From 1d4a1fce81e812c17fc1e7d831220dfb210f7b03 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sun, 11 Dec 2022 15:19:12 +0900 Subject: [PATCH] Auto Update 2022/12/11 06:19:12 --- 2014/CVE-2014-0160.json | 8 ++++---- 2014/CVE-2014-6271.json | 8 ++++---- 2016/CVE-2016-4657.json | 4 ++-- 2019/CVE-2019-0604.json | 8 ++++---- 2020/CVE-2020-12717.json | 2 +- 2020/CVE-2020-1472.json | 8 ++++---- 2021/CVE-2021-26943.json | 12 ++++++------ 2021/CVE-2021-3129.json | 8 ++++---- 2021/CVE-2021-41773.json | 4 ++-- 2021/CVE-2021-44228.json | 16 ++++++++-------- 2022/CVE-2022-0847.json | 4 ++-- 2022/CVE-2022-1388.json | 8 ++++---- 2022/CVE-2022-2588.json | 8 ++++---- 2022/CVE-2022-45025.json | 14 +++++++------- 14 files changed, 56 insertions(+), 56 deletions(-) diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index 01718434f4..d2c489bcde 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -13,10 +13,10 @@ "description": "A checker (site and tool) for CVE-2014-0160", "fork": false, "created_at": "2014-04-07T23:03:09Z", - "updated_at": "2022-11-21T10:47:03Z", + "updated_at": "2022-12-11T04:53:16Z", "pushed_at": "2021-02-24T09:17:24Z", - "stargazers_count": 2281, - "watchers_count": 2281, + "stargazers_count": 2282, + "watchers_count": 2282, "has_discussions": false, "forks_count": 486, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 486, - "watchers": 2281, + "watchers": 2282, "score": 0 }, { diff --git a/2014/CVE-2014-6271.json b/2014/CVE-2014-6271.json index dce2007be5..0709b3cfad 100644 --- a/2014/CVE-2014-6271.json +++ b/2014/CVE-2014-6271.json @@ -1120,10 +1120,10 @@ "description": "Shellshock exploit + vulnerable environment", "fork": false, "created_at": "2016-12-07T23:38:50Z", - "updated_at": "2022-12-03T05:30:25Z", + "updated_at": "2022-12-11T03:01:54Z", "pushed_at": "2017-10-30T22:46:11Z", - "stargazers_count": 146, - "watchers_count": 146, + "stargazers_count": 147, + "watchers_count": 147, "has_discussions": false, "forks_count": 54, "allow_forking": true, @@ -1139,7 +1139,7 @@ ], "visibility": "public", "forks": 54, - "watchers": 146, + "watchers": 147, "score": 0 }, { diff --git a/2016/CVE-2016-4657.json b/2016/CVE-2016-4657.json index de2a0de6b1..8da97411bf 100644 --- a/2016/CVE-2016-4657.json +++ b/2016/CVE-2016-4657.json @@ -79,13 +79,13 @@ "stargazers_count": 51, "watchers_count": 51, "has_discussions": false, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, + "forks": 4, "watchers": 51, "score": 0 }, diff --git a/2019/CVE-2019-0604.json b/2019/CVE-2019-0604.json index be61a6e4da..625efdd7e3 100644 --- a/2019/CVE-2019-0604.json +++ b/2019/CVE-2019-0604.json @@ -137,10 +137,10 @@ "description": "详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload", "fork": false, "created_at": "2019-12-10T02:39:57Z", - "updated_at": "2022-08-08T02:46:06Z", + "updated_at": "2022-12-11T03:50:03Z", "pushed_at": "2021-04-02T09:12:32Z", - "stargazers_count": 28, - "watchers_count": 28, + "stargazers_count": 29, + "watchers_count": 29, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -149,7 +149,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 28, + "watchers": 29, "score": 0 }, { diff --git a/2020/CVE-2020-12717.json b/2020/CVE-2020-12717.json index 288c3806aa..cea189b705 100644 --- a/2020/CVE-2020-12717.json +++ b/2020/CVE-2020-12717.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2020-05-11T13:09:52Z", "updated_at": "2021-05-09T12:11:55Z", - "pushed_at": "2022-12-06T02:29:10Z", + "pushed_at": "2022-12-11T05:53:35Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 5411597e39..012bc4a931 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -129,10 +129,10 @@ "description": "Exploit Code for CVE-2020-1472 aka Zerologon", "fork": false, "created_at": "2020-09-14T16:57:49Z", - "updated_at": "2022-11-14T12:24:16Z", + "updated_at": "2022-12-11T01:58:23Z", "pushed_at": "2020-11-05T16:37:20Z", - "stargazers_count": 322, - "watchers_count": 322, + "stargazers_count": 323, + "watchers_count": 323, "has_discussions": false, "forks_count": 60, "allow_forking": true, @@ -148,7 +148,7 @@ ], "visibility": "public", "forks": 60, - "watchers": 322, + "watchers": 323, "score": 0 }, { diff --git a/2021/CVE-2021-26943.json b/2021/CVE-2021-26943.json index 366faec7fb..8fa17b67fc 100644 --- a/2021/CVE-2021-26943.json +++ b/2021/CVE-2021-26943.json @@ -13,12 +13,12 @@ "description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.", "fork": false, "created_at": "2020-12-31T16:30:02Z", - "updated_at": "2022-12-03T01:04:22Z", + "updated_at": "2022-12-11T03:11:01Z", "pushed_at": "2021-03-29T12:33:38Z", - "stargazers_count": 99, - "watchers_count": 99, + "stargazers_count": 100, + "watchers_count": 100, "has_discussions": true, - "forks_count": 19, + "forks_count": 20, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -28,8 +28,8 @@ "vulnerability" ], "visibility": "public", - "forks": 19, - "watchers": 99, + "forks": 20, + "watchers": 100, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index 1d09bb3974..91dd208db9 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -42,10 +42,10 @@ "description": "Laravel debug rce", "fork": false, "created_at": "2021-01-22T05:12:21Z", - "updated_at": "2022-11-15T17:39:29Z", + "updated_at": "2022-12-11T03:51:44Z", "pushed_at": "2021-01-24T05:28:07Z", - "stargazers_count": 115, - "watchers_count": 115, + "stargazers_count": 116, + "watchers_count": 116, "has_discussions": false, "forks_count": 53, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 53, - "watchers": 115, + "watchers": 116, "score": 0 }, { diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 9ca687b283..8d045552f8 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -414,7 +414,7 @@ "stargazers_count": 58, "watchers_count": 58, "has_discussions": false, - "forks_count": 23, + "forks_count": 24, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -429,7 +429,7 @@ "thehackersbrain" ], "visibility": "public", - "forks": 23, + "forks": 24, "watchers": 58, "score": 0 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index cef9c17a30..a7f461c48b 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -651,10 +651,10 @@ "description": "An agent to hotpatch the log4j RCE from CVE-2021-44228.", "fork": false, "created_at": "2021-12-12T01:24:51Z", - "updated_at": "2022-11-15T05:26:35Z", + "updated_at": "2022-12-11T03:30:21Z", "pushed_at": "2022-10-24T02:25:53Z", - "stargazers_count": 491, - "watchers_count": 491, + "stargazers_count": 492, + "watchers_count": 492, "has_discussions": false, "forks_count": 69, "allow_forking": true, @@ -663,7 +663,7 @@ "topics": [], "visibility": "public", "forks": 69, - "watchers": 491, + "watchers": 492, "score": 0 }, { @@ -1049,10 +1049,10 @@ "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", "fork": false, "created_at": "2021-12-13T03:57:50Z", - "updated_at": "2022-12-10T22:54:41Z", + "updated_at": "2022-12-11T05:19:20Z", "pushed_at": "2022-11-23T18:23:24Z", - "stargazers_count": 3140, - "watchers_count": 3140, + "stargazers_count": 3141, + "watchers_count": 3141, "has_discussions": true, "forks_count": 735, "allow_forking": true, @@ -1061,7 +1061,7 @@ "topics": [], "visibility": "public", "forks": 735, - "watchers": 3140, + "watchers": 3141, "score": 0 }, { diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index 2bb0e48634..abafca060e 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -1180,13 +1180,13 @@ "stargazers_count": 362, "watchers_count": 362, "has_discussions": false, - "forks_count": 101, + "forks_count": 102, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 101, + "forks": 102, "watchers": 362, "score": 0 }, diff --git a/2022/CVE-2022-1388.json b/2022/CVE-2022-1388.json index 3fe411f03b..0c1faecdbe 100644 --- a/2022/CVE-2022-1388.json +++ b/2022/CVE-2022-1388.json @@ -1697,10 +1697,10 @@ "description": null, "fork": false, "created_at": "2022-11-30T04:06:56Z", - "updated_at": "2022-12-01T08:35:16Z", + "updated_at": "2022-12-11T05:37:02Z", "pushed_at": "2022-11-30T04:07:51Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -1709,7 +1709,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0 }, { diff --git a/2022/CVE-2022-2588.json b/2022/CVE-2022-2588.json index 072f6fa83a..1716f6d8a4 100644 --- a/2022/CVE-2022-2588.json +++ b/2022/CVE-2022-2588.json @@ -13,10 +13,10 @@ "description": "exploit for CVE-2022-2588", "fork": false, "created_at": "2022-08-11T06:01:24Z", - "updated_at": "2022-12-09T23:14:23Z", + "updated_at": "2022-12-11T01:24:53Z", "pushed_at": "2022-10-27T16:35:08Z", - "stargazers_count": 386, - "watchers_count": 386, + "stargazers_count": 387, + "watchers_count": 387, "has_discussions": false, "forks_count": 53, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 53, - "watchers": 386, + "watchers": 387, "score": 0 }, { diff --git a/2022/CVE-2022-45025.json b/2022/CVE-2022-45025.json index b142e956ed..95da79028f 100644 --- a/2022/CVE-2022-45025.json +++ b/2022/CVE-2022-45025.json @@ -13,12 +13,12 @@ "description": "[PoC] Command injection via PDF import in Markdown Preview Enhanced (VSCode, Atom)", "fork": false, "created_at": "2022-12-09T22:48:38Z", - "updated_at": "2022-12-10T20:12:16Z", - "pushed_at": "2022-12-10T16:34:14Z", - "stargazers_count": 12, - "watchers_count": 12, + "updated_at": "2022-12-11T05:57:44Z", + "pushed_at": "2022-12-11T01:31:11Z", + "stargazers_count": 23, + "watchers_count": 23, "has_discussions": false, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -30,8 +30,8 @@ "rce" ], "visibility": "public", - "forks": 3, - "watchers": 12, + "forks": 4, + "watchers": 23, "score": 0 } ] \ No newline at end of file