From 265e57fd3d6a44835dd5f5415250eb3d9ed5cd9a Mon Sep 17 00:00:00 2001
From: motikan2010-bot <k.agena1993@gmail.com>
Date: Sat, 13 Nov 2021 09:13:03 +0900
Subject: [PATCH] Auto Update 2021/11/13 00:13:03

---
 2017/CVE-2017-0199.json  | 12 ++++++------
 2017/CVE-2017-5721.json  |  8 ++++----
 2017/CVE-2017-7494.json  |  4 ++--
 2019/CVE-2019-12594.json | 12 ++++++------
 2019/CVE-2019-6203.json  |  8 ++++----
 2020/CVE-2020-1472.json  |  4 ++--
 2021/CVE-2021-1675.json  |  8 ++++----
 2021/CVE-2021-22205.json |  8 ++++----
 2021/CVE-2021-40449.json |  8 ++++----
 2021/CVE-2021-40539.json | 12 ++++++------
 2021/CVE-2021-41773.json |  8 ++++----
 2021/CVE-2021-42574.json |  4 ++--
 12 files changed, 48 insertions(+), 48 deletions(-)

diff --git a/2017/CVE-2017-0199.json b/2017/CVE-2017-0199.json
index b7a7502c6b..082323d480 100644
--- a/2017/CVE-2017-0199.json
+++ b/2017/CVE-2017-0199.json
@@ -67,17 +67,17 @@
         "description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
         "fork": false,
         "created_at": "2017-04-17T08:10:07Z",
-        "updated_at": "2021-11-01T03:22:26Z",
+        "updated_at": "2021-11-12T23:59:38Z",
         "pushed_at": "2017-11-19T11:01:16Z",
-        "stargazers_count": 663,
-        "watchers_count": 663,
-        "forks_count": 293,
+        "stargazers_count": 664,
+        "watchers_count": 664,
+        "forks_count": 294,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 293,
-        "watchers": 663,
+        "forks": 294,
+        "watchers": 664,
         "score": 0
     },
     {
diff --git a/2017/CVE-2017-5721.json b/2017/CVE-2017-5721.json
index 3c024a409a..9a0c59c7cf 100644
--- a/2017/CVE-2017-5721.json
+++ b/2017/CVE-2017-5721.json
@@ -13,10 +13,10 @@
         "description": "CVE-2017-5721 Proof-of-Concept",
         "fork": false,
         "created_at": "2017-10-23T11:00:18Z",
-        "updated_at": "2021-09-01T03:55:01Z",
+        "updated_at": "2021-11-12T19:12:55Z",
         "pushed_at": "2017-10-23T12:41:22Z",
-        "stargazers_count": 14,
-        "watchers_count": 14,
+        "stargazers_count": 15,
+        "watchers_count": 15,
         "forks_count": 11,
         "allow_forking": true,
         "is_template": false,
@@ -28,7 +28,7 @@
         ],
         "visibility": "public",
         "forks": 11,
-        "watchers": 14,
+        "watchers": 15,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2017/CVE-2017-7494.json b/2017/CVE-2017-7494.json
index 9913d1d034..6b3f034012 100644
--- a/2017/CVE-2017-7494.json
+++ b/2017/CVE-2017-7494.json
@@ -71,7 +71,7 @@
         "pushed_at": "2017-10-31T16:20:29Z",
         "stargazers_count": 289,
         "watchers_count": 289,
-        "forks_count": 97,
+        "forks_count": 98,
         "allow_forking": true,
         "is_template": false,
         "topics": [
@@ -82,7 +82,7 @@
             "sambacry"
         ],
         "visibility": "public",
-        "forks": 97,
+        "forks": 98,
         "watchers": 289,
         "score": 0
     },
diff --git a/2019/CVE-2019-12594.json b/2019/CVE-2019-12594.json
index f6ca621005..5379d116a1 100644
--- a/2019/CVE-2019-12594.json
+++ b/2019/CVE-2019-12594.json
@@ -13,11 +13,11 @@
         "description": "This is a PoC for CVE-2019-12594, a vulnerability in DOSBox 0.74-2.",
         "fork": false,
         "created_at": "2019-06-27T15:49:16Z",
-        "updated_at": "2020-12-09T18:01:25Z",
+        "updated_at": "2021-11-12T23:06:17Z",
         "pushed_at": "2019-07-01T17:36:42Z",
-        "stargazers_count": 9,
-        "watchers_count": 9,
-        "forks_count": 2,
+        "stargazers_count": 10,
+        "watchers_count": 10,
+        "forks_count": 3,
         "allow_forking": true,
         "is_template": false,
         "topics": [
@@ -30,8 +30,8 @@
             "vulnerability"
         ],
         "visibility": "public",
-        "forks": 2,
-        "watchers": 9,
+        "forks": 3,
+        "watchers": 10,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2019/CVE-2019-6203.json b/2019/CVE-2019-6203.json
index 703e32bac1..d757281686 100644
--- a/2019/CVE-2019-6203.json
+++ b/2019/CVE-2019-6203.json
@@ -13,17 +13,17 @@
         "description": "PoC for CVE-2019-6203, works on < iOS 12.2, macOS < 10.14.4",
         "fork": false,
         "created_at": "2019-05-10T10:36:54Z",
-        "updated_at": "2020-12-29T01:02:40Z",
+        "updated_at": "2021-11-12T21:55:37Z",
         "pushed_at": "2019-05-17T03:10:30Z",
-        "stargazers_count": 30,
-        "watchers_count": 30,
+        "stargazers_count": 31,
+        "watchers_count": 31,
         "forks_count": 12,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 12,
-        "watchers": 30,
+        "watchers": 31,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json
index ca5ae534b6..c8720e0c0f 100644
--- a/2020/CVE-2020-1472.json
+++ b/2020/CVE-2020-1472.json
