diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index c5de816ddc..4786242d2c 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -43,10 +43,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-08-25T08:35:22Z", + "updated_at": "2024-08-26T22:16:04Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1972, - "watchers_count": 1972, + "stargazers_count": 1973, + "watchers_count": 1973, "has_discussions": true, "forks_count": 337, "allow_forking": true, @@ -76,7 +76,7 @@ ], "visibility": "public", "forks": 337, - "watchers": 1972, + "watchers": 1973, "score": 0, "subscribers_count": 35 }, diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index a275385314..0fde205086 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-08-25T08:35:22Z", + "updated_at": "2024-08-26T22:16:04Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1972, - "watchers_count": 1972, + "stargazers_count": 1973, + "watchers_count": 1973, "has_discussions": true, "forks_count": 337, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 337, - "watchers": 1972, + "watchers": 1973, "score": 0, "subscribers_count": 35 }, diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index f8116f526c..f70ceeaf9d 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -43,10 +43,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-08-25T08:35:22Z", + "updated_at": "2024-08-26T22:16:04Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1972, - "watchers_count": 1972, + "stargazers_count": 1973, + "watchers_count": 1973, "has_discussions": true, "forks_count": 337, "allow_forking": true, @@ -76,7 +76,7 @@ ], "visibility": "public", "forks": 337, - "watchers": 1972, + "watchers": 1973, "score": 0, "subscribers_count": 35 }, diff --git a/2017/CVE-2017-5693.json b/2017/CVE-2017-5693.json index d7b00e9044..1d95ed8b66 100644 --- a/2017/CVE-2017-5693.json +++ b/2017/CVE-2017-5693.json @@ -18,7 +18,7 @@ "stargazers_count": 15, "watchers_count": 15, "has_discussions": false, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -28,7 +28,7 @@ "security-vulnerability" ], "visibility": "public", - "forks": 3, + "forks": 4, "watchers": 15, "score": 0, "subscribers_count": 4 diff --git a/2017/CVE-2017-8890.json b/2017/CVE-2017-8890.json index f16389916d..402901141d 100644 --- a/2017/CVE-2017-8890.json +++ b/2017/CVE-2017-8890.json @@ -43,10 +43,10 @@ "description": null, "fork": false, "created_at": "2018-07-02T02:21:28Z", - "updated_at": "2023-12-01T07:49:05Z", + "updated_at": "2024-08-26T18:38:39Z", "pushed_at": "2019-05-09T07:07:25Z", - "stargazers_count": 34, - "watchers_count": 34, + "stargazers_count": 35, + "watchers_count": 35, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 14, - "watchers": 34, + "watchers": 35, "score": 0, "subscribers_count": 5 }, diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index ecd5bcfdc9..d88345314e 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -557,10 +557,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-08-25T08:35:22Z", + "updated_at": "2024-08-26T22:16:04Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1972, - "watchers_count": 1972, + "stargazers_count": 1973, + "watchers_count": 1973, "has_discussions": true, "forks_count": 337, "allow_forking": true, @@ -590,7 +590,7 @@ ], "visibility": "public", "forks": 337, - "watchers": 1972, + "watchers": 1973, "score": 0, "subscribers_count": 35 }, diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 9941252179..2ebc3bc0d1 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -43,10 +43,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-08-26T14:25:01Z", + "updated_at": "2024-08-26T23:39:38Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 4092, - "watchers_count": 4092, + "stargazers_count": 4093, + "watchers_count": 4093, "has_discussions": false, "forks_count": 1089, "allow_forking": true, @@ -75,7 +75,7 @@ ], "visibility": "public", "forks": 1089, - "watchers": 4092, + "watchers": 4093, "score": 0, "subscribers_count": 149 }, diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 031a9aa403..9fe23a0ad5 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -193,10 +193,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-08-25T08:35:22Z", + "updated_at": "2024-08-26T22:16:04Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1972, - "watchers_count": 1972, + "stargazers_count": 1973, + "watchers_count": 1973, "has_discussions": true, "forks_count": 337, "allow_forking": true, @@ -226,7 +226,7 @@ ], "visibility": "public", "forks": 337, - "watchers": 1972, + "watchers": 1973, "score": 0, "subscribers_count": 35 } diff --git a/2020/CVE-2020-14179.json b/2020/CVE-2020-14179.json index 9974d1a9a8..238bdc8297 100644 --- a/2020/CVE-2020-14179.json +++ b/2020/CVE-2020-14179.json @@ -78,7 +78,7 @@ "description": "𓃌 - Atlassian Jira Information Disclosure SLA & Field names", "fork": false, "created_at": "2024-05-24T15:49:09Z", - "updated_at": "2024-05-25T16:38:42Z", + "updated_at": "2024-08-26T21:33:26Z", "pushed_at": "2024-05-24T16:00:06Z", "stargazers_count": 