diff --git a/2019/CVE-2019-10945.json b/2019/CVE-2019-10945.json
index 50a433972d..5a83edbbaa 100644
--- a/2019/CVE-2019-10945.json
+++ b/2019/CVE-2019-10945.json
@@ -14,10 +14,10 @@
"description": "Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal \/ Authenticated Arbitrary File Deletion in Python3",
"fork": false,
"created_at": "2023-02-24T10:58:53Z",
- "updated_at": "2024-10-14T17:22:30Z",
+ "updated_at": "2025-01-01T06:54:51Z",
"pushed_at": "2023-02-27T16:32:59Z",
- "stargazers_count": 9,
- "watchers_count": 9,
+ "stargazers_count": 10,
+ "watchers_count": 10,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
- "watchers": 9,
+ "watchers": 10,
"score": 0,
"subscribers_count": 1
}
diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json
index 63cdb2091d..91b6b0fd42 100644
--- a/2021/CVE-2021-4034.json
+++ b/2021/CVE-2021-4034.json
@@ -54,13 +54,13 @@
"stargazers_count": 1974,
"watchers_count": 1974,
"has_discussions": false,
- "forks_count": 512,
+ "forks_count": 511,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 512,
+ "forks": 511,
"watchers": 1974,
"score": 0,
"subscribers_count": 20
@@ -967,10 +967,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
- "updated_at": "2024-12-29T01:58:07Z",
+ "updated_at": "2025-01-01T06:21:56Z",
"pushed_at": "2022-06-21T14:52:05Z",
- "stargazers_count": 1101,
- "watchers_count": 1101,
+ "stargazers_count": 1102,
+ "watchers_count": 1102,
"has_discussions": false,
"forks_count": 191,
"allow_forking": true,
@@ -981,7 +981,7 @@
],
"visibility": "public",
"forks": 191,
- "watchers": 1101,
+ "watchers": 1102,
"score": 0,
"subscribers_count": 14
},
diff --git a/2021/CVE-2021-4104.json b/2021/CVE-2021-4104.json
index 28b4e5e197..737bddfdc0 100644
--- a/2021/CVE-2021-4104.json
+++ b/2021/CVE-2021-4104.json
@@ -19,13 +19,13 @@
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
- "forks_count": 10,
+ "forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 10,
+ "forks": 8,
"watchers": 20,
"score": 0,
"subscribers_count": 3
diff --git a/2023/CVE-2023-21537.json b/2023/CVE-2023-21537.json
new file mode 100644
index 0000000000..3053170ade
--- /dev/null
+++ b/2023/CVE-2023-21537.json
@@ -0,0 +1,33 @@
+[
+ {
+ "id": 910730197,
+ "name": "CVE-2023-21537",
+ "full_name": "stevenjoezhang\/CVE-2023-21537",
+ "owner": {
+ "login": "stevenjoezhang",
+ "id": 16272760,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16272760?v=4",
+ "html_url": "https:\/\/github.com\/stevenjoezhang",
+ "user_view_type": "public"
+ },
+ "html_url": "https:\/\/github.com\/stevenjoezhang\/CVE-2023-21537",
+ "description": null,
+ "fork": false,
+ "created_at": "2025-01-01T08:17:26Z",
+ "updated_at": "2025-01-01T08:17:32Z",
+ "pushed_at": "2025-01-01T08:17:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-38408.json b/2023/CVE-2023-38408.json
index b6eadd0f2b..795081770d 100644
--- a/2023/CVE-2023-38408.json
+++ b/2023/CVE-2023-38408.json
@@ -19,13 +19,13 @@
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
- "forks_count": 8,
+ "forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 8,
+ "forks": 9,
"watchers": 36,
"score": 0,
"subscribers_count": 1
diff --git a/2023/CVE-2023-38829.json b/2023/CVE-2023-38829.json
index c1a4d30bd5..f2f652aa17 100644
--- a/2023/CVE-2023-38829.json
+++ b/2023/CVE-2023-38829.json
@@ -45,8 +45,8 @@
"description": "对NETIS WF2409E路由器进行的一次完整硬件安全分析研究。通过对设备进行拆解分析、调试接口识别、固件提取等工作,记录了硬件分析的全过程、漏洞细节以及相应的安全建议,希望能帮助提高物联网设备的安全性。",
"fork": false,
"created_at": "2024-12-27T18:09:13Z",
- "updated_at": "2024-12-28T13:40:36Z",
- "pushed_at": "2024-12-28T13:40:33Z",
+ "updated_at": "2025-01-01T11:17:43Z",
+ "pushed_at": "2025-01-01T11:17:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
diff --git a/2023/CVE-2023-40028.json b/2023/CVE-2023-40028.json
index f0d7442399..066f30dc41 100644
--- a/2023/CVE-2023-40028.json
+++ b/2023/CVE-2023-40028.json
@@ -76,8 +76,8 @@
"description": "CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to upload files that are symlinks. This can be exploited to perform an arbitrary file read of any file on the host operating system.",
"fork": false,
"created_at": "2024-12-12T18:50:58Z",
- "updated_at": "2024-12-18T22:12:57Z",
- "pushed_at": "2024-12-18T22:12:53Z",
+ "updated_at": "2025-01-01T11:29:06Z",
+ "pushed_at": "2025-01-01T11:29:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
