diff --git a/2008/CVE-2008-0166.json b/2008/CVE-2008-0166.json index a461ec5cff..59e06d04d0 100644 --- a/2008/CVE-2008-0166.json +++ b/2008/CVE-2008-0166.json @@ -70,7 +70,7 @@ "fork": false, "created_at": "2022-05-15T10:28:03Z", "updated_at": "2022-05-25T10:08:18Z", - "pushed_at": "2022-05-29T10:38:52Z", + "pushed_at": "2022-05-29T15:22:37Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2010/CVE-2010-2075.json b/2010/CVE-2010-2075.json index 1e0f42f1eb..bd3ecb2e07 100644 --- a/2010/CVE-2010-2075.json +++ b/2010/CVE-2010-2075.json @@ -68,7 +68,7 @@ "fork": false, "created_at": "2022-05-28T02:47:22Z", "updated_at": "2022-05-28T15:06:54Z", - "pushed_at": "2022-05-28T15:13:02Z", + "pushed_at": "2022-05-29T18:04:26Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 0, diff --git a/2011/CVE-2011-2523.json b/2011/CVE-2011-2523.json index 1d14b063cc..800d18029b 100644 --- a/2011/CVE-2011-2523.json +++ b/2011/CVE-2011-2523.json @@ -177,10 +177,10 @@ "html_url": "https:\/\/github.com\/MFernstrom" }, "html_url": "https:\/\/github.com\/MFernstrom\/OffensivePascal-CVE-2011-2523", - "description": "FreePascal implementation of CVE-2011-2523", + "description": "FreePascal implementation of the vsFTPD 2.3.4 CVE-2011-2523", "fork": false, "created_at": "2022-05-27T20:47:01Z", - "updated_at": "2022-05-28T08:11:29Z", + "updated_at": "2022-05-29T18:03:07Z", "pushed_at": "2022-05-28T00:24:53Z", "stargazers_count": 2, "watchers_count": 2, diff --git a/2013/CVE-2013-2028.json b/2013/CVE-2013-2028.json index 5755a0ab27..9ec7d901de 100644 --- a/2013/CVE-2013-2028.json +++ b/2013/CVE-2013-2028.json @@ -94,10 +94,10 @@ "description": "CVE-2013-2028 python exploit", "fork": false, "created_at": "2020-06-27T15:08:26Z", - "updated_at": "2022-03-14T03:24:44Z", + "updated_at": "2022-05-29T14:27:36Z", "pushed_at": "2020-06-27T15:08:58Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -109,7 +109,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 7, + "watchers": 8, "score": 0 }, { diff --git a/2017/CVE-2017-12617.json b/2017/CVE-2017-12617.json index df393122f1..3063a96ae8 100644 --- a/2017/CVE-2017-12617.json +++ b/2017/CVE-2017-12617.json @@ -17,12 +17,12 @@ "pushed_at": "2017-10-11T07:43:50Z", "stargazers_count": 371, "watchers_count": 371, - "forks_count": 138, + "forks_count": 139, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 138, + "forks": 139, "watchers": 371, "score": 0 }, diff --git a/2017/CVE-2017-7494.json b/2017/CVE-2017-7494.json index d6b9edfcb5..6e2d8cea97 100644 --- a/2017/CVE-2017-7494.json +++ b/2017/CVE-2017-7494.json @@ -424,17 +424,17 @@ "description": "SambaCry exploit (CVE-2017-7494) ", "fork": false, "created_at": "2022-05-07T11:42:40Z", - "updated_at": "2022-05-23T20:31:18Z", + "updated_at": "2022-05-29T16:27:00Z", "pushed_at": "2022-05-08T09:02:36Z", - "stargazers_count": 3, - "watchers_count": 3, - "forks_count": 0, + "stargazers_count": 4, + "watchers_count": 4, + "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 0, - "watchers": 3, + "forks": 1, + "watchers": 4, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-0887.json b/2019/CVE-2019-0887.json index 2ecd3dfd4d..67f0250834 100644 --- a/2019/CVE-2019-0887.json +++ b/2019/CVE-2019-0887.json @@ -40,17 +40,17 @@ "description": "exp for CVE-2019-0887", "fork": false, "created_at": "2021-01-14T07:49:51Z", - "updated_at": "2022-04-17T16:53:24Z", + "updated_at": "2022-05-29T14:28:40Z", "pushed_at": "2021-01-15T02:44:14Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 16, + "watchers_count": 16, "forks_count": 6, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 6, - "watchers": 15, + "watchers": 16, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-2215.json b/2019/CVE-2019-2215.json index 0364ba8b96..ffc055003c 