diff --git a/2017/CVE-2017-0199.json b/2017/CVE-2017-0199.json index b7a7502c6b..082323d480 100644 --- a/2017/CVE-2017-0199.json +++ b/2017/CVE-2017-0199.json @@ -67,17 +67,17 @@ "description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.", "fork": false, "created_at": "2017-04-17T08:10:07Z", - "updated_at": "2021-11-01T03:22:26Z", + "updated_at": "2021-11-12T23:59:38Z", "pushed_at": "2017-11-19T11:01:16Z", - "stargazers_count": 663, - "watchers_count": 663, - "forks_count": 293, + "stargazers_count": 664, + "watchers_count": 664, + "forks_count": 294, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 293, - "watchers": 663, + "forks": 294, + "watchers": 664, "score": 0 }, { diff --git a/2017/CVE-2017-5721.json b/2017/CVE-2017-5721.json index 3c024a409a..9a0c59c7cf 100644 --- a/2017/CVE-2017-5721.json +++ b/2017/CVE-2017-5721.json @@ -13,10 +13,10 @@ "description": "CVE-2017-5721 Proof-of-Concept", "fork": false, "created_at": "2017-10-23T11:00:18Z", - "updated_at": "2021-09-01T03:55:01Z", + "updated_at": "2021-11-12T19:12:55Z", "pushed_at": "2017-10-23T12:41:22Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 15, + "watchers_count": 15, "forks_count": 11, "allow_forking": true, "is_template": false, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 11, - "watchers": 14, + "watchers": 15, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-7494.json b/2017/CVE-2017-7494.json index 9913d1d034..6b3f034012 100644 --- a/2017/CVE-2017-7494.json +++ b/2017/CVE-2017-7494.json @@ -71,7 +71,7 @@ "pushed_at": "2017-10-31T16:20:29Z", "stargazers_count": 289, "watchers_count": 289, - "forks_count": 97, + "forks_count": 98, "allow_forking": true, "is_template": false, "topics": [ @@ -82,7 +82,7 @@ "sambacry" ], "visibility": "public", - "forks": 97, + "forks": 98, "watchers": 289, "score": 0 }, diff --git a/2019/CVE-2019-12594.json b/2019/CVE-2019-12594.json index f6ca621005..5379d116a1 100644 --- a/2019/CVE-2019-12594.json +++ b/2019/CVE-2019-12594.json @@ -13,11 +13,11 @@ "description": "This is a PoC for CVE-2019-12594, a vulnerability in DOSBox 0.74-2.", "fork": false, "created_at": "2019-06-27T15:49:16Z", - "updated_at": "2020-12-09T18:01:25Z", + "updated_at": "2021-11-12T23:06:17Z", "pushed_at": "2019-07-01T17:36:42Z", - "stargazers_count": 9, - "watchers_count": 9, - "forks_count": 2, + "stargazers_count": 10, + "watchers_count": 10, + "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [ @@ -30,8 +30,8 @@ "vulnerability" ], "visibility": "public", - "forks": 2, - "watchers": 9, + "forks": 3, + "watchers": 10, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-6203.json b/2019/CVE-2019-6203.json index 703e32bac1..d757281686 100644 --- a/2019/CVE-2019-6203.json +++ b/2019/CVE-2019-6203.json @@ -13,17 +13,17 @@ "description": "PoC for CVE-2019-6203, works on < iOS 12.2, macOS < 10.14.4", "fork": false, "created_at": "2019-05-10T10:36:54Z", - "updated_at": "2020-12-29T01:02:40Z", + "updated_at": "2021-11-12T21:55:37Z", "pushed_at": "2019-05-17T03:10:30Z", - "stargazers_count": 30, - "watchers_count": 30, + "stargazers_count": 31, + "watchers_count": 31, "forks_count": 12, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 12, - "watchers": 30, + "watchers": 31, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index ca5ae534b6..c8720e0c0f 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -159,12 +159,12 @@ "pushed_at": "2020-10-15T18:31:15Z", "stargazers_count": 377, "watchers_count": 377, - "forks_count": 115, + "forks_count": 116, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 115, + "forks": 116, "watchers": 377, "score": 0 }, diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index 