diff --git a/2014/CVE-2014-6271.json b/2014/CVE-2014-6271.json index a5728c00be..952cacceeb 100644 --- a/2014/CVE-2014-6271.json +++ b/2014/CVE-2014-6271.json @@ -1158,10 +1158,10 @@ "description": "Shellshock exploit + vulnerable environment", "fork": false, "created_at": "2016-12-07T23:38:50Z", - "updated_at": "2024-10-01T20:46:45Z", + "updated_at": "2024-10-06T02:48:47Z", "pushed_at": "2023-05-11T02:12:25Z", - "stargazers_count": 202, - "watchers_count": 202, + "stargazers_count": 203, + "watchers_count": 203, "has_discussions": false, "forks_count": 56, "allow_forking": true, @@ -1177,7 +1177,7 @@ ], "visibility": "public", "forks": 56, - "watchers": 202, + "watchers": 203, "score": 0, "subscribers_count": 5 }, diff --git a/2017/CVE-2017-0785.json b/2017/CVE-2017-0785.json index b5ef06bf2e..b70a953dfb 100644 --- a/2017/CVE-2017-0785.json +++ b/2017/CVE-2017-0785.json @@ -18,7 +18,7 @@ "stargazers_count": 461, "watchers_count": 461, "has_discussions": false, - "forks_count": 185, + "forks_count": 186, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -29,7 +29,7 @@ "poc" ], "visibility": "public", - "forks": 185, + "forks": 186, "watchers": 461, "score": 0, "subscribers_count": 45 diff --git a/2017/CVE-2017-9506.json b/2017/CVE-2017-9506.json index adc9f68bee..b944416469 100644 --- a/2017/CVE-2017-9506.json +++ b/2017/CVE-2017-9506.json @@ -13,10 +13,10 @@ "description": "CVE-2017-9506 - SSRF", "fork": false, "created_at": "2018-04-25T11:25:18Z", - "updated_at": "2024-08-12T19:38:02Z", + "updated_at": "2024-10-06T03:54:25Z", "pushed_at": "2022-02-14T22:00:28Z", - "stargazers_count": 184, - "watchers_count": 184, + "stargazers_count": 185, + "watchers_count": 185, "has_discussions": false, "forks_count": 45, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 45, - "watchers": 184, + "watchers": 185, "score": 0, "subscribers_count": 5 }, diff --git a/2020/CVE-2020-0069.json b/2020/CVE-2020-0069.json index 52e9c7e379..d737284dad 100644 --- a/2020/CVE-2020-0069.json +++ b/2020/CVE-2020-0069.json @@ -108,10 +108,10 @@ "description": null, "fork": false, "created_at": "2020-03-24T13:10:39Z", - "updated_at": "2024-08-12T19:59:12Z", + "updated_at": "2024-10-06T05:09:12Z", "pushed_at": "2020-03-24T13:19:34Z", - "stargazers_count": 97, - "watchers_count": 97, + "stargazers_count": 98, + "watchers_count": 98, "has_discussions": false, "forks_count": 25, "allow_forking": true, @@ -124,7 +124,7 @@ ], "visibility": "public", "forks": 25, - "watchers": 97, + "watchers": 98, "score": 0, "subscribers_count": 10 }, diff --git a/2021/CVE-2021-26943.json b/2021/CVE-2021-26943.json index 6594a5bc2f..ae82bfbe08 100644 --- a/2021/CVE-2021-26943.json +++ b/2021/CVE-2021-26943.json @@ -13,10 +13,10 @@ "description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.", "fork": false, "created_at": "2020-12-31T16:30:02Z", - "updated_at": "2024-09-18T22:47:19Z", + "updated_at": "2024-10-06T05:32:37Z", "pushed_at": "2021-03-29T12:33:38Z", - "stargazers_count": 133, - "watchers_count": 133, + "stargazers_count": 134, + "watchers_count": 134, "has_discussions": true, "forks_count": 23, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 23, - "watchers": 133, + "watchers": 134, "score": 0, "subscribers_count": 11 } diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index a76298dabd..e92c88cd93 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -1079,13 +1079,13 @@ "stargazers_count": 736, "watchers_count": 736, "has_discussions": false, - "forks_count": 167, + "forks_count": 168, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 167, + "forks": 168, "watchers": 736, "score": 0, "subscribers_count": 