diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index 2573dbbefa..220c3d53f6 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -13,17 +13,17 @@ "description": "A checker (site and tool) for CVE-2014-0160", "fork": false, "created_at": "2014-04-07T23:03:09Z", - "updated_at": "2022-01-18T06:29:46Z", + "updated_at": "2022-01-20T05:09:19Z", "pushed_at": "2021-02-24T09:17:24Z", - "stargazers_count": 2266, - "watchers_count": 2266, + "stargazers_count": 2267, + "watchers_count": 2267, "forks_count": 480, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 480, - "watchers": 2266, + "watchers": 2267, "score": 0 }, { diff --git a/2017/CVE-2017-0781.json b/2017/CVE-2017-0781.json index ca5a13004a..73d1354efe 100644 --- a/2017/CVE-2017-0781.json +++ b/2017/CVE-2017-0781.json @@ -13,10 +13,10 @@ "description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability", "fork": false, "created_at": "2017-10-09T15:13:25Z", - "updated_at": "2022-01-11T08:37:03Z", + "updated_at": "2022-01-20T03:02:29Z", "pushed_at": "2021-07-29T12:00:48Z", - "stargazers_count": 82, - "watchers_count": 82, + "stargazers_count": 81, + "watchers_count": 81, "forks_count": 42, "allow_forking": true, "is_template": false, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 42, - "watchers": 82, + "watchers": 81, "score": 0 }, { diff --git a/2017/CVE-2017-10271.json b/2017/CVE-2017-10271.json index baf414e33e..a9a9a2f06b 100644 --- a/2017/CVE-2017-10271.json +++ b/2017/CVE-2017-10271.json @@ -429,17 +429,17 @@ "description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。", "fork": false, "created_at": "2018-09-13T09:44:18Z", - "updated_at": "2022-01-15T05:56:34Z", + "updated_at": "2022-01-20T00:55:35Z", "pushed_at": "2020-10-01T20:20:41Z", - "stargazers_count": 313, - "watchers_count": 313, + "stargazers_count": 314, + "watchers_count": 314, "forks_count": 109, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 109, - "watchers": 313, + "watchers": 314, "score": 0 }, { diff --git a/2018/CVE-2018-14847.json b/2018/CVE-2018-14847.json index 07efd7c263..df33b210ae 100644 --- a/2018/CVE-2018-14847.json +++ b/2018/CVE-2018-14847.json @@ -13,17 +13,17 @@ "description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)", "fork": false, "created_at": "2018-06-24T05:34:05Z", - "updated_at": "2022-01-18T14:54:00Z", + "updated_at": "2022-01-20T06:03:42Z", "pushed_at": "2020-10-16T12:09:45Z", - "stargazers_count": 457, - "watchers_count": 457, - "forks_count": 443, + "stargazers_count": 458, + "watchers_count": 458, + "forks_count": 442, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 443, - "watchers": 457, + "forks": 442, + "watchers": 458, "score": 0 }, { diff --git a/2018/CVE-2018-7600.json b/2018/CVE-2018-7600.json index cb059fb397..e3805b203c 100644 --- a/2018/CVE-2018-7600.json +++ b/2018/CVE-2018-7600.json @@ -74,10 +74,10 @@ "description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)", "fork": false, "created_at": "2018-04-12T22:53:14Z", - "updated_at": "2022-01-18T20:45:50Z", + "updated_at": "2022-01-20T03:07:21Z", "pushed_at": "2021-01-08T10:31:22Z", - "stargazers_count": 513, - "watchers_count": 513, + "stargazers_count": 514, + "watchers_count": 514, "forks_count": 167, "allow_forking": true, "is_template": false, @@ -94,7 +94,7 @@ ], "visibility": "public", "forks": 167, - "watchers": 513, + "watchers": 514, "score": 0 }, { diff --git a/2018/CVE-2018-8120.json b/2018/CVE-2018-8120.json index 04b692957a..8148bd6c68 100644 --- a/2018/CVE-2018-8120.json +++ b/2018/CVE-2018-8120.json @@ -40,10 +40,10 @@ "description": "CVE-2018-8120 Windows LPE