Auto Update 2021/12/13 18:13:40

This commit is contained in:
motikan2010-bot 2021-12-14 03:13:40 +09:00
parent e822cbef67
commit 71461e0959
24 changed files with 968 additions and 402 deletions

View file

@ -13,17 +13,17 @@
"description": "MS16-032(CVE-2016-0099) for SERVICE ONLY",
"fork": false,
"created_at": "2017-03-15T17:16:55Z",
"updated_at": "2021-11-28T02:48:01Z",
"updated_at": "2021-12-13T12:53:15Z",
"pushed_at": "2017-03-15T17:24:59Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 80,
"watchers_count": 80,
"forks_count": 45,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 79,
"watchers": 80,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "OpenSSH Username Enumeration - CVE-2016-6210",
"fork": false,
"created_at": "2019-08-25T07:23:44Z",
"updated_at": "2019-09-12T12:42:39Z",
"updated_at": "2021-12-13T17:44:28Z",
"pushed_at": "2019-08-25T07:28:06Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2017-5645 - Apache Log4j RCE due Insecure Deserialization",
"fork": false,
"created_at": "2017-08-04T01:12:47Z",
"updated_at": "2021-12-13T09:28:03Z",
"updated_at": "2021-12-13T15:22:47Z",
"pushed_at": "2018-11-18T11:14:20Z",
"stargazers_count": 91,
"watchers_count": 91,
"stargazers_count": 92,
"watchers_count": 92,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 91,
"watchers": 92,
"score": 0
},
{

View file

@ -2,14 +2,14 @@
{
"id": 89408243,
"name": "Puma6Fail",
"full_name": "TransLunarInjection\/Puma6Fail",
"full_name": "LunNova\/Puma6Fail",
"owner": {
"login": "TransLunarInjection",
"login": "LunNova",
"id": 782440,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/782440?v=4",
"html_url": "https:\/\/github.com\/TransLunarInjection"
"html_url": "https:\/\/github.com\/LunNova"
},
"html_url": "https:\/\/github.com\/TransLunarInjection\/Puma6Fail",
"html_url": "https:\/\/github.com\/LunNova\/Puma6Fail",
"description": "CVE-2017-5693 Denial of service vulnerability in Puma 6 modems",
"fork": false,
"created_at": "2017-04-25T21:25:43Z",

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-12-10T01:43:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -40,10 +40,10 @@
"description": "CVE-2019-1458 Windows LPE Exploit",
"fork": false,
"created_at": "2020-03-11T08:30:14Z",
"updated_at": "2021-10-13T07:19:35Z",
"updated_at": "2021-12-13T15:47:52Z",
"pushed_at": "2020-03-11T09:59:01Z",
"stargazers_count": 111,
"watchers_count": 111,
"stargazers_count": 112,
"watchers_count": 112,
"forks_count": 34,
"allow_forking": true,
"is_template": false,
@ -54,7 +54,7 @@
],
"visibility": "public",
"forks": 34,
"watchers": 111,
"watchers": 112,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "🐱‍💻 Poc of CVE-2019-7238 - Nexus Repository Manager 3 Remote Code Execution 🐱‍💻",
"fork": false,
"created_at": "2019-02-24T23:09:43Z",
"updated_at": "2021-11-18T09:29:14Z",
"updated_at": "2021-12-13T13:15:06Z",
"pushed_at": "2019-02-25T07:37:07Z",
"stargazers_count": 141,
"watchers_count": 141,
"stargazers_count": 142,
"watchers_count": 142,
"forks_count": 50,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 141,
"watchers": 142,
"score": 0
},
{
@ -40,17 +40,17 @@
"description": "Nexus Repository Manager 3 Remote Code Execution without authentication < 3.15.0",
"fork": false,
"created_at": "2019-05-21T13:16:02Z",
"updated_at": "2021-12-05T05:51:38Z",
"updated_at": "2021-12-13T13:14:56Z",
"pushed_at": "2019-08-19T17:33:56Z",
"stargazers_count": 64,
"watchers_count": 64,
"stargazers_count": 65,
"watchers_count": 65,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 64,
"watchers": 65,
"score": 0
},
{

View file

@ -98,17 +98,17 @@
"description": "CVE-2020-10199 Nexus <= 3.21.1 远程代码执行脚本(有回显)",
"fork": false,
"created_at": "2020-04-16T09:40:15Z",
"updated_at": "2021-10-10T10:37:54Z",
"updated_at": "2021-12-13T12:47:16Z",
"pushed_at": "2020-05-26T10:23:34Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 38,
"watchers": 39,
"score": 0
},
{

