diff --git a/2007/CVE-2007-2447.json b/2007/CVE-2007-2447.json index 33b3aca261..2149e4c45e 100644 --- a/2007/CVE-2007-2447.json +++ b/2007/CVE-2007-2447.json @@ -89,36 +89,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 235003634, - "name": "CVE-2007-2447", - "full_name": "JoseBarrios\/CVE-2007-2447", - "owner": { - "login": "JoseBarrios", - "id": 794342, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/794342?v=4", - "html_url": "https:\/\/github.com\/JoseBarrios" - }, - "html_url": "https:\/\/github.com\/JoseBarrios\/CVE-2007-2447", - "description": "Remote Command Injection Vulnerability (CVE-2007-2447), allows remote attackers to execute arbitrary commands by specifying a Samba username containing shell meta characters.", - "fork": false, - "created_at": "2020-01-20T02:30:35Z", - "updated_at": "2020-01-20T02:30:39Z", - "pushed_at": "2020-01-20T02:30:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 2 - }, { "id": 257885318, "name": "CVE-2007-2447", diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index 52b3cb6c46..b8f2f504e3 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -13,10 +13,10 @@ "description": "A checker (site and tool) for CVE-2014-0160", "fork": false, "created_at": "2014-04-07T23:03:09Z", - "updated_at": "2023-06-22T18:29:23Z", + "updated_at": "2023-07-04T04:48:00Z", "pushed_at": "2021-02-24T09:17:24Z", - "stargazers_count": 2294, - "watchers_count": 2294, + "stargazers_count": 2295, + "watchers_count": 2295, "has_discussions": false, "forks_count": 489, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 489, - "watchers": 2294, + "watchers": 2295, "score": 0, "subscribers_count": 118 }, diff --git a/2016/CVE-2016-3088.json b/2016/CVE-2016-3088.json index 5069921055..0e40f1feb2 100644 --- a/2016/CVE-2016-3088.json +++ b/2016/CVE-2016-3088.json @@ -167,10 +167,10 @@ "description": "ActiveMQ系列漏洞探测利用工具,包括ActiveMQ 默认口令漏洞及ActiveMQ任意文件写入漏洞(CVE-2016-3088),支持批量探测利用。", "fork": false, "created_at": "2022-04-02T08:40:10Z", - "updated_at": "2023-06-29T09:11:25Z", + "updated_at": "2023-07-04T03:15:46Z", "pushed_at": "2022-04-02T08:55:07Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -179,7 +179,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 9, + "watchers": 10, "score": 0, "subscribers_count": 1 } diff --git a/2018/CVE-2018-20250.json b/2018/CVE-2018-20250.json index ebe6fd0c7b..198642fc1b 100644 --- a/2018/CVE-2018-20250.json +++ b/2018/CVE-2018-20250.json @@ -13,10 +13,10 @@ "description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar", "fork": false, "created_at": "2019-02-22T04:52:08Z", - "updated_at": "2023-06-15T01:45:00Z", + "updated_at": "2023-07-04T01:37:08Z", "pushed_at": "2019-08-05T10:45:34Z", - "stargazers_count": 486, - "watchers_count": 486, + "stargazers_count": 487, + "watchers_count": 487, "has_discussions": false, "forks_count": 190, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 190, - "watchers": 486, + "watchers": 487, "score": 0, "subscribers_count": 10 }, diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json index cc312c04ff..d6c7257682 100644 --- a/2018/CVE-2018-5955.json +++ b/2018/CVE-2018-5955.json @@ -48,7 +48,7 @@ "stargazers_count": 610, "watchers_count": 610, "has_discussions": false, - "forks_count": 130, + "forks_count": 131, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -67,7 +67,7 @@ "xss" ], "visibility": "public", - "forks": 130, + "forks": 131, "watchers": 610, "score": 0, "subscribers_count": 16 diff --git a/2018/CVE-2018-8174.json b/2018/CVE-2018-8174.json index 06ef363291..0cb130ce7a 100644 --- a/2018/CVE-2018-8174.json +++ b/2018/CVE-2018-8174.json @@ -43,10 +43,10 @@ "description": "CVE-2018-8174_python", "fork": false, "created_at": "2018-05-30T03:12:32Z", - "updated_at": "2023-06-02T15:24:14Z", + "updated_at": "2023-07-04T01:18:27Z", "pushed_at": "2022-04-19T13:24:53Z", - "stargazers_count": 