Auto Update 2022/01/01 18:13:25

This commit is contained in:
motikan2010-bot 2022-01-02 03:13:25 +09:00
parent 2bd60900ba
commit f1e258f158
20 changed files with 163 additions and 165 deletions

View file

@ -17,7 +17,7 @@
"pushed_at": "2017-01-06T23:34:03Z",
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 16,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [
@ -29,7 +29,7 @@
"vulnerable-container"
],
"visibility": "public",
"forks": 16,
"forks": 17,
"watchers": 40,
"score": 0
}

View file

@ -148,17 +148,17 @@
"description": "Exploit for Node-jose < 0.11.0 written in Ruby",
"fork": false,
"created_at": "2021-05-11T11:29:15Z",
"updated_at": "2021-05-11T11:31:03Z",
"updated_at": "2022-01-01T12:10:59Z",
"pushed_at": "2021-05-11T11:31:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -17,7 +17,7 @@
"pushed_at": "2018-08-30T05:37:03Z",
"stargazers_count": 437,
"watchers_count": 437,
"forks_count": 55,
"forks_count": 56,
"allow_forking": true,
"is_template": false,
"topics": [
@ -29,7 +29,7 @@
"usb"
],
"visibility": "public",
"forks": 55,
"forks": 56,
"watchers": 437,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "CVE-2019-1388 UAC提权 (nt authority\\system)",
"fork": false,
"created_at": "2019-11-21T06:26:27Z",
"updated_at": "2021-12-27T02:23:46Z",
"updated_at": "2022-01-01T13:38:54Z",
"pushed_at": "2019-11-21T09:27:59Z",
"stargazers_count": 130,
"watchers_count": 130,
"stargazers_count": 131,
"watchers_count": 131,
"forks_count": 44,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 130,
"watchers": 131,
"score": 0
},
{

View file

@ -44,7 +44,7 @@
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3080,
"watchers_count": 3080,
"forks_count": 914,
"forks_count": 915,
"allow_forking": true,
"is_template": false,
"topics": [
@ -69,7 +69,7 @@
"webshell"
],
"visibility": "public",
"forks": 914,
"forks": 915,
"watchers": 3080,
"score": 0
},

View file

@ -40,17 +40,17 @@
"description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
"fork": false,
"created_at": "2019-12-12T07:58:11Z",
"updated_at": "2021-12-29T14:32:33Z",
"updated_at": "2022-01-01T16:36:22Z",
"pushed_at": "2021-11-10T21:19:47Z",
"stargazers_count": 226,
"watchers_count": 226,
"stargazers_count": 227,
"watchers_count": 227,
"forks_count": 65,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 65,
"watchers": 226,
"watchers": 227,
"score": 0
},
{

View file

@ -121,17 +121,17 @@
"description": "POC Exploit written in Ruby",
"fork": false,
"created_at": "2021-05-11T11:32:18Z",
"updated_at": "2021-05-11T11:33:16Z",
"updated_at": "2022-01-01T12:10:58Z",
"pushed_at": "2021-05-11T11:33:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -94,17 +94,17 @@
"description": "Powershell SMBv3 Compression checker",
"fork": false,
"created_at": "2020-03-11T09:13:48Z",
"updated_at": "2021-12-15T14:38:34Z",
"updated_at": "2022-01-01T14:46:21Z",
"pushed_at": "2020-04-14T11:38:39Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 31,
"watchers": 30,
"score": 0
},
{

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3080,
"watchers_count": 3080,
"forks_count": 914,
"forks_count": 915,
"allow_forking": true,
"is_template": false,
"topics": [
@ -42,7 +42,7 @@
"webshell"
],
"visibility": "public",
"forks": 914,
"forks": 915,
"watchers": 3080,
"score": 0
},

View file

@ -44,12 +44,12 @@
"pushed_at": "2020-02-19T12:33:57Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 4,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "PoC script that shows RCE vulnerability over Intellian Satellite controller",
"fork": false,
"created_at": "2020-01-28T23:27:20Z",
"updated_at": "2022-01-01T11:47:09Z",
"updated_at": "2022-01-01T17:32:14Z",
"pushed_at": "2020-01-30T11:42:26Z",
"stargazers_count": 62,
"watchers_count": 62,
"stargazers_count": 66,
"watchers_count": 66,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
@ -25,7 +25,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 62,
"watchers": 66,
"score": 0
}
]