View file

@ -44,12 +44,12 @@
"pushed_at": "2021-12-08T10:31:54Z",
"stargazers_count": 1389,
"watchers_count": 1389,
"forks_count": 312,
"forks_count": 313,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 312,
"forks": 313,
"watchers": 1389,
"score": 0
},
@ -155,17 +155,17 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2021-12-11T13:52:33Z",
"updated_at": "2021-12-13T17:40:32Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 382,
"watchers_count": 382,
"stargazers_count": 383,
"watchers_count": 383,
"forks_count": 117,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 117,
"watchers": 382,
"watchers": 383,
"score": 0
},
{

View file

@ -221,17 +221,17 @@
"description": "PoC BSOD for CVE-2020-16898 (badneighbor)",
"fork": false,
"created_at": "2020-10-16T23:03:15Z",
"updated_at": "2021-08-19T06:09:27Z",
"updated_at": "2021-12-13T16:18:26Z",
"pushed_at": "2020-10-16T23:12:52Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 21,
"watchers": 20,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2020-5837 exploit",
"fork": false,
"created_at": "2020-04-16T08:15:18Z",
"updated_at": "2021-12-13T07:24:29Z",
"updated_at": "2021-12-13T16:01:35Z",
"pushed_at": "2020-05-13T09:45:12Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 36,
"watchers": 37,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2",
"fork": false,
"created_at": "2021-05-16T01:40:47Z",
"updated_at": "2021-12-07T06:26:12Z",
"updated_at": "2021-12-13T16:27:37Z",
"pushed_at": "2021-05-16T05:54:07Z",
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 11,
"stargazers_count": 56,
"watchers_count": 56,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 55,
"forks": 12,
"watchers": 56,
"score": 0
},
{

View file

@ -40,7 +40,7 @@
"description": "Gex is an iOS 14.7 jailbreak using CVE-2021-30807 IOMFB exploit",
"fork": false,
"created_at": "2021-11-30T14:56:04Z",
"updated_at": "2021-12-06T15:09:00Z",
"updated_at": "2021-12-13T12:31:35Z",
"pushed_at": "2021-11-30T22:37:06Z",
"stargazers_count": 2,
"watchers_count": 2,

View file

@ -94,8 +94,8 @@
"description": "CVE-2021-36260",
"fork": false,
"created_at": "2021-12-13T09:23:36Z",
"updated_at": "2021-12-13T09:49:11Z",
"pushed_at": "2021-12-13T09:49:08Z",
"updated_at": "2021-12-13T15:12:22Z",
"pushed_at": "2021-12-13T15:12:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -126,17 +126,17 @@
"description": "PoC for CVE-2021-36934, which enables a standard user to be able to retrieve the SAM, Security, and Software Registry hives in Windows 10 version 1809 or newer",
"fork": false,
"created_at": "2021-07-22T03:07:56Z",
"updated_at": "2021-12-02T23:09:54Z",
"updated_at": "2021-12-13T14:07:29Z",
"pushed_at": "2021-07-22T04:17:47Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 21,
"watchers": 22,
"score": 0
},
{

View file

@ -67,17 +67,17 @@
"description": "Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)",
"fork": false,
"created_at": "2021-09-16T02:11:36Z",
"updated_at": "2021-12-13T10:52:58Z",
"updated_at": "2021-12-13T13:41:52Z",
"pushed_at": "2021-09-16T10:39:04Z",
"stargazers_count": 181,
"watchers_count": 181,
"stargazers_count": 180,
"watchers_count": 180,
"forks_count": 52,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 181,
"watchers": 180,
"score": 0
},
{

View file

@ -229,17 +229,17 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2021-12-12T21:52:33Z",
"updated_at": "2021-12-13T14:31:25Z",
"pushed_at": "2021-09-11T09:50:26Z",
"stargazers_count": 1325,
"watchers_count": 1325,
"stargazers_count": 1326,
"watchers_count": 1326,
"forks_count": 435,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 435,
"watchers": 1325,
"watchers": 1326,
"score": 0
},
{

