From 085d4f4bf8af640c8df44b8ee3b2a685f1219f4e Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sun, 3 Mar 2024 15:26:20 +0900 Subject: [PATCH] Auto Update 2024/03/03 06:26:20 --- 2017/CVE-2017-5721.json | 8 ++++---- 2017/CVE-2017-5754.json | 8 ++++---- 2019/CVE-2019-10758.json | 8 ++++---- 2019/CVE-2019-17558.json | 8 ++++---- 2020/CVE-2020-14882.json | 8 ++++---- 2021/CVE-2021-21972.json | 8 ++++---- 2021/CVE-2021-34527.json | 8 ++++---- 2021/CVE-2021-44228.json | 2 +- 2022/CVE-2022-0995.json | 4 ++-- 2022/CVE-2022-22954.json | 8 ++++---- 2022/CVE-2022-38181.json | 8 ++++---- 2022/CVE-2022-38694.json | 8 ++++---- 2023/CVE-2023-2437.json | 2 +- 2023/CVE-2023-38831.json | 8 ++++---- 2023/CVE-2023-6553.json | 8 ++++---- 2023/CVE-2023-6595.json | 2 +- 2024/CVE-2024-1709.json | 2 +- 2024/CVE-2024-20291.json | 6 +++--- 2024/CVE-2024-21672.json | 8 ++++---- 2024/CVE-2024-21762.json | 12 ++++++------ 20 files changed, 67 insertions(+), 67 deletions(-) diff --git a/2017/CVE-2017-5721.json b/2017/CVE-2017-5721.json index ac7ab06d0d..c2e5177388 100644 --- a/2017/CVE-2017-5721.json +++ b/2017/CVE-2017-5721.json @@ -13,10 +13,10 @@ "description": "CVE-2017-5721 Proof-of-Concept", "fork": false, "created_at": "2017-10-23T11:00:18Z", - "updated_at": "2023-08-17T06:16:19Z", + "updated_at": "2024-03-03T03:35:56Z", "pushed_at": "2017-10-23T12:41:22Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 17, + "watchers_count": 17, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 12, - "watchers": 16, + "watchers": 17, "score": 0, "subscribers_count": 2 } diff --git a/2017/CVE-2017-5754.json b/2017/CVE-2017-5754.json index 0fee995aeb..40af0b2164 100644 --- a/2017/CVE-2017-5754.json +++ b/2017/CVE-2017-5754.json @@ -53,10 +53,10 @@ "description": "Meltdown Exploit \/ Proof-of-concept \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.", "fork": false, "created_at": "2018-01-04T23:51:12Z", - "updated_at": "2024-02-29T06:53:36Z", + "updated_at": "2024-03-03T02:25:11Z", "pushed_at": "2018-02-27T05:22:38Z", - "stargazers_count": 544, - "watchers_count": 544, + "stargazers_count": 543, + "watchers_count": 543, "has_discussions": false, "forks_count": 71, "allow_forking": true, @@ -74,7 +74,7 @@ ], "visibility": "public", "forks": 71, - "watchers": 544, + "watchers": 543, "score": 0, "subscribers_count": 47 }, diff --git a/2019/CVE-2019-10758.json b/2019/CVE-2019-10758.json index 3b2e99ddb6..75edcb7666 100644 --- a/2019/CVE-2019-10758.json +++ b/2019/CVE-2019-10758.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2019-12-26T06:58:56Z", - "updated_at": "2023-09-28T11:09:24Z", + "updated_at": "2024-03-03T01:11:37Z", "pushed_at": "2019-12-26T08:44:54Z", - "stargazers_count": 112, - "watchers_count": 112, + "stargazers_count": 113, + "watchers_count": 113, "has_discussions": false, "forks_count": 26, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 26, - "watchers": 112, + "watchers": 113, "score": 0, "subscribers_count": 3 }, diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index cb5c58079f..898f683092 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -43,10 +43,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-03-02T21:43:00Z", + "updated_at": "2024-03-03T03:12:55Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3995, - "watchers_count": 3995, + "stargazers_count": 3996, + "watchers_count": 3996, "has_discussions": false, "forks_count": 1079, "allow_forking": true, @@ -75,7 +75,7 @@ ], "visibility": "public", "forks": 1079, - "watchers": 3995, + "watchers": 3996, "score": 0, "subscribers_count": 152 }, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 262fde0135..42b75f63bf 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,10 +13,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-03-02T21:43:00Z", + "updated_at": "2024-03-03T03:12:55Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3995, - "watchers_count": 3995, + "stargazers_count": 3996, + "watchers_count": 3996, "has_discussions": false, "forks_count": 1079, "allow_forking": true, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 1079, - "watchers": 3995, + "watchers": 3996, "score": 0, "subscribers_count": 152 }, diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 78ccb0477b..84db5cdc39 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -851,10 +851,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-02-28T09:26:07Z", + "updated_at": "2024-03-03T03:42:40Z", "pushed_at": "2024-02-01T06:53:03Z", - "stargazers_count": 1216, - "watchers_count": 1216, + "stargazers_count": 1217, + "watchers_count": 1217, "has_discussions": false, "forks_count": 154, "allow_forking": true, @@ -870,7 +870,7 @@ ], "visibility": "public", "forks": 154, - "watchers": 1216, + "watchers": 1217, "score": 0, "subscribers_count": 12 } diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json index ab18e6140f..58ee2275bb 100644 --- a/2021/CVE-2021-34527.json +++ b/2021/CVE-2021-34527.json @@ -109,10 +109,10 @@ "description": "PrintNightmare - Windows Print Spooler RCE\/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits", "fork": false, "created_at": "2021-07-03T15:15:12Z", - "updated_at": "2024-02-23T13:13:22Z", + "updated_at": "2024-03-03T03:15:21Z", "pushed_at": "2021-09-13T12:12:17Z", - "stargazers_count": 100, - "watchers_count": 100, + "stargazers_count": 101, + "watchers_count": 101, "has_discussions": false, "forks_count": 39, "allow_forking": true, @@ -128,7 +128,7 @@ ], "visibility": "public", "forks": 39, - "watchers": 100, + "watchers": 101, "score": 0, "subscribers_count": 8 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 2ed57a6177..874bfd4fc2 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -1527,7 +1527,7 @@ "fork": false, "created_at": "2021-12-11T12:16:45Z", "updated_at": "2023-05-28T11:06:10Z", - "pushed_at": "2024-03-01T08:19:21Z", + "pushed_at": "2024-03-03T03:56:05Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, diff --git a/2022/CVE-2022-0995.json b/2022/CVE-2022-0995.json index 3eedcb953a..f4b4eb3637 100644 --- a/2022/CVE-2022-0995.json +++ b/2022/CVE-2022-0995.json @@ -18,13 +18,13 @@ "stargazers_count": 491, "watchers_count": 491, "has_discussions": false, - "forks_count": 72, + "forks_count": 70, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 72, + "forks": 70, "watchers": 491, "score": 0, "subscribers_count": 8 diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index 341cdfc654..4dd92a6cbc 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -796,10 +796,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-02-28T09:26:07Z", + "updated_at": "2024-03-03T03:42:40Z", "pushed_at": "2024-02-01T06:53:03Z", - "stargazers_count": 1216, - "watchers_count": 1216, + "stargazers_count": 1217, + "watchers_count": 1217, "has_discussions": false, "forks_count": 154, "allow_forking": true, @@ -815,7 +815,7 @@ ], "visibility": "public", "forks": 154, - "watchers": 1216, + "watchers": 1217, "score": 0, "subscribers_count": 12 }, diff --git a/2022/CVE-2022-38181.json b/2022/CVE-2022-38181.json index e2791e7001..fe750ba235 100644 --- a/2022/CVE-2022-38181.json +++ b/2022/CVE-2022-38181.json @@ -13,10 +13,10 @@ "description": "CVE-2022-38181 POC for FireTV 2nd gen Cube (raven)", "fork": false, "created_at": "2023-04-13T13:19:04Z", - "updated_at": "2024-01-13T18:37:05Z", + "updated_at": "2024-03-03T06:14:54Z", "pushed_at": "2023-06-15T17:08:34Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-38694.json b/2022/CVE-2022-38694.json index c039d85922..e611c1a0f7 