Auto Update 2023/12/20 00:34:26

This commit is contained in:
motikan2010-bot 2023-12-20 09:34:26 +09:00
parent 69fffd1bd5
commit 321c78ee5f
30 changed files with 152 additions and 276 deletions

View file

@ -18,13 +18,13 @@
"stargazers_count": 119,
"watchers_count": 119,
"has_discussions": false,
"forks_count": 77,
"forks_count": 78,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 77,
"forks": 78,
"watchers": 119,
"score": 0,
"subscribers_count": 19

View file

@ -18,13 +18,13 @@
"stargazers_count": 67,
"watchers_count": 67,
"has_discussions": false,
"forks_count": 39,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 39,
"forks": 40,
"watchers": 67,
"score": 0,
"subscribers_count": 10

View file

@ -313,36 +313,6 @@
"score": 0,
"subscribers_count": 13
},
{
"id": 72274348,
"name": "scan-dirtycow",
"full_name": "aishee\/scan-dirtycow",
"owner": {
"login": "aishee",
"id": 8377283,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8377283?v=4",
"html_url": "https:\/\/github.com\/aishee"
},
"html_url": "https:\/\/github.com\/aishee\/scan-dirtycow",
"description": "Scan vuls kernel CVE-2016-5195 - DirtyCow",
"fork": false,
"created_at": "2016-10-29T08:45:45Z",
"updated_at": "2023-09-28T10:37:06Z",
"pushed_at": "2016-10-29T08:50:34Z",
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 1
},
{
"id": 72304503,
"name": "ansible_CVE-2016-5195_check",
@ -373,66 +343,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 72996573,
"name": "CVE-2016-5195",
"full_name": "ldenevi\/CVE-2016-5195",
"owner": {
"login": "ldenevi",
"id": 1868312,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1868312?v=4",
"html_url": "https:\/\/github.com\/ldenevi"
},
"html_url": "https:\/\/github.com\/ldenevi\/CVE-2016-5195",
"description": "Recent Linux privilege escalation exploit",
"fork": false,
"created_at": "2016-11-06T14:38:04Z",
"updated_at": "2016-11-06T14:45:08Z",
"pushed_at": "2016-11-06T14:45:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 73981418,
"name": "CVE-2016-5195",
"full_name": "whu-enjoy\/CVE-2016-5195",
"owner": {
"login": "whu-enjoy",
"id": 17870213,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17870213?v=4",
"html_url": "https:\/\/github.com\/whu-enjoy"
},
"html_url": "https:\/\/github.com\/whu-enjoy\/CVE-2016-5195",
"description": "这里保留着部分脏牛漏洞的利用代码",
"fork": false,
"created_at": "2016-11-17T02:20:09Z",
"updated_at": "2020-01-16T14:04:30Z",
"pushed_at": "2016-11-17T05:29:34Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},
{
"id": 74788180,
"name": "dirtycow",

View file

@ -1,32 +0,0 @@
[
{
"id": 72594729,
"name": "CVE-2016-6663",
"full_name": "firebroo\/CVE-2016-6663",
"owner": {
"login": "firebroo",
"id": 7047962,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7047962?v=4",
"html_url": "https:\/\/github.com\/firebroo"
},
"html_url": "https:\/\/github.com\/firebroo\/CVE-2016-6663",
"description": null,
"fork": false,
"created_at": "2016-11-02T02:05:45Z",
"updated_at": "2021-06-09T05:51:41Z",
"pushed_at": "2016-11-02T07:06:33Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 3,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -29,41 +29,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 73386147,
"name": "JoomlaCVE20168869",
"full_name": "rustyJ4ck\/JoomlaCVE20168869",
"owner": {
"login": "rustyJ4ck",
"id": 1773112,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1773112?v=4",
"html_url": "https:\/\/github.com\/rustyJ4ck"
},
"html_url": "https:\/\/github.com\/rustyJ4ck\/JoomlaCVE20168869",
"description": "Exploit for Joomla 3.4.4 - 3.6.4 (CVE-2016-8869 and CVE-2016-8870)",
"fork": false,
"created_at": "2016-11-10T13:47:01Z",
"updated_at": "2023-09-28T10:37:20Z",
"pushed_at": "2016-11-10T13:47:45Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"exploit",
"joomla",
"php",
"poc"
],
"visibility": "public",
"forks": 7,
"watchers": 7,
"score": 0,
"subscribers_count": 2
},
{
"id": 165309082,
"name": "cve-2016-8869",

