diff --git a/2015/CVE-2015-1140.json b/2015/CVE-2015-1140.json index f913e7bb7d..8b2b0a2424 100644 --- a/2015/CVE-2015-1140.json +++ b/2015/CVE-2015-1140.json @@ -17,12 +17,12 @@ "pushed_at": "2015-03-20T15:57:00Z", "stargazers_count": 64, "watchers_count": 64, - "forks_count": 27, + "forks_count": 28, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 27, + "forks": 28, "watchers": 64, "score": 0 } diff --git a/2015/CVE-2015-6639.json b/2015/CVE-2015-6639.json index e6d4189ab8..8a53ed58f9 100644 --- a/2015/CVE-2015-6639.json +++ b/2015/CVE-2015-6639.json @@ -40,17 +40,17 @@ "description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431", "fork": false, "created_at": "2016-06-30T11:56:44Z", - "updated_at": "2022-01-05T02:27:08Z", + "updated_at": "2022-01-13T14:51:37Z", "pushed_at": "2016-06-30T15:32:42Z", - "stargazers_count": 313, - "watchers_count": 313, + "stargazers_count": 314, + "watchers_count": 314, "forks_count": 102, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 102, - "watchers": 313, + "watchers": 314, "score": 0 } ] \ No newline at end of file diff --git a/2016/CVE-2016-2431.json b/2016/CVE-2016-2431.json index d935b998d4..4a89739993 100644 --- a/2016/CVE-2016-2431.json +++ b/2016/CVE-2016-2431.json @@ -40,17 +40,17 @@ "description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431", "fork": false, "created_at": "2016-06-30T11:56:44Z", - "updated_at": "2022-01-05T02:27:08Z", + "updated_at": "2022-01-13T14:51:37Z", "pushed_at": "2016-06-30T15:32:42Z", - "stargazers_count": 313, - "watchers_count": 313, + "stargazers_count": 314, + "watchers_count": 314, "forks_count": 102, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 102, - "watchers": 313, + "watchers": 314, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-14847.json b/2018/CVE-2018-14847.json index 4fa0e9b872..a85c1587b2 100644 --- a/2018/CVE-2018-14847.json +++ b/2018/CVE-2018-14847.json @@ -17,12 +17,12 @@ "pushed_at": "2020-10-16T12:09:45Z", "stargazers_count": 458, "watchers_count": 458, - "forks_count": 442, + "forks_count": 443, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 442, + "forks": 443, "watchers": 458, "score": 0 }, diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index b5cc60978d..8b3d3cc207 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -2861,17 +2861,17 @@ "description": "CVE-2019-0708 (BlueKeep)", "fork": false, "created_at": "2019-12-07T10:13:11Z", - "updated_at": "2021-11-24T05:37:17Z", + "updated_at": "2022-01-13T14:07:02Z", "pushed_at": "2020-07-07T15:28:13Z", - "stargazers_count": 94, - "watchers_count": 94, + "stargazers_count": 95, + "watchers_count": 95, "forks_count": 17, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 17, - "watchers": 94, + "watchers": 95, "score": 0 }, { diff --git a/2019/CVE-2019-12586.json b/2019/CVE-2019-12586.json index 1b4beb3dad..977d0b57e1 100644 --- a/2019/CVE-2019-12586.json +++ b/2019/CVE-2019-12586.json @@ -13,10 +13,10 @@ "description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)", "fork": false, "created_at": "2019-09-03T15:08:49Z", - "updated_at": "2022-01-13T11:20:40Z", + "updated_at": "2022-01-13T17:40:12Z", "pushed_at": "2019-09-08T06:09:11Z", - "stargazers_count": 718, - "watchers_count": 718, + "stargazers_count": 719, + "watchers_count": 719, "forks_count": 62, "allow_forking": true, "is_template": false, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 62, - "watchers": 718, + "watchers": 719, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-13272.json b/2019/CVE-2019-13272.json index 80d37a1351..618a78be48 100644 --- a/2019/CVE-2019-13272.json +++ b/2019/CVE-2019-13272.json @@ -13,17 +13,17 @@ "description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root", "fork": false, "created_at": "2019-07-31T04:51:43Z", - "updated_at": "2021-12-27T21:09:27Z", + "updated_at": "2022-01-13T15:55:13Z", "pushed_at": "2019-08-01T16:02:59Z", - "stargazers_count": 269, - "watchers_count": 269, + "stargazers_count": 270, + "watchers_count": 270, "forks_count": 104, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 104, - "watchers": 269, + "watchers": 270, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 765910f505..b8a8ef835f 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -44,7 +44,7 @@ "pushed_at": "2021-04-04T09:13:57Z", "stargazers_count": 3096, "watchers_count": 3096, - "forks_count": 918, + "forks_count": 