diff --git a/2010/CVE-2010-1240.json b/2010/CVE-2010-1240.json index 49a0fe5a07..b23fa2dff0 100644 --- a/2010/CVE-2010-1240.json +++ b/2010/CVE-2010-1240.json @@ -76,10 +76,10 @@ "description": null, "fork": false, "created_at": "2023-08-02T13:28:48Z", - "updated_at": "2023-08-02T13:28:49Z", + "updated_at": "2025-01-14T02:24:50Z", "pushed_at": "2023-09-03T15:06:25Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index 891227490e..ae6ab18f8e 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -76,10 +76,10 @@ "description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android", "fork": false, "created_at": "2016-10-21T11:19:21Z", - "updated_at": "2025-01-04T19:19:22Z", + "updated_at": "2025-01-14T05:37:30Z", "pushed_at": "2021-02-03T16:03:40Z", - "stargazers_count": 964, - "watchers_count": 964, + "stargazers_count": 966, + "watchers_count": 966, "has_discussions": false, "forks_count": 395, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 395, - "watchers": 964, + "watchers": 966, "score": 0, "subscribers_count": 64 }, diff --git a/2018/CVE-2018-10933.json b/2018/CVE-2018-10933.json index c1af674203..6bc9fd8358 100644 --- a/2018/CVE-2018-10933.json +++ b/2018/CVE-2018-10933.json @@ -14,10 +14,10 @@ "description": "CVE-2018-10933 very simple POC", "fork": false, "created_at": "2018-10-17T09:01:44Z", - "updated_at": "2024-08-12T19:42:29Z", + "updated_at": "2025-01-14T04:09:13Z", "pushed_at": "2018-10-23T13:51:06Z", - "stargazers_count": 127, - "watchers_count": 127, + "stargazers_count": 128, + "watchers_count": 128, "has_discussions": false, "forks_count": 40, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 40, - "watchers": 127, + "watchers": 128, "score": 0, "subscribers_count": 11 }, @@ -45,10 +45,10 @@ "description": "Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)", "fork": false, "created_at": "2018-10-17T14:14:12Z", - "updated_at": "2024-10-04T07:02:46Z", + "updated_at": "2025-01-14T04:18:37Z", "pushed_at": "2023-12-19T20:46:55Z", - "stargazers_count": 496, - "watchers_count": 496, + "stargazers_count": 497, + "watchers_count": 497, "has_discussions": false, "forks_count": 118, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 118, - "watchers": 496, + "watchers": 497, "score": 0, "subscribers_count": 22 }, diff --git a/2018/CVE-2018-19320.json b/2018/CVE-2018-19320.json index 7236c288ff..57a745e3b8 100644 --- a/2018/CVE-2018-19320.json +++ b/2018/CVE-2018-19320.json @@ -76,7 +76,7 @@ "description": "Unsigned driver loader using CVE-2018-19320", "fork": false, "created_at": "2022-11-12T05:48:13Z", - "updated_at": "2025-01-10T18:46:37Z", + "updated_at": "2025-01-14T04:54:09Z", "pushed_at": "2023-04-09T13:50:29Z", "stargazers_count": 223, "watchers_count": 223, diff --git a/2019/CVE-2019-2215.json b/2019/CVE-2019-2215.json index c7ebedccce..0560f48bc7 100644 --- a/2019/CVE-2019-2215.json +++ b/2019/CVE-2019-2215.json @@ -143,13 +143,13 @@ "stargazers_count": 23, "watchers_count": 23, "has_discussions": false, - "forks_count": 8, + "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 8, + "forks": 9, "watchers": 23, "score": 0, "subscribers_count": 5 diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index fa84fd78eb..0e7c3ae88f 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -236,13 +236,13 @@ "stargazers_count": 1609, "watchers_count": 1609, "has_discussions": false, - "forks_count": 482, + "forks_count": 481, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 482, + "forks": 481, "watchers": 1609, "score": 0, "subscribers_count": 28 diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index 529c7575b6..41910a2072 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -50,10 +50,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-13T10:28:12Z", - "updated_at": "2025-01-12T07:43:36Z", + "updated_at": "2025-01-14T02:53:47Z", "pushed_at": "2023-01-29T03:31:27Z", - "stargazers_count": 823, - "watchers_count": 823, + "stargazers_count": 824, + "watchers_count": 824, "has_discussions": false, "forks_count": 125, "allow_forking": true, @@ -62,7 +62,7 @@ "topics": [], "visibility": "public", "forks": 125, - "watchers": 823, + "watchers": 824, "score": 0, "subscribers_count": 13 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index e385467b70..4b1c554853 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -884,7 +884,7 @@ "description": "πŸ±β€πŸ’» βœ‚οΈ 🀬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks", "fork": false, "created_at": "2021-12-10T22:35:00Z", - "updated_at": "2025-01-06T03:02:40Z", + "updated_at": "2025-01-14T03:16:00Z", "pushed_at": "2022-01-15T16:18:44Z", "stargazers_count": 935, "watchers_count": 935, diff --git a/2022/CVE-2022-30190.json b/2022/CVE-2022-30190.json index 913f35dd48..3684346f20 100644 --- a/2022/CVE-2022-30190.json +++ b/2022/CVE-2022-30190.json @@ -1050,10 +1050,10 @@ "description": "CVE-2022-30190 | MS-MSDT Follina One Click", "fork": false, "created_at": "2022-06-02T16:09:02Z", - "updated_at": "2024-08-12T20:23:47Z", + "updated_at": "2025-01-14T03:51:03Z", "pushed_at": "2022-06-03T08:14:10Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 21, + "watchers_count": 21, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -1062,7 +1062,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 22, + "watchers": 21, "score": 0, "subscribers_count": 2 }, diff --git a/2022/CVE-2022-39197.json b/2022/CVE-2022-39197.json index e8a74ea4ab..ef625b69c0 100644 --- a/2022/CVE-2022-39197.json +++ b/2022/CVE-2022-39197.json @@ -235,10 +235,10 @@ "description": "CVE-2022-39197 漏洞θ‘₯丁. CVE-2022-39197 Vulnerability Patch. ", "fork": false, "created_at": "2022-09-26T08:58:21Z", - "updated_at": "2024-11-24T15:25:04Z", + "updated_at": "2025-01-14T03:51:04Z", "pushed_at": "2022-09-26T13:20:38Z", - "stargazers_count": 315, - "watchers_count": 315, + "stargazers_count": 313, + "watchers_count": 313, "has_discussions": false, "forks_count": 46, "allow_forking": true, @@ -251,7 +251,7 @@ ], "visibility": "public", "forks": 46, - "watchers": 315, + "watchers": 313, "score": 0, "subscribers_count": 5 }, diff --git a/2023/CVE-2023-24706.json b/2023/CVE-2023-24706.json index d0ea83d682..bdb44577ea 100644 --- a/2023/CVE-2023-24706.json +++ b/2023/CVE-2023-24706.json @@ -14,8 +14,8 @@ "description": "CVE-2023-24706", "fork": false, "created_at": "2023-11-10T05:43:52Z", - "updated_at": "2023-11-10T05:50:25Z", - "pushed_at": "2023-11-10T05:50:21Z", + "updated_at": "2025-01-14T06:23:41Z", + "pushed_at": "2025-01-14T06:23:38Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2023/CVE-2023-36745.json b/2023/CVE-2023-36745.json index 916dffead3..4e71539456 100644 --- a/2023/CVE-2023-36745.json +++ b/2023/CVE-2023-36745.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2023-10-23T19:06:36Z", - "updated_at": "2024-07-23T13:20:26Z", + "updated_at": "2025-01-14T03:51:05Z", "pushed_at": "2023-10-29T11:12:26Z", - "stargazers_count": 163, - "watchers_count": 163, + "stargazers_count": 162, + "watchers_count": 162, "has_discussions": false, "forks_count": 53, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 53, - "watchers": 163, + "watchers": 162, "score": 0, "subscribers_count": 4 } diff --git a/2023/CVE-2023-36845.json b/2023/CVE-2023-36845.json index c0c51f02b6..fe11dcfc92 100644 --- a/2023/CVE-2023-36845.json +++ b/2023/CVE-2023-36845.json @@ -532,10 +532,10 @@ "description": "CVE-2023-36845 – Unauthenticated Juniper Remote Code Execution Vulnerability Scanner", "fork": false, "created_at": "2024-02-18T15:37:58Z", - "updated_at": "2024-02-18T18:31:24Z", + "updated_at": "2025-01-14T05:59:12Z", "pushed_at": "2024-02-18T18:44:03Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -544,7 +544,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json index 63a1c23a68..5a39659acc 100644 --- a/2023/CVE-2023-38831.json +++ b/2023/CVE-2023-38831.json @@ -45,10 +45,10 @@ "description": "CVE-2023-38831 winrar exploit generator", "fork": false, "created_at": "2023-08-25T09:44:08Z", - "updated_at": "2025-01-08T12:41:28Z", + "updated_at": "2025-01-14T03:51:05Z", "pushed_at": "2023-11-26T06:46:44Z", - "stargazers_count": 784, - "watchers_count": 784, + "stargazers_count": 783, + "watchers_count": 783, "has_discussions": false, "forks_count": 140, "allow_forking": true, @@ -61,7 +61,7 @@ ], "visibility": "public", "forks": 140, - "watchers": 784, + "watchers": 783, "score": 0, "subscribers_count": 9 }, diff --git a/2023/CVE-2023-40028.json b/2023/CVE-2023-40028.json index c78de095fd..b64c304c6d 100644 --- a/2023/CVE-2023-40028.json +++ b/2023/CVE-2023-40028.json @@ -19,13 +19,13 @@ "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, - "forks_count": 4, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 4, + "forks": 5, "watchers": 5, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index a70213534c..1c4c43d6c2 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -14,10 +14,10 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) πŸ”“ Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2025-01-13T01:37:28Z", + "updated_at": "2025-01-14T00:54:58Z", "pushed_at": "2024-08-18T08:26:46Z", - "stargazers_count": 1381, - "watchers_count": 1381, + "stargazers_count": 1382, + "watchers_count": 1382, "has_discussions": false, "forks_count": 238, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 238, - "watchers": 1381, + "watchers": 1382, "score": 0, "subscribers_count": 21 }, diff --git a/2023/CVE-2023-4911.json b/2023/CVE-2023-4911.json index dfa0c031a3..3243eb43d5 100644 --- a/2023/CVE-2023-4911.json +++ b/2023/CVE-2023-4911.json @@ -45,19 +45,19 @@ "description": "PoC for CVE-2023-4911", "fork": false, "created_at": "2023-10-04T14:12:16Z", - "updated_at": "2025-01-05T09:41:34Z", + "updated_at": "2025-01-14T01:45:57Z", "pushed_at": "2023-10-04T14:16:36Z", - "stargazers_count": 382, - "watchers_count": 382, + "stargazers_count": 383, + "watchers_count": 383, "has_discussions": false, - "forks_count": 58, + "forks_count": 59, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 58, - "watchers": 382, + "forks": 59, + "watchers": 383, "score": 0, "subscribers_count": 5 }, diff --git a/2023/CVE-2023-50164.json b/2023/CVE-2023-50164.json index be857c12d4..77a49150bc 100644 --- a/2023/CVE-2023-50164.json +++ b/2023/CVE-2023-50164.json @@ -107,10 +107,10 @@ "description": "Proof of Concept for Path Traversal in Apache Struts (\"CVE-2023-50164\")", "fork": false, "created_at": "2023-12-17T14:18:54Z", - "updated_at": "2024-11-16T19:50:08Z", + "updated_at": "2025-01-14T03:51:06Z", "pushed_at": "2023-12-18T02:46:21Z", - "stargazers_count": 59, - "watchers_count": 59, + "stargazers_count": 58, + "watchers_count": 58, "has_discussions": true, "forks_count": 16, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 16, - "watchers": 59, + "watchers": 58, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index 37b80877b2..35c0a617fc 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -14,10 +14,10 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2025-01-13T15:34:14Z", + "updated_at": "2025-01-14T03:51:06Z", "pushed_at": "2024-04-17T16:09:54Z", - "stargazers_count": 2329, - "watchers_count": 2329, + "stargazers_count": 2325, + "watchers_count": 2325, "has_discussions": false, "forks_count": 302, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 302, - "watchers": 2329, + "watchers": 2325, "score": 0, "subscribers_count": 27 }, diff --git a/2024/CVE-2024-31317.json b/2024/CVE-2024-31317.json index b90dea8ef0..1909db4997 100644 --- a/2024/CVE-2024-31317.json +++ b/2024/CVE-2024-31317.json @@ -14,19 +14,19 @@ "description": "CVE-2024-31317", "fork": false, "created_at": "2024-12-05T01:36:59Z", - "updated_at": "2025-01-04T07:07:09Z", + "updated_at": "2025-01-14T05:34:46Z", "pushed_at": "2024-12-05T01:52:45Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 15, + "watchers_count": 15, "has_discussions": false, - "forks_count": 4, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 4, - "watchers": 14, + "forks": 5, + "watchers": 15, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-34102.json b/2024/CVE-2024-34102.json index 7b9f93bc30..f78a3d1878 100644 --- a/2024/CVE-2024-34102.json +++ b/2024/CVE-2024-34102.json @@ -143,13 +143,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 0, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-38063.json b/2024/CVE-2024-38063.json index b656b5b22e..2080cb4dc0 100644 --- a/2024/CVE-2024-38063.json +++ b/2024/CVE-2024-38063.json @@ -451,10 +451,10 @@ "description": "This is a C language program designed to test the Windows TCP\/IP Remote Code Execution Vulnerability (CVE-2024-38063). It sends specially crafted IPv6 packets with embedded shellcode to exploit the vulnerability.", "fork": false, "created_at": "2024-09-01T09:20:02Z", - "updated_at": "2025-01-02T15:59:04Z", + "updated_at": "2025-01-14T05:25:38Z", "pushed_at": "2024-09-08T07:12:26Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -463,7 +463,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-38100.json b/2024/CVE-2024-38100.json index aa2f4d72ce..4e7e563dd5 100644 --- a/2024/CVE-2024-38100.json +++ b/2024/CVE-2024-38100.json @@ -14,10 +14,10 @@ "description": "CVE-2024-38100 Windows Leaked Wallpaper Escelation to RCE vulnerability", "fork": false, "created_at": "2024-08-06T18:26:50Z", - "updated_at": "2024-10-25T09:41:56Z", + "updated_at": "2025-01-14T04:23:03Z", "pushed_at": "2024-08-06T18:29:09Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 9, + "watchers": 10, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-48990.json b/2024/CVE-2024-48990.json index a4d1631560..34c01449e8 100644 --- a/2024/CVE-2024-48990.json +++ b/2024/CVE-2024-48990.json @@ -14,10 +14,10 @@ "description": "PoC for CVE-2024-48990", "fork": false, "created_at": "2024-11-20T18:41:25Z", - "updated_at": "2025-01-12T18:32:01Z", + "updated_at": "2025-01-14T05:01:22Z", "pushed_at": "2024-11-20T18:49:33Z", - "stargazers_count": 94, - "watchers_count": 94, + "stargazers_count": 95, + "watchers_count": 95, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 94, + "watchers": 95, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-49039.json b/2024/CVE-2024-49039.json index 782e317ba7..36a93c3580 100644 --- a/2024/CVE-2024-49039.json +++ b/2024/CVE-2024-49039.json @@ -14,10 +14,10 @@ "description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler", "fork": false, "created_at": "2024-11-19T08:57:18Z", - "updated_at": "2025-01-08T09:21:16Z", + "updated_at": "2025-01-14T03:24:56Z", "pushed_at": "2024-11-19T09:15:26Z", - "stargazers_count": 117, - "watchers_count": 117, + "stargazers_count": 118, + "watchers_count": 118, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 117, + "watchers": 118, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-49113.json b/2024/CVE-2024-49113.json index c73000bee6..dbd23debb5 100644 --- a/2024/CVE-2024-49113.json +++ b/2024/CVE-2024-49113.json @@ -14,10 +14,10 @@ "description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113", "fork": false, "created_at": "2025-01-01T15:48:38Z", - "updated_at": "2025-01-13T13:37:39Z", + "updated_at": "2025-01-14T06:20:03Z", "pushed_at": "2025-01-02T16:07:23Z", - "stargazers_count": 438, - "watchers_count": 438, + "stargazers_count": 441, + "watchers_count": 441, "has_discussions": false, "forks_count": 103, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 103, - "watchers": 438, + "watchers": 441, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-54498.json b/2024/CVE-2024-54498.json index b7a6cf584a..b0904a75e7 100644 --- a/2024/CVE-2024-54498.json +++ b/2024/CVE-2024-54498.json @@ -14,19 +14,19 @@ "description": "Escape macOS Sandbox using sharedfilelistd exploit", "fork": false, "created_at": "2025-01-08T09:55:44Z", - "updated_at": "2025-01-13T23:31:23Z", + "updated_at": "2025-01-14T06:17:53Z", "pushed_at": "2025-01-09T06:34:50Z", - "stargazers_count": 34, - "watchers_count": 34, + "stargazers_count": 41, + "watchers_count": 41, "has_discussions": false, - "forks_count": 5, + "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 5, - "watchers": 34, + "forks": 7, + "watchers": 41, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-9935.json b/2024/CVE-2024-9935.json index 5abf831ba3..b39847728a 100644 --- a/2024/CVE-2024-9935.json +++ b/2024/CVE-2024-9935.json @@ -50,7 +50,7 @@ "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, - "forks_count": 1, + "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -63,7 +63,7 @@ "wordpress-plugin" ], "visibility": "public", - "forks": 1, + "forks": 0, "watchers": 5, "score": 0, "subscribers_count": 1 diff --git a/2025/CVE-2025-0282.json b/2025/CVE-2025-0282.json index 69f33b0504..311531aaa6 100644 --- a/2025/CVE-2025-0282.json +++ b/2025/CVE-2025-0282.json @@ -107,19 +107,19 @@ "description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.", "fork": false, "created_at": "2025-01-11T02:06:51Z", - "updated_at": "2025-01-13T15:38:47Z", + "updated_at": "2025-01-14T02:14:50Z", "pushed_at": "2025-01-11T23:54:06Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 27, + "watchers_count": 27, "has_discussions": false, - "forks_count": 3, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, - "watchers": 25, + "forks": 5, + "watchers": 27, "score": 0, "subscribers_count": 0 },