Auto Update 2024/11/13 06:31:50

This commit is contained in:
motikan2010-bot 2024-11-13 15:31:50 +09:00
parent 47f5033360
commit 9876880065
40 changed files with 199 additions and 127 deletions

View file

@ -184,5 +184,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 887626775,
"name": "CVE-2013-0156",
"full_name": "oxBEN10\/CVE-2013-0156",
"owner": {
"login": "oxBEN10",
"id": 119909271,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119909271?v=4",
"html_url": "https:\/\/github.com\/oxBEN10",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/oxBEN10\/CVE-2013-0156",
"description": "This script is specifically designed to solve the challenge on PentesterLab for the CVE-2013-0156 exploit",
"fork": false,
"created_at": "2024-11-13T02:10:20Z",
"updated_at": "2024-11-13T03:58:26Z",
"pushed_at": "2024-11-13T03:58:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1454,13 +1454,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 4,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 3,
"watchers": 1,
"score": 0,
"subscribers_count": 4

View file

@ -14,10 +14,10 @@
"description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)",
"fork": false,
"created_at": "2017-07-16T19:44:04Z",
"updated_at": "2024-10-28T18:13:55Z",
"updated_at": "2024-11-13T00:06:38Z",
"pushed_at": "2024-07-31T13:54:45Z",
"stargazers_count": 322,
"watchers_count": 322,
"stargazers_count": 323,
"watchers_count": 323,
"has_discussions": false,
"forks_count": 105,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 105,
"watchers": 322,
"watchers": 323,
"score": 0,
"subscribers_count": 22
},

View file

@ -414,15 +414,15 @@
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/lizhianyuguangming\/TomcatScanPro",
"description": "最新tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-11-12T15:06:59Z",
"pushed_at": "2024-11-12T08:25:48Z",
"stargazers_count": 123,
"watchers_count": 123,
"updated_at": "2024-11-13T03:20:29Z",
"pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 125,
"watchers_count": 125,
"has_discussions": false,
"forks_count": 8,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -436,8 +436,8 @@
"tools"
],
"visibility": "public",
"forks": 8,
"watchers": 123,
"forks": 11,
"watchers": 125,
"score": 0,
"subscribers_count": 2
}

View file

@ -14,10 +14,10 @@
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
"fork": false,
"created_at": "2018-01-04T00:28:50Z",
"updated_at": "2024-11-06T01:07:29Z",
"updated_at": "2024-11-13T02:15:13Z",
"pushed_at": "2018-01-10T01:14:44Z",
"stargazers_count": 757,
"watchers_count": 757,
"stargazers_count": 758,
"watchers_count": 758,
"has_discussions": false,
"forks_count": 171,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 171,
"watchers": 757,
"watchers": 758,
"score": 0,
"subscribers_count": 41
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2020-15368, aka \"How to exploit a vulnerable driver\"",
"fork": false,
"created_at": "2021-06-29T04:38:24Z",
"updated_at": "2024-11-07T15:31:55Z",
"updated_at": "2024-11-13T02:07:46Z",
"pushed_at": "2022-04-14T03:17:44Z",
"stargazers_count": 439,
"watchers_count": 439,
"stargazers_count": 440,
"watchers_count": 440,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 45,
"watchers": 439,
"watchers": 440,
"score": 0,
"subscribers_count": 6
},

View file

@ -978,15 +978,15 @@
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/lizhianyuguangming\/TomcatScanPro",
"description": "最新tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-11-12T15:06:59Z",
"pushed_at": "2024-11-12T08:25:48Z",
"stargazers_count": 123,
"watchers_count": 123,
"updated_at": "2024-11-13T03:20:29Z",
"pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 125,
"watchers_count": 125,
"has_discussions": false,
"forks_count": 8,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1000,8 +1000,8 @@
"tools"
],
"visibility": "public",
"forks": 8,
"watchers": 123,
"forks": 11,
"watchers": 125,
"score": 0,
"subscribers_count": 2
}

