diff --git a/2006/CVE-2006-1236.json b/2006/CVE-2006-1236.json
deleted file mode 100644
index 0a18b3e9b1..0000000000
--- a/2006/CVE-2006-1236.json
+++ /dev/null
@@ -1,32 +0,0 @@
-[
- {
- "id": 168247796,
- "name": "CVE-2006-1236",
- "full_name": "Axua\/CVE-2006-1236",
- "owner": {
- "login": "Axua",
- "id": 28788087,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28788087?v=4",
- "html_url": "https:\/\/github.com\/Axua"
- },
- "html_url": "https:\/\/github.com\/Axua\/CVE-2006-1236",
- "description": "Exploit script for Crossfire 1.9.0",
- "fork": false,
- "created_at": "2019-01-29T23:46:59Z",
- "updated_at": "2019-01-29T23:50:30Z",
- "pushed_at": "2019-01-29T23:50:29Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 1,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 1,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 1
- }
-]
\ No newline at end of file
diff --git a/2007/CVE-2007-2447.json b/2007/CVE-2007-2447.json
index 0f455ba2b1..8b9b29558c 100644
--- a/2007/CVE-2007-2447.json
+++ b/2007/CVE-2007-2447.json
@@ -1,34 +1,4 @@
[
- {
- "id": 143461594,
- "name": "CVE-2007-2447",
- "full_name": "amriunix\/CVE-2007-2447",
- "owner": {
- "login": "amriunix",
- "id": 6618368,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6618368?v=4",
- "html_url": "https:\/\/github.com\/amriunix"
- },
- "html_url": "https:\/\/github.com\/amriunix\/CVE-2007-2447",
- "description": "CVE-2007-2447 - Samba usermap script",
- "fork": false,
- "created_at": "2018-08-03T18:39:56Z",
- "updated_at": "2023-12-27T00:25:05Z",
- "pushed_at": "2020-08-16T18:54:38Z",
- "stargazers_count": 52,
- "watchers_count": 52,
- "has_discussions": false,
- "forks_count": 32,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 32,
- "watchers": 52,
- "score": 0,
- "subscribers_count": 2
- },
{
"id": 195401614,
"name": "metasploitable2",
diff --git a/2010/CVE-2010-3847.json b/2010/CVE-2010-3847.json
new file mode 100644
index 0000000000..547110281f
--- /dev/null
+++ b/2010/CVE-2010-3847.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 77808380,
+ "name": "cve-2010-3847",
+ "full_name": "magisterquis\/cve-2010-3847",
+ "owner": {
+ "login": "magisterquis",
+ "id": 499530,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/499530?v=4",
+ "html_url": "https:\/\/github.com\/magisterquis"
+ },
+ "html_url": "https:\/\/github.com\/magisterquis\/cve-2010-3847",
+ "description": "Script to take advantage of CVE-2010-3847",
+ "fork": false,
+ "created_at": "2017-01-02T03:20:36Z",
+ "updated_at": "2023-12-01T01:00:57Z",
+ "pushed_at": "2017-01-02T20:12:44Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 3,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 3,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 2
+ }
+]
\ No newline at end of file
diff --git a/2014/CVE-2014-2734.json b/2014/CVE-2014-2734.json
index 06170afaf3..0bb31b0486 100644
--- a/2014/CVE-2014-2734.json
+++ b/2014/CVE-2014-2734.json
@@ -28,35 +28,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 2
- },
- {
- "id": 18869401,
- "name": "cve-2014-2734",
- "full_name": "adrienthebo\/cve-2014-2734",
- "owner": {
- "login": "adrienthebo",
- "id": 172194,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172194?v=4",
- "html_url": "https:\/\/github.com\/adrienthebo"
- },
- "html_url": "https:\/\/github.com\/adrienthebo\/cve-2014-2734",
- "description": "I think this CVE is full of lies and deceit and very confusing code.",
- "fork": false,
- "created_at": "2014-04-17T06:51:01Z",
- "updated_at": "2023-01-28T20:50:55Z",
- "pushed_at": "2014-04-17T07:07:06Z",
- "stargazers_count": 1,