View file

@ -1,56 +0,0 @@
[
{
"id": 389866984,
"name": "CVE-2021-3438",
"full_name": "Crystalware\/CVE-2021-3438",
"owner": {
"login": "Crystalware",
"id": 49976592,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49976592?v=4",
"html_url": "https:\/\/github.com\/Crystalware"
},
"html_url": "https:\/\/github.com\/Crystalware\/CVE-2021-3438",
"description": "Proof of concept code for CVE-2021-3438",
"fork": false,
"created_at": "2021-07-27T06:05:08Z",
"updated_at": "2021-07-29T03:57:57Z",
"pushed_at": "2021-07-29T03:57:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 390295076,
"name": "CVE-2021-3438",
"full_name": "TobiasS1402\/CVE-2021-3438",
"owner": {
"login": "TobiasS1402",
"id": 46230851,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46230851?v=4",
"html_url": "https:\/\/github.com\/TobiasS1402"
},
"html_url": "https:\/\/github.com\/TobiasS1402\/CVE-2021-3438",
"description": "Detection and remediation for CVE-2021-3438 with Powershell",
"fork": false,
"created_at": "2021-07-28T09:36:42Z",
"updated_at": "2021-07-28T14:51:57Z",
"pushed_at": "2021-07-28T14:41:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-09-13T12:12:17Z",
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 22,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"topics": [
@ -29,7 +29,7 @@
"windowsexploits"
],
"visibility": "public",
"forks": 22,
"forks": 23,
"watchers": 47,
"score": 0
},

View file

@ -13,8 +13,8 @@
"description": null,
"fork": false,
"created_at": "2021-10-12T09:38:48Z",
"updated_at": "2022-01-01T12:08:44Z",
"pushed_at": "2022-01-01T12:08:41Z",
"updated_at": "2022-01-01T12:27:43Z",
"pushed_at": "2022-01-01T12:27:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,8 +13,8 @@
"description": null,
"fork": false,
"created_at": "2021-10-12T09:36:56Z",
"updated_at": "2022-01-01T12:11:58Z",
"pushed_at": "2021-11-07T20:04:50Z",
"updated_at": "2022-01-01T12:23:21Z",
"pushed_at": "2022-01-01T12:23:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