1, "watchers_count": 1, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 38181c6ce5..d38e351f5b 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,10 +13,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-08-26T14:25:01Z", + "updated_at": "2024-08-26T23:39:38Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 4092, - "watchers_count": 4092, + "stargazers_count": 4093, + "watchers_count": 4093, "has_discussions": false, "forks_count": 1089, "allow_forking": true, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 1089, - "watchers": 4092, + "watchers": 4093, "score": 0, "subscribers_count": 149 }, diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 8eb4c6d76f..9029d07ae1 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-08-25T08:35:22Z", + "updated_at": "2024-08-26T22:16:04Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1972, - "watchers_count": 1972, + "stargazers_count": 1973, + "watchers_count": 1973, "has_discussions": true, "forks_count": 337, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 337, - "watchers": 1972, + "watchers": 1973, "score": 0, "subscribers_count": 35 }, diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 9625c48642..94a0ea1221 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -696,10 +696,10 @@ "description": "POC exploit for CVE-2021-21972", "fork": false, "created_at": "2021-04-22T14:00:38Z", - "updated_at": "2024-08-21T09:04:18Z", + "updated_at": "2024-08-26T18:25:34Z", "pushed_at": "2022-07-21T20:14:19Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -708,7 +708,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 430cd4c89d..f29dc965e4 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -3591,6 +3591,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index 6f386bde7e..43335687c3 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -48,10 +48,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-13T10:28:12Z", - "updated_at": "2024-08-23T09:14:35Z", + "updated_at": "2024-08-26T21:41:56Z", "pushed_at": "2023-01-29T03:31:27Z", - "stargazers_count": 773, - "watchers_count": 773, + "stargazers_count": 774, + "watchers_count": 774, "has_discussions": false, "forks_count": 118, "allow_forking": true, @@ -60,7 +60,7 @@ "topics": [], "visibility": "public", "forks": 118, - "watchers": 773, + "watchers": 774, "score": 0, "subscribers_count": 13 }, diff --git a/2022/CVE-2022-38694.json b/2022/CVE-2022-38694.json index 28932a6768..ff27d93851 100644 --- a/2022/CVE-2022-38694.json +++ b/2022/CVE-2022-38694.json @@ -13,10 +13,10 @@ "description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692", "fork": false, "created_at": "2023-06-10T08:31:26Z", - "updated_at": "2024-08-25T18:50:01Z", + "updated_at": "2024-08-26T21:39:52Z", "pushed_at": "2024-08-01T15:09:15Z", - "stargazers_count": 250, - "watchers_count": 250, + "stargazers_count": 251, + "watchers_count": 251, "has_discussions": true, "forks_count": 36, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 36, - "watchers": 250, + "watchers": 251, "score": 0, "subscribers_count": 5 }, diff --git a/2023/CVE-2023-41425.json b/2023/CVE-2023-41425.json index 18509649cc..9c6594bd34 100644 --- a/2023/CVE-2023-41425.json +++ b/2023/CVE-2023-41425.json @@ -86,7 +86,7 @@ "description": "WonderCMS RCE CVE-2023-41425", "fork": false, "created_at": "2024-08-12T06:16:17Z", - "updated_at": "2024-08-26T15:21:36Z", + "updated_at": "2024-08-26T22:26:15Z", "pushed_at": "2024-08-12T06:55:30Z", "stargazers_count": 9, "watchers_count": 9, diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index 1da58b26d2..f9ff25d1e8 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -13,10 +13,10 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2024-08-26T16:42:47Z", + "updated_at": "2024-08-26T22:12:56Z", "pushed_at": "2024-08-18T08:26:46Z", - "stargazers_count": 1090, - "watchers_count": 1090, + "stargazers_count": 1091, + "watchers_count": 1091, "has_discussions": false, "forks_count": 188, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 188, - "watchers": 1090, + "watchers": 1091, "score": 0, "subscribers_count": 19 }, diff --git a/2023/CVE-2023-52709.json b/2023/CVE-2023-52709.json index 68a75a9664..d0b6f9da46 100644 --- a/2023/CVE-2023-52709.json +++ b/2023/CVE-2023-52709.