exploit", "fork": false, "created_at": "2018-05-19T02:43:15Z", - "updated_at": "2022-01-06T01:20:49Z", + "updated_at": "2022-01-20T04:03:57Z", "pushed_at": "2018-05-30T13:09:54Z", - "stargazers_count": 471, - "watchers_count": 471, + "stargazers_count": 472, + "watchers_count": 472, "forks_count": 205, "allow_forking": true, "is_template": false, @@ -54,7 +54,7 @@ ], "visibility": "public", "forks": 205, - "watchers": 471, + "watchers": 472, "score": 0 }, { diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 9b5476407a..7763a90d23 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -369,10 +369,10 @@ "description": "3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)", "fork": false, "created_at": "2019-05-15T15:01:38Z", - "updated_at": "2022-01-06T03:05:47Z", + "updated_at": "2022-01-20T01:34:41Z", "pushed_at": "2019-06-13T13:07:03Z", - "stargazers_count": 362, - "watchers_count": 362, + "stargazers_count": 363, + "watchers_count": 363, "forks_count": 194, "allow_forking": true, "is_template": false, @@ -390,7 +390,7 @@ ], "visibility": "public", "forks": 194, - "watchers": 362, + "watchers": 363, "score": 0 }, { @@ -1705,17 +1705,17 @@ "description": "Proof of concept for CVE-2019-0708", "fork": false, "created_at": "2019-05-29T16:53:54Z", - "updated_at": "2022-01-19T13:17:47Z", + "updated_at": "2022-01-20T01:35:01Z", "pushed_at": "2021-12-02T12:00:46Z", - "stargazers_count": 1093, - "watchers_count": 1093, + "stargazers_count": 1094, + "watchers_count": 1094, "forks_count": 353, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 353, - "watchers": 1093, + "watchers": 1094, "score": 0 }, { diff --git a/2019/CVE-2019-1096.json b/2019/CVE-2019-1096.json index 0291e9db93..90b10809bf 100644 --- a/2019/CVE-2019-1096.json +++ b/2019/CVE-2019-1096.json @@ -17,12 +17,12 @@ "pushed_at": "2019-07-25T07:24:11Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0 } diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 522f43509e..04f402257f 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -40,10 +40,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2022-01-19T17:46:21Z", + "updated_at": "2022-01-20T03:17:56Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3104, - "watchers_count": 3104, + "stargazers_count": 3105, + "watchers_count": 3105, "forks_count": 920, "allow_forking": true, "is_template": false, @@ -70,7 +70,7 @@ ], "visibility": "public", "forks": 920, - "watchers": 3104, + "watchers": 3105, "score": 0 }, { diff --git a/2019/CVE-2019-18634.json b/2019/CVE-2019-18634.json index 2d9f07a5d1..88ea0495a3 100644 --- a/2019/CVE-2019-18634.json +++ b/2019/CVE-2019-18634.json @@ -179,12 +179,12 @@ "pushed_at": "2021-08-14T02:33:32Z", "stargazers_count": 5, "watchers_count": 5, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 5, "score": 0 } diff --git a/2019/CVE-2019-2215.json b/2019/CVE-2019-2215.json index c773d24172..173ab11781 100644 --- a/2019/CVE-2019-2215.json +++ b/2019/CVE-2019-2215.json @@ -71,12 +71,12 @@ "pushed_at": "2019-10-15T01:04:08Z", "stargazers_count": 87, "watchers_count": 87, - "forks_count": 45, + "forks_count": 46, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 45, + "forks": 46, "watchers": 87, "score": 0 }, diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json index d7119304ed..42dbcef2e4 100644 --- a/2019/CVE-2019-2725.json +++ b/2019/CVE-2019-2725.json @@ -13,17 +13,17 @@ "description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。", "fork": false, "created_at": "2018-09-13T09:44:18Z", - "updated_at": "2022-01-15T05:56:34Z", + "updated_at": "2022-01-20T00:55:35Z", "pushed_at": "2020-10-01T20:20:41Z", - "stargazers_count": 313, - "watchers_count": 313, + "stargazers_count": 314, + "watchers_count": 314, "forks_count": 109, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 109, - "watchers": 313, + "watchers": 314, "score": 0 }, { diff --git a/2020/CVE-2020-1206.json b/2020/CVE-2020-1206.json index ddf0e3fcfd..f313b267b9 100644 --- a/2020/CVE-2020-1206.json +++ b/2020/CVE-2020-1206.json @@ -13,10 +13,10 @@ "description": "CVE-2020-1206 Uninitialized Kernel Memory Read POC", "fork": false, "created_at": "2020-04-05T15:52:43Z", - "updated_at": "2022-01-17T19:11:49Z", + "updated_at": "2022-01-20T03:11:08Z", "pushed_at": "2020-06-09T20:41:32Z", - "stargazers_count": 141, - "watchers_count": 141, + "stargazers_count": 142, + "watchers_count": 142, "forks_count": 46, "allow_forking": true, "is_template": false, @@ -27,7 +27,7 @@ ], "visibility": "public", "forks": 46, - "watchers": 141, + "watchers": 142, "score": 0 }, { diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index e2a93978c8..90ccc7ee24 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -98,12 +98,12 @@ "pushed_at": "2020-11-03T09:45:24Z", "stargazers_count": 894, "watchers_count": 894, - "forks_count": 243, + "forks_count": 244, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 243, + "forks": 244, "watchers": 894, "score": 0 }, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index fc15c4a331..34f86cb519 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,10 +13,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2022-01-19T17:46:21Z", + "updated_at": "2022-01-20T03:17:56Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3104, - "watchers_count": 3104, + "stargazers_count": 3105, + "watchers_count": 3105, "forks_count": 920, "allow_forking": true, "is_template": false, @@ -43,7 +43,7 @@ ], "visibility": "public", "forks": 920, - "watchers": 3104, + "watchers": 3105, "score": 0 }, { diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index cc72e50dfe..4670ac548b 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -205,17 +205,17 @@ "description": "C# PrintNightmare (CVE-2021-1675)", "fork": false, "created_at": "2021-09-26T20:46:23Z", - "updated_at": "2022-01-19T21:04:37Z", + "updated_at": "2022-01-20T03:18:23Z", "pushed_at": "2021-09-26T22:35:07Z", - "stargazers_count": 4, - "watchers_count": 4, - "forks_count": 3, + "stargazers_count": 6, + "watchers_count": 6, + "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 3, - "watchers": 4, + "forks": 4, + "watchers": 6, "score": 0 }, { diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index 53aca57765..9c12536173 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -969,17 +969,17 @@ "description": "Sudo Baron Samedit Exploit", "fork": false, "created_at": "2021-03-15T17:37:02Z", - "updated_at": "2022-01-18T01:53:41Z", + "updated_at": "2022-01-20T01:06:35Z", "pushed_at": "2022-01-13T05:48:01Z", - "stargazers_count": 426, - "watchers_count": 426, + "stargazers_count": 427, + "watchers_count": 427, "forks_count": 111, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 111, - "watchers": 426, + "watchers": 427, "score": 0 }, { diff --git a/2021/CVE-2021-31956.json b/2021/CVE-2021-31956.json index 23c28390dc..d101b32731 100644 --- a/2021/CVE-2021-31956.json +++ b/2021/CVE-2021-31956.json @@ -13,17 +13,17 @@ "description": null, "fork": false, "created_at": "2022-01-11T16:03:38Z", - "updated_at": "2022-01-19T08:13:48Z", + "updated_at": "2022-01-20T05:38:19Z", "pushed_at": "2022-01-11T16:52:16Z", - "stargazers_count": 22, - "watchers_count": 22, - "forks_count": 13, + "stargazers_count": 24, + "watchers_count": 24, + "forks_count": 14, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 13, - "watchers": 22, + "forks": 14, + "watchers": 24, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-32099.json