diff --git a/2008/CVE-2008-0166.json b/2008/CVE-2008-0166.json index 201663a9c2..6d22fc758a 100644 --- a/2008/CVE-2008-0166.json +++ b/2008/CVE-2008-0166.json @@ -13,10 +13,10 @@ "description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)", "fork": false, "created_at": "2013-09-22T21:20:31Z", - "updated_at": "2022-08-11T14:34:45Z", + "updated_at": "2022-08-17T01:25:39Z", "pushed_at": "2017-04-24T14:16:56Z", - "stargazers_count": 342, - "watchers_count": 342, + "stargazers_count": 343, + "watchers_count": 343, "forks_count": 108, "allow_forking": true, "is_template": false, @@ -26,7 +26,7 @@ ], "visibility": "public", "forks": 108, - "watchers": 342, + "watchers": 343, "score": 0 }, { diff --git a/2017/CVE-2017-0785.json b/2017/CVE-2017-0785.json index 7ea3bd41f8..3ec34736be 100644 --- a/2017/CVE-2017-0785.json +++ b/2017/CVE-2017-0785.json @@ -74,10 +74,10 @@ "description": "CVE-2017-0785 BlueBorne PoC", "fork": false, "created_at": "2017-09-22T22:03:40Z", - "updated_at": "2022-08-05T07:06:13Z", + "updated_at": "2022-08-17T01:19:18Z", "pushed_at": "2017-09-22T22:23:52Z", - "stargazers_count": 30, - "watchers_count": 30, + "stargazers_count": 31, + "watchers_count": 31, "forks_count": 16, "allow_forking": true, "is_template": false, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 16, - "watchers": 30, + "watchers": 31, "score": 0 }, { diff --git a/2017/CVE-2017-10271.json b/2017/CVE-2017-10271.json index e819ed58d2..fc42bd968e 100644 --- a/2017/CVE-2017-10271.json +++ b/2017/CVE-2017-10271.json @@ -672,13 +672,13 @@ "pushed_at": "2019-04-25T12:44:02Z", "stargazers_count": 117, "watchers_count": 117, - "forks_count": 53, + "forks_count": 54, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 53, + "forks": 54, "watchers": 117, "score": 0 }, diff --git a/2017/CVE-2017-3881.json b/2017/CVE-2017-3881.json index 38a3727989..146eccfbd8 100644 --- a/2017/CVE-2017-3881.json +++ b/2017/CVE-2017-3881.json @@ -13,18 +13,18 @@ "description": "CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC", "fork": false, "created_at": "2017-04-10T03:44:04Z", - "updated_at": "2022-07-27T07:07:46Z", + "updated_at": "2022-08-17T05:15:29Z", "pushed_at": "2017-04-12T09:17:27Z", - "stargazers_count": 191, - "watchers_count": 191, - "forks_count": 81, + "stargazers_count": 192, + "watchers_count": 192, + "forks_count": 82, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 81, - "watchers": 191, + "forks": 82, + "watchers": 192, "score": 0 }, { diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index ce66ee7e65..914c73bbb3 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1770,13 +1770,13 @@ "pushed_at": "2021-12-02T12:00:46Z", "stargazers_count": 1113, "watchers_count": 1113, - "forks_count": 356, + "forks_count": 355, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 356, + "forks": 355, "watchers": 1113, "score": 0 }, diff --git a/2019/CVE-2019-11510.json b/2019/CVE-2019-11510.json index c9a2a6726d..cb8207d227 100644 --- a/2019/CVE-2019-11510.json +++ b/2019/CVE-2019-11510.json @@ -13,10 +13,10 @@ "description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)", "fork": false, "created_at": "2019-08-21T08:40:26Z", - "updated_at": "2022-08-02T19:52:38Z", + "updated_at": "2022-08-17T05:58:09Z", "pushed_at": "2020-01-11T13:55:33Z", - "stargazers_count": 354, - "watchers_count": 354, + "stargazers_count": 355, + "watchers_count": 355, "forks_count": 142, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 142, - "watchers": 354, + "watchers": 355, "score": 0 }, { diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 