View file

@ -0,0 +1,32 @@
[
{
"id": 110457097,
"name": "CVE-2017-1000250-PoC",
"full_name": "olav-st\/CVE-2017-1000250-PoC",
"owner": {
"login": "olav-st",
"id": 1856634,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1856634?v=4",
"html_url": "https:\/\/github.com\/olav-st"
},
"html_url": "https:\/\/github.com\/olav-st\/CVE-2017-1000250-PoC",
"description": "Proof of concept exploit script for CVE-2017-1000250. Written while researching for the essay in TTM4137 Wireless Security.",
"fork": false,
"created_at": "2017-11-12T18:18:52Z",
"updated_at": "2019-03-20T07:23:31Z",
"pushed_at": "2017-11-12T19:46:35Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2017-09-08T07:27:13Z",
"updated_at": "2022-11-09T17:57:59Z",
"updated_at": "2023-12-19T20:12:26Z",
"pushed_at": "2017-09-13T14:40:53Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -75,10 +75,10 @@
"description": "An exploit for Apache Struts CVE-2017-9805",
"fork": false,
"created_at": "2017-09-09T01:32:57Z",
"updated_at": "2023-12-19T17:40:58Z",
"updated_at": "2023-12-19T23:28:25Z",
"pushed_at": "2017-11-07T19:24:00Z",
"stargazers_count": 247,
"watchers_count": 247,
"stargazers_count": 248,
"watchers_count": 248,
"has_discussions": false,
"forks_count": 78,
"allow_forking": true,
@ -89,7 +89,7 @@
],
"visibility": "public",
"forks": 78,
"watchers": 247,
"watchers": 248,
"score": 0,
"subscribers_count": 17
},

View file

@ -44,7 +44,7 @@
"fork": false,
"created_at": "2018-10-17T14:14:12Z",
"updated_at": "2023-11-24T19:44:07Z",
"pushed_at": "2023-02-20T02:06:22Z",
"pushed_at": "2023-12-19T20:46:55Z",
"stargazers_count": 493,
"watchers_count": 493,
"has_discussions": false,

View file

@ -398,7 +398,7 @@
"fork": false,
"created_at": "2020-05-08T10:29:00Z",
"updated_at": "2020-05-08T12:07:54Z",
"pushed_at": "2022-03-29T22:00:21Z",
"pushed_at": "2023-12-19T20:44:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -18,7 +18,7 @@
"stargazers_count": 89,
"watchers_count": 89,
"has_discussions": false,
"forks_count": 37,
"forks_count": 38,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -27,7 +27,7 @@
"whatsapp"
],
"visibility": "public",
"forks": 37,
"forks": 38,
"watchers": 89,
"score": 0,
"subscribers_count": 6

View file

@ -57,6 +57,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -48,13 +48,13 @@
"stargazers_count": 1658,
"watchers_count": 1658,
"has_discussions": false,
"forks_count": 365,
"forks_count": 366,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 365,
"forks": 366,
"watchers": 1658,
"score": 0,
"subscribers_count": 88