b/2021/CVE-2021-32099.json index df3e310d5f..534788ff95 100644 --- a/2021/CVE-2021-32099.json +++ b/2021/CVE-2021-32099.json @@ -40,17 +40,17 @@ "description": "CVE-2021-32099", "fork": false, "created_at": "2022-01-12T11:48:34Z", - "updated_at": "2022-01-16T14:41:44Z", + "updated_at": "2022-01-20T02:40:51Z", "pushed_at": "2022-01-12T11:49:20Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, - "watchers": 6, + "watchers": 7, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-34600.json b/2021/CVE-2021-34600.json index edee77fca0..9d71f9fc03 100644 --- a/2021/CVE-2021-34600.json +++ b/2021/CVE-2021-34600.json @@ -13,17 +13,17 @@ "description": null, "fork": false, "created_at": "2022-01-17T16:08:17Z", - "updated_at": "2022-01-18T11:22:05Z", + "updated_at": "2022-01-20T05:31:14Z", "pushed_at": "2022-01-17T16:09:05Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3492.json b/2021/CVE-2021-3492.json index fb02b3b599..361e3b6d06 100644 --- a/2021/CVE-2021-3492.json +++ b/2021/CVE-2021-3492.json @@ -13,17 +13,17 @@ "description": "PoC for CVE-2021-3492 used at Pwn2Own 2021", "fork": false, "created_at": "2021-06-28T09:43:31Z", - "updated_at": "2022-01-12T10:36:26Z", + "updated_at": "2022-01-20T02:13:58Z", "pushed_at": "2021-08-03T14:48:27Z", - "stargazers_count": 36, - "watchers_count": 36, + "stargazers_count": 37, + "watchers_count": 37, "forks_count": 6, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 6, - "watchers": 36, + "watchers": 37, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-35211.json b/2021/CVE-2021-35211.json index 271d7f48a9..1516a8eb63 100644 --- a/2021/CVE-2021-35211.json +++ b/2021/CVE-2021-35211.json @@ -40,17 +40,17 @@ "description": null, "fork": false, "created_at": "2022-01-14T05:52:17Z", - "updated_at": "2022-01-19T20:43:14Z", + "updated_at": "2022-01-20T01:50:55Z", "pushed_at": "2022-01-14T05:56:09Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, - "watchers": 8, + "watchers": 9, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 8ddf74ebfe..09553bef04 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -1236,17 +1236,17 @@ "description": "CVE-2021-41773 CVE-2021-42013漏洞批量检测工具", "fork": false, "created_at": "2021-10-09T03:32:18Z", - "updated_at": "2022-01-13T11:58:37Z", + "updated_at": "2022-01-20T01:11:49Z", "pushed_at": "2021-10-09T03:49:21Z", - "stargazers_count": 118, - "watchers_count": 118, - "forks_count": 39, + "stargazers_count": 119, + "watchers_count": 119, + "forks_count": 40, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 39, - "watchers": 118, + "forks": 40, + "watchers": 119, "score": 0 }, { diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index 638a823402..47fcd63478 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -45,17 +45,17 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-13T10:28:12Z", - "updated_at": "2022-01-19T05:21:46Z", + "updated_at": "2022-01-20T05:43:41Z", "pushed_at": "2021-12-20T04:51:01Z", - "stargazers_count": 216, - "watchers_count": 216, + "stargazers_count": 218, + "watchers_count": 218, "forks_count": 41, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 41, - "watchers": 216, + "watchers": 218, "score": 0 }, { diff --git a/2021/CVE-2021-43297.json b/2021/CVE-2021-43297.json index 869c78501f..a45224779e 100644 --- a/2021/CVE-2021-43297.json +++ b/2021/CVE-2021-43297.json @@ -40,17 +40,17 @@ "description": "Apache Dubbo Hessian2 CVE-2021-43297 demo", "fork": false, "created_at": "2022-01-17T17:52:34Z", - "updated_at": "2022-01-19T10:55:20Z", + "updated_at": "2022-01-20T06:04:45Z", "pushed_at": "2022-01-18T03:43:51Z", - "stargazers_count": 13, - "watchers_count": 13, - "forks_count": 