diff --git a/2014/CVE-2014-7236.json b/2014/CVE-2014-7236.json index 46923ae68e..b447a54b73 100644 --- a/2014/CVE-2014-7236.json +++ b/2014/CVE-2014-7236.json @@ -17,8 +17,8 @@ "pushed_at": "2014-10-13T00:46:56Z", "stargazers_count": 9, "watchers_count": 9, - "forks_count": 6, - "forks": 6, + "forks_count": 7, + "forks": 7, "watchers": 9, "score": 0 } diff --git a/2016/CVE-2016-6515.json b/2016/CVE-2016-6515.json index 2b2fb564cf..1aaedf1b9f 100644 --- a/2016/CVE-2016-6515.json +++ b/2016/CVE-2016-6515.json @@ -13,13 +13,13 @@ "description": "OpenSSH remote DOS exploit and vulnerable container", "fork": false, "created_at": "2016-12-09T15:22:38Z", - "updated_at": "2020-12-23T17:55:49Z", + "updated_at": "2021-06-20T18:21:25Z", "pushed_at": "2017-10-30T22:29:20Z", - "stargazers_count": 49, - "watchers_count": 49, + "stargazers_count": 48, + "watchers_count": 48, "forks_count": 27, "forks": 27, - "watchers": 49, + "watchers": 48, "score": 0 }, { diff --git a/2017/CVE-2017-11317.json b/2017/CVE-2017-11317.json index 873282b979..9ab516137a 100644 --- a/2017/CVE-2017-11317.json +++ b/2017/CVE-2017-11317.json @@ -13,13 +13,13 @@ "description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)", "fork": false, "created_at": "2018-01-09T13:53:57Z", - "updated_at": "2021-06-14T02:10:05Z", + "updated_at": "2021-06-20T18:37:08Z", "pushed_at": "2020-08-22T06:15:54Z", - "stargazers_count": 116, - "watchers_count": 116, + "stargazers_count": 117, + "watchers_count": 117, "forks_count": 35, "forks": 35, - "watchers": 116, + "watchers": 117, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-11882.json b/2017/CVE-2017-11882.json index 3b6e3b02cb..4d3063b920 100644 --- a/2017/CVE-2017-11882.json +++ b/2017/CVE-2017-11882.json @@ -178,8 +178,8 @@ "pushed_at": "2017-11-28T03:06:32Z", "stargazers_count": 40, "watchers_count": 40, - "forks_count": 56, - "forks": 56, + "forks_count": 57, + "forks": 57, "watchers": 40, "score": 0 }, diff --git a/2017/CVE-2017-3881.json b/2017/CVE-2017-3881.json index 1f5198a8c5..ecc51bd16b 100644 --- a/2017/CVE-2017-3881.json +++ b/2017/CVE-2017-3881.json @@ -17,8 +17,8 @@ "pushed_at": "2017-04-12T09:17:27Z", "stargazers_count": 187, "watchers_count": 187, - "forks_count": 81, - "forks": 81, + "forks_count": 82, + "forks": 82, "watchers": 187, "score": 0 }, diff --git a/2017/CVE-2017-6736.json b/2017/CVE-2017-6736.json index 7a75f69816..8658750441 100644 --- a/2017/CVE-2017-6736.json +++ b/2017/CVE-2017-6736.json @@ -40,8 +40,8 @@ "pushed_at": "2018-06-28T18:56:25Z", "stargazers_count": 5, "watchers_count": 5, - "forks_count": 7, - "forks": 7, + "forks_count": 8, + "forks": 8, "watchers": 5, "score": 0 } diff --git a/2017/CVE-2017-7269.json b/2017/CVE-2017-7269.json index cb28c43cc2..508043147d 100644 --- a/2017/CVE-2017-7269.json +++ b/2017/CVE-2017-7269.json @@ -174,13 +174,13 @@ "description": "iis6 exploit 2017 CVE-2017-7269", "fork": false, "created_at": "2017-04-05T23:21:12Z", - "updated_at": "2021-06-12T19:48:25Z", + "updated_at": "2021-06-20T20:54:59Z", "pushed_at": "2017-04-05T23:29:03Z", - "stargazers_count": 41, - "watchers_count": 41, + "stargazers_count": 42, + "watchers_count": 42, "forks_count": 41, "forks": 41, - "watchers": 41, + "watchers": 42, "score": 0 }, { diff --git a/2017/CVE-2017-7494.json b/2017/CVE-2017-7494.json index 0cff7370bb..8cb8e69f4c 100644 --- a/2017/CVE-2017-7494.json +++ b/2017/CVE-2017-7494.json @@ -128,13 +128,13 @@ "description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability", "fork": false, "created_at": "2017-06-05T16:25:57Z", - "updated_at": "2021-06-11T19:21:21Z", + "updated_at": "2021-06-20T20:13:55Z", "pushed_at": "2021-03-09T09:12:55Z", - "stargazers_count": 234, - "watchers_count": 