- "watchers_count": 1,
- "has_discussions": false,
- "forks_count": 1,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 1,
- "watchers": 1,
- "score": 0,
- "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json
index c0959d4d1a..918ba4947a 100644
--- a/2014/CVE-2014-4210.json
+++ b/2014/CVE-2014-4210.json
@@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2024-01-04T16:41:20Z",
+ "updated_at": "2024-01-05T02:52:41Z",
"pushed_at": "2023-11-24T09:21:56Z",
- "stargazers_count": 1859,
- "watchers_count": 1859,
+ "stargazers_count": 1858,
+ "watchers_count": 1858,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 340,
- "watchers": 1859,
+ "watchers": 1858,
"score": 0,
"subscribers_count": 35
},
diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json
index 76a55303eb..0744efb485 100644
--- a/2016/CVE-2016-0638.json
+++ b/2016/CVE-2016-0638.json
@@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2024-01-04T16:41:20Z",
+ "updated_at": "2024-01-05T02:52:41Z",
"pushed_at": "2023-11-24T09:21:56Z",
- "stargazers_count": 1859,
- "watchers_count": 1859,
+ "stargazers_count": 1858,
+ "watchers_count": 1858,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 340,
- "watchers": 1859,
+ "watchers": 1858,
"score": 0,
"subscribers_count": 35
},
diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json
index 9910ef6c91..53a05fa3d7 100644
--- a/2017/CVE-2017-3248.json
+++ b/2017/CVE-2017-3248.json
@@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2024-01-04T16:41:20Z",
+ "updated_at": "2024-01-05T02:52:41Z",
"pushed_at": "2023-11-24T09:21:56Z",
- "stargazers_count": 1859,
- "watchers_count": 1859,
+ "stargazers_count": 1858,
+ "watchers_count": 1858,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 340,
- "watchers": 1859,
+ "watchers": 1858,
"score": 0,
"subscribers_count": 35
},
diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json
index 4681511645..24890943bc 100644
--- a/2018/CVE-2018-2628.json
+++ b/2018/CVE-2018-2628.json
@@ -587,10 +587,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2024-01-04T16:41:20Z",
+ "updated_at": "2024-01-05T02:52:41Z",
"pushed_at": "2023-11-24T09:21:56Z",
- "stargazers_count": 1859,
- "watchers_count": 1859,
+ "stargazers_count": 1858,
+ "watchers_count": 1858,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@@ -620,7 +620,7 @@
],
"visibility": "public",
"forks": 340,
- "watchers": 1859,
+ "watchers": 1858,
"score": 0,
"subscribers_count": 35
},
diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json
index a1b0d4b1a1..8c612e96d4 100644
--- a/2019/CVE-2019-2618.json
+++ b/2019/CVE-2019-2618.json
@@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2024-01-04T16:41:20Z",
+ "updated_at": "2024-01-05T02:52:41Z",
"pushed_at": "2023-11-24T09:21:56Z",
- "stargazers_count": 1859,
- "watchers_count": 1859,
+ "stargazers_count": 1858,
+ "watchers_count": 1858,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@@ -226,7 +226,7 @@
],
"visibility": "public",
"forks": 340,
- "watchers": 1859,
+ "watchers": 1858,
"score": 0,
"subscribers_count": 35
}
diff --git a/2019/CVE-2019-9506.json b/2019/CVE-2019-9506.json
index c2c9858e41..972c6be6fd 100644
--- a/2019/CVE-2019-9506.json
+++ b/2019/CVE-2019-9506.json
@@ -13,10 +13,10 @@
"description": "Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR\/EDR and BLE [CVE-2019-9506]",
"fork": false,
"created_at": "2019-08-15T11:54:21Z",
- "updated_at": "2023-12-13T08:48:13Z",
+ "updated_at": "2024-01-05T01:51:54Z",
"pushed_at": "2022-04-04T15:16:08Z",
- "stargazers_count": 169,
- "watchers_count": 169,
+ "stargazers_count": 170,
