From f7d4f33b9062e4958051e522b942cd608c3faabc Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Mon, 6 May 2024 15:27:33 +0900 Subject: [PATCH] Auto Update 2024/05/06 06:27:33 --- 2019/CVE-2019-12384.json | 8 ++++---- 2019/CVE-2019-17558.json | 4 ++-- 2019/CVE-2019-18634.json | 4 ++-- 2020/CVE-2020-14882.json | 4 ++-- 2021/CVE-2021-1675.json | 8 ++++---- 2021/CVE-2021-21972.json | 8 ++++---- 2021/CVE-2021-22204.json | 2 +- 2021/CVE-2021-33564.json | 8 ++++---- 2021/CVE-2021-4045.json | 8 ++++---- 2021/CVE-2021-44228.json | 16 ++++++++-------- 2022/CVE-2022-0918.json | 8 ++++---- 2022/CVE-2022-22947.json | 8 ++++---- 2022/CVE-2022-22954.json | 8 ++++---- 2022/CVE-2022-22965.json | 4 ++-- 2022/CVE-2022-26923.json | 8 ++++---- 2022/CVE-2022-27925.json | 8 ++++---- 2023/CVE-2023-23752.json | 2 +- 2023/CVE-2023-26136.json | 2 +- 2023/CVE-2023-46604.json | 4 ++-- 2023/CVE-2023-49314.json | 8 ++++---- 2023/CVE-2023-51385.json | 4 ++-- 2023/CVE-2023-51764.json | 8 ++++---- 2024/CVE-2024-1086.json | 10 +++++----- 2024/CVE-2024-21413.json | 8 ++++---- 2024/CVE-2024-25600.json | 2 +- 2024/CVE-2024-27198.json | 8 ++++---- 2024/CVE-2024-27956.json | 10 +++++----- 2024/CVE-2024-28255.json | 8 ++++---- 2024/CVE-2024-3094.json | 2 +- 2024/CVE-2024-3116.json | 8 ++++---- 2024/CVE-2024-32136.json | 2 +- 2024/CVE-2024-33911.json | 2 +- 2024/CVE-2024-3400.json | 4 ++-- 2024/CVE-2024-34470.json | 2 +- 2024/CVE-2024-34471.json | 2 +- 2024/CVE-2024-34472.json | 2 +- 2024/CVE-2024-34474.json | 2 +- 37 files changed, 107 insertions(+), 107 deletions(-) diff --git a/2019/CVE-2019-12384.json b/2019/CVE-2019-12384.json index dee53cef3d..2701f42e7d 100644 --- a/2019/CVE-2019-12384.json +++ b/2019/CVE-2019-12384.json @@ -13,10 +13,10 @@ "description": "Jackson Rce For CVE-2019-12384 ", "fork": false, "created_at": "2019-07-24T07:12:14Z", - "updated_at": "2024-03-19T10:00:06Z", + "updated_at": "2024-05-06T04:38:02Z", "pushed_at": "2019-07-24T07:31:42Z", - "stargazers_count": 98, - "watchers_count": 98, + "stargazers_count": 99, + "watchers_count": 99, "has_discussions": false, "forks_count": 27, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 27, - "watchers": 98, + "watchers": 99, "score": 0, "subscribers_count": 3 }, diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 9ca94625e3..821a43387a 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -48,7 +48,7 @@ "stargazers_count": 4028, "watchers_count": 4028, "has_discussions": false, - "forks_count": 1081, + "forks_count": 1082, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -74,7 +74,7 @@ "webshell" ], "visibility": "public", - "forks": 1081, + "forks": 1082, "watchers": 4028, "score": 0, "subscribers_count": 151 diff --git a/2019/CVE-2019-18634.json b/2019/CVE-2019-18634.json index fc8cfe0a6f..bfe3b5799b 100644 --- a/2019/CVE-2019-18634.json +++ b/2019/CVE-2019-18634.json @@ -48,13 +48,13 @@ "stargazers_count": 198, "watchers_count": 198, "has_discussions": false, - "forks_count": 44, + "forks_count": 45, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 44, + "forks": 45, "watchers": 198, "score": 0, "subscribers_count": 3 diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index edc9f82a3e..318b31b6d7 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -18,7 +18,7 @@ "stargazers_count": 4028, "watchers_count": 4028, "has_discussions": false, - "forks_count": 1081, + "forks_count": 1082, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -44,7 +44,7 @@ "webshell" ], "visibility": "public", - "forks": 1081, + "forks": 1082, "watchers": 4028, "score": 0, "subscribers_count": 151 diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index 11ab734fff..da36067e6b 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -43,10 +43,10 @@ "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527", "fork": false, "created_at": "2021-06-29T17:24:14Z", - "updated_at": "2024-05-01T13:37:37Z", + "updated_at": "2024-05-06T06:06:56Z", "pushed_at": "2021-07-20T15:28:13Z", - "stargazers_count": 