Auto Update 2024/04/23 00:33:33

This commit is contained in:
motikan2010-bot 2024-04-23 09:33:33 +09:00
parent 05f1729264
commit 85624e1867
26 changed files with 236 additions and 78 deletions

View file

@ -13,10 +13,10 @@
"description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ",
"fork": false,
"created_at": "2017-10-05T23:41:52Z",
"updated_at": "2024-04-21T13:36:38Z",
"updated_at": "2024-04-22T18:17:08Z",
"pushed_at": "2017-10-11T07:43:50Z",
"stargazers_count": 380,
"watchers_count": 380,
"stargazers_count": 381,
"watchers_count": 381,
"has_discussions": false,
"forks_count": 125,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 125,
"watchers": 380,
"watchers": 381,
"score": 0,
"subscribers_count": 14
},

View file

@ -303,5 +303,35 @@
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 790447827,
"name": "CVE-2018-14847-EXPLOIT",
"full_name": "K3ysTr0K3R\/CVE-2018-14847-EXPLOIT",
"owner": {
"login": "K3ysTr0K3R",
"id": 70909693,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
"html_url": "https:\/\/github.com\/K3ysTr0K3R"
},
"html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2018-14847-EXPLOIT",
"description": null,
"fork": false,
"created_at": "2024-04-22T22:33:25Z",
"updated_at": "2024-04-22T22:38:31Z",
"pushed_at": "2024-04-22T22:38:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,10 +43,10 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2024-04-12T09:09:52Z",
"updated_at": "2024-04-22T19:54:38Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 637,
"watchers_count": 637,
"stargazers_count": 638,
"watchers_count": 638,
"has_discussions": false,
"forks_count": 130,
"allow_forking": true,
@ -68,7 +68,7 @@
],
"visibility": "public",
"forks": 130,
"watchers": 637,
"watchers": 638,
"score": 0,
"subscribers_count": 16
},

View file

@ -13,7 +13,7 @@
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
"fork": false,
"created_at": "2018-04-28T11:50:00Z",
"updated_at": "2024-04-09T11:48:33Z",
"updated_at": "2024-04-22T21:24:31Z",
"pushed_at": "2022-12-11T10:44:39Z",
"stargazers_count": 514,
"watchers_count": 514,

View file

@ -3121,7 +3121,7 @@
"forks": 20,
"watchers": 119,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
},
{
"id": 247883778,

View file

@ -57,6 +57,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -79,10 +79,10 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2024-04-22T02:34:46Z",
"updated_at": "2024-04-22T19:04:59Z",
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1914,
"watchers_count": 1914,
"stargazers_count": 1913,
"watchers_count": 1913,
"has_discussions": false,
"forks_count": 509,
"allow_forking": true,
@ -91,7 +91,7 @@
"topics": [],
"visibility": "public",
"forks": 509,
"watchers": 1914,
"watchers": 1913,
"score": 0,
"subscribers_count": 21
},
@ -943,7 +943,7 @@
"stargazers_count": 982,
"watchers_count": 982,
"has_discussions": false,
"forks_count": 181,
"forks_count": 180,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -951,7 +951,7 @@
"cve-2021-4034"
],
"visibility": "public",
"forks": 181,
"forks": 180,
"watchers": 982,
"score": 0,
"subscribers_count": 14
@ -1305,10 +1305,10 @@
"description": "Python exploit code for CVE-2021-4034 (pwnkit)",
"fork": false,
"created_at": "2022-01-26T17:53:16Z",
"updated_at": "2024-04-21T19:35:44Z",
"updated_at": "2024-04-22T18:58:47Z",
"pushed_at": "2022-01-28T00:29:15Z",
"stargazers_count": 134,
"watchers_count": 134,
"stargazers_count": 135,
"watchers_count": 135,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -1317,7 +1317,7 @@
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 134,
"watchers": 135,
"score": 0,
"subscribers_count": 2
},

View file

@ -168,13 +168,13 @@
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 13,
"score": 0,
"subscribers_count": 2