+ "watchers_count": 170,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@@ -35,7 +35,7 @@
],
"visibility": "public",
"forks": 37,
- "watchers": 169,
+ "watchers": 170,
"score": 0,
"subscribers_count": 13
}
diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json
index bf0b1787c2..097eceb423 100644
--- a/2020/CVE-2020-2551.json
+++ b/2020/CVE-2020-2551.json
@@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2024-01-04T16:41:20Z",
+ "updated_at": "2024-01-05T02:52:41Z",
"pushed_at": "2023-11-24T09:21:56Z",
- "stargazers_count": 1859,
- "watchers_count": 1859,
+ "stargazers_count": 1858,
+ "watchers_count": 1858,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 340,
- "watchers": 1859,
+ "watchers": 1858,
"score": 0,
"subscribers_count": 35
},
diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json
index 4ce274e5ea..37c764173f 100644
--- a/2021/CVE-2021-21972.json
+++ b/2021/CVE-2021-21972.json
@@ -851,10 +851,10 @@
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
- "updated_at": "2024-01-04T01:38:27Z",
+ "updated_at": "2024-01-05T03:46:55Z",
"pushed_at": "2023-12-06T15:30:56Z",
- "stargazers_count": 1191,
- "watchers_count": 1191,
+ "stargazers_count": 1193,
+ "watchers_count": 1193,
"has_discussions": false,
"forks_count": 154,
"allow_forking": true,
@@ -870,7 +870,7 @@
],
"visibility": "public",
"forks": 154,
- "watchers": 1191,
+ "watchers": 1193,
"score": 0,
"subscribers_count": 11
}
diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json
index c4ec99ee73..ad7d4ec804 100644
--- a/2022/CVE-2022-0847.json
+++ b/2022/CVE-2022-0847.json
@@ -1100,13 +1100,13 @@
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
- "forks_count": 7,
+ "forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 7,
+ "forks": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
@@ -1190,13 +1190,13 @@
"stargazers_count": 474,
"watchers_count": 474,
"has_discussions": false,
- "forks_count": 135,
+ "forks_count": 136,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 135,
+ "forks": 136,
"watchers": 474,
"score": 0,
"subscribers_count": 15
diff --git a/2022/CVE-2022-21661.json b/2022/CVE-2022-21661.json
index 5a0706cd79..aececaa039 100644
--- a/2022/CVE-2022-21661.json
+++ b/2022/CVE-2022-21661.json
@@ -308,6 +308,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json
index a64451a7d2..668b18a65b 100644
--- a/2022/CVE-2022-22954.json
+++ b/2022/CVE-2022-22954.json
@@ -796,10 +796,10 @@
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
- "updated_at": "2024-01-04T01:38:27Z",
+ "updated_at": "2024-01-05T03:46:55Z",
"pushed_at": "2023-12-06T15:30:56Z",
- "stargazers_count": 1191,
- "watchers_count": 1191,
+ "stargazers_count": 1193,
+ "watchers_count": 1193,
"has_discussions": false,
"forks_count": 154,
"allow_forking": true,
@@ -815,7 +815,7 @@
],
"visibility": "public",
"forks": 154,
- "watchers": 1191,
+ "watchers": 1193,
"score": 0,
"subscribers_count": 11
},
diff --git a/2022/CVE-2022-24442.json b/2022/CVE-2022-24442.json
index a96d7c7d07..b29a99b316 100644
--- a/2022/CVE-2022-24442.json
+++ b/2022/CVE-2022-24442.json
@@ -37,6 +37,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json
index 241ce40443..03ad66d528 100644
--- a/2022/CVE-2022-26134.json
+++ b/2022/CVE-2022-26134.json
@@ -158,10 +158,10 @@
"description": "CVE-2022-26134 Proof of Concept",
"fork": false,
"created_at": "2022-06-03T13:59:19Z",
- "updated_at": "2024-01-04T17:09:07Z",
+ "updated_at": "2024-01-05T02:28:12Z",
"pushed_at": "2022-06-06T16:38:49Z",
- "stargazers_count": 150,
- "watchers_count": 150,
+ "stargazers_count": 151,
+ "watchers_count": 151,