1790, - "watchers_count": 1790, + "stargazers_count": 1791, + "watchers_count": 1791, "has_discussions": false, "forks_count": 580, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 580, - "watchers": 1790, + "watchers": 1791, "score": 0, "subscribers_count": 44 }, diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 08e5d756fa..742db0f1cc 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -851,10 +851,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-04-30T08:50:41Z", + "updated_at": "2024-05-06T02:41:21Z", "pushed_at": "2024-04-25T06:09:38Z", - "stargazers_count": 1253, - "watchers_count": 1253, + "stargazers_count": 1254, + "watchers_count": 1254, "has_discussions": false, "forks_count": 159, "allow_forking": true, @@ -870,7 +870,7 @@ ], "visibility": "public", "forks": 159, - "watchers": 1253, + "watchers": 1254, "score": 0, "subscribers_count": 14 } diff --git a/2021/CVE-2021-22204.json b/2021/CVE-2021-22204.json index 2b570aaae9..ae4111cbe9 100644 --- a/2021/CVE-2021-22204.json +++ b/2021/CVE-2021-22204.json @@ -343,7 +343,7 @@ "forks": 3, "watchers": 32, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 }, { "id": 640427326, diff --git a/2021/CVE-2021-33564.json b/2021/CVE-2021-33564.json index c310df4222..539b052fdd 100644 --- a/2021/CVE-2021-33564.json +++ b/2021/CVE-2021-33564.json @@ -13,10 +13,10 @@ "description": "Argument Injection in Dragonfly Ruby Gem", "fork": false, "created_at": "2021-05-25T02:48:08Z", - "updated_at": "2023-04-13T06:48:00Z", + "updated_at": "2024-05-06T05:09:25Z", "pushed_at": "2021-05-26T21:30:29Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 16, + "watchers_count": 16, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 15, + "watchers": 16, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-4045.json b/2021/CVE-2021-4045.json index c47e7fc78b..18abe29327 100644 --- a/2021/CVE-2021-4045.json +++ b/2021/CVE-2021-4045.json @@ -13,10 +13,10 @@ "description": "Exploit for command injection vulnerability found in uhttpd binary from TP-Link Tapo c200 IP camera", "fork": false, "created_at": "2021-11-15T14:48:14Z", - "updated_at": "2024-05-02T00:58:29Z", + "updated_at": "2024-05-06T01:34:16Z", "pushed_at": "2023-01-01T21:12:20Z", - "stargazers_count": 59, - "watchers_count": 59, + "stargazers_count": 60, + "watchers_count": 60, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 10, - "watchers": 59, + "watchers": 60, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 54d913e484..d183f0f2d9 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -103,10 +103,10 @@ "description": "Remote Code Injection In Log4j", "fork": false, "created_at": "2021-12-10T05:23:44Z", - "updated_at": "2024-04-15T17:18:33Z", + "updated_at": "2024-05-06T06:05:35Z", "pushed_at": "2022-01-18T12:01:52Z", - "stargazers_count": 450, - "watchers_count": 450, + "stargazers_count": 451, + "watchers_count": 451, "has_discussions": false, "forks_count": 127, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 127, - "watchers": 450, + "watchers": 451, "score": 0, "subscribers_count": 8 }, @@ -1966,10 +1966,10 @@ "description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC", "fork": false, "created_at": "2021-12-12T00:29:03Z", - "updated_at": "2024-04-27T16:15:50Z", + "updated_at": "2024-05-06T06:06:03Z", "pushed_at": "2022-03-10T18:44:50Z", - "stargazers_count": 630, - "watchers_count": 630, + "stargazers_count": 629, + "watchers_count": 629, "has_discussions": false, "forks_count": 98, "allow_forking": true, @@ -1990,7 +1990,7 @@ ], "visibility": "public", "forks": 98, - "watchers": 630, + "watchers": 629, "score": 0, "subscribers_count": 28 }, diff --git a/2022/CVE-2022-0918.json b/2022/CVE-2022-0918.json index 7163917536..1e4fb75453 100644 --- a/2022/CVE-2022-0918.json +++ b/2022/CVE-2022-0918.json @@ -13,10 +13,10 @@ "description": "CVE-2022-0918", "fork": false, "created_at": "2022-05-10T03:50:18Z", - "updated_at": "2023-07-06T22:03:34Z", + "updated_at": "2024-05-06T03:37:35Z", "pushed_at": "2022-05-13T17:28:20Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 2 } diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json index 45ad6d09f4..2468990729 100644 --- a/2022/CVE-2022-22947.json +++ b/2022/CVE-2022-22947.json @@ -1284,10 +1284,10 @@ "description": "CVE-2022-22947 注入Godzilla内存马", "fork": false, "created_at": "2022-04-26T05:48:27Z", - "updated_at": "2024-04-29T03:31:49Z", + "updated_at": "2024-05-06T05:34:12Z", "pushed_at": "2022-04-26T05:55:58Z", - "stargazers_count": 197, - "watchers_count": 197, + "stargazers_count": 198, + "watchers_count": 198, "has_discussions": false, "forks_count": 27, "allow_forking": true, @@ -1296,7 +1296,7 @@ "topics": [], "visibility": "public", "forks": 27, - "watchers": 197, + "watchers": 198, "score": 0, "subscribers_count": 5 }, diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index d0f7ca181c..645e656691 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -766,10 +766,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-04-30T08:50:41Z", + "updated_at": "2024-05-06T02:41:21Z", "pushed_at": "2024-04-25T06:09:38Z", - "stargazers_count": 1253, - "watchers_count": 1253, + "stargazers_count": 1254, + "watchers_count": 1254, "has_discussions": false, "forks_count": 159, "allow_forking": true, @@ -785,7 +785,7 @@ ], "visibility": "public", "forks": 159, - "watchers": 1253, + "watchers": 1254, "score": 0, "subscribers_count": 14 }, diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json index 61b20bbe9d..98646620f1 100644 --- a/2022/CVE-2022-22965.json +++ b/2022/CVE-2022-22965.json @@ -133,13 +133,13 @@ "stargazers_count": 307, "watchers_count": 307, "has_discussions": false, - "forks_count": 234, + "forks_count": 235, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 234, + "forks": 235, "watchers": 307, "score": 0, "subscribers_count": 10 diff --git a/2022/CVE-2022-26923.json b/2022/CVE-2022-26923.json index 62e440d8da..cf8691b996 100644 --- a/2022/CVE-2022-26923.json +++ b/2022/CVE-2022-26923.json @@ -103,10 +103,10 @@ "description": "检测域内常见一把梭漏洞,包括:NoPac、ZeroLogon、CVE-2022-26923、PrintNightMare", "fork": false, "created_at": "2023-10-17T06:29:44Z", - "updated_at": "2024-04-22T15:14:50Z", + "updated_at": "2024-05-06T02:32:57Z", "pushed_at": "2023-10-23T04:47:11Z", - "stargazers_count": 19, - "watchers_count": 19, + "stargazers_count": 20, + "watchers_count": 20, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 19, + "watchers": 20, "score": 0, "subscribers_count": 2 }, diff --git a/2022/CVE-2022-27925.json b/2022/CVE-2022-27925.json index 79c853f896..0b8c6709d3 100644 --- a/2022/CVE-2022-27925.json +++ b/2022/CVE-2022-27925.json @@ -13,10 +13,10 @@ "description": "Zimbra RCE simple poc", "fork": false, "created_at": "2022-08-12T18:35:52Z", - "updated_at": "2024-01-04T17:11:05Z", + "updated_at": "2024-05-06T02:21:50Z", "pushed_at": "2022-08-13T18:54:58Z", - "stargazers_count": 63, - "watchers_count": 63, + "stargazers_count": 64, + "watchers_count": 64, "has_discussions": false, "forks_count": 27, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 27, - "watchers": 63, + "watchers": 64, "score": 0, "subscribers_count": 3 }, diff --git a/2023/CVE-2023-23752.json b/2023/CVE-2023-23752.json index 24b082cdbd..a21f1bf79c 100644 --- a/2023/CVE-2023-23752.json +++ b/2023/CVE-2023-23752.json @@ -1501,6 +1501,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-26136.json b/2023/CVE-2023-26136.json index 9d7ada85f8..0df4696d3c 100644 --- a/2023/CVE-2023-26136.json +++ b/2023/CVE-2023-26136.json @@ -87,6 +87,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-46604.json b/2023/CVE-2023-46604.json