diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index 0744d9bf43..bff787aa4b 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -174,13 +174,13 @@ "stargazers_count": 573, "watchers_count": 573, "has_discussions": false, - "forks_count": 213, + "forks_count": 212, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 213, + "forks": 212, "watchers": 573, "score": 0, "subscribers_count": 57 diff --git a/2015/CVE-2015-1427.json b/2015/CVE-2015-1427.json index 8934a0100e..1936a7556d 100644 --- a/2015/CVE-2015-1427.json +++ b/2015/CVE-2015-1427.json @@ -14,10 +14,10 @@ "description": "Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container", "fork": false, "created_at": "2017-01-09T20:08:56Z", - "updated_at": "2024-08-12T19:27:02Z", + "updated_at": "2025-01-07T04:25:40Z", "pushed_at": "2018-04-07T00:30:52Z", - "stargazers_count": 32, - "watchers_count": 32, + "stargazers_count": 33, + "watchers_count": 33, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 16, - "watchers": 32, + "watchers": 33, "score": 0, "subscribers_count": 2 }, diff --git a/2015/CVE-2015-5377.json b/2015/CVE-2015-5377.json index aa0ac2e61a..8125289588 100644 --- a/2015/CVE-2015-5377.json +++ b/2015/CVE-2015-5377.json @@ -14,10 +14,10 @@ "description": "Java deserialization exploit for elasticsearch 1.5.2 CVE-2015-5377", "fork": false, "created_at": "2020-12-28T21:30:22Z", - "updated_at": "2024-07-05T12:06:47Z", + "updated_at": "2025-01-07T05:05:06Z", "pushed_at": "2022-03-30T16:56:10Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2017/CVE-2017-8570.json b/2017/CVE-2017-8570.json index f598e429a5..40a9baf49a 100644 --- a/2017/CVE-2017-8570.json +++ b/2017/CVE-2017-8570.json @@ -45,10 +45,10 @@ "description": "Proof of Concept exploit for CVE-2017-8570", "fork": false, "created_at": "2018-01-09T19:09:33Z", - "updated_at": "2025-01-03T03:24:52Z", + "updated_at": "2025-01-07T01:47:27Z", "pushed_at": "2018-01-09T19:23:43Z", - "stargazers_count": 186, - "watchers_count": 186, + "stargazers_count": 187, + "watchers_count": 187, "has_discussions": false, "forks_count": 105, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 105, - "watchers": 186, + "watchers": 187, "score": 0, "subscribers_count": 9 }, diff --git a/2018/CVE-2018-19320.json b/2018/CVE-2018-19320.json index a9a3654fbb..241c0b1c96 100644 --- a/2018/CVE-2018-19320.json +++ b/2018/CVE-2018-19320.json @@ -76,10 +76,10 @@ "description": "Unsigned driver loader using CVE-2018-19320", "fork": false, "created_at": "2022-11-12T05:48:13Z", - "updated_at": "2025-01-05T16:26:29Z", + "updated_at": "2025-01-07T03:46:57Z", "pushed_at": "2023-04-09T13:50:29Z", - "stargazers_count": 218, - "watchers_count": 218, + "stargazers_count": 219, + "watchers_count": 219, "has_discussions": false, "forks_count": 58, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 58, - "watchers": 218, + "watchers": 219, "score": 0, "subscribers_count": 10 } diff --git a/2019/CVE-2019-6693.json b/2019/CVE-2019-6693.json index 95963efd5f..da6671b29c 100644 --- a/2019/CVE-2019-6693.json +++ b/2019/CVE-2019-6693.json @@ -81,13 +81,13 @@ "stargazers_count": 11, "watchers_count": 11, "has_discussions": false, - "forks_count": 4, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 4, + "forks": 3, "watchers": 11, "score": 0, "subscribers_count": 1 diff --git a/2019/CVE-2019-7238.json b/2019/CVE-2019-7238.json index 8d384c08fd..c32193132a 100644 --- a/2019/CVE-2019-7238.json +++ b/2019/CVE-2019-7238.json @@ -45,10 +45,10 @@ "description": "Nexus Repository Manager 3 Remote Code Execution