From 6d4d9957fa0f0573ea087169c897334e9510485e Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Wed, 19 Jun 2024 09:29:08 +0900 Subject: [PATCH] Auto Update 2024/06/19 00:29:08 --- 2020/CVE-2020-0201.json | 4 ++-- 2021/CVE-2021-0390.json | 2 +- 2021/CVE-2021-0392.json | 2 +- 2021/CVE-2021-0466.json | 2 +- 2021/CVE-2021-44228.json | 2 +- 2023/CVE-2023-0386.json | 8 ++++---- 2023/CVE-2023-45866.json | 8 ++++---- 2023/CVE-2023-7028.json | 8 ++++---- 2024/CVE-2024-1086.json | 8 ++++---- 2024/CVE-2024-23692.json | 8 ++++---- 2024/CVE-2024-26229.json | 16 +++++++-------- 2024/CVE-2024-29824.json | 4 ++-- 2024/CVE-2024-30078.json | 44 +++++++++++++++++++++++++++++++++------- 2024/CVE-2024-3094.json | 2 +- 2024/CVE-2024-32113.json | 4 ++-- 2024/CVE-2024-37888.json | 4 ++-- 2024/CVE-2024-4577.json | 14 ++++++------- README.md | 7 ++++++- 18 files changed, 91 insertions(+), 56 deletions(-) diff --git a/2020/CVE-2020-0201.json b/2020/CVE-2020-0201.json index 01e9d0e4d7..527c683f67 100644 --- a/2020/CVE-2020-0201.json +++ b/2020/CVE-2020-0201.json @@ -27,7 +27,7 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 }, { "id": 816647824, @@ -57,6 +57,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2021/CVE-2021-0390.json b/2021/CVE-2021-0390.json index b1c8ce353a..b1ea88e109 100644 --- a/2021/CVE-2021-0390.json +++ b/2021/CVE-2021-0390.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2021/CVE-2021-0392.json b/2021/CVE-2021-0392.json index a4b5837184..39fe828ce4 100644 --- a/2021/CVE-2021-0392.json +++ b/2021/CVE-2021-0392.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2021/CVE-2021-0466.json b/2021/CVE-2021-0466.json index 8702f72a0d..374931c7dc 100644 --- a/2021/CVE-2021-0466.json +++ b/2021/CVE-2021-0466.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index b394f9b1a7..a35703772c 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -1527,7 +1527,7 @@ "fork": false, "created_at": "2021-12-11T12:16:45Z", "updated_at": "2024-04-29T17:48:37Z", - "pushed_at": "2024-06-14T01:49:08Z", + "pushed_at": "2024-06-18T23:29:25Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, diff --git a/2023/CVE-2023-0386.json b/2023/CVE-2023-0386.json index d6322c6152..e6f9a9d230 100644 --- a/2023/CVE-2023-0386.json +++ b/2023/CVE-2023-0386.json @@ -73,10 +73,10 @@ "description": "CVE-2023-0386在ubuntu22.04上的提权", "fork": false, "created_at": "2023-05-05T03:02:13Z", - "updated_at": "2024-06-04T14:20:57Z", + "updated_at": "2024-06-18T19:44:45Z", "pushed_at": "2023-06-13T08:58:53Z", - "stargazers_count": 374, - "watchers_count": 374, + "stargazers_count": 375, + "watchers_count": 375, "has_discussions": false, "forks_count": 69, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 69, - "watchers": 374, + "watchers": 375, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index f53fba420e..02f9d0b5c9 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -13,10 +13,10 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2024-06-18T15:52:45Z", + "updated_at": "2024-06-18T19:52:57Z", "pushed_at": "2024-06-12T19:17:54Z", - "stargazers_count": 908, - "watchers_count": 908, + "stargazers_count": 910, + "watchers_count": 910, "has_discussions": false, "forks_count": 154, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 154, - "watchers": 908, + "watchers": 910, "score": 0, "subscribers_count": 13 }, diff --git a/2023/CVE-2023-7028.json b/2023/CVE-2023-7028.json index 9386524576..532c3ce41b 100644 --- a/2023/CVE-2023-7028.json +++ b/2023/CVE-2023-7028.json @@ -106,10 +106,10 @@ "description": "This repository presents a proof-of-concept of CVE-2023-7028", "fork": false, "created_at": "2024-01-12T18:29:27Z", - "updated_at": "2024-06-03T16:30:31Z", + "updated_at": "2024-06-18T18:52:17Z", "pushed_at": "2024-01-13T13:50:20Z", - "stargazers_count": 237, - "watchers_count": 237, + "stargazers_count": 238, + "watchers_count": 238, "has_discussions": false, "forks_count": 40, "allow_forking": true, @@ -118,7 +118,7 @@ "topics": [], "visibility": "public", "forks": 40, - "watchers": 237, + "watchers": 238, "score": 0, "subscribers_count": 6 }, diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index be2c2617aa..625a2dae4d 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -13,10 +13,10 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2024-06-18T16:35:17Z", + "updated_at": "2024-06-19T00:14:22Z", "pushed_at": "2024-04-17T16:09:54Z", - "stargazers_count": 2129, - "watchers_count": 2129, + "stargazers_count": 2130, + "watchers_count": 2130, "has_discussions": false, "forks_count": 277, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 277, - "watchers": 2129, + "watchers": 2130, "score": 0, "subscribers_count": 24 }, diff --git a/2024/CVE-2024-23692.json b/2024/CVE-2024-23692.json index e430d7cc6a..31b451a819 100644 --- a/2024/CVE-2024-23692.json +++ b/2024/CVE-2024-23692.json @@ -223,10 +223,10 @@ "description": "CVE-2024-23692 Exploit", "fork": false, "created_at": "2024-06-18T03:27:47Z", - "updated_at": "2024-06-18T06:17:38Z", + "updated_at": "2024-06-18T18:57:49Z", "pushed_at": "2024-06-18T04:06:25Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -235,7 +235,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-26229.json b/2024/CVE-2024-26229.json index 80b794d171..388b55fcd9 100644 --- a/2024/CVE-2024-26229.json +++ b/2024/CVE-2024-26229.json @@ -13,10 +13,10 @@ "description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code", "fork": false, "created_at": "2024-06-10T17:02:03Z", - "updated_at": "2024-06-18T11:05:51Z", + "updated_at": "2024-06-18T22:10:41Z", "pushed_at": "2024-06-17T19:46:27Z", - "stargazers_count": 223, - "watchers_count": 223, + "stargazers_count": 225, + "watchers_count": 225, "has_discussions": false, "forks_count": 46, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 46, - "watchers": 223, + "watchers": 225, "score": 0, "subscribers_count": 2 }, @@ -73,10 +73,10 @@ "description": "BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel", "fork": false, "created_at": "2024-06-12T11:11:16Z", - "updated_at": "2024-06-18T14:18:14Z", + "updated_at": "2024-06-18T20:47:18Z", "pushed_at": "2024-06-13T07:30:48Z", - "stargazers_count": 176, - "watchers_count": 176, + "stargazers_count": 177, + "watchers_count": 177, "has_discussions": false, "forks_count": 22, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 22, - "watchers": 176, + "watchers": 177, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-29824.json b/2024/CVE-2024-29824.json index 1414bf8f61..a08a8d897f 100644 --- a/2024/CVE-2024-29824.json +++ b/2024/CVE-2024-29824.json @@ -18,13 +18,13 @@ "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, + "forks": 3, "watchers": 7, "score": 0, "subscribers_count": 4 diff --git a/2024/CVE-2024-30078.json b/2024/CVE-2024-30078.json index fb2bae9c7c..a1a0ba00ba 100644 --- a/2024/CVE-2024-30078.json +++ b/2024/CVE-2024-30078.json @@ -13,19 +13,19 @@ "description": "CVE-2024-30078 Detection and Command Execution Script", "fork": false, "created_at": "2024-06-16T08:06:03Z", - "updated_at": "2024-06-18T14:43:59Z", + "updated_at": "2024-06-18T22:32:19Z", "pushed_at": "2024-06-15T20:21:26Z", - "stargazers_count": 21, - "watchers_count": 21, + "stargazers_count": 22, + "watchers_count": 22, "has_discussions": false, - "forks_count": 28, + "forks_count": 29, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 28, - "watchers": 21, + "forks": 29, + "watchers": 22, "score": 0, "subscribers_count": 0 }, @@ -43,7 +43,7 @@ "description": null, "fork": false, "created_at": "2024-06-17T17:48:23Z", - "updated_at": "2024-06-18T18:04:58Z", + "updated_at": "2024-06-18T19:24:16Z", "pushed_at": "2024-06-17T17:50:56Z", "stargazers_count": 2, "watchers_count": 2, @@ -58,5 +58,35 @@ "watchers": 2, "score": 0, "subscribers_count": 1 + }, + { + "id": 816997508, + "name": "checkwifivulnerability", + "full_name": "nkontopoul\/checkwifivulnerability", + "owner": { + "login": "nkontopoul", + "id": 