diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 33530ea815..4247f94ba4 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-04-27T06:58:00Z", + "updated_at": "2021-04-28T03:09:00Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1008, - "watchers_count": 1008, + "stargazers_count": 1009, + "watchers_count": 1009, "forks_count": 229, "forks": 229, - "watchers": 1008, + "watchers": 1009, "score": 0 }, { diff --git a/2017/CVE-2017-0261.json b/2017/CVE-2017-0261.json index e397b3bf3f..b3164b16f1 100644 --- a/2017/CVE-2017-0261.json +++ b/2017/CVE-2017-0261.json @@ -17,8 +17,8 @@ "pushed_at": "2019-03-31T07:39:37Z", "stargazers_count": 5, "watchers_count": 5, - "forks_count": 6, - "forks": 6, + "forks_count": 7, + "forks": 7, "watchers": 5, "score": 0 }, diff --git a/2017/CVE-2017-15303.json b/2017/CVE-2017-15303.json index 2d6aff6c4e..e0ba6dc7b1 100644 --- a/2017/CVE-2017-15303.json +++ b/2017/CVE-2017-15303.json @@ -13,13 +13,13 @@ "description": "Multi-purpose proof-of-concept tool based on CPU-Z CVE-2017-15303", "fork": false, "created_at": "2018-02-22T05:31:13Z", - "updated_at": "2021-02-06T02:19:41Z", + "updated_at": "2021-04-27T22:35:44Z", "pushed_at": "2018-02-25T08:49:07Z", - "stargazers_count": 86, - "watchers_count": 86, - "forks_count": 51, - "forks": 51, - "watchers": 86, + "stargazers_count": 88, + "watchers_count": 88, + "forks_count": 52, + "forks": 52, + "watchers": 88, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 66cca0f2cd..da7506df4d 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -36,13 +36,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-04-27T06:58:00Z", + "updated_at": "2021-04-28T03:09:00Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1008, - "watchers_count": 1008, + "stargazers_count": 1009, + "watchers_count": 1009, "forks_count": 229, "forks": 229, - "watchers": 1008, + "watchers": 1009, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index c0bb638bb4..825a1658ff 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -450,13 +450,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-04-27T06:58:00Z", + "updated_at": "2021-04-28T03:09:00Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1008, - "watchers_count": 1008, + "stargazers_count": 1009, + "watchers_count": 1009, "forks_count": 229, "forks": 229, - "watchers": 1008, + "watchers": 1009, "score": 0 }, { diff --git a/2018/CVE-2018-6389.json b/2018/CVE-2018-6389.json index 4c58bbff27..3ba683d14c 100644 --- a/2018/CVE-2018-6389.json +++ b/2018/CVE-2018-6389.json @@ -473,8 +473,8 @@ "description": null, "fork": false, "created_at": "2020-10-18T14:01:59Z", - "updated_at": "2021-04-27T18:12:51Z", - "pushed_at": "2021-04-27T18:12:49Z", + "updated_at": "2021-04-28T02:13:45Z", + "pushed_at": "2021-04-28T01:13:43Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2019/CVE-2019-0232.json b/2019/CVE-2019-0232.json index 144cce9c07..5b8562f43f 100644 --- a/2019/CVE-2019-0232.json +++ b/2019/CVE-2019-0232.json @@ -86,8 +86,8 @@ "pushed_at": "2019-11-21T15:03:15Z", "stargazers_count": 9, "watchers_count": 9, - "forks_count": 3, - "forks": 3, + "forks_count": 4, + "forks": 4, "watchers": 9, "score": 0 }, @@ -178,8 +178,8 @@ "pushed_at": "2021-04-22T19:27:47Z", "stargazers_count": 1, "watchers_count": 1, - "forks_count": 0, - "forks": 0, + "forks_count": 1, + "forks": 1, "watchers": 1, "score": 0 } diff --git a/2019/CVE-2019-11510.json b/2019/CVE-2019-11510.json index d30c7e74e3..e8da8cbf33 100644 --- a/2019/CVE-2019-11510.json +++ b/2019/CVE-2019-11510.json @@ -174,13 +174,13 @@ "description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)", "fork": false, "created_at": "2019-09-09T15:58:39Z", - "updated_at": "2021-04-20T02:43:58Z", + "updated_at": "2021-04-28T01:26:16Z", "pushed_at": "2020-01-15T17:01:50Z", - "stargazers_count": 110, - "watchers_count": 110, + "stargazers_count": 111, + "watchers_count": 111, "forks_count": 51, "forks": 51, - "watchers": 110, + "watchers": 111, "score": 0 }, { diff --git a/2019/CVE-2019-12836.json b/2019/CVE-2019-12836.json index 74a0d14b60..31b6dd058c 100644 --- a/2019/CVE-2019-12836.json +++ b/2019/CVE-2019-12836.json @@ -13,8 +13,8 @@ "description": "CVE-2019-12836", "fork": false, "created_at": "2019-06-16T04:41:29Z", - "updated_at": "2021-04-26T01:07:42Z", - "pushed_at": "2021-04-26T01:07:40Z", + "updated_at": "2021-04-28T02:27:48Z", + "pushed_at": "2021-04-28T02:27:46Z", "stargazers_count": 5, "watchers_count": 5, "forks_count": 0, diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 9d3c059045..cf8733c1b3 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -151,13 +151,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-04-27T06:58:00Z", + "updated_at": "2021-04-28T03:09:00Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1008, - "watchers_count": 1008, + "stargazers_count": 1009, + "watchers_count": 1009, "forks_count": 229, "forks": 229, - "watchers": 1008, + "watchers": 1009, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-7609.json b/2019/CVE-2019-7609.json index 99a633b06c..95fc56f31b 100644 --- a/2019/CVE-2019-7609.json +++ b/2019/CVE-2019-7609.json @@ -59,13 +59,13 @@ "description": "exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts", "fork": false, "created_at": "2019-10-21T15:31:13Z", - "updated_at": "2021-04-25T15:27:50Z", + "updated_at": "2021-04-28T02:18:01Z", "pushed_at": "2019-10-23T07:10:35Z", - "stargazers_count": 111, - "watchers_count": 111, + "stargazers_count": 112, + "watchers_count": 112, "forks_count": 43, "forks": 43, - "watchers": 111, + "watchers": 112, "score": 0 }, { diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 5a8d27c1c8..55f38a658a 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -887,13 +887,13 @@ "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost", "fork": false, "created_at": "2020-03-30T11:42:56Z", - "updated_at": "2021-04-25T09:59:02Z", + "updated_at": "2021-04-28T01:25:54Z", "pushed_at": "2020-12-07T20:04:27Z", - "stargazers_count": 1111, - "watchers_count": 1111, + "stargazers_count": 1112, + "watchers_count": 1112, "forks_count": 356, "forks": 356, - "watchers": 1111, + "watchers": 1112, "score": 0 }, { diff --git a/2020/CVE-2020-14321.json b/2020/CVE-2020-14321.json index 6dcf068e2d..4347306aa7 100644 --- a/2020/CVE-2020-14321.json +++ b/2020/CVE-2020-14321.json @@ -13,13 +13,13 @@ "description": "Course enrolments allowed privilege escalation from teacher role into manager role to RCE", "fork": false, "created_at": "2020-07-26T01:28:53Z", - "updated_at": "2021-04-21T21:18:41Z", + "updated_at": "2021-04-27T22:43:59Z", "pushed_at": "2020-07-26T01:36:14Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "forks_count": 1, "forks": 1, - "watchers": 10, + "watchers": 11, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json index 46a943cfa7..4456e82b06 100644 --- a/2020/CVE-2020-14883.json +++ b/2020/CVE-2020-14883.json @@ -105,13 +105,13 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2021-04-27T08:07:39Z", + "updated_at": "2021-04-28T02:08:22Z", "pushed_at": "2021-04-26T02:30:11Z", - "stargazers_count": 682, - "watchers_count": 682, - "forks_count": 192, - "forks": 192, - "watchers": 682, + "stargazers_count": 686, + "watchers_count": 686, + "forks_count": 197, + "forks": 197, + "watchers": 686, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index f499c46ce5..305ca8f81c 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,13 +13,13 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2021-04-27T06:58:00Z", + "updated_at": "2021-04-28T03:09:00Z", "pushed_at": "2020-11-27T15:10:58Z", - "stargazers_count": 1008, - "watchers_count": 1008, + "stargazers_count": 1009, + "watchers_count": 1009, "forks_count": 229, "forks": 229, - "watchers": 1008, + "watchers": 1009, "score": 0 }, { diff --git a/2020/CVE-2020-25686.json b/2020/CVE-2020-25686.json index 574918fbdb..4aab4ddf05 100644 --- a/2020/CVE-2020-25686.json +++ b/2020/CVE-2020-25686.json @@ -13,13 +13,13 @@ "description": "DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)", "fork": false, "created_at": "2021-01-23T19:07:18Z", - "updated_at": "2021-03-22T09:25:59Z", + "updated_at": "2021-04-28T02:29:00Z", "pushed_at": "2021-01-24T09:05:40Z", - "stargazers_count": 67, - "watchers_count": 67, + "stargazers_count": 68, + "watchers_count": 68, "forks_count": 31, "forks": 