@@ -159,12 +159,12 @@
         "pushed_at": "2020-10-15T18:31:15Z",
         "stargazers_count": 377,
         "watchers_count": 377,
-        "forks_count": 115,
+        "forks_count": 116,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 115,
+        "forks": 116,
         "watchers": 377,
         "score": 0
     },
diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json
index 18fc316a07..2fc7299d2c 100644
--- a/2021/CVE-2021-1675.json
+++ b/2021/CVE-2021-1675.json
@@ -40,17 +40,17 @@
         "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
         "fork": false,
         "created_at": "2021-06-29T17:24:14Z",
-        "updated_at": "2021-11-12T07:32:55Z",
+        "updated_at": "2021-11-12T20:43:14Z",
         "pushed_at": "2021-07-20T15:28:13Z",
-        "stargazers_count": 1456,
-        "watchers_count": 1456,
+        "stargazers_count": 1455,
+        "watchers_count": 1455,
         "forks_count": 532,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 532,
-        "watchers": 1456,
+        "watchers": 1455,
         "score": 0
     },
     {
diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json
index 0b21dff1d2..9e09906e4a 100644
--- a/2021/CVE-2021-22205.json
+++ b/2021/CVE-2021-22205.json
@@ -13,17 +13,17 @@
         "description": null,
         "fork": false,
         "created_at": "2021-06-05T15:42:16Z",
-        "updated_at": "2021-11-12T02:09:30Z",
+        "updated_at": "2021-11-12T22:22:09Z",
         "pushed_at": "2021-11-02T14:45:24Z",
-        "stargazers_count": 160,
-        "watchers_count": 160,
+        "stargazers_count": 159,
+        "watchers_count": 159,
         "forks_count": 33,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 33,
-        "watchers": 160,
+        "watchers": 159,
         "score": 0
     },
     {
diff --git a/2021/CVE-2021-40449.json b/2021/CVE-2021-40449.json
index d33b2c967a..d33dec176e 100644
--- a/2021/CVE-2021-40449.json
+++ b/2021/CVE-2021-40449.json
@@ -13,17 +13,17 @@
         "description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
         "fork": false,
         "created_at": "2021-10-16T16:17:44Z",
-        "updated_at": "2021-11-12T11:55:12Z",
+        "updated_at": "2021-11-12T22:22:24Z",
         "pushed_at": "2021-11-11T17:09:56Z",
-        "stargazers_count": 323,
-        "watchers_count": 323,
+        "stargazers_count": 322,
+        "watchers_count": 322,
         "forks_count": 73,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 73,
-        "watchers": 323,
+        "watchers": 322,
         "score": 0
     },
     {
diff --git a/2021/CVE-2021-40539.json b/2021/CVE-2021-40539.json
index edfe752eaf..0da45a2ec9 100644
--- a/2021/CVE-2021-40539.json
+++ b/2021/CVE-2021-40539.json
@@ -40,17 +40,17 @@
         "description": "Exploitation code for CVE-2021-40539",
         "fork": false,
         "created_at": "2021-11-03T14:49:27Z",
-        "updated_at": "2021-11-12T10:08:15Z",
+        "updated_at": "2021-11-12T19:14:59Z",
         "pushed_at": "2021-11-09T11:15:19Z",
-        "stargazers_count": 23,
-        "watchers_count": 23,
-        "forks_count": 11,
+        "stargazers_count": 24,
+        "watchers_count": 24,
+        "forks_count": 12,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 11,
-        "watchers": 23,
+        "forks": 12,
+        "watchers": 24,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json
index 3b3756c18e..62bb6e4ed6 100644
--- a/2021/CVE-2021-41773.json
+++ b/2021/CVE-2021-41773.json
@@ -779,10 +779,10 @@
         "description": "A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public ",
         "fork": false,
         "created_at": "2021-10-07T01:31:13Z",
-        "updated_at": "2021-11-11T05:41:19Z",
+        "updated_at": "2021-11-12T22:23:17Z",
         "pushed_at": "2021-10-07T08:25:26Z",
-        "stargazers_count": 37,
-        "watchers_count": 37,
+        "stargazers_count": 38,
+        "watchers_count": 38,
         "forks_count": 11,
         "allow_forking": true,
         "is_template": false,
@@ -795,7 +795,7 @@
         ],
         "visibility": "public",
         "forks": 11,
-        "watchers": 37,
+        "watchers": 38,
         "score": 0
     },
     {
diff --git a/2021/CVE-2021-42574.json b/2021/CVE-2021-42574.json
index 2b06d3072d..e16c90fa47 100644
--- a/2021/CVE-2021-42574.json
+++ b/2021/CVE-2021-42574.json
@@ -94,8 +94,8 @@
         "description": "Checks your files for existence of Unicode BIDI characters which can be misused for supply chain attacks. See CVE-2021-42574 ",
         "fork": false,
         "created_at": "2021-11-06T22:12:35Z",
-        "updated_at": "2021-11-12T03:06:40Z",
-        "pushed_at": "2021-11-10T21:38:12Z",
+        "updated_at": "2021-11-12T21:20:26Z",
+        "pushed_at": "2021-11-12T21:20:23Z",
         "stargazers_count": 2,
         "watchers_count": 2,
         "forks_count": 1,