View file

@ -13,11 +13,11 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
"updated_at": "2021-12-13T12:04:19Z",
"updated_at": "2021-12-13T17:39:25Z",
"pushed_at": "2021-12-11T15:43:11Z",
"stargazers_count": 244,
"watchers_count": 244,
"forks_count": 50,
"stargazers_count": 277,
"watchers_count": 277,
"forks_count": 55,
"allow_forking": true,
"is_template": false,
"topics": [
@ -27,8 +27,8 @@
"s4u2self"
],
"visibility": "public",
"forks": 50,
"watchers": 244,
"forks": 55,
"watchers": 277,
"score": 0
},
{
@ -45,17 +45,44 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2021-12-13T12:10:17Z",
"pushed_at": "2021-12-13T10:28:47Z",
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 4,
"updated_at": "2021-12-13T17:22:34Z",
"pushed_at": "2021-12-13T14:45:13Z",
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 21,
"forks": 5,
"watchers": 32,
"score": 0
},
{
"id": 437924403,
"name": "noPac",
"full_name": "waterrr\/noPac",
"owner": {
"login": "waterrr",
"id": 15225499,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15225499?v=4",
"html_url": "https:\/\/github.com\/waterrr"
},
"html_url": "https:\/\/github.com\/waterrr\/noPac",
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287",
"fork": false,
"created_at": "2021-12-13T15:24:59Z",
"updated_at": "2021-12-13T15:40:17Z",
"pushed_at": "2021-12-13T15:40:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2021-12-13T12:10:10Z",
"updated_at": "2021-12-13T18:04:27Z",
"pushed_at": "2021-12-12T10:50:54Z",
"stargazers_count": 674,
"watchers_count": 674,
"forks_count": 177,
"stargazers_count": 719,
"watchers_count": 719,
"forks_count": 186,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 177,
"watchers": 674,
"forks": 186,
"watchers": 719,
"score": 0
}
]

29
2021/CVE-2021-43326.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 437963336,
"name": "CVE-2021-43326_Exploit",
"full_name": "gfoss\/CVE-2021-43326_Exploit",
"owner": {
"login": "gfoss",
"id": 727732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/727732?v=4",
"html_url": "https:\/\/github.com\/gfoss"
},
"html_url": "https:\/\/github.com\/gfoss\/CVE-2021-43326_Exploit",
"description": "Automox Windows Agent Privilege Escalation Exploit",
"fork": false,
"created_at": "2021-12-13T17:26:28Z",
"updated_at": "2021-12-13T17:50:46Z",
"pushed_at": "2021-12-13T17:50:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -94,17 +94,17 @@
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
"fork": false,
"created_at": "2021-12-07T09:02:16Z",
"updated_at": "2021-12-13T08:05:10Z",
"updated_at": "2021-12-13T15:38:47Z",
"pushed_at": "2021-12-09T03:16:21Z",
"stargazers_count": 214,
"watchers_count": 214,
"forks_count": 49,
"stargazers_count": 216,
"watchers_count": 216,
"forks_count": 50,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 214,
"forks": 50,
"watchers": 216,
"score": 0
},
{
@ -484,17 +484,17 @@
"description": "This is a proof-of-concept exploit for Grafana's Unauthorized Arbitrary File Read Vulnerability (CVE-2021-43798).",
"fork": false,
"created_at": "2021-12-11T18:49:30Z",
"updated_at": "2021-12-13T01:26:18Z",
"updated_at": "2021-12-13T12:46:42Z",
"pushed_at": "2021-12-11T19:10:03Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-12-12T22:31:00Z",
"updated_at": "2021-12-12T22:32:01Z",
"pushed_at": "2021-12-12T22:31:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2021-12-13T15:36:45Z",
"pushed_at": "2021-12-13T15:36:42Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