11 diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index d05883d0ac..a48b6c47ba 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -47,10 +47,10 @@ "description": "CVE-2021-4034 1day", "fork": false, "created_at": "2022-01-25T23:51:37Z", - "updated_at": "2024-10-04T14:26:30Z", + "updated_at": "2024-10-06T03:49:37Z", "pushed_at": "2022-06-08T04:00:28Z", - "stargazers_count": 1956, - "watchers_count": 1956, + "stargazers_count": 1957, + "watchers_count": 1957, "has_discussions": false, "forks_count": 510, "allow_forking": true, @@ -59,7 +59,7 @@ "topics": [], "visibility": "public", "forks": 510, - "watchers": 1956, + "watchers": 1957, "score": 0, "subscribers_count": 20 }, diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index f02b4398f2..bf23f11881 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -48,10 +48,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-13T10:28:12Z", - "updated_at": "2024-10-05T15:57:10Z", + "updated_at": "2024-10-06T01:46:46Z", "pushed_at": "2023-01-29T03:31:27Z", - "stargazers_count": 781, - "watchers_count": 781, + "stargazers_count": 782, + "watchers_count": 782, "has_discussions": false, "forks_count": 118, "allow_forking": true, @@ -60,7 +60,7 @@ "topics": [], "visibility": "public", "forks": 118, - "watchers": 781, + "watchers": 782, "score": 0, "subscribers_count": 13 }, diff --git a/2023/CVE-2023-28252.json b/2023/CVE-2023-28252.json index 9eb2531acd..74e53d83cd 100644 --- a/2023/CVE-2023-28252.json +++ b/2023/CVE-2023-28252.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-06-27T12:22:05Z", - "updated_at": "2024-10-02T04:54:03Z", + "updated_at": "2024-10-06T04:27:40Z", "pushed_at": "2023-07-10T16:57:44Z", - "stargazers_count": 170, - "watchers_count": 170, + "stargazers_count": 171, + "watchers_count": 171, "has_discussions": false, "forks_count": 46, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 46, - "watchers": 170, + "watchers": 171, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-30800.json b/2023/CVE-2023-30800.json index be87734de3..6913409897 100644 --- a/2023/CVE-2023-30800.json +++ b/2023/CVE-2023-30800.json @@ -124,6 +124,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-35854.json b/2023/CVE-2023-35854.json index a27e1cbcb3..49641466c9 100644 --- a/2023/CVE-2023-35854.json +++ b/2023/CVE-2023-35854.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-38709.json b/2023/CVE-2023-38709.json index 8aef2b976b..e2d1ee27cc 100644 --- a/2023/CVE-2023-38709.json +++ b/2023/CVE-2023-38709.json @@ -38,6 +38,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-47253.json b/2023/CVE-2023-47253.json index dcd1cf3593..8db2edf4e4 100644 --- a/2023/CVE-2023-47253.json +++ b/2023/CVE-2023-47253.json @@ -87,6 +87,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-52251.json b/2023/CVE-2023-52251.json index 4ad9fe3dcf..ead1a8dddd 100644 --- a/2023/CVE-2023-52251.json +++ b/2023/CVE-2023-52251.json @@ -13,10 +13,10 @@ "description": "CVE-2023-52251 There is a Remote Code Execution vulnerability provectus\/kafka-ui.", "fork": false, "created_at": "2024-01-06T11:07:36Z", - "updated_at": "2024-08-12T13:29:26Z", + "updated_at": "2024-10-06T04:27:25Z", "pushed_at": "2024-01-23T19:06:14Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 16, + "watchers_count": 16, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 15, + "watchers": 16, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-26304.json b/2024/CVE-2024-26304.json index c7f3a3b7bc..3ff8c617dc 100644 --- a/2024/CVE-2024-26304.json +++ b/2024/CVE-2024-26304.json @@ -57,6 +57,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-28116.json