08c9f9125b..648df16b7a 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -41,11 +41,11 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2022-08-16T09:41:49Z", + "updated_at": "2022-08-17T03:26:00Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3485, - "watchers_count": 3485, - "forks_count": 1028, + "stargazers_count": 3487, + "watchers_count": 3487, + "forks_count": 1029, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -71,8 +71,8 @@ "webshell" ], "visibility": "public", - "forks": 1028, - "watchers": 3485, + "forks": 1029, + "watchers": 3487, "score": 0 }, { diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 8d2093f52c..1d9841d62f 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -97,10 +97,10 @@ "description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持", "fork": false, "created_at": "2019-06-21T09:22:43Z", - "updated_at": "2022-08-16T12:14:17Z", + "updated_at": "2022-08-17T01:06:32Z", "pushed_at": "2020-04-26T10:49:25Z", - "stargazers_count": 824, - "watchers_count": 824, + "stargazers_count": 825, + "watchers_count": 825, "forks_count": 172, "allow_forking": true, "is_template": false, @@ -108,7 +108,7 @@ "topics": [], "visibility": "public", "forks": 172, - "watchers": 824, + "watchers": 825, "score": 0 }, { diff --git a/2020/CVE-2020-11022.json b/2020/CVE-2020-11022.json index 55ee1ffcbf..0b36b228f1 100644 --- a/2020/CVE-2020-11022.json +++ b/2020/CVE-2020-11022.json @@ -13,10 +13,10 @@ "description": "Little thing put together quickly to demonstrate this CVE ", "fork": false, "created_at": "2021-10-16T01:10:33Z", - "updated_at": "2022-08-15T19:14:39Z", + "updated_at": "2022-08-17T02:18:26Z", "pushed_at": "2021-10-19T10:50:09Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 5, "score": 0 }, { diff --git a/2020/CVE-2020-1350.json b/2020/CVE-2020-1350.json index 287dcec336..a0f424c55a 100644 --- a/2020/CVE-2020-1350.json +++ b/2020/CVE-2020-1350.json @@ -62,7 +62,7 @@ "pushed_at": "2021-06-10T02:46:52Z", "stargazers_count": 272, "watchers_count": 272, - "forks_count": 78, + "forks_count": 77, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -71,7 +71,7 @@ "sigred" ], "visibility": "public", - "forks": 78, + "forks": 77, "watchers": 272, "score": 0 }, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 871143adfa..2863f3fa04 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,11 +13,11 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2022-08-16T09:41:49Z", + "updated_at": "2022-08-17T03:26:00Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3485, - "watchers_count": 3485, - "forks_count": 1028, + "stargazers_count": 3487, + "watchers_count": 3487, + "forks_count": 1029, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -43,8 +43,8 @@ "webshell" ], "visibility": "public", - "forks": 1028, - "watchers": 3485, + "forks": 1029, + "watchers": 3487, "score": 0 }, { @@ -369,10 +369,10 @@ "description": "CVE-2020-14882\/14883\/14750", "fork": false, "created_at": "2020-11-04T03:09:13Z", - "updated_at": "2022-04-28T08:45:52Z", + "updated_at": "2022-08-17T04:51:16Z", "pushed_at": "2020-11-04T03:15:33Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 17, + "watchers_count": 17, "forks_count": 10, "allow_forking": true, "is_template": false, @@ -380,7 +380,7 @@ "topics": [], "visibility": "public", "forks": 10, - "watchers": 16, + "watchers": 17, "score": 0 }, { diff --git a/2020/CVE-2020-4464.json b/2020/CVE-2020-4464.json index 374457b1e1..372532cf47 100644 --- a/2020/CVE-2020-4464.json +++ b/2020/CVE-2020-4464.json @@ -42,7 +42,7 @@ "fork": false, "created_at": "2022-05-18T02:02:51Z", "updated_at": "2022-08-15T13:19:09Z", - "pushed_at": "2022-08-15T13:32:39Z", + "pushed_at": "2022-08-17T05:12:14Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2021/CVE-2021-3493.json b/2021/CVE-2021-3493.json index bddbb35dc9..a55475a949 100644 --- a/2021/CVE-2021-3493.json +++ b/2021/CVE-2021-3493.json @@ -45,13 +45,13 @@ "pushed_at": "2021-04-22T02:06:31Z", "stargazers_count": 2, "watchers_count": 2, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 2, "score": 0 }, diff --git a/2021/CVE-2021-3560.json b/2021/CVE-2021-3560.json index 15694cfc53..4d93ba1773 100644 --- a/2021/CVE-2021-3560.json +++ b/2021/CVE-2021-3560.json @@ -134,10 +134,10 @@ "description": null, "fork": false, "created_at": "2021-06-14T20:08:20Z", - "updated_at": "2022-08-04T07:51:51Z", + "updated_at": "2022-08-17T04:28:02Z", "pushed_at": "2022-02-11T15:22:20Z", - "stargazers_count": 69, - "watchers_count": 69, + "stargazers_count": 68, + "watchers_count": 68, "forks_count": 33, "allow_forking": true, "is_template": false, @@ -145,7 +145,7 @@ "topics": [], "visibility": "public", "forks": 33, - "watchers": 69, + "watchers": 68, "score": 0 }, { diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index 89e0904cb3..951d102f19 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -1137,10 +1137,10 @@ "description": null, "fork": false, "created_at": "2022-01-26T16:43:18Z", - "updated_at": "2022-08-05T06:38:42Z", + "updated_at": "2022-08-17T03:46:32Z", "pushed_at": "2022-01-26T16:51:02Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "forks_count": 3, "allow_forking": true, "is_template": false, @@ -1148,7 +1148,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 12, + "watchers": 13, "score": 0 }, { diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index 28d63e85db..d468943899 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -17,13 +17,13 @@ "pushed_at": "2021-12-25T18:31:02Z", "stargazers_count": 1435, "watchers_count": 1435, - "forks_count": 477, + "forks_count": 478, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 477, + "forks": 478, "watchers": 1435, "score": 0 }, diff --git a/2021/CVE-2021-40449.json b/2021/CVE-2021-40449.json index cec951763f..bb86eb4fea 100644 --- a/2021/CVE-2021-40449.json +++ b/2021/CVE-2021-40449.json @@ -41,10 +41,10 @@ "description": "Using CVE-2021-40449 to manual map kernel mode driver", "fork": false, "created_at": "2022-03-04T17:55:52Z", - "updated_at": "2022-08-05T18:32:10Z", + "updated_at": "2022-08-17T01:16:25Z", "pushed_at": "2022-03-05T18:34:25Z", - "stargazers_count": 44, - "watchers_count": 44, + "stargazers_count": 45, + "watchers_count": 45, "forks_count": 24, "allow_forking": true, "is_template": false, @@ -52,7 +52,7 @@ "topics": [], "visibility": "public", "forks": 24, - "watchers": 44, + "watchers": 45, "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 36b847d7c3..88c7555057 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -13,10 +13,10 @@ "description": "CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.", "fork": false, "created_at": "2021-10-05T16:13:38Z", - "updated_at": "2022-07-30T20:35:48Z", + "updated_at": "2022-08-17T04:57:04Z", "pushed_at": "2022-03-10T14:02:09Z", - "stargazers_count": 40, - "watchers_count": 40, + "stargazers_count": 41, + "watchers_count": 41, "forks_count": 13, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 13, - "watchers": 40, + "watchers": 41, "score": 0 }, { diff --git a/2021/CVE-2021-43908.json b/2021/CVE-2021-43908.json index 5aafe05122..2fb9f7c89d 100644 --- a/2021/CVE-2021-43908.json +++ b/2021/CVE-2021-43908.json @@ -17,13 +17,13 @@ "pushed_at": "2022-08-14T12:01:31Z", "stargazers_count": 5, "watchers_count": 5, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, + "forks": 4, "watchers": 5, "score": 0 } diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index b0d1b7e439..c740c0421b 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -517,10 +517,10 @@ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2022-08-15T16:41:17Z", + "updated_at": "2022-08-17T04:57:18Z", "pushed_at": "2022-03-20T16:33:49Z", - "stargazers_count": 1445, - "watchers_count": 1445, + "stargazers_count": 1446, + "watchers_count": 1446, "forks_count": 403, "allow_forking": true, "is_template": false, @@ -533,7 +533,7 @@ ], "visibility": "public", "forks": 403, - "watchers": 1445, + "watchers": 1446, "score": 0 }, { @@ -647,10 +647,10 @@ "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "fork": false, "created_at": "2021-12-11T07:19:11Z", - "updated_at": "2022-08-16T04:45:39Z", + "updated_at": "2022-08-17T04:36:39Z", "pushed_at": "2022-06-02T02:16:13Z", - "stargazers_count": 487, - "watchers_count": 487, + "stargazers_count": 488, + "watchers_count": 488, "forks_count": 96, "allow_forking": true, "is_template": false, @@ -663,7 +663,7 @@ ], "visibility": "public", "forks": 96, - "watchers": 487, + "watchers": 488, "score": 0 }, { @@ -1119,10 +1119,10 @@ "description": "Script to apply official workaround for VMware vCenter log4j vulnerability CVE-2021-44228", "fork": false, "created_at": "2021-12-12T04:23:10Z", - "updated_at": "2022-08-11T16:26:49Z", + "updated_at": "2022-08-17T05:28:16Z", "pushed_at": "2021-12-15T12:17:19Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 16, + "watchers_count": 16, "forks_count": 7, "allow_forking": true, "is_template": false, @@ -1130,7 +1130,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 15, + "watchers": 16, "score": 0 }, { diff --git a/2021/CVE-2021-45232.json b/2021/CVE-2021-45232.json index 329e39abf6..cd8233d617 100644 --- a/2021/CVE-2021-45232.json +++ b/2021/CVE-2021-45232.json @@ -181,10 +181,10 @@ "description": null, "fork": false, "created_at": "2021-12-29T07:32:30Z", - "updated_at": "2022-07-25T03:49:09Z", + "updated_at": "2022-08-17T05:01:06Z", "pushed_at": "2021-12-31T08:30:33Z", - "stargazers_count": 71, - "watchers_count": 71, + "stargazers_count": 72, + "watchers_count": 72, "forks_count": 31, "allow_forking": true, "is_template": false, @@ -195,7 +195,7 @@ ], "visibility": "public", "forks": 31, - "watchers": 71, + "watchers": 72, "score": 0 }, { diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index 503ac828c2..dcb67d64b3 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -1135,10 +1135,10 @@ "description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.", "fork": false, "created_at": "2022-03-12T20:57:24Z", - "updated_at": "2022-08-16T07:41:44Z", + "updated_at": "2022-08-17T03:06:37Z", "pushed_at": "2022-06-13T19:33:08Z", - "stargazers_count": 295, - "watchers_count": 295, + "stargazers_count": 296, + "watchers_count": 296, "forks_count": 83, "allow_forking": true, "is_template": false, @@ -1146,7 +1146,7 @@ "topics": [], "visibility": "public", "forks": 83, - "watchers": 295, + "watchers": 296, "score": 0 }, { diff --git a/2022/CVE-2022-1388.json b/2022/CVE-2022-1388.json index a7a778eb7e..fb93b5a96d 100644 --- a/2022/CVE-2022-1388.json +++ b/2022/CVE-2022-1388.json @@ -321,10 +321,10 @@ "description": "POC for CVE-2022-1388", "fork": false, "created_at": "2022-05-09T11:46:45Z", - "updated_at": "2022-08-15T15:42:24Z", + "updated_at": "2022-08-17T05:00:35Z", "pushed_at": "2022-05-09T20:52:07Z", - "stargazers_count": 214, - "watchers_count": 214, + "stargazers_count": 215, + "watchers_count": 215, "forks_count": 36, "allow_forking": true, "is_template": false, @@ -332,7 +332,7 @@ "topics": [], "visibility": "public", "forks": 36, - "watchers": 214, + "watchers": 215, "score": 0 }, { diff --git a/2022/CVE-2022-1421.json b/2022/CVE-2022-1421.json index d39d7b944c..655bf548d6 100644 --- a/2022/CVE-2022-1421.json +++ b/2022/CVE-2022-1421.