index 6ea01effca..fc7b220625 100644 --- a/2023/CVE-2023-46604.json +++ b/2023/CVE-2023-46604.json @@ -48,13 +48,13 @@ "stargazers_count": 205, "watchers_count": 205, "has_discussions": false, - "forks_count": 26, + "forks_count": 27, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 26, + "forks": 27, "watchers": 205, "score": 0, "subscribers_count": 4 diff --git a/2023/CVE-2023-49314.json b/2023/CVE-2023-49314.json index 5aa59e377f..3d214f8577 100644 --- a/2023/CVE-2023-49314.json +++ b/2023/CVE-2023-49314.json @@ -13,10 +13,10 @@ "description": "Asana Desktop 2.1.0 on macOS allows code injection because of specific Electron Fuses. There is inadequate protection against code injection through settings such as RunAsNode and enableNodeCliInspectArguments, and thus r3ggi\/electroniz3r can be used to perform an attack.", "fork": false, "created_at": "2023-11-28T10:39:19Z", - "updated_at": "2024-02-06T22:48:52Z", + "updated_at": "2024-05-06T04:13:03Z", "pushed_at": "2023-11-28T11:48:48Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-51385.json b/2023/CVE-2023-51385.json index 35bccb6c44..1f8abeafa7 100644 --- a/2023/CVE-2023-51385.json +++ b/2023/CVE-2023-51385.json @@ -18,13 +18,13 @@ "stargazers_count": 45, "watchers_count": 45, "has_discussions": false, - "forks_count": 36, + "forks_count": 35, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 36, + "forks": 35, "watchers": 45, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-51764.json b/2023/CVE-2023-51764.json index cc3bc08fae..66ff1fd11b 100644 --- a/2023/CVE-2023-51764.json +++ b/2023/CVE-2023-51764.json @@ -13,10 +13,10 @@ "description": "Postfix SMTP Smuggling - Expect Script POC", "fork": false, "created_at": "2023-12-26T17:02:20Z", - "updated_at": "2024-03-20T18:17:06Z", + "updated_at": "2024-05-06T01:23:15Z", "pushed_at": "2023-12-26T20:16:45Z", - "stargazers_count": 26, - "watchers_count": 26, + "stargazers_count": 27, + "watchers_count": 27, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 26, + "watchers": 27, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index 40158628b3..a58e093651 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -13,10 +13,10 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2024-05-05T21:42:35Z", + "updated_at": "2024-05-06T01:38:25Z", "pushed_at": "2024-04-17T16:09:54Z", - "stargazers_count": 1909, - "watchers_count": 1909, + "stargazers_count": 1910, + "watchers_count": 1910, "has_discussions": false, "forks_count": 238, "allow_forking": true, @@ -31,9 +31,9 @@ ], "visibility": "public", "forks": 238, - "watchers": 1909, + "watchers": 1910, "score": 0, - "subscribers_count": 20 + "subscribers_count": 21 }, { "id": 781477717, diff --git a/2024/CVE-2024-21413.json b/2024/CVE-2024-21413.json index efa6e3e2be..9083ce99bf 100644 --- a/2024/CVE-2024-21413.json +++ b/2024/CVE-2024-21413.json @@ -43,10 +43,10 @@ "description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability", "fork": false, "created_at": "2024-02-16T15:17:59Z", - "updated_at": "2024-05-05T17:11:41Z", + "updated_at": "2024-05-06T00:50:17Z", "pushed_at": "2024-02-19T20:00:35Z", - "stargazers_count": 582, - "watchers_count": 582, + "stargazers_count": 583, + "watchers_count": 583, "has_discussions": false, "forks_count": 128, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 128, - "watchers": 582, + "watchers": 583, "score": 0, "subscribers_count": 9 }, diff --git a/2024/CVE-2024-25600.json b/2024/CVE-2024-25600.json index 8bb5522c6f..e25755f311 100644 --- a/2024/CVE-2024-25600.json +++ b/2024/CVE-2024-25600.json @@ -255,6 +255,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-27198.json b/2024/CVE-2024-27198.json index e5c7c49622..a0382983f6 100644 --- a/2024/CVE-2024-27198.json +++ b/2024/CVE-2024-27198.json @@ -13,10 +13,10 @@ "description": "Proof of Concept for Authentication Bypass in JetBrains TeamCity