18fc316a07..2fc7299d2c 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -40,17 +40,17 @@ "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-06-29T17:24:14Z", - "updated_at": "2021-11-12T07:32:55Z", + "updated_at": "2021-11-12T20:43:14Z", "pushed_at": "2021-07-20T15:28:13Z", - "stargazers_count": 1456, - "watchers_count": 1456, + "stargazers_count": 1455, + "watchers_count": 1455, "forks_count": 532, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 532, - "watchers": 1456, + "watchers": 1455, "score": 0 }, { diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json index 0b21dff1d2..9e09906e4a 100644 --- a/2021/CVE-2021-22205.json +++ b/2021/CVE-2021-22205.json @@ -13,17 +13,17 @@ "description": null, "fork": false, "created_at": "2021-06-05T15:42:16Z", - "updated_at": "2021-11-12T02:09:30Z", + "updated_at": "2021-11-12T22:22:09Z", "pushed_at": "2021-11-02T14:45:24Z", - "stargazers_count": 160, - "watchers_count": 160, + "stargazers_count": 159, + "watchers_count": 159, "forks_count": 33, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 33, - "watchers": 160, + "watchers": 159, "score": 0 }, { diff --git a/2021/CVE-2021-40449.json b/2021/CVE-2021-40449.json index d33b2c967a..d33dec176e 100644 --- a/2021/CVE-2021-40449.json +++ b/2021/CVE-2021-40449.json @@ -13,17 +13,17 @@ "description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)", "fork": false, "created_at": "2021-10-16T16:17:44Z", - "updated_at": "2021-11-12T11:55:12Z", + "updated_at": "2021-11-12T22:22:24Z", "pushed_at": "2021-11-11T17:09:56Z", - "stargazers_count": 323, - "watchers_count": 323, + "stargazers_count": 322, + "watchers_count": 322, "forks_count": 73, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 73, - "watchers": 323, + "watchers": 322, "score": 0 }, { diff --git a/2021/CVE-2021-40539.json b/2021/CVE-2021-40539.json index edfe752eaf..0da45a2ec9 100644 --- a/2021/CVE-2021-40539.json +++ b/2021/CVE-2021-40539.json @@ -40,17 +40,17 @@ "description": "Exploitation code for CVE-2021-40539", "fork": false, "created_at": "2021-11-03T14:49:27Z", - "updated_at": "2021-11-12T10:08:15Z", + "updated_at": "2021-11-12T19:14:59Z", "pushed_at": "2021-11-09T11:15:19Z", - "stargazers_count": 23, - "watchers_count": 23, - "forks_count": 11, + "stargazers_count": 24, + "watchers_count": 24, + "forks_count": 12, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 11, - "watchers": 23, + "forks": 12, + "watchers": 24, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 3b3756c18e..62bb6e4ed6 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -779,10 +779,10 @@ "description": "A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public ", "fork": false, "created_at": "2021-10-07T01:31:13Z", - "updated_at": "2021-11-11T05:41:19Z", + "updated_at": "2021-11-12T22:23:17Z", "pushed_at": "2021-10-07T08:25:26Z", - "stargazers_count": 37, - "watchers_count": 37, + "stargazers_count": 38, + "watchers_count": 38, "forks_count": 11, "allow_forking": true, "is_template": false, @@ -795,7 +795,7 @@ ], "visibility": "public", "forks": 11, - "watchers": 37, + "watchers": 38, "score": 0 }, { diff --git a/2021/CVE-2021-42574.json b/2021/CVE-2021-42574.json index 2b06d3072d..e16c90fa47 100644 --- a/2021/CVE-2021-42574.json +++ b/2021/CVE-2021-42574.json @@ -94,8 +94,8 @@ "description": "Checks your files for existence of Unicode BIDI characters which can be misused for supply chain attacks. See CVE-2021-42574 ", "fork": false, "created_at": "2021-11-06T22:12:35Z", - "updated_at": "2021-11-12T03:06:40Z", - "pushed_at": "2021-11-10T21:38:12Z", + "updated_at": "2021-11-12T21:20:26Z", + "pushed_at": "2021-11-12T21:20:23Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 1,