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2022-07-12T14:34:48Z", - "updated_at": "2022-07-28T10:14:20Z", + "updated_at": "2022-08-17T05:42:45Z", "pushed_at": "2022-08-10T04:52:16Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "forks_count": 2, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 4, + "watchers": 5, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-2022.json b/2022/CVE-2022-2022.json index 07029c390c..164bee0f0e 100644 --- a/2022/CVE-2022-2022.json +++ b/2022/CVE-2022-2022.json @@ -13,18 +13,18 @@ "description": "CVE-2022-2022", "fork": false, "created_at": "2021-11-22T12:57:22Z", - "updated_at": "2022-08-16T14:47:39Z", + "updated_at": "2022-08-17T03:56:10Z", "pushed_at": "2022-08-03T08:39:29Z", - "stargazers_count": 317, - "watchers_count": 317, - "forks_count": 137, + "stargazers_count": 320, + "watchers_count": 320, + "forks_count": 140, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 137, - "watchers": 317, + "forks": 140, + "watchers": 320, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-21907.json b/2022/CVE-2022-21907.json index 83d96b9492..4437ac41d4 100644 --- a/2022/CVE-2022-21907.json +++ b/2022/CVE-2022-21907.json @@ -149,7 +149,7 @@ "pushed_at": "2022-05-03T10:40:31Z", "stargazers_count": 67, "watchers_count": 67, - "forks_count": 14, + "forks_count": 15, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -162,7 +162,7 @@ "rce" ], "visibility": "public", - "forks": 14, + "forks": 15, "watchers": 67, "score": 0 }, diff --git a/2022/CVE-2022-21971.json b/2022/CVE-2022-21971.json index 1a39c0095f..5254a7f3ed 100644 --- a/2022/CVE-2022-21971.json +++ b/2022/CVE-2022-21971.json @@ -80,7 +80,7 @@ "pushed_at": "2022-05-22T13:21:06Z", "stargazers_count": 0, "watchers_count": 0, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -93,7 +93,7 @@ "rtf" ], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0 } diff --git a/2022/CVE-2022-22972.json b/2022/CVE-2022-22972.json index f1415da779..5528a198a4 100644 --- a/2022/CVE-2022-22972.json +++ b/2022/CVE-2022-22972.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2022-05-24T20:19:55Z", - "updated_at": "2022-08-10T23:44:21Z", + "updated_at": "2022-08-17T05:01:11Z", "pushed_at": "2022-05-26T16:07:18Z", - "stargazers_count": 134, - "watchers_count": 134, + "stargazers_count": 135, + "watchers_count": 135, "forks_count": 27, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 27, - "watchers": 134, + "watchers": 135, "score": 0 }, { diff --git a/2022/CVE-2022-24500.json b/2022/CVE-2022-24500.json index a34320f87c..7263c5ca90 100644 --- a/2022/CVE-2022-24500.json +++ b/2022/CVE-2022-24500.json @@ -47,10 +47,10 @@ "description": "CVE-2022-24500 Windows SMB Unauthenticated Remote Code Execution Vulnerability", "fork": false, "created_at": "2022-08-15T07:52:50Z", - "updated_at": "2022-08-15T07:53:37Z", + "updated_at": "2022-08-17T03:05:37Z", "pushed_at": "2022-08-15T07:54:17Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, @@ -58,7 +58,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-25636.json