"has_discussions": false,
"forks_count": 47,
"allow_forking": true,
@@ -174,7 +174,7 @@
],
"visibility": "public",
"forks": 47,
- "watchers": 150,
+ "watchers": 151,
"score": 0,
"subscribers_count": 1
},
diff --git a/2022/CVE-2022-45688.json b/2022/CVE-2022-45688.json
index 0a50eeb2cb..cb1262c312 100644
--- a/2022/CVE-2022-45688.json
+++ b/2022/CVE-2022-45688.json
@@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-12-27T22:05:06Z",
"updated_at": "2023-12-27T22:58:41Z",
- "pushed_at": "2024-01-05T00:12:42Z",
+ "pushed_at": "2024-01-05T06:25:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@@ -44,7 +44,7 @@
"fork": false,
"created_at": "2023-12-29T00:14:20Z",
"updated_at": "2023-12-29T02:00:00Z",
- "pushed_at": "2024-01-05T00:13:30Z",
+ "pushed_at": "2024-01-05T06:22:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@@ -74,7 +74,7 @@
"fork": false,
"created_at": "2023-12-29T02:01:22Z",
"updated_at": "2023-12-29T08:19:56Z",
- "pushed_at": "2024-01-05T00:13:53Z",
+ "pushed_at": "2024-01-05T06:24:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
diff --git a/2022/CVE-2022-46689.json b/2022/CVE-2022-46689.json
index 8756708c67..a8c9d7893b 100644
--- a/2022/CVE-2022-46689.json
+++ b/2022/CVE-2022-46689.json
@@ -43,10 +43,10 @@
"description": "CVE-2022-46689",
"fork": false,
"created_at": "2022-12-26T00:08:55Z",
- "updated_at": "2024-01-02T14:37:29Z",
+ "updated_at": "2024-01-05T01:21:41Z",
"pushed_at": "2023-10-10T16:53:48Z",
- "stargazers_count": 115,
- "watchers_count": 115,
+ "stargazers_count": 114,
+ "watchers_count": 114,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
- "watchers": 115,
+ "watchers": 114,
"score": 0,
"subscribers_count": 8
},
diff --git a/2023/CVE-2023-27163.json b/2023/CVE-2023-27163.json
index 0078a4a6f8..248f7c7973 100644
--- a/2023/CVE-2023-27163.json
+++ b/2023/CVE-2023-27163.json
@@ -432,6 +432,6 @@
"forks": 0,
"watchers": 2,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 2
}
]
\ No newline at end of file
diff --git a/2023/CVE-2023-27997.json b/2023/CVE-2023-27997.json
index 4e5073e886..bb52d3ed77 100644
--- a/2023/CVE-2023-27997.json
+++ b/2023/CVE-2023-27997.json
@@ -223,10 +223,10 @@
"description": "xortigate-cve-2023-27997",
"fork": false,
"created_at": "2023-10-12T16:12:41Z",
- "updated_at": "2023-12-19T14:21:06Z",
+ "updated_at": "2024-01-05T02:26:45Z",
"pushed_at": "2023-10-12T16:17:23Z",
- "stargazers_count": 49,
- "watchers_count": 49,
+ "stargazers_count": 50,
+ "watchers_count": 50,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
- "watchers": 49,
+ "watchers": 50,
"score": 0,
"subscribers_count": 4
},
diff --git a/2023/CVE-2023-29360.json b/2023/CVE-2023-29360.json
index 2b32b629bf..a9df5ab22d 100644
--- a/2023/CVE-2023-29360.json
+++ b/2023/CVE-2023-29360.json
@@ -13,19 +13,19 @@
"description": "Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver",
"fork": false,
"created_at": "2023-09-24T21:59:23Z",
- "updated_at": "2024-01-05T00:00:02Z",
+ "updated_at": "2024-01-05T04:13:42Z",
"pushed_at": "2023-10-12T19:18:32Z",
- "stargazers_count": 91,
- "watchers_count": 91,
+ "stargazers_count": 94,
+ "watchers_count": 94,
"has_discussions": false,
- "forks_count": 27,
+ "forks_count": 28,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 27,
- "watchers": 91,
+ "forks": 28,
+ "watchers": 94,
"score": 0,
"subscribers_count": 2
}
diff --git a/2023/CVE-2023-3269.json b/2023/CVE-2023-3269.json
index 19d3649dd6..e4c98419e9 100644
--- a/2023/CVE-2023-3269.json
+++ b/2023/CVE-2023-3269.json
@@ -13,10 +13,10 @@
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
