From 3013669daa15c9cc9fd0e9c85cb183533497636d Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Fri, 11 Oct 2024 15:30:08 +0900 Subject: [PATCH] Auto Update 2024/10/11 06:30:08 --- 2005/CVE-2005-2428.json | 8 ++++---- 2014/CVE-2014-4210.json | 8 ++++---- 2014/CVE-2014-7911.json | 4 ++-- 2016/CVE-2016-0638.json | 8 ++++---- 2017/CVE-2017-12615.json | 8 ++++---- 2017/CVE-2017-3248.json | 8 ++++---- 2017/CVE-2017-5753.json | 8 ++++---- 2018/CVE-2018-2628.json | 8 ++++---- 2019/CVE-2019-2618.json | 8 ++++---- 2019/CVE-2019-7238.json | 4 ++-- 2020/CVE-2020-1938.json | 8 ++++---- 2020/CVE-2020-2551.json | 8 ++++---- 2021/CVE-2021-1675.json | 16 ++++++++-------- 2021/CVE-2021-21425.json | 8 ++++---- 2021/CVE-2021-40449.json | 12 ++++++------ 2022/CVE-2022-0944.json | 8 ++++---- 2022/CVE-2022-22885.json | 2 +- 2022/CVE-2022-22954.json | 2 +- 2022/CVE-2022-29464.json | 2 +- 2022/CVE-2022-29581.json | 4 ++-- 2022/CVE-2022-31101.json | 2 +- 2022/CVE-2022-39197.json | 8 ++++---- 2022/CVE-2022-40684.json | 8 ++++---- 2022/CVE-2022-42889.json | 16 ++++++++-------- 2022/CVE-2022-45025.json | 2 +- 2023/CVE-2023-21768.json | 12 ++++++------ 2023/CVE-2023-27216.json | 2 +- 2023/CVE-2023-27746.json | 8 ++++---- 2023/CVE-2023-36802.json | 8 ++++---- 2023/CVE-2023-44487.json | 8 ++++---- 2023/CVE-2023-45866.json | 12 ++++++------ 2023/CVE-2023-6702.json | 4 ++-- 2024/CVE-2024-0044.json | 18 +++++++++--------- 2024/CVE-2024-0582.json | 8 ++++---- 2024/CVE-2024-1939.json | 12 ++++++------ 2024/CVE-2024-20017.json | 8 ++++---- 2024/CVE-2024-21338.json | 8 ++++---- 2024/CVE-2024-23692.json | 8 ++++---- 2024/CVE-2024-24919.json | 8 ++++---- 2024/CVE-2024-2887.json | 12 ++++++------ 2024/CVE-2024-29973.json | 4 ++-- 2024/CVE-2024-32002.json | 4 ++-- 2024/CVE-2024-43917.json | 8 ++++---- 2024/CVE-2024-44849.json | 2 +- 2024/CVE-2024-45519.json | 8 ++++---- 2024/CVE-2024-47176.json | 16 ++++++++-------- 2024/CVE-2024-6387.json | 12 ++++++------ 2024/CVE-2024-7965.json | 4 ++-- 2024/CVE-2024-8698.json | 8 ++++---- 2024/CVE-2024-9441.json | 8 ++++---- 2024/CVE-2024-9465.json | 4 ++-- 51 files changed, 196 insertions(+), 196 deletions(-) diff --git a/2005/CVE-2005-2428.json b/2005/CVE-2005-2428.json index 9dd3163ecb..134c8d301b 100644 --- a/2005/CVE-2005-2428.json +++ b/2005/CVE-2005-2428.json @@ -13,10 +13,10 @@ "description": "IBM Lotus Domino <= R8 Password Hash Extraction Exploit", "fork": false, "created_at": "2019-03-29T17:31:14Z", - "updated_at": "2019-08-26T16:40:59Z", + "updated_at": "2024-10-11T05:43:02Z", "pushed_at": "2019-03-29T17:31:55Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 2 } diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 1b73b6a376..b531902871 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -43,10 +43,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-10-10T03:37:30Z", + "updated_at": "2024-10-11T02:23:39Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1991, - "watchers_count": 1991, + "stargazers_count": 1992, + "watchers_count": 1992, "has_discussions": true, "forks_count": 337, "allow_forking": true, @@ -76,7 +76,7 @@ ], "visibility": "public", "forks": 337, - "watchers": 1991, + "watchers": 1992, "score": 0, "subscribers_count": 37 }, diff --git a/2014/CVE-2014-7911.json b/2014/CVE-2014-7911.json index 35549ec529..e78fd47f18 100644 --- a/2014/CVE-2014-7911.json +++ b/2014/CVE-2014-7911.json @@ -18,13 +18,13 @@ "stargazers_count": 146, "watchers_count": 146, "has_discussions": false, - "forks_count": 81, + "forks_count": 79, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 81, + "forks": 79, "watchers": 146, "score": 0, "subscribers_count": 15 diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index b0347d20a5..f7834cfdbc 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-10-10T03:37:30Z", + "updated_at": "2024-10-11T02:23:39Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1991, - "watchers_count": 1991, + "stargazers_count": 1992, + "watchers_count": 1992, "has_discussions": true, "forks_count": 337, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 337, - "watchers": 1991, + "watchers": 1992, "score": 0, "subscribers_count": 37 }, diff --git a/2017/CVE-2017-12615.json b/2017/CVE-2017-12615.json index 1334998112..3cb595d7d6 100644 --- a/2017/CVE-2017-12615.json +++ b/2017/CVE-2017-12615.json @@ -343,10 +343,10 @@ "description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含", "fork": false, "created_at": "2022-11-13T11:01:41Z", - "updated_at": "2024-10-10T09:45:47Z", + "updated_at": "2024-10-11T02:45:57Z", "pushed_at": "2022-11-15T09:05:50Z", - "stargazers_count": 193, - "watchers_count": 193, + "stargazers_count": 194, + "watchers_count": 194, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -355,7 +355,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 193, + "watchers": 194, "score": 0, "subscribers_count": 4 }, diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 8f93537a98..69ec274e73 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -43,10 +43,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-10-10T03:37:30Z", + "updated_at": "2024-10-11T02:23:39Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1991, - "watchers_count": 1991, + "stargazers_count": 1992, + "watchers_count": 1992, "has_discussions": true, "forks_count": 337, "allow_forking": true, @@ -76,7 +76,7 @@ ], "visibility": "public", "forks": 337, - "watchers": 1991, + "watchers": 1992, "score": 0, "subscribers_count": 37 }, diff --git a/2017/CVE-2017-5753.json b/2017/CVE-2017-5753.json index fd898ea06b..896ad95f9f 100644 --- a/2017/CVE-2017-5753.json +++ b/2017/CVE-2017-5753.json @@ -13,10 +13,10 @@ "description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)", "fork": false, "created_at": "2018-01-04T00:28:50Z", - "updated_at": "2024-09-05T14:16:29Z", + "updated_at": "2024-10-11T04:17:34Z", "pushed_at": "2018-01-10T01:14:44Z", - "stargazers_count": 755, - "watchers_count": 755, + "stargazers_count": 756, + "watchers_count": 756, "has_discussions": false, "forks_count": 171, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 171, - "watchers": 755, + "watchers": 756, "score": 0, "subscribers_count": 41 }, diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index c610fe49fe..7565b7a024 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -557,10 +557,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-10-10T03:37:30Z", + "updated_at": "2024-10-11T02:23:39Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1991, - "watchers_count": 1991, + "stargazers_count": 1992, + "watchers_count": 1992, "has_discussions": true, "forks_count": 337, "allow_forking": true, @@ -590,7 +590,7 @@ ], "visibility": "public", "forks": 337, - "watchers": 1991, + "watchers": 1992, "score": 0, "subscribers_count": 37 }, diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 5ae62b1c64..69d01e5c93 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -193,10 +193,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-10-10T03:37:30Z", + "updated_at": "2024-10-11T02:23:39Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1991, - "watchers_count": 1991, + "stargazers_count": 1992, + "watchers_count": 1992, "has_discussions": true, "forks_count": 337, "allow_forking": true, @@ -226,7 +226,7 @@ ], "visibility": "public", "forks": 337, - "watchers": 1991, + "watchers": 1992, "score": 0, "subscribers_count": 37 } diff --git a/2019/CVE-2019-7238.json b/2019/CVE-2019-7238.json index caf0c8e202..5bda1820e2 100644 --- a/2019/CVE-2019-7238.json +++ b/2019/CVE-2019-7238.json @@ -48,13 +48,13 @@ "stargazers_count": 80, "watchers_count": 80, "has_discussions": false, - "forks_count": 29, + "forks_count": 28, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 29, + "forks": 28, "watchers": 80, "score": 0, "subscribers_count": 2 diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index c8544e61c9..df472f1cc0 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -859,10 +859,10 @@ "description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含", "fork": false, "created_at": "2022-11-13T11:01:41Z", - "updated_at": "2024-10-10T09:45:47Z", + "updated_at": "2024-10-11T02:45:57Z", "pushed_at": "2022-11-15T09:05:50Z", - "stargazers_count": 193, - "watchers_count": 193, + "stargazers_count": 194, + "watchers_count": 194, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -871,7 +871,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 193, + "watchers": 194, "score": 0, "subscribers_count": 4 }, diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 9e2a1b724e..a4b1f9038d 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-10-10T03:37:30Z", + "updated_at": "2024-10-11T02:23:39Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1991, - "watchers_count": 1991, + "stargazers_count": 1992, + "watchers_count": 1992, "has_discussions": true, "forks_count": 337, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 337, - "watchers": 1991, + "watchers": 1992, "score": 0, "subscribers_count": 37 }, diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index 278728e1df..7f01b55eb4 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -43,10 +43,10 @@ "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-06-29T17:24:14Z", - "updated_at": "2024-10-05T17:50:24Z", + "updated_at": "2024-10-11T01:11:10Z", "pushed_at": "2021-07-20T15:28:13Z", - "stargazers_count": 1833, - "watchers_count": 1833, + "stargazers_count": 1832, + "watchers_count": 1832, "has_discussions": false, "forks_count": 583, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 583, - "watchers": 1833, + "watchers": 1832, "score": 0, "subscribers_count": 44 }, @@ -301,10 +301,10 @@ "description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)", "fork": false, "created_at": "2021-07-01T23:45:58Z", - "updated_at": "2024-10-09T01:28:11Z", + "updated_at": "2024-10-11T01:11:12Z", "pushed_at": "2021-07-05T08:54:06Z", - "stargazers_count": 1005, - "watchers_count": 1005, + "stargazers_count": 1004, + "watchers_count": 1004, "has_discussions": false, "forks_count": 231, "allow_forking": true, @@ -313,7 +313,7 @@ "topics": [], "visibility": "public", "forks": 231, - "watchers": 1005, + "watchers": 1004, "score": 0, "subscribers_count": 26 }, diff --git a/2021/CVE-2021-21425.json b/2021/CVE-2021-21425.json index a49e53be62..428275bca0 100644 --- a/2021/CVE-2021-21425.json +++ b/2021/CVE-2021-21425.json @@ -13,10 +13,10 @@ "description": "GravCMS Unauthenticated Arbitrary YAML Write\/Update leads to Code Execution (CVE-2021-21425)", "fork": false, "created_at": "2021-06-24T13:06:24Z", - "updated_at": "2024-09-28T03:37:57Z", + "updated_at": "2024-10-11T01:16:54Z", "pushed_at": "2023-04-18T16:30:34Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-40449.json b/2021/CVE-2021-40449.json index d5b87b364c..1612832380 100644 --- a/2021/CVE-2021-40449.json +++ b/2021/CVE-2021-40449.json @@ -75,12 +75,12 @@ "description": "LPE exploit for a UAF in Windows (CVE-2021-40449).", "fork": false, "created_at": "2021-10-25T04:58:49Z", - "updated_at": "2024-09-14T22:05:31Z", + "updated_at": "2024-10-11T00:47:43Z", "pushed_at": "2021-11-05T06:54:10Z", - "stargazers_count": 39, - "watchers_count": 39, + "stargazers_count": 40, + "watchers_count": 40, "has_discussions": false, - "forks_count": 17, + "forks_count": 16, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -88,8 +88,8 @@ "cve-2021-40449" ], "visibility": "public", - "forks": 17, - "watchers": 39, + "forks": 16, + "watchers": 40, "score": 0, "subscribers_count": 0 }, diff --git a/2022/CVE-2022-0944.json b/2022/CVE-2022-0944.json index 1f85b5474d..105ea3b715 100644 --- a/2022/CVE-2022-0944.json +++ b/2022/CVE-2022-0944.json @@ -103,10 +103,10 @@ "description": null, "fork": false, "created_at": "2024-09-10T10:26:57Z", - "updated_at": "2024-09-19T14:01:03Z", + "updated_at": "2024-10-11T00:59:28Z", "pushed_at": "2024-09-10T16:18:40Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-22885.json b/2022/CVE-2022-22885.json index 9bbdd3d3ca..1d90d25036 