100644 --- a/2022/CVE-2022-38694.json +++ b/2022/CVE-2022-38694.json @@ -13,10 +13,10 @@ "description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692", "fork": false, "created_at": "2023-06-10T08:31:26Z", - "updated_at": "2024-03-01T13:48:34Z", + "updated_at": "2024-03-03T01:39:15Z", "pushed_at": "2024-02-23T14:48:26Z", - "stargazers_count": 174, - "watchers_count": 174, + "stargazers_count": 175, + "watchers_count": 175, "has_discussions": true, "forks_count": 24, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 24, - "watchers": 174, + "watchers": 175, "score": 0, "subscribers_count": 7 } diff --git a/2023/CVE-2023-2437.json b/2023/CVE-2023-2437.json index a76bad5656..a5d6686bc7 100644 --- a/2023/CVE-2023-2437.json +++ b/2023/CVE-2023-2437.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json index 79b4462875..cf76b5d8f0 100644 --- a/2023/CVE-2023-38831.json +++ b/2023/CVE-2023-38831.json @@ -676,10 +676,10 @@ "description": "This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script is executed, leading to code execution.", "fork": false, "created_at": "2023-09-03T21:14:05Z", - "updated_at": "2024-02-28T09:36:52Z", + "updated_at": "2024-03-03T05:41:26Z", "pushed_at": "2023-09-08T06:15:42Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -688,7 +688,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-6553.json b/2023/CVE-2023-6553.json index e8cfce99c8..82a51773a2 100644 --- a/2023/CVE-2023-6553.json +++ b/2023/CVE-2023-6553.json @@ -13,10 +13,10 @@ "description": "Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution", "fork": false, "created_at": "2023-12-13T20:26:59Z", - "updated_at": "2024-02-09T10:29:39Z", + "updated_at": "2024-03-03T03:57:22Z", "pushed_at": "2024-02-06T23:22:31Z", - "stargazers_count": 61, - "watchers_count": 61, + "stargazers_count": 62, + "watchers_count": 62, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -39,7 +39,7 @@ ], "visibility": "public", "forks": 18, - "watchers": 61, + "watchers": 62, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-6595.json b/2023/CVE-2023-6595.json index 0c4dce7bad..1a3b3bd754 100644 --- a/2023/CVE-2023-6595.json +++ b/2023/CVE-2023-6595.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-1709.json b/2024/CVE-2024-1709.json index 9f4aa2db13..3e9fe100be 100644 --- a/2024/CVE-2024-1709.json +++ b/2024/CVE-2024-1709.json @@ -96,6 +96,6 @@ "forks": 0, "watchers": 3, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-20291.json b/2024/CVE-2024-20291.json index d0939d46c8..14c4312917 100644 --- a/2024/CVE-2024-20291.json +++ b/2024/CVE-2024-20291.json @@ -18,15 +18,15 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-21672.json b/2024/CVE-2024-21672.json index af920ee987..7788f78889 100644 --- a/2024/CVE-2024-21672.json +++ b/2024/CVE-2024-21672.json @@ -13,10 +13,10 @@ "description": "POC for CVE-2024-21672 Confluence Data Center and Server RCE", "fork": false, "created_at": "2024-03-01T20:42:59Z", - "updated_at": "2024-03-03T00:27:53Z", + "updated_at": "2024-03-03T01:25:17Z", "pushed_at": "2024-03-02T03:08:36Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-21762.json b/2024/CVE-2024-21762.json index 40ca50e085..4e7d22941f 100644 --- a/2024/CVE-2024-21762.json +++ b/2024/CVE-2024-21762.json @@ -48,13 +48,13 @@ "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 3, "score": 0, "subscribers_count": 1 @@ -73,10 +73,10 @@ "description": "Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762", "fork": false, "created_at": "2024-02-28T21:16:10Z", - "updated_at": "2024-03-02T19:15:03Z", + "updated_at": "2024-03-03T01:34:39Z", "pushed_at": "2024-03-01T20:02:52Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 11, + "watchers": 12, "score": 0, "subscribers_count": 1 }