b/2022/CVE-2022-25636.json index be9598ff05..f8c929a6bf 100644 --- a/2022/CVE-2022-25636.json +++ b/2022/CVE-2022-25636.json @@ -13,10 +13,10 @@ "description": "CVE-2022-25636", "fork": false, "created_at": "2022-03-07T13:38:41Z", - "updated_at": "2022-08-16T16:26:02Z", + "updated_at": "2022-08-17T01:59:16Z", "pushed_at": "2022-03-07T17:18:19Z", - "stargazers_count": 394, - "watchers_count": 394, + "stargazers_count": 395, + "watchers_count": 395, "forks_count": 82, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 82, - "watchers": 394, + "watchers": 395, "score": 0 }, { diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index cb7ba45ad2..fe3223b85a 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -13,11 +13,11 @@ "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。", "fork": false, "created_at": "2022-05-31T07:44:01Z", - "updated_at": "2022-08-16T17:42:53Z", + "updated_at": "2022-08-17T03:23:23Z", "pushed_at": "2022-08-15T07:00:18Z", - "stargazers_count": 656, - "watchers_count": 656, - "forks_count": 124, + "stargazers_count": 658, + "watchers_count": 658, + "forks_count": 125, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -43,8 +43,8 @@ "gui" ], "visibility": "public", - "forks": 124, - "watchers": 656, + "forks": 125, + "watchers": 658, "score": 0 }, { diff --git a/2022/CVE-2022-26138.json b/2022/CVE-2022-26138.json index 99683ad126..daf4829bbc 100644 --- a/2022/CVE-2022-26138.json +++ b/2022/CVE-2022-26138.json @@ -103,10 +103,10 @@ "description": "Atlassian Confluence Server and Data Center: CVE-2022-26138", "fork": false, "created_at": "2022-07-28T09:48:21Z", - "updated_at": "2022-08-04T01:28:06Z", + "updated_at": "2022-08-17T04:56:27Z", "pushed_at": "2022-07-28T09:59:27Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -114,7 +114,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 2, + "watchers": 3, "score": 0 }, { diff --git a/2022/CVE-2022-26809.json b/2022/CVE-2022-26809.json index c3902a4def..2b2d9fdf7f 100644 --- a/2022/CVE-2022-26809.json +++ b/2022/CVE-2022-26809.json @@ -668,10 +668,10 @@ "description": "metasploit and python module for CVE-2022-26809 windows rpc rce via smb 445", "fork": false, "created_at": "2022-08-15T12:06:18Z", - "updated_at": "2022-08-16T15:50:49Z", + "updated_at": "2022-08-17T02:55:49Z", "pushed_at": "2022-08-15T12:08:42Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "forks_count": 1, "allow_forking": true, "is_template": false, @@ -679,7 +679,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 1, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-27255.json b/2022/CVE-2022-27255.json index f9fd106b36..e2e36a2a0c 100644 --- a/2022/CVE-2022-27255.json +++ b/2022/CVE-2022-27255.json @@ -13,18 +13,18 @@ "description": null, "fork": false, "created_at": "2022-07-06T17:29:04Z", - "updated_at": "2022-08-16T23:49:03Z", - "pushed_at": "2022-08-13T18:02:18Z", - "stargazers_count": 17, - "watchers_count": 17, - "forks_count": 4, + "updated_at": "2022-08-17T06:15:35Z", + "pushed_at": "2022-08-17T02:33:15Z", + "stargazers_count": 30, + "watchers_count": 30, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 4, - "watchers": 17, + "forks": 5, + "watchers": 30, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-27925.json b/2022/CVE-2022-27925.json index d37b7af527..b8755a77a4 100644 --- a/2022/CVE-2022-27925.json +++ b/2022/CVE-2022-27925.json @@ -13,10 +13,10 @@ "description": "Zimbra RCE simple poc", "fork": false, "created_at": "2022-08-12T18:35:52Z", - "updated_at": "2022-08-16T18:07:38Z", + "updated_at": "2022-08-17T06:07:55Z", "pushed_at": "2022-08-13T18:54:58Z", - "stargazers_count": 