919, "allow_forking": true, "is_template": false, "topics": [ @@ -69,7 +69,7 @@ "webshell" ], "visibility": "public", - "forks": 918, + "forks": 919, "watchers": 3096, "score": 0 }, diff --git a/2019/CVE-2019-18935.json b/2019/CVE-2019-18935.json index 4d20c1cc46..fb238246f8 100644 --- a/2019/CVE-2019-18935.json +++ b/2019/CVE-2019-18935.json @@ -40,17 +40,17 @@ "description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.", "fork": false, "created_at": "2019-12-12T07:58:11Z", - "updated_at": "2022-01-02T12:09:40Z", + "updated_at": "2022-01-13T15:37:37Z", "pushed_at": "2021-11-10T21:19:47Z", - "stargazers_count": 228, - "watchers_count": 228, + "stargazers_count": 227, + "watchers_count": 227, "forks_count": 65, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 65, - "watchers": 228, + "watchers": 227, "score": 0 }, { diff --git a/2019/CVE-2019-19609.json b/2019/CVE-2019-19609.json index 2c7b77e72b..42f8ed3a68 100644 --- a/2019/CVE-2019-19609.json +++ b/2019/CVE-2019-19609.json @@ -40,17 +40,17 @@ "description": "Exploit for CVE-2019-19609 in Strapi (Remote Code Execution) ", "fork": false, "created_at": "2021-08-29T17:57:08Z", - "updated_at": "2021-12-30T23:14:20Z", + "updated_at": "2022-01-13T16:26:01Z", "pushed_at": "2021-08-30T22:36:16Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 3, - "watchers": 3, + "watchers": 4, "score": 0 }, { diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json index ba3447da4a..a45b5fb79d 100644 --- a/2019/CVE-2019-19781.json +++ b/2019/CVE-2019-19781.json @@ -1246,17 +1246,17 @@ "description": "Shitrix : CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit ", "fork": false, "created_at": "2020-07-30T17:37:40Z", - "updated_at": "2021-06-12T09:38:49Z", + "updated_at": "2022-01-13T16:45:46Z", "pushed_at": "2021-06-02T07:42:59Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 4, "score": 0 }, { @@ -1304,12 +1304,12 @@ "pushed_at": "2021-12-06T19:08:31Z", "stargazers_count": 1, "watchers_count": 1, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 1, "score": 0 }, diff --git a/2020/CVE-2020-0787.json b/2020/CVE-2020-0787.json index ee0feee9a3..903174de21 100644 --- a/2020/CVE-2020-0787.json +++ b/2020/CVE-2020-0787.json @@ -13,17 +13,17 @@ "description": "Support ALL Windows Version", "fork": false, "created_at": "2020-06-16T08:57:51Z", - "updated_at": "2022-01-06T12:56:56Z", + "updated_at": "2022-01-13T18:02:08Z", "pushed_at": "2020-09-11T07:38:22Z", - "stargazers_count": 592, - "watchers_count": 592, + "stargazers_count": 591, + "watchers_count": 591, "forks_count": 155, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 155, - "watchers": 592, + "watchers": 591, "score": 0 }, { diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 425d6be8e5..8863fc7bee 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -121,10 +121,10 @@ "description": "Scanner for CVE-2020-0796 - SMBv3 RCE", "fork": false, "created_at": "2020-03-11T15:21:27Z", - "updated_at": "2022-01-12T06:31:52Z", + "updated_at": "2022-01-13T18:07:04Z", "pushed_at": "2020-10-01T08:36:29Z", - "stargazers_count": 606, - "watchers_count": 606, + "stargazers_count": 605, + "watchers_count": 605, "forks_count": 201, "allow_forking": true, "is_template": false, @@ -133,7 +133,7 @@ ], "visibility": "public", "forks": 201, - "watchers": 606, + "watchers": 605, "score": 0 }, { @@ -177,10 +177,10 @@ "description": "Identifying and Mitigating the CVE-2020–0796 flaw in the fly", "fork": false, "created_at": "2020-03-11T18:42:32Z", - "updated_at": "2021-12-21T05:23:50Z", + "updated_at": "2022-01-13T16:37:06Z", "pushed_at": "2020-03-12T10:19:35Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "forks_count": 9, "allow_forking": true, "is_template": false, @@ -192,7 +192,7 @@ ], "visibility": "public", "forks": 9, - "watchers": 12, + "watchers": 13, "score": 0 }, { @@ -1018,10 +1018,10 @@ "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost", "fork": false, "created_at": "2020-03-30T11:42:56Z", - "updated_at": "2022-01-07T10:14:04Z", + "updated_at": "2022-01-13T18:07:02Z", "pushed_at": "2020-12-07T20:04:27Z", - "stargazers_count": 1174, - "watchers_count": 1174, + "stargazers_count": 1173, + "watchers_count": 1173, "forks_count": 369, "allow_forking": true, "is_template": false, @@ -1034,7 +1034,7 @@ ], "visibility": "public", "forks": 369, - "watchers": 1174, + "watchers": 1173, "score": 0 }, { @@ -1333,10 +1333,10 @@ "description": "CVE-2020-0796 Remote Code Execution POC", "fork": false, "created_at": "2020-04-20T14:35:48Z", - "updated_at": "2022-01-13T11:57:39Z", + "updated_at": "2022-01-13T16:22:12Z", "pushed_at": "2020-06-09T20:46:45Z", - "stargazers_count": 441, - "watchers_count": 441, + "stargazers_count": 442, + "watchers_count": 442, "forks_count": 147, "allow_forking": true, "is_template": false, @@ -1349,7 +1349,7 @@ ], "visibility": "public", "forks": 147, - "watchers": 441, + "watchers": 442, "score": 0 }, { diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index c9ef6ce188..69fe1f294c 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -40,17 +40,17 @@ "description": "Test tool for CVE-2020-1472", "fork": false, "created_at": "2020-09-08T08:58:37Z", - "updated_at": "2022-01-13T01:54:17Z", + "updated_at": "2022-01-13T15:00:03Z", "pushed_at": "2021-12-08T10:31:54Z", - "stargazers_count": 1410, - "watchers_count": 1410, + "stargazers_count": 1409, + "watchers_count": 1409, "forks_count": 315, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 315, - "watchers": 1410, + "watchers": 1409, "score": 0 }, { diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index c32636dc1c..ddedd44546 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -17,7 +17,7 @@ "pushed_at": "2021-04-04T09:13:57Z", "stargazers_count": 3096, "watchers_count": 3096, - "forks_count": 918, + "forks_count": 919, "allow_forking": true, "is_template": false, "topics": [ @@ -42,7 +42,7 @@ "webshell" ], "visibility": "public", - "forks": 918, + "forks": 919, "watchers": 3096, "score": 0 }, diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 0c6fa92d82..35a7432555 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -364,10 +364,10 @@ "description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ", "fork": false, "created_at": "2020-02-22T16:16:20Z", - "updated_at": "2022-01-10T10:20:34Z", + "updated_at": "2022-01-13T17:12:36Z", "pushed_at": "2020-03-09T14:51:43Z", - "stargazers_count": 225, - "watchers_count": 225, + "stargazers_count": 226, + "watchers_count": 226, "forks_count": 86, "allow_forking": true, "is_template": false, @@ -380,7 +380,7 @@ ], "visibility": "public", "forks": 86, - "watchers": 225, + "watchers": 226, "score": 0 }, { diff --git a/2020/CVE-2020-6287.json b/2020/CVE-2020-6287.json index 11af1d1bd4..a5cb3dabc2 100644 --- a/2020/CVE-2020-6287.json +++ b/2020/CVE-2020-6287.json @@ -17,12 +17,12 @@ "pushed_at": "2020-09-29T17:20:12Z", "stargazers_count": 191, "watchers_count": 191, - "forks_count": 62, + "forks_count": 64, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 62, + "forks": 64, "watchers": 191, "score": 0 }, diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index 6c04e14c50..d626532887 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -40,17 +40,17 @@ "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-06-29T17:24:14Z", - "updated_at": "2022-01-11T12:14:49Z", + "updated_at": "2022-01-13T15:45:30Z", "pushed_at": "2021-07-20T15:28:13Z", - "stargazers_count": 1495, - "watchers_count": 1495, + "stargazers_count": 1494, + "watchers_count": 1494, "forks_count": 546, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 546, - "watchers": 1495, + "watchers": 1494, "score": 0 }, { diff --git a/2021/CVE-2021-1732.json b/2021/CVE-2021-1732.json index 14fb948fe6..e8c0809b9e 100644 --- a/2021/CVE-2021-1732.json +++ b/2021/CVE-2021-1732.json @@ -40,17 +40,17 @@ "description": "CVE-­2021­-1732 Microsoft Windows 10 本地提权漏 研究及Poc\/Exploit开发", "fork": false, "created_at": "2021-03-08T05:07:15Z", - "updated_at": "2022-01-13T12:14:07Z", + "updated_at": "2022-01-13T12:46:12Z", "pushed_at": "2021-03-08T11:41:19Z", - "stargazers_count": 56, - "watchers_count": 56, + "stargazers_count": 57, + "watchers_count": 57, "forks_count": 24, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 24, - "watchers": 56, + "watchers": 57, "score": 0 }, { diff --git a/2021/CVE-2021-20038.json b/2021/CVE-2021-20038.json index 301eb56270..3d3e419ef4 100644 --- a/2021/CVE-2021-20038.json +++ b/2021/CVE-2021-20038.json @@ -13,10 +13,10 @@ "description": "SonicWall SMA-100 Unauth RCE Exploit (CVE-2021-20038)", "fork": false, "created_at": "2022-01-11T02:25:25Z", - "updated_at": "2022-01-13T10:43:03Z", + "updated_at": "2022-01-13T16:01:15Z", "pushed_at": "2022-01-11T11:22:06Z", - "stargazers_count": 