View file

@ -60,5 +60,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 887599149,
"name": "cve-2021-21425",
"full_name": "bluetoothStrawberry\/cve-2021-21425",
"owner": {
"login": "bluetoothStrawberry",
"id": 154050956,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154050956?v=4",
"html_url": "https:\/\/github.com\/bluetoothStrawberry",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/bluetoothStrawberry\/cve-2021-21425",
"description": "working exploit for the old cve-2021-21425 grav cms 1.7.10 vuln",
"fork": false,
"created_at": "2024-11-13T00:30:59Z",
"updated_at": "2024-11-13T00:39:22Z",
"pushed_at": "2024-11-13T00:39:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -848,10 +848,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-11-12T06:46:27Z",
"updated_at": "2024-11-13T05:35:35Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1325,
"watchers_count": 1325,
"stargazers_count": 1327,
"watchers_count": 1327,
"has_discussions": false,
"forks_count": 164,
"allow_forking": true,
@ -867,7 +867,7 @@
],
"visibility": "public",
"forks": 164,
"watchers": 1325,
"watchers": 1327,
"score": 0,
"subscribers_count": 15
}

View file

@ -96,7 +96,7 @@
"forks": 66,
"watchers": 257,
"score": 0,
"subscribers_count": 10
"subscribers_count": 11
},
{
"id": 382645654,

View file

@ -107,10 +107,10 @@
"description": "Remote Code Injection In Log4j",
"fork": false,
"created_at": "2021-12-10T05:23:44Z",
"updated_at": "2024-10-22T14:33:22Z",
"updated_at": "2024-11-13T02:00:05Z",
"pushed_at": "2022-01-18T12:01:52Z",
"stargazers_count": 459,
"watchers_count": 459,
"stargazers_count": 460,
"watchers_count": 460,
"has_discussions": false,
"forks_count": 124,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 124,
"watchers": 459,
"watchers": 460,
"score": 0,
"subscribers_count": 8
},
@ -3891,7 +3891,7 @@
"forks": 4,
"watchers": 1,
"score": 0,
"subscribers_count": 40
"subscribers_count": 41
},
{
"id": 437774679,
@ -10648,37 +10648,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 444967250,
"name": "Log4jHorizon",
"full_name": "puzzlepeaches\/Log4jHorizon",
"owner": {
"login": "puzzlepeaches",
"id": 8538866,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8538866?v=4",
"html_url": "https:\/\/github.com\/puzzlepeaches",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/puzzlepeaches\/Log4jHorizon",
"description": "Exploiting CVE-2021-44228 in VMWare Horizon for remote code execution and more.",
"fork": false,
"created_at": "2022-01-05T22:25:42Z",
"updated_at": "2024-10-29T16:09:59Z",
"pushed_at": "2022-01-10T19:26:59Z",
"stargazers_count": 120,
"watchers_count": 120,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 120,
"score": 0,
"subscribers_count": 6
},
{
"id": 445474259,
"name": "log4jshell_CVE-2021-44228",

View file

@ -19,13 +19,13 @@
"stargazers_count": 278,
"watchers_count": 278,
"has_discussions": false,
"forks_count": 47,
"forks_count": 48,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 47,
"forks": 48,
"watchers": 278,
"score": 0,
"subscribers_count": 9

View file

@ -374,6 +374,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -19,13 +19,13 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 4,
"score": 0,
"subscribers_count": 1

View file

@ -792,10 +792,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-11-12T06:46:27Z",
"updated_at": "2024-11-13T05:35:35Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1325,
"watchers_count": 1325,
"stargazers_count": 1327,
"watchers_count": 1327,
"has_discussions": false,
"forks_count": 164,
"allow_forking": true,
@ -811,7 +811,7 @@
],
"visibility": "public",
"forks": 164,
"watchers": 1325,
"watchers": 1327,
"score": 0,
"subscribers_count": 15
}