b/2024/CVE-2024-28116.json index 10cb78a17c..fccb29e07b 100644 --- a/2024/CVE-2024-28116.json +++ b/2024/CVE-2024-28116.json @@ -97,6 +97,6 @@ "forks": 0, "watchers": 3, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-30088.json b/2024/CVE-2024-30088.json index b9b0721ccc..b52ecac9ac 100644 --- a/2024/CVE-2024-30088.json +++ b/2024/CVE-2024-30088.json @@ -103,10 +103,10 @@ "description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088", "fork": false, "created_at": "2024-07-15T08:07:05Z", - "updated_at": "2024-10-05T18:21:04Z", + "updated_at": "2024-10-06T05:02:57Z", "pushed_at": "2024-09-08T21:23:34Z", - "stargazers_count": 393, - "watchers_count": 393, + "stargazers_count": 394, + "watchers_count": 394, "has_discussions": false, "forks_count": 31, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 31, - "watchers": 393, + "watchers": 394, "score": 0, "subscribers_count": 17 }, diff --git a/2024/CVE-2024-32640.json b/2024/CVE-2024-32640.json index 7b50fd8235..cea1962855 100644 --- a/2024/CVE-2024-32640.json +++ b/2024/CVE-2024-32640.json @@ -129,6 +129,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-36401.json b/2024/CVE-2024-36401.json index 16b09e6538..8925b4165b 100644 --- a/2024/CVE-2024-36401.json +++ b/2024/CVE-2024-36401.json @@ -394,6 +394,6 @@ "forks": 0, "watchers": 2, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-38063.json b/2024/CVE-2024-38063.json index 130f4a6070..e350524d95 100644 --- a/2024/CVE-2024-38063.json +++ b/2024/CVE-2024-38063.json @@ -256,10 +256,10 @@ "description": "poc for CVE-2024-38063 (RCE in tcpip.sys)", "fork": false, "created_at": "2024-08-24T18:25:46Z", - "updated_at": "2024-10-05T12:31:57Z", + "updated_at": "2024-10-06T04:19:08Z", "pushed_at": "2024-08-27T12:22:39Z", - "stargazers_count": 605, - "watchers_count": 605, + "stargazers_count": 606, + "watchers_count": 606, "has_discussions": false, "forks_count": 109, "allow_forking": true, @@ -268,7 +268,7 @@ "topics": [], "visibility": "public", "forks": 109, - "watchers": 605, + "watchers": 606, "score": 0, "subscribers_count": 4 }, diff --git a/2024/CVE-2024-38200.json b/2024/CVE-2024-38200.json index d82c97e42b..40844ac3f2 100644 --- a/2024/CVE-2024-38200.json +++ b/2024/CVE-2024-38200.json @@ -13,10 +13,10 @@ "description": "CVE-2024-38200 - Microsoft Office NTLMv2 Disclosure Vulnerability ", "fork": false, "created_at": "2024-09-24T19:24:55Z", - "updated_at": "2024-10-05T23:15:15Z", + "updated_at": "2024-10-06T04:30:31Z", "pushed_at": "2024-10-01T15:38:24Z", - "stargazers_count": 105, - "watchers_count": 105, + "stargazers_count": 106, + "watchers_count": 106, "has_discussions": false, "forks_count": 24, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 24, - "watchers": 105, + "watchers": 106, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-38472.json b/2024/CVE-2024-38472.json index 46664cb294..db5d4330c0 100644 --- a/2024/CVE-2024-38472.json +++ b/2024/CVE-2024-38472.json @@ -68,6 +68,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-44193.json b/2024/CVE-2024-44193.json index be06f45e84..e958b6a4c0 100644 --- a/2024/CVE-2024-44193.json +++ b/2024/CVE-2024-44193.json @@ -13,10 +13,10 @@ "description": "Hacking Windows through iTunes  - Local Privilege Escalation 0-day", "fork": false, "created_at": "2024-10-04T14:20:15Z", - "updated_at": "2024-10-05T16:56:30Z", + "updated_at": "2024-10-06T04:50:54Z", "pushed_at": "2024-10-04T14:59:50Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-45519.json b/2024/CVE-2024-45519.json index 1975e31ba9..468f56404f 100644 --- a/2024/CVE-2024-45519.json +++ b/2024/CVE-2024-45519.json @@ -48,13 +48,13 @@ "stargazers_count": 