View file

@ -10625,6 +10625,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 446218653,
"name": "log4jhound",
"full_name": "mebibite\/log4jhound",
"owner": {
"login": "mebibite",
"id": 54244269,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54244269?v=4",
"html_url": "https:\/\/github.com\/mebibite"
},
"html_url": "https:\/\/github.com\/mebibite\/log4jhound",
"description": "Created after the disclosure of CVE-2021-44228. Bash script that detects Log4j occurrences in your projects and systems, allowing you to get insight on versions used. Unpacks JARs and analyses their Manifest files.",
"fork": false,
"created_at": "2022-01-09T22:34:49Z",
"updated_at": "2024-04-22T19:41:40Z",
"pushed_at": "2022-04-01T00:43:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 447404470,
"name": "log4shell",

View file

@ -18,13 +18,13 @@
"stargazers_count": 152,
"watchers_count": 152,
"has_discussions": false,
"forks_count": 31,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 31,
"forks": 32,
"watchers": 152,
"score": 0,
"subscribers_count": 12

View file

@ -496,10 +496,10 @@
"html_url": "https:\/\/github.com\/mebibite"
},
"html_url": "https:\/\/github.com\/mebibite\/springhound",
"description": "Created after the release of CVE-2022-22965 and CVE-2022-22963. Bash script that detects Spring Framework occurrences in your projects and systems, allowing you to get insight on versions used. Unpacks JARs and analyzes their Manifest files.",
"description": "Created after the disclosure of CVE-2022-22965 and CVE-2022-22963. Bash script that detects Spring Framework occurrences in your projects and systems, allowing you to get insight on versions used. Unpacks JARs and analyses their Manifest files.",
"fork": false,
"created_at": "2022-04-01T00:34:29Z",
"updated_at": "2022-04-01T00:47:30Z",
"updated_at": "2024-04-22T19:41:50Z",
"pushed_at": "2022-04-01T00:42:35Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -43,10 +43,10 @@
"description": "exploit for f5-big-ip RCE cve-2023-46747",
"fork": false,
"created_at": "2023-11-01T09:31:05Z",
"updated_at": "2024-04-22T01:14:46Z",
"updated_at": "2024-04-22T23:01:04Z",
"pushed_at": "2024-03-26T03:01:04Z",
"stargazers_count": 180,
"watchers_count": 180,
"stargazers_count": 181,
"watchers_count": 181,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 45,
"watchers": 180,
"watchers": 181,
"score": 0,
"subscribers_count": 2
},

View file

@ -77,10 +77,10 @@
"description": "An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.",
"fork": false,
"created_at": "2024-01-16T19:40:59Z",
"updated_at": "2024-04-12T04:31:49Z",
"updated_at": "2024-04-22T19:58:10Z",
"pushed_at": "2024-01-17T19:14:09Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -89,7 +89,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 14,
"watchers": 15,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-04-22T14:44:53Z",
"updated_at": "2024-04-22T18:39:04Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 1872,
"watchers_count": 1872,
"stargazers_count": 1873,
"watchers_count": 1873,
"has_discussions": false,
"forks_count": 232,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 232,
"watchers": 1872,
"watchers": 1873,
"score": 0,
"subscribers_count": 19
},

View file

@ -13,10 +13,10 @@
"description": "This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.",
"fork": false,
"created_at": "2024-04-12T15:07:42Z",
"updated_at": "2024-04-22T15:49:15Z",
"updated_at": "2024-04-22T19:15:35Z",
"pushed_at": "2024-04-18T14:31:34Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 24,
"watchers": 26,
"score": 0,
"subscribers_count": 5
}

View file

@ -13,10 +13,10 @@
"description": "Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability",
"fork": false,
"created_at": "2024-04-22T07:05:04Z",
"updated_at": "2024-04-22T18:27:28Z",
"updated_at": "2024-04-23T00:19:14Z",
"pushed_at": "2024-04-22T10:08:45Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 33,
"watchers": 44,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
"fork": false,
"created_at": "2024-04-13T05:53:02Z",
"updated_at": "2024-04-22T15:26:07Z",
"updated_at": "2024-04-23T00:34:31Z",
"pushed_at": "2024-04-16T21:00:14Z",
"stargazers_count": 194,
"watchers_count": 194,
"stargazers_count": 195,
"watchers_count": 195,
"has_discussions": false,
"forks_count": 44,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 194,
"watchers": 195,
"score": 0,
"subscribers_count": 2
},