View file

@ -107,10 +107,10 @@
"description": "CVE-2022-25845(fastjson1.2.80) exploit in Spring Env!",
"fork": false,
"created_at": "2024-11-07T13:06:44Z",
"updated_at": "2024-11-12T06:47:44Z",
"updated_at": "2024-11-13T04:15:05Z",
"pushed_at": "2024-11-07T13:38:18Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 60,
"watchers_count": 60,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 58,
"watchers": 60,
"score": 0,
"subscribers_count": 3
}

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2022-07-06T17:29:04Z",
"updated_at": "2024-11-05T13:11:56Z",
"updated_at": "2024-11-13T06:21:54Z",
"pushed_at": "2022-08-30T13:23:51Z",
"stargazers_count": 276,
"watchers_count": 276,
"stargazers_count": 277,
"watchers_count": 277,
"has_discussions": false,
"forks_count": 51,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 51,
"watchers": 276,
"watchers": 277,
"score": 0,
"subscribers_count": 15
},

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -19,13 +19,13 @@
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 11,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"forks": 10,
"watchers": 43,
"score": 0,
"subscribers_count": 4

View file

@ -49,10 +49,10 @@
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
"fork": false,
"created_at": "2023-05-22T03:06:31Z",
"updated_at": "2024-11-07T04:28:25Z",
"updated_at": "2024-11-13T02:45:12Z",
"pushed_at": "2024-08-24T13:38:50Z",
"stargazers_count": 268,
"watchers_count": 268,
"stargazers_count": 269,
"watchers_count": 269,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -69,7 +69,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 268,
"watchers": 269,
"score": 0,
"subscribers_count": 4
},

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -19,13 +19,13 @@
"stargazers_count": 1261,
"watchers_count": 1261,
"has_discussions": false,
"forks_count": 212,
"forks_count": 213,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 212,
"forks": 213,
"watchers": 1261,
"score": 0,
"subscribers_count": 20

View file

@ -14,10 +14,10 @@
"description": "Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. ",
"fork": false,
"created_at": "2023-10-24T17:19:32Z",
"updated_at": "2024-10-17T08:29:08Z",
"updated_at": "2024-11-13T03:21:39Z",
"pushed_at": "2023-10-26T14:16:05Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 73,
"watchers_count": 73,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -42,7 +42,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 72,
"watchers": 73,
"score": 0,
"subscribers_count": 2
},

View file

@ -76,7 +76,7 @@
"description": "利用 CVE-2024-0044 Android 权限提升下载任意目标App沙箱文件。",
"fork": false,
"created_at": "2024-07-03T10:29:06Z",
"updated_at": "2024-10-17T10:07:47Z",
"updated_at": "2024-11-13T03:17:51Z",
"pushed_at": "2024-09-03T09:31:58Z",
"stargazers_count": 5,
"watchers_count": 5,

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -19,13 +19,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -133,6 +133,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -1128,6 +1128,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -45,10 +45,10 @@
"description": "Zimbra - Remote Command Execution (CVE-2024-45519)",
"fork": false,
"created_at": "2024-10-05T00:15:18Z",
"updated_at": "2024-11-12T06:22:54Z",
"updated_at": "2024-11-13T05:50:01Z",
"pushed_at": "2024-11-05T10:10:40Z",
"stargazers_count": 113,
"watchers_count": 113,
"stargazers_count": 114,
"watchers_count": 114,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 113,
"watchers": 114,
"score": 0,
"subscribers_count": 3
},

View file

@ -169,10 +169,10 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false,
"created_at": "2024-06-07T09:52:54Z",
"updated_at": "2024-11-11T10:00:23Z",
"updated_at": "2024-11-13T02:32:01Z",
"pushed_at": "2024-06-22T15:13:52Z",
"stargazers_count": 227,
"watchers_count": 227,
"stargazers_count": 228,
"watchers_count": 228,
"has_discussions": false,
"forks_count": 50,
"allow_forking": true,
@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 227,
"watchers": 228,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,8 +14,8 @@
"description": "CVE-2024-47062 PoC",
"fork": false,
"created_at": "2024-11-10T01:10:06Z",
"updated_at": "2024-11-11T23:32:40Z",
"pushed_at": "2024-11-11T18:18:09Z",
"updated_at": "2024-11-13T02:17:35Z",
"pushed_at": "2024-11-13T02:17:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

