diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 87a1102d1e..ef6003bb9e 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -40,10 +40,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-01-23T17:44:33Z", + "updated_at": "2022-01-25T03:31:59Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1270, - "watchers_count": 1270, + "stargazers_count": 1272, + "watchers_count": 1272, "forks_count": 277, "allow_forking": true, "is_template": false, @@ -71,7 +71,7 @@ ], "visibility": "public", "forks": 277, - "watchers": 1270, + "watchers": 1272, "score": 0 }, { diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index f1fd5ad626..e32587addb 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-01-23T17:44:33Z", + "updated_at": "2022-01-25T03:31:59Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1270, - "watchers_count": 1270, + "stargazers_count": 1272, + "watchers_count": 1272, "forks_count": 277, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 277, - "watchers": 1270, + "watchers": 1272, "score": 0 }, { diff --git a/2016/CVE-2016-2067.json b/2016/CVE-2016-2067.json index 5ed046f980..04b07f8627 100644 --- a/2016/CVE-2016-2067.json +++ b/2016/CVE-2016-2067.json @@ -17,12 +17,12 @@ "pushed_at": "2021-09-12T10:03:55Z", "stargazers_count": 6, "watchers_count": 6, - "forks_count": 1, + "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 3, "watchers": 6, "score": 0 } diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 692b153902..4fa076800d 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -40,10 +40,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-01-23T17:44:33Z", + "updated_at": "2022-01-25T03:31:59Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1270, - "watchers_count": 1270, + "stargazers_count": 1272, + "watchers_count": 1272, "forks_count": 277, "allow_forking": true, "is_template": false, @@ -71,7 +71,7 @@ ], "visibility": "public", "forks": 277, - "watchers": 1270, + "watchers": 1272, "score": 0 }, { diff --git a/2017/CVE-2017-5645.json b/2017/CVE-2017-5645.json index c7a11baf9f..e9485423ca 100644 --- a/2017/CVE-2017-5645.json +++ b/2017/CVE-2017-5645.json @@ -41,7 +41,7 @@ "fork": false, "created_at": "2021-12-14T22:27:14Z", "updated_at": "2022-01-24T14:12:09Z", - "pushed_at": "2022-01-24T14:05:41Z", + "pushed_at": "2022-01-25T00:05:54Z", "stargazers_count": 14, "watchers_count": 14, "forks_count": 7, diff --git a/2018/CVE-2018-16341.json b/2018/CVE-2018-16341.json index dc8085406c..e9c6bbd7d6 100644 --- a/2018/CVE-2018-16341.json +++ b/2018/CVE-2018-16341.json @@ -13,10 +13,10 @@ "description": "CVE-2018-16341 - Nuxeo Remote Code Execution without authentication using Server Side Template Injection", "fork": false, "created_at": "2019-06-05T18:24:45Z", - "updated_at": "2021-12-15T14:36:29Z", + "updated_at": "2022-01-25T03:44:18Z", "pushed_at": "2019-06-05T18:43:28Z", - "stargazers_count": 21, - "watchers_count": 21, + "stargazers_count": 22, + "watchers_count": 22, "forks_count": 10, "allow_forking": true, "is_template": false, @@ -26,7 +26,7 @@ ], "visibility": "public", "forks": 10, - "watchers": 21, + "watchers": 22, "score": 0 }, { diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index f9f8648120..e62f3c6412 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -530,10 +530,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-01-23T17:44:33Z", + "updated_at": "2022-01-25T03:31:59Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1270, - "watchers_count": 