Skip to content

This Pwsh script run AppScan Standard scans against a list of web sites (URLs.txt) checking for Log4J (CVE-2021-44228) vulnerability

Notifications You must be signed in to change notification settings

jrocia/Search-log4Jvuln-AppScanSTD

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 

Repository files navigation

Search log4J vuln using AppScan Standard and a list of websites

This Powershell script run AppScan Standard scans against a list of web sites (URLs.txt) checking just for Log4J (CVE-2021-44228) vulnerability.

Structure of project:
image

After run the script, it will read each line in URLs.txt and start scanning for Log4J (CVE-2021-44228) vulnerability.
image

After finish each scan, it will write in Log4J_Result_Analysis.txt the result.
image

Each scan file is in Scan folder and you can open it in AppScan Standard to see details about the vulnerability.
image

About

This Pwsh script run AppScan Standard scans against a list of web sites (URLs.txt) checking for Log4J (CVE-2021-44228) vulnerability

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published