without authentication < 3.15.0", "fork": false, "created_at": "2019-05-21T13:16:02Z", - "updated_at": "2024-12-09T02:39:12Z", + "updated_at": "2025-01-07T00:57:35Z", "pushed_at": "2019-08-19T17:33:56Z", - "stargazers_count": 82, - "watchers_count": 82, + "stargazers_count": 83, + "watchers_count": 83, "has_discussions": false, "forks_count": 28, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 28, - "watchers": 82, + "watchers": 83, "score": 0, "subscribers_count": 2 }, diff --git a/2020/CVE-2020-10713.json b/2020/CVE-2020-10713.json index 3156231f09..0676eaa0ef 100644 --- a/2020/CVE-2020-10713.json +++ b/2020/CVE-2020-10713.json @@ -14,10 +14,10 @@ "description": "BootHole vulnerability (CVE-2020-10713). detection script, links and other mitigation related materials", "fork": false, "created_at": "2020-07-29T00:01:41Z", - "updated_at": "2024-08-12T20:04:13Z", + "updated_at": "2025-01-07T03:14:23Z", "pushed_at": "2020-08-24T23:16:38Z", - "stargazers_count": 63, - "watchers_count": 63, + "stargazers_count": 64, + "watchers_count": 64, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 14, - "watchers": 63, + "watchers": 64, "score": 0, "subscribers_count": 13 } diff --git a/2020/CVE-2020-15906.json b/2020/CVE-2020-15906.json index 3ea34dc699..7aa5dc4359 100644 --- a/2020/CVE-2020-15906.json +++ b/2020/CVE-2020-15906.json @@ -14,10 +14,10 @@ "description": "Writeup of CVE-2020-15906", "fork": false, "created_at": "2020-07-23T09:20:53Z", - "updated_at": "2024-12-30T22:46:37Z", + "updated_at": "2025-01-07T02:18:51Z", "pushed_at": "2020-10-26T22:01:33Z", - "stargazers_count": 45, - "watchers_count": 45, + "stargazers_count": 46, + "watchers_count": 46, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 11, - "watchers": 45, + "watchers": 46, "score": 0, "subscribers_count": 4 } diff --git a/2021/CVE-2021-2119.json b/2021/CVE-2021-2119.json index 1ade68ae6d..43b1ed29ec 100644 --- a/2021/CVE-2021-2119.json +++ b/2021/CVE-2021-2119.json @@ -28,7 +28,7 @@ "forks": 22, "watchers": 139, "score": 0, - "subscribers_count": 10 + "subscribers_count": 11 }, { "id": 471867550, diff --git a/2021/CVE-2021-21551.json b/2021/CVE-2021-21551.json index 7ff5508dca..934bc3c1a9 100644 --- a/2021/CVE-2021-21551.json +++ b/2021/CVE-2021-21551.json @@ -59,7 +59,7 @@ "forks": 8, "watchers": 26, "score": 0, - "subscribers_count": 3 + "subscribers_count": 4 }, { "id": 371617838, diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index e45c0b1cba..2e7f47de7f 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -848,10 +848,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2025-01-03T01:59:09Z", + "updated_at": "2025-01-07T00:45:39Z", "pushed_at": "2024-04-25T06:09:38Z", - "stargazers_count": 1362, - "watchers_count": 1362, + "stargazers_count": 1363, + "watchers_count": 1363, "has_discussions": false, "forks_count": 167, "allow_forking": true, @@ -867,7 +867,7 @@ ], "visibility": "public", "forks": 167, - "watchers": 1362, + "watchers": 1363, "score": 0, "subscribers_count": 15 } diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json index 2a8725f967..058b2e756a 100644 --- a/2021/CVE-2021-22205.json +++ b/2021/CVE-2021-22205.json @@ -138,10 +138,10 @@ "description": "CVE-2021-22205& GitLab CE\/EE RCE", "fork": false, "created_at": "2021-10-29T04:30:45Z", - "updated_at": "2025-01-04T08:07:12Z", + "updated_at": "2025-01-07T03:17:03Z", "pushed_at": "2022-11-16T08:14:33Z", - "stargazers_count": 266, - "watchers_count": 266, + "stargazers_count": 267, + "watchers_count": 267, "has_discussions": false, "forks_count": 