2024-06-26 08:47:13 +02:00
[
{
"id" : 438510625 ,
"name" : "Log4j_CVE-2021-45046" ,
"full_name" : "cckuailong\/Log4j_CVE-2021-45046" ,
"owner" : {
"login" : "cckuailong" ,
"id" : 10824150 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/10824150?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/cckuailong" ,
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
"html_url" : "https:\/\/github.com\/cckuailong\/Log4j_CVE-2021-45046" ,
"description" : "Log4j 2.15.0 Privilege Escalation -- CVE-2021-45046" ,
"fork" : false ,
"created_at" : "2021-12-15T05:48:53Z" ,
2024-07-12 08:29:16 +02:00
"updated_at" : "2024-07-12T01:46:39Z" ,
2024-06-26 08:47:13 +02:00
"pushed_at" : "2021-12-23T10:57:19Z" ,
2024-07-12 08:29:16 +02:00
"stargazers_count" : 20 ,
"watchers_count" : 20 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
"forks_count" : 7 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 7 ,
2024-07-12 08:29:16 +02:00
"watchers" : 20 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 438561965 ,
"name" : "CVE-2021-45046-Info" ,
"full_name" : "BobTheShoplifter\/CVE-2021-45046-Info" ,
"owner" : {
"login" : "BobTheShoplifter" ,
"id" : 22559547 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/22559547?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/BobTheShoplifter" ,
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
"html_url" : "https:\/\/github.com\/BobTheShoplifter\/CVE-2021-45046-Info" ,
"description" : "Oh no another one" ,
"fork" : false ,
"created_at" : "2021-12-15T09:01:37Z" ,
2024-08-13 02:29:46 +02:00
"updated_at" : "2024-08-12T20:18:55Z" ,
2024-06-26 08:47:13 +02:00
"pushed_at" : "2022-04-07T19:07:20Z" ,
2024-08-13 02:29:46 +02:00
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 3 ,
2024-08-13 02:29:46 +02:00
"watchers" : 4 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 438697866 ,
"name" : "CVE-2021-45046" ,
"full_name" : "tejas-nagchandi\/CVE-2021-45046" ,
"owner" : {
"login" : "tejas-nagchandi" ,
"id" : 76960497 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/76960497?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/tejas-nagchandi" ,
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
"html_url" : "https:\/\/github.com\/tejas-nagchandi\/CVE-2021-45046" ,
"description" : "Replicating CVE-2021-45046" ,
"fork" : false ,
"created_at" : "2021-12-15T16:28:11Z" ,
"updated_at" : "2021-12-16T07:17:16Z" ,
"pushed_at" : "2021-12-16T07:13:00Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-45046" ,
"log4j2"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 438746535 ,
"name" : "log4j2-CVE-2021-45046" ,
"full_name" : "pravin-pp\/log4j2-CVE-2021-45046" ,
"owner" : {
"login" : "pravin-pp" ,
"id" : 12995541 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/12995541?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/pravin-pp" ,
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
"html_url" : "https:\/\/github.com\/pravin-pp\/log4j2-CVE-2021-45046" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-15T19:19:52Z" ,
"updated_at" : "2021-12-15T19:42:14Z" ,
"pushed_at" : "2021-12-15T19:42:12Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 439085356 ,
"name" : "log4j-samples" ,
"full_name" : "mergebase\/log4j-samples" ,
"owner" : {
"login" : "mergebase" ,
"id" : 73667397 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/73667397?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/mergebase" ,
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
"html_url" : "https:\/\/github.com\/mergebase\/log4j-samples" ,
"description" : "Public testing data. Samples of log4j library versions to help log4j scanners \/ detectors improve their accuracy for detecting CVE-2021-45046 and CVE-2021-44228. TAG_TESTING, OWNER_KEN, DC_PUBLIC" ,
"fork" : false ,
"created_at" : "2021-12-16T18:12:29Z" ,
"updated_at" : "2023-09-11T19:22:43Z" ,
"pushed_at" : "2021-12-30T05:15:54Z" ,
"stargazers_count" : 14 ,