29
2021/CVE-2021-40906.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 416269763,
"name": "CVE-2021-40906",
"full_name": "Edgarloyola\/CVE-2021-40906",
"owner": {
"login": "Edgarloyola",
"id": 43635073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43635073?v=4",
"html_url": "https:\/\/github.com\/Edgarloyola"
},
"html_url": "https:\/\/github.com\/Edgarloyola\/CVE-2021-40906",
"description": null,
"fork": false,
"created_at": "2021-10-12T09:30:38Z",
"updated_at": "2022-01-01T12:29:28Z",
"pushed_at": "2022-01-01T12:29:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -390,17 +390,17 @@
"description": "Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.",
"fork": false,
"created_at": "2021-12-10T12:38:20Z",
"updated_at": "2022-01-01T11:33:36Z",
"updated_at": "2022-01-01T16:07:29Z",
"pushed_at": "2021-12-27T10:27:42Z",
"stargazers_count": 857,
"watchers_count": 857,
"forks_count": 339,
"stargazers_count": 859,
"watchers_count": 859,
"forks_count": 340,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 339,
"watchers": 857,
"forks": 340,
"watchers": 859,
"score": 0
},
{
@ -601,17 +601,17 @@
"description": "Hashes for vulnerable LOG4J versions",
"fork": false,
"created_at": "2021-12-10T18:06:06Z",
"updated_at": "2021-12-29T11:35:54Z",
"updated_at": "2022-01-01T14:35:10Z",
"pushed_at": "2021-12-17T17:02:24Z",
"stargazers_count": 139,
"watchers_count": 139,
"stargazers_count": 140,
"watchers_count": 140,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 139,
"watchers": 140,
"score": 0
},
{
@ -858,10 +858,10 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2022-01-01T10:15:56Z",
"updated_at": "2022-01-01T13:05:00Z",
"pushed_at": "2021-12-31T11:47:19Z",
"stargazers_count": 563,
"watchers_count": 563,
"stargazers_count": 564,
"watchers_count": 564,
"forks_count": 86,
"allow_forking": true,
"is_template": false,
@ -888,7 +888,7 @@
],
"visibility": "public",
"forks": 86,
"watchers": 563,
"watchers": 564,
"score": 0
},
{
@ -1768,10 +1768,10 @@
"description": "Detections for CVE-2021-44228 inside of nested binaries",
"fork": false,
"created_at": "2021-12-11T16:08:47Z",
"updated_at": "2021-12-25T15:41:48Z",
"updated_at": "2022-01-01T14:36:56Z",
"pushed_at": "2021-12-18T22:20:25Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
@ -1787,7 +1787,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 26,
"watchers": 27,
"score": 0
},
{
@ -2868,7 +2868,7 @@
"description": "Hot-patch CVE-2021-44228 by exploiting the vulnerability itself.",
"fork": false,
"created_at": "2021-12-12T15:30:55Z",
"updated_at": "2021-12-31T12:04:46Z",
"updated_at": "2022-01-01T14:41:00Z",
"pushed_at": "2021-12-18T10:46:45Z",
"stargazers_count": 25,
"watchers_count": 25,
@ -3138,10 +3138,10 @@
"description": "A Docker based LDAP RCE exploit demo for CVE-2021-44228 Log4Shell",
"fork": false,
"created_at": "2021-12-12T21:45:33Z",
"updated_at": "2021-12-31T17:34:58Z",
"updated_at": "2022-01-01T13:35:42Z",
"pushed_at": "2021-12-18T01:08:59Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
@ -3154,7 +3154,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 27,
"watchers": 28,
"score": 0
},
{
@ -3198,17 +3198,17 @@
"description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)",
"fork": false,
"created_at": "2021-12-12T22:52:02Z",
"updated_at": "2021-12-30T08:48:21Z",
"updated_at": "2022-01-01T12:18:00Z",
"pushed_at": "2021-12-20T15:34:21Z",
"stargazers_count": 292,
"watchers_count": 292,
"stargazers_count": 293,
"watchers_count": 293,
"forks_count": 44,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 292,
"watchers": 293,
"score": 0
},
{
@ -3511,17 +3511,17 @@
"description": "OpenIOC rules to facilitate hunting for indicators of compromise",
"fork": false,
"created_at": "2021-12-13T03:55:32Z",
"updated_at": "2021-12-30T04:21:15Z",
"updated_at": "2022-01-01T17:18:17Z",
"pushed_at": "2021-12-30T04:21:13Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 38,
"watchers": 39,
"score": 0
},
{
@ -3538,17 +3538,17 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-01-01T11:43:51Z",
"updated_at": "2022-01-01T15:55:30Z",
"pushed_at": "2021-12-30T13:20:50Z",
"stargazers_count": 2478,
"watchers_count": 2478,
"stargazers_count": 2480,
"watchers_count": 2480,
"forks_count": 579,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 579,
"watchers": 2478,
"watchers": 2480,
"score": 0
},
{
@ -4393,8 +4393,8 @@
"description": "log4j \/ log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)",
"fork": false,
"created_at": "2021-12-13T16:39:16Z",
"updated_at": "2022-01-01T12:00:28Z",
"pushed_at": "2022-01-01T12:00:25Z",
"updated_at": "2022-01-01T18:00:27Z",
"pushed_at": "2022-01-01T18:00:24Z",
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 10,
@ -4895,17 +4895,17 @@
"description": "PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs",
"fork": false,
"created_at": "2021-12-13T21:39:51Z",
"updated_at": "2021-12-31T06:19:13Z",
"updated_at": "2022-01-01T13:32:58Z",
"pushed_at": "2021-12-21T01:24:46Z",
"stargazers_count": 262,
"watchers_count": 262,
"stargazers_count": 263,
"watchers_count": 263,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 262,
"watchers": 263,
"score": 0
},
{
@ -5413,7 +5413,7 @@
"fork": false,
"created_at": "2021-12-14T10:04:42Z",
"updated_at": "2022-01-01T08:53:50Z",
"pushed_at": "2021-12-31T21:29:58Z",
"pushed_at": "2022-01-01T17:26:50Z",
"stargazers_count": 360,
"watchers_count": 360,
"forks_count": 67,
@ -5691,17 +5691,17 @@
"description": "Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228",
"fork": false,
"created_at": "2021-12-14T18:08:45Z",
"updated_at": "2021-12-31T02:27:09Z",
"updated_at": "2022-01-01T12:34:11Z",
"pushed_at": "2021-12-20T14:44:27Z",
"stargazers_count": 120,
"watchers_count": 120,
"stargazers_count": 121,
"watchers_count": 121,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 120,
"watchers": 121,
"score": 0
},
{
@ -6634,8 +6634,8 @@
"description": null,
"fork": false,
"created_at": "2021-12-15T18:51:07Z",
"updated_at": "2021-12-24T15:04:05Z",
"pushed_at": "2021-12-30T20:33:13Z",
"updated_at": "2022-01-01T14:37:49Z",
"pushed_at": "2022-01-01T14:37:45Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 3,
@ -6802,7 +6802,7 @@
"fork": false,
"created_at": "2021-12-15T22:30:34Z",
"updated_at": "2021-12-31T23:22:04Z",
"pushed_at": "2021-12-31T23:22:02Z",
"pushed_at": "2022-01-01T12:44:19Z",
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 15,
@ -8626,7 +8626,7 @@
"pushed_at": "2021-12-20T12:03:48Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
@ -8637,7 +8637,7 @@
"scanner"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0
},
@ -9411,17 +9411,17 @@
"description": "Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.",
"fork": false,
"created_at": "2021-12-24T13:18:49Z",
"updated_at": "2021-12-31T07:52:51Z",
"updated_at": "2022-01-01T15:39:56Z",
"pushed_at": "2021-12-29T12:56:57Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 16,
"watchers": 18,
"score": 0
},
{
@ -9860,5 +9860,35 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 443563564,
"name": "-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.",
"full_name": "marklindsey11\/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.",
"owner": {
"login": "marklindsey11",
"id": 81498475,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81498475?v=4",
"html_url": "https:\/\/github.com\/marklindsey11"
},
"html_url": "https:\/\/github.com\/marklindsey11\/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.",
"description": "Log4j Vulnerability Scanner",
"fork": false,
"created_at": "2022-01-01T15:13:22Z",
"updated_at": "2022-01-01T15:31:19Z",
"pushed_at": "2022-01-01T15:31:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": true,
"topics": [
"hunting",
"threat"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -67,7 +67,7 @@
"description": "CVE-2021-44832",
"fork": false,
"created_at": "2021-12-30T20:24:07Z",
"updated_at": "2021-12-30T20:29:05Z",
"updated_at": "2022-01-01T14:18:33Z",
"pushed_at": "2021-12-30T20:28:38Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -175,10 +175,10 @@
"description": null,
"fork": false,
"created_at": "2021-12-29T07:32:30Z",
"updated_at": "2022-01-01T08:11:05Z",
"updated_at": "2022-01-01T17:07:06Z",
"pushed_at": "2021-12-31T08:30:33Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
@ -188,7 +188,7 @@
],
"visibility": "public",
"forks": 15,
"watchers": 34,
"watchers": 35,
"score": 0
}
]

