{"uuid": "c98fc6df-f629-4473-8ac2-bc6455babd20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/GithubRedTeam/933", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1a\ud83d\udc31\u200d\ud83d\udcbb \u2702\ufe0f \ud83e\udd2c CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches\nURL\uff1ahttps://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words", "creation_timestamp": "2021-12-11T10:14:36.000000Z"}