234, + "stargazers_count": 235, + "watchers_count": 235, "forks_count": 81, "forks": 81, - "watchers": 234, + "watchers": 235, "score": 0 }, { diff --git a/2018/CVE-2018-0101.json b/2018/CVE-2018-0101.json index f0a49a1d31..761d21f607 100644 --- a/2018/CVE-2018-0101.json +++ b/2018/CVE-2018-0101.json @@ -40,8 +40,8 @@ "pushed_at": "2018-11-23T11:47:10Z", "stargazers_count": 39, "watchers_count": 39, - "forks_count": 16, - "forks": 16, + "forks_count": 17, + "forks": 17, "watchers": 39, "score": 0 } diff --git a/2018/CVE-2018-0296.json b/2018/CVE-2018-0296.json index 8af491b937..7a7da87cac 100644 --- a/2018/CVE-2018-0296.json +++ b/2018/CVE-2018-0296.json @@ -40,8 +40,8 @@ "pushed_at": "2020-01-30T12:52:42Z", "stargazers_count": 187, "watchers_count": 187, - "forks_count": 70, - "forks": 70, + "forks_count": 71, + "forks": 71, "watchers": 187, "score": 0 }, diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index fa00468da5..47bd8600d4 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -86,8 +86,8 @@ "pushed_at": "2018-04-18T16:04:26Z", "stargazers_count": 13, "watchers_count": 13, - "forks_count": 10, - "forks": 10, + "forks_count": 11, + "forks": 11, "watchers": 13, "score": 0 }, diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 6ab02fd51f..34da3a4891 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -362,8 +362,8 @@ "pushed_at": "2019-06-01T04:12:19Z", "stargazers_count": 17, "watchers_count": 17, - "forks_count": 14, - "forks": 14, + "forks_count": 15, + "forks": 15, "watchers": 17, "score": 0 }, diff --git a/2019/CVE-2019-10915.json b/2019/CVE-2019-10915.json index b749c131dd..e559787895 100644 --- a/2019/CVE-2019-10915.json +++ b/2019/CVE-2019-10915.json @@ -17,8 +17,8 @@ "pushed_at": "2019-07-22T11:48:39Z", "stargazers_count": 3, "watchers_count": 3, - "forks_count": 3, - "forks": 3, + "forks_count": 4, + "forks": 4, "watchers": 3, "score": 0 } diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json index ce02cc5496..1a0e44355f 100644 --- a/2019/CVE-2019-11043.json +++ b/2019/CVE-2019-11043.json @@ -201,8 +201,8 @@ "pushed_at": "2019-10-29T15:47:02Z", "stargazers_count": 132, "watchers_count": 132, - "forks_count": 30, - "forks": 30, + "forks_count": 31, + "forks": 31, "watchers": 132, "score": 0 }, diff --git a/2019/CVE-2019-1653.json b/2019/CVE-2019-1653.json index 5411ea44d3..4823f8d4f6 100644 --- a/2019/CVE-2019-1653.json +++ b/2019/CVE-2019-1653.json @@ -40,8 +40,8 @@ "pushed_at": "2019-04-01T07:50:48Z", "stargazers_count": 4, "watchers_count": 4, - "forks_count": 4, - "forks": 4, + "forks_count": 5, + "forks": 5, "watchers": 4, "score": 0 } diff --git a/2019/CVE-2019-16759.json b/2019/CVE-2019-16759.json index ccefa063ab..e6d4a8cb7d 100644 --- a/2019/CVE-2019-16759.json +++ b/2019/CVE-2019-16759.json @@ -224,8 +224,8 @@ "pushed_at": "2020-08-16T21:19:30Z", "stargazers_count": 2, "watchers_count": 2, - "forks_count": 0, - "forks": 0, + "forks_count": 1, + "forks": 1, "watchers": 2, "score": 0 }, diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 75cd9095a9..72d7c35e99 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -36,13 +36,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-06-19T03:43:57Z", + "updated_at": "2021-06-20T17:11:43Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 2636, - "watchers_count": 2636, + "stargazers_count": 2637, + "watchers_count": 2637, "forks_count": 770, "forks": 770, - "watchers": 2636, + "watchers": 2637, "score": 0 }, { diff --git a/2019/CVE-2019-18935.json b/2019/CVE-2019-18935.json index 3c443f66f9..1edf875b12 100644 --- a/2019/CVE-2019-18935.json +++ b/2019/CVE-2019-18935.json @@ -13,13 +13,13 @@ "description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)", "fork": false, "created_at": "2018-01-09T13:53:57Z", - "updated_at": "2021-06-14T02:10:05Z", + "updated_at": "2021-06-20T18:37:08Z", "pushed_at": "2020-08-22T06:15:54Z", - "stargazers_count": 116, - "watchers_count": 116, + "stargazers_count": 117, + "watchers_count": 117, "forks_count": 35, "forks": 35, - "watchers": 116, + "watchers": 117, "score": 0 }, { diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json index 46df374329..3f6fd8b5b5 100644 --- a/2019/CVE-2019-19781.json +++ b/2019/CVE-2019-19781.json @@ -40,8 +40,8 @@ "pushed_at": "2020-01-18T07:01:29Z", "stargazers_count": 359, "watchers_count": 359, - "forks_count": 122, - "forks": 122, + "forks_count": 123, + "forks": 123, "watchers": 359, "score": 0 }, diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json index d46a146d54..bc5a41e65d 100644 --- a/2019/CVE-2019-2725.json +++ b/2019/CVE-2019-2725.json @@ -270,8 +270,8 @@ "pushed_at": "2019-06-15T12:53:21Z", "stargazers_count": 32, "watchers_count": 32, - "forks_count": 39, - "forks": 39, + "forks_count": 40, + "forks": 40, "watchers": 32, "score": 0 }, diff --git a/2019/CVE-2019-3719.json b/2019/CVE-2019-3719.json index 38fc860e40..59dc5ab906 100644 --- a/2019/CVE-2019-3719.json +++ b/2019/CVE-2019-3719.json @@ -17,8 +17,8 @@ "pushed_at": "2019-05-01T04:50:02Z", "stargazers_count": 3, "watchers_count": 3, - "forks_count": 3, - "forks": 3, + "forks_count": 4, + "forks": 4, "watchers": 3, "score": 0 } diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index f9925aed03..717c1e56ef 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -983,8 +983,8 @@ "pushed_at": "2020-04-01T01:46:17Z", "stargazers_count": 46, "watchers_count": 46, - "forks_count": 13, - "forks": 13, + "forks_count": 14, + "forks": 14, "watchers": 46, "score": 0 }, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 8e5e5dc805..8cec1be77d 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,13 +13,13 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2021-06-19T03:43:57Z", + "updated_at": "2021-06-20T17:11:43Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 2636, - "watchers_count": 2636, + "stargazers_count": 2637, + "watchers_count": 2637, "forks_count": 770, "forks": 770, - "watchers": 2636, + "watchers": 2637, "score": 0 }, { diff --git a/2020/CVE-2020-16898.json b/2020/CVE-2020-16898.json index c03a466dff..22dbd0f582 100644 --- a/2020/CVE-2020-16898.json +++ b/2020/CVE-2020-16898.json @@ -201,8 +201,8 @@ "pushed_at": "2020-10-17T04:32:19Z", "stargazers_count": 6, "watchers_count": 6, - "forks_count": 3, - "forks": 3, + "forks_count": 4, + "forks": 4, "watchers": 6, "score": 0 }, diff --git a/2020/CVE-2020-2883.json b/2020/CVE-2020-2883.json index 0bf9f50ee5..2989f51748 100644 --- a/2020/CVE-2020-2883.json +++ b/2020/CVE-2020-2883.json @@ -82,13 +82,13 @@ "description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell", "fork": false, "created_at": "2020-08-19T03:34:06Z", - "updated_at": "2021-06-13T13:37:08Z", + "updated_at": "2021-06-20T16:52:18Z", "pushed_at": "2020-08-25T03:17:32Z", - "stargazers_count": 254, - "watchers_count": 254, + "stargazers_count": 255, + "watchers_count": 255, "forks_count": 41, "forks": 41, - "watchers": 254, + "watchers": 255, "score": 0 }, { diff --git a/2020/CVE-2020-3153.json b/2020/CVE-2020-3153.json index 3808eeceb4..7a31a358fd 100644 --- a/2020/CVE-2020-3153.json +++ b/2020/CVE-2020-3153.json @@ -63,8 +63,8 @@ "pushed_at": "2020-05-25T08:33:24Z", "stargazers_count": 90, "watchers_count": 90, - "forks_count": 20, - "forks": 20, + "forks_count": 21, + "forks": 21, "watchers": 90, "score": 0 } diff --git a/2020/CVE-2020-3433.json b/2020/CVE-2020-3433.json index 1cc10da4d8..dba5ec3ba5 100644 --- a/2020/CVE-2020-3433.json +++ b/2020/CVE-2020-3433.json @@ -17,8 +17,8 @@ "pushed_at": "2020-09-25T20:55:17Z", "stargazers_count": 11, "watchers_count": 11, - "forks_count": 6, - "forks": 6, + "forks_count": 7, + "forks": 7, "watchers": 11, "score": 0 } diff --git a/2020/CVE-2020-3452.json b/2020/CVE-2020-3452.json index ff53775ab7..d699ffde8c 100644 --- a/2020/CVE-2020-3452.json +++ b/2020/CVE-2020-3452.json @@ -63,8 +63,8 @@ "pushed_at": "2020-08-30T21:34:41Z", "stargazers_count": 23, "watchers_count": 23, - "forks_count": 7, - "forks": 7, + "forks_count": 8, + "forks": 8, "watchers": 23, "score": 0 }, @@ -316,8 +316,8 @@ "pushed_at": "2021-01-10T09:14:08Z", "stargazers_count": 86, "watchers_count": 86, - "forks_count": 25, - "forks": 25, + "forks_count": 26, + "forks": 26, "watchers": 86, "score": 0 }, diff --git a/2020/CVE-2020-5902.json b/2020/CVE-2020-5902.json index acedd8dfb0..78d39972d3 100644 --- a/2020/CVE-2020-5902.json +++ b/2020/CVE-2020-5902.json @@ -477,8 +477,8 @@ "pushed_at": "2020-07-07T02:03:40Z", "stargazers_count": 5, "watchers_count": 5, - "forks_count": 4, - "forks": 4, + "forks_count": 5, + "forks": 5, "watchers": 5, "score": 0 }, @@ -868,8 +868,8 @@ "pushed_at": "2020-07-10T15:31:07Z", "stargazers_count": 3, "watchers_count": 3, - "forks_count": 1, - "forks": 1, + "forks_count": 2, + "forks": 2, "watchers": 3, "score": 0 }, diff --git a/2021/CVE-2021-25374.json b/2021/CVE-2021-25374.json index 6fd9069c83..c97d061c48 100644 --- a/2021/CVE-2021-25374.json +++ b/2021/CVE-2021-25374.json @@ -17,8 +17,8 @@ "pushed_at": "2021-04-28T17:56:04Z", "stargazers_count": 10, "watchers_count": 10, - "forks_count": 6, - "forks": 6, + "forks_count": 7, + "forks": 7, "watchers": 10, "score": 0 } diff --git a/2021/CVE-2021-26855.json b/2021/CVE-2021-26855.json index 3c8af9be20..61cab26208 100644 --- a/2021/CVE-2021-26855.json +++ b/2021/CVE-2021-26855.json @@ -726,13 +726,13 @@ "description": null, "fork": false, "created_at": "2021-03-18T10:45:54Z", - "updated_at": "2021-04-06T01:57:31Z", + "updated_at": "2021-06-20T17:30:34Z", "pushed_at": "2021-04-05T02:36:51Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 1, "forks": 1, - "watchers": 1, + "watchers": 2, "score": 0 }, { @@ -795,13 +795,13 @@ "description": "C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection ", "fork": false, "created_at": "2021-03-29T21:10:34Z", - "updated_at": "2021-06-12T12:35:42Z", + "updated_at": "2021-06-20T20:46:21Z", "pushed_at": "2021-03-31T11:57:38Z", - "stargazers_count": 132, - "watchers_count": 132, + "stargazers_count": 133, + "watchers_count": 133, "forks_count": 22, "forks": 22, - "watchers": 132, + "watchers": 133, "score": 0 }, { diff --git a/2021/CVE-2021-27928.json b/2021/CVE-2021-27928.json index 86974dd3a7..a03bd13ec0 100644 --- a/2021/CVE-2021-27928.json +++ b/2021/CVE-2021-27928.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2021-04-15T06:40:49Z", "updated_at": "2021-06-20T09:32:59Z", - "pushed_at": "2021-04-15T06:41:20Z", + "pushed_at": "2021-06-20T20:41:13Z", "stargazers_count": 14, "watchers_count": 14, "forks_count": 3, diff --git a/2021/CVE-2021-31166.json b/2021/CVE-2021-31166.json index 0701443d2e..38b604474c 100644 --- a/2021/CVE-2021-31166.json +++ b/2021/CVE-2021-31166.json @@ -13,13 +13,13 @@ "description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.", "fork": false, "created_at": "2021-05-16T16:15:56Z", - "updated_at": "2021-06-19T21:17:44Z", + "updated_at": "2021-06-20T15:44:09Z", "pushed_at": "2021-06-12T08:27:09Z", - "stargazers_count": 739, - "watchers_count": 739, + "stargazers_count": 738, + "watchers_count": 738, "forks_count": 119, "forks": 119, - "watchers": 739, + "watchers": 738, "score": 0 }, {