35, - "watchers_count": 35, + "stargazers_count": 37, + "watchers_count": 37, "forks_count": 10, "allow_forking": true, "is_template": false, @@ -27,7 +27,7 @@ ], "visibility": "public", "forks": 10, - "watchers": 35, + "watchers": 37, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json index d64751ce91..d78c9e69e0 100644 --- a/2021/CVE-2021-22205.json +++ b/2021/CVE-2021-22205.json @@ -121,10 +121,10 @@ "description": "CVE-2021-22205& GitLab CE\/EE RCE", "fork": false, "created_at": "2021-10-29T04:30:45Z", - "updated_at": "2022-01-11T05:55:41Z", + "updated_at": "2022-01-13T14:52:31Z", "pushed_at": "2021-11-06T05:20:30Z", - "stargazers_count": 132, - "watchers_count": 132, + "stargazers_count": 131, + "watchers_count": 131, "forks_count": 57, "allow_forking": true, "is_template": false, @@ -133,7 +133,7 @@ ], "visibility": "public", "forks": 57, - "watchers": 132, + "watchers": 131, "score": 0 }, { diff --git a/2021/CVE-2021-25641.json b/2021/CVE-2021-25641.json index 5515be10f4..90a43c261a 100644 --- a/2021/CVE-2021-25641.json +++ b/2021/CVE-2021-25641.json @@ -13,7 +13,7 @@ "description": "Apache\/Alibaba Dubbo <= 2.7.3 PoC Code for CVE-2021-25641 RCE via Deserialization of Untrusted Data; Affects Versions <= 2.7.6 With Different Gadgets", "fork": false, "created_at": "2021-06-06T06:41:36Z", - "updated_at": "2021-11-22T17:01:52Z", + "updated_at": "2022-01-13T14:40:57Z", "pushed_at": "2021-06-06T08:41:19Z", "stargazers_count": 48, "watchers_count": 48, diff --git a/2021/CVE-2021-26295.json b/2021/CVE-2021-26295.json index 674de2c12d..837b3f9624 100644 --- a/2021/CVE-2021-26295.json +++ b/2021/CVE-2021-26295.json @@ -40,17 +40,17 @@ "description": "CVE-2021-26295 Apache OFBiz rmi反序列化POC", "fork": false, "created_at": "2021-03-24T08:25:04Z", - "updated_at": "2021-04-28T06:38:16Z", + "updated_at": "2022-01-13T12:15:38Z", "pushed_at": "2021-03-24T09:01:11Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, - "watchers": 5, + "watchers": 4, "score": 0 }, { diff --git a/2021/CVE-2021-26855.json b/2021/CVE-2021-26855.json index fc4974cae6..5af1fdeae5 100644 --- a/2021/CVE-2021-26855.json +++ b/2021/CVE-2021-26855.json @@ -462,33 +462,6 @@ "watchers": 51, "score": 0 }, - { - "id": 346347325, - "name": "CVE-2021-26855", - "full_name": "achabahe\/CVE-2021-26855", - "owner": { - "login": "achabahe", - "id": 12010973, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12010973?v=4", - "html_url": "https:\/\/github.com\/achabahe" - }, - "html_url": "https:\/\/github.com\/achabahe\/CVE-2021-26855", - "description": null, - "fork": false, - "created_at": "2021-03-10T12:23:43Z", - "updated_at": "2021-03-12T08:21:02Z", - "pushed_at": "2021-03-10T12:46:41Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "topics": [], - "visibility": "public", - "forks": 3, - "watchers": 4, - "score": 0 - }, { "id": 346816198, "name": "CVE-2021-26855", @@ -1077,17 +1050,17 @@ "description": "[ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2021-34523 & CVE-2021-31207 Exploit Chains.", "fork": false, "created_at": "2021-04-14T11:12:30Z", - "updated_at": "2022-01-11T01:24:02Z", + "updated_at": "2022-01-13T12:44:31Z", "pushed_at": "2021-11-16T04:00:14Z", - "stargazers_count": 118, - "watchers_count": 118, + "stargazers_count": 119, + "watchers_count": 119, "forks_count": 26, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 26, - "watchers": 118, + "watchers": 119, "score": 0 }, { diff --git a/2021/CVE-2021-26856.json b/2021/CVE-2021-26856.json new file mode 100644 index 0000000000..024f31f7d7 --- /dev/null +++ b/2021/CVE-2021-26856.json @@ -0,0 +1,29 @@ +[ + { + "id": 346483081, + "name": "CVE-2021-26856", + "full_name": "avi8892\/CVE-2021-26856", + "owner": { + "login": "avi8892", + "id": 31028818, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31028818?v=4", + "html_url": "https:\/\/github.com\/avi8892" + }, + "html_url": "https:\/\/github.com\/avi8892\/CVE-2021-26856", + "description": null, + "fork": false, + "created_at": "2021-03-10T20:27:27Z", + "updated_at": "2022-01-13T16:20:46Z", + "pushed_at": "2021-03-10T12:46:41Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index a2b94a5ea7..6806a9c77c 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -121,10 +121,10 @@ "description": "Exploit for CVE-2021-3129", "fork": false, "created_at": "2021-01-27T10:16:35Z", - "updated_at": "2022-01-13T02:36:19Z", + "updated_at": "2022-01-13T16:07:11Z", "pushed_at": "2021-03-07T04:39:58Z", - "stargazers_count": 