From 810e4fd85a32b1f3e039e6415d687958d7ed8634 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sun, 24 Jul 2022 15:16:02 +0900 Subject: [PATCH] Auto Update 2022/07/24 06:16:02 --- 2009/CVE-2009-0689.json | 8 ++++---- 2014/CVE-2014-4210.json | 8 ++++---- 2016/CVE-2016-0638.json | 8 ++++---- 2017/CVE-2017-3248.json | 8 ++++---- 2018/CVE-2018-2628.json | 8 ++++---- 2019/CVE-2019-17558.json | 8 ++++---- 2019/CVE-2019-2618.json | 8 ++++---- 2019/CVE-2019-2888.json | 8 ++++---- 2020/CVE-2020-14882.json | 8 ++++---- 2020/CVE-2020-2551.json | 16 ++++++++-------- 2021/CVE-2021-21972.json | 8 ++++---- 2021/CVE-2021-26119.json | 8 ++++---- 2021/CVE-2021-31805.json | 4 ++-- 2021/CVE-2021-42008.json | 4 ++-- 2021/CVE-2021-42237.json | 8 ++++---- 2022/CVE-2022-0848.json | 8 ++++---- 2022/CVE-2022-21660.json | 8 ++++---- 2022/CVE-2022-21999.json | 8 ++++---- 2022/CVE-2022-26134.json | 14 +++++++------- 2022/CVE-2022-29455.json | 8 ++++---- 2022/CVE-2022-32119.json | 8 ++++---- 2022/CVE-2022-34918.json | 12 ++++++------ 22 files changed, 93 insertions(+), 93 deletions(-) diff --git a/2009/CVE-2009-0689.json b/2009/CVE-2009-0689.json index e8137ea228..1a95f8fdb4 100644 --- a/2009/CVE-2009-0689.json +++ b/2009/CVE-2009-0689.json @@ -13,10 +13,10 @@ "description": "An implementation of CVE-2009-0689 for the Nintendo Wii.", "fork": false, "created_at": "2018-12-18T04:24:43Z", - "updated_at": "2022-06-26T03:24:13Z", + "updated_at": "2022-07-24T01:48:44Z", "pushed_at": "2019-09-30T23:38:11Z", - "stargazers_count": 45, - "watchers_count": 45, + "stargazers_count": 46, + "watchers_count": 46, "forks_count": 11, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 45, + "watchers": 46, "score": 0 } ] \ No newline at end of file diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index c045205d9d..a76f868807 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -41,10 +41,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-07-22T18:59:56Z", + "updated_at": "2022-07-24T05:03:34Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1435, - "watchers_count": 1435, + "stargazers_count": 1437, + "watchers_count": 1437, "forks_count": 300, "allow_forking": true, "is_template": false, @@ -73,7 +73,7 @@ ], "visibility": "public", "forks": 300, - "watchers": 1435, + "watchers": 1437, "score": 0 }, { diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 4c901a9a4a..e6571bc0a9 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-07-22T18:59:56Z", + "updated_at": "2022-07-24T05:03:34Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1435, - "watchers_count": 1435, + "stargazers_count": 1437, + "watchers_count": 1437, "forks_count": 300, "allow_forking": true, "is_template": false, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 300, - "watchers": 1435, + "watchers": 1437, "score": 0 }, { diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index c513cbe832..fcd654c6eb 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -41,10 +41,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-07-22T18:59:56Z", + "updated_at": "2022-07-24T05:03:34Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1435, - "watchers_count": 1435, + "stargazers_count": 1437, + "watchers_count": 1437, "forks_count": 300, "allow_forking": true, "is_template": false, @@ -73,7 +73,7 @@ ], "visibility": "public", "forks": 300, - "watchers": 1435, + "watchers": 1437, "score": 0 }, { diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 7cae7312fe..94311b5340 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -549,10 +549,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-07-22T18:59:56Z", + "updated_at": "2022-07-24T05:03:34Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1435, - "watchers_count": 1435, + "stargazers_count": 1437, + "watchers_count": 1437, "forks_count": 300, "allow_forking": true, "is_template": false, @@ -581,7 +581,7 @@ ], "visibility": "public", "forks": 300, - "watchers": 1435, + "watchers": 1437, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index f97aa5b27f..36f0387c64 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -41,10 +41,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2022-07-23T01:32:07Z", + "updated_at": "2022-07-24T02:43:29Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3440, - "watchers_count": 3440, + "stargazers_count": 3441, + "watchers_count": 3441, "forks_count": 1021, "allow_forking": true, "is_template": false, @@ -72,7 +72,7 @@ ], "visibility": "public", "forks": 1021, - "watchers": 3440, + "watchers": 3441, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 56f2f95e7d..2679f008af 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -181,10 +181,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-07-22T18:59:56Z", + "updated_at": "2022-07-24T05:03:34Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1435, - "watchers_count": 1435, + "stargazers_count": 1437, + "watchers_count": 1437, "forks_count": 300, "allow_forking": true, "is_template": false, @@ -213,7 +213,7 @@ ], "visibility": "public", "forks": 300, - "watchers": 1435, + "watchers": 1437, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-2888.json b/2019/CVE-2019-2888.json index 33dbac54f4..cc4d7c6350 100644 --- a/2019/CVE-2019-2888.json +++ b/2019/CVE-2019-2888.json @@ -13,10 +13,10 @@ "description": "WebLogic EJBTaglibDescriptor XXE漏洞(CVE-2019-2888)", "fork": false, "created_at": "2019-11-01T16:44:51Z", - "updated_at": "2022-06-11T02:44:59Z", + "updated_at": "2022-07-24T04:45:42Z", "pushed_at": "2019-11-02T10:47:46Z", - "stargazers_count": 52, - "watchers_count": 52, + "stargazers_count": 51, + "watchers_count": 51, "forks_count": 22, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 22, - "watchers": 52, + "watchers": 51, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 700485cb78..a5297e5ea5 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,10 +13,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2022-07-23T01:32:07Z", + "updated_at": "2022-07-24T02:43:29Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3440, - "watchers_count": 3440, + "stargazers_count": 3441, + "watchers_count": 3441, "forks_count": 1021, "allow_forking": true, "is_template": false, @@ -44,7 +44,7 @@ ], "visibility": "public", "forks": 1021, - "watchers": 3440, + "watchers": 3441, "score": 0 }, { diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 79ce6e4e30..0845b8dbb8 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2022-07-22T18:59:56Z", + "updated_at": "2022-07-24T05:03:34Z", "pushed_at": "2022-07-17T12:41:46Z", - "stargazers_count": 1435, - "watchers_count": 1435, + "stargazers_count": 1437, + "watchers_count": 1437, "forks_count": 300, "allow_forking": true, "is_template": false, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 300, - "watchers": 1435, + "watchers": 1437, "score": 0 }, { @@ -90,10 +90,10 @@ "description": "how detect CVE-2020-2551 poc exploit python Weblogic RCE with IIOP", "fork": false, "created_at": "2020-01-19T13:01:32Z", - "updated_at": "2022-07-20T12:33:08Z", + "updated_at": "2022-07-24T05:35:06Z", "pushed_at": "2021-12-18T20:52:39Z", - "stargazers_count": 188, - "watchers_count": 188, + "stargazers_count": 189, + "watchers_count": 189, "forks_count": 45, "allow_forking": true, "is_template": false, @@ -101,7 +101,7 @@ "topics": [], "visibility": "public", "forks": 45, - "watchers": 188, + "watchers": 189, "score": 0 }, { diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 4267827202..2b82078309 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -144,10 +144,10 @@ "description": "Proof of Concept Exploit for vCenter CVE-2021-21972", "fork": false, "created_at": "2021-02-24T16:31:34Z", - "updated_at": "2022-06-19T09:03:00Z", + "updated_at": "2022-07-24T06:00:22Z", "pushed_at": "2021-02-25T16:05:02Z", - "stargazers_count": 191, - "watchers_count": 191, + "stargazers_count": 192, + "watchers_count": 192, "forks_count": 73, "allow_forking": true, "is_template": false, @@ -155,7 +155,7 @@ "topics": [], "visibility": "public", "forks": 73, - "watchers": 191, + "watchers": 192, "score": 0 }, { diff --git a/2021/CVE-2021-26119.json b/2021/CVE-2021-26119.json index ddcd6291e1..609457d5a5 100644 --- a/2021/CVE-2021-26119.json +++ b/2021/CVE-2021-26119.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2021-02-28T14:05:23Z", - "updated_at": "2021-12-17T03:31:57Z", + "updated_at": "2022-07-24T04:45:45Z", "pushed_at": "2021-02-28T14:25:25Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 6, + "watchers": 5, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-31805.json b/2021/CVE-2021-31805.json index 214162ccd2..38af9e3ebb 100644 --- a/2021/CVE-2021-31805.json +++ b/2021/CVE-2021-31805.json @@ -185,13 +185,13 @@ "pushed_at": "2022-07-23T15:31:30Z", "stargazers_count": 1, "watchers_count": 1, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 1, "score": 0 } diff --git a/2021/CVE-2021-42008.json b/2021/CVE-2021-42008.json index b13471b6f4..8448015db1 100644 --- a/2021/CVE-2021-42008.json +++ b/2021/CVE-2021-42008.json @@ -17,13 +17,13 @@ "pushed_at": "2022-05-01T15:02:44Z", "stargazers_count": 24, "watchers_count": 24, - "forks_count": 6, + "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 6, + "forks": 7, "watchers": 24, "score": 0 } diff --git a/2021/CVE-2021-42237.json b/2021/CVE-2021-42237.json index 87efa337d7..e9abb381ad 100644 --- a/2021/CVE-2021-42237.json +++ b/2021/CVE-2021-42237.json @@ -13,10 +13,10 @@ "description": "An exploit\/PoC for CVE-2021-42237", "fork": false, "created_at": "2022-01-16T05:22:30Z", - "updated_at": "2022-04-13T02:25:12Z", + "updated_at": "2022-07-24T04:45:47Z", "pushed_at": "2022-01-16T05:40:17Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 6, + "watchers": 5, "score": 0 }, { diff --git a/2022/CVE-2022-0848.json b/2022/CVE-2022-0848.json index aae1fd1e97..aabb5e58c2 100644 --- a/2022/CVE-2022-0848.json +++ b/2022/CVE-2022-0848.json @@ -41,10 +41,10 @@ "description": null, "fork": false, "created_at": "2022-07-15T06:28:21Z", - "updated_at": "2022-07-15T08:10:33Z", + "updated_at": "2022-07-24T05:33:31Z", "pushed_at": "2022-07-15T06:29:58Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -52,7 +52,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 2, + "watchers": 3, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-21660.json b/2022/CVE-2022-21660.json index 19f0ac8e7d..c36acc089c 100644 --- a/2022/CVE-2022-21660.json +++ b/2022/CVE-2022-21660.json @@ -13,10 +13,10 @@ "description": "CVE-2022-21660", "fork": false, "created_at": "2022-01-10T05:50:35Z", - "updated_at": "2022-07-22T15:21:12Z", + "updated_at": "2022-07-24T05:20:50Z", "pushed_at": "2022-01-10T05:52:03Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 26, + "watchers_count": 26, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 25, + "watchers": 26, "score": 0 }, { diff --git a/2022/CVE-2022-21999.json b/2022/CVE-2022-21999.json index f3ad0528ce..e2db7ce582 100644 --- a/2022/CVE-2022-21999.json +++ b/2022/CVE-2022-21999.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)", "fork": false, "created_at": "2022-02-08T17:25:44Z", - "updated_at": "2022-07-18T01:10:38Z", + "updated_at": "2022-07-24T02:21:36Z", "pushed_at": "2022-02-09T16:54:09Z", - "stargazers_count": 618, - "watchers_count": 618, + "stargazers_count": 619, + "watchers_count": 619, "forks_count": 125, "allow_forking": true, "is_template": false, @@ -27,7 +27,7 @@ ], "visibility": "public", "forks": 125, - "watchers": 618, + "watchers": 619, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index 14132ffcca..bb448042cb 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -13,11 +13,11 @@ "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。", "fork": false, "created_at": "2022-05-31T07:44:01Z", - "updated_at": "2022-07-24T00:13:58Z", + "updated_at": "2022-07-24T05:22:58Z", "pushed_at": "2022-07-20T12:42:06Z", - "stargazers_count": 495, - "watchers_count": 495, - "forks_count": 84, + "stargazers_count": 501, + "watchers_count": 501, + "forks_count": 86, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -43,8 +43,8 @@ "gui" ], "visibility": "public", - "forks": 84, - "watchers": 495, + "forks": 86, + "watchers": 501, "score": 0 }, { @@ -816,7 +816,7 @@ "fork": false, "created_at": "2022-06-07T11:17:25Z", "updated_at": "2022-06-30T06:00:56Z", - "pushed_at": "2022-07-23T11:00:08Z", + "pushed_at": "2022-07-24T06:12:44Z", "stargazers_count": 4, "watchers_count": 4, "forks_count": 1, diff --git a/2022/CVE-2022-29455.json b/2022/CVE-2022-29455.json index ec50036d38..5833c1ff3e 100644 --- a/2022/CVE-2022-29455.json +++ b/2022/CVE-2022-29455.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2022-06-25T20:57:55Z", - "updated_at": "2022-07-05T15:25:09Z", + "updated_at": "2022-07-24T05:33:26Z", "pushed_at": "2022-07-05T15:25:06Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 }, { diff --git a/2022/CVE-2022-32119.json b/2022/CVE-2022-32119.json index 31a2e92c52..821b7f5c2d 100644 --- a/2022/CVE-2022-32119.json +++ b/2022/CVE-2022-32119.json @@ -13,10 +13,10 @@ "description": "CVE-2022-32119 - Arox-Unrestricted-File-Upload", "fork": false, "created_at": "2022-04-06T04:33:47Z", - "updated_at": "2022-07-22T21:40:25Z", + "updated_at": "2022-07-24T05:33:36Z", "pushed_at": "2022-07-15T02:34:02Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 17, + "watchers_count": 17, "forks_count": 6, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 16, + "watchers": 17, "score": 0 }, { diff --git a/2022/CVE-2022-34918.json b/2022/CVE-2022-34918.json index 24e40f44d2..c523531cef 100644 --- a/2022/CVE-2022-34918.json +++ b/2022/CVE-2022-34918.json @@ -13,18 +13,18 @@ "description": null, "fork": false, "created_at": "2022-07-19T12:46:45Z", - "updated_at": "2022-07-23T21:50:39Z", + "updated_at": "2022-07-24T04:47:26Z", "pushed_at": "2022-07-20T08:00:18Z", - "stargazers_count": 130, - "watchers_count": 130, - "forks_count": 16, + "stargazers_count": 139, + "watchers_count": 139, + "forks_count": 18, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 16, - "watchers": 130, + "forks": 18, + "watchers": 139, "score": 0 }, {