27, - "watchers_count": 27, + "stargazers_count": 29, + "watchers_count": 29, "forks_count": 10, "allow_forking": true, "is_template": false, @@ -24,7 +24,7 @@ "topics": [], "visibility": "public", "forks": 10, - "watchers": 27, + "watchers": 29, "score": 0 }, { diff --git a/2022/CVE-2022-29464.json b/2022/CVE-2022-29464.json index 44419ac120..4bf8cafc8c 100644 --- a/2022/CVE-2022-29464.json +++ b/2022/CVE-2022-29464.json @@ -13,10 +13,10 @@ "description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.", "fork": false, "created_at": "2022-04-20T21:23:52Z", - "updated_at": "2022-08-15T15:42:21Z", + "updated_at": "2022-08-17T03:00:17Z", "pushed_at": "2022-04-27T05:52:43Z", - "stargazers_count": 300, - "watchers_count": 300, + "stargazers_count": 301, + "watchers_count": 301, "forks_count": 69, "allow_forking": true, "is_template": false, @@ -26,7 +26,7 @@ ], "visibility": "public", "forks": 69, - "watchers": 300, + "watchers": 301, "score": 0 }, { diff --git a/2022/CVE-2022-33891.json b/2022/CVE-2022-33891.json index d49cc42386..77a7987faa 100644 --- a/2022/CVE-2022-33891.json +++ b/2022/CVE-2022-33891.json @@ -13,11 +13,11 @@ "description": "cve-2022-33891-poc", "fork": false, "created_at": "2022-07-18T16:16:51Z", - "updated_at": "2022-08-15T15:42:36Z", + "updated_at": "2022-08-17T02:11:14Z", "pushed_at": "2022-07-20T08:00:18Z", - "stargazers_count": 43, - "watchers_count": 43, - "forks_count": 17, + "stargazers_count": 44, + "watchers_count": 44, + "forks_count": 18, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -25,8 +25,8 @@ "cve-2022-33891" ], "visibility": "public", - "forks": 17, - "watchers": 43, + "forks": 18, + "watchers": 44, "score": 0 }, { @@ -43,18 +43,18 @@ "description": "Apache Spark Shell Command Injection Vulnerability", "fork": false, "created_at": "2022-07-19T18:52:12Z", - "updated_at": "2022-08-16T16:30:10Z", + "updated_at": "2022-08-17T02:11:03Z", "pushed_at": "2022-07-22T21:47:53Z", - "stargazers_count": 65, - "watchers_count": 65, - "forks_count": 12, + "stargazers_count": 66, + "watchers_count": 66, + "forks_count": 13, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 12, - "watchers": 65, + "forks": 13, + "watchers": 66, "score": 0 }, { @@ -71,10 +71,10 @@ "description": "Apache Spark Command Injection PoC Exploit for CVE-2022-33891", "fork": false, "created_at": "2022-07-19T23:16:27Z", - "updated_at": "2022-08-13T15:50:10Z", + "updated_at": "2022-08-17T05:20:02Z", "pushed_at": "2022-07-21T08:32:08Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 23, + "watchers_count": 23, "forks_count": 6, "allow_forking": true, "is_template": false, @@ -90,7 +90,7 @@ ], "visibility": "public", "forks": 6, - "watchers": 22, + "watchers": 23, "score": 0 }, { diff --git a/2022/CVE-2022-36446.json b/2022/CVE-2022-36446.json index 946c6795cd..6948468091 100644 --- a/2022/CVE-2022-36446.json +++ b/2022/CVE-2022-36446.json @@ -13,11 +13,11 @@ "description": "A Python script to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997.", "fork": false, "created_at": "2022-08-11T11:47:17Z", - "updated_at": "2022-08-16T07:31:11Z", + "updated_at": "2022-08-17T02:47:30Z", "pushed_at": "2022-08-11T19:25:11Z", - "stargazers_count": 29, - "watchers_count": 29, - "forks_count": 12, + "stargazers_count": 30, + "watchers_count": 30, + "forks_count": 13, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -31,8 +31,8 @@ "webmin" ], "visibility": "public", - "forks": 12, - "watchers": 29, + "forks": 13, + "watchers": 30, "score": 0 } ] \ No newline at end of file