6118285, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6118285?v=4", + "html_url": "https:\/\/github.com\/nkontopoul" + }, + "html_url": "https:\/\/github.com\/nkontopoul\/checkwifivulnerability", + "description": "Only tested in windows 11. Checks if you are protected via windows update against CVE-2024-30078 Windows Wi-Fi Driver Remote Code Execution Vulnerability", + "fork": false, + "created_at": "2024-06-18T20:05:06Z", + "updated_at": "2024-06-18T22:22:52Z", + "pushed_at": "2024-06-18T22:22:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index 14c4460ce8..4d621f830d 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -1012,7 +1012,7 @@ "description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)", "fork": false, "created_at": "2024-04-01T14:28:09Z", - "updated_at": "2024-06-17T06:03:01Z", + "updated_at": "2024-06-18T18:44:43Z", "pushed_at": "2024-04-03T04:58:50Z", "stargazers_count": 3467, "watchers_count": 3467, diff --git a/2024/CVE-2024-32113.json b/2024/CVE-2024-32113.json index 2c45d10281..e0f1942807 100644 --- a/2024/CVE-2024-32113.json +++ b/2024/CVE-2024-32113.json @@ -18,7 +18,7 @@ "stargazers_count": 20, "watchers_count": 20, "has_discussions": false, - "forks_count": 6, + "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -34,7 +34,7 @@ "rce-exploit" ], "visibility": "public", - "forks": 6, + "forks": 7, "watchers": 20, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-37888.json b/2024/CVE-2024-37888.json index e064269917..0187d8d885 100644 --- a/2024/CVE-2024-37888.json +++ b/2024/CVE-2024-37888.json @@ -18,7 +18,7 @@ "stargazers_count": 1, "watchers_count": 1, "has_discussions": true, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -36,7 +36,7 @@ "xss" ], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 0 diff --git a/2024/CVE-2024-4577.json b/2024/CVE-2024-4577.json index e237d1fe34..6f7d425298 100644 --- a/2024/CVE-2024-4577.json +++ b/2024/CVE-2024-4577.json @@ -163,10 +163,10 @@ "description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC", "fork": false, "created_at": "2024-06-07T09:52:54Z", - "updated_at": "2024-06-17T17:45:37Z", + "updated_at": "2024-06-18T21:59:13Z", "pushed_at": "2024-06-07T09:53:15Z", - "stargazers_count": 133, - "watchers_count": 133, + "stargazers_count": 134, + "watchers_count": 134, "has_discussions": false, "forks_count": 31, "allow_forking": true, @@ -175,7 +175,7 @@ "topics": [], "visibility": "public", "forks": 31, - "watchers": 133, + "watchers": 134, "score": 0, "subscribers_count": 4 }, @@ -494,11 +494,11 @@ "fork": false, "created_at": "2024-06-08T12:23:35Z", "updated_at": "2024-06-18T12:41:36Z", - "pushed_at": "2024-06-08T15:59:27Z", + "pushed_at": "2024-06-18T23:06:15Z", "stargazers_count": 9, "watchers_count": 9, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -511,7 +511,7 @@ "redteam" ], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 9, "score": 0, "subscribers_count": 1 diff --git a/README.md b/README.md index f2d1412ba1..20b386c95a 100644 --- a/README.md +++ b/README.md @@ -1060,7 +1060,11 @@ - [h4x0r-dz/CVE-2024-21893.py](https://github.com/h4x0r-dz/CVE-2024-21893.py) - [Chocapikk/CVE-2024-21893-to-CVE-2024-21887](https://github.com/Chocapikk/CVE-2024-21893-to-CVE-2024-21887) -### CVE-2024-22002 +### CVE-2024-22002 (2024-06-18) + +CORSAIR iCUE 5.9.105 with iCUE Murals on Windows allows unprivileged users to insert DLL files in the cuepkg-1.2.6 subdirectory of the installation directory. + + - [0xkickit/iCUE_DllHijack_LPE-CVE-2024-22002](https://github.com/0xkickit/iCUE_DllHijack_LPE-CVE-2024-22002) ### CVE-2024-22024 (2024-02-13) @@ -2245,6 +2249,7 @@ - [lvyitian/CVE-2024-30078-](https://github.com/lvyitian/CVE-2024-30078-) - [52by/CVE-2024-30078](https://github.com/52by/CVE-2024-30078) +- [nkontopoul/checkwifivulnerability](https://github.com/nkontopoul/checkwifivulnerability) ### CVE-2024-30212 (2024-05-28)