diff --git a/2002/CVE-2002-20001.json b/2002/CVE-2002-20001.json index 0e4488d57a..83e80fa64d 100644 --- a/2002/CVE-2002-20001.json +++ b/2002/CVE-2002-20001.json @@ -19,7 +19,7 @@ "stargazers_count": 187, "watchers_count": 187, "has_discussions": false, - "forks_count": 27, + "forks_count": 26, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -46,7 +46,7 @@ "tls" ], "visibility": "public", - "forks": 27, + "forks": 26, "watchers": 187, "score": 0, "subscribers_count": 8 diff --git a/2017/CVE-2017-20165.json b/2017/CVE-2017-20165.json index fa15912343..5aa3c20c18 100644 --- a/2017/CVE-2017-20165.json +++ b/2017/CVE-2017-20165.json @@ -14,8 +14,8 @@ "description": "Fork of the send module to deal with CVE-2017-20165", "fork": false, "created_at": "2023-01-11T10:20:27Z", - "updated_at": "2024-12-08T16:16:44Z", - "pushed_at": "2024-12-08T16:16:43Z", + "updated_at": "2024-12-15T16:51:00Z", + "pushed_at": "2024-12-15T16:50:59Z", "stargazers_count": 13, "watchers_count": 13, "has_discussions": false, diff --git a/2018/CVE-2018-15473.json b/2018/CVE-2018-15473.json index 01aa80d1f0..1276282299 100644 --- a/2018/CVE-2018-15473.json +++ b/2018/CVE-2018-15473.json @@ -92,10 +92,10 @@ "description": "Exploit written in Python for CVE-2018-15473 with threading and export formats", "fork": false, "created_at": "2018-08-21T00:09:56Z", - "updated_at": "2024-12-10T19:31:33Z", + "updated_at": "2024-12-15T16:48:36Z", "pushed_at": "2024-07-12T08:47:49Z", - "stargazers_count": 520, - "watchers_count": 520, + "stargazers_count": 521, + "watchers_count": 521, "has_discussions": false, "forks_count": 183, "allow_forking": true, @@ -104,7 +104,7 @@ "topics": [], "visibility": "public", "forks": 183, - "watchers": 520, + "watchers": 521, "score": 0, "subscribers_count": 21 }, diff --git a/2018/CVE-2018-4878.json b/2018/CVE-2018-4878.json index b7bdef5414..58ced282b0 100644 --- a/2018/CVE-2018-4878.json +++ b/2018/CVE-2018-4878.json @@ -92,7 +92,7 @@ "forks": 3, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 }, { "id": 121002284, diff --git a/2019/CVE-2019-12586.json b/2019/CVE-2019-12586.json index fbf31b21d0..ab3fd2c1bd 100644 --- a/2019/CVE-2019-12586.json +++ b/2019/CVE-2019-12586.json @@ -14,10 +14,10 @@ "description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)", "fork": false, "created_at": "2019-09-03T15:08:49Z", - "updated_at": "2024-12-10T06:49:39Z", + "updated_at": "2024-12-15T12:35:15Z", "pushed_at": "2019-09-08T06:09:11Z", - "stargazers_count": 799, - "watchers_count": 799, + "stargazers_count": 800, + "watchers_count": 800, "has_discussions": false, "forks_count": 69, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 69, - "watchers": 799, + "watchers": 800, "score": 0, "subscribers_count": 34 } diff --git a/2019/CVE-2019-14079.json b/2019/CVE-2019-14079.json index dfaaffd291..4860309833 100644 --- a/2019/CVE-2019-14079.json +++ b/2019/CVE-2019-14079.json @@ -14,10 +14,10 @@ "description": "USB device fuzzing on Android Phone", "fork": false, "created_at": "2020-04-05T05:45:29Z", - "updated_at": "2024-12-12T14:13:19Z", + "updated_at": "2024-12-15T14:44:37Z", "pushed_at": "2021-10-16T15:23:41Z", - "stargazers_count": 30, - "watchers_count": 30, + "stargazers_count": 31, + "watchers_count": 31, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 30, + "watchers": 31, "score": 0, "subscribers_count": 3 } diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index e4781a683e..80e2996b30 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -45,10 +45,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-12-14T21:15:38Z", + "updated_at": "2024-12-15T14:24:45Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 4142, - "watchers_count": 4142, + "stargazers_count": 4143, + "watchers_count": 4143, "has_discussions": false, "forks_count": 1100, "allow_forking": true, @@ -77,7 +77,7 @@ ], "visibility": "public", "forks": 1100, - "watchers": 4142, + "watchers": 4143, "score": 0, "subscribers_count": 149 }, diff --git a/2019/CVE-2019-5736.json b/2019/CVE-2019-5736.json index f79dd5ad32..36d6792458 100644 --- a/2019/CVE-2019-5736.json +++ b/2019/CVE-2019-5736.json @@ -50,13 +50,13 @@ "stargazers_count": 642, "watchers_count": 642, "has_discussions": false, - "forks_count": 163, + "forks_count": 164, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 163, + "forks": 164, "watchers": 642, "score": 0, "subscribers_count": 13 diff --git a/2020/CVE-2020-11651.json b/2020/CVE-2020-11651.json index 3285695f8b..18ae8555e2 100644 --- a/2020/CVE-2020-11651.json +++ b/2020/CVE-2020-11651.json @@ -275,10 +275,10 @@ "description": "CVE-2020-11651&&CVE-2020-11652 EXP", "fork": false, "created_at": "2020-05-07T09:17:39Z", - "updated_at": "2024-10-07T03:30:01Z", + "updated_at": "2024-12-15T15:30:53Z", "pushed_at": "2023-03-21T10:02:22Z", - "stargazers_count": 23, - "watchers_count": 23, + "stargazers_count": 24, + "watchers_count": 24, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -287,7 +287,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 23, + "watchers": 24, "score": 0, "subscribers_count": 1 }, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 32bed8194f..4ceaa76aa6 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -14,10 +14,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-12-14T21:15:38Z", + "updated_at": "2024-12-15T14:24:45Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 4142, - "watchers_count": 4142, + "stargazers_count": 4143, + "watchers_count": 4143, "has_discussions": false, "forks_count": 1100, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 1100, - "watchers": 4142, + "watchers": 4143, "score": 0, "subscribers_count": 149 }, diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index a9bf29d46d..b9193757ea 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -386,10 +386,10 @@ "description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ", "fork": false, "created_at": "2020-02-22T16:16:20Z", - "updated_at": "2024-12-13T20:29:20Z", + "updated_at": "2024-12-15T13:01:38Z", "pushed_at": "2020-03-09T14:51:43Z", - "stargazers_count": 368, - "watchers_count": 368, + "stargazers_count": 369, + "watchers_count": 369, "has_discussions": false, "forks_count": 111, "allow_forking": true, @@ -404,7 +404,7 @@ ], "visibility": "public", "forks": 111, - "watchers": 368, + "watchers": 369, "score": 0, "subscribers_count": 5 }, diff --git a/2021/CVE-2021-43798.json b/2021/CVE-2021-43798.json index c5f13ac5ab..4380351de6 100644 --- a/2021/CVE-2021-43798.json +++ b/2021/CVE-2021-43798.json @@ -1271,10 +1271,10 @@ "description": "Automated Exploit Tool for Grafana CVE-2021-43798: Scanning common files that contain juicy informations and extracting SSH keys from compromised users.", "fork": false, "created_at": "2024-12-14T14:06:59Z", - "updated_at": "2024-12-14T17:30:16Z", + "updated_at": "2024-12-15T14:00:48Z", "pushed_at": "2024-12-14T17:30:12Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -1283,7 +1283,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index 3319dc90d2..96138ccf5c 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -14,10 +14,10 @@ "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。", "fork": false, "created_at": "2022-05-31T07:44:01Z", - "updated_at": "2024-12-13T06:37:28Z", + "updated_at": "2024-12-15T14:16:32Z", "pushed_at": "2023-02-26T14:06:05Z", - "stargazers_count": 1171, - "watchers_count": 1171, + "stargazers_count": 1172, + "watchers_count": 1172, "has_discussions": true, "forks_count": 190, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 190, - "watchers": 1171, + "watchers": 1172, "score": 0, "subscribers_count": 19 }, diff --git a/2023/CVE-2023-38709.json b/2023/CVE-2023-38709.json index 0c35c10625..ac0327f54a 100644 --- a/2023/CVE-2023-38709.json +++ b/2023/CVE-2023-38709.json @@ -14,10 +14,10 @@ "description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", "fork": false, "created_at": "2024-10-05T20:32:45Z", - "updated_at": "2024-12-15T12:18:17Z", + "updated_at": "2024-12-15T13:55:19Z", "pushed_at": "2024-10-05T20:37:02Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 26, + "watchers_count": 26, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -37,7 +37,7 @@ ], "visibility": "public", "forks": 6, - "watchers": 25, + "watchers": 26, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index 4244d417f7..98bd986a5d 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -14,19 +14,19 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2024-12-15T03:37:39Z", + "updated_at": "2024-12-15T18:10:45Z", "pushed_at": "2024-08-18T08:26:46Z", - "stargazers_count": 1291, - "watchers_count": 1291, + "stargazers_count": 1293, + "watchers_count": 1293, "has_discussions": false, - "forks_count": 220, + "forks_count": 221, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 220, - "watchers": 