Auto Update 2021/12/16 00:14:10

This commit is contained in:
motikan2010-bot 2021-12-16 09:14:10 +09:00
parent c1ad4e03b2
commit c6f66956fa
26 changed files with 639 additions and 413 deletions

View file

@ -80,33 +80,6 @@
"watchers": 14,
"score": 0
},
{
"id": 29942046,
"name": "ghost",
"full_name": "piyokango\/ghost",
"owner": {
"login": "piyokango",
"id": 10733273,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10733273?v=4",
"html_url": "https:\/\/github.com\/piyokango"
},
"html_url": "https:\/\/github.com\/piyokango\/ghost",
"description": "glibc vulnerability GHOST(CVE-2015-0235) Affected software list",
"fork": false,
"created_at": "2015-01-28T00:14:35Z",
"updated_at": "2015-08-13T21:27:35Z",
"pushed_at": "2015-01-28T14:29:13Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 29950345,
"name": "CVE-2015-0235_GHOST",
@ -134,33 +107,6 @@
"watchers": 3,
"score": 0
},
{
"id": 29988916,
"name": "ansible-CVE-2015-0235-GHOST",
"full_name": "adherzog\/ansible-CVE-2015-0235-GHOST",
"owner": {
"login": "adherzog",
"id": 1744181,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1744181?v=4",
"html_url": "https:\/\/github.com\/adherzog"
},
"html_url": "https:\/\/github.com\/adherzog\/ansible-CVE-2015-0235-GHOST",
"description": "Ansible playbook, to check for CVE-2015-0235 (GHOST) vulnerability",
"fork": false,
"created_at": "2015-01-28T21:22:33Z",
"updated_at": "2015-01-28T21:23:35Z",
"pushed_at": "2015-01-28T21:23:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 29993101,
"name": "lenny-libc6",
@ -269,33 +215,6 @@
"watchers": 0,
"score": 0
},
{
"id": 30059704,
"name": "ghosttester",
"full_name": "JustDenisYT\/ghosttester",
"owner": {
"login": "JustDenisYT",
"id": 9379272,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9379272?v=4",
"html_url": "https:\/\/github.com\/JustDenisYT"
},
"html_url": "https:\/\/github.com\/JustDenisYT\/ghosttester",
"description": "Script to test vulnarability for CVE-2015-0235",
"fork": false,
"created_at": "2015-01-30T06:37:06Z",
"updated_at": "2015-02-04T08:03:37Z",
"pushed_at": "2015-02-04T08:03:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 30066365,
"name": "CVE-2015-0235",

View file

@ -67,17 +67,17 @@
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
"fork": false,
"created_at": "2016-10-21T11:19:21Z",
"updated_at": "2021-12-14T10:57:22Z",
"updated_at": "2021-12-15T23:59:06Z",
"pushed_at": "2021-02-03T16:03:40Z",
"stargazers_count": 885,
"watchers_count": 885,
"stargazers_count": 886,
"watchers_count": 886,
"forks_count": 410,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 410,
"watchers": 885,
"watchers": 886,
"score": 0
},
{

View file

@ -736,7 +736,7 @@
"description": "SignHere is implementation of CVE-2017-11882. SignHere is builder of malicious rtf document and VBScript payloads.",
"fork": false,
"created_at": "2021-01-25T12:44:03Z",
"updated_at": "2021-09-03T18:54:10Z",
"updated_at": "2021-12-15T21:41:29Z",
"pushed_at": "2021-01-26T16:29:27Z",
"stargazers_count": 5,
"watchers_count": 5,

View file

@ -211,12 +211,12 @@
"pushed_at": "2017-04-05T23:29:03Z",
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 50,
"forks_count": 51,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 50,
"forks": 51,
"watchers": 47,
"score": 0
},

View file

@ -17,7 +17,7 @@
"pushed_at": "2018-12-12T22:11:45Z",
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [
@ -26,7 +26,7 @@
"web-security"
],
"visibility": "public",
"forks": 7,
"forks": 8,
"watchers": 38,
"score": 0
}

View file

@ -233,7 +233,7 @@
"pushed_at": "2021-06-04T18:15:44Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [
@ -245,7 +245,7 @@
"exploit"
],
"visibility": "public",
"forks": 7,
"forks": 8,
"watchers": 15,
"score": 0
},