"watchers_count" : 14 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2021-44228" ,
"cve-2021-45046" ,
"log4j"
] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 14 ,
"score" : 0 ,
"subscribers_count" : 6
} ,
{
"id" : 439433330 ,
"name" : "log4jjndilookupremove" ,
"full_name" : "lukepasek\/log4jjndilookupremove" ,
"owner" : {
"login" : "lukepasek" ,
"id" : 6756387 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/6756387?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/lukepasek" ,
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
"html_url" : "https:\/\/github.com\/lukepasek\/log4jjndilookupremove" ,
"description" : "A simple script to remove Log4J JndiLookup.class from jars in a given directory, to temporarily protect from CVE-2021-45046 and CVE-2021-44228." ,
"fork" : false ,
"created_at" : "2021-12-17T18:59:16Z" ,
"updated_at" : "2022-01-04T14:24:23Z" ,
"pushed_at" : "2022-01-04T14:24:19Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 439600548 ,
"name" : "cve-2021-45046" ,
"full_name" : "ludy-dev\/cve-2021-45046" ,
"owner" : {
"login" : "ludy-dev" ,
"id" : 70466565 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/70466565?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/ludy-dev" ,
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
"html_url" : "https:\/\/github.com\/ludy-dev\/cve-2021-45046" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-12-18T11:43:56Z" ,
"updated_at" : "2024-04-12T17:17:07Z" ,
"pushed_at" : "2021-12-18T11:53:12Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 440156597 ,
"name" : "log4j2_vul_local_scanner" ,
"full_name" : "lijiejie\/log4j2_vul_local_scanner" ,
"owner" : {
"login" : "lijiejie" ,
"id" : 3167953 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3167953?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/lijiejie" ,
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
"html_url" : "https:\/\/github.com\/lijiejie\/log4j2_vul_local_scanner" ,
"description" : "Log4j 漏洞本地检测脚本。 Scan all java processes on your host to check whether it's affected by log4j2 remote code execution vulnerability (CVE-2021-45046)" ,
"fork" : false ,
"created_at" : "2021-12-20T12:07:41Z" ,
2024-08-13 02:29:46 +02:00
"updated_at" : "2024-08-12T20:19:04Z" ,
2024-06-26 08:47:13 +02:00
"pushed_at" : "2021-12-22T06:24:42Z" ,
2024-08-13 02:29:46 +02:00
"stargazers_count" : 85 ,
"watchers_count" : 85 ,
2024-06-26 08:47:13 +02:00
"has_discussions" : false ,
"forks_count" : 12 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 12 ,
2024-08-13 02:29:46 +02:00
"watchers" : 85 ,
2024-06-26 08:47:13 +02:00
"score" : 0 ,
"subscribers_count" : 6
} ,
{
"id" : 441418197 ,
"name" : "Log4Shell-Sandbox-Signature" ,
"full_name" : "CaptanMoss\/Log4Shell-Sandbox-Signature" ,
"owner" : {
"login" : "CaptanMoss" ,
"id" : 10811344 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/10811344?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/CaptanMoss" ,
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
"html_url" : "https:\/\/github.com\/CaptanMoss\/Log4Shell-Sandbox-Signature" ,
"description" : "Log4Shell(CVE-2021-45046) Sandbox Signature" ,
"fork" : false ,
"created_at" : "2021-12-24T09:02:55Z" ,
"updated_at" : "2021-12-26T19:51:57Z" ,
"pushed_at" : "2021-12-26T19:51:55Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 798066923 ,
"name" : "CyberSecurity_CVE-2021-45046" ,
"full_name" : "shaily29-eng\/CyberSecurity_CVE-2021-45046" ,
"owner" : {
"login" : "shaily29-eng" ,
"id" : 59019087 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/59019087?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/shaily29-eng" ,
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
"html_url" : "https:\/\/github.com\/shaily29-eng\/CyberSecurity_CVE-2021-45046" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-05-09T03:04:17Z" ,
"updated_at" : "2024-05-21T23:30:09Z" ,
"pushed_at" : "2024-05-21T23:30:06Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
}
]