operated by The Mitre Corporation, maintains the system, with funding from the US National Cyber Security Division of the US Department of Homeland Security
Simple proof of concept of Log4Shell vulnerability in a spring boot vulnerable application environment.
Analysis of the Jackson Databind CVE's
VulDB Java code to fetch data via API
Arbitrary file read in BlueStacks
SIEGE is an automated test case generator targeting any method in the classpath
Analysis of vulnerabilities from security audit | CVEs
🚀 Free vulnerability scanner for Maven projects. Detect CVEs, track security trends, and generate comprehensive reports. Built on OWASP Dependency-Check with enterprise-grade performance.
This repository contains a backend using Spring Boot, JPA, and H2 to manage and display over 10,000 CVE records. It fetches CVE data from a public source, stores it in H2, and provides custom endpoints with filtering by year, metric score, and last modified date. Built with MVC architecture for structured data handling and web page integration.
Security Research and PoC
Allows importing of CVE Data from NVD into PostgreSQL. By taking in JSON data and converting it to a more usable relational dataset