diff --git a/2009/CVE-2009-0689.json b/2009/CVE-2009-0689.json
index 0bf4d75aad..9fbb09e890 100644
--- a/2009/CVE-2009-0689.json
+++ b/2009/CVE-2009-0689.json
@@ -19,13 +19,13 @@
         "stargazers_count": 74,
         "watchers_count": 74,
         "has_discussions": false,
-        "forks_count": 14,
+        "forks_count": 15,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 14,
+        "forks": 15,
         "watchers": 74,
         "score": 0,
         "subscribers_count": 7
diff --git a/2019/CVE-2019-12725.json b/2019/CVE-2019-12725.json
index f824205ac1..3a4a9386f6 100644
--- a/2019/CVE-2019-12725.json
+++ b/2019/CVE-2019-12725.json
@@ -156,7 +156,7 @@
         "forks": 0,
         "watchers": 1,
         "score": 0,
-        "subscribers_count": 0
+        "subscribers_count": 1
     },
     {
         "id": 903995896,
@@ -187,6 +187,6 @@
         "forks": 0,
         "watchers": 0,
         "score": 0,
-        "subscribers_count": 0
+        "subscribers_count": 1
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json
index c904d41745..d91f6a5095 100644
--- a/2020/CVE-2020-14883.json
+++ b/2020/CVE-2020-14883.json
@@ -138,10 +138,10 @@
         "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
         "fork": false,
         "created_at": "2021-03-11T22:49:17Z",
-        "updated_at": "2024-11-27T17:40:14Z",
+        "updated_at": "2024-12-16T13:58:02Z",
         "pushed_at": "2023-05-11T14:36:58Z",
-        "stargazers_count": 1079,
-        "watchers_count": 1079,
+        "stargazers_count": 1080,
+        "watchers_count": 1080,
         "has_discussions": false,
         "forks_count": 318,
         "allow_forking": true,
@@ -154,7 +154,7 @@
         ],
         "visibility": "public",
         "forks": 318,
-        "watchers": 1079,
+        "watchers": 1080,
         "score": 0,
         "subscribers_count": 36
     },
diff --git a/2020/CVE-2020-5248.json b/2020/CVE-2020-5248.json
index 83f8cd0215..988d92e52e 100644
--- a/2020/CVE-2020-5248.json
+++ b/2020/CVE-2020-5248.json
@@ -14,10 +14,10 @@
         "description": "Proof of Concept (PoC) for CVE-2020-5248.",
         "fork": false,
         "created_at": "2020-10-09T12:31:19Z",
-        "updated_at": "2024-02-09T21:18:08Z",
+        "updated_at": "2024-12-16T16:23:20Z",
         "pushed_at": "2022-12-14T20:05:35Z",
-        "stargazers_count": 2,
-        "watchers_count": 2,
+        "stargazers_count": 3,
+        "watchers_count": 3,
         "has_discussions": false,
         "forks_count": 0,
         "allow_forking": true,
@@ -26,7 +26,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 0,
-        "watchers": 2,
+        "watchers": 3,
         "score": 0,
         "subscribers_count": 0
     },
diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json
index 94cab4effc..e8e0031a39 100644
--- a/2021/CVE-2021-25646.json
+++ b/2021/CVE-2021-25646.json
@@ -138,10 +138,10 @@
         "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
         "fork": false,
         "created_at": "2021-03-11T22:49:17Z",
-        "updated_at": "2024-11-27T17:40:14Z",
+        "updated_at": "2024-12-16T13:58:02Z",
         "pushed_at": "2023-05-11T14:36:58Z",
-        "stargazers_count": 1079,
-        "watchers_count": 1079,
+        "stargazers_count": 1080,
+        "watchers_count": 1080,
         "has_discussions": false,
         "forks_count": 318,
         "allow_forking": true,
@@ -154,7 +154,7 @@
         ],
         "visibility": "public",
         "forks": 318,
-        "watchers": 1079,
+        "watchers": 1080,
         "score": 0,
         "subscribers_count": 36
     },
diff --git a/2021/CVE-2021-26855.json b/2021/CVE-2021-26855.json
index af3d8883c4..1878363a75 100644
--- a/2021/CVE-2021-26855.json
+++ b/2021/CVE-2021-26855.json
@@ -744,10 +744,10 @@
         "description": "CVE-2021-26855 & CVE-2021-27065",
         "fork": false,
         "created_at": "2021-03-15T09:02:40Z",
-        "updated_at": "2024-08-12T20:11:13Z",
+        "updated_at": "2024-12-16T17:23:48Z",