View file

@ -40,11 +40,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-12-15T14:38:47Z",
"updated_at": "2021-12-15T22:19:43Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3044,
"watchers_count": 3044,
"forks_count": 901,
"stargazers_count": 3045,
"watchers_count": 3045,
"forks_count": 902,
"allow_forking": true,
"is_template": false,
"topics": [
@ -69,8 +69,8 @@
"webshell"
],
"visibility": "public",
"forks": 901,
"watchers": 3044,
"forks": 902,
"watchers": 3045,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": null,
"fork": false,
"created_at": "2021-07-18T20:37:30Z",
"updated_at": "2021-07-18T20:43:54Z",
"updated_at": "2021-12-15T20:00:58Z",
"pushed_at": "2021-07-18T20:43:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -100,7 +100,7 @@
"pushed_at": "2020-02-27T15:57:53Z",
"stargazers_count": 145,
"watchers_count": 145,
"forks_count": 63,
"forks_count": 64,
"allow_forking": true,
"is_template": false,
"topics": [
@ -110,7 +110,7 @@
"exploit"
],
"visibility": "public",
"forks": 63,
"forks": 64,
"watchers": 145,
"score": 0
},

View file

@ -1586,12 +1586,12 @@
"pushed_at": "2021-01-15T19:21:25Z",
"stargazers_count": 157,
"watchers_count": 157,
"forks_count": 43,
"forks_count": 42,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 43,
"forks": 42,
"watchers": 157,
"score": 0
},

View file

@ -13,11 +13,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-12-15T14:38:47Z",
"updated_at": "2021-12-15T22:19:43Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3044,
"watchers_count": 3044,
"forks_count": 901,
"stargazers_count": 3045,
"watchers_count": 3045,
"forks_count": 902,
"allow_forking": true,
"is_template": false,
"topics": [
@ -42,8 +42,8 @@
"webshell"
],
"visibility": "public",
"forks": 901,
"watchers": 3044,
"forks": 902,
"watchers": 3045,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2020-05-20T04:27:52Z",
"updated_at": "2021-12-15T14:39:20Z",
"updated_at": "2021-12-15T20:41:06Z",
"pushed_at": "2021-10-12T21:13:09Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 40,
"watchers": 41,
"score": 0
},
{

View file

@ -67,17 +67,17 @@
"description": "带回显版本的漏洞利用脚本",
"fork": false,
"created_at": "2021-03-05T08:15:27Z",
"updated_at": "2021-12-15T16:46:36Z",
"updated_at": "2021-12-15T20:24:53Z",
"pushed_at": "2021-03-05T11:09:06Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 23,
"watchers": 24,
"score": 0
}
]

View file

@ -128,17 +128,17 @@
"description": "CVE-2021-21985 VMware vCenter Server远程代码执行漏洞 EXP (更新可回显EXP)",
"fork": false,
"created_at": "2021-06-03T09:59:21Z",
"updated_at": "2021-12-15T14:42:17Z",
"updated_at": "2021-12-15T18:54:06Z",
"pushed_at": "2021-06-09T10:13:56Z",
"stargazers_count": 293,
"watchers_count": 293,
"stargazers_count": 294,
"watchers_count": 294,
"forks_count": 63,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 63,
"watchers": 293,
"watchers": 294,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-12-15T15:40:45Z",
"updated_at": "2021-12-15T16:47:01Z",
"updated_at": "2021-12-15T20:27:59Z",
"pushed_at": "2021-12-15T16:37:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -121,10 +121,10 @@
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-27T10:16:35Z",
"updated_at": "2021-12-11T18:45:08Z",
"updated_at": "2021-12-15T22:24:01Z",
"pushed_at": "2021-03-07T04:39:58Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
@ -135,7 +135,7 @@
],
"visibility": "public",
"forks": 13,
"watchers": 31,
"watchers": 32,
"score": 0
},
{

29
2021/CVE-2021-39685.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 438658753,
"name": "inspector-gadget",
"full_name": "szymonh\/inspector-gadget",
"owner": {
"login": "szymonh",
"id": 12231135,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12231135?v=4",
"html_url": "https:\/\/github.com\/szymonh"
},
"html_url": "https:\/\/github.com\/szymonh\/inspector-gadget",
"description": "CVE-2021-39685 Description and sample exploit for Linux USB Gadget overflow vulnerability",
"fork": false,
"created_at": "2021-12-15T14:28:00Z",
"updated_at": "2021-12-15T21:20:14Z",
"pushed_at": "2021-12-15T20:23:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "log4j 1.x RCE Poc -- CVE-2021-4104",
"fork": false,
"created_at": "2021-12-14T12:35:08Z",
"updated_at": "2021-12-15T14:17:46Z",
"updated_at": "2021-12-15T18:29:51Z",
"pushed_at": "2021-12-14T12:56:24Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 9,
"watchers": 10,
"score": 0
}
]