4, + "stargazers_count": 15, + "watchers_count": 15, + "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 4, - "watchers": 13, + "forks": 5, + "watchers": 15, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-43798.json b/2021/CVE-2021-43798.json index 12f624e31a..d2a65a1724 100644 --- a/2021/CVE-2021-43798.json +++ b/2021/CVE-2021-43798.json @@ -67,17 +67,17 @@ "description": "Grafana Unauthorized arbitrary file reading vulnerability", "fork": false, "created_at": "2021-12-07T09:02:16Z", - "updated_at": "2022-01-11T18:53:32Z", + "updated_at": "2022-01-20T03:19:18Z", "pushed_at": "2021-12-09T03:16:21Z", - "stargazers_count": 246, - "watchers_count": 246, + "stargazers_count": 247, + "watchers_count": 247, "forks_count": 66, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 66, - "watchers": 246, + "watchers": 247, "score": 0 }, { diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index f567e5813e..25103301d4 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -94,17 +94,17 @@ "description": "Remote Code Injection In Log4j", "fork": false, "created_at": "2021-12-10T05:23:44Z", - "updated_at": "2022-01-19T23:29:39Z", + "updated_at": "2022-01-20T05:56:59Z", "pushed_at": "2022-01-18T12:01:52Z", - "stargazers_count": 321, - "watchers_count": 321, - "forks_count": 90, + "stargazers_count": 327, + "watchers_count": 327, + "forks_count": 93, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 90, - "watchers": 321, + "forks": 93, + "watchers": 327, "score": 0 }, { @@ -858,11 +858,11 @@ "description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks", "fork": false, "created_at": "2021-12-10T22:35:00Z", - "updated_at": "2022-01-19T19:52:05Z", + "updated_at": "2022-01-20T06:01:40Z", "pushed_at": "2022-01-15T16:18:44Z", - "stargazers_count": 638, - "watchers_count": 638, - "forks_count": 98, + "stargazers_count": 643, + "watchers_count": 643, + "forks_count": 100, "allow_forking": true, "is_template": false, "topics": [ @@ -887,8 +887,8 @@ "writeups" ], "visibility": "public", - "forks": 98, - "watchers": 638, + "forks": 100, + "watchers": 643, "score": 0 }, { @@ -905,11 +905,11 @@ "description": "A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2022-01-19T12:09:00Z", + "updated_at": "2022-01-20T03:01:43Z", "pushed_at": "2022-01-02T07:12:10Z", - "stargazers_count": 1179, - "watchers_count": 1179, - "forks_count": 306, + "stargazers_count": 1181, + "watchers_count": 1181, + "forks_count": 307, "allow_forking": true, "is_template": false, "topics": [ @@ -919,8 +919,8 @@ "security" ], "visibility": "public", - "forks": 306, - "watchers": 1179, + "forks": 307, + "watchers": 1181, "score": 0 }, { @@ -1233,10 +1233,10 @@ "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "fork": false, "created_at": "2021-12-11T07:19:11Z", - "updated_at": "2022-01-19T10:39:45Z", + "updated_at": "2022-01-20T03:05:06Z", "pushed_at": "2022-01-11T05:46:22Z", - "stargazers_count": 191, - "watchers_count": 191, + "stargazers_count": 194, + "watchers_count": 194, "forks_count": 55, "allow_forking": true, "is_template": false, @@ -1248,7 +1248,7 @@ ], "visibility": "public", "forks": 55, - "watchers": 191, + "watchers": 194, "score": 0 }, { @@ -1885,10 +1885,10 @@ "description": "Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!", "fork": false, "created_at": "2021-12-12T00:29:03Z", - "updated_at": "2022-01-19T10:25:03Z", + "updated_at": "2022-01-20T04:30:24Z", "pushed_at": "2022-01-17T19:47:41Z", - "stargazers_count": 586, - "watchers_count": 586, + "stargazers_count": 587, + "watchers_count": 587, "forks_count": 94, "allow_forking": true, "is_template": false, @@ -1907,7 +1907,7 @@ ], "visibility": "public", "forks": 94, - "watchers": 