33
2024/CVE-2024-50986.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 887656070,
"name": "CVE-2024-50986",
"full_name": "riftsandroses\/CVE-2024-50986",
"owner": {
"login": "riftsandroses",
"id": 63180210,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63180210?v=4",
"html_url": "https:\/\/github.com\/riftsandroses",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/riftsandroses\/CVE-2024-50986",
"description": "An issue in Clementine v.1.3.1 allows a local attacker to execute arbitrary code via a crafted DLL file (DLL Hijacking)",
"fork": false,
"created_at": "2024-11-13T03:49:07Z",
"updated_at": "2024-11-13T04:25:27Z",
"pushed_at": "2024-11-13T04:25:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1930,7 +1930,11 @@
- [bevennyamande/CVE-2024-10605](https://github.com/bevennyamande/CVE-2024-10605)
### CVE-2024-10629
### CVE-2024-10629 (2024-11-13)
<code>The GPX Viewer plugin for WordPress is vulnerable to arbitrary file creation due to a missing capability check and file type validation in the gpxv_file_upload() function in all versions up to, and including, 2.2.8. This makes it possible for authenticated attackers, with subscriber-level access and above, to create arbitrary files on the affected site's server which may make remote code execution possible.
</code>
- [RandomRobbieBF/CVE-2024-10629](https://github.com/RandomRobbieBF/CVE-2024-10629)
### CVE-2024-10654 (2024-11-01)
@ -6437,6 +6441,9 @@
### CVE-2024-50972
- [Akhlak2511/CVE-2024-50972](https://github.com/Akhlak2511/CVE-2024-50972)
### CVE-2024-50986
- [riftsandroses/CVE-2024-50986](https://github.com/riftsandroses/CVE-2024-50986)
### CVE-2024-51026 (2024-11-11)
<code>The NetAdmin IAM system (version 4.0.30319) has a Cross Site Scripting (XSS) vulnerability in the /BalloonSave.ashx endpoint, where it is possible to inject a malicious payload into the Content= field.
@ -23221,6 +23228,7 @@
- [CsEnox/CVE-2021-21425](https://github.com/CsEnox/CVE-2021-21425)
- [frknktlca/GravCMS_Nmap_Script](https://github.com/frknktlca/GravCMS_Nmap_Script)
- [bluetoothStrawberry/cve-2021-21425](https://github.com/bluetoothStrawberry/cve-2021-21425)
### CVE-2021-21514 (2021-03-02)
@ -27750,7 +27758,6 @@
- [4jfinder/4jfinder.github.io](https://github.com/4jfinder/4jfinder.github.io)
- [alexpena5635/CVE-2021-44228_scanner-main-Modified-](https://github.com/alexpena5635/CVE-2021-44228_scanner-main-Modified-)
- [ChandanShastri/Log4j_Vulnerability_Demo](https://github.com/ChandanShastri/Log4j_Vulnerability_Demo)
- [puzzlepeaches/Log4jHorizon](https://github.com/puzzlepeaches/Log4jHorizon)
- [Vulnmachines/log4jshell_CVE-2021-44228](https://github.com/Vulnmachines/log4jshell_CVE-2021-44228)
- [mr-vill4in/log4j-fuzzer](https://github.com/mr-vill4in/log4j-fuzzer)
- [mebibite/log4jhound](https://github.com/mebibite/log4jhound)
@ -46655,6 +46662,7 @@
- [bsodmike/rails-exploit-cve-2013-0156](https://github.com/bsodmike/rails-exploit-cve-2013-0156)
- [R3dKn33-zz/CVE-2013-0156](https://github.com/R3dKn33-zz/CVE-2013-0156)
- [Jjdt12/kuang_grade_mk11](https://github.com/Jjdt12/kuang_grade_mk11)
- [oxBEN10/CVE-2013-0156](https://github.com/oxBEN10/CVE-2013-0156)
### CVE-2013-0212 (2013-02-24)