{"uuid": "bd3a0a53-abdb-4369-a282-d236a33b8f7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-22005", "type": "published-proof-of-concept", "source": "https://t.me/hacker_trick/566", "content": "Log4Shell RCE Exploit fully independent exploit does not require any 3rd party binaries\nhttps://github.com/cyberstruggle/L4sh\n\nLog4j Scanner coded in Powershell\nhttps://github.com/Maelstromage/Log4jSherlock\n\nopen detection and scanning tool for discovering and fuzzing for Log4J RCE\nhttps://github.com/TaroballzChen/CVE-2021-44228-log4jVulnScanner-metasploit\n\nCVE-2021-22005 vulnerability which exists in the analysis service of vCenter Server\nhttps://github.com/shmilylty/cve-2021-22005-exp\n\nWindows Common Log File System Driver poc\nhttps://github.com/KaLendsi/CVE-2021-43224-POC", "creation_timestamp": "2021-12-28T17:49:54.000000Z"}