"fork": false,
"created_at": "2023-06-28T13:22:26Z",
- "updated_at": "2024-01-04T15:56:57Z",
+ "updated_at": "2024-01-05T01:51:42Z",
"pushed_at": "2023-07-28T13:20:45Z",
- "stargazers_count": 433,
- "watchers_count": 433,
+ "stargazers_count": 432,
+ "watchers_count": 432,
"has_discussions": false,
"forks_count": 44,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 44,
- "watchers": 433,
+ "watchers": 432,
"score": 0,
"subscribers_count": 14
}
diff --git a/2023/CVE-2023-3460.json b/2023/CVE-2023-3460.json
index 3d62846199..53e93f4171 100644
--- a/2023/CVE-2023-3460.json
+++ b/2023/CVE-2023-3460.json
@@ -226,8 +226,8 @@
"description": null,
"fork": false,
"created_at": "2024-01-04T22:43:19Z",
- "updated_at": "2024-01-04T22:43:19Z",
- "pushed_at": "2024-01-04T22:43:30Z",
+ "updated_at": "2024-01-05T02:09:03Z",
+ "pushed_at": "2024-01-05T02:08:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@@ -240,6 +240,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json
index a776120485..eb0adeb9a5 100644
--- a/2023/CVE-2023-38831.json
+++ b/2023/CVE-2023-38831.json
@@ -43,10 +43,10 @@
"description": "CVE-2023-38831 winrar exploit generator",
"fork": false,
"created_at": "2023-08-25T09:44:08Z",
- "updated_at": "2024-01-04T15:57:06Z",
+ "updated_at": "2024-01-05T06:18:32Z",
"pushed_at": "2023-11-26T06:46:44Z",
- "stargazers_count": 728,
- "watchers_count": 728,
+ "stargazers_count": 727,
+ "watchers_count": 727,
"has_discussions": false,
"forks_count": 132,
"allow_forking": true,
@@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 132,
- "watchers": 728,
+ "watchers": 727,
"score": 0,
"subscribers_count": 9
},
diff --git a/2023/CVE-2023-49070.json b/2023/CVE-2023-49070.json
index 8911cf7114..671ac11a37 100644
--- a/2023/CVE-2023-49070.json
+++ b/2023/CVE-2023-49070.json
@@ -13,19 +13,19 @@
"description": null,
"fork": false,
"created_at": "2023-12-14T09:32:41Z",
- "updated_at": "2024-01-04T23:27:31Z",
+ "updated_at": "2024-01-05T05:53:58Z",
"pushed_at": "2023-12-15T06:29:09Z",
- "stargazers_count": 28,
- "watchers_count": 28,
+ "stargazers_count": 29,
+ "watchers_count": 29,
"has_discussions": false,
- "forks_count": 7,
+ "forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 7,
- "watchers": 28,
+ "forks": 8,
+ "watchers": 29,
"score": 0,
"subscribers_count": 2
},
diff --git a/2023/CVE-2023-51073.json b/2023/CVE-2023-51073.json
new file mode 100644
index 0000000000..4654d72bcc
--- /dev/null
+++ b/2023/CVE-2023-51073.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 739242348,
+ "name": "CVE-2023-51073",
+ "full_name": "christopher-pace\/CVE-2023-51073",
+ "owner": {
+ "login": "christopher-pace",
+ "id": 22531478,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22531478?v=4",
+ "html_url": "https:\/\/github.com\/christopher-pace"
+ },
+ "html_url": "https:\/\/github.com\/christopher-pace\/CVE-2023-51073",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-01-05T05:16:18Z",
+ "updated_at": "2024-01-05T05:16:19Z",
+ "pushed_at": "2024-01-05T05:17:14Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-51764.json b/2023/CVE-2023-51764.json
index 4ac98aebc4..3c6bd7586e 100644
--- a/2023/CVE-2023-51764.json
+++ b/2023/CVE-2023-51764.json
@@ -13,10 +13,10 @@
"description": "Postfix SMTP Smuggling - Expect Script POC",
"fork": false,
"created_at": "2023-12-26T17:02:20Z",
- "updated_at": "2024-01-03T21:21:48Z",
+ "updated_at": "2024-01-05T01:37:34Z",
"pushed_at": "2023-12-26T20:16:45Z",
- "stargazers_count": 14,
- "watchers_count": 14,
+ "stargazers_count": 15,
+ "watchers_count": 15,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
