diff --git a/2017/CVE-2017-12149.json b/2017/CVE-2017-12149.json index bfa53b10bc..23686e7f7d 100644 --- a/2017/CVE-2017-12149.json +++ b/2017/CVE-2017-12149.json @@ -36,13 +36,13 @@ "description": "CVE-2017-12149 jboss反序列化 可回显", "fork": false, "created_at": "2017-11-28T02:52:47Z", - "updated_at": "2021-04-10T11:17:26Z", + "updated_at": "2021-05-05T12:28:16Z", "pushed_at": "2019-03-13T08:57:50Z", - "stargazers_count": 109, - "watchers_count": 109, + "stargazers_count": 110, + "watchers_count": 110, "forks_count": 40, "forks": 40, - "watchers": 109, + "watchers": 110, "score": 0 }, { diff --git a/2017/CVE-2017-7494.json b/2017/CVE-2017-7494.json index c3cdf27f84..bd734980b7 100644 --- a/2017/CVE-2017-7494.json +++ b/2017/CVE-2017-7494.json @@ -59,13 +59,13 @@ "description": "SambaCry exploit and vulnerable container (CVE-2017-7494)", "fork": false, "created_at": "2017-05-26T00:58:25Z", - "updated_at": "2021-05-01T00:01:49Z", + "updated_at": "2021-05-05T14:47:31Z", "pushed_at": "2017-10-31T16:20:29Z", - "stargazers_count": 268, - "watchers_count": 268, + "stargazers_count": 267, + "watchers_count": 267, "forks_count": 93, "forks": 93, - "watchers": 268, + "watchers": 267, "score": 0 }, { diff --git a/2018/CVE-2018-15133.json b/2018/CVE-2018-15133.json index 4a59e6dad9..a78a0d0ce5 100644 --- a/2018/CVE-2018-15133.json +++ b/2018/CVE-2018-15133.json @@ -128,13 +128,13 @@ "description": "Exploit for Laravel Remote Code Execution with API_KEY (CVE-2018-15133)", "fork": false, "created_at": "2020-11-13T16:33:52Z", - "updated_at": "2021-04-24T20:21:16Z", + "updated_at": "2021-05-05T15:10:11Z", "pushed_at": "2020-12-31T20:34:30Z", - "stargazers_count": 15, - "watchers_count": 15, - "forks_count": 10, - "forks": 10, - "watchers": 15, + "stargazers_count": 18, + "watchers_count": 18, + "forks_count": 11, + "forks": 11, + "watchers": 18, "score": 0 }, { diff --git a/2018/CVE-2018-7600.json b/2018/CVE-2018-7600.json index 456c783aab..4bec17ad09 100644 --- a/2018/CVE-2018-7600.json +++ b/2018/CVE-2018-7600.json @@ -266,13 +266,13 @@ "description": "Exploit for Drupal 7 <= 7.57 CVE-2018-7600", "fork": false, "created_at": "2018-04-17T15:38:15Z", - "updated_at": "2021-04-20T14:43:32Z", + "updated_at": "2021-05-05T12:55:13Z", "pushed_at": "2018-04-26T15:40:28Z", - "stargazers_count": 85, - "watchers_count": 85, + "stargazers_count": 86, + "watchers_count": 86, "forks_count": 44, "forks": 44, - "watchers": 85, + "watchers": 86, "score": 0 }, { diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 537c8077c2..e34a1cefc2 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1558,8 +1558,8 @@ "pushed_at": "2020-06-14T18:43:51Z", "stargazers_count": 40, "watchers_count": 40, - "forks_count": 16, - "forks": 16, + "forks_count": 17, + "forks": 17, "watchers": 40, "score": 0 }, @@ -1830,13 +1830,13 @@ "description": "Public work for CVE-2019-0708", "fork": false, "created_at": "2019-07-23T03:15:53Z", - "updated_at": "2021-04-23T23:18:09Z", + "updated_at": "2021-05-05T14:40:54Z", "pushed_at": "2019-11-19T02:43:38Z", - "stargazers_count": 290, - "watchers_count": 290, + "stargazers_count": 289, + "watchers_count": 289, "forks_count": 94, "forks": 94, - "watchers": 290, + "watchers": 289, "score": 0 }, { @@ -2359,13 +2359,13 @@ "description": "CVE-2019-0708 (BlueKeep)", "fork": false, "created_at": "2019-12-07T10:13:11Z", - "updated_at": "2021-03-25T15:21:10Z", + "updated_at": "2021-05-05T14:36:23Z", "pushed_at": "2020-07-07T15:28:13Z", - "stargazers_count": 89, - "watchers_count": 89, + "stargazers_count": 88, + "watchers_count": 88, "forks_count": 15, "forks": 15, - "watchers": 89, + "watchers": 88, "score": 0 }, { diff --git a/2019/CVE-2019-1125.json b/2019/CVE-2019-1125.json index c23dbe42c5..21aff14066 100644 --- a/2019/CVE-2019-1125.json +++ b/2019/CVE-2019-1125.json @@ -13,13 +13,13 @@ "description": "This repository contains the sources and documentation for the SWAPGS attack PoC (CVE-2019-1125)", "fork": false, "created_at": "2020-01-27T12:27:53Z", - "updated_at": "2021-01-05T08:01:28Z", + "updated_at": "2021-05-05T14:59:11Z", "pushed_at": "2020-01-27T12:32:04Z", - "stargazers_count": 35, - "watchers_count": 35, + "stargazers_count": 36, + "watchers_count": 36, "forks_count": 8, "forks": 8, - "watchers": 35, + "watchers": 36, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 5f7e4413a2..b75736d97b 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -36,13 +36,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-05-03T14:50:42Z", + "updated_at": "2021-05-05T14:11:16Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 2548, - "watchers_count": 2548, + "stargazers_count": 2549, + "watchers_count": 2549, "forks_count": 741, "forks": 741, - "watchers": 2548, + "watchers": 2549, "score": 0 }, { diff --git a/2020/CVE-2020-0551.json b/2020/CVE-2020-0551.json index 864713ad6d..83efda2339 100644 --- a/2020/CVE-2020-0551.json +++ b/2020/CVE-2020-0551.json @@ -13,13 +13,13 @@ "description": "This repository contains the sources and documentation for the LVI-LFB Control Flow Hijacking attack PoC (CVE-2020-0551)", "fork": false, "created_at": "2020-03-10T17:00:01Z", - "updated_at": "2021-01-11T11:22:00Z", + "updated_at": "2021-05-05T14:59:10Z", "pushed_at": "2020-03-10T17:10:12Z", - "stargazers_count": 20, - "watchers_count": 20, + "stargazers_count": 21, + "watchers_count": 21, "forks_count": 6, "forks": 6, - "watchers": 20, + "watchers": 21, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-0601.json b/2020/CVE-2020-0601.json index 3a89889738..a035eba56e 100644 --- a/2020/CVE-2020-0601.json +++ b/2020/CVE-2020-0601.json @@ -128,13 +128,13 @@ "description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)", "fork": false, "created_at": "2020-01-15T23:07:41Z", - "updated_at": "2021-04-29T18:00:43Z", + "updated_at": "2021-05-05T14:39:34Z", "pushed_at": "2020-01-20T23:33:19Z", - "stargazers_count": 857, - "watchers_count": 857, + "stargazers_count": 856, + "watchers_count": 856, "forks_count": 223, "forks": 223, - "watchers": 857, + "watchers": 856, "score": 0 }, { diff --git a/2020/CVE-2020-0609.json b/2020/CVE-2020-0609.json index 5cb7d48909..23aa850594 100644 --- a/2020/CVE-2020-0609.json +++ b/2020/CVE-2020-0609.json @@ -36,13 +36,13 @@ "description": "PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE", "fork": false, "created_at": "2020-01-23T22:29:46Z", - "updated_at": "2021-04-23T16:29:12Z", + "updated_at": "2021-05-05T14:39:23Z", "pushed_at": "2020-01-24T15:21:06Z", - "stargazers_count": 