100644 --- a/2022/CVE-2022-22885.json +++ b/2022/CVE-2022-22885.json @@ -27,7 +27,7 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 }, { "id": 786354643, diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index 1d4a7b03bf..4435086a12 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -330,7 +330,7 @@ "forks": 1, "watchers": 8, "score": 0, - "subscribers_count": 3 + "subscribers_count": 2 }, { "id": 481069232, diff --git a/2022/CVE-2022-29464.json b/2022/CVE-2022-29464.json index 186c173608..81173d1e0f 100644 --- a/2022/CVE-2022-29464.json +++ b/2022/CVE-2022-29464.json @@ -847,7 +847,7 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 }, { "id": 719704174, diff --git a/2022/CVE-2022-29581.json b/2022/CVE-2022-29581.json index c9e10dd1f6..7aa3042016 100644 --- a/2022/CVE-2022-29581.json +++ b/2022/CVE-2022-29581.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2022-12-23T10:41:44Z", "updated_at": "2023-03-10T01:13:38Z", - "pushed_at": "2024-07-30T08:44:10Z", + "pushed_at": "2024-10-11T02:22:34Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -44,7 +44,7 @@ "fork": false, "created_at": "2022-12-23T12:33:21Z", "updated_at": "2023-03-10T01:15:25Z", - "pushed_at": "2024-07-31T02:23:51Z", + "pushed_at": "2024-10-11T02:37:08Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-31101.json b/2022/CVE-2022-31101.json index fd65b5be2d..05b99694a3 100644 --- a/2022/CVE-2022-31101.json +++ b/2022/CVE-2022-31101.json @@ -33,7 +33,7 @@ "forks": 6, "watchers": 40, "score": 0, - "subscribers_count": 9 + "subscribers_count": 10 }, { "id": 522902710, diff --git a/2022/CVE-2022-39197.json b/2022/CVE-2022-39197.json index 2644a7da13..f87a2bbf26 100644 --- a/2022/CVE-2022-39197.json +++ b/2022/CVE-2022-39197.json @@ -227,10 +227,10 @@ "description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ", "fork": false, "created_at": "2022-09-26T08:58:21Z", - "updated_at": "2024-10-04T11:42:53Z", + "updated_at": "2024-10-11T03:06:36Z", "pushed_at": "2022-09-26T13:20:38Z", - "stargazers_count": 310, - "watchers_count": 310, + "stargazers_count": 311, + "watchers_count": 311, "has_discussions": false, "forks_count": 46, "allow_forking": true, @@ -243,7 +243,7 @@ ], "visibility": "public", "forks": 46, - "watchers": 310, + "watchers": 311, "score": 0, "subscribers_count": 5 }, diff --git a/2022/CVE-2022-40684.json b/2022/CVE-2022-40684.json index b92cf8d93b..f8f07e6090 100644 --- a/2022/CVE-2022-40684.json +++ b/2022/CVE-2022-40684.json @@ -263,10 +263,10 @@ "description": "Fortinet Critical Authentication Bypass Vulnerability (CVE-2022-40684) [ Mass Exploit ]", "fork": false, "created_at": "2022-10-15T16:51:25Z", - "updated_at": "2024-08-12T20:27:48Z", + "updated_at": "2024-10-11T04:59:31Z", "pushed_at": "2022-10-19T16:27:16Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -275,7 +275,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 2 }, diff --git a/2022/CVE-2022-42889.json b/2022/CVE-2022-42889.json index d792561859..b0dbcc6686 100644 --- a/2022/CVE-2022-42889.json +++ b/2022/CVE-2022-42889.json @@ -688,10 +688,10 @@ "description": "CVE-2022-42889 aka Text4Shell research & PoC", "fork": false, "created_at": "2022-10-23T13:42:23Z", - "updated_at": "2024-04-23T10:34:47Z", + "updated_at": "2024-10-11T03:18:11Z", "pushed_at": "2023-03-17T16:15:41Z", - "stargazers_count": 18, - "watchers_count": 18, + "stargazers_count": 19, + "watchers_count": 19, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -704,7 +704,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 18, + "watchers": 19, "score": 0, "subscribers_count": 1 }, @@ -1266,10 +1266,10 @@ "description": "This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the CVE id: CVE-2022-42889. ", "fork": false, "created_at": "2023-06-27T08:29:24Z", - "updated_at": "2024-10-10T10:07:14Z", + "updated_at": "2024-10-11T02:10:42Z", "pushed_at": "2023-06-27T09:01:14Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -1278,7 +1278,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 