From 4efb42505b25d86ed9c6b6954ab1bd6742349979 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Mon, 20 Jun 2022 09:15:36 +0900 Subject: [PATCH] Auto Update 2022/06/20 00:15:35 --- 2015/CVE-2015-1805.json | 4 ++-- 2016/CVE-2016-8869.json | 8 ++++---- 2017/CVE-2017-1000353.json | 8 ++++---- 2018/CVE-2018-2628.json | 8 ++++---- 2018/CVE-2018-8120.json | 8 ++++---- 2019/CVE-2019-11581.json | 8 ++++---- 2019/CVE-2019-15642.json | 8 ++++---- 2019/CVE-2019-8942.json | 4 ++-- 2020/CVE-2020-0683.json | 4 ++-- 2020/CVE-2020-14882.json | 8 ++++---- 2020/CVE-2020-9375.json | 4 ++-- 2021/CVE-2021-44228.json | 8 ++++---- 2022/CVE-2022-22947.json | 8 ++++---- 2022/CVE-2022-23131.json | 16 ++++++++-------- 2022/CVE-2022-23222.json | 8 ++++---- 2022/CVE-2022-26134.json | 12 ++++++------ 2022/CVE-2022-26809.json | 12 ++++++------ 2022/CVE-2022-26937.json | 8 ++++---- 2022/CVE-2022-29464.json | 8 ++++---- 2022/CVE-2022-30190.json | 14 +++++++------- 20 files changed, 83 insertions(+), 83 deletions(-) diff --git a/2015/CVE-2015-1805.json b/2015/CVE-2015-1805.json index 9a09bc3e9a..0398a45b3f 100644 --- a/2015/CVE-2015-1805.json +++ b/2015/CVE-2015-1805.json @@ -44,12 +44,12 @@ "pushed_at": "2017-11-23T20:55:03Z", "stargazers_count": 263, "watchers_count": 263, - "forks_count": 154, + "forks_count": 155, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 154, + "forks": 155, "watchers": 263, "score": 0 }, diff --git a/2016/CVE-2016-8869.json b/2016/CVE-2016-8869.json index 65bfc075a6..95516ba9d3 100644 --- a/2016/CVE-2016-8869.json +++ b/2016/CVE-2016-8869.json @@ -40,10 +40,10 @@ "description": "Exploit for Joomla 3.4.4 - 3.6.4 (CVE-2016-8869 and CVE-2016-8870)", "fork": false, "created_at": "2016-11-10T13:47:01Z", - "updated_at": "2022-02-16T00:22:38Z", + "updated_at": "2022-06-19T22:27:42Z", "pushed_at": "2016-11-10T13:47:45Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 7, + "watchers_count": 7, "forks_count": 7, "allow_forking": true, "is_template": false, @@ -55,7 +55,7 @@ ], "visibility": "public", "forks": 7, - "watchers": 8, + "watchers": 7, "score": 0 }, { diff --git a/2017/CVE-2017-1000353.json b/2017/CVE-2017-1000353.json index 4585b6b851..6912e5bb32 100644 --- a/2017/CVE-2017-1000353.json +++ b/2017/CVE-2017-1000353.json @@ -13,17 +13,17 @@ "description": "jenkins CVE-2017-1000353 POC", "fork": false, "created_at": "2019-04-12T13:24:26Z", - "updated_at": "2022-06-12T08:08:33Z", + "updated_at": "2022-06-19T20:33:59Z", "pushed_at": "2020-06-11T00:16:40Z", - "stargazers_count": 44, - "watchers_count": 44, + "stargazers_count": 45, + "watchers_count": 45, "forks_count": 59, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 59, - "watchers": 44, + "watchers": 45, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 1b9cec88ab..9e9116bb61 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -368,17 +368,17 @@ "description": "Weblogic 反序列化漏洞(CVE-2018-2628)", "fork": false, "created_at": "2018-06-05T11:00:40Z", - "updated_at": "2022-06-13T13:54:17Z", + "updated_at": "2022-06-19T18:25:37Z", "pushed_at": "2019-09-30T01:18:02Z", - "stargazers_count": 92, - "watchers_count": 92, + "stargazers_count": 91, + "watchers_count": 91, "forks_count": 40, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 40, - "watchers": 92, + "watchers": 91, "score": 0 }, { diff --git a/2018/CVE-2018-8120.json b/2018/CVE-2018-8120.json index 10eb86831f..5c802afb71 100644 --- a/2018/CVE-2018-8120.json +++ b/2018/CVE-2018-8120.json @@ -98,17 +98,17 @@ "description": "CVE-2018-8120 Exploit for Win2003 Win2008 WinXP Win7 ", "fork": false, "created_at": "2018-06-07T08:30:07Z", - "updated_at": "2022-06-15T19:55:19Z", + "updated_at": "2022-06-19T19:58:44Z", "pushed_at": "2018-08-08T05:48:24Z", - "stargazers_count": 291, - "watchers_count": 291, + "stargazers_count": 290, + "watchers_count": 290, "forks_count": 123, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 123, - "watchers": 291, + "watchers": 290, "score": 0 }, { diff --git a/2019/CVE-2019-11581.json b/2019/CVE-2019-11581.json index 8dcefe7b47..762d05d1f6 100644 --- a/2019/CVE-2019-11581.json +++ b/2019/CVE-2019-11581.json @@ -13,17 +13,17 @@ "description": "Atlassian JIRA Template injection vulnerability RCE", "fork": false, "created_at": "2019-07-16T02:27:00Z", - "updated_at": "2022-06-02T04:33:21Z", + "updated_at": "2022-06-19T18:25:38Z", "pushed_at": "2019-07-22T06:47:52Z", - "stargazers_count": 87, - "watchers_count": 87, + "stargazers_count": 86, + "watchers_count": 86, "forks_count": 30, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 30, - "watchers": 87, + "watchers": 86, "score": 0 }, { diff --git a/2019/CVE-2019-15642.json b/2019/CVE-2019-15642.json index dc61b9f54d..5a192d49f2 100644 --- a/2019/CVE-2019-15642.json +++ b/2019/CVE-2019-15642.json @@ -13,17 +13,17 @@ "description": "Webmin Remote Code Execution (authenticated) ", "fork": false, "created_at": "2019-09-01T09:28:56Z", - "updated_at": "2022-01-09T20:59:53Z", + "updated_at": "2022-06-19T18:25:38Z", "pushed_at": "2019-09-01T11:35:43Z", - "stargazers_count": 31, - "watchers_count": 31, + "stargazers_count": 30, + "watchers_count": 30, "forks_count": 8, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 8, - "watchers": 31, + "watchers": 30, "score": 0 }, { diff --git a/2019/CVE-2019-8942.json b/2019/CVE-2019-8942.json index 2fff2fa729..8572826aa1 100644 --- a/2019/CVE-2019-8942.json +++ b/2019/CVE-2019-8942.json @@ -17,7 +17,7 @@ "pushed_at": "2019-03-18T01:20:52Z", "stargazers_count": 70, "watchers_count": 70, - "forks_count": 21, + "forks_count": 22, "allow_forking": true, "is_template": false, "topics": [ @@ -25,7 +25,7 @@ "cve-2019-8943" ], "visibility": "public", - "forks": 21, + "forks": 22, "watchers": 70, "score": 0 }, diff --git a/2020/CVE-2020-0683.json b/2020/CVE-2020-0683.json index 7457d96dca..4706dde104 100644 --- a/2020/CVE-2020-0683.json +++ b/2020/CVE-2020-0683.json @@ -17,12 +17,12 @@ "pushed_at": "2021-12-23T16:28:28Z", "stargazers_count": 304, "watchers_count": 304, - "forks_count": 53, + "forks_count": 54, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 53, + "forks": 54, "watchers": 304, "score": 0 } diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 408d0a1939..92a5816813 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -681,17 +681,17 @@ "description": "CVE-2020-14882_Exploit 支持12.2.X和10.3.6版本,12.2.x可回显", "fork": false, "created_at": "2021-04-07T09:48:49Z", - "updated_at": "2022-06-08T10:06:06Z", + "updated_at": "2022-06-19T18:25:40Z", "pushed_at": "2021-08-09T15:01:16Z", - "stargazers_count": 67, - "watchers_count": 67, + "stargazers_count": 66, + "watchers_count": 66, "forks_count": 19, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 19, - "watchers": 67, + "watchers": 66, "score": 0 }, { diff --git a/2020/CVE-2020-9375.json b/2020/CVE-2020-9375.json index c98b57b37a..4f10c0d85b 100644 --- a/2020/CVE-2020-9375.json +++ b/2020/CVE-2020-9375.json @@ -17,7 +17,7 @@ "pushed_at": "2020-03-29T20:32:16Z", "stargazers_count": 16, "watchers_count": 16, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "topics": [ @@ -28,7 +28,7 @@ "tplink" ], "visibility": "public", - "forks": 5, + "forks": 6, "watchers": 16, "score": 0 } diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index db1a51b2cb..0cef93a77e 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -3934,10 +3934,10 @@ "description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.", "fork": false, "created_at": "2021-12-14T06:37:59Z", - "updated_at": "2022-06-16T01:48:20Z", + "updated_at": "2022-06-20T00:13:45Z", "pushed_at": "2022-04-24T08:56:47Z", - "stargazers_count": 319, - "watchers_count": 319, + "stargazers_count": 320, + "watchers_count": 320, "forks_count": 45, "allow_forking": true, "is_template": false, @@ -3950,7 +3950,7 @@ ], "visibility": "public", "forks": 45, - "watchers": 319, + "watchers": 320, "score": 0 }, { diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json index 82d6ff6ffa..c35c6e6cbf 100644 --- a/2022/CVE-2022-22947.json +++ b/2022/CVE-2022-22947.json @@ -1214,17 +1214,17 @@ "description": "CVE-2022-22947 注入Godzilla内存马", "fork": false, "created_at": "2022-04-26T05:48:27Z", - "updated_at": "2022-06-13T18:25:31Z", + "updated_at": "2022-06-19T18:25:42Z", "pushed_at": "2022-04-26T05:55:58Z", - "stargazers_count": 77, - "watchers_count": 77, + "stargazers_count": 76, + "watchers_count": 76, "forks_count": 10, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 10, - "watchers": 77, + "watchers": 76, "score": 0 }, { diff --git a/2022/CVE-2022-23131.json b/2022/CVE-2022-23131.json index d1484a48f4..20f7615bed 100644 --- a/2022/CVE-2022-23131.json +++ b/2022/CVE-2022-23131.json @@ -40,17 +40,17 @@ "description": "cve-2022-23131 exp", "fork": false, "created_at": "2022-02-18T08:38:53Z", - "updated_at": "2022-06-16T08:59:43Z", + "updated_at": "2022-06-19T18:25:42Z", "pushed_at": "2022-02-21T04:27:48Z", - "stargazers_count": 86, - "watchers_count": 86, + "stargazers_count": 85, + "watchers_count": 85, "forks_count": 37, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 37, - "watchers": 86, + "watchers": 85, "score": 0 }, { @@ -67,17 +67,17 @@ "description": "cve-2022-23131 zabbix-saml-bypass-exp", "fork": false, "created_at": "2022-02-18T11:51:47Z", - "updated_at": "2022-06-06T04:35:22Z", + "updated_at": "2022-06-19T18:25:42Z", "pushed_at": "2022-02-24T15:02:12Z", - "stargazers_count": 98, - "watchers_count": 98, + "stargazers_count": 97, + "watchers_count": 97, "forks_count": 38, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 38, - "watchers": 98, + "watchers": 97, "score": 0 }, { diff --git a/2022/CVE-2022-23222.json b/2022/CVE-2022-23222.json index b372f715f4..be00028809 100644 --- a/2022/CVE-2022-23222.json +++ b/2022/CVE-2022-23222.json @@ -13,17 +13,17 @@ "description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation", "fork": false, "created_at": "2022-06-07T03:20:23Z", - "updated_at": "2022-06-19T17:49:52Z", + "updated_at": "2022-06-19T18:58:03Z", "pushed_at": "2022-06-07T03:41:13Z", - "stargazers_count": 410, - "watchers_count": 410, + "stargazers_count": 411, + "watchers_count": 411, "forks_count": 69, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 69, - "watchers": 410, + "watchers": 411, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index a5fc47d3d4..5a7b4938b9 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -163,17 +163,17 @@ "description": "CVE-2022-26134 - Confluence Pre-Auth RCE | OGNL injection", "fork": false, "created_at": "2022-06-03T19:24:30Z", - "updated_at": "2022-06-13T17:52:12Z", + "updated_at": "2022-06-19T20:10:46Z", "pushed_at": "2022-06-03T19:59:01Z", - "stargazers_count": 20, - "watchers_count": 20, - "forks_count": 9, + "stargazers_count": 21, + "watchers_count": 21, + "forks_count": 10, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 9, - "watchers": 20, + "forks": 10, + "watchers": 21, "score": 0 }, { diff --git a/2022/CVE-2022-26809.json b/2022/CVE-2022-26809.json index 91d3ef1db2..3755c9fbf1 100644 --- a/2022/CVE-2022-26809.json +++ b/2022/CVE-2022-26809.json @@ -436,17 +436,17 @@ "description": "PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.", "fork": false, "created_at": "2022-06-13T11:08:33Z", - "updated_at": "2022-06-19T17:28:31Z", + "updated_at": "2022-06-19T20:35:36Z", "pushed_at": "2022-06-18T13:53:53Z", - "stargazers_count": 23, - "watchers_count": 23, - "forks_count": 5, + "stargazers_count": 29, + "watchers_count": 29, + "forks_count": 8, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 5, - "watchers": 23, + "forks": 8, + "watchers": 29, "score": 0 }, { diff --git a/2022/CVE-2022-26937.json b/2022/CVE-2022-26937.json index 0b7f32695b..beba14d50c 100644 --- a/2022/CVE-2022-26937.json +++ b/2022/CVE-2022-26937.json @@ -40,17 +40,17 @@ "description": "Windows Network File System Crash PoC", "fork": false, "created_at": "2022-06-17T01:42:55Z", - "updated_at": "2022-06-19T17:09:27Z", + "updated_at": "2022-06-19T21:16:16Z", "pushed_at": "2022-06-17T01:50:26Z", - "stargazers_count": 39, - "watchers_count": 39, + "stargazers_count": 43, + "watchers_count": 43, "forks_count": 16, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 16, - "watchers": 39, + "watchers": 43, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-29464.json b/2022/CVE-2022-29464.json index 2fd6ae4e48..2fbf0c6cd9 100644 --- a/2022/CVE-2022-29464.json +++ b/2022/CVE-2022-29464.json @@ -324,10 +324,10 @@ "description": "A bots loader for CVE-2022-29464 with multithreading", "fork": false, "created_at": "2022-05-15T08:51:16Z", - "updated_at": "2022-05-28T20:22:16Z", + "updated_at": "2022-06-19T22:32:40Z", "pushed_at": "2022-06-17T18:41:53Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -342,7 +342,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 4, "score": 0 }, { diff --git a/2022/CVE-2022-30190.json b/2022/CVE-2022-30190.json index 88dab5fee5..ae8a4de509 100644 --- a/2022/CVE-2022-30190.json +++ b/2022/CVE-2022-30190.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2022-05-30T18:17:38Z", - "updated_at": "2022-06-19T06:28:27Z", + "updated_at": "2022-06-19T21:51:28Z", "pushed_at": "2022-06-05T21:06:13Z", - "stargazers_count": 123, - "watchers_count": 123, + "stargazers_count": 124, + "watchers_count": 124, "forks_count": 44, "allow_forking": true, "is_template": false, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 44, - "watchers": 123, + "watchers": 124, "score": 0 }, { @@ -1378,11 +1378,11 @@ "description": "Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)", "fork": false, "created_at": "2022-06-09T09:32:10Z", - "updated_at": "2022-06-17T14:54:34Z", + "updated_at": "2022-06-19T22:26:42Z", "pushed_at": "2022-06-16T07:28:13Z", "stargazers_count": 6, "watchers_count": 6, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [ @@ -1397,7 +1397,7 @@ "word" ], "visibility": "public", - "forks": 2, + "forks": 3, "watchers": 6, "score": 0 },