242, - "watchers_count": 242, + "stargazers_count": 241, + "watchers_count": 241, "forks_count": 77, "forks": 77, - "watchers": 242, + "watchers": 241, "score": 0 }, { diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 5329696b49..6a8fb15cfe 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -105,13 +105,13 @@ "description": "Scanner for CVE-2020-0796 - SMBv3 RCE", "fork": false, "created_at": "2020-03-11T15:21:27Z", - "updated_at": "2021-04-28T23:24:09Z", + "updated_at": "2021-05-05T14:39:24Z", "pushed_at": "2020-10-01T08:36:29Z", - "stargazers_count": 590, - "watchers_count": 590, + "stargazers_count": 589, + "watchers_count": 589, "forks_count": 197, "forks": 197, - "watchers": 590, + "watchers": 589, "score": 0 }, { @@ -1117,13 +1117,13 @@ "description": "CVE-2020-0796 Remote Code Execution POC", "fork": false, "created_at": "2020-04-20T14:35:48Z", - "updated_at": "2021-04-29T02:16:48Z", + "updated_at": "2021-05-05T14:47:37Z", "pushed_at": "2020-06-09T20:46:45Z", - "stargazers_count": 383, - "watchers_count": 383, + "stargazers_count": 382, + "watchers_count": 382, "forks_count": 127, "forks": 127, - "watchers": 383, + "watchers": 382, "score": 0 }, { diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 79e4582d2e..c29c99b0af 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -105,13 +105,13 @@ "description": "Exploit Code for CVE-2020-1472 aka Zerologon", "fork": false, "created_at": "2020-09-14T16:57:49Z", - "updated_at": "2021-05-01T09:22:22Z", + "updated_at": "2021-05-05T10:05:53Z", "pushed_at": "2020-11-05T16:37:20Z", - "stargazers_count": 203, - "watchers_count": 203, + "stargazers_count": 204, + "watchers_count": 204, "forks_count": 39, "forks": 39, - "watchers": 203, + "watchers": 204, "score": 0 }, { @@ -128,13 +128,13 @@ "description": "Exploit for zerologon cve-2020-1472", "fork": false, "created_at": "2020-09-14T19:19:07Z", - "updated_at": "2021-05-04T05:43:28Z", + "updated_at": "2021-05-05T14:40:57Z", "pushed_at": "2020-10-15T18:31:15Z", - "stargazers_count": 303, - "watchers_count": 303, + "stargazers_count": 301, + "watchers_count": 301, "forks_count": 99, "forks": 99, - "watchers": 303, + "watchers": 301, "score": 0 }, { diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index c54387795e..881c1ad8c5 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,13 +13,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-05-03T14:50:42Z", + "updated_at": "2021-05-05T14:11:16Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 2548, - "watchers_count": 2548, + "stargazers_count": 2549, + "watchers_count": 2549, "forks_count": 741, "forks": 741, - "watchers": 2548, + "watchers": 2549, "score": 0 }, { diff --git a/2020/CVE-2020-16898.json b/2020/CVE-2020-16898.json index 5681f63092..fe5ab3295f 100644 --- a/2020/CVE-2020-16898.json +++ b/2020/CVE-2020-16898.json @@ -174,13 +174,13 @@ "description": "PoC BSOD for CVE-2020-16898 (badneighbor)", "fork": false, "created_at": "2020-10-16T23:03:15Z", - "updated_at": "2021-04-13T05:50:32Z", + "updated_at": "2021-05-05T14:40:55Z", "pushed_at": "2020-10-16T23:12:52Z", - "stargazers_count": 20, - "watchers_count": 20, + "stargazers_count": 19, + "watchers_count": 19, "forks_count": 4, "forks": 