31, - "watchers": 67, + "watchers": 68, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-27199.json b/2020/CVE-2020-27199.json index eabf4c3581..b96fe63222 100644 --- a/2020/CVE-2020-27199.json +++ b/2020/CVE-2020-27199.json @@ -13,8 +13,8 @@ "description": "CVE-2020-27199", "fork": false, "created_at": "2020-07-06T03:10:34Z", - "updated_at": "2021-04-26T01:02:54Z", - "pushed_at": "2021-04-26T01:02:52Z", + "updated_at": "2021-04-28T02:29:30Z", + "pushed_at": "2021-04-28T02:29:28Z", "stargazers_count": 4, "watchers_count": 4, "forks_count": 0, diff --git a/2021/CVE-2021-1732.json b/2021/CVE-2021-1732.json index 9e27038c77..d04e254fc3 100644 --- a/2021/CVE-2021-1732.json +++ b/2021/CVE-2021-1732.json @@ -13,13 +13,13 @@ "description": "CVE-2021-1732 Exploit", "fork": false, "created_at": "2021-03-05T02:11:10Z", - "updated_at": "2021-04-27T11:08:00Z", + "updated_at": "2021-04-28T02:28:32Z", "pushed_at": "2021-03-05T03:10:26Z", - "stargazers_count": 283, - "watchers_count": 283, + "stargazers_count": 284, + "watchers_count": 284, "forks_count": 66, "forks": 66, - "watchers": 283, + "watchers": 284, "score": 0 }, { diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json index c26d063a61..a8b823d30e 100644 --- a/2021/CVE-2021-25646.json +++ b/2021/CVE-2021-25646.json @@ -105,13 +105,13 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2021-04-27T08:07:39Z", + "updated_at": "2021-04-28T02:08:22Z", "pushed_at": "2021-04-26T02:30:11Z", - "stargazers_count": 682, - "watchers_count": 682, - "forks_count": 192, - "forks": 192, - "watchers": 682, + "stargazers_count": 686, + "watchers_count": 686, + "forks_count": 197, + "forks": 197, + "watchers": 686, "score": 0 }, { diff --git a/2021/CVE-2021-26855.json b/2021/CVE-2021-26855.json index 65a24591fc..843cafd619 100644 --- a/2021/CVE-2021-26855.json +++ b/2021/CVE-2021-26855.json @@ -59,13 +59,13 @@ "description": "Detect webshells dropped on Microsoft Exchange servers exploited through \"proxylogon\" group of vulnerabilites (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065)", "fork": false, "created_at": "2021-03-05T08:22:07Z", - "updated_at": "2021-04-13T18:22:51Z", + "updated_at": "2021-04-28T01:21:21Z", "pushed_at": "2021-03-16T08:34:14Z", - "stargazers_count": 87, - "watchers_count": 87, + "stargazers_count": 88, + "watchers_count": 88, "forks_count": 20, "forks": 20, - "watchers": 87, + "watchers": 88, "score": 0 }, { diff --git a/2021/CVE-2021-27905.json b/2021/CVE-2021-27905.json index 14082c5f3f..801f0f434c 100644 --- a/2021/CVE-2021-27905.json +++ b/2021/CVE-2021-27905.json @@ -13,13 +13,13 @@ "description": "Apache Solr SSRF(CVE-2021-27905)", "fork": false, "created_at": "2021-04-21T09:27:21Z", - "updated_at": "2021-04-27T13:38:30Z", + "updated_at": "2021-04-28T02:18:37Z", "pushed_at": "2021-04-21T10:00:59Z", - "stargazers_count": 30, - "watchers_count": 30, + "stargazers_count": 31, + "watchers_count": 31, "forks_count": 13, "forks": 13, - "watchers": 30, + "watchers": 31, "score": 0 }, { diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index c9b10d606b..34fcb31649 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -887,13 +887,13 @@ "description": "Sudo Baron Samedit Exploit", "fork": false, "created_at": "2021-03-15T17:37:02Z", - "updated_at": "2021-04-27T13:28:10Z", + "updated_at": "2021-04-28T02:04:13Z", "pushed_at": "2021-03-30T14:44:38Z", - "stargazers_count": 285, - "watchers_count": 285, + "stargazers_count": 286, + "watchers_count": 286, "forks_count": 47, "forks": 47, - "watchers": 285, + "watchers": 286, "score": 0 }, { diff --git a/2021/CVE-2021-3493.json b/2021/CVE-2021-3493.json index cae43cce18..2bde6e1d70 100644 --- a/2021/CVE-2021-3493.json +++ b/2021/CVE-2021-3493.json @@ -13,13 +13,13 @@ "description": "Ubuntu OverlayFS Local Privesc", "fork": false, "created_at": "2021-04-19T20:07:01Z", - "updated_at": "2021-04-27T20:24:11Z", + "updated_at": "2021-04-28T01:23:14Z", "pushed_at": "2021-04-20T00:46:14Z", - "stargazers_count": 145, - "watchers_count": 145, + "stargazers_count": 146, + "watchers_count": 146, "forks_count": 45, "forks": 45, - "watchers": 145, + "watchers": 146, "score": 0 }, {