Auto Update 2021/06/22 00:11:41

This commit is contained in:
motikan2010-bot 2021-06-22 00:11:41 +09:00
parent ccf270d8f5
commit 225fb0361f
17 changed files with 74 additions and 69 deletions

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-06-13T09:40:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2015-08-30T19:24:32Z",
"stargazers_count": 112,
"watchers_count": 112,
"forks_count": 77,
"forks": 77,
"forks_count": 78,
"forks": 78,
"watchers": 112,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-06-11T00:16:40Z",
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 48,
"forks": 48,
"forks_count": 49,
"forks": 49,
"watchers": 31,
"score": 0
}

View file

@ -362,8 +362,8 @@
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 276,
"watchers_count": 276,
"forks_count": 98,
"forks": 98,
"forks_count": 99,
"forks": 99,
"watchers": 276,
"score": 0
},

View file

@ -1236,8 +1236,8 @@
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 817,
"watchers_count": 817,
"forks_count": 206,
"forks": 206,
"forks_count": 207,
"forks": 207,
"watchers": 817,
"score": 0
},
@ -2405,13 +2405,13 @@
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
"fork": false,
"created_at": "2020-01-21T02:22:29Z",
"updated_at": "2021-06-17T13:31:53Z",
"updated_at": "2021-06-21T12:15:39Z",
"pushed_at": "2020-01-21T03:15:41Z",
"stargazers_count": 206,
"watchers_count": 206,
"forks_count": 53,
"forks": 53,
"watchers": 206,
"stargazers_count": 207,
"watchers_count": 207,
"forks_count": 54,
"forks": 54,
"watchers": 207,
"score": 0
},
{
@ -2639,8 +2639,8 @@
"pushed_at": "2021-03-25T07:12:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},

View file

@ -496,13 +496,13 @@
"description": "This script checks the Citrix Netscaler if it has been compromised by CVE-2019-19781 attacks and collects all file system information",
"fork": false,
"created_at": "2020-01-16T08:52:14Z",
"updated_at": "2020-10-27T12:03:36Z",
"updated_at": "2021-06-21T13:40:35Z",
"pushed_at": "2020-10-27T12:03:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 276,
"watchers_count": 276,
"forks_count": 98,
"forks": 98,
"forks_count": 99,
"forks": 99,
"watchers": 276,
"score": 0
},

View file

@ -887,13 +887,13 @@
"description": "CVE-2020-0796 Local Privilege Escalation POC",
"fork": false,
"created_at": "2020-03-30T16:06:50Z",
"updated_at": "2021-06-21T00:40:20Z",
"updated_at": "2021-06-21T09:33:59Z",
"pushed_at": "2020-04-02T08:01:38Z",
"stargazers_count": 223,
"watchers_count": 223,
"stargazers_count": 224,
"watchers_count": 224,
"forks_count": 87,
"forks": 87,
"watchers": 223,
"watchers": 224,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1337 Windows Print Spooler Privilege Escalation",
"fork": false,
"created_at": "2020-07-21T08:01:20Z",
"updated_at": "2021-05-27T18:59:02Z",
"updated_at": "2021-06-21T12:19:34Z",
"pushed_at": "2020-07-21T10:28:42Z",
"stargazers_count": 143,
"watchers_count": 143,
"stargazers_count": 144,
"watchers_count": 144,
"forks_count": 29,
"forks": 29,
"watchers": 143,
"watchers": 144,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-09-17T21:25:18Z",
"updated_at": "2021-06-21T08:03:25Z",
"updated_at": "2021-06-21T09:46:45Z",
"pushed_at": "2020-09-18T00:01:00Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 16,
"forks": 16,
"watchers": 38,
"watchers": 39,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "how detect CVE-2020-2551 poc exploit python Weblogic RCE with IIOP",
"fork": false,
"created_at": "2020-01-19T13:01:32Z",
"updated_at": "2021-06-08T15:52:54Z",
"updated_at": "2021-06-21T10:26:43Z",
"pushed_at": "2020-05-22T08:46:20Z",
"stargazers_count": 154,
"watchers_count": 154,
"stargazers_count": 155,
"watchers_count": 155,
"forks_count": 36,
"forks": 36,
"watchers": 154,
"watchers": 155,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Detect Citrix ADC SAML action or SAML iDP Profile config vulnerable to CVE-2020-8300 using Citrix ADC NITRO API",
"fork": false,
"created_at": "2021-06-15T07:21:16Z",
"updated_at": "2021-06-17T08:31:57Z",
"updated_at": "2021-06-21T12:12:36Z",
"pushed_at": "2021-06-17T08:31:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "CVE-2021-1732 poc & exp; tested on 20H2",
"fork": false,
"created_at": "2021-04-23T08:21:54Z",
"updated_at": "2021-06-09T10:04:16Z",
"updated_at": "2021-06-21T10:16:51Z",
"pushed_at": "2021-04-23T08:28:53Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 11,
"forks": 11,
"watchers": 44,
"watchers": 45,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Cross Site Scripting (XSS) at the \"Reset Password\" page form of Priority Enterprise Management System v8.00 allows attackers to execute javascript on behalf of the victim by sending a malicious URL or directing the victim to a malicious site.",
"fork": false,
"created_at": "2021-04-13T04:25:31Z",
"updated_at": "2021-04-13T04:26:27Z",
"updated_at": "2021-06-21T14:07:29Z",
"pushed_at": "2021-04-13T04:26:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -243,13 +243,13 @@
"description": "A fast tool to mass scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin (CVE-2021-26855).",
"fork": false,
"created_at": "2021-03-08T11:54:32Z",
"updated_at": "2021-06-21T07:23:24Z",
"updated_at": "2021-06-21T14:18:51Z",
"pushed_at": "2021-03-17T11:21:52Z",
"stargazers_count": 122,
"watchers_count": 122,
"stargazers_count": 123,
"watchers_count": 123,
"forks_count": 20,
"forks": 20,
"watchers": 122,
"watchers": 123,
"score": 0
},
{

View file

@ -105,8 +105,8 @@
"description": null,
"fork": false,
"created_at": "2021-06-14T20:08:20Z",
"updated_at": "2021-06-16T14:36:12Z",
"pushed_at": "2021-06-16T12:47:36Z",
"updated_at": "2021-06-21T15:08:44Z",
"pushed_at": "2021-06-21T15:08:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
@ -128,13 +128,13 @@
"description": "Privilege escalation with polkit - CVE-2021-3560",
"fork": false,
"created_at": "2021-06-19T08:15:17Z",
"updated_at": "2021-06-20T07:38:16Z",
"updated_at": "2021-06-21T14:50:38Z",
"pushed_at": "2021-06-20T07:38:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 4,
"forks": 4,
"watchers": 2,
"score": 0
}
]

View file

@ -1122,7 +1122,12 @@ Sherlock SherlockIM through 2021-03-29 allows Cross Site Scripting (XSS) by leve
- [Security-AVS/CVE-2021-29267](https://github.com/Security-AVS/CVE-2021-29267)
### CVE-2021-29337
### CVE-2021-29337 (2021-06-21)
<code>
MODAPI.sys in MSI Dragon Center 2.0.104.0 allows low-privileged users to access kernel memory and potentially escalate privileges via a crafted IOCTL 0x9c406104 call. This IOCTL provides the MmMapIoSpace feature for mapping physical memory.
</code>
- [rjt-gupta/CVE-2021-29337](https://github.com/rjt-gupta/CVE-2021-29337)
### CVE-2021-29349 (2021-03-31)