4, - "watchers": 20, + "watchers": 19, "score": 0 }, { diff --git a/2021/CVE-2021-25374.json b/2021/CVE-2021-25374.json index 5678246d7a..bec2c8f319 100644 --- a/2021/CVE-2021-25374.json +++ b/2021/CVE-2021-25374.json @@ -13,13 +13,13 @@ "description": "This script can be used to gain access to a victim's Samsung Account if they have a specific version of Samsung Members installed on their Samsung Device, and if the victim's device is from the US or Korea region.", "fork": false, "created_at": "2021-04-10T09:23:52Z", - "updated_at": "2021-05-04T09:30:53Z", + "updated_at": "2021-05-05T13:31:26Z", "pushed_at": "2021-04-28T17:56:04Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "forks_count": 4, "forks": 4, - "watchers": 8, + "watchers": 9, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-30128.json b/2021/CVE-2021-30128.json index fbe6c409b0..0219a5d2f3 100644 --- a/2021/CVE-2021-30128.json +++ b/2021/CVE-2021-30128.json @@ -17,8 +17,8 @@ "pushed_at": "2021-04-30T15:01:38Z", "stargazers_count": 15, "watchers_count": 15, - "forks_count": 3, - "forks": 3, + "forks_count": 4, + "forks": 4, "watchers": 15, "score": 0 }, diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index 99f8f50a2c..7dd1462fa4 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -151,13 +151,13 @@ "description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)", "fork": false, "created_at": "2021-02-18T05:42:13Z", - "updated_at": "2021-04-19T10:18:49Z", + "updated_at": "2021-05-05T13:48:50Z", "pushed_at": "2021-02-18T08:30:23Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 23, + "watchers_count": 23, "forks_count": 8, "forks": 8, - "watchers": 22, + "watchers": 23, "score": 0 }, { diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index 61505aa4dc..b5d72e2f38 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -565,7 +565,7 @@ "description": "CTF for HDE 64 students at See Security College. Exploit a JWT (web part) & CVE-2021-3156 (LPE part).", "fork": false, "created_at": "2021-02-03T08:36:01Z", - "updated_at": "2021-03-05T16:22:11Z", + "updated_at": "2021-05-05T10:52:48Z", "pushed_at": "2021-03-05T16:22:09Z", "stargazers_count": 0, "watchers_count": 0, @@ -887,13 +887,13 @@ "description": "Sudo Baron Samedit Exploit", "fork": false, "created_at": "2021-03-15T17:37:02Z", - "updated_at": "2021-05-04T11:39:25Z", + "updated_at": "2021-05-05T14:27:59Z", "pushed_at": "2021-03-30T14:44:38Z", - "stargazers_count": 296, - "watchers_count": 296, + "stargazers_count": 295, + "watchers_count": 295, "forks_count": 48, "forks": 48, - "watchers": 296, + "watchers": 295, "score": 0 }, { diff --git a/2021/CVE-2021-3493.json b/2021/CVE-2021-3493.json index da45d570c0..905afe9c8a 100644 --- a/2021/CVE-2021-3493.json +++ b/2021/CVE-2021-3493.json @@ -13,13 +13,13 @@ "description": "Ubuntu OverlayFS Local Privesc", "fork": false, "created_at": "2021-04-19T20:07:01Z", - "updated_at": "2021-05-04T17:47:05Z", + "updated_at": "2021-05-05T12:35:22Z", "pushed_at": "2021-04-20T00:46:14Z", - "stargazers_count": 161, - "watchers_count": 161, - "forks_count": 53, - "forks": 53, - "watchers": 161, + "stargazers_count": 163, + "watchers_count": 163, + "forks_count": 54, + "forks": 54, + "watchers": 163, "score": 0 }, {