36, "watchers_count": 36, "has_discussions": false, - "forks_count": 15, + "forks_count": 16, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 15, + "forks": 16, "watchers": 36, "score": 0, "subscribers_count": 2 @@ -73,10 +73,10 @@ "description": "Zimbra - Remote Command Execution (CVE-2024-45519)", "fork": false, "created_at": "2024-10-05T00:15:18Z", - "updated_at": "2024-10-05T21:42:54Z", + "updated_at": "2024-10-06T06:21:06Z", "pushed_at": "2024-10-05T00:18:49Z", - "stargazers_count": 29, - "watchers_count": 29, + "stargazers_count": 34, + "watchers_count": 34, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 29, + "watchers": 34, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-47176.json b/2024/CVE-2024-47176.json index fc6555cbef..11c6df0c5f 100644 --- a/2024/CVE-2024-47176.json +++ b/2024/CVE-2024-47176.json @@ -245,6 +245,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-6782.json b/2024/CVE-2024-6782.json index 336f83bcb1..fad5164a16 100644 --- a/2024/CVE-2024-6782.json +++ b/2024/CVE-2024-6782.json @@ -43,10 +43,10 @@ "description": "Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution.", "fork": false, "created_at": "2024-08-09T06:25:03Z", - "updated_at": "2024-08-09T06:26:34Z", + "updated_at": "2024-10-06T02:42:40Z", "pushed_at": "2024-08-09T06:26:31Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 }, @@ -73,10 +73,10 @@ "description": "Unauthenticated remote code execution via Calibre’s content server in Calibre <= 7.14.0.", "fork": false, "created_at": "2024-09-15T18:45:44Z", - "updated_at": "2024-09-16T01:37:25Z", + "updated_at": "2024-10-06T02:41:05Z", "pushed_at": "2024-09-16T01:37:22Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-7120.json b/2024/CVE-2024-7120.json index 18baa66b35..3c77039d7e 100644 --- a/2024/CVE-2024-7120.json +++ b/2024/CVE-2024-7120.json @@ -13,10 +13,10 @@ "description": "⚠️⚠️ CVE-2024-7120 Command Injection Vulnerability in RAISECOM Gateway Devices", "fork": false, "created_at": "2024-08-30T15:50:50Z", - "updated_at": "2024-09-30T13:54:58Z", + "updated_at": "2024-10-06T00:33:51Z", "pushed_at": "2024-08-30T16:29:33Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-7479.json b/2024/CVE-2024-7479.json index 259b376e3b..58c0a01c2a 100644 --- a/2024/CVE-2024-7479.json +++ b/2024/CVE-2024-7479.json @@ -13,10 +13,10 @@ "description": "TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.", "fork": false, "created_at": "2024-09-29T10:58:15Z", - "updated_at": "2024-10-05T19:24:59Z", + "updated_at": "2024-10-06T04:33:43Z", "pushed_at": "2024-10-04T09:39:09Z", - "stargazers_count": 58, - "watchers_count": 58, + "stargazers_count": 62, + "watchers_count": 62, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 58, + "watchers": 62, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-7954.json b/2024/CVE-2024-7954.json index db36a6c739..006fff36c9 100644 --- a/2024/CVE-2024-7954.json +++ b/2024/CVE-2024-7954.json @@ -147,6 +147,6 @@ "forks": 1, "watchers": 2, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-7965.json b/2024/CVE-2024-7965.json index d597052fd2..6d6103fe7a 100644 --- a/2024/CVE-2024-7965.json +++ b/2024/CVE-2024-7965.json @@ -13,10 +13,10 @@ "description": "This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.", "fork": false, "created_at": "2024-09-16T19:04:57Z", - "updated_at": "2024-10-04T13:56:39Z", + "updated_at": "2024-10-06T05:08:34Z", "pushed_at": "2024-09-16T19:44:54Z", - "stargazers_count": 38, - "watchers_count": 38, + "stargazers_count": 39, + "watchers_count": 39, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 38, + "watchers": 39, "score": 0, "subscribers_count": 5 }