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2024-07-08T16:48:29Z", "updated_at": "2024-08-17T18:58:35Z", - "pushed_at": "2024-08-17T18:58:30Z", + "pushed_at": "2024-08-26T21:37:33Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, diff --git a/2023/CVE-2023-5360.json b/2023/CVE-2023-5360.json index 050e1734c4..bd92489b06 100644 --- a/2023/CVE-2023-5360.json +++ b/2023/CVE-2023-5360.json @@ -206,10 +206,10 @@ "description": "The Royal Elementor Addons and Templates WordPress plugin before 1.3.79 does not properly validate uploaded files, which could allow unauthenticated users to upload arbitrary files, such as PHP and achieve RCE.", "fork": false, "created_at": "2023-11-05T18:02:59Z", - "updated_at": "2024-01-22T07:53:10Z", + "updated_at": "2024-08-26T21:06:11Z", "pushed_at": "2023-11-05T18:40:11Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -218,7 +218,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-28000.json b/2024/CVE-2024-28000.json index ad786cdd60..c5e7d3fa7e 100644 --- a/2024/CVE-2024-28000.json +++ b/2024/CVE-2024-28000.json @@ -13,7 +13,7 @@ "description": "LiteSpeed Cache Privilege Escalation PoC", "fork": false, "created_at": "2024-08-24T05:12:56Z", - "updated_at": "2024-08-26T05:20:46Z", + "updated_at": "2024-08-26T22:43:15Z", "pushed_at": "2024-08-25T03:06:56Z", "stargazers_count": 10, "watchers_count": 10, diff --git a/2024/CVE-2024-28397.json b/2024/CVE-2024-28397.json index 177f6a66e9..b9c9c14f4b 100644 --- a/2024/CVE-2024-28397.json +++ b/2024/CVE-2024-28397.json @@ -13,10 +13,10 @@ "description": "CVE-2024-28397: js2py sandbox escape, bypass pyimport restriction.", "fork": false, "created_at": "2024-06-19T01:46:33Z", - "updated_at": "2024-07-29T04:42:46Z", + "updated_at": "2024-08-26T23:37:47Z", "pushed_at": "2024-07-29T04:42:43Z", - "stargazers_count": 28, - "watchers_count": 28, + "stargazers_count": 29, + "watchers_count": 29, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 28, + "watchers": 29, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-30088.json b/2024/CVE-2024-30088.json index 8732696828..5fcf4b82fc 100644 --- a/2024/CVE-2024-30088.json +++ b/2024/CVE-2024-30088.json @@ -103,10 +103,10 @@ "description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088", "fork": false, "created_at": "2024-07-15T08:07:05Z", - "updated_at": "2024-08-26T16:33:45Z", + "updated_at": "2024-08-26T21:51:05Z", "pushed_at": "2024-08-19T15:29:58Z", - "stargazers_count": 309, - "watchers_count": 309, + "stargazers_count": 310, + "watchers_count": 310, "has_discussions": false, "forks_count": 28, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 28, - "watchers": 309, + "watchers": 310, "score": 0, "subscribers_count": 17 }, diff --git a/2024/CVE-2024-36877.json b/2024/CVE-2024-36877.json index 814c9f7ee8..e65a969e57 100644 --- a/2024/CVE-2024-36877.json +++ b/2024/CVE-2024-36877.json @@ -13,10 +13,10 @@ "description": "Exploit POC for CVE-2024-36877", "fork": false, "created_at": "2024-08-09T15:33:04Z", - "updated_at": "2024-08-26T02:49:03Z", + "updated_at": "2024-08-26T23:10:01Z", "pushed_at": "2024-08-14T15:26:18Z", - "stargazers_count": 35, - "watchers_count": 35, + "stargazers_count": 36, + "watchers_count": 36, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 35, + "watchers": 36, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-38063.json b/2024/CVE-2024-38063.json index 8e3341875e..3a45f8950e 100644 --- a/2024/CVE-2024-38063.json +++ b/2024/CVE-2024-38063.json @@ -256,19 +256,19 @@ "description": "poc for CVE-2024-38063 (RCE in tcpip.sys)", "fork": false, "created_at": "2024-08-24T18:25:46Z", - "updated_at": "2024-08-26T18:03:55Z", + "updated_at": "2024-08-27T00:21:33Z", "pushed_at": "2024-08-26T08:14:55Z", - "stargazers_count": 20, - "watchers_count": 20, + "stargazers_count": 45, + "watchers_count": 45, "has_discussions": false, - "forks_count": 4, + "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 4, - "watchers": 20, + "forks": 7, + "watchers": 45, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-40892.json b/2024/CVE-2024-40892.json index d4a5198104..c456dd6d06 100644 --- a/2024/CVE-2024-40892.json +++ b/2024/CVE-2024-40892.json @@ -13,10 +13,10 @@ "description": "Proof of Concept code for interaction with Firewalla via Bluetooth Low-Energy and exploitation of CVE-2024-40892 \/ CVE-2024-40893", "fork": false, "created_at": "2024-08-21T17:27:21Z", - "updated_at": "2024-08-26T15:31:27Z", + "updated_at": "2024-08-26T22:39:25Z", "pushed_at": "2024-08-21T17:35:50Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-4358.json b/2024/CVE-2024-4358.json index 17322b0c1a..f9635c1549 100644 --- a/2024/CVE-2024-4358.json +++ b/2024/CVE-2024-4358.json @@ -163,7 +163,7 @@ "description": "Telerik Report Server deserialization and authentication bypass exploit chain for CVE-2024-4358\/CVE-2024-1800", "fork": false, "created_at": "2024-08-24T10:09:09Z", - "updated_at": "2024-08-24T10:48:47Z", + "updated_at": "2024-08-27T00:24:46Z", "pushed_at": "2024-08-24T10:48:43Z", "stargazers_count": 0, "watchers_count": 0, diff --git a/2024/CVE-2024-5932.json b/2024/CVE-2024-5932.json index d7175457ce..80418df819 100644 --- a/2024/CVE-2024-5932.json +++ b/2024/CVE-2024-5932.json @@ -13,10 +13,10 @@ "description": "Proof-of-Concept for CVE-2024-5932", "fork": false, "created_at": "2024-08-25T11:51:36Z", - "updated_at": "2024-08-26T13:06:01Z", + "updated_at": "2024-08-26T23:00:51Z", "pushed_at": "2024-08-26T13:05:58Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -36,7 +36,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 }