99, "allow_forking": true, @@ -152,7 +152,7 @@ ], "visibility": "public", "forks": 99, - "watchers": 266, + "watchers": 267, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-27285.json b/2021/CVE-2021-27285.json index 6fbccf55ed..0bda47fa96 100644 --- a/2021/CVE-2021-27285.json +++ b/2021/CVE-2021-27285.json @@ -14,8 +14,8 @@ "description": null, "fork": false, "created_at": "2025-01-01T13:31:09Z", - "updated_at": "2025-01-01T13:38:50Z", - "pushed_at": "2025-01-01T13:38:46Z", + "updated_at": "2025-01-07T02:37:24Z", + "pushed_at": "2025-01-07T02:37:20Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 18a90e575d..d157bf7651 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -3386,7 +3386,7 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 }, { "id": 630673981, @@ -3521,7 +3521,7 @@ "forks": 0, "watchers": 7, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 }, { "id": 721073490, @@ -3746,6 +3746,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-4191.json b/2021/CVE-2021-4191.json index f4d301d01a..9d2c4eb36d 100644 --- a/2021/CVE-2021-4191.json +++ b/2021/CVE-2021-4191.json @@ -28,7 +28,7 @@ "forks": 4, "watchers": 0, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 }, { "id": 669611759, @@ -67,6 +67,6 @@ "forks": 1, "watchers": 6, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-42008.json b/2021/CVE-2021-42008.json index f600df4186..6d48267925 100644 --- a/2021/CVE-2021-42008.json +++ b/2021/CVE-2021-42008.json @@ -59,6 +59,6 @@ "forks": 9, "watchers": 29, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-42013.json b/2021/CVE-2021-42013.json index c74bf6a235..40ed19d1e7 100644 --- a/2021/CVE-2021-42013.json +++ b/2021/CVE-2021-42013.json @@ -59,7 +59,7 @@ "forks": 4, "watchers": 17, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 }, { "id": 417233035, @@ -187,7 +187,7 @@ "forks": 2, "watchers": 7, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 }, { "id": 421851715, @@ -317,7 +317,7 @@ "forks": 2, "watchers": 10, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 }, { "id": 455174932, @@ -391,7 +391,7 @@ "forks": 1, "watchers": 1, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 }, { "id": 469575892, @@ -484,7 +484,7 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 }, { "id": 536994874, @@ -617,7 +617,7 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 }, { "id": 650990250, @@ -648,7 +648,7 @@ "forks": 1, "watchers": 1, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 }, { "id": 656394946, @@ -865,6 +865,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-42171.json b/2021/CVE-2021-42171.json index 78700f190d..fe51ce0638 100644 --- a/2021/CVE-2021-42171.json +++ b/2021/CVE-2021-42171.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-42205.json b/2021/CVE-2021-42205.json index 930a341753..3427ae2b9d 100644 --- a/2021/CVE-2021-42205.json +++ b/2021/CVE-2021-42205.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-42260.json b/2021/CVE-2021-42260.json index 9fc4fb70c5..4029adb7e1 100644 --- a/2021/CVE-2021-42260.json +++ b/2021/CVE-2021-42260.json @@ -28,6 +28,6 @@ "forks": 1, "watchers": 1, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json index b94fe318ab..ed0549f828 100644 --- a/2021/CVE-2021-42287.json +++ b/2021/CVE-2021-42287.json @@ -59,7 +59,7 @@ "forks": 12, "watchers": 60, "score": 0, - "subscribers_count": 4 + "subscribers_count": 0 }, { "id": 445506092, @@ -138,10 +138,10 @@ "description": "CVE-2021-42287\/CVE-2021-42278 