View file

@ -13,11 +13,11 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
"updated_at": "2021-12-15T17:18:26Z",
"updated_at": "2021-12-15T23:53:00Z",
"pushed_at": "2021-12-11T15:43:11Z",
"stargazers_count": 502,
"watchers_count": 502,
"forks_count": 95,
"stargazers_count": 514,
"watchers_count": 514,
"forks_count": 98,
"allow_forking": true,
"is_template": false,
"topics": [
@ -27,8 +27,8 @@
"s4u2self"
],
"visibility": "public",
"forks": 95,
"watchers": 502,
"forks": 98,
"watchers": 514,
"score": 0
},
{
@ -45,17 +45,17 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2021-12-15T16:27:19Z",
"updated_at": "2021-12-15T19:27:27Z",
"pushed_at": "2021-12-15T11:17:41Z",
"stargazers_count": 90,
"watchers_count": 90,
"forks_count": 13,
"stargazers_count": 91,
"watchers_count": 91,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 90,
"forks": 14,
"watchers": 91,
"score": 0
},
{
@ -99,17 +99,17 @@
"description": "Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)",
"fork": false,
"created_at": "2021-12-13T23:15:05Z",
"updated_at": "2021-12-15T18:12:30Z",
"updated_at": "2021-12-15T20:31:40Z",
"pushed_at": "2021-12-13T23:15:47Z",
"stargazers_count": 109,
"watchers_count": 109,
"stargazers_count": 110,
"watchers_count": 110,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 109,
"watchers": 110,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2021-12-15T14:12:16Z",
"updated_at": "2021-12-15T22:30:12Z",
"pushed_at": "2021-12-12T10:50:54Z",
"stargazers_count": 861,
"watchers_count": 861,
"forks_count": 219,
"stargazers_count": 865,
"watchers_count": 865,
"forks_count": 220,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 219,
"watchers": 861,
"forks": 220,
"watchers": 865,
"score": 0
}
]

View file

@ -67,17 +67,17 @@
"description": "Generate malicious files using recently published bidi-attack (CVE-2021-42574)",
"fork": false,
"created_at": "2021-11-02T15:32:38Z",
"updated_at": "2021-12-15T14:43:19Z",
"updated_at": "2021-12-15T19:33:05Z",
"pushed_at": "2021-11-05T20:43:05Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 7,
"watchers": 8,
"score": 0
},
{

View file

@ -322,8 +322,8 @@
"description": null,
"fork": false,
"created_at": "2021-12-08T14:14:38Z",
"updated_at": "2021-12-13T09:02:13Z",
"pushed_at": "2021-12-08T14:18:20Z",
"updated_at": "2021-12-15T18:56:22Z",
"pushed_at": "2021-12-15T18:56:19Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,

View file

@ -13,17 +13,17 @@
"description": "Proof of Concept Exploit for ManageEngine ServiceDesk Plus CVE-2021-44077",
"fork": false,
"created_at": "2021-12-08T20:24:38Z",
"updated_at": "2021-12-15T17:13:03Z",
"updated_at": "2021-12-15T18:39:57Z",
"pushed_at": "2021-12-08T21:43:16Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 19,
"watchers": 20,
"score": 0
}
]