View file

@ -383,15 +383,6 @@ A cross-site scripting (XSS) vulnerability in Pryaniki 6.44.3 allows remote auth
- [jet-pentest/CVE-2021-3395](https://github.com/jet-pentest/CVE-2021-3395)
### CVE-2021-3438 (2021-05-20)
<code>
A potential buffer overflow in the software drivers for certain HP LaserJet products and Samsung product printers could lead to an escalation of privilege.
</code>
- [Crystalware/CVE-2021-3438](https://github.com/Crystalware/CVE-2021-3438)
- [TobiasS1402/CVE-2021-3438](https://github.com/TobiasS1402/CVE-2021-3438)
### CVE-2021-3441 (2021-10-29)
<code>
@ -3007,6 +2998,9 @@ Improper Access Control in Gurock TestRail versions &lt; 7.2.0.3014 resulted in
### CVE-2021-40905
- [Edgarloyola/CVE-2021-40905](https://github.com/Edgarloyola/CVE-2021-40905)
### CVE-2021-40906
- [Edgarloyola/CVE-2021-40906](https://github.com/Edgarloyola/CVE-2021-40906)
### CVE-2021-40978 (2021-10-07)
<code>
@ -3997,6 +3991,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [a5tra/log4j-exploit-builder](https://github.com/a5tra/log4j-exploit-builder)
- [MarceloLeite2604/log4j-vulnerability](https://github.com/MarceloLeite2604/log4j-vulnerability)
- [romanutti/log4shell-vulnerable-app](https://github.com/romanutti/log4shell-vulnerable-app)
- [marklindsey11/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.](https://github.com/marklindsey11/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.)
### CVE-2021-44659 (2021-12-22)