Exploiter", "fork": false, "created_at": "2022-12-22T06:39:07Z", - "updated_at": "2024-12-25T03:08:42Z", + "updated_at": "2025-01-07T06:04:22Z", "pushed_at": "2023-01-12T09:05:52Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -150,7 +150,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 11, + "watchers": 12, "score": 0, "subscribers_count": 1 } diff --git a/2021/CVE-2021-42321.json b/2021/CVE-2021-42321.json index 8d0e939e38..f9b190c356 100644 --- a/2021/CVE-2021-42321.json +++ b/2021/CVE-2021-42321.json @@ -28,7 +28,7 @@ "forks": 34, "watchers": 84, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 }, { "id": 535520694, @@ -59,7 +59,7 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 }, { "id": 547867056, @@ -90,6 +90,6 @@ "forks": 3, "watchers": 10, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-42342.json b/2021/CVE-2021-42342.json index 22db9d38f8..43aee76adf 100644 --- a/2021/CVE-2021-42342.json +++ b/2021/CVE-2021-42342.json @@ -28,7 +28,7 @@ "forks": 4, "watchers": 21, "score": 0, - "subscribers_count": 2 + "subscribers_count": 0 }, { "id": 711394073, diff --git a/2021/CVE-2021-42558.json b/2021/CVE-2021-42558.json index 0918f006ee..bae4964bd0 100644 --- a/2021/CVE-2021-42558.json +++ b/2021/CVE-2021-42558.json @@ -34,6 +34,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-42559.json b/2021/CVE-2021-42559.json index 99277c5820..2dcec3369c 100644 --- a/2021/CVE-2021-42559.json +++ b/2021/CVE-2021-42559.json @@ -35,6 +35,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-42574.json b/2021/CVE-2021-42574.json index 0e8b00824a..d0fa43c159 100644 --- a/2021/CVE-2021-42574.json +++ b/2021/CVE-2021-42574.json @@ -128,7 +128,7 @@ "forks": 3, "watchers": 5, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 }, { "id": 431761296, diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index 778946352e..5680835260 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -665,10 +665,10 @@ "description": "CVE-2022-0847", "fork": false, "created_at": "2022-03-09T02:47:08Z", - "updated_at": "2024-12-13T18:53:00Z", + "updated_at": "2025-01-07T02:46:31Z", "pushed_at": "2022-03-09T02:47:32Z", - "stargazers_count": 76, - "watchers_count": 76, + "stargazers_count": 77, + "watchers_count": 77, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -679,7 +679,7 @@ ], "visibility": "public", "forks": 16, - "watchers": 76, + "watchers": 77, "score": 0, "subscribers_count": 5 }, @@ -2913,8 +2913,8 @@ "description": null, "fork": false, "created_at": "2025-01-07T00:25:12Z", - "updated_at": "2025-01-07T00:25:13Z", - "pushed_at": "2025-01-07T00:25:13Z", + "updated_at": "2025-01-07T04:02:47Z", + "pushed_at": "2025-01-07T04:02:44Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -2927,6 +2927,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2022/CVE-2022-21894.json b/2022/CVE-2022-21894.json index b78bfb3da1..adc3563329 100644 --- a/2022/CVE-2022-21894.json +++ b/2022/CVE-2022-21894.json @@ -36,7 +36,7 @@ "forks": 62, "watchers": 318, "score": 0, - "subscribers_count": 11 + "subscribers_count": 12 }, { "id": 526405651, diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index d2d55e1d12..61b5cb3a1b 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -792,10 +792,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2025-01-03T01:59:09Z", + "updated_at": "2025-01-07T00:45:39Z", "pushed_at": "2024-04-25T06:09:38Z", - "stargazers_count": 1362, - "watchers_count": 1362, + "stargazers_count": 1363, + "watchers_count": 1363, "has_discussions": false, "forks_count": 167, "allow_forking": true, @@ -811,7 +811,7 @@ ], "visibility": "public", "forks": 167, - "watchers": 1362, + "watchers": 