139, - "watchers_count": 139, + "stargazers_count": 140, + "watchers_count": 140, "has_discussions": false, "forks_count": 70, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 70, - "watchers": 139, + "watchers": 140, "score": 0, "subscribers_count": 2 }, diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 478e2221eb..c1fc38a62d 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -43,10 +43,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2023-07-03T22:04:51Z", + "updated_at": "2023-07-04T04:55:40Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3800, - "watchers_count": 3800, + "stargazers_count": 3801, + "watchers_count": 3801, "has_discussions": false, "forks_count": 1085, "allow_forking": true, @@ -75,7 +75,7 @@ ], "visibility": "public", "forks": 1085, - "watchers": 3800, + "watchers": 3801, "score": 0, "subscribers_count": 155 }, diff --git a/2019/CVE-2019-18935.json b/2019/CVE-2019-18935.json index 594a32c874..394ad4cfae 100644 --- a/2019/CVE-2019-18935.json +++ b/2019/CVE-2019-18935.json @@ -43,10 +43,10 @@ "description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.", "fork": false, "created_at": "2019-12-12T07:58:11Z", - "updated_at": "2023-07-02T00:25:49Z", + "updated_at": "2023-07-04T03:39:07Z", "pushed_at": "2022-04-14T18:23:38Z", - "stargazers_count": 304, - "watchers_count": 304, + "stargazers_count": 306, + "watchers_count": 306, "has_discussions": false, "forks_count": 84, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 84, - "watchers": 304, + "watchers": 306, "score": 0, "subscribers_count": 13 }, diff --git a/2020/CVE-2020-0688.json b/2020/CVE-2020-0688.json index f47141bc19..80aee338da 100644 --- a/2020/CVE-2020-0688.json +++ b/2020/CVE-2020-0688.json @@ -76,7 +76,7 @@ "fork": false, "created_at": "2020-02-27T02:54:27Z", "updated_at": "2023-06-30T02:36:21Z", - "pushed_at": "2023-01-17T13:41:58Z", + "pushed_at": "2023-07-04T05:16:05Z", "stargazers_count": 317, "watchers_count": 317, "has_discussions": false, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 6f70c034f9..68629d87b4 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,10 +13,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2023-07-03T22:04:51Z", + "updated_at": "2023-07-04T04:55:40Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3800, - "watchers_count": 3800, + "stargazers_count": 3801, + "watchers_count": 3801, "has_discussions": false, "forks_count": 1085, "allow_forking": true, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 1085, - "watchers": 3800, + "watchers": 3801, "score": 0, "subscribers_count": 155 }, diff --git a/2021/CVE-2021-22911.json b/2021/CVE-2021-22911.json index 68ad46e5d1..1308f17497 100644 --- a/2021/CVE-2021-22911.json +++ b/2021/CVE-2021-22911.json @@ -13,10 +13,10 @@ "description": "Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1", "fork": false, "created_at": "2021-06-05T15:05:01Z", - "updated_at": "2023-06-16T01:31:18Z", + "updated_at": "2023-07-04T04:33:14Z", "pushed_at": "2023-06-11T08:47:04Z", - "stargazers_count": 50, - "watchers_count": 50, + "stargazers_count": 51, + "watchers_count": 51, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 50, + "watchers": 51, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-38003.json b/2021/CVE-2021-38003.json index 6a644dc701..0706639928 100644 --- a/2021/CVE-2021-38003.json +++ b/2021/CVE-2021-38003.json @@ -18,13 +18,13 @@ "stargazers_count": 24, "watchers_count": 24, "has_discussions": false, - "forks_count": 11, + "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 11, + "forks": 12, "watchers": 24, "score": 0, "subscribers_count": 4 diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index f299e5a340..1a20656be8 