43, - "watchers_count": 43, + "stargazers_count": 44, + "watchers_count": 44, "forks_count": 17, "allow_forking": true, "is_template": false, @@ -135,7 +135,7 @@ ], "visibility": "public", "forks": 17, - "watchers": 43, + "watchers": 44, "score": 0 }, { @@ -183,12 +183,12 @@ "pushed_at": "2021-12-14T05:12:17Z", "stargazers_count": 68, "watchers_count": 68, - "forks_count": 34, + "forks_count": 35, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 34, + "forks": 35, "watchers": 68, "score": 0 }, diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index 717f9ca7a3..904990e72b 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -969,17 +969,17 @@ "description": "Sudo Baron Samedit Exploit", "fork": false, "created_at": "2021-03-15T17:37:02Z", - "updated_at": "2022-01-11T22:29:55Z", + "updated_at": "2022-01-13T14:06:54Z", "pushed_at": "2022-01-13T05:48:01Z", - "stargazers_count": 421, - "watchers_count": 421, - "forks_count": 110, + "stargazers_count": 422, + "watchers_count": 422, + "forks_count": 109, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 110, - "watchers": 421, + "forks": 109, + "watchers": 422, "score": 0 }, { diff --git a/2021/CVE-2021-32099.json b/2021/CVE-2021-32099.json index 41bcdd4a24..3124d3d515 100644 --- a/2021/CVE-2021-32099.json +++ b/2021/CVE-2021-32099.json @@ -13,17 +13,17 @@ "description": "Just for HTB", "fork": false, "created_at": "2022-01-11T08:14:06Z", - "updated_at": "2022-01-12T19:20:33Z", + "updated_at": "2022-01-13T14:26:56Z", "pushed_at": "2022-01-11T08:15:09Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 5, - "watchers": 4, + "watchers": 5, "score": 0 }, { @@ -40,7 +40,7 @@ "description": "CVE-2021-32099", "fork": false, "created_at": "2022-01-12T11:48:34Z", - "updated_at": "2022-01-13T11:20:46Z", + "updated_at": "2022-01-13T13:22:01Z", "pushed_at": "2022-01-12T11:49:20Z", "stargazers_count": 2, "watchers_count": 2, diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json index bf687dd0c4..781f3a7eb5 100644 --- a/2021/CVE-2021-34527.json +++ b/2021/CVE-2021-34527.json @@ -47,17 +47,17 @@ "description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE", "fork": false, "created_at": "2021-07-05T20:13:49Z", - "updated_at": "2022-01-06T23:27:05Z", + "updated_at": "2022-01-13T18:02:06Z", "pushed_at": "2021-08-20T01:54:22Z", - "stargazers_count": 655, - "watchers_count": 655, + "stargazers_count": 656, + "watchers_count": 656, "forks_count": 98, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 98, - "watchers": 655, + "watchers": 656, "score": 0 }, { diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index 6191410569..a52278d684 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -553,7 +553,7 @@ "description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit", "fork": false, "created_at": "2021-09-15T22:34:35Z", - "updated_at": "2022-01-13T11:03:09Z", + "updated_at": "2022-01-13T14:42:54Z", "pushed_at": "2021-10-12T23:05:07Z", "stargazers_count": 555, "watchers_count": 555, diff --git a/2021/CVE-2021-41277.json b/2021/CVE-2021-41277.json index 9ba5b2cf4e..cedbec768d 100644 --- a/2021/CVE-2021-41277.json +++ b/2021/CVE-2021-41277.json @@ -184,12 +184,12 @@ "pushed_at": "2021-12-06T19:41:05Z", "stargazers_count": 4, "watchers_count": 4, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 4, "score": 0 }, diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 0a09fff4e2..2e036b219e 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -17,12 +17,12 @@ "pushed_at": "2021-12-07T12:48:44Z", "stargazers_count": 32, "watchers_count": 32, - "forks_count": 10, + "forks_count": 11, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 10, + "forks": 11, "watchers": 32, "score": 0 }, @@ -2134,7 +2134,7 @@ "fork": false, "created_at": "2022-01-12T17:42:36Z", "updated_at": "2022-01-12T18:26:57Z", - "pushed_at": "2022-01-12T21:22:51Z", + "pushed_at": "2022-01-13T16:18:33Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2021/CVE-2021-42013.json b/2021/CVE-2021-42013.json index a163a1cf77..499858707e 100644 --- a/2021/CVE-2021-42013.json +++ b/2021/CVE-2021-42013.json @@ -44,12 +44,12 @@ "pushed_at": "2021-11-26T20:23:30Z", "stargazers_count": 15, "watchers_count": 15, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 15, "score": 0 }, diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index 