1363, "score": 0, "subscribers_count": 15 } diff --git a/2022/CVE-2022-36804.json b/2022/CVE-2022-36804.json index 48a515e72d..ce42703592 100644 --- a/2022/CVE-2022-36804.json +++ b/2022/CVE-2022-36804.json @@ -14,10 +14,10 @@ "description": "A real exploit for BitBucket RCE CVE-2022-36804", "fork": false, "created_at": "2022-09-07T09:35:49Z", - "updated_at": "2024-08-31T01:26:38Z", + "updated_at": "2025-01-07T04:36:44Z", "pushed_at": "2024-08-31T01:26:35Z", - "stargazers_count": 35, - "watchers_count": 35, + "stargazers_count": 36, + "watchers_count": 36, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 35, + "watchers": 36, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-40494.json b/2022/CVE-2022-40494.json index b2fd0e4444..687a653bda 100644 --- a/2022/CVE-2022-40494.json +++ b/2022/CVE-2022-40494.json @@ -14,10 +14,10 @@ "description": "nps认证绕过利用工具,CVE-2022-40494,使用此工具可在浏览器访问web控制端后台页面,或者批量获取socks5和http代理", "fork": false, "created_at": "2022-08-04T08:22:41Z", - "updated_at": "2024-12-06T08:46:32Z", + "updated_at": "2025-01-07T00:57:14Z", "pushed_at": "2022-08-19T09:04:09Z", - "stargazers_count": 300, - "watchers_count": 300, + "stargazers_count": 301, + "watchers_count": 301, "has_discussions": false, "forks_count": 39, "allow_forking": true, @@ -34,7 +34,7 @@ ], "visibility": "public", "forks": 39, - "watchers": 300, + "watchers": 301, "score": 0, "subscribers_count": 6 } diff --git a/2022/CVE-2022-46689.json b/2022/CVE-2022-46689.json index 9ed7183fa1..d7588e10cd 100644 --- a/2022/CVE-2022-46689.json +++ b/2022/CVE-2022-46689.json @@ -107,10 +107,10 @@ "description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.", "fork": false, "created_at": "2022-12-26T06:56:35Z", - "updated_at": "2025-01-05T04:29:40Z", + "updated_at": "2025-01-07T04:01:26Z", "pushed_at": "2023-08-02T09:35:14Z", - "stargazers_count": 884, - "watchers_count": 884, + "stargazers_count": 883, + "watchers_count": 883, "has_discussions": false, "forks_count": 72, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 72, - "watchers": 884, + "watchers": 883, "score": 0, "subscribers_count": 25 }, diff --git a/2023/CVE-2023-20126.json b/2023/CVE-2023-20126.json index 1000ad2e10..889b46a9d6 100644 --- a/2023/CVE-2023-20126.json +++ b/2023/CVE-2023-20126.json @@ -14,10 +14,10 @@ "description": "PoC for CVE-2023-20126", "fork": false, "created_at": "2023-05-17T08:59:40Z", - "updated_at": "2024-12-17T09:03:53Z", + "updated_at": "2025-01-07T03:24:58Z", "pushed_at": "2023-06-20T12:45:45Z", - "stargazers_count": 21, - "watchers_count": 21, + "stargazers_count": 22, + "watchers_count": 22, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 21, + "watchers": 22, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-41425.json b/2023/CVE-2023-41425.json index f6d8aab092..322d13181a 100644 --- a/2023/CVE-2023-41425.json +++ b/2023/CVE-2023-41425.json @@ -413,6 +413,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index 17484f7072..29124699b4 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -14,10 +14,10 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2025-01-06T23:35:29Z", + "updated_at": "2025-01-07T01:50:04Z", "pushed_at": "2024-08-18T08:26:46Z", - "stargazers_count": 1364, - "watchers_count": 1364, + "stargazers_count": 1365, + "watchers_count": 1365, "has_discussions": false, "forks_count": 230, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 230, - "watchers": 1364, + "watchers": 1365, "score": 0, "subscribers_count": 21 }, diff --git a/2023/CVE-2023-51385.json b/2023/CVE-2023-51385.json index 