12, + "watchers": 13, "score": 0, "subscribers_count": 2 }, diff --git a/2022/CVE-2022-45025.json b/2022/CVE-2022-45025.json index 79fcf56734..4c57711c6f 100644 --- a/2022/CVE-2022-45025.json +++ b/2022/CVE-2022-45025.json @@ -63,6 +63,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-21768.json b/2023/CVE-2023-21768.json index 44b14b0b9c..5801e504a1 100644 --- a/2023/CVE-2023-21768.json +++ b/2023/CVE-2023-21768.json @@ -13,19 +13,19 @@ "description": "LPE exploit for CVE-2023-21768", "fork": false, "created_at": "2023-03-07T23:00:27Z", - "updated_at": "2024-10-08T17:11:05Z", + "updated_at": "2024-10-11T00:56:13Z", "pushed_at": "2023-07-10T16:35:49Z", - "stargazers_count": 473, - "watchers_count": 473, + "stargazers_count": 474, + "watchers_count": 474, "has_discussions": false, - "forks_count": 162, + "forks_count": 163, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 162, - "watchers": 473, + "forks": 163, + "watchers": 474, "score": 0, "subscribers_count": 10 }, diff --git a/2023/CVE-2023-27216.json b/2023/CVE-2023-27216.json index fc8ce2a379..0f2a378415 100644 --- a/2023/CVE-2023-27216.json +++ b/2023/CVE-2023-27216.json @@ -43,7 +43,7 @@ "description": "Newbie's approach to firmware hacking", "fork": false, "created_at": "2024-08-09T10:05:34Z", - "updated_at": "2024-10-07T17:18:47Z", + "updated_at": "2024-10-11T00:57:22Z", "pushed_at": "2024-08-13T13:40:34Z", "stargazers_count": 3, "watchers_count": 3, diff --git a/2023/CVE-2023-27746.json b/2023/CVE-2023-27746.json index 85da10b876..aa4a370986 100644 --- a/2023/CVE-2023-27746.json +++ b/2023/CVE-2023-27746.json @@ -13,10 +13,10 @@ "description": "BlackVue DR750 CVE CVE-2023-27746 CVE-2023-27747 CVE-2023-27748", "fork": false, "created_at": "2023-02-28T16:37:33Z", - "updated_at": "2024-08-19T21:55:03Z", + "updated_at": "2024-10-11T03:35:18Z", "pushed_at": "2024-02-02T23:35:18Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 8, + "watchers": 9, "score": 0, "subscribers_count": 4 } diff --git a/2023/CVE-2023-36802.json b/2023/CVE-2023-36802.json index 0124812a20..3aaef48810 100644 --- a/2023/CVE-2023-36802.json +++ b/2023/CVE-2023-36802.json @@ -73,10 +73,10 @@ "description": "PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy", "fork": false, "created_at": "2023-10-20T02:05:27Z", - "updated_at": "2024-07-22T13:24:20Z", + "updated_at": "2024-10-11T00:56:23Z", "pushed_at": "2023-10-24T15:56:46Z", - "stargazers_count": 35, - "watchers_count": 35, + "stargazers_count": 36, + "watchers_count": 36, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 10, - "watchers": 35, + "watchers": 36, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-44487.json b/2023/CVE-2023-44487.json index b8de626d8a..dbc4aac0ec 100644 --- a/2023/CVE-2023-44487.json +++ b/2023/CVE-2023-44487.json @@ -43,10 +43,10 @@ "description": "Proof of concept for DoS exploit ", "fork": false, "created_at": "2023-10-11T01:59:47Z", - "updated_at": "2024-08-11T21:13:37Z", + "updated_at": "2024-10-11T01:41:10Z", "pushed_at": "2023-10-13T11:19:10Z", - "stargazers_count": 51, - "watchers_count": 51, + "stargazers_count": 52, + "watchers_count": 52, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -63,7 +63,7 @@ ], "visibility": "public", "forks": 16, - "watchers": 51, + "watchers": 52, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index f7c61da407..213125413d 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -13,10 +13,10 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2024-10-10T23:36:18Z", + "updated_at": "2024-10-11T03:21:50Z", "pushed_at": "2024-08-18T08:26:46Z", - "stargazers_count": 1210, - "watchers_count": 1210, + "stargazers_count": 1211, + "watchers_count": 1211, "has_discussions": false, "forks_count": 204, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 204, - "watchers": 1210, + "watchers": 1211, "score": 0, "subscribers_count": 20 }, @@ -163,8 +163,8 @@ "description": null, "fork": false, "created_at": "2024-10-09T02:48:58Z", - "updated_at": "2024-10-10T14:01:13Z", - "pushed_at": "2024-10-10T14:01:10Z", + "updated_at": "2024-10-11T05:34:28Z", + "pushed_at": "2024-10-11T05:34:25Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2023/CVE-2023-6702.json b/2023/CVE-2023-6702.json index 2601f2505c..46f7e58e93 100644 --- a/2023/CVE-2023-6702.json +++ b/2023/CVE-2023-6702.json @@ -18,13 +18,13 @@ "stargazers_count": 72, "watchers_count": 72, "has_discussions": false, - "forks_count": 4, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 4, + "forks": 5, "watchers": 72, "score": 0, "subscribers_count": 2 diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json index c144cc6f81..b730288825 100644 --- a/2024/CVE-2024-0044.json +++ b/2024/CVE-2024-0044.json @@ -18,13 +18,13 @@ "stargazers_count": 60, "watchers_count": 60, "has_discussions": false, - "forks_count": 11, + "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 11, + "forks": 12, "watchers": 60, "score": 0, "subscribers_count": 3 @@ -253,10 +253,10 @@ "description": "CVE-2024-0044", "fork": false, "created_at": "2024-08-19T02:51:14Z", - "updated_at": "2024-08-24T06:33:01Z", + "updated_at": "2024-10-11T01:17:04Z", "pushed_at": "2024-08-24T06:32:58Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -269,7 +269,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 }, @@ -287,18 +287,18 @@ "description": "PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app", "fork": false, "created_at": "2024-09-27T09:02:08Z", - "updated_at": "2024-10-10T07:17:39Z", + "updated_at": "2024-10-11T03:29:47Z", "pushed_at": "2024-09-30T12:48:08Z", "stargazers_count": 87, "watchers_count": 87, "has_discussions": false, - "forks_count": 7, + "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 7, + "forks": 8, "watchers": 87, "score": 0, "subscribers_count": 3 diff --git a/2024/CVE-2024-0582.json b/2024/CVE-2024-0582.json index caf0b7de01..3b4966747e 100644 --- a/2024/CVE-2024-0582.json +++ b/2024/CVE-2024-0582.json @@ -13,10 +13,10 @@ "description": "LPE exploit for CVE-2024-0582 (io_uring)", "fork": false, "created_at": "2024-03-29T14:45:22Z", - "updated_at": "2024-10-02T17:19:31Z", + "updated_at": "2024-10-11T03:38:08Z", "pushed_at": "2024-03-29T16:05:31Z", - "stargazers_count": 89, - "watchers_count": 89, + "stargazers_count": 90, + "watchers_count": 90, "has_discussions": false, "forks_count": 21, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 21, - "watchers": 89, + "watchers": 90, "score": 0, "subscribers_count": 4 }, diff --git a/2024/CVE-2024-1939.json b/2024/CVE-2024-1939.json index 774c51e36b..7160ea0514 100644 --- a/2024/CVE-2024-1939.json +++ b/2024/CVE-2024-1939.json @@ -13,19 +13,19 @@ "description": "For V8CTF M122", "fork": false, "created_at": "2024-08-25T12:08:54Z", - "updated_at": "2024-09-12T10:43:06Z", + "updated_at": "2024-10-11T02:40:43Z", "pushed_at": "2024-08-25T12:42:14Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, - "watchers": 4, + "forks": 2, + "watchers": 5, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-20017.json b/2024/CVE-2024-20017.json index 4b8a6b45fc..936ab0a33c 100644 --- a/2024/CVE-2024-20017.json +++ b/2024/CVE-2024-20017.json @@ -13,10 +13,10 @@ "description": "exploits for CVE-2024-20017", "fork": false, "created_at": "2024-08-30T05:54:36Z", - "updated_at": "2024-10-09T23:14:33Z", + "updated_at": "2024-10-11T04:59:47Z", "pushed_at": "2024-09-07T10:11:22Z", - "stargazers_count": 121, - "watchers_count": 121, + "stargazers_count": 122, + "watchers_count": 122, "has_discussions": false, "forks_count": 29, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 29, - "watchers": 121, + "watchers": 122, "score": 0, "subscribers_count": 3 } diff --git a/2024/CVE-2024-21338.json b/2024/CVE-2024-21338.json index a294f505e9..c12b4c3c42 100644 --- a/2024/CVE-2024-21338.json +++ b/2024/CVE-2024-21338.json @@ -163,10 +163,10 @@ "description": "Windows AppLocker Driver (appid.sys) LPE", "fork": false, "created_at": "2024-07-29T13:18:06Z", - "updated_at": "2024-10-07T16:44:14Z", + "updated_at": "2024-10-11T01:34:12Z", "pushed_at": "2024-07-29T13:29:59Z", - "stargazers_count": 33, - "watchers_count": 33, + "stargazers_count": 34, + "watchers_count": 34, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -180,7 +180,7 @@ ], "visibility": "public", "forks": 14, - "watchers": 33, + "watchers": 34, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-23692.json b/2024/CVE-2024-23692.json index 26ff91ca65..7d446a4995 100644 --- a/2024/CVE-2024-23692.json +++ b/2024/CVE-2024-23692.json @@ -283,10 +283,10 @@ "description": "POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692 ", "fork": false, "created_at": "2024-09-15T12:15:35Z", - "updated_at": "2024-10-04T08:03:03Z", + "updated_at": "2024-10-11T05:44:53Z", "pushed_at": "2024-09-19T09:23:59Z", - "stargazers_count": 23, - "watchers_count": 23, + "stargazers_count": 24, + "watchers_count": 24, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -300,7 +300,7 @@ ], "visibility": "public", "forks": 11, - "watchers": 23, + "watchers": 24, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-24919.json b/2024/CVE-2024-24919.json index 5e81de95b9..cf424a1565 100644 --- a/2024/CVE-2024-24919.json +++ b/2024/CVE-2024-24919.json @@ -1635,10 +1635,10 @@ "description": null, "fork": false, "created_at": "2024-10-09T17:54:28Z", - "updated_at": "2024-10-10T13:34:35Z", + "updated_at": "2024-10-11T00:53:35Z", "pushed_at": "2024-10-10T13:34:31Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -1647,7 +1647,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-2887.json b/2024/CVE-2024-2887.json index 1d911f4e0e..5a0ad58b6e 100644 --- a/2024/CVE-2024-2887.json +++ b/2024/CVE-2024-2887.json @@ -43,19 +43,19 @@ "description": "For V8CTF M123", "fork": false, "created_at": "2024-08-25T12:13:07Z", - "updated_at": "2024-08-30T07:59:00Z", + "updated_at": "2024-10-11T02:40:42Z", "pushed_at": "2024-08-25T13:04:44Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, - "watchers": 4, + "forks": 1, + "watchers": 5, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-29973.json b/2024/CVE-2024-29973.json index cdde110fd0..c81ce32c50 100644 --- a/2024/CVE-2024-29973.json +++ b/2024/CVE-2024-29973.json @@ -163,8 +163,8 @@ "description": null, "fork": false, "created_at": "2024-10-10T23:48:55Z", - "updated_at": "2024-10-10T23:52:20Z", - "pushed_at": "2024-10-10T23:52:17Z", + "updated_at": "2024-10-11T00:42:19Z", + "pushed_at": "2024-10-11T00:42:15Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-32002.json b/2024/CVE-2024-32002.json index 1fae15780f..2698f48e5a 100644 --- a/2024/CVE-2024-32002.json +++ b/2024/CVE-2024-32002.json @@ -240,7 +240,7 @@ "stargazers_count": 100, "watchers_count": 100, "has_discussions": false, - "forks_count": 21, + "forks_count": 23, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -250,7 +250,7 @@ "rce" ], "visibility": "public", - "forks": 21, + "forks": 23, "watchers": 100, "score": 0, "subscribers_count": 3 diff --git a/2024/CVE-2024-43917.json b/2024/CVE-2024-43917.json index 51a1f04fbb..5f30c7e9a5 100644 --- a/2024/CVE-2024-43917.json +++ b/2024/CVE-2024-43917.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2024-09-29T06:23:35Z", - "updated_at": "2024-10-05T16:03:12Z", + "updated_at": "2024-10-11T06:07:09Z", "pushed_at": "2024-09-29T06:48:13Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 5, + "watchers": 7, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-44849.json b/2024/CVE-2024-44849.json index 44cd8c68c3..12fdf0db94 100644 --- a/2024/CVE-2024-44849.json +++ b/2024/CVE-2024-44849.json @@ -13,7 +13,7 @@ "description": "🔥 CVE-2024-44849 Exploit", "fork": false, "created_at": "2024-09-07T00:00:20Z", - "updated_at": "2024-10-04T13:48:16Z", + "updated_at": "2024-10-11T04:48:46Z", "pushed_at": "2024-09-11T21:45:23Z", "stargazers_count": 3, "watchers_count": 3, diff --git a/2024/CVE-2024-45519.json b/2024/CVE-2024-45519.json index e4f7fdfc1a..8276eb6c54 100644 --- a/2024/CVE-2024-45519.json +++ b/2024/CVE-2024-45519.json @@ -73,10 +73,10 @@ "description": "Zimbra - Remote Command Execution (CVE-2024-45519)", "fork": false, "created_at": "2024-10-05T00:15:18Z", - "updated_at": "2024-10-10T23:19:03Z", + "updated_at": "2024-10-11T01:25:43Z", "pushed_at": "2024-10-05T00:18:49Z", - "stargazers_count": 82, - "watchers_count": 82, + "stargazers_count": 83, + "watchers_count": 83, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 82, + "watchers": 83, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-47176.json b/2024/CVE-2024-47176.json index cb97e5cfb0..c98ac2f4c0 100644 --- a/2024/CVE-2024-47176.json +++ b/2024/CVE-2024-47176.json @@ -229,10 +229,10 @@ "description": "Unauthenticated RCE on cups-browsed (exploit and nuclei template)", "fork": false, "created_at": "2024-10-03T15:53:04Z", - "updated_at": "2024-10-08T03:08:31Z", + "updated_at": "2024-10-11T00:37:50Z", "pushed_at": "2024-10-03T17:11:17Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -249,7 +249,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 }, @@ -297,10 +297,10 @@ "description": "A simple scanner for identifying vulnerable cups-browsed instances on your network", "fork": false, "created_at": "2024-10-07T07:25:18Z", - "updated_at": "2024-10-10T23:46:00Z", + "updated_at": "2024-10-11T05:45:12Z", "pushed_at": "2024-10-07T16:59:47Z", - "stargazers_count": 36, - "watchers_count": 36, + "stargazers_count": 38, + "watchers_count": 38, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -309,7 +309,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 36, + "watchers": 38, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index 7b0f52be01..b2fe19e879 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -260,10 +260,10 @@ "description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH", "fork": false, "created_at": "2024-07-01T20:33:20Z", - "updated_at": "2024-10-09T11:21:32Z", + "updated_at": "2024-10-11T06:24:35Z", "pushed_at": "2024-09-24T19:18:56Z", - "stargazers_count": 446, - "watchers_count": 446, + "stargazers_count": 448, + "watchers_count": 448, "has_discussions": false, "forks_count": 84, "allow_forking": true, @@ -278,7 +278,7 @@ ], "visibility": "public", "forks": 84, - "watchers": 446, + "watchers": 448, "score": 0, "subscribers_count": 5 }, @@ -1637,7 +1637,7 @@ "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -1650,7 +1650,7 @@ "redteam" ], "visibility": "public", - "forks": 3, + "forks": 4, "watchers": 2, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-7965.json b/2024/CVE-2024-7965.json index eaf1264123..8b9a6f7777 100644 --- a/2024/CVE-2024-7965.json +++ b/2024/CVE-2024-7965.json @@ -18,13 +18,13 @@ "stargazers_count": 44, "watchers_count": 44, "has_discussions": false, - "forks_count": 6, + "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 6, + "forks": 7, "watchers": 44, "score": 0, "subscribers_count": 5 diff --git a/2024/CVE-2024-8698.json b/2024/CVE-2024-8698.json index 1d72badc9d..5ebc0a2c58 100644 --- a/2024/CVE-2024-8698.json +++ b/2024/CVE-2024-8698.json @@ -13,10 +13,10 @@ "description": "i'm noob with saml and keycloak . J4f", "fork": false, "created_at": "2024-10-10T11:50:07Z", - "updated_at": "2024-10-10T12:09:46Z", + "updated_at": "2024-10-11T03:34:46Z", "pushed_at": "2024-10-10T12:09:42Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-9441.json b/2024/CVE-2024-9441.json index 6eb3f6bc3e..4829d4cbf2 100644 --- a/2024/CVE-2024-9441.json +++ b/2024/CVE-2024-9441.json @@ -73,10 +73,10 @@ "description": null, "fork": false, "created_at": "2024-10-10T21:29:08Z", - "updated_at": "2024-10-10T21:33:33Z", + "updated_at": "2024-10-11T06:09:03Z", "pushed_at": "2024-10-10T21:33:29Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 5, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-9465.json b/2024/CVE-2024-9465.json index 8db21bf1e2..bd5d119e79 100644 --- a/2024/CVE-2024-9465.json +++ b/2024/CVE-2024-9465.json @@ -48,13 +48,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 0