File diff suppressed because it is too large Load diff

View file

@ -3410,6 +3410,7 @@ Active Directory Domain Services Elevation of Privilege Vulnerability This CVE I
- [WazeHell/sam-the-admin](https://github.com/WazeHell/sam-the-admin)
- [Ridter/noPac](https://github.com/Ridter/noPac)
- [waterrr/noPac](https://github.com/waterrr/noPac)
### CVE-2021-42287 (2021-11-09)
@ -3601,6 +3602,9 @@ An issue was discovered in net/tipc/crypto.c in the Linux kernel before 5.14.16.
- [DarkSprings/CVE-2021-43267-POC](https://github.com/DarkSprings/CVE-2021-43267-POC)
- [ohnonoyesyes/CVE-2021-43267](https://github.com/ohnonoyesyes/CVE-2021-43267)
### CVE-2021-43326
- [gfoss/CVE-2021-43326_Exploit](https://github.com/gfoss/CVE-2021-43326_Exploit)
### CVE-2021-43361 (-)
<code>
@ -3709,7 +3713,7 @@ Zoho ManageEngine ServiceDesk Plus before 11306, ServiceDesk Plus MSP before 105
### CVE-2021-44228 (2021-12-10)
<code>
Apache Log4j2 &lt;=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (&gt;2.10) this behavior can be mitigated by setting system property &quot;log4j2.formatMsgNoLookups&quot; to “true” or it can be mitigated in prior releases (&lt;2.10) by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class).
Apache Log4j2 &lt;=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (&gt;2.10) this behavior can be mitigated by setting system property &quot;log4j2.formatMsgNoLookups&quot; to “true” or by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class). Java 8u121 (see https://www.oracle.com/java/technologies/javase/8u121-relnotes.html) protects against remote code execution by defaulting &quot;com.sun.jndi.rmi.object.trustURLCodebase&quot; and &quot;com.sun.jndi.cosnaming.object.trustURLCodebase&quot; to &quot;false&quot;.
</code>
- [tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce](https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce)
@ -3829,7 +3833,6 @@ Apache Log4j2 &lt;=2.14.1 JNDI features used in configuration, log messages, and
- [fireeye/CVE-2021-44228](https://github.com/fireeye/CVE-2021-44228)
- [fullhunt/log4j-scan](https://github.com/fullhunt/log4j-scan)
- [rubo77/log4j_checker_beta](https://github.com/rubo77/log4j_checker_beta)
- [ahmad4fifz-dev/CVE-2021-44228](https://github.com/ahmad4fifz-dev/CVE-2021-44228)
- [hupe1980/scan4log4shell](https://github.com/hupe1980/scan4log4shell)
- [thecyberneh/Log4j-RCE-Exploiter](https://github.com/thecyberneh/Log4j-RCE-Exploiter)
- [halibobor/log4j2](https://github.com/halibobor/log4j2)
@ -3845,7 +3848,26 @@ Apache Log4j2 &lt;=2.14.1 JNDI features used in configuration, log messages, and
- [lov3r/cve-2021-44228-log4j-exploits](https://github.com/lov3r/cve-2021-44228-log4j-exploits)
- [sinakeshmiri/log4jScan](https://github.com/sinakeshmiri/log4jScan)
- [0xDexter0us/Log4J-Scanner](https://github.com/0xDexter0us/Log4J-Scanner)
- [LutziGoz/Log4Shell_Exploitation-Vulnerabiliy__CVE-2021-44228](https://github.com/LutziGoz/Log4Shell_Exploitation-Vulnerabiliy__CVE-2021-44228)
- [0xsyr0/CVE-2021-44228-log4j-log4shell-Security-Research-Summary](https://github.com/0xsyr0/CVE-2021-44228-log4j-log4shell-Security-Research-Summary)
- [ahmad4fifz/CVE-2021-44228-podman](https://github.com/ahmad4fifz/CVE-2021-44228-podman)
- [jeffli1024/log4j-rce-test](https://github.com/jeffli1024/log4j-rce-test)
- [zsolt-halo/CVE-2021-44228-Spring-Boot-Test-Service](https://github.com/zsolt-halo/CVE-2021-44228-Spring-Boot-Test-Service)
- [manuel-alvarez-alvarez/log4j-cve-2021-44228](https://github.com/manuel-alvarez-alvarez/log4j-cve-2021-44228)
- [VNYui/CVE-2021-44228](https://github.com/VNYui/CVE-2021-44228)
- [flxhaas/Scan-CVE-2021-44228](https://github.com/flxhaas/Scan-CVE-2021-44228)
- [justakazh/Log4j-CVE-2021-44228](https://github.com/justakazh/Log4j-CVE-2021-44228)
- [irgoncalves/f5-waf-quick-patch-cve-2021-44228](https://github.com/irgoncalves/f5-waf-quick-patch-cve-2021-44228)
- [AdriDevelopsThings/check-log4j-vulnerability](https://github.com/AdriDevelopsThings/check-log4j-vulnerability)
- [madCdan/JndiLookup](https://github.com/madCdan/JndiLookup)
- [AlexandreHeroux/Fix-CVE-2021-44228](https://github.com/AlexandreHeroux/Fix-CVE-2021-44228)
- [kossatzd/log4j-CVE-2021-44228-test](https://github.com/kossatzd/log4j-CVE-2021-44228-test)
- [tobiasoed/log4j-CVE-2021-44228](https://github.com/tobiasoed/log4j-CVE-2021-44228)
- [p3dr16k/log4j-1.2.15-mod](https://github.com/p3dr16k/log4j-1.2.15-mod)
- [claranet/ansible-role-log4shell](https://github.com/claranet/ansible-role-log4shell)
- [taurusxin/CVE-2021-44228](https://github.com/taurusxin/CVE-2021-44228)
- [Chelsea486MHz/ftp_over_log4j](https://github.com/Chelsea486MHz/ftp_over_log4j)
- [yanghaoi/CVE-2021-44228_Log4Shell](https://github.com/yanghaoi/CVE-2021-44228_Log4Shell)
### CVE-2021-44827
- [full-disclosure/CVE-2021-44827](https://github.com/full-disclosure/CVE-2021-44827)
@ -16218,7 +16240,7 @@ An unprivileged network attacker could gain system privileges to provisioned Int
Firmware in the Intel Puma 5, 6, and 7 Series might experience resource depletion or timeout, which allows a network attacker to create a denial of service via crafted network traffic.
</code>
- [TransLunarInjection/Puma6Fail](https://github.com/TransLunarInjection/Puma6Fail)
- [LunNova/Puma6Fail](https://github.com/LunNova/Puma6Fail)
### CVE-2017-5715 (2018-01-04)