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -79,10 +79,10 @@ "description": "CVE-2021-4034 1day", "fork": false, "created_at": "2022-01-25T23:51:37Z", - "updated_at": "2023-07-03T21:18:23Z", + "updated_at": "2023-07-04T02:17:08Z", "pushed_at": "2022-06-08T04:00:28Z", - "stargazers_count": 1832, - "watchers_count": 1832, + "stargazers_count": 1831, + "watchers_count": 1831, "has_discussions": false, "forks_count": 513, "allow_forking": true, @@ -91,7 +91,7 @@ "topics": [], "visibility": "public", "forks": 513, - "watchers": 1832, + "watchers": 1831, "score": 0, "subscribers_count": 22 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 3a673aec39..10dccc0449 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -1268,7 +1268,7 @@ "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "fork": false, "created_at": "2021-12-11T07:19:11Z", - "updated_at": "2023-06-29T20:10:04Z", + "updated_at": "2023-07-04T03:58:27Z", "pushed_at": "2023-06-13T09:17:54Z", "stargazers_count": 696, "watchers_count": 696, @@ -2212,13 +2212,13 @@ "stargazers_count": 16, "watchers_count": 16, "has_discussions": false, - "forks_count": 7, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 7, + "forks": 6, "watchers": 16, "score": 0, "subscribers_count": 3 diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index fb06131ee5..4b50fe74ad 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -1220,13 +1220,13 @@ "stargazers_count": 424, "watchers_count": 424, "has_discussions": false, - "forks_count": 124, + "forks_count": 125, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 124, + "forks": 125, "watchers": 424, "score": 0, "subscribers_count": 15 diff --git a/2022/CVE-2022-26809.json b/2022/CVE-2022-26809.json index 81488173ff..e2d95d2ef9 100644 --- a/2022/CVE-2022-26809.json +++ b/2022/CVE-2022-26809.json @@ -257,10 +257,10 @@ "description": "警惕 一种针对红队的新型溯源手段!", "fork": false, "created_at": "2022-07-27T15:48:19Z", - "updated_at": "2023-07-03T07:25:19Z", + "updated_at": "2023-07-04T03:13:14Z", "pushed_at": "2022-07-27T15:55:01Z", - "stargazers_count": 358, - "watchers_count": 358, + "stargazers_count": 359, + "watchers_count": 359, "has_discussions": false, "forks_count": 82, "allow_forking": true, @@ -269,7 +269,7 @@ "topics": [], "visibility": "public", "forks": 82, - "watchers": 358, + "watchers": 359, "score": 0, "subscribers_count": 2 }, diff --git a/2022/CVE-2022-29464.json b/2022/CVE-2022-29464.json index 5e387e33e2..d355812497 100644 --- a/2022/CVE-2022-29464.json +++ b/2022/CVE-2022-29464.json @@ -769,10 +769,10 @@ "description": "Perform With Mass Exploits In WSO Management.", "fork": false, "created_at": "2023-04-25T09:45:18Z", - "updated_at": "2023-05-10T15:03:46Z", + "updated_at": "2023-07-04T02:51:53Z", "pushed_at": "2023-05-27T16:18:23Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -785,7 +785,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 4, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2022/CVE-2022-38694.json b/2022/CVE-2022-38694.json index 2b44e124b2..4fcceeb824 100644 --- a/2022/CVE-2022-38694.json +++ b/2022/CVE-2022-38694.json @@ -13,10 +13,10 @@ "description": "unlock bootloader for theoretically ALL unisoc ud710 and ums512 model", "fork": false, "created_at": "2023-06-10T08:31:26Z", - "updated_at": "2023-07-03T21:36:58Z", + "updated_at": "2023-07-04T01:11:01Z", "pushed_at": "2023-06-27T17:11:29Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 26, + "watchers_count": 26, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 7, - "watchers": 25, + "watchers": 26, "score": 0, "subscribers_count": 4 } diff --git a/2022/CVE-2022-40494.json b/2022/CVE-2022-40494.json index b919bd49eb..93b77e0104 100644 --- a/2022/CVE-2022-40494.json +++ b/2022/CVE-2022-40494.json @@ -13,10 +13,10 @@ "description": "nps认证绕过利用工具,CVE-2022-40494,使用此工具可在浏览器访问web控制端后台页面,或者批量获取socks5和http代理", "fork": false, "created_at": "2022-08-04T08:22:41Z", - "updated_at": "2023-07-03T14:19:38Z", + "updated_at": "2023-07-04T01:45:23Z", "pushed_at": "2022-08-19T09:04:09Z", - "stargazers_count": 240, - "watchers_count": 240, + "stargazers_count": 242, + "watchers_count": 242, "has_discussions": false, "forks_count": 34, "allow_forking": true, @@ -33,7 +33,7 @@ ], "visibility": "public", "forks": 34, - "watchers": 240, + "watchers": 242, "score": 0, "subscribers_count": 6 } diff --git a/2022/CVE-2022-42889.json b/2022/CVE-2022-42889.json index 1eac54cccd..f991b57986 100644 --- a/2022/CVE-2022-42889.json +++ b/2022/CVE-2022-42889.json @@ -1304,7 +1304,7 @@ "fork": false, "created_at": "2023-05-22T06:57:55Z", "updated_at": "2023-05-23T07:32:45Z", - "pushed_at": "2023-06-29T06:04:29Z", + "pushed_at": "2023-07-04T05:36:44Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-44268.json b/2022/CVE-2022-44268.json index 0bca009e8b..8bb18b4dd4 100644 --- a/2022/CVE-2022-44268.json +++ b/2022/CVE-2022-44268.json @@ -467,6 +467,6 @@ "forks": 1, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2022/CVE-2022-46689.json b/2022/CVE-2022-46689.json index 33a0a30e1c..a2bca32c2a 100644 --- a/2022/CVE-2022-46689.json +++ b/2022/CVE-2022-46689.json @@ -78,13 +78,13 @@ "stargazers_count": 814, "watchers_count": 814, "has_discussions": false, - "forks_count": 56, + "forks_count": 55, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 56, + "forks": 55, "watchers": 814, "score": 0, "subscribers_count": 25 diff --git a/2023/CVE-2023-23752.json b/2023/CVE-2023-23752.json index b4740fac10..eec6f8b30e 100644 --- a/2023/CVE-2023-23752.json +++ b/2023/CVE-2023-23752.json @@ -635,10 +635,10 @@ "description": "Perform With Mass Exploiter In Joomla 4.2.8.", "fork": false, "created_at": "2023-04-09T13:20:48Z", - "updated_at": "2023-06-17T15:57:10Z", + "updated_at": "2023-07-04T02:51:49Z", "pushed_at": "2023-05-24T07:29:16Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -651,7 +651,7 @@ ], "visibility": "public", "forks": 5, - "watchers": 11, + "watchers": 10, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-25136.json b/2023/CVE-2023-25136.json index 5a07b04a8f..83174d363c 100644 --- a/2023/CVE-2023-25136.json +++ b/2023/CVE-2023-25136.json @@ -103,10 +103,10 @@ "description": "OpenSSH Pre-Auth Double Free CVE-2023-25136 POC", "fork": false, "created_at": "2023-04-18T21:47:47Z", - "updated_at": "2023-06-10T12:46:57Z", + "updated_at": "2023-07-04T06:32:00Z", "pushed_at": "2023-04-21T14:22:41Z", - "stargazers_count": 44, - "watchers_count": 44, + "stargazers_count": 45, + "watchers_count": 45, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 44, + "watchers": 45, "score": 0, "subscribers_count": 1 }, @@ -199,10 +199,10 @@ "description": "OpenSSH 9.1漏洞大规模扫描和利用", "fork": false, "created_at": "2023-06-30T09:34:36Z", - "updated_at": "2023-07-03T18:00:45Z", + "updated_at": "2023-07-04T02:18:11Z", "pushed_at": "2023-06-30T09:36:19Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -211,7 +211,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 2, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-27350.json b/2023/CVE-2023-27350.json index c631d5e23e..4b7aef0121 100644 --- a/2023/CVE-2023-27350.json +++ b/2023/CVE-2023-27350.json @@ -133,10 +133,10 @@ "description": "Perfom With Massive Authentication Bypass In PaperCut MF\/NG", "fork": false, "created_at": "2023-05-27T11:32:35Z", - "updated_at": "2023-05-27T15:09:06Z", + "updated_at": "2023-07-04T02:51:51Z", "pushed_at": "2023-05-27T15:24:43Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 0, + "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -149,7 +149,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 1, + "watchers": 0, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-27524.json b/2023/CVE-2023-27524.json index c4817645d2..881a8f7f72 100644 --- a/2023/CVE-2023-27524.json +++ b/2023/CVE-2023-27524.json @@ -133,10 +133,10 @@ "description": "Perform With Apache-SuperSet Leaked Token [CSRF]", "fork": false, "created_at": "2023-05-04T21:43:48Z", - "updated_at": "2023-05-20T22:09:46Z", + "updated_at": "2023-07-04T02:51:38Z", "pushed_at": "2023-05-05T06:56:08Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -149,7 +149,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 2, + "watchers": 1, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-28343.json b/2023/CVE-2023-28343.json index 55e61e4458..227134a09c 100644 --- a/2023/CVE-2023-28343.json +++ b/2023/CVE-2023-28343.json @@ -87,6 +87,6 @@ "forks": 1, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-29343.json b/2023/CVE-2023-29343.json index c78c09d13f..b5cad32080 100644 --- a/2023/CVE-2023-29343.json +++ b/2023/CVE-2023-29343.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-06-18T11:14:08Z", - "updated_at": "2023-07-03T19:38:48Z", + "updated_at": "2023-07-04T04:39:44Z", "pushed_at": "2023-06-18T11:51:54Z", - "stargazers_count": 142, - "watchers_count": 142, + "stargazers_count": 143, + "watchers_count": 143, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 142, + "watchers": 143, "score": 0, "subscribers_count": 4 } diff --git a/2023/CVE-2023-32243.json b/2023/CVE-2023-32243.json index c8b42381f1..80c31352c3 100644 --- a/2023/CVE-2023-32243.json +++ b/2023/CVE-2023-32243.json @@ -301,6 +301,6 @@ "forks": 2, "watchers": 3, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-32315.json b/2023/CVE-2023-32315.json index dadbb1a421..070c4ad6fe 100644 --- a/2023/CVE-2023-32315.json +++ b/2023/CVE-2023-32315.json @@ -133,7 +133,7 @@ "description": null, "fork": false, "created_at": "2023-07-02T20:38:14Z", - "updated_at": "2023-07-03T10:34:46Z", + "updated_at": "2023-07-04T02:52:01Z", "pushed_at": "2023-07-03T01:29:51Z", "stargazers_count": 2, "watchers_count": 2, diff --git a/2023/CVE-2023-34960.json b/2023/CVE-2023-34960.json index 2117c9bf6e..3ea291cc4d 100644 --- a/2023/CVE-2023-34960.json +++ b/2023/CVE-2023-34960.json @@ -57,6 +57,6 @@ "forks": 2, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/README.md b/README.md index 4eae2e5c3c..240e474812 100644 --- a/README.md +++ b/README.md @@ -617,7 +617,7 @@ - [Saboor-Hakimi/CVE-2023-22894](https://github.com/Saboor-Hakimi/CVE-2023-22894) -### CVE-2023-22906 (-) +### CVE-2023-22906 (2023-07-03) Hero Qubo HCD01_02_V1.38_20220125 devices allow TELNET access with root privileges by default, without a password. @@ -32809,7 +32809,6 @@ - [amriunix/CVE-2007-2447](https://github.com/amriunix/CVE-2007-2447) - [Unix13/metasploitable2](https://github.com/Unix13/metasploitable2) - [b1fair/smb_usermap](https://github.com/b1fair/smb_usermap) -- [JoseBarrios/CVE-2007-2447](https://github.com/JoseBarrios/CVE-2007-2447) - [3x1t1um/CVE-2007-2447](https://github.com/3x1t1um/CVE-2007-2447) - [xlcc4096/exploit-CVE-2007-2447](https://github.com/xlcc4096/exploit-CVE-2007-2447) - [WildfootW/CVE-2007-2447_Samba_3.0.25rc3](https://github.com/WildfootW/CVE-2007-2447_Samba_3.0.25rc3) @@ -33145,6 +33144,13 @@ - [alt3kx/CVE-2002-0288](https://github.com/alt3kx/CVE-2002-0288) +### CVE-2002-0289 (2002-05-03) + +Buffer overflow in Phusion web server 1.0 allows remote attackers to cause a denial of service and execute arbitrary code via a long HTTP request. + + +- [alt3kx/CVE-2002-0289](https://github.com/alt3kx/CVE-2002-0289) + ### CVE-2002-0346 (2002-05-03) Cross-site scripting vulnerability in Cobalt RAQ 4 allows remote attackers to execute arbitrary script as other Cobalt users via Javascript in a URL to (1) service.cgi or (2) alert.cgi.