100644 --- a/2019/CVE-2019-2215.json +++ b/2019/CVE-2019-2215.json @@ -326,7 +326,7 @@ "pushed_at": "2022-03-19T14:07:35Z", "stargazers_count": 3, "watchers_count": 3, - "forks_count": 4, + "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [ @@ -340,7 +340,7 @@ "security" ], "visibility": "public", - "forks": 4, + "forks": 5, "watchers": 3, "score": 0 }, diff --git a/2020/CVE-2020-4464.json b/2020/CVE-2020-4464.json index 70de0db2a2..d83afceaf7 100644 --- a/2020/CVE-2020-4464.json +++ b/2020/CVE-2020-4464.json @@ -13,7 +13,7 @@ "description": "CVE-2020-4464 \/ CVE-2020-4450", "fork": false, "created_at": "2021-08-17T08:44:49Z", - "updated_at": "2022-03-24T10:38:17Z", + "updated_at": "2022-05-29T16:44:38Z", "pushed_at": "2021-08-24T15:02:19Z", "stargazers_count": 15, "watchers_count": 15, diff --git a/2020/CVE-2020-5902.json b/2020/CVE-2020-5902.json index b01ddebae6..e33ca25412 100644 --- a/2020/CVE-2020-5902.json +++ b/2020/CVE-2020-5902.json @@ -1285,12 +1285,12 @@ "pushed_at": "2021-12-17T11:40:03Z", "stargazers_count": 10, "watchers_count": 10, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 5, + "forks": 6, "watchers": 10, "score": 0 }, @@ -1443,17 +1443,17 @@ "description": "CVE-2020-5902 CVE-2021-22986 CVE-2022-1388 POC集合", "fork": false, "created_at": "2022-05-28T13:30:22Z", - "updated_at": "2022-05-29T09:19:28Z", + "updated_at": "2022-05-29T14:08:00Z", "pushed_at": "2022-05-28T14:25:22Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, - "watchers": 1, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-9484.json b/2020/CVE-2020-9484.json index 0680f9c328..b11af43897 100644 --- a/2020/CVE-2020-9484.json +++ b/2020/CVE-2020-9484.json @@ -44,12 +44,12 @@ "pushed_at": "2021-10-28T02:31:04Z", "stargazers_count": 126, "watchers_count": 126, - "forks_count": 31, + "forks_count": 32, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 31, + "forks": 32, "watchers": 126, "score": 0 }, diff --git a/2021/CVE-2021-22986.json b/2021/CVE-2021-22986.json index 009eaf8d10..9ff54570a2 100644 --- a/2021/CVE-2021-22986.json +++ b/2021/CVE-2021-22986.json @@ -315,17 +315,17 @@ "description": "CVE-2020-5902 CVE-2021-22986 CVE-2022-1388 POC集合", "fork": false, "created_at": "2022-05-28T13:30:22Z", - "updated_at": "2022-05-29T09:19:28Z", + "updated_at": "2022-05-29T14:08:00Z", "pushed_at": "2022-05-28T14:25:22Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, - "watchers": 1, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-26857.json b/2021/CVE-2021-26857.json index 65991a4e2a..6b85c509ce 100644 --- a/2021/CVE-2021-26857.json +++ b/2021/CVE-2021-26857.json @@ -13,17 +13,17 @@ "description": "proxylogon exploit - CVE-2021-26857", "fork": false, "created_at": "2021-03-11T17:32:32Z", - "updated_at": "2022-05-03T13:31:27Z", + "updated_at": "2022-05-29T16:59:18Z", "pushed_at": "2021-03-11T17:34:15Z", - "stargazers_count": 111, - "watchers_count": 111, + "stargazers_count": 112, + "watchers_count": 112, "forks_count": 35, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 35, - "watchers": 111, + "watchers": 112, "score": 0 }, { diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index a5501f8fd9..65bd688e4b 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -726,17 +726,17 @@ "description": "Root shell PoC for CVE-2021-3156", "fork": false, "created_at": "2021-02-03T19:57:56Z", - "updated_at": "2022-05-14T11:24:18Z", + "updated_at": "2022-05-29T12:54:47Z", "pushed_at": "2022-02-13T12:21:53Z", - "stargazers_count": 102, - "watchers_count": 102, + "stargazers_count": 103, + "watchers_count": 103, "forks_count": 44, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 44, - "watchers": 102, + "watchers": 103, "score": 0 }, { diff --git a/2021/CVE-2021-3560.json b/2021/CVE-2021-3560.json