1270, + "stargazers_count": 1272, + "watchers_count": 1272, "forks_count": 277, "allow_forking": true, "is_template": false, @@ -561,7 +561,7 @@ ], "visibility": "public", "forks": 277, - "watchers": 1270, + "watchers": 1272, "score": 0 }, { diff --git a/2019/CVE-2019-14040.json b/2019/CVE-2019-14040.json index 08fa25ac4a..aba2e9061b 100644 --- a/2019/CVE-2019-14040.json +++ b/2019/CVE-2019-14040.json @@ -17,12 +17,12 @@ "pushed_at": "2020-04-15T14:27:49Z", "stargazers_count": 24, "watchers_count": 24, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 5, + "forks": 6, "watchers": 24, "score": 0 } diff --git a/2019/CVE-2019-19609.json b/2019/CVE-2019-19609.json index 36920419d2..ca1ac1ce0f 100644 --- a/2019/CVE-2019-19609.json +++ b/2019/CVE-2019-19609.json @@ -13,17 +13,17 @@ "description": "Strapi Framework Vulnerable to Remote Code Execution ", "fork": false, "created_at": "2021-08-29T16:18:27Z", - "updated_at": "2022-01-23T04:11:37Z", + "updated_at": "2022-01-25T04:09:02Z", "pushed_at": "2021-08-29T16:34:16Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 3, - "watchers": 6, + "watchers": 7, "score": 0 }, { @@ -148,14 +148,19 @@ "description": "Strapi CMS 3.0.0-beta.17.4 - Unauthenticated Remote Code Execution (CVE-2019-18818, CVE-2019-19609)", "fork": false, "created_at": "2022-01-23T05:28:51Z", - "updated_at": "2022-01-23T05:32:56Z", - "pushed_at": "2022-01-23T05:34:51Z", + "updated_at": "2022-01-25T00:51:41Z", + "pushed_at": "2022-01-25T00:41:39Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, - "topics": [], + "topics": [ + "cve-2019-18818", + "cve-2019-19609", + "rce", + "strapi" + ], "visibility": "public", "forks": 0, "watchers": 0, diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 81f4ed063f..49080dd0be 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -175,10 +175,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-01-23T17:44:33Z", + "updated_at": "2022-01-25T03:31:59Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1270, - "watchers_count": 1270, + "stargazers_count": 1272, + "watchers_count": 1272, "forks_count": 277, "allow_forking": true, "is_template": false, @@ -206,7 +206,7 @@ ], "visibility": "public", "forks": 277, - "watchers": 1270, + "watchers": 1272, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0688.json b/2020/CVE-2020-0688.json index 1b247e8463..c6533ae581 100644 --- a/2020/CVE-2020-0688.json +++ b/2020/CVE-2020-0688.json @@ -241,17 +241,17 @@ "description": "Exploit and detect tools for CVE-2020-0688", "fork": false, "created_at": "2020-03-01T12:57:32Z", - "updated_at": "2022-01-14T03:46:07Z", + "updated_at": "2022-01-25T01:09:33Z", "pushed_at": "2020-03-21T05:44:48Z", - "stargazers_count": 311, - "watchers_count": 311, + "stargazers_count": 310, + "watchers_count": 310, "forks_count": 75, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 75, - "watchers": 311, + "watchers": 310, "score": 0 }, { diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 5a05658409..1310100ce3 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -1636,17 +1636,17 @@ "description": "This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework", "fork": false, "created_at": "2020-06-19T20:38:11Z", - "updated_at": "2021-07-29T03:07:49Z", + "updated_at": "2022-01-25T04:16:01Z", "pushed_at": "2020-06-19T20:58:36Z", - "stargazers_count": 21, - "watchers_count": 21, + "stargazers_count": 22, + "watchers_count": 22, "forks_count": 6, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 6, - "watchers": 21, + "watchers": 22, "score": 0 }, { diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 435e3e98cd..e1b241b26a 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-01-23T17:44:33Z", + "updated_at": "2022-01-25T03:31:59Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1270, - "watchers_count": 1270, + "stargazers_count": 1272, + "watchers_count": 1272, "forks_count": 277, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 277, - "watchers": 1270, + "watchers": 1272, "score": 0 }, { diff --git a/2021/CVE-2021-1732.json b/2021/CVE-2021-1732.json index c401af6224..d2f196525f 100644 --- a/2021/CVE-2021-1732.json +++ b/2021/CVE-2021-1732.json @@ -13,17 +13,17 @@ "description": "CVE-2021-1732 Exploit", "fork": false, "created_at": "2021-03-05T02:11:10Z", - "updated_at": "2022-01-24T15:32:32Z", + "updated_at": "2022-01-25T01:09:33Z", "pushed_at": "2021-03-05T03:10:26Z", - "stargazers_count": 356, - "watchers_count": 356, + "stargazers_count": 355, + "watchers_count": 355, "forks_count": 100, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 100, - "watchers": 356, + "watchers": 355, "score": 0 }, { diff --git a/2021/CVE-2021-20038.json b/2021/CVE-2021-20038.json index aa315d14f3..2241078c61 100644 --- a/2021/CVE-2021-20038.json +++ b/2021/CVE-2021-20038.json @@ -13,10 +13,10 @@ "description": "SonicWall SMA-100 Unauth RCE Exploit (CVE-2021-20038)", "fork": false, "created_at": "2022-01-11T02:25:25Z", - "updated_at": "2022-01-25T00:05:29Z", + "updated_at": "2022-01-25T02:20:18Z", "pushed_at": "2022-01-11T11:22:06Z", - "stargazers_count": 46, - "watchers_count": 46, + "stargazers_count": 48, + "watchers_count": 48, "forks_count": 11, "allow_forking": true, "is_template": false, @@ -27,7 +27,7 @@ ], "visibility": "public", "forks": 11, - "watchers": 46, + "watchers": 48, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-22204.json b/2021/CVE-2021-22204.json index bd31f5fea0..0061a2c9e4 100644 --- a/2021/CVE-2021-22204.json +++ b/2021/CVE-2021-22204.json @@ -97,17 +97,17 @@ "description": null, "fork": false, "created_at": "2021-08-02T18:56:16Z", - "updated_at": "2021-10-26T16:51:50Z", + "updated_at": "2022-01-25T02:09:24Z", "pushed_at": "2021-10-26T16:51:48Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 4, "score": 0 }, { diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json index b26cb28f18..1f80259350 100644 --- a/2021/CVE-2021-22205.json +++ b/2021/CVE-2021-22205.json @@ -98,12 +98,12 @@ "pushed_at": "2021-11-04T02:17:54Z", "stargazers_count": 4, "watchers_count": 4, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 4, "score": 0 }, diff --git a/2021/CVE-2021-22214.json b/2021/CVE-2021-22214.json index a07911b4b1..852e8be088 100644 --- a/2021/CVE-2021-22214.json +++ b/2021/CVE-2021-22214.json @@ -71,12 +71,12 @@ "pushed_at": "2021-11-04T02:21:28Z", "stargazers_count": 5, "watchers_count": 5, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 5, "score": 0 }, diff --git a/2021/CVE-2021-25741.json b/2021/CVE-2021-25741.json index 6058d3168f..99c497aa0d 100644 --- a/2021/CVE-2021-25741.json +++ b/2021/CVE-2021-25741.json @@ -17,12 +17,12 @@ "pushed_at": "2022-01-19T19:15:36Z", "stargazers_count": 9, "watchers_count": 9, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 3, + "forks": 4, "watchers": 9, "score": 0 } diff --git a/2021/CVE-2021-26084.json b/2021/CVE-2021-26084.json index af6a82d73c..e593c3534d 100644 --- a/2021/CVE-2021-26084.json +++ b/2021/CVE-2021-26084.json @@ -449,12 +449,12 @@ "pushed_at": "2022-01-14T04:21:27Z", "stargazers_count": 4, "watchers_count": 4, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 4, "score": 0 } diff --git a/2021/CVE-2021-31166.json b/2021/CVE-2021-31166.json index 7a8b33ecfa..ec3e3c1810 100644 --- a/2021/CVE-2021-31166.json +++ b/2021/CVE-2021-31166.json @@ -215,12 +215,12 @@ "pushed_at": "2021-11-04T02:23:11Z", "stargazers_count": 12, "watchers_count": 12, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 5, + "forks": 6, "watchers": 12, "score": 0 }, diff --git a/2021/CVE-2021-39115.json b/2021/CVE-2021-39115.json index 13e00c6d90..0f1971672d 100644 --- a/2021/CVE-2021-39115.json +++ b/2021/CVE-2021-39115.json @@ -13,7 +13,7 @@ "description": "Template Injection in Email Templates leads to code execution on Jira Service Management Server", "fork": false, "created_at": "2021-09-07T09:03:35Z", - "updated_at": "2022-01-07T10:25:12Z", + "updated_at": "2022-01-25T01:51:49Z", "pushed_at": "2021-09-09T03:58:32Z", "stargazers_count": 46, "watchers_count": 46, diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index 03eca53f64..575afbf1eb 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -923,17 +923,17 @@ "description": "CVE-2021-40444", "fork": false, "created_at": "2021-12-19T08:16:07Z", - "updated_at": "2022-01-24T01:40:40Z", + "updated_at": "2022-01-25T03:10:51Z", "pushed_at": "2021-12-19T08:27:33Z", - "stargazers_count": 51, - "watchers_count": 51, + "stargazers_count": 52, + "watchers_count": 52, "forks_count": 19, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 19, - "watchers": 51, + "watchers": 52, "score": 0 }, { diff --git a/2021/CVE-2021-42008.json b/2021/CVE-2021-42008.json index aea999fc23..94fc8b3574 100644 --- a/2021/CVE-2021-42008.json +++ b/2021/CVE-2021-42008.json @@ -40,7 +40,7 @@ "description": "CVE-2021-42008: Exploiting A 16-Year-Old Vulnerability In The Linux 6pack Driver", "fork": false, "created_at": "2021-12-03T14:08:26Z", - "updated_at": "2022-01-24T20:49:53Z", + "updated_at": "2022-01-25T05:51:54Z", "pushed_at": "2021-12-03T15:46:30Z", "stargazers_count": 23, "watchers_count": 23, diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index e24203a165..ae6f3f43d0 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -17,7 +17,7 @@ "pushed_at": "2021-12-21T10:11:05Z", "stargazers_count": 715, "watchers_count": 715, - "forks_count": 154, + "forks_count": 155, "allow_forking": true, "is_template": false, "topics": [ @@ -27,7 +27,7 @@ "s4u2self" ], "visibility": "public", - "forks": 154, + "forks": 155, "watchers": 715, "score": 0 }, @@ -45,17 +45,17 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-13T10:28:12Z", - "updated_at": "2022-01-24T18:35:51Z", + "updated_at": "2022-01-25T02:08:25Z", "pushed_at": "2021-12-20T04:51:01Z", - "stargazers_count": 230, - "watchers_count": 230, - "forks_count": 45, + "stargazers_count": 233, + "watchers_count": 233, + "forks_count": 46, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 45, - "watchers": 230, + "forks": 46, + "watchers": 233, "score": 0 }, { diff --git a/2021/CVE-2021-43798.json b/2021/CVE-2021-43798.json index 6e9c3193d1..59070271e1 100644 --- a/2021/CVE-2021-43798.json +++ b/2021/CVE-2021-43798.json @@ -187,7 +187,7 @@ "pushed_at": "2021-12-09T07:22:26Z", "stargazers_count": 182, "watchers_count": 182, - "forks_count": 25, + "forks_count": 26, "allow_forking": true, "is_template": false, "topics": [ @@ -196,7 +196,7 @@ "grafana" ], "visibility": "public", - "forks": 25, + "forks": 26, "watchers": 182, "score": 0 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index c2bbf123f9..0e56a03da0 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -94,17 +94,17 @@ "description": "Remote Code Injection In Log4j", "fork": false, "created_at": "2021-12-10T05:23:44Z", - "updated_at": "2022-01-24T07:47:34Z", + "updated_at": "2022-01-25T01:47:09Z", "pushed_at": "2022-01-18T12:01:52Z", - "stargazers_count": 331, - "watchers_count": 331, + "stargazers_count": 332, + "watchers_count": 332, "forks_count": 96, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 96, - "watchers": 331, + "watchers": 332, "score": 0 }, { @@ -862,7 +862,7 @@ "pushed_at": "2022-01-15T16:18:44Z", "stargazers_count": 673, "watchers_count": 673, - "forks_count": 102, + "forks_count": 103, "allow_forking": true, "is_template": false, "topics": [ @@ -887,7 +887,7 @@ "writeups" ], "visibility": "public", - "forks": 102, + "forks": 103, "watchers": 673, "score": 0 }, @@ -905,10 +905,10 @@ "description": "A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2022-01-24T20:52:21Z", + "updated_at": "2022-01-25T04:09:54Z", "pushed_at": "2022-01-22T14:55:02Z", - "stargazers_count": 1190, - "watchers_count": 1190, + "stargazers_count": 1191, + "watchers_count": 1191, "forks_count": 309, "allow_forking": true, "is_template": false, @@ -920,7 +920,7 @@ ], "visibility": "public", "forks": 309, - "watchers": 1190, + "watchers": 1191, "score": 0 }, { @@ -1233,10 +1233,10 @@ "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "fork": false, "created_at": "2021-12-11T07:19:11Z", - "updated_at": "2022-01-24T02:25:56Z", + "updated_at": "2022-01-25T04:42:58Z", "pushed_at": "2022-01-11T05:46:22Z", - "stargazers_count": 199, - "watchers_count": 199, + "stargazers_count": 200, + "watchers_count": 200, "forks_count": 57, "allow_forking": true, "is_template": false, @@ -1248,7 +1248,7 @@ ], "visibility": "public", "forks": 57, - "watchers": 199, + "watchers": 200, "score": 0 }, { @@ -2961,7 +2961,7 @@ "pushed_at": "2021-12-17T13:59:44Z", "stargazers_count": 11, "watchers_count": 11, - "forks_count": 9, + "forks_count": 10, "allow_forking": true, "is_template": false, "topics": [ @@ -2970,7 +2970,7 @@ "spring-boot-log4j" ], "visibility": "public", - "forks": 9, + "forks": 10, "watchers": 11, "score": 0 }, @@ -3539,17 +3539,17 @@ "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", "fork": false, "created_at": "2021-12-13T03:57:50Z", - "updated_at": "2022-01-24T17:06:35Z", + "updated_at": "2022-01-25T02:30:17Z", "pushed_at": "2022-01-02T20:21:42Z", - "stargazers_count": 2650, - "watchers_count": 2650, - "forks_count": 635, + "stargazers_count": 2651, + "watchers_count": 2651, + "forks_count": 636, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 635, - "watchers": 2650, + "forks": 636, + "watchers": 2651, "score": 0 }, { @@ -5239,10 +5239,10 @@ "description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.", "fork": false, "created_at": "2021-12-14T06:37:59Z", - "updated_at": "2022-01-16T07:01:55Z", + "updated_at": "2022-01-25T05:18:34Z", "pushed_at": "2021-12-27T15:12:20Z", - "stargazers_count": 254, - "watchers_count": 254, + "stargazers_count": 255, + "watchers_count": 255, "forks_count": 35, "allow_forking": true, "is_template": false, @@ -5255,7 +5255,7 @@ ], "visibility": "public", "forks": 35, - "watchers": 254, + "watchers": 