View file

@ -193,10 +193,10 @@
"description": "CVE-20207961 Mass exploit for Script Kiddies",
"fork": false,
"created_at": "2021-01-02T13:57:59Z",
"updated_at": "2023-12-17T18:30:44Z",
"updated_at": "2023-12-19T20:52:49Z",
"pushed_at": "2021-01-03T10:54:20Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -205,7 +205,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 19,
"watchers": 18,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2021-21974 VMWare ESXi RCE Exploit",
"fork": false,
"created_at": "2021-05-25T17:14:38Z",
"updated_at": "2023-11-30T16:04:58Z",
"updated_at": "2023-12-19T21:29:32Z",
"pushed_at": "2021-07-09T19:38:41Z",
"stargazers_count": 160,
"watchers_count": 160,
"stargazers_count": 161,
"watchers_count": 161,
"has_discussions": false,
"forks_count": 47,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 160,
"watchers": 161,
"score": 0,
"subscribers_count": 4
},

View file

@ -43,19 +43,19 @@
"description": "CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero day",
"fork": false,
"created_at": "2021-11-28T09:48:36Z",
"updated_at": "2023-10-16T18:39:19Z",
"updated_at": "2023-12-20T00:02:36Z",
"pushed_at": "2022-02-21T08:30:22Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 16,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 43,
"forks": 17,
"watchers": 44,
"score": 0,
"subscribers_count": 2
}

View file

@ -1084,7 +1084,7 @@
"forks": 16,
"watchers": 46,
"score": 0,
"subscribers_count": 16
"subscribers_count": 17
},
{
"id": 352785704,

View file

@ -2458,10 +2458,10 @@
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
"fork": false,
"created_at": "2022-03-12T21:24:55Z",
"updated_at": "2023-12-15T00:42:59Z",
"updated_at": "2023-12-19T20:57:43Z",
"pushed_at": "2022-03-12T21:30:58Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 80,
"watchers_count": 80,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -2479,7 +2479,7 @@
],
"visibility": "public",
"forks": 31,
"watchers": 79,
"watchers": 80,
"score": 0,
"subscribers_count": 1
},

View file

@ -610,13 +610,13 @@
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 21,
"score": 0,
"subscribers_count": 1

View file

@ -1170,5 +1170,40 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 733652712,
"name": "CVE-2023-23752",
"full_name": "gunzf0x\/CVE-2023-23752",
"owner": {
"login": "gunzf0x",
"id": 31874167,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31874167?v=4",
"html_url": "https:\/\/github.com\/gunzf0x"
},
"html_url": "https:\/\/github.com\/gunzf0x\/CVE-2023-23752",
"description": "Binaries for \"CVE-2023-23752\"",
"fork": false,
"created_at": "2023-12-19T20:18:49Z",
"updated_at": "2023-12-19T20:32:57Z",
"pushed_at": "2023-12-19T20:31:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"binaries-included",
"cve-2023-23752",
"go",
"golang"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Unauthenticated RCE in ZoneMinder Snapshots - Poc Exploit",
"fork": false,
"created_at": "2023-12-11T19:23:13Z",
"updated_at": "2023-12-15T02:37:52Z",
"updated_at": "2023-12-19T20:49:03Z",
"pushed_at": "2023-12-11T20:27:56Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,12 +13,12 @@
"description": "Microsoft SharePoint Server Elevation of Privilege Vulnerability",
"fork": false,
"created_at": "2023-09-26T16:18:41Z",
"updated_at": "2023-12-19T11:43:58Z",
"updated_at": "2023-12-19T21:58:21Z",
"pushed_at": "2023-09-26T19:04:21Z",
"stargazers_count": 188,
"watchers_count": 188,
"stargazers_count": 187,
"watchers_count": 187,
"has_discussions": false,
"forks_count": 26,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -31,8 +31,8 @@
"sharepoint"
],
"visibility": "public",
"forks": 26,
"watchers": 188,
"forks": 27,
"watchers": 187,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "PoC Exploit for VM2 Sandbox Escape Vulnerability",
"fork": false,
"created_at": "2023-12-10T08:32:26Z",
"updated_at": "2023-12-18T10:54:21Z",
"updated_at": "2023-12-19T20:54:47Z",
"pushed_at": "2023-12-14T20:09:23Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 35,
"watchers": 36,
"score": 0,
"subscribers_count": 1
}