3fce424a79..0f8991309d 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -13,10 +13,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-11T15:10:30Z", - "updated_at": "2022-01-13T07:44:29Z", + "updated_at": "2022-01-13T15:05:06Z", "pushed_at": "2021-12-21T10:11:05Z", - "stargazers_count": 700, - "watchers_count": 700, + "stargazers_count": 701, + "watchers_count": 701, "forks_count": 150, "allow_forking": true, "is_template": false, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 150, - "watchers": 700, + "watchers": 701, "score": 0 }, { @@ -45,17 +45,17 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-13T10:28:12Z", - "updated_at": "2022-01-13T11:38:28Z", + "updated_at": "2022-01-13T15:16:29Z", "pushed_at": "2021-12-20T04:51:01Z", - "stargazers_count": 199, - "watchers_count": 199, + "stargazers_count": 203, + "watchers_count": 203, "forks_count": 40, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 40, - "watchers": 199, + "watchers": 203, "score": 0 }, { @@ -99,17 +99,17 @@ "description": "Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)", "fork": false, "created_at": "2021-12-13T23:15:05Z", - "updated_at": "2022-01-10T03:51:26Z", - "pushed_at": "2021-12-28T16:28:50Z", - "stargazers_count": 177, - "watchers_count": 177, + "updated_at": "2022-01-13T17:32:02Z", + "pushed_at": "2022-01-13T12:35:19Z", + "stargazers_count": 180, + "watchers_count": 180, "forks_count": 25, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 25, - "watchers": 177, + "watchers": 180, "score": 0 }, { diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json index d6ef628100..8dde740c5c 100644 --- a/2021/CVE-2021-42287.json +++ b/2021/CVE-2021-42287.json @@ -13,17 +13,17 @@ "description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.", "fork": false, "created_at": "2021-12-11T19:27:30Z", - "updated_at": "2022-01-12T18:56:12Z", + "updated_at": "2022-01-13T17:06:36Z", "pushed_at": "2021-12-16T09:50:15Z", - "stargazers_count": 983, - "watchers_count": 983, + "stargazers_count": 985, + "watchers_count": 985, "forks_count": 264, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 264, - "watchers": 983, + "watchers": 985, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 4d68dc2d56..cb8f424980 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -98,12 +98,12 @@ "pushed_at": "2021-12-14T15:30:16Z", "stargazers_count": 311, "watchers_count": 311, - "forks_count": 87, + "forks_count": 88, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 87, + "forks": 88, "watchers": 311, "score": 0 }, @@ -390,17 +390,17 @@ "description": "Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.", "fork": false, "created_at": "2021-12-10T12:38:20Z", - "updated_at": "2022-01-13T08:34:15Z", + "updated_at": "2022-01-13T16:26:59Z", "pushed_at": "2021-12-27T10:27:42Z", - "stargazers_count": 911, - "watchers_count": 911, - "forks_count": 356, + "stargazers_count": 915, + "watchers_count": 915, + "forks_count": 357, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 356, - "watchers": 911, + "forks": 357, + "watchers": 915, "score": 0 }, { @@ -1599,17 +1599,17 @@ "description": "A Terraform to deploy vulnerable app and a JDNIExploit to work with CVE-2021-44228", "fork": false, "created_at": "2021-12-11T13:56:28Z", - "updated_at": "2021-12-19T00:13:28Z", + "updated_at": "2022-01-13T15:38:17Z", "pushed_at": "2021-12-11T14:53:38Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 2, "score": 0 }, { @@ -1885,10 +1885,10 @@ "description": "Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!", "fork": false, "created_at": "2021-12-12T00:29:03Z", - "updated_at": "2022-01-13T12:12:04Z", + "updated_at": "2022-01-13T13:57:55Z", "pushed_at": "2022-01-07T09:40:06Z", - "stargazers_count": 577, - "watchers_count": 577, + "stargazers_count": 579, + "watchers_count": 579, "forks_count": 94, "allow_forking": true, "is_template": false, @@ -1907,7 +1907,7 @@ ], "visibility": "public", "forks": 94, - "watchers": 577, + "watchers": 579, "score": 0 }, { @@ -1986,17 +1986,17 @@ "description": "An agent to hotpatch the log4j RCE from CVE-2021-44228.", "fork": false, "created_at": "2021-12-12T01:24:51Z", - "updated_at": "2022-01-13T03:46:13Z", + "updated_at": "2022-01-13T16:56:49Z", "pushed_at": "2021-12-23T20:40:44Z", - "stargazers_count": 478, - "watchers_count": 478, + "stargazers_count": 479, + "watchers_count": 