View file

@ -43,10 +43,10 @@
"description": "PoC and Detection for CVE-2024-21626",
"fork": false,
"created_at": "2024-02-01T15:28:37Z",
"updated_at": "2024-04-22T14:03:20Z",
"updated_at": "2024-04-22T20:22:26Z",
"pushed_at": "2024-02-06T16:09:05Z",
"stargazers_count": 59,
"watchers_count": 59,
"stargazers_count": 60,
"watchers_count": 60,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 59,
"watchers": 60,
"score": 0,
"subscribers_count": 3
},

View file

@ -73,10 +73,10 @@
"description": "out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability ",
"fork": false,
"created_at": "2024-03-13T09:17:28Z",
"updated_at": "2024-04-22T16:58:41Z",
"updated_at": "2024-04-22T21:26:46Z",
"pushed_at": "2024-03-16T00:35:12Z",
"stargazers_count": 90,
"watchers_count": 90,
"stargazers_count": 91,
"watchers_count": 91,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 90,
"watchers": 91,
"score": 0,
"subscribers_count": 5
},

View file

@ -43,10 +43,10 @@
"description": "An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.",
"fork": false,
"created_at": "2024-01-16T19:40:59Z",
"updated_at": "2024-04-12T04:31:49Z",
"updated_at": "2024-04-22T19:58:10Z",
"pushed_at": "2024-01-17T19:14:09Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 14,
"watchers": 15,
"score": 0,
"subscribers_count": 2
},

42
2024/CVE-2024-27199.json Normal file
View file

@ -0,0 +1,42 @@
[
{
"id": 790442683,
"name": "RCity-CVE-2024-27199",
"full_name": "Stuub\/RCity-CVE-2024-27199",
"owner": {
"login": "Stuub",
"id": 60468836,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60468836?v=4",
"html_url": "https:\/\/github.com\/Stuub"
},
"html_url": "https:\/\/github.com\/Stuub\/RCity-CVE-2024-27199",
"description": "CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information",
"fork": false,
"created_at": "2024-04-22T22:14:24Z",
"updated_at": "2024-04-22T23:21:25Z",
"pushed_at": "2024-04-22T23:21:21Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"code-injection",
"cve",
"cve-2024-27199",
"jetbrains",
"owasp",
"python",
"python3",
"rce",
"teamcity"
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Proof of concept (PoC) for CVE-2024-27316 (tested), CVE-2024-30255 (untested), CVE-2024-31309 (untested), CVE-2024-28182 (untested), CVE-2024-2653 (untested) and CVE-2024-27919 (untested)",
"fork": false,
"created_at": "2024-04-09T08:08:07Z",
"updated_at": "2024-04-19T06:14:22Z",
"updated_at": "2024-04-22T22:47:15Z",
"pushed_at": "2024-04-13T09:02:39Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 2
},

View file

@ -1012,10 +1012,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-04-22T18:31:15Z",
"updated_at": "2024-04-22T21:45:38Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3412,
"watchers_count": 3412,
"stargazers_count": 3414,
"watchers_count": 3414,
"has_discussions": false,
"forks_count": 228,
"allow_forking": true,
@ -1024,7 +1024,7 @@
"topics": [],
"visibility": "public",
"forks": 228,
"watchers": 3412,
"watchers": 3414,
"score": 0,
"subscribers_count": 36
},

View file

@ -283,7 +283,7 @@
"description": "CVE-2024-3400 Palo Alto OS Command Injection",
"fork": false,
"created_at": "2024-04-16T14:18:08Z",
"updated_at": "2024-04-22T16:55:16Z",
"updated_at": "2024-04-22T21:37:50Z",
"pushed_at": "2024-04-16T22:35:43Z",
"stargazers_count": 110,
"watchers_count": 110,
@ -313,10 +313,10 @@
"description": "CVE-2024-3400-RCE",
"fork": false,
"created_at": "2024-04-16T16:18:56Z",
"updated_at": "2024-04-22T14:53:06Z",
"updated_at": "2024-04-22T20:43:30Z",
"pushed_at": "2024-04-22T08:50:27Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -325,7 +325,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 23,
"watchers": 25,
"score": 0,
"subscribers_count": 3
},

32
2024/CVE-2024-4040.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 790463482,
"name": "CVE-2024-4040",
"full_name": "qt2a23\/CVE-2024-4040",
"owner": {
"login": "qt2a23",
"id": 153017777,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153017777?v=4",
"html_url": "https:\/\/github.com\/qt2a23"
},
"html_url": "https:\/\/github.com\/qt2a23\/CVE-2024-4040",
"description": "Exploit Tool to CrushFTP",
"fork": false,
"created_at": "2024-04-22T23:30:28Z",
"updated_at": "2024-04-22T23:40:28Z",
"pushed_at": "2024-04-22T23:40:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -411,6 +411,13 @@
- [stronglier/CVE-2024-3400](https://github.com/stronglier/CVE-2024-3400)
- [Kr0ff/cve-2024-3400](https://github.com/Kr0ff/cve-2024-3400)
### CVE-2024-4040 (2024-04-22)
<code>VFS Sandbox Escape in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows remote attackers with low privileges to read files from the filesystem outside of VFS Sandbox.\n
</code>
- [qt2a23/CVE-2024-4040](https://github.com/qt2a23/CVE-2024-4040)
### CVE-2024-12883
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
@ -1276,6 +1283,13 @@
- [K3ysTr0K3R/CVE-2024-27198-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2024-27198-EXPLOIT)
- [Shimon03/Explora-o-RCE-n-o-autenticado-JetBrains-TeamCity-CVE-2024-27198-](https://github.com/Shimon03/Explora-o-RCE-n-o-autenticado-JetBrains-TeamCity-CVE-2024-27198-)
### CVE-2024-27199 (2024-03-04)
<code>In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible
</code>
- [Stuub/RCity-CVE-2024-27199](https://github.com/Stuub/RCity-CVE-2024-27199)
### CVE-2024-27316 (2024-04-04)
<code>HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.
@ -1544,14 +1558,22 @@
### CVE-2024-32205
- [Lucky-lm/CVE-2024-32205](https://github.com/Lucky-lm/CVE-2024-32205)
### CVE-2024-32238
### CVE-2024-32238 (2024-04-22)
<code>H3C ER8300G2-X is vulnerable to Incorrect Access Control. The password for the router's management system can be accessed via the management system page login interface.
</code>
- [asdfjkl11/CVE-2024-32238](https://github.com/asdfjkl11/CVE-2024-32238)
- [FuBoLuSec/CVE-2024-32238](https://github.com/FuBoLuSec/CVE-2024-32238)
### CVE-2024-32258
- [liyansong2018/CVE-2024-32258](https://github.com/liyansong2018/CVE-2024-32258)
### CVE-2024-32399
### CVE-2024-32399 (2024-04-22)
<code>Directory Traversal vulnerability in RaidenMAILD Mail Server v.4.9.4 and before allows a remote attacker to obtain sensitive information via the /webeditor/ component.
</code>
- [NN0b0dy/CVE-2024-32399](https://github.com/NN0b0dy/CVE-2024-32399)
### CVE-2024-65230
@ -21580,6 +21602,7 @@
- [mr-vill4in/log4j-fuzzer](https://github.com/mr-vill4in/log4j-fuzzer)
- [nix-xin/vuln4japi](https://github.com/nix-xin/vuln4japi)
- [maximofernandezriera/CVE-2021-44228](https://github.com/maximofernandezriera/CVE-2021-44228)
- [mebibite/log4jhound](https://github.com/mebibite/log4jhound)
- [jxerome/log4shell](https://github.com/jxerome/log4shell)
- [solitarysp/Log4j-CVE-2021-44228](https://github.com/solitarysp/Log4j-CVE-2021-44228)
- [atlassion/log4j-exploit-builder](https://github.com/atlassion/log4j-exploit-builder)
@ -33735,6 +33758,7 @@
- [yukar1z0e/CVE-2018-14847](https://github.com/yukar1z0e/CVE-2018-14847)
- [hacker30468/Mikrotik-router-hack](https://github.com/hacker30468/Mikrotik-router-hack)
- [babyshen/routeros-CVE-2018-14847-bytheway](https://github.com/babyshen/routeros-CVE-2018-14847-bytheway)
- [K3ysTr0K3R/CVE-2018-14847-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2018-14847-EXPLOIT)
### CVE-2018-14879 (2019-10-03)