File diff suppressed because it is too large Load diff

View file

@ -79,5 +79,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 438746535,
"name": "log4j2-CVE-2021-45046",
"full_name": "pravin-pp\/log4j2-CVE-2021-45046",
"owner": {
"login": "pravin-pp",
"id": 12995541,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12995541?v=4",
"html_url": "https:\/\/github.com\/pravin-pp"
},
"html_url": "https:\/\/github.com\/pravin-pp\/log4j2-CVE-2021-45046",
"description": null,
"fork": false,
"created_at": "2021-12-15T19:19:52Z",
"updated_at": "2021-12-15T19:42:14Z",
"pushed_at": "2021-12-15T19:42:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -2941,6 +2941,9 @@ A local file inclusion (LFI) vulnerability exists in version BIQS IT Biqs-drive
### CVE-2021-39512
- [guusec/CVE-2021-39512-BigTreeCMS-v4.4.14-AccountTakeOver](https://github.com/guusec/CVE-2021-39512-BigTreeCMS-v4.4.14-AccountTakeOver)
### CVE-2021-39685
- [szymonh/inspector-gadget](https://github.com/szymonh/inspector-gadget)
### CVE-2021-40101 (2021-11-30)
<code>
@ -3803,6 +3806,7 @@ Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features u
- [Sh0ckFR/log4j-CVE-2021-44228-Public-IoCs](https://github.com/Sh0ckFR/log4j-CVE-2021-44228-Public-IoCs)
- [zzzz0317/log4j2-vulnerable-spring-app](https://github.com/zzzz0317/log4j2-vulnerable-spring-app)
- [datadavev/test-44228](https://github.com/datadavev/test-44228)
- [LemonCraftRu/JndiRemover](https://github.com/LemonCraftRu/JndiRemover)
- [zhangxvx/Log4j-Rec-CVE-2021-44228](https://github.com/zhangxvx/Log4j-Rec-CVE-2021-44228)
- [darkarnium/Log4j-CVE-Detect](https://github.com/darkarnium/Log4j-CVE-Detect)
- [chilliwebs/CVE-2021-44228_Example](https://github.com/chilliwebs/CVE-2021-44228_Example)
@ -3943,6 +3947,7 @@ Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features u
- [mufeedvh/log4jail](https://github.com/mufeedvh/log4jail)
- [guerzon/log4shellpoc](https://github.com/guerzon/log4shellpoc)
- [ab0x90/CVE-2021-44228_PoC](https://github.com/ab0x90/CVE-2021-44228_PoC)
- [stripe/log4j-remediation-tools](https://github.com/stripe/log4j-remediation-tools)
- [razz0r/CVE-2021-44228-Mass-RCE](https://github.com/razz0r/CVE-2021-44228-Mass-RCE)
- [xsultan/log4jshield](https://github.com/xsultan/log4jshield)
- [0xThiebaut/CVE-2021-44228](https://github.com/0xThiebaut/CVE-2021-44228)
@ -3962,10 +3967,16 @@ Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features u
- [mss/log4shell-hotfix-side-effect](https://github.com/mss/log4shell-hotfix-side-effect)
- [MeterianHQ/log4j-vuln-coverage-check](https://github.com/MeterianHQ/log4j-vuln-coverage-check)
- [sebiboga/jmeter-fix-cve-2021-44228-windows](https://github.com/sebiboga/jmeter-fix-cve-2021-44228-windows)
- [mitiga/log4shell-cloud-scanner](https://github.com/mitiga/log4shell-cloud-scanner)
- [isuruwa/Log4j](https://github.com/isuruwa/Log4j)
- [honeynet/log4shell-data](https://github.com/honeynet/log4shell-data)
- [inettgmbh/checkmk-log4j-scanner](https://github.com/inettgmbh/checkmk-log4j-scanner)
- [wortell/log4j-honeypot](https://github.com/wortell/log4j-honeypot)
- [MkTech-0-8YT3/CVE-2021-44228](https://github.com/MkTech-0-8YT3/CVE-2021-44228)
- [alenazi90/log4j](https://github.com/alenazi90/log4j)
- [pmontesd/log4j-cve-2021-44228](https://github.com/pmontesd/log4j-cve-2021-44228)
- [aws-samples/kubernetes-log4j-cve-2021-44228-node-agent](https://github.com/aws-samples/kubernetes-log4j-cve-2021-44228-node-agent)
- [michaelsanford/Log4Shell-Honeypot](https://github.com/michaelsanford/Log4Shell-Honeypot)
- [ubitech/cve-2021-44228-rce-poc](https://github.com/ubitech/cve-2021-44228-rce-poc)
### CVE-2021-44827
- [full-disclosure/CVE-2021-44827](https://github.com/full-disclosure/CVE-2021-44827)
@ -3987,6 +3998,7 @@ It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was i
- [cckuailong/Log4j_CVE-2021-45046](https://github.com/cckuailong/Log4j_CVE-2021-45046)
- [BobTheShoplifter/CVE-2021-45046-Info](https://github.com/BobTheShoplifter/CVE-2021-45046-Info)
- [tejas-nagchandi/CVE-2021-45046](https://github.com/tejas-nagchandi/CVE-2021-45046)
- [pravin-pp/log4j2-CVE-2021-45046](https://github.com/pravin-pp/log4j2-CVE-2021-45046)
## 2020
@ -19368,14 +19380,11 @@ Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2
- [fser/ghost-checker](https://github.com/fser/ghost-checker)
- [mikesplain/CVE-2015-0235-cookbook](https://github.com/mikesplain/CVE-2015-0235-cookbook)
- [aaronfay/CVE-2015-0235-test](https://github.com/aaronfay/CVE-2015-0235-test)
- [piyokango/ghost](https://github.com/piyokango/ghost)
- [mholzinger/CVE-2015-0235_GHOST](https://github.com/mholzinger/CVE-2015-0235_GHOST)
- [adherzog/ansible-CVE-2015-0235-GHOST](https://github.com/adherzog/ansible-CVE-2015-0235-GHOST)
- [favoretti/lenny-libc6](https://github.com/favoretti/lenny-libc6)
- [nickanderson/cfengine-CVE_2015_0235](https://github.com/nickanderson/cfengine-CVE_2015_0235)
- [koudaiii-archives/cookbook-update-glibc](https://github.com/koudaiii-archives/cookbook-update-glibc)
- [F88/ghostbusters15](https://github.com/F88/ghostbusters15)
- [JustDenisYT/ghosttester](https://github.com/JustDenisYT/ghosttester)
- [tobyzxj/CVE-2015-0235](https://github.com/tobyzxj/CVE-2015-0235)
- [makelinux/CVE-2015-0235-workaround](https://github.com/makelinux/CVE-2015-0235-workaround)
- [arm13/ghost_exploit](https://github.com/arm13/ghost_exploit)