479, "forks_count": 61, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 61, - "watchers": 478, + "watchers": 479, "score": 0 }, { @@ -2445,7 +2445,7 @@ "description": "Local Bytecode Scanner for the Log4JShell Vulnerability (CVE-2021-44228)", "fork": false, "created_at": "2021-12-12T11:28:34Z", - "updated_at": "2022-01-13T08:11:27Z", + "updated_at": "2022-01-13T17:55:54Z", "pushed_at": "2022-01-12T09:53:43Z", "stargazers_count": 45, "watchers_count": 45, @@ -3539,17 +3539,17 @@ "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", "fork": false, "created_at": "2021-12-13T03:57:50Z", - "updated_at": "2022-01-13T11:36:52Z", + "updated_at": "2022-01-13T17:56:58Z", "pushed_at": "2022-01-02T20:21:42Z", - "stargazers_count": 2591, - "watchers_count": 2591, + "stargazers_count": 2596, + "watchers_count": 2596, "forks_count": 618, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 618, - "watchers": 2591, + "watchers": 2596, "score": 0 }, { @@ -5864,7 +5864,7 @@ "description": "CVE-2021-44228 Log4J multithreaded Mass Exploitation tool compatible with URL\/IP lists.", "fork": false, "created_at": "2021-12-14T22:19:29Z", - "updated_at": "2022-01-12T16:19:10Z", + "updated_at": "2022-01-13T15:58:54Z", "pushed_at": "2022-01-13T10:36:15Z", "stargazers_count": 6, "watchers_count": 6, @@ -5996,17 +5996,17 @@ "description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228", "fork": false, "created_at": "2021-12-14T23:33:51Z", - "updated_at": "2022-01-11T23:28:08Z", + "updated_at": "2022-01-13T15:56:25Z", "pushed_at": "2022-01-12T03:28:41Z", - "stargazers_count": 314, - "watchers_count": 314, + "stargazers_count": 315, + "watchers_count": 315, "forks_count": 84, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 84, - "watchers": 314, + "watchers": 315, "score": 0 }, { @@ -6716,17 +6716,17 @@ "description": "Small example repo for looking into log4j CVE-2021-44228", "fork": false, "created_at": "2021-12-15T19:59:38Z", - "updated_at": "2022-01-13T05:24:56Z", + "updated_at": "2022-01-13T16:39:43Z", "pushed_at": "2021-12-24T15:44:53Z", - "stargazers_count": 50, - "watchers_count": 50, + "stargazers_count": 51, + "watchers_count": 51, "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 5, - "watchers": 50, + "watchers": 51, "score": 0 }, { @@ -6802,17 +6802,17 @@ "description": "A honeypot for the Log4Shell vulnerability (CVE-2021-44228).", "fork": false, "created_at": "2021-12-15T22:30:34Z", - "updated_at": "2022-01-10T16:39:48Z", + "updated_at": "2022-01-13T17:56:42Z", "pushed_at": "2022-01-12T22:16:28Z", - "stargazers_count": 53, - "watchers_count": 53, + "stargazers_count": 55, + "watchers_count": 55, "forks_count": 15, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 15, - "watchers": 53, + "watchers": 55, "score": 0 }, { @@ -7178,11 +7178,11 @@ "html_url": "https:\/\/github.com\/andalik" }, "html_url": "https:\/\/github.com\/andalik\/log4j-filescan", - "description": "Scanner recursivo de arquivos desenvolvido em Python3 para varredura e localização de versões vulneráveis do Log4j2 em um computador, contemplando análise interna de arquivos JAR (CVE-2021-44228 e CVE-2021-45046)", + "description": "Scanner recursivo de arquivos desenvolvido em Python 3 para localização e varredura de versões vulneráveis do Log4j2, contemplando análise interna de arquivos JAR (CVE-2021-44228, CVE-2021-45046, CVE-2021-45105 e CVE-2021-44832)", "fork": false, "created_at": "2021-12-16T14:29:05Z", - "updated_at": "2021-12-21T05:28:20Z", - "pushed_at": "2021-12-21T05:28:17Z", + "updated_at": "2022-01-13T15:52:19Z", + "pushed_at": "2022-01-13T16:34:10Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, @@ -7550,7 +7550,7 @@ "fork": false, "created_at": "2021-12-17T05:14:05Z", "updated_at": "2021-12-19T19:30:56Z", - "pushed_at": "2021-12-17T05:14:07Z", + "pushed_at": "2022-01-13T14:19:13Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, @@ -8458,17 +8458,17 @@ "description": "A Proof of Concept of the Log4j vulnerabilities (CVE-2021-44228) over Java-RMI", "fork": false, "created_at": "2021-12-19T17:53:31Z", - "updated_at": "2021-12-19T22:09:43Z", + "updated_at": "2022-01-13T17:16:39Z", "pushed_at": "2021-12-19T22:09:40Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, - "watchers": 0, + "watchers": 1, "score": 0 }, { @@ -8998,7 +8998,7 @@ "pushed_at": "2022-01-10T19:13:04Z", "stargazers_count": 58, "watchers_count": 58, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "topics": [ @@ -9010,7 +9010,7 @@ "security" ], "visibility": "public", - "forks": 5, + "forks": 6, "watchers": 58, "score": 0 }, @@ -9416,12 +9416,12 @@ "pushed_at": "2021-12-29T12:56:57Z", "stargazers_count": 22, "watchers_count": 22, - "forks_count": 6, + "forks_count": 7, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 6, + "forks": 7, "watchers": 22, "score": 0 }, @@ -9740,12 +9740,12 @@ "pushed_at": "2021-12-28T13:50:30Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0 }, @@ -9767,7 +9767,7 @@ "pushed_at": "2021-12-29T18:34:45Z", "stargazers_count": 1, "watchers_count": 1, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [ @@ -9777,7 +9777,7 @@ "security-vulnerability" ], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 1, "score": 0 }, @@ -10129,12 +10129,12 @@ "pushed_at": "2022-01-07T14:01:18Z", "stargazers_count": 1, "watchers_count": 1, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 1, "score": 0 }, @@ -10288,7 +10288,7 @@ "fork": false, "created_at": "2022-01-12T23:44:20Z", "updated_at": "2022-01-12T23:59:13Z", - "pushed_at": "2022-01-13T00:26:15Z", + "pushed_at": "2022-01-13T17:42:29Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, @@ -10301,35 +10301,27 @@ "score": 0 }, { - "id": 447429442, - "name": "log4jshellPoC", - "full_name": "adamtheapiguy\/log4jshellPoC", + "id": 447615580, + "name": "Log4j-CVE-2021-44228", + "full_name": "solitarysp\/Log4j-CVE-2021-44228", "owner": { - "login": "adamtheapiguy", - "id": 11493202, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11493202?v=4", - "html_url": "https:\/\/github.com\/adamtheapiguy" + "login": "solitarysp", + "id": 20993683, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20993683?v=4", + "html_url": "https:\/\/github.com\/solitarysp" }, - "html_url": "https:\/\/github.com\/adamtheapiguy\/log4jshellPoC", - "description": "This repository was created with the purpose to make it easy for organizations and individuals to study and research log4jshell vulnerability code name CVE-2021-44228.", + "html_url": "https:\/\/github.com\/solitarysp\/Log4j-CVE-2021-44228", + "description": null, "fork": false, - "created_at": "2022-01-13T01:53:17Z", - "updated_at": "2022-01-13T03:11:56Z", - "pushed_at": "2022-01-13T07:42:13Z", + "created_at": "2022-01-13T13:46:12Z", + "updated_at": "2022-01-13T13:46:52Z", + "pushed_at": "2022-01-13T14:43:03Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, - "topics": [ - "botnet", - "cve-2021-44228", - "log4j2", - "log4jshell", - "malware", - "remote-code-execution", - "vulnerability" - ], + "topics": [], "visibility": "public", "forks": 0, "watchers": 0, diff --git a/README.md b/README.md index ad23d09518..d61af6002f 100644 --- a/README.md +++ b/README.md @@ -1323,7 +1323,6 @@ Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is uni - [srvaccount/CVE-2021-26855-PoC](https://github.com/srvaccount/CVE-2021-26855-PoC) - [h4x0r-dz/CVE-2021-26855](https://github.com/h4x0r-dz/CVE-2021-26855) - [alt3kx/CVE-2021-26855_PoC](https://github.com/alt3kx/CVE-2021-26855_PoC) -- [achabahe/CVE-2021-26855](https://github.com/achabahe/CVE-2021-26855) - [raheel0x01/CVE-2021-26855](https://github.com/raheel0x01/CVE-2021-26855) - [hackerschoice/CVE-2021-26855](https://github.com/hackerschoice/CVE-2021-26855) - [SCS-Labs/HAFNIUM-Microsoft-Exchange-0day](https://github.com/SCS-Labs/HAFNIUM-Microsoft-Exchange-0day) @@ -1349,6 +1348,9 @@ Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is uni - [yaoxiaoangry3/Flangvik](https://github.com/yaoxiaoangry3/Flangvik) - [thau0x01/poc_proxylogon](https://github.com/thau0x01/poc_proxylogon) +### CVE-2021-26856 +- [avi8892/CVE-2021-26856](https://github.com/avi8892/CVE-2021-26856) + ### CVE-2021-26857 (2021-03-02) @@ -3924,7 +3926,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - [maximofernandezriera/CVE-2021-44228](https://github.com/maximofernandezriera/CVE-2021-44228) - [c4dr01d/CVE-2021-44228](https://github.com/c4dr01d/CVE-2021-44228) - [jxerome/log4shell](https://github.com/jxerome/log4shell) -- [adamtheapiguy/log4jshellPoC](https://github.com/adamtheapiguy/log4jshellPoC) +- [solitarysp/Log4j-CVE-2021-44228](https://github.com/solitarysp/Log4j-CVE-2021-44228) ### CVE-2021-44270 - [pinpinsec/Anviz-Access-Control-Authentication-Bypass](https://github.com/pinpinsec/Anviz-Access-Control-Authentication-Bypass)