index 9b4c6c92b6..63fcd9a4ff 100644 --- a/2021/CVE-2021-3560.json +++ b/2021/CVE-2021-3560.json @@ -380,17 +380,17 @@ "description": "PolicyKit CVE-2021-3560 Exploit (Authentication Agent)", "fork": false, "created_at": "2022-04-29T18:57:30Z", - "updated_at": "2022-05-29T10:18:38Z", + "updated_at": "2022-05-29T18:09:24Z", "pushed_at": "2022-05-02T07:49:01Z", - "stargazers_count": 50, - "watchers_count": 50, + "stargazers_count": 53, + "watchers_count": 53, "forks_count": 6, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 6, - "watchers": 50, + "watchers": 53, "score": 0 }, { diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index 06e902dda9..40309704c4 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -17,7 +17,7 @@ "pushed_at": "2022-03-18T16:32:13Z", "stargazers_count": 802, "watchers_count": 802, - "forks_count": 172, + "forks_count": 173, "allow_forking": true, "is_template": false, "topics": [ @@ -27,7 +27,7 @@ "s4u2self" ], "visibility": "public", - "forks": 172, + "forks": 173, "watchers": 802, "score": 0 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 3c01b7b15f..259a1299ca 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -98,12 +98,12 @@ "pushed_at": "2022-01-18T12:01:52Z", "stargazers_count": 367, "watchers_count": 367, - "forks_count": 116, + "forks_count": 117, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 116, + "forks": 117, "watchers": 367, "score": 0 }, @@ -3229,17 +3229,17 @@ "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", "fork": false, "created_at": "2021-12-13T03:57:50Z", - "updated_at": "2022-05-29T06:46:12Z", + "updated_at": "2022-05-29T14:54:00Z", "pushed_at": "2022-05-17T13:25:17Z", - "stargazers_count": 2898, - "watchers_count": 2898, + "stargazers_count": 2899, + "watchers_count": 2899, "forks_count": 711, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 711, - "watchers": 2898, + "watchers": 2899, "score": 0 }, { @@ -5012,10 +5012,10 @@ "description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)", "fork": false, "created_at": "2021-12-14T10:04:42Z", - "updated_at": "2022-05-29T11:24:59Z", + "updated_at": "2022-05-29T13:13:28Z", "pushed_at": "2022-01-27T16:08:20Z", - "stargazers_count": 426, - "watchers_count": 426, + "stargazers_count": 425, + "watchers_count": 425, "forks_count": 94, "allow_forking": true, "is_template": false, @@ -5031,7 +5031,7 @@ ], "visibility": "public", "forks": 94, - "watchers": 426, + "watchers": 425, "score": 0 }, { diff --git a/2022/CVE-2022-0540.json b/2022/CVE-2022-0540.json index b063825cca..15532556b4 100644 --- a/2022/CVE-2022-0540.json +++ b/2022/CVE-2022-0540.json @@ -13,17 +13,17 @@ "description": "Atlassian Jira Seraph Authentication Bypass RCE(CVE-2022-0540)", "fork": false, "created_at": "2022-05-25T10:47:04Z", - "updated_at": "2022-05-27T13:56:11Z", + "updated_at": "2022-05-29T13:52:19Z", "pushed_at": "2022-05-25T13:43:16Z", - "stargazers_count": 14, - "watchers_count": 14, - "forks_count": 3, + "stargazers_count": 15, + "watchers_count": 15, + "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 3, - "watchers": 14, + "forks": 4, + "watchers": 15, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index 11ccb13f41..96e537de42 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -449,12 +449,12 @@ "pushed_at": "2022-03-08T15:47:53Z", "stargazers_count": 3, "watchers_count": 3, - "forks_count": 4, + "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 4, + "forks": 5, "watchers": 3, "score": 0 }, @@ -1099,12 +1099,12 @@ "pushed_at": "2022-03-15T00:26:45Z", "stargazers_count": 275, "watchers_count": 275, - "forks_count": 66, + "forks_count": 67, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 66, + "forks": 67, "watchers": 275, "score": 0 }, @@ -1207,17 +1207,17 @@ "description": "CVE-2022-0847 POC", "fork": false, "created_at": "2022-03-14T15:32:25Z", - "updated_at": "2022-04-13T11:58:32Z", + "updated_at": "2022-05-29T12:51:05Z", "pushed_at": "2022-03-14T20:34:57Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, - "watchers": 5, + "watchers": 6, "score": 0 }, { diff --git a/2022/CVE-2022-1388.json b/2022/CVE-2022-1388.json index 0eafdadc4d..e2dc1e7b57 100644 --- a/2022/CVE-2022-1388.json +++ b/2022/CVE-2022-1388.json @@ -1512,17 +1512,17 @@ "description": "CVE-2020-5902 CVE-2021-22986 CVE-2022-1388 POC集合", "fork": false, "created_at": "2022-05-28T13:30:22Z", - "updated_at": "2022-05-29T09:19:28Z", + "updated_at": "2022-05-29T14:08:00Z", "pushed_at": "2022-05-28T14:25:22Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, - "watchers": 1, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json index feaf82c2ce..87dde7d673 100644 --- a/2022/CVE-2022-22947.json +++ b/2022/CVE-2022-22947.json @@ -420,17 +420,17 @@ "description": "CVE-2022-22947批量检测脚本,超时时间不超过2s,已更新可反弹shell的EXP,欢迎师傅们试用", "fork": false, "created_at": "2022-03-04T11:31:00Z", - "updated_at": "2022-05-22T03:18:25Z", + "updated_at": "2022-05-29T16:45:51Z", "pushed_at": "2022-03-08T09:43:50Z", - "stargazers_count": 30, - "watchers_count": 30, + "stargazers_count": 31, + "watchers_count": 31, "forks_count": 15, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 15, - "watchers": 30, + "watchers": 31, "score": 0 }, { diff --git a/2022/CVE-2022-22963.json b/2022/CVE-2022-22963.json index bad46e3655..dd739a2f1a 100644 --- a/2022/CVE-2022-22963.json +++ b/2022/CVE-2022-22963.json @@ -17,7 +17,7 @@ "pushed_at": "2022-04-15T16:31:43Z", "stargazers_count": 332, "watchers_count": 332, - "forks_count": 86, + "forks_count": 85, "allow_forking": true, "is_template": false, "topics": [ @@ -32,7 +32,7 @@ "spring-cloud-function" ], "visibility": "public", - "forks": 86, + "forks": 85, "watchers": 332, "score": 0 }, diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json index 0f62b543ad..71dcaa54d8 100644 --- a/2022/CVE-2022-22965.json +++ b/2022/CVE-2022-22965.json @@ -85,7 +85,7 @@ "pushed_at": "2022-04-04T14:09:11Z", "stargazers_count": 94, "watchers_count": 94, - "forks_count": 80, + "forks_count": 81, "allow_forking": true, "is_template": false, "topics": [ @@ -101,7 +101,7 @@ "working-example" ], "visibility": "public", - "forks": 80, + "forks": 81, "watchers": 94, "score": 0 }, @@ -119,17 +119,17 @@ "description": "Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit", "fork": false, "created_at": "2022-03-31T00:24:28Z", - "updated_at": "2022-05-26T16:35:45Z", + "updated_at": "2022-05-29T13:11:56Z", "pushed_at": "2022-04-05T16:02:33Z", - "stargazers_count": 237, - "watchers_count": 237, + "stargazers_count": 236, + "watchers_count": 236, "forks_count": 197, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 197, - "watchers": 237, + "watchers": 236, "score": 0 }, { diff --git a/2022/CVE-2022-22972.json b/2022/CVE-2022-22972.json index 6144ef2037..30d5fa844a 100644 --- a/2022/CVE-2022-22972.json +++ b/2022/CVE-2022-22972.json @@ -13,17 +13,17 @@ "description": null, "fork": false, "created_at": "2022-05-24T20:19:55Z", - "updated_at": "2022-05-29T10:56:34Z", + "updated_at": "2022-05-29T18:08:08Z", "pushed_at": "2022-05-26T16:07:18Z", - "stargazers_count": 101, - "watchers_count": 101, + "stargazers_count": 105, + "watchers_count": 105, "forks_count": 18, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 18, - "watchers": 101, + "watchers": 105, "score": 0 }, { @@ -40,10 +40,10 @@ "description": "vmware authentication bypass", "fork": false, "created_at": "2022-05-28T20:56:09Z", - "updated_at": "2022-05-29T10:27:57Z", + "updated_at": "2022-05-29T12:32:49Z", "pushed_at": "2022-05-28T21:10:21Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -54,7 +54,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-26809.json b/2022/CVE-2022-26809.json index d1fc5760ac..ae687ccacd 100644 --- a/2022/CVE-2022-26809.json +++ b/2022/CVE-2022-26809.json @@ -321,8 +321,8 @@ "description": "CVE-2022-26809 | is a remote code execution vulnerablity in rpc runtime and affects a wide versions of windows ", "fork": false, "created_at": "2022-05-11T20:38:55Z", - "updated_at": "2022-05-11T20:41:34Z", - "pushed_at": "2022-05-11T20:41:31Z", + "updated_at": "2022-05-29T14:57:08Z", + "pushed_at": "2022-05-29T13:52:37Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, @@ -448,5 +448,32 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 497622513, + "name": "CVE-2022-26809-MASS-RCE", + "full_name": "seciurdt\/CVE-2022-26809-MASS-RCE", + "owner": { + "login": "seciurdt", + "id": 105104248, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105104248?v=4", + "html_url": "https:\/\/github.com\/seciurdt" + }, + "html_url": "https:\/\/github.com\/seciurdt\/CVE-2022-26809-MASS-RCE", + "description": "CVE-2022-26809 | is a remote code execution vulnerablity in rpc runtime and affects a wide versions of windows", + "fork": false, + "created_at": "2022-05-29T14:58:52Z", + "updated_at": "2022-05-29T15:00:38Z", + "pushed_at": "2022-05-29T15:00:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-27254.json b/2022/CVE-2022-27254.json index 4e48a2db6c..b720e40fcb 100644 --- a/2022/CVE-2022-27254.json +++ b/2022/CVE-2022-27254.json @@ -13,17 +13,17 @@ "description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)", "fork": false, "created_at": "2022-03-23T15:03:09Z", - "updated_at": "2022-05-28T04:07:28Z", + "updated_at": "2022-05-29T14:43:19Z", "pushed_at": "2022-03-26T05:52:15Z", - "stargazers_count": 337, - "watchers_count": 337, + "stargazers_count": 338, + "watchers_count": 338, "forks_count": 43, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 43, - "watchers": 337, + "watchers": 338, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-29221.json b/2022/CVE-2022-29221.json index 943c95ba23..bb5c85aaea 100644 --- a/2022/CVE-2022-29221.json +++ b/2022/CVE-2022-29221.json @@ -13,17 +13,17 @@ "description": "CVE-2022-29221 Proof of Concept Code", "fork": false, "created_at": "2022-05-25T06:02:23Z", - "updated_at": "2022-05-28T16:30:57Z", + "updated_at": "2022-05-29T14:56:02Z", "pushed_at": "2022-05-25T07:11:59Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 3, - "watchers": 7, + "watchers": 8, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-30525.json b/2022/CVE-2022-30525.json index b4e28499e9..69f6f4963d 100644 --- a/2022/CVE-2022-30525.json +++ b/2022/CVE-2022-30525.json @@ -373,10 +373,10 @@ "html_url": "https:\/\/github.com\/west9b" }, "html_url": "https:\/\/github.com\/west9b\/CVE-2022-30525", - "description": "CVE-2022-30525 POC&EXP", + "description": "CVE-2022-30525 Zyxel 防火墙命令注入漏洞 POC&EXPC ", "fork": false, "created_at": "2022-05-28T07:19:31Z", - "updated_at": "2022-05-28T14:23:21Z", + "updated_at": "2022-05-29T14:38:48Z", "pushed_at": "2022-05-28T07:52:19Z", "stargazers_count": 0, "watchers_count": 0, diff --git a/README.md b/README.md index 2da8b37668..d236f4b12d 100644 --- a/README.md +++ b/README.md @@ -1505,6 +1505,7 @@ Remote Procedure Call Runtime Remote Code Execution Vulnerability. This CVE ID i - [XmasSnowISBACK/CVE-2022-26809](https://github.com/XmasSnowISBACK/CVE-2022-26809) - [seciurdt/CVE-2022-26809-MASS](https://github.com/seciurdt/CVE-2022-26809-MASS) - [ChrisopherJohanso/CVE-2022-26809-RCE](https://github.com/ChrisopherJohanso/CVE-2022-26809-RCE) +- [seciurdt/CVE-2022-26809-MASS-RCE](https://github.com/seciurdt/CVE-2022-26809-MASS-RCE) ### CVE-2022-26923 (2022-05-10)