diff --git a/2024/CVE-2024-21413.json b/2024/CVE-2024-21413.json
index 85e97baf61..777ec7c7f3 100644
--- a/2024/CVE-2024-21413.json
+++ b/2024/CVE-2024-21413.json
@@ -386,10 +386,10 @@
"description": "This is a mailer that use console prompt to exploit this vulnerability",
"fork": false,
"created_at": "2024-06-30T08:53:46Z",
- "updated_at": "2024-06-30T08:53:50Z",
+ "updated_at": "2025-01-01T07:17:19Z",
"pushed_at": "2024-06-30T11:10:05Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"has_discussions": true,
"forks_count": 0,
"allow_forking": true,
@@ -398,7 +398,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 1,
"score": 0,
"subscribers_count": 1
},
diff --git a/2024/CVE-2024-27956.json b/2024/CVE-2024-27956.json
index ea019aef79..0e1c54533c 100644
--- a/2024/CVE-2024-27956.json
+++ b/2024/CVE-2024-27956.json
@@ -169,12 +169,12 @@
"description": "WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target server. It utilizes the wp-automatic plugin's CSV injection vulnerability to execute SQL queries",
"fork": false,
"created_at": "2024-05-14T14:21:49Z",
- "updated_at": "2025-01-01T05:17:05Z",
+ "updated_at": "2025-01-01T10:07:35Z",
"pushed_at": "2024-07-01T09:29:02Z",
- "stargazers_count": 96,
- "watchers_count": 96,
+ "stargazers_count": 97,
+ "watchers_count": 97,
"has_discussions": false,
- "forks_count": 23,
+ "forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -200,8 +200,8 @@
"wordpress-plugin"
],
"visibility": "public",
- "forks": 23,
- "watchers": 96,
+ "forks": 24,
+ "watchers": 97,
"score": 0,
"subscribers_count": 3
},
diff --git a/2024/CVE-2024-35250.json b/2024/CVE-2024-35250.json
index 5e74ff1958..25d0c1c370 100644
--- a/2024/CVE-2024-35250.json
+++ b/2024/CVE-2024-35250.json
@@ -14,10 +14,10 @@
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
"fork": false,
"created_at": "2024-10-13T19:30:20Z",
- "updated_at": "2024-12-27T13:53:08Z",
+ "updated_at": "2025-01-01T09:54:09Z",
"pushed_at": "2024-11-29T16:56:23Z",
- "stargazers_count": 252,
- "watchers_count": 252,
+ "stargazers_count": 253,
+ "watchers_count": 253,
"has_discussions": false,
"forks_count": 56,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 56,
- "watchers": 252,
+ "watchers": 253,
"score": 0,
"subscribers_count": 7
},
diff --git a/2024/CVE-2024-38063.json b/2024/CVE-2024-38063.json
index ddf0de7d18..8ca36e323d 100644
--- a/2024/CVE-2024-38063.json
+++ b/2024/CVE-2024-38063.json
@@ -279,7 +279,7 @@
"forks": 115,
"watchers": 641,
"score": 0,
- "subscribers_count": 4
+ "subscribers_count": 5
},
{
"id": 848337529,
diff --git a/2024/CVE-2024-46542.json b/2024/CVE-2024-46542.json
index 354c8f623e..e2104db43c 100644
--- a/2024/CVE-2024-46542.json
+++ b/2024/CVE-2024-46542.json
@@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-50379.json b/2024/CVE-2024-50379.json
index 972be12726..28be0403d0 100644
--- a/2024/CVE-2024-50379.json
+++ b/2024/CVE-2024-50379.json
@@ -169,10 +169,10 @@
"description": "RCE through a race condition in Apache Tomcat",
"fork": false,
"created_at": "2024-12-21T05:54:29Z",
- "updated_at": "2024-12-31T10:33:55Z",
+ "updated_at": "2025-01-01T11:45:33Z",
"pushed_at": "2024-12-21T08:56:44Z",
- "stargazers_count": 47,
- "watchers_count": 47,
+ "stargazers_count": 48,
+ "watchers_count": 48,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
- "watchers": 47,
+ "watchers": 48,
"score": 0,
"subscribers_count": 2
},
diff --git a/2024/CVE-2024-50623.json b/2024/CVE-2024-50623.json
index 8e4916b8a6..21683f2c96 100644
--- a/2024/CVE-2024-50623.json
+++ b/2024/CVE-2024-50623.json
@@ -96,6 +96,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-51442.json b/2024/CVE-2024-51442.json
index 53878c38e1..b54249a61d 100644
--- a/2024/CVE-2024-51442.json
+++ b/2024/CVE-2024-51442.json
@@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/README.md b/README.md
index 21b5141fc8..359e4b2e63 100644
--- a/README.md
+++ b/README.md
@@ -9748,6 +9748,13 @@
- [Trinadh465/platform_frameworks_base_CVE-2023-21288](https://github.com/Trinadh465/platform_frameworks_base_CVE-2023-21288)
+### CVE-2023-21537 (2023-01-10)
+
+Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
+
+
+- [stevenjoezhang/CVE-2023-21537](https://github.com/stevenjoezhang/CVE-2023-21537)
+
### CVE-2023-21554 (2023-04-11)
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability