diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json
index e43fb31388..85306b2854 100644
--- a/2014/CVE-2014-4210.json
+++ b/2014/CVE-2014-4210.json
@@ -42,12 +42,12 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2022-11-17T00:07:34Z",
+ "updated_at": "2022-11-18T11:54:28Z",
"pushed_at": "2022-07-17T12:41:46Z",
- "stargazers_count": 1538,
- "watchers_count": 1538,
+ "stargazers_count": 1539,
+ "watchers_count": 1539,
"has_discussions": false,
- "forks_count": 310,
+ "forks_count": 311,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -74,8 +74,8 @@
"cve-2020-2883"
],
"visibility": "public",
- "forks": 310,
- "watchers": 1538,
+ "forks": 311,
+ "watchers": 1539,
"score": 0
},
{
diff --git a/2015/CVE-2015-1805.json b/2015/CVE-2015-1805.json
index 6c9b0949f2..f570b0a80f 100644
--- a/2015/CVE-2015-1805.json
+++ b/2015/CVE-2015-1805.json
@@ -42,10 +42,10 @@
"description": "CVE-2015-1805 root tool",
"fork": false,
"created_at": "2016-04-01T12:10:14Z",
- "updated_at": "2022-09-03T18:38:35Z",
+ "updated_at": "2022-11-18T11:21:23Z",
"pushed_at": "2017-11-23T20:55:03Z",
- "stargazers_count": 266,
- "watchers_count": 266,
+ "stargazers_count": 265,
+ "watchers_count": 265,
"has_discussions": false,
"forks_count": 155,
"allow_forking": true,
@@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 155,
- "watchers": 266,
+ "watchers": 265,
"score": 0
},
{
diff --git a/2015/CVE-2015-6357.json b/2015/CVE-2015-6357.json
new file mode 100644
index 0000000000..d0e44f7c22
--- /dev/null
+++ b/2015/CVE-2015-6357.json
@@ -0,0 +1,31 @@
+[
+ {
+ "id": 46267200,
+ "name": "firepwner",
+ "full_name": "mattimustang\/firepwner",
+ "owner": {
+ "login": "mattimustang",
+ "id": 188046,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188046?v=4",
+ "html_url": "https:\/\/github.com\/mattimustang"
+ },
+ "html_url": "https:\/\/github.com\/mattimustang\/firepwner",
+ "description": "Exploit for CVE-2015-6357 Cisco FireSIGHT Management Center Certificate Validation Vulnerability",
+ "fork": false,
+ "created_at": "2015-11-16T10:15:47Z",
+ "updated_at": "2020-04-07T07:07:42Z",
+ "pushed_at": "2015-11-16T10:20:09Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 5,
+ "score": 0
+ }
+]
\ No newline at end of file
diff --git a/2015/CVE-2015-6639.json b/2015/CVE-2015-6639.json
index 5f26e1a86d..93b6a948b3 100644
--- a/2015/CVE-2015-6639.json
+++ b/2015/CVE-2015-6639.json
@@ -42,10 +42,10 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false,
"created_at": "2016-06-30T11:56:44Z",
- "updated_at": "2022-10-06T08:10:15Z",
+ "updated_at": "2022-11-18T07:29:12Z",
"pushed_at": "2016-06-30T15:32:42Z",
- "stargazers_count": 323,
- "watchers_count": 323,
+ "stargazers_count": 322,
+ "watchers_count": 322,
"has_discussions": false,
"forks_count": 116,
"allow_forking": true,
@@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 116,
- "watchers": 323,
+ "watchers": 322,
"score": 0
}
]
\ No newline at end of file
diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json
index 7432e6f942..1545516f1b 100644
--- a/2016/CVE-2016-0638.json
+++ b/2016/CVE-2016-0638.json
@@ -13,12 +13,12 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2022-11-17T00:07:34Z",
+ "updated_at": "2022-11-18T11:54:28Z",
"pushed_at": "2022-07-17T12:41:46Z",
- "stargazers_count": 1538,
- "watchers_count": 1538,
+ "stargazers_count": 1539,
+ "watchers_count": 1539,
"has_discussions": false,
- "forks_count": 310,
+ "forks_count": 311,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -45,8 +45,8 @@
"cve-2020-2883"
],
"visibility": "public",
- "forks": 310,
- "watchers": 1538,
+ "forks": 311,
+ "watchers": 1539,
"score": 0
},
{
diff --git a/2016/CVE-2016-2431.json b/2016/CVE-2016-2431.json
index 2e84da48df..aec59b26e4 100644
--- a/2016/CVE-2016-2431.json
+++ b/2016/CVE-2016-2431.json
@@ -42,10 +42,10 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false,
"created_at": "2016-06-30T11:56:44Z",
- "updated_at": "2022-10-06T08:10:15Z",
+ "updated_at": "2022-11-18T07:29:12Z",
"pushed_at": "2016-06-30T15:32:42Z",
- "stargazers_count": 323,
- "watchers_count": 323,
+ "stargazers_count": 322,
+ "watchers_count": 322,
"has_discussions": false,
"forks_count": 116,
"allow_forking": true,
@@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 116,
- "watchers": 323,
+ "watchers": 322,
"score": 0
}
]
\ No newline at end of file
diff --git a/2017/CVE-2017-3066.json b/2017/CVE-2017-3066.json
index 0c9b56c224..2e20a2d6be 100644
--- a/2017/CVE-2017-3066.json
+++ b/2017/CVE-2017-3066.json
@@ -13,10 +13,10 @@
"description": "Exploitation Tool for CVE-2017-3066 targeting Adobe Coldfusion 11\/12",
"fork": false,
"created_at": "2018-03-12T16:44:12Z",
- "updated_at": "2022-11-09T17:59:26Z",
+ "updated_at": "2022-11-18T10:10:03Z",
"pushed_at": "2022-10-18T08:53:13Z",
- "stargazers_count": 85,
- "watchers_count": 85,
+ "stargazers_count": 86,
+ "watchers_count": 86,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
- "watchers": 85,
+ "watchers": 86,
"score": 0
},
{
diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json
index b2109697ef..f9afb5683d 100644
--- a/2017/CVE-2017-3248.json
+++ b/2017/CVE-2017-3248.json
@@ -42,12 +42,12 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2022-11-17T00:07:34Z",
+ "updated_at": "2022-11-18T11:54:28Z",
"pushed_at": "2022-07-17T12:41:46Z",
- "stargazers_count": 1538,
- "watchers_count": 1538,
+ "stargazers_count": 1539,
+ "watchers_count": 1539,
"has_discussions": false,
- "forks_count": 310,
+ "forks_count": 311,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -74,8 +74,8 @@
"cve-2020-2883"
],
"visibility": "public",
- "forks": 310,
- "watchers": 1538,
+ "forks": 311,
+ "watchers": 1539,
"score": 0
},
{
diff --git a/2017/CVE-2017-6079.json b/2017/CVE-2017-6079.json
index f68e49846c..0a75a86215 100644
--- a/2017/CVE-2017-6079.json
+++ b/2017/CVE-2017-6079.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2018-09-22T19:18:47Z",
- "updated_at": "2022-09-17T03:55:56Z",
+ "updated_at": "2022-11-18T11:26:29Z",
"pushed_at": "2018-09-22T21:17:51Z",
- "stargazers_count": 19,
- "watchers_count": 19,
+ "stargazers_count": 18,
+ "watchers_count": 18,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
- "watchers": 19,
+ "watchers": 18,
"score": 0
}
]
\ No newline at end of file
diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json
index 46e6d2442b..5d4b73a430 100644
--- a/2018/CVE-2018-2628.json
+++ b/2018/CVE-2018-2628.json
@@ -568,12 +568,12 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2022-11-17T00:07:34Z",
+ "updated_at": "2022-11-18T11:54:28Z",
"pushed_at": "2022-07-17T12:41:46Z",
- "stargazers_count": 1538,
- "watchers_count": 1538,
+ "stargazers_count": 1539,
+ "watchers_count": 1539,
"has_discussions": false,
- "forks_count": 310,
+ "forks_count": 311,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -600,8 +600,8 @@
"cve-2020-2883"
],
"visibility": "public",
- "forks": 310,
- "watchers": 1538,
+ "forks": 311,
+ "watchers": 1539,
"score": 0
},
{
diff --git a/2018/CVE-2018-2893.json b/2018/CVE-2018-2893.json
index e1efcceccb..26a5d468cf 100644
--- a/2018/CVE-2018-2893.json
+++ b/2018/CVE-2018-2893.json
@@ -42,10 +42,10 @@
"description": "CVE-2018-2893 PoC",
"fork": false,
"created_at": "2018-07-19T06:28:12Z",
- "updated_at": "2022-07-25T02:34:20Z",
+ "updated_at": "2022-11-18T08:03:11Z",
"pushed_at": "2018-07-19T06:12:51Z",
- "stargazers_count": 30,
- "watchers_count": 30,
+ "stargazers_count": 31,
+ "watchers_count": 31,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 37,
- "watchers": 30,
+ "watchers": 31,
"score": 0
},
{
@@ -158,10 +158,10 @@
"description": "CVE-2018-2893",
"fork": false,
"created_at": "2018-10-07T08:41:14Z",
- "updated_at": "2022-01-22T07:50:55Z",
+ "updated_at": "2022-11-18T08:04:55Z",
"pushed_at": "2018-10-07T09:53:54Z",
- "stargazers_count": 11,
- "watchers_count": 11,
+ "stargazers_count": 12,
+ "watchers_count": 12,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@@ -170,7 +170,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
- "watchers": 11,
+ "watchers": 12,
"score": 0
},
{
diff --git a/2018/CVE-2018-7600.json b/2018/CVE-2018-7600.json
index 3237a5add3..eb67101ddb 100644
--- a/2018/CVE-2018-7600.json
+++ b/2018/CVE-2018-7600.json
@@ -78,10 +78,10 @@
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
"fork": false,
"created_at": "2018-04-12T22:53:14Z",
- "updated_at": "2022-11-16T11:56:36Z",
+ "updated_at": "2022-11-18T08:54:22Z",
"pushed_at": "2021-01-08T10:31:22Z",
- "stargazers_count": 536,
- "watchers_count": 536,
+ "stargazers_count": 537,
+ "watchers_count": 537,
"has_discussions": false,
"forks_count": 173,
"allow_forking": true,
@@ -100,7 +100,7 @@
],
"visibility": "public",
"forks": 173,
- "watchers": 536,
+ "watchers": 537,
"score": 0
},
{
diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json
index a227f48bc9..098752b6d0 100644
--- a/2019/CVE-2019-11043.json
+++ b/2019/CVE-2019-11043.json
@@ -13,10 +13,10 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
- "updated_at": "2022-11-16T06:33:09Z",
+ "updated_at": "2022-11-18T06:50:37Z",
"pushed_at": "2019-11-12T18:53:14Z",
- "stargazers_count": 1744,
- "watchers_count": 1744,
+ "stargazers_count": 1745,
+ "watchers_count": 1745,
"has_discussions": false,
"forks_count": 261,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 261,
- "watchers": 1744,
+ "watchers": 1745,
"score": 0
},
{
diff --git a/2019/CVE-2019-11510.json b/2019/CVE-2019-11510.json
index 223b675b80..3459558e9d 100644
--- a/2019/CVE-2019-11510.json
+++ b/2019/CVE-2019-11510.json
@@ -216,10 +216,10 @@
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
"fork": false,
"created_at": "2019-09-09T15:58:39Z",
- "updated_at": "2022-07-10T18:18:14Z",
+ "updated_at": "2022-11-18T09:14:05Z",
"pushed_at": "2020-01-15T17:01:50Z",
- "stargazers_count": 126,
- "watchers_count": 126,
+ "stargazers_count": 125,
+ "watchers_count": 125,
"has_discussions": false,
"forks_count": 58,
"allow_forking": true,
@@ -237,7 +237,7 @@
],
"visibility": "public",
"forks": 58,
- "watchers": 126,
+ "watchers": 125,
"score": 0
},
{
diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json
index 6b1bd85076..8b9258d32d 100644
--- a/2019/CVE-2019-17558.json
+++ b/2019/CVE-2019-17558.json
@@ -42,10 +42,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
- "updated_at": "2022-11-18T01:49:53Z",
+ "updated_at": "2022-11-18T11:50:28Z",
"pushed_at": "2021-04-04T09:13:57Z",
- "stargazers_count": 3603,
- "watchers_count": 3603,
+ "stargazers_count": 3604,
+ "watchers_count": 3604,
"has_discussions": false,
"forks_count": 1042,
"allow_forking": true,
@@ -74,7 +74,7 @@
],
"visibility": "public",
"forks": 1042,
- "watchers": 3603,
+ "watchers": 3604,
"score": 0
},
{
diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json
index 7cdafc0fcb..6ee1b019df 100644
--- a/2019/CVE-2019-19781.json
+++ b/2019/CVE-2019-19781.json
@@ -311,10 +311,10 @@
"description": "A fast multi threaded scanner for Citrix ADC (NetScaler) CVE-2019-19781 - Citrixmash \/ Shitrix",
"fork": false,
"created_at": "2020-01-12T15:16:54Z",
- "updated_at": "2022-06-16T20:16:19Z",
+ "updated_at": "2022-11-18T07:29:24Z",
"pushed_at": "2020-01-17T22:01:20Z",
- "stargazers_count": 36,
- "watchers_count": 36,
+ "stargazers_count": 35,
+ "watchers_count": 35,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@@ -329,7 +329,7 @@
],
"visibility": "public",
"forks": 10,
- "watchers": 36,
+ "watchers": 35,
"score": 0
},
{
diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json
index 5daacd2521..ee40390910 100644
--- a/2019/CVE-2019-2618.json
+++ b/2019/CVE-2019-2618.json
@@ -187,12 +187,12 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2022-11-17T00:07:34Z",
+ "updated_at": "2022-11-18T11:54:28Z",
"pushed_at": "2022-07-17T12:41:46Z",
- "stargazers_count": 1538,
- "watchers_count": 1538,
+ "stargazers_count": 1539,
+ "watchers_count": 1539,
"has_discussions": false,
- "forks_count": 310,
+ "forks_count": 311,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -219,8 +219,8 @@
"cve-2020-2883"
],
"visibility": "public",
- "forks": 310,
- "watchers": 1538,
+ "forks": 311,
+ "watchers": 1539,
"score": 0
}
]
\ No newline at end of file
diff --git a/2019/CVE-2019-3396.json b/2019/CVE-2019-3396.json
index 4e75190239..a991fac549 100644
--- a/2019/CVE-2019-3396.json
+++ b/2019/CVE-2019-3396.json
@@ -100,10 +100,10 @@
"description": "CVE-2019-3396 confluence SSTI RCE",
"fork": false,
"created_at": "2019-04-10T02:15:47Z",
- "updated_at": "2022-11-09T18:02:59Z",
+ "updated_at": "2022-11-18T10:10:10Z",
"pushed_at": "2020-10-01T08:40:07Z",
- "stargazers_count": 169,
- "watchers_count": 169,
+ "stargazers_count": 170,
+ "watchers_count": 170,
"has_discussions": false,
"forks_count": 75,
"allow_forking": true,
@@ -117,7 +117,7 @@
],
"visibility": "public",
"forks": 75,
- "watchers": 169,
+ "watchers": 170,
"score": 0
},
{
diff --git a/2019/CVE-2019-7304.json b/2019/CVE-2019-7304.json
index 2cf44d14d1..9e8ebf07d5 100644
--- a/2019/CVE-2019-7304.json
+++ b/2019/CVE-2019-7304.json
@@ -13,10 +13,10 @@
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
"fork": false,
"created_at": "2019-02-12T06:02:06Z",
- "updated_at": "2022-11-11T13:04:49Z",
+ "updated_at": "2022-11-18T10:13:55Z",
"pushed_at": "2019-05-09T21:34:26Z",
- "stargazers_count": 625,
- "watchers_count": 625,
+ "stargazers_count": 626,
+ "watchers_count": 626,
"has_discussions": false,
"forks_count": 158,
"allow_forking": true,
@@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 158,
- "watchers": 625,
+ "watchers": 626,
"score": 0
},
{
diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json
index f2c127c954..ab4c61fa24 100644
--- a/2020/CVE-2020-1472.json
+++ b/2020/CVE-2020-1472.json
@@ -100,10 +100,10 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
- "updated_at": "2022-11-13T18:40:00Z",
+ "updated_at": "2022-11-18T07:03:24Z",
"pushed_at": "2020-11-03T09:45:24Z",
- "stargazers_count": 970,
- "watchers_count": 970,
+ "stargazers_count": 971,
+ "watchers_count": 971,
"has_discussions": false,
"forks_count": 268,
"allow_forking": true,
@@ -112,7 +112,7 @@
"topics": [],
"visibility": "public",
"forks": 268,
- "watchers": 970,
+ "watchers": 971,
"score": 0
},
{
@@ -1135,13 +1135,13 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
- "forks_count": 4,
+ "forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 4,
+ "forks": 5,
"watchers": 4,
"score": 0
},
diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json
index 09c961d567..9db30d4ab8 100644
--- a/2020/CVE-2020-14882.json
+++ b/2020/CVE-2020-14882.json
@@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
- "updated_at": "2022-11-18T01:49:53Z",
+ "updated_at": "2022-11-18T11:50:28Z",
"pushed_at": "2021-04-04T09:13:57Z",
- "stargazers_count": 3603,
- "watchers_count": 3603,
+ "stargazers_count": 3604,
+ "watchers_count": 3604,
"has_discussions": false,
"forks_count": 1042,
"allow_forking": true,
@@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1042,
- "watchers": 3603,
+ "watchers": 3604,
"score": 0
},
{
diff --git a/2020/CVE-2020-15778.json b/2020/CVE-2020-15778.json
index b93774f023..56c82bb5cc 100644
--- a/2020/CVE-2020-15778.json
+++ b/2020/CVE-2020-15778.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2020-07-18T05:15:05Z",
- "updated_at": "2022-11-09T18:08:37Z",
+ "updated_at": "2022-11-18T09:40:21Z",
"pushed_at": "2021-03-17T11:29:58Z",
- "stargazers_count": 119,
- "watchers_count": 119,
+ "stargazers_count": 120,
+ "watchers_count": 120,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
- "watchers": 119,
+ "watchers": 120,
"score": 0
},
{
@@ -42,19 +42,19 @@
"description": "Exploit for CVE-2020-15778(OpenSSH vul)",
"fork": false,
"created_at": "2021-07-15T01:04:24Z",
- "updated_at": "2022-10-20T21:58:20Z",
+ "updated_at": "2022-11-18T09:40:13Z",
"pushed_at": "2022-02-18T08:04:46Z",
- "stargazers_count": 16,
- "watchers_count": 16,
+ "stargazers_count": 17,
+ "watchers_count": 17,
"has_discussions": false,
- "forks_count": 6,
+ "forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 6,
- "watchers": 16,
+ "forks": 7,
+ "watchers": 17,
"score": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json
index 0b0e39fb73..04498a72c7 100644
--- a/2020/CVE-2020-2551.json
+++ b/2020/CVE-2020-2551.json
@@ -13,12 +13,12 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2022-11-17T00:07:34Z",
+ "updated_at": "2022-11-18T11:54:28Z",
"pushed_at": "2022-07-17T12:41:46Z",
- "stargazers_count": 1538,
- "watchers_count": 1538,
+ "stargazers_count": 1539,
+ "watchers_count": 1539,
"has_discussions": false,
- "forks_count": 310,
+ "forks_count": 311,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -45,8 +45,8 @@
"cve-2020-2883"
],
"visibility": "public",
- "forks": 310,
- "watchers": 1538,
+ "forks": 311,
+ "watchers": 1539,
"score": 0
},
{
diff --git a/2020/CVE-2020-35847.json b/2020/CVE-2020-35847.json
index 9bafee04b5..36e130dcd2 100644
--- a/2020/CVE-2020-35847.json
+++ b/2020/CVE-2020-35847.json
@@ -14,17 +14,17 @@
"fork": false,
"created_at": "2021-08-06T09:19:01Z",
"updated_at": "2021-08-06T10:53:15Z",
- "pushed_at": "2021-08-06T10:27:32Z",
+ "pushed_at": "2022-11-18T08:47:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 0,
"score": 0
}
diff --git a/2020/CVE-2020-8241.json b/2020/CVE-2020-8241.json
index 57ef7cdd4b..b282b4a60d 100644
--- a/2020/CVE-2020-8241.json
+++ b/2020/CVE-2020-8241.json
@@ -13,10 +13,10 @@
"description": "Pulse Secure VPN mitm Research - CVE-2020-8241, CVE-2020-8239",
"fork": false,
"created_at": "2020-10-25T15:58:02Z",
- "updated_at": "2021-03-17T06:36:08Z",
+ "updated_at": "2022-11-18T11:29:29Z",
"pushed_at": "2020-11-01T07:25:54Z",
- "stargazers_count": 24,
- "watchers_count": 24,
+ "stargazers_count": 23,
+ "watchers_count": 23,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
- "watchers": 24,
+ "watchers": 23,
"score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json
index 267dc2e246..1b27994645 100644
--- a/2021/CVE-2021-1675.json
+++ b/2021/CVE-2021-1675.json
@@ -42,10 +42,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
- "updated_at": "2022-11-17T08:05:03Z",
+ "updated_at": "2022-11-18T10:29:33Z",
"pushed_at": "2021-07-20T15:28:13Z",
- "stargazers_count": 1630,
- "watchers_count": 1630,
+ "stargazers_count": 1631,
+ "watchers_count": 1631,
"has_discussions": false,
"forks_count": 581,
"allow_forking": true,
@@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 581,
- "watchers": 1630,
+ "watchers": 1631,
"score": 0
},
{
diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json
index ede3b95c63..435fb3b7c3 100644
--- a/2021/CVE-2021-21972.json
+++ b/2021/CVE-2021-21972.json
@@ -795,12 +795,12 @@
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
- "updated_at": "2022-11-18T06:12:02Z",
+ "updated_at": "2022-11-18T11:41:04Z",
"pushed_at": "2022-10-28T14:26:56Z",
- "stargazers_count": 604,
- "watchers_count": 604,
+ "stargazers_count": 616,
+ "watchers_count": 616,
"has_discussions": false,
- "forks_count": 65,
+ "forks_count": 67,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -813,8 +813,8 @@
"vcenter"
],
"visibility": "public",
- "forks": 65,
- "watchers": 604,
+ "forks": 67,
+ "watchers": 616,
"score": 0
},
{
diff --git a/2021/CVE-2021-21985.json b/2021/CVE-2021-21985.json
index 46c604c6b5..a72720d252 100644
--- a/2021/CVE-2021-21985.json
+++ b/2021/CVE-2021-21985.json
@@ -198,10 +198,10 @@
"description": null,
"fork": false,
"created_at": "2021-06-05T11:03:13Z",
- "updated_at": "2022-11-14T04:48:02Z",
+ "updated_at": "2022-11-18T11:29:47Z",
"pushed_at": "2021-06-07T04:00:06Z",
- "stargazers_count": 34,
- "watchers_count": 34,
+ "stargazers_count": 33,
+ "watchers_count": 33,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@@ -210,7 +210,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
- "watchers": 34,
+ "watchers": 33,
"score": 0
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json
index c120c876c4..bbd01bc893 100644
--- a/2021/CVE-2021-3129.json
+++ b/2021/CVE-2021-3129.json
@@ -13,10 +13,10 @@
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-13T12:52:20Z",
- "updated_at": "2022-11-09T18:10:47Z",
+ "updated_at": "2022-11-18T11:30:18Z",
"pushed_at": "2021-01-29T13:59:07Z",
- "stargazers_count": 226,
- "watchers_count": 226,
+ "stargazers_count": 227,
+ "watchers_count": 227,
"has_discussions": false,
"forks_count": 66,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 66,
- "watchers": 226,
+ "watchers": 227,
"score": 0
},
{
diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json
index fb9f98be70..a09ecf53c2 100644
--- a/2021/CVE-2021-3156.json
+++ b/2021/CVE-2021-3156.json
@@ -1039,10 +1039,10 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
- "updated_at": "2022-11-17T23:08:12Z",
+ "updated_at": "2022-11-18T10:03:01Z",
"pushed_at": "2022-01-13T05:48:01Z",
- "stargazers_count": 550,
- "watchers_count": 550,
+ "stargazers_count": 551,
+ "watchers_count": 551,
"has_discussions": false,
"forks_count": 152,
"allow_forking": true,
@@ -1051,7 +1051,7 @@
"topics": [],
"visibility": "public",
"forks": 152,
- "watchers": 550,
+ "watchers": 551,
"score": 0
},
{
diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json
index 6e25a35606..a1cf2bfc70 100644
--- a/2021/CVE-2021-4034.json
+++ b/2021/CVE-2021-4034.json
@@ -82,13 +82,13 @@
"stargazers_count": 1701,
"watchers_count": 1701,
"has_discussions": false,
- "forks_count": 487,
+ "forks_count": 488,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 487,
+ "forks": 488,
"watchers": 1701,
"score": 0
},
diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json
index 5ff6e4787e..6e9472e4a0 100644
--- a/2021/CVE-2021-41773.json
+++ b/2021/CVE-2021-41773.json
@@ -414,7 +414,7 @@
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
- "forks_count": 23,
+ "forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -429,7 +429,7 @@
"thehackersbrain"
],
"visibility": "public",
- "forks": 23,
+ "forks": 24,
"watchers": 57,
"score": 0
},
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
index 7bfdf5e192..0f59a3ed44 100644
--- a/2021/CVE-2021-44228.json
+++ b/2021/CVE-2021-44228.json
@@ -412,7 +412,7 @@
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2022-11-18T03:08:35Z",
- "pushed_at": "2022-11-17T02:44:09Z",
+ "pushed_at": "2022-11-18T08:36:03Z",
"stargazers_count": 542,
"watchers_count": 542,
"has_discussions": false,
diff --git a/2022/CVE-2022-0441.json b/2022/CVE-2022-0441.json
index 7072e5b1d6..7548e48c89 100644
--- a/2022/CVE-2022-0441.json
+++ b/2022/CVE-2022-0441.json
@@ -33,5 +33,34 @@
"forks": 1,
"watchers": 5,
"score": 0
+ },
+ {
+ "id": 567613523,
+ "name": "cve-2022-0441",
+ "full_name": "SDragon1205\/cve-2022-0441",
+ "owner": {
+ "login": "SDragon1205",
+ "id": 80585189,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80585189?v=4",
+ "html_url": "https:\/\/github.com\/SDragon1205"
+ },
+ "html_url": "https:\/\/github.com\/SDragon1205\/cve-2022-0441",
+ "description": "CVE-2022-0441 - MasterStudy LMS 2.7.6",
+ "fork": false,
+ "created_at": "2022-11-18T07:02:29Z",
+ "updated_at": "2022-11-18T07:07:18Z",
+ "pushed_at": "2022-11-18T07:07:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json
index 3ae473231a..2e611da8f4 100644
--- a/2022/CVE-2022-0847.json
+++ b/2022/CVE-2022-0847.json
@@ -1175,10 +1175,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
- "updated_at": "2022-11-14T14:21:34Z",
+ "updated_at": "2022-11-18T09:04:09Z",
"pushed_at": "2022-06-13T19:33:08Z",
- "stargazers_count": 341,
- "watchers_count": 341,
+ "stargazers_count": 342,
+ "watchers_count": 342,
"has_discussions": false,
"forks_count": 95,
"allow_forking": true,
@@ -1187,7 +1187,7 @@
"topics": [],
"visibility": "public",
"forks": 95,
- "watchers": 341,
+ "watchers": 342,
"score": 0
},
{
diff --git a/2022/CVE-2022-1329.json b/2022/CVE-2022-1329.json
index 4d9ffda1cc..1ff1c69f74 100644
--- a/2022/CVE-2022-1329.json
+++ b/2022/CVE-2022-1329.json
@@ -18,13 +18,13 @@
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
- "forks_count": 6,
+ "forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 6,
+ "forks": 5,
"watchers": 12,
"score": 0
},
diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json
index 0038c1deec..45d9094138 100644
--- a/2022/CVE-2022-22947.json
+++ b/2022/CVE-2022-22947.json
@@ -1273,10 +1273,10 @@
"description": "CVE-2022-22947 注入Godzilla内存马",
"fork": false,
"created_at": "2022-04-26T05:48:27Z",
- "updated_at": "2022-11-18T00:38:21Z",
+ "updated_at": "2022-11-18T09:38:53Z",
"pushed_at": "2022-04-26T05:55:58Z",
- "stargazers_count": 126,
- "watchers_count": 126,
+ "stargazers_count": 127,
+ "watchers_count": 127,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@@ -1285,7 +1285,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
- "watchers": 126,
+ "watchers": 127,
"score": 0
},
{
@@ -1563,10 +1563,10 @@
"description": "Spring Cloud Gateway远程代码执行",
"fork": false,
"created_at": "2022-10-29T03:28:55Z",
- "updated_at": "2022-11-06T06:53:11Z",
+ "updated_at": "2022-11-18T09:30:52Z",
"pushed_at": "2022-10-29T04:34:21Z",
- "stargazers_count": 15,
- "watchers_count": 15,
+ "stargazers_count": 16,
+ "watchers_count": 16,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@@ -1575,7 +1575,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
- "watchers": 15,
+ "watchers": 16,
"score": 0
},
{
diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json
index 84ac500e68..72046de44d 100644
--- a/2022/CVE-2022-22954.json
+++ b/2022/CVE-2022-22954.json
@@ -712,12 +712,12 @@
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
- "updated_at": "2022-11-18T06:12:02Z",
+ "updated_at": "2022-11-18T11:41:04Z",
"pushed_at": "2022-10-28T14:26:56Z",
- "stargazers_count": 604,
- "watchers_count": 604,
+ "stargazers_count": 616,
+ "watchers_count": 616,
"has_discussions": false,
- "forks_count": 65,
+ "forks_count": 67,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -730,8 +730,8 @@
"vcenter"
],
"visibility": "public",
- "forks": 65,
- "watchers": 604,
+ "forks": 67,
+ "watchers": 616,
"score": 0
},
{
diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json
index 4de922b85a..ee7e61d4fd 100644
--- a/2022/CVE-2022-26134.json
+++ b/2022/CVE-2022-26134.json
@@ -18,7 +18,7 @@
"stargazers_count": 862,
"watchers_count": 862,
"has_discussions": true,
- "forks_count": 156,
+ "forks_count": 157,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -44,7 +44,7 @@
"gui"
],
"visibility": "public",
- "forks": 156,
+ "forks": 157,
"watchers": 862,
"score": 0
},
@@ -742,10 +742,10 @@
"description": null,
"fork": false,
"created_at": "2022-06-07T09:19:02Z",
- "updated_at": "2022-11-15T17:36:49Z",
+ "updated_at": "2022-11-18T10:10:17Z",
"pushed_at": "2022-06-07T10:35:18Z",
- "stargazers_count": 230,
- "watchers_count": 230,
+ "stargazers_count": 231,
+ "watchers_count": 231,
"has_discussions": false,
"forks_count": 44,
"allow_forking": true,
@@ -754,7 +754,7 @@
"topics": [],
"visibility": "public",
"forks": 44,
- "watchers": 230,
+ "watchers": 231,
"score": 0
},
{
diff --git a/2022/CVE-2022-30781.json b/2022/CVE-2022-30781.json
index f59469b854..0fd2ed029b 100644
--- a/2022/CVE-2022-30781.json
+++ b/2022/CVE-2022-30781.json
@@ -13,10 +13,10 @@
"description": "🍵 Gitea repository migration remote command execution exploit.",
"fork": false,
"created_at": "2022-05-22T05:15:58Z",
- "updated_at": "2022-11-09T18:15:52Z",
+ "updated_at": "2022-11-18T07:15:44Z",
"pushed_at": "2022-05-26T11:32:21Z",
- "stargazers_count": 78,
- "watchers_count": 78,
+ "stargazers_count": 79,
+ "watchers_count": 79,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 14,
- "watchers": 78,
+ "watchers": 79,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-33679.json b/2022/CVE-2022-33679.json
index 2d47f53d90..a7ea32018a 100644
--- a/2022/CVE-2022-33679.json
+++ b/2022/CVE-2022-33679.json
@@ -13,10 +13,10 @@
"description": "One day based on https:\/\/googleprojectzero.blogspot.com\/2022\/10\/rc4-is-still-considered-harmful.html",
"fork": false,
"created_at": "2022-11-02T18:38:01Z",
- "updated_at": "2022-11-18T05:48:27Z",
+ "updated_at": "2022-11-18T07:26:44Z",
"pushed_at": "2022-11-07T16:21:14Z",
- "stargazers_count": 298,
- "watchers_count": 298,
+ "stargazers_count": 299,
+ "watchers_count": 299,
"has_discussions": false,
"forks_count": 50,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 50,
- "watchers": 298,
+ "watchers": 299,
"score": 0
},
{
diff --git a/2022/CVE-2022-3699.json b/2022/CVE-2022-3699.json
index 6a0f3e317a..7bbca751d3 100644
--- a/2022/CVE-2022-3699.json
+++ b/2022/CVE-2022-3699.json
@@ -13,10 +13,10 @@
"description": "Lenovo Diagnostics Driver EoP - Arbitrary R\/W",
"fork": false,
"created_at": "2022-11-09T14:15:30Z",
- "updated_at": "2022-11-18T04:24:34Z",
+ "updated_at": "2022-11-18T07:36:30Z",
"pushed_at": "2022-11-09T14:42:56Z",
- "stargazers_count": 118,
- "watchers_count": 118,
+ "stargazers_count": 117,
+ "watchers_count": 117,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
- "watchers": 118,
+ "watchers": 117,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-39197.json b/2022/CVE-2022-39197.json
index b6074b44a0..03b2296a5f 100644
--- a/2022/CVE-2022-39197.json
+++ b/2022/CVE-2022-39197.json
@@ -282,10 +282,10 @@
"description": "CobaltStrike <= 4.7.1 RCE",
"fork": false,
"created_at": "2022-10-14T11:46:01Z",
- "updated_at": "2022-11-17T06:48:24Z",
+ "updated_at": "2022-11-18T11:03:01Z",
"pushed_at": "2022-10-25T05:32:54Z",
- "stargazers_count": 280,
- "watchers_count": 280,
+ "stargazers_count": 281,
+ "watchers_count": 281,
"has_discussions": false,
"forks_count": 74,
"allow_forking": true,
@@ -294,7 +294,7 @@
"topics": [],
"visibility": "public",
"forks": 74,
- "watchers": 280,
+ "watchers": 281,
"score": 0
},
{
diff --git a/2022/CVE-2022-41082.json b/2022/CVE-2022-41082.json
index 2739a2f6e1..8320d88845 100644
--- a/2022/CVE-2022-41082.json
+++ b/2022/CVE-2022-41082.json
@@ -13,10 +13,10 @@
"description": "Nmap scripts to detect exchange 0-day (CVE-2022-41082) vulnerability",
"fork": false,
"created_at": "2022-10-01T11:53:14Z",
- "updated_at": "2022-11-17T20:47:00Z",
+ "updated_at": "2022-11-18T08:11:20Z",
"pushed_at": "2022-10-01T12:19:53Z",
- "stargazers_count": 59,
- "watchers_count": 59,
+ "stargazers_count": 60,
+ "watchers_count": 60,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
- "watchers": 59,
+ "watchers": 60,
"score": 0
},
{
diff --git a/2022/CVE-2022-41622.json b/2022/CVE-2022-41622.json
index d556a5437d..18b65ec7ed 100644
--- a/2022/CVE-2022-41622.json
+++ b/2022/CVE-2022-41622.json
@@ -13,10 +13,10 @@
"description": "A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root",
"fork": false,
"created_at": "2022-08-03T21:20:29Z",
- "updated_at": "2022-11-17T19:49:36Z",
+ "updated_at": "2022-11-18T09:47:09Z",
"pushed_at": "2022-10-20T17:37:43Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "stargazers_count": 4,
+ "watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 3,
+ "watchers": 4,
"score": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-42045.json b/2022/CVE-2022-42045.json
index 61aead1417..430349d6b7 100644
--- a/2022/CVE-2022-42045.json
+++ b/2022/CVE-2022-42045.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-10-23T15:58:18Z",
- "updated_at": "2022-11-14T20:42:41Z",
+ "updated_at": "2022-11-18T07:39:05Z",
"pushed_at": "2022-10-24T10:13:34Z",
- "stargazers_count": 31,
- "watchers_count": 31,
+ "stargazers_count": 30,
+ "watchers_count": 30,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
- "watchers": 31,
+ "watchers": 30,
"score": 0
}
]
\ No newline at end of file
diff --git a/README.md b/README.md
index 2964ab0970..f2375648a7 100644
--- a/README.md
+++ b/README.md
@@ -58,6 +58,7 @@ The MasterStudy LMS WordPress plugin before 2.7.6 does to validate some paramete
- [biulove0x/CVE-2022-0441](https://github.com/biulove0x/CVE-2022-0441)
+- [SDragon1205/cve-2022-0441](https://github.com/SDragon1205/cve-2022-0441)
### CVE-2022-0482 (2022-03-09)
@@ -26326,6 +26327,14 @@ Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1,
- [hexx0r/CVE-2015-6132](https://github.com/hexx0r/CVE-2015-6132)
+### CVE-2015-6357 (2015-11-18)
+
+
+The rule-update feature in Cisco FireSIGHT Management Center (MC) 5.2 through 5.4.0.1 does not verify the X.509 certificate of the support.sourcefire.com SSL server, which allows man-in-the-middle attackers to spoof this server and provide an invalid package, and consequently execute arbitrary code, via a crafted certificate, aka Bug ID CSCuw06444.
+
+
+- [mattimustang/firepwner](https://github.com/mattimustang/firepwner)
+
### CVE-2015-6576 (2017-10-02)