10566fa729..0671dbb085 100644 --- a/2023/CVE-2023-51385.json +++ b/2023/CVE-2023-51385.json @@ -648,7 +648,7 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 }, { "id": 912613572, @@ -679,6 +679,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json index 45d12a263c..a95796ff26 100644 --- a/2024/CVE-2024-0044.json +++ b/2024/CVE-2024-0044.json @@ -45,19 +45,19 @@ "description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13", "fork": false, "created_at": "2024-06-18T12:30:53Z", - "updated_at": "2025-01-06T23:24:13Z", + "updated_at": "2025-01-07T03:25:37Z", "pushed_at": "2024-12-02T06:29:52Z", - "stargazers_count": 270, - "watchers_count": 270, + "stargazers_count": 273, + "watchers_count": 273, "has_discussions": false, - "forks_count": 62, + "forks_count": 63, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 62, - "watchers": 270, + "forks": 63, + "watchers": 273, "score": 0, "subscribers_count": 7 }, diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index 8f31df17a9..da7ac4522c 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -206,10 +206,10 @@ "description": null, "fork": false, "created_at": "2024-12-16T17:33:13Z", - "updated_at": "2025-01-03T10:51:35Z", + "updated_at": "2025-01-07T06:11:20Z", "pushed_at": "2024-12-16T17:38:23Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -218,7 +218,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 10, + "watchers": 11, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-23692.json b/2024/CVE-2024-23692.json index f95c4e4f6e..12bc3c465a 100644 --- a/2024/CVE-2024-23692.json +++ b/2024/CVE-2024-23692.json @@ -293,7 +293,7 @@ "description": "POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692 ", "fork": false, "created_at": "2024-09-15T12:15:35Z", - "updated_at": "2024-12-30T21:06:51Z", + "updated_at": "2025-01-07T03:06:59Z", "pushed_at": "2024-11-26T14:45:12Z", "stargazers_count": 35, "watchers_count": 35, diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index eee54315bc..8f7ce98aa3 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -14,10 +14,10 @@ "description": "Information for CVE-2024-3094", "fork": false, "created_at": "2024-03-29T17:03:01Z", - "updated_at": "2024-05-14T12:14:53Z", + "updated_at": "2025-01-07T05:03:30Z", "pushed_at": "2024-04-01T16:01:34Z", - "stargazers_count": 51, - "watchers_count": 51, + "stargazers_count": 52, + "watchers_count": 52, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 10, - "watchers": 51, + "watchers": 52, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-3393.json b/2024/CVE-2024-3393.json index de16f375a9..b06921163c 100644 --- a/2024/CVE-2024-3393.json +++ b/2024/CVE-2024-3393.json @@ -14,10 +14,10 @@ "description": " CVE-2024-3393 EXPLOIT", "fork": false, "created_at": "2025-01-04T08:18:06Z", - "updated_at": "2025-01-04T08:19:40Z", + "updated_at": "2025-01-07T04:28:29Z", "pushed_at": "2025-01-04T08:19:36Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-42327.json b/2024/CVE-2024-42327.json index 6629834091..865d7868ea 100644 --- a/2024/CVE-2024-42327.json +++ b/2024/CVE-2024-42327.json @@ -200,10 +200,10 @@ "description": "Zabbix CVE-2024-42327 PoC", "fork": false, "created_at": "2025-01-01T18:25:44Z", - "updated_at": "2025-01-06T12:48:46Z", + "updated_at": "2025-01-07T05:43:42Z", "pushed_at": "2025-01-03T13:49:03Z", - "stargazers_count": 21, - "watchers_count": 21, + "stargazers_count": 25, + "watchers_count": 25, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -212,7 +212,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 21, + "watchers": 25, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-47575.json b/2024/CVE-2024-47575.json index 9134f14138..588cd893fb 100644 --- a/2024/CVE-2024-47575.json +++ b/2024/CVE-2024-47575.json @@ -19,13 +19,13 @@ "stargazers_count": 78, "watchers_count": 78, "has_discussions": false, - "forks_count": 22, + "forks_count": 23, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 22, + "forks": 23, "watchers": 78, "score": 0, "subscribers_count": 0 diff --git a/2024/CVE-2024-49113.json b/2024/CVE-2024-49113.json index d0915f6bd7..aa15340ba0 100644 --- a/2024/CVE-2024-49113.json +++ b/2024/CVE-2024-49113.json @@ -14,10 +14,10 @@ "description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113", "fork": false, "created_at": "2025-01-01T15:48:38Z", - "updated_at": "2025-01-06T21:56:41Z", + "updated_at": "2025-01-07T04:29:05Z", "pushed_at": "2025-01-02T16:07:23Z", - "stargazers_count": 366, - "watchers_count": 366, + "stargazers_count": 376, + "watchers_count": 376, "has_discussions": false, "forks_count": 86, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 86, - "watchers": 366, + "watchers": 376, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-53522.json b/2024/CVE-2024-53522.json index 19138f91be..2ba98d37ed 100644 --- a/2024/CVE-2024-53522.json +++ b/2024/CVE-2024-53522.json @@ -14,10 +14,10 @@ "description": "PoC for CVE-2024-53522 affecting HOSxP XE 4", "fork": false, "created_at": "2025-01-02T04:13:37Z", - "updated_at": "2025-01-03T09:43:10Z", + "updated_at": "2025-01-07T01:12:03Z", "pushed_at": "2025-01-02T04:16:41Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-56145.json b/2024/CVE-2024-56145.json index 0aee28eb13..54d463e656 100644 --- a/2024/CVE-2024-56145.json +++ b/2024/CVE-2024-56145.json @@ -14,10 +14,10 @@ "description": "Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled", "fork": false, "created_at": "2024-12-20T03:34:01Z", - "updated_at": "2025-01-06T08:44:09Z", + "updated_at": "2025-01-07T01:48:31Z", "pushed_at": "2024-12-23T12:51:54Z", - "stargazers_count": 35, - "watchers_count": 35, + "stargazers_count": 36, + "watchers_count": 36, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 35, + "watchers": 36, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index 441585ea01..11c2c8f5d0 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -14,10 +14,10 @@ "description": "a signal handler race condition in OpenSSH's server (sshd)", "fork": false, "created_at": "2024-07-01T10:55:29Z", - "updated_at": "2025-01-03T06:37:29Z", + "updated_at": "2025-01-07T04:25:05Z", "pushed_at": "2024-07-01T10:54:02Z", - "stargazers_count": 472, - "watchers_count": 472, + "stargazers_count": 473, + "watchers_count": 473, "has_discussions": false, "forks_count": 182, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 182, - "watchers": 472, + "watchers": 473, "score": 0, "subscribers_count": 5 }, @@ -2180,10 +2180,10 @@ "description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)", "fork": false, "created_at": "2024-07-08T11:27:49Z", - "updated_at": "2025-01-06T19:43:51Z", + "updated_at": "2025-01-07T05:39:18Z", "pushed_at": "2024-08-22T08:50:25Z", - "stargazers_count": 65, - "watchers_count": 65, + "stargazers_count": 67, + "watchers_count": 67, "has_discussions": false, "forks_count": 29, "allow_forking": true, @@ -2192,7 +2192,7 @@ "topics": [], "visibility": "public", "forks": 29, - "watchers": 65, + "watchers": 67, "score": 0, "subscribers_count": 3 }, @@ -2936,13 +2936,13 @@ "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 3, "score": 0, "subscribers_count": 1