255, "score": 0 }, { @@ -5413,10 +5413,10 @@ "description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)", "fork": false, "created_at": "2021-12-14T10:04:42Z", - "updated_at": "2022-01-24T09:59:44Z", + "updated_at": "2022-01-25T04:58:06Z", "pushed_at": "2022-01-12T03:31:50Z", - "stargazers_count": 400, - "watchers_count": 400, + "stargazers_count": 401, + "watchers_count": 401, "forks_count": 86, "allow_forking": true, "is_template": false, @@ -5432,7 +5432,7 @@ ], "visibility": "public", "forks": 86, - "watchers": 400, + "watchers": 401, "score": 0 }, { @@ -9752,10 +9752,10 @@ "description": "A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX\/vCenter\/NSX\/Horizon\/vRealize Operations Manager", "fork": false, "created_at": "2021-12-28T01:37:20Z", - "updated_at": "2022-01-24T15:56:33Z", + "updated_at": "2022-01-25T03:40:42Z", "pushed_at": "2022-01-24T05:37:34Z", - "stargazers_count": 61, - "watchers_count": 61, + "stargazers_count": 63, + "watchers_count": 63, "forks_count": 19, "allow_forking": true, "is_template": false, @@ -9767,7 +9767,7 @@ ], "visibility": "public", "forks": 19, - "watchers": 61, + "watchers": 63, "score": 0 }, { @@ -10092,17 +10092,17 @@ "description": "Exploiting CVE-2021-44228 in VMWare Horizon for remote code execution and more.", "fork": false, "created_at": "2022-01-05T22:25:42Z", - "updated_at": "2022-01-24T03:58:25Z", + "updated_at": "2022-01-25T03:39:59Z", "pushed_at": "2022-01-10T19:26:59Z", - "stargazers_count": 46, - "watchers_count": 46, + "stargazers_count": 47, + "watchers_count": 47, "forks_count": 7, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 7, - "watchers": 46, + "watchers": 47, "score": 0 }, { diff --git a/2022/CVE-2022-0185.json b/2022/CVE-2022-0185.json index 48e72f716c..39e750e804 100644 --- a/2022/CVE-2022-0185.json +++ b/2022/CVE-2022-0185.json @@ -13,17 +13,17 @@ "description": "CVE-2022-0185", "fork": false, "created_at": "2022-01-19T06:19:38Z", - "updated_at": "2022-01-24T23:08:31Z", + "updated_at": "2022-01-25T01:39:20Z", "pushed_at": "2022-01-19T06:23:58Z", - "stargazers_count": 57, - "watchers_count": 57, + "stargazers_count": 58, + "watchers_count": 58, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 57, + "watchers": 58, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-21661.json b/2022/CVE-2022-21661.json index e82b6f817b..3251a02344 100644 --- a/2022/CVE-2022-21661.json +++ b/2022/CVE-2022-21661.json @@ -13,17 +13,17 @@ "description": "WordPress Core 5.8.2 - 'WP_Query' SQL Injection", "fork": false, "created_at": "2022-01-18T01:05:04Z", - "updated_at": "2022-01-19T04:00:40Z", + "updated_at": "2022-01-25T03:18:24Z", "pushed_at": "2022-01-18T01:19:45Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 5, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-21907.json b/2022/CVE-2022-21907.json index 3aef68c126..1846c55f40 100644 --- a/2022/CVE-2022-21907.json +++ b/2022/CVE-2022-21907.json @@ -40,17 +40,17 @@ "description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907", "fork": false, "created_at": "2022-01-17T02:28:50Z", - "updated_at": "2022-01-24T21:17:20Z", + "updated_at": "2022-01-25T01:28:17Z", "pushed_at": "2022-01-20T02:07:59Z", - "stargazers_count": 302, - "watchers_count": 302, - "forks_count": 85, + "stargazers_count": 303, + "watchers_count": 303, + "forks_count": 86, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 85, - "watchers": 302, + "forks": 86, + "watchers": 303, "score": 0 }, {