View file

@ -1163,11 +1163,11 @@
"fork": false,
"created_at": "2023-12-12T14:54:30Z",
"updated_at": "2023-12-13T20:06:39Z",
"pushed_at": "2023-12-18T18:13:49Z",
"pushed_at": "2023-12-19T22:06:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1179,7 +1179,7 @@
"rust"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1

View file

@ -259,36 +259,6 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 713730410,
"name": "CVE-2023-4966",
"full_name": "fdevsectest\/CVE-2023-4966",
"owner": {
"login": "fdevsectest",
"id": 143382993,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143382993?v=4",
"html_url": "https:\/\/github.com\/fdevsectest"
},
"html_url": "https:\/\/github.com\/fdevsectest\/CVE-2023-4966",
"description": null,
"fork": false,
"created_at": "2023-11-03T05:59:14Z",
"updated_at": "2023-11-24T08:55:30Z",
"pushed_at": "2023-11-03T05:59:24Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 721262627,
"name": "CVE-2023-4966",

View file

@ -13,10 +13,10 @@
"description": "SQL Injection in 3CX CRM Integration",
"fork": false,
"created_at": "2023-12-14T18:38:28Z",
"updated_at": "2023-12-17T07:13:24Z",
"updated_at": "2023-12-19T21:05:59Z",
"pushed_at": "2023-12-18T07:00:52Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-49964: FreeMarker Server-Side Template Injection in Alfresco",
"fork": false,
"created_at": "2023-12-08T20:47:52Z",
"updated_at": "2023-12-11T10:07:53Z",
"updated_at": "2023-12-19T20:54:31Z",
"pushed_at": "2023-12-09T10:54:03Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -35,7 +35,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "A critical security vulnerability, identified as CVE-2023-50164 (CVE: 9.8) was found in Apache Struts, allowing attackers to manipulate file upload parameters that can potentially lead to unauthorized path traversal and remote code execution (RCE).",
"fork": false,
"created_at": "2023-12-13T09:31:36Z",
"updated_at": "2023-12-19T02:13:09Z",
"updated_at": "2023-12-19T20:51:40Z",
"pushed_at": "2023-12-13T13:18:18Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 54,
"watchers": 55,
"score": 0,
"subscribers_count": 3
},
@ -73,10 +73,10 @@
"description": "Proof of Concept for Path Traversal in Apache Struts (\"CVE-2023-50164\")",
"fork": false,
"created_at": "2023-12-17T14:18:54Z",
"updated_at": "2023-12-19T17:44:09Z",
"updated_at": "2023-12-19T21:09:05Z",
"pushed_at": "2023-12-18T02:46:21Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": true,
"forks_count": 5,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 33,
"watchers": 34,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution",
"fork": false,
"created_at": "2023-12-13T20:26:59Z",
"updated_at": "2023-12-19T11:35:46Z",
"updated_at": "2023-12-19T20:50:14Z",
"pushed_at": "2023-12-15T18:13:06Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -39,7 +39,7 @@
],
"visibility": "public",
"forks": 12,
"watchers": 39,
"watchers": 40,
"score": 0,
"subscribers_count": 1
}