Pre-2023.11.4", "fork": false, "created_at": "2024-03-04T22:44:36Z", - "updated_at": "2024-04-23T11:46:34Z", + "updated_at": "2024-05-06T05:12:49Z", "pushed_at": "2024-03-05T20:53:11Z", - "stargazers_count": 27, - "watchers_count": 27, + "stargazers_count": 28, + "watchers_count": 28, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 27, + "watchers": 28, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-27956.json b/2024/CVE-2024-27956.json index 67ca3b0245..a05db52bdc 100644 --- a/2024/CVE-2024-27956.json +++ b/2024/CVE-2024-27956.json @@ -43,10 +43,10 @@ "description": "PoC for SQL Injection in CVE-2024-27956", "fork": false, "created_at": "2024-05-01T01:58:28Z", - "updated_at": "2024-05-05T19:23:07Z", + "updated_at": "2024-05-06T04:14:11Z", "pushed_at": "2024-05-03T11:28:21Z", - "stargazers_count": 29, - "watchers_count": 29, + "stargazers_count": 31, + "watchers_count": 31, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 29, + "watchers": 31, "score": 0, "subscribers_count": 1 }, @@ -117,6 +117,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-28255.json b/2024/CVE-2024-28255.json index 7c6bd699e2..58d19fbcec 100644 --- a/2024/CVE-2024-28255.json +++ b/2024/CVE-2024-28255.json @@ -13,10 +13,10 @@ "description": "OpenMetadata_RCE (CVE-2024-28255) Batch scan\/exploit", "fork": false, "created_at": "2024-04-12T04:29:58Z", - "updated_at": "2024-04-19T10:48:35Z", + "updated_at": "2024-05-06T05:45:30Z", "pushed_at": "2024-04-12T04:41:18Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index a81cce0d0d..fec38892f2 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -1026,7 +1026,7 @@ "forks": 232, "watchers": 3454, "score": 0, - "subscribers_count": 37 + "subscribers_count": 38 }, { "id": 780480213, diff --git a/2024/CVE-2024-3116.json b/2024/CVE-2024-3116.json index 9f002fbcf9..696e95275f 100644 --- a/2024/CVE-2024-3116.json +++ b/2024/CVE-2024-3116.json @@ -13,10 +13,10 @@ "description": "Making a lab and testing the CVE-2024-3116, a Remote Code Execution in pgadmin <=8.4", "fork": false, "created_at": "2024-04-07T23:03:55Z", - "updated_at": "2024-05-02T16:18:41Z", + "updated_at": "2024-05-06T01:39:14Z", "pushed_at": "2024-04-11T01:38:55Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 7, + "watchers": 8, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-32136.json b/2024/CVE-2024-32136.json index 86e8bc31b5..8ab0696d6a 100644 --- a/2024/CVE-2024-32136.json +++ b/2024/CVE-2024-32136.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-33911.json b/2024/CVE-2024-33911.json index 9a8af405a9..1386e46c8c 100644 --- a/2024/CVE-2024-33911.json +++ b/2024/CVE-2024-33911.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-3400.json b/2024/CVE-2024-3400.json index d864a3b10b..9bd280d3c5 100644 --- a/2024/CVE-2024-3400.json +++ b/2024/CVE-2024-3400.json @@ -288,13 +288,13 @@ "stargazers_count": 128, "watchers_count": 128, "has_discussions": false, - "forks_count": 19, + "forks_count": 20, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 19, + "forks": 20, "watchers": 128, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-34470.json b/2024/CVE-2024-34470.json index 8398de6be9..ea2267bc5c 100644 --- a/2024/CVE-2024-34470.json +++ b/2024/CVE-2024-34470.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-34471.json b/2024/CVE-2024-34471.json index 1da5f5bda0..8c78b4f88a 100644 --- a/2024/CVE-2024-34471.json +++ b/2024/CVE-2024-34471.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-34472.json b/2024/CVE-2024-34472.json index 5adc999b91..df9c18f874 100644 --- a/2024/CVE-2024-34472.json +++ b/2024/CVE-2024-34472.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-34474.json b/2024/CVE-2024-34474.json index b165270438..5c76ff4f60 100644 --- a/2024/CVE-2024-34474.json +++ b/2024/CVE-2024-34474.json @@ -27,6 +27,6 @@ "forks": 1, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file