586, + "watchers": 587, "score": 0 }, { @@ -2900,7 +2900,7 @@ "fork": false, "created_at": "2021-12-12T15:44:49Z", "updated_at": "2021-12-29T15:10:45Z", - "pushed_at": "2022-01-19T16:49:31Z", + "pushed_at": "2022-01-20T04:30:27Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, @@ -3539,17 +3539,17 @@ "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", "fork": false, "created_at": "2021-12-13T03:57:50Z", - "updated_at": "2022-01-19T12:28:20Z", + "updated_at": "2022-01-20T02:04:22Z", "pushed_at": "2022-01-02T20:21:42Z", - "stargazers_count": 2631, - "watchers_count": 2631, - "forks_count": 629, + "stargazers_count": 2633, + "watchers_count": 2633, + "forks_count": 630, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 629, - "watchers": 2631, + "forks": 630, + "watchers": 2633, "score": 0 }, { @@ -3570,12 +3570,12 @@ "pushed_at": "2022-01-16T11:35:37Z", "stargazers_count": 254, "watchers_count": 254, - "forks_count": 90, + "forks_count": 89, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 90, + "forks": 89, "watchers": 254, "score": 0 }, @@ -5152,17 +5152,17 @@ "description": "Log4j2 CVE-2021-44228 revshell, ofc it suck!!", "fork": false, "created_at": "2021-12-14T05:24:52Z", - "updated_at": "2021-12-21T19:48:59Z", + "updated_at": "2022-01-20T04:21:09Z", "pushed_at": "2021-12-21T19:48:57Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, - "watchers": 10, + "watchers": 11, "score": 0 }, { @@ -5938,7 +5938,7 @@ "fork": false, "created_at": "2021-12-14T22:27:14Z", "updated_at": "2022-01-18T06:51:44Z", - "pushed_at": "2022-01-19T00:27:48Z", + "pushed_at": "2022-01-20T01:23:43Z", "stargazers_count": 12, "watchers_count": 12, "forks_count": 7, @@ -6999,12 +6999,12 @@ "pushed_at": "2021-12-16T10:36:13Z", "stargazers_count": 3, "watchers_count": 3, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 3, "score": 0 }, diff --git a/2021/CVE-2021-45383.json b/2021/CVE-2021-45383.json index e7b6e18beb..6ce6045b41 100644 --- a/2021/CVE-2021-45383.json +++ b/2021/CVE-2021-45383.json @@ -17,12 +17,12 @@ "pushed_at": "2022-01-13T02:24:32Z", "stargazers_count": 17, "watchers_count": 17, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 17, "score": 0 } diff --git a/2022/CVE-2022-21907.json b/2022/CVE-2022-21907.json index f1e59e0798..d90a0bbe39 100644 --- a/2022/CVE-2022-21907.json +++ b/2022/CVE-2022-21907.json @@ -37,20 +37,20 @@ "html_url": "https:\/\/github.com\/antx-code" }, "html_url": "https:\/\/github.com\/antx-code\/CVE-2022-21907", - "description": "Windows HTTP协议栈远程代码执行漏洞 CVE-2022-21907", + "description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907", "fork": false, "created_at": "2022-01-17T02:28:50Z", - "updated_at": "2022-01-20T00:13:19Z", - "pushed_at": "2022-01-19T13:06:17Z", - "stargazers_count": 262, - "watchers_count": 262, - "forks_count": 77, + "updated_at": "2022-01-20T06:06:23Z", + "pushed_at": "2022-01-20T02:07:59Z", + "stargazers_count": 271, + "watchers_count": 271, + "forks_count": 82, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 77, - "watchers": 262, + "forks": 82, + "watchers": 271, "score": 0 }, { @@ -94,10 +94,10 @@ "description": "Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers", "fork": false, "created_at": "2022-01-17T15:42:37Z", - "updated_at": "2022-01-19T15:47:47Z", + "updated_at": "2022-01-20T05:02:53Z", "pushed_at": "2022-01-18T14:58:44Z", - "stargazers_count": 29, - "watchers_count": 29, + "stargazers_count": 34, + "watchers_count": 34, "forks_count": 6, "allow_forking": true, "is_template": false, @@ -111,7 +111,7 @@ ], "visibility": "public", "forks": 6, - "watchers": 29, + "watchers": 34, "score": 0 } ] \ No newline at end of file