- "watchers": 14,
+ "watchers": 15,
"score": 0,
"subscribers_count": 1
},
diff --git a/2023/CVE-2023-6553.json b/2023/CVE-2023-6553.json
index a9cc97d307..69b13d4b85 100644
--- a/2023/CVE-2023-6553.json
+++ b/2023/CVE-2023-6553.json
@@ -131,6 +131,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2023/CVE-2023-7172.json b/2023/CVE-2023-7172.json
index 7574bae535..911790b169 100644
--- a/2023/CVE-2023-7172.json
+++ b/2023/CVE-2023-7172.json
@@ -13,19 +13,19 @@
"description": null,
"fork": false,
"created_at": "2024-01-02T07:28:25Z",
- "updated_at": "2024-01-03T07:27:52Z",
+ "updated_at": "2024-01-05T02:11:13Z",
"pushed_at": "2024-01-02T08:01:27Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
- "watchers": 1,
+ "forks": 1,
+ "watchers": 2,
"score": 0,
"subscribers_count": 1
}
diff --git a/README.md b/README.md
index 671f59fbf7..0c2a6f14d9 100644
--- a/README.md
+++ b/README.md
@@ -6097,6 +6097,9 @@
- [Chocapikk/CVE-2023-50917](https://github.com/Chocapikk/CVE-2023-50917)
+### CVE-2023-51073
+- [christopher-pace/CVE-2023-51073](https://github.com/christopher-pace/CVE-2023-51073)
+
### CVE-2023-51126
- [risuxx/CVE-2023-51126](https://github.com/risuxx/CVE-2023-51126)
@@ -36205,7 +36208,6 @@
- [gdisneyleugers/CVE-2014-2734](https://github.com/gdisneyleugers/CVE-2014-2734)
-- [adrienthebo/cve-2014-2734](https://github.com/adrienthebo/cve-2014-2734)
### CVE-2014-2815 (2014-08-12)
@@ -37755,6 +37757,13 @@
- [LAITRUNGMINHDUC/CVE-2010-3600-PythonHackOracle11gR2](https://github.com/LAITRUNGMINHDUC/CVE-2010-3600-PythonHackOracle11gR2)
+### CVE-2010-3847 (2011-01-07)
+
+elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) through 2.11.2, and 2.12.x through 2.12.1, does not properly handle a value of $ORIGIN for the LD_AUDIT environment variable, which allows local users to gain privileges via a crafted dynamic shared object (DSO) located in an arbitrary directory.
+
+
+- [magisterquis/cve-2010-3847](https://github.com/magisterquis/cve-2010-3847)
+
### CVE-2010-3904 (2010-12-06)
The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.
@@ -38146,7 +38155,6 @@
The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the (1) SamrChangePassword function, when the "username map script" smb.conf option is enabled, and allows remote authenticated users to execute commands via shell metacharacters involving other MS-RPC functions in the (2) remote printer and (3) file share management.
-- [amriunix/CVE-2007-2447](https://github.com/amriunix/CVE-2007-2447)
- [Unix13/metasploitable2](https://github.com/Unix13/metasploitable2)
- [b1fair/smb_usermap](https://github.com/b1fair/smb_usermap)
- [JoseBarrios/CVE-2007-2447](https://github.com/JoseBarrios/CVE-2007-2447)
@@ -38256,13 +38264,6 @@
- [Parcer0/CVE-2006-0450-phpBB-2.0.15-Multiple-DoS-Vulnerabilities](https://github.com/Parcer0/CVE-2006-0450-phpBB-2.0.15-Multiple-DoS-Vulnerabilities)
-### CVE-2006-1236 (2006-03-14)
-
-Buffer overflow in the SetUp function in socket/request.c in CrossFire 1.9.0 allows remote attackers to execute arbitrary code via a long setup sound command, a different vulnerability than CVE-2006-1010.
-
-
-- [Axua/CVE-2006-1236](https://github.com/Axua/CVE-2006-1236)
-
### CVE-2006-2842 (2006-06-06)
** DISPUTED ** PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter. NOTE: this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals is enabled. Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE. However, the original developer has posted a security advisory, so there might be relevant real-world environments under which this vulnerability is applicable.