1291, + "forks": 221, + "watchers": 1293, "score": 0, "subscribers_count": 21 }, diff --git a/2024/CVE-2024-10914.json b/2024/CVE-2024-10914.json index 507126215f..76baa4f424 100644 --- a/2024/CVE-2024-10914.json +++ b/2024/CVE-2024-10914.json @@ -146,8 +146,8 @@ "description": "CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices.", "fork": false, "created_at": "2024-11-16T16:32:05Z", - "updated_at": "2024-12-15T12:30:32Z", - "pushed_at": "2024-12-15T12:30:28Z", + "updated_at": "2024-12-15T15:57:26Z", + "pushed_at": "2024-12-15T15:57:22Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, diff --git a/2024/CVE-2024-28000.json b/2024/CVE-2024-28000.json index dd818d0501..27dd0d5d03 100644 --- a/2024/CVE-2024-28000.json +++ b/2024/CVE-2024-28000.json @@ -19,13 +19,13 @@ "stargazers_count": 16, "watchers_count": 16, "has_discussions": false, - "forks_count": 7, + "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 7, + "forks": 8, "watchers": 16, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-38077.json b/2024/CVE-2024-38077.json index 8393e137a9..17a1d30bf5 100644 --- a/2024/CVE-2024-38077.json +++ b/2024/CVE-2024-38077.json @@ -355,10 +355,10 @@ "description": "CVE-2024-38077: Remote Code Execution Vulnerability in Windows Remote Desktop Licensing Service", "fork": false, "created_at": "2024-10-09T06:39:21Z", - "updated_at": "2024-11-21T09:33:12Z", + "updated_at": "2024-12-15T14:51:21Z", "pushed_at": "2024-10-09T06:42:25Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -378,7 +378,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-38193.json b/2024/CVE-2024-38193.json index fe145f9b94..0ca8caf0e3 100644 --- a/2024/CVE-2024-38193.json +++ b/2024/CVE-2024-38193.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-12-03T08:56:59Z", - "updated_at": "2024-12-13T15:07:54Z", + "updated_at": "2024-12-15T14:33:25Z", "pushed_at": "2024-11-18T23:48:31Z", - "stargazers_count": 37, - "watchers_count": 37, + "stargazers_count": 38, + "watchers_count": 38, "has_discussions": false, "forks_count": 24, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 24, - "watchers": 37, + "watchers": 38, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-38472.json b/2024/CVE-2024-38472.json index 85054d9b4a..0d7084ddda 100644 --- a/2024/CVE-2024-38472.json +++ b/2024/CVE-2024-38472.json @@ -45,10 +45,10 @@ "description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", "fork": false, "created_at": "2024-10-05T20:32:45Z", - "updated_at": "2024-12-15T12:18:17Z", + "updated_at": "2024-12-15T13:55:19Z", "pushed_at": "2024-10-05T20:37:02Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 26, + "watchers_count": 26, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -68,7 +68,7 @@ ], "visibility": "public", "forks": 6, - "watchers": 25, + "watchers": 26, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-38819.json b/2024/CVE-2024-38819.json index a6ff39c3af..70480ea7b9 100644 --- a/2024/CVE-2024-38819.json +++ b/2024/CVE-2024-38819.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-12-14T09:22:33Z", - "updated_at": "2024-12-15T07:46:38Z", + "updated_at": "2024-12-15T16:33:04Z", "pushed_at": "2024-12-14T10:13:45Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 4, + "watchers": 9, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-53677.json b/2024/CVE-2024-53677.json index 94e90b8f60..aadd4211eb 100644 --- a/2024/CVE-2024-53677.json +++ b/2024/CVE-2024-53677.json @@ -14,10 +14,10 @@ "description": "s2-067(CVE-2024-53677)", "fork": false, "created_at": "2024-12-12T08:30:14Z", - "updated_at": "2024-12-13T09:18:45Z", + "updated_at": "2024-12-15T14:21:42Z", "pushed_at": "2024-12-12T08:33:19Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 2 }, @@ -45,10 +45,10 @@ "description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.", "fork": false, "created_at": "2024-12-13T17:42:55Z", - "updated_at": "2024-12-15T11:08:19Z", + "updated_at": "2024-12-15T14:22:43Z", "pushed_at": "2024-12-15T05:12:21Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-55587.json b/2024/CVE-2024-55587.json index c8bf9fd9de..467bb6f0d2 100644 --- a/2024/CVE-2024-55587.json +++ b/2024/CVE-2024-55587.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-12-10T06:59:00Z", - "updated_at": "2024-12-11T13:28:38Z", + "updated_at": "2024-12-15T16:54:02Z", "pushed_at": "2024-12-10T07:05:27Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 }