View file

@ -858,7 +858,6 @@
- [0xKayala/CVE-2023-4966](https://github.com/0xKayala/CVE-2023-4966)
- [certat/citrix-logchecker](https://github.com/certat/citrix-logchecker)
- [sanjai-AK47/CVE-2023-4966](https://github.com/sanjai-AK47/CVE-2023-4966)
- [fdevsectest/CVE-2023-4966](https://github.com/fdevsectest/CVE-2023-4966)
- [s-bt/CVE-2023-4966](https://github.com/s-bt/CVE-2023-4966)
- [byte4RR4Y/CVE-2023-4966](https://github.com/byte4RR4Y/CVE-2023-4966)
- [jmussmann/cve-2023-4966-iocs](https://github.com/jmussmann/cve-2023-4966-iocs)
@ -1768,6 +1767,7 @@
- [hadrian3689/CVE-2023-23752_Joomla](https://github.com/hadrian3689/CVE-2023-23752_Joomla)
- [C1ph3rX13/CVE-2023-23752](https://github.com/C1ph3rX13/CVE-2023-23752)
- [JeneralMotors/CVE-2023-23752](https://github.com/JeneralMotors/CVE-2023-23752)
- [gunzf0x/CVE-2023-23752](https://github.com/gunzf0x/CVE-2023-23752)
### CVE-2023-23924 (2023-01-31)
@ -33314,6 +33314,13 @@
- [Nickguitar/Jquery-File-Tree-1.6.6-Path-Traversal](https://github.com/Nickguitar/Jquery-File-Tree-1.6.6-Path-Traversal)
### CVE-2017-1000250 (2017-09-12)
<code>All versions of the SDP server in BlueZ 5.46 and earlier are vulnerable to an information disclosure vulnerability which allows remote attackers to obtain sensitive information from the bluetoothd process memory. This vulnerability lies in the processing of SDP search attribute requests.
</code>
- [olav-st/CVE-2017-1000250-PoC](https://github.com/olav-st/CVE-2017-1000250-PoC)
### CVE-2017-1000251 (2017-09-12)
<code>The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.
@ -34065,10 +34072,7 @@
- [scumjr/dirtycow-vdso](https://github.com/scumjr/dirtycow-vdso)
- [gbonacini/CVE-2016-5195](https://github.com/gbonacini/CVE-2016-5195)
- [DavidBuchanan314/cowroot](https://github.com/DavidBuchanan314/cowroot)
- [aishee/scan-dirtycow](https://github.com/aishee/scan-dirtycow)
- [oleg-fiksel/ansible_CVE-2016-5195_check](https://github.com/oleg-fiksel/ansible_CVE-2016-5195_check)
- [ldenevi/CVE-2016-5195](https://github.com/ldenevi/CVE-2016-5195)
- [whu-enjoy/CVE-2016-5195](https://github.com/whu-enjoy/CVE-2016-5195)
- [firefart/dirtycow](https://github.com/firefart/dirtycow)
- [ndobson/inspec_CVE-2016-5195](https://github.com/ndobson/inspec_CVE-2016-5195)
- [linhlt247/DirtyCOW_CVE-2016-5195](https://github.com/linhlt247/DirtyCOW_CVE-2016-5195)
@ -34244,13 +34248,6 @@
- [boompig/cve-2016-6662](https://github.com/boompig/cve-2016-6662)
- [MAYASEVEN/CVE-2016-6662](https://github.com/MAYASEVEN/CVE-2016-6662)
### CVE-2016-6663 (2016-12-13)
<code>Race condition in Oracle MySQL before 5.5.52, 5.6.x before 5.6.33, 5.7.x before 5.7.15, and 8.x before 8.0.1; MariaDB before 5.5.52, 10.0.x before 10.0.28, and 10.1.x before 10.1.18; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17 allows local users with certain permissions to gain privileges by leveraging use of my_copystat by REPAIR TABLE to repair a MyISAM table.
</code>
- [firebroo/CVE-2016-6663](https://github.com/firebroo/CVE-2016-6663)
### CVE-2016-6754 (2016-11-25)
<code>A remote code execution vulnerability in Webview in Android 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-11-05 could enable a remote attacker to execute arbitrary code when the user is navigating to a website. This issue is rated as High due to the possibility of remote code execution in an unprivileged process. Android ID: A-31217937.
@ -34429,7 +34426,6 @@
</code>
- [sunsunza2009/Joomla-3.4.4-3.6.4_CVE-2016-8869_and_CVE-2016-8870](https://github.com/sunsunza2009/Joomla-3.4.4-3.6.4_CVE-2016-8869_and_CVE-2016-8870)
- [rustyJ4ck/JoomlaCVE20168869](https://github.com/rustyJ4ck/JoomlaCVE20168869)
- [cved-sources/cve-2016-8869](https://github.com/cved-sources/cve-2016-8869)
### CVE-2016-8870 (2016-11-04)