         "pushed_at": "2021-03-15T09:19:45Z",
-        "stargazers_count": 26,
-        "watchers_count": 26,
+        "stargazers_count": 27,
+        "watchers_count": 27,
         "has_discussions": false,
         "forks_count": 10,
         "allow_forking": true,
@@ -760,7 +760,7 @@
         ],
         "visibility": "public",
         "forks": 10,
-        "watchers": 26,
+        "watchers": 27,
         "score": 0,
         "subscribers_count": 2
     },
diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json
index 0b9efa0b8f..44ed6a57df 100644
--- a/2022/CVE-2022-0847.json
+++ b/2022/CVE-2022-0847.json
@@ -572,10 +572,10 @@
         "description": "CVE-2022-0847",
         "fork": false,
         "created_at": "2022-03-08T20:18:28Z",
-        "updated_at": "2024-05-09T02:22:32Z",
+        "updated_at": "2024-12-16T14:36:05Z",
         "pushed_at": "2022-03-08T20:41:15Z",
-        "stargazers_count": 2,
-        "watchers_count": 2,
+        "stargazers_count": 3,
+        "watchers_count": 3,
         "has_discussions": false,
         "forks_count": 2,
         "allow_forking": true,
@@ -584,7 +584,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 2,
-        "watchers": 2,
+        "watchers": 3,
         "score": 0,
         "subscribers_count": 1
     },
@@ -1972,10 +1972,10 @@
         "description": "An eBPF detection program for CVE-2022-0847",
         "fork": false,
         "created_at": "2022-07-05T07:20:59Z",
-        "updated_at": "2024-08-09T11:36:06Z",
+        "updated_at": "2024-12-16T13:13:20Z",
         "pushed_at": "2022-07-05T14:25:46Z",
-        "stargazers_count": 27,
-        "watchers_count": 27,
+        "stargazers_count": 28,
+        "watchers_count": 28,
         "has_discussions": false,
         "forks_count": 3,
         "allow_forking": true,
@@ -1984,7 +1984,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 3,
-        "watchers": 27,
+        "watchers": 28,
         "score": 0,
         "subscribers_count": 9
     },
diff --git a/2022/CVE-2022-22980.json b/2022/CVE-2022-22980.json
index 2193efabc9..d0b14e7f03 100644
--- a/2022/CVE-2022-22980.json
+++ b/2022/CVE-2022-22980.json
@@ -138,10 +138,10 @@
         "description": "[CVE-2022-22980] Spring Data MongoDB SpEL Expression Injection",
         "fork": false,
         "created_at": "2022-06-28T21:42:35Z",
-        "updated_at": "2024-08-12T20:24:35Z",
+        "updated_at": "2024-12-16T16:42:14Z",
         "pushed_at": "2022-06-28T22:27:58Z",
-        "stargazers_count": 4,
-        "watchers_count": 4,
+        "stargazers_count": 5,
+        "watchers_count": 5,
         "has_discussions": false,
         "forks_count": 3,
         "allow_forking": true,
@@ -150,7 +150,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 3,
-        "watchers": 4,
+        "watchers": 5,
         "score": 0,
         "subscribers_count": 1
     },
diff --git a/2022/CVE-2022-25636.json b/2022/CVE-2022-25636.json
index b8ed771edb..cbbc265c08 100644
--- a/2022/CVE-2022-25636.json
+++ b/2022/CVE-2022-25636.json
@@ -14,10 +14,10 @@
         "description": "CVE-2022-25636",
         "fork": false,
         "created_at": "2022-03-07T13:38:41Z",
-        "updated_at": "2024-09-27T13:47:21Z",
+        "updated_at": "2024-12-16T14:15:56Z",
         "pushed_at": "2022-03-07T17:18:19Z",
-        "stargazers_count": 426,
-        "watchers_count": 426,
+        "stargazers_count": 427,
+        "watchers_count": 427,
         "has_discussions": false,
         "forks_count": 83,
         "allow_forking": true,
@@ -26,7 +26,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 83,
-        "watchers": 426,
+        "watchers": 427,
         "score": 0,
         "subscribers_count": 6
     },
diff --git a/2023/CVE-2023-28218.json b/2023/CVE-2023-28218.json
index e89633b781..16e7cc332f 100644
--- a/2023/CVE-2023-28218.json
+++ b/2023/CVE-2023-28218.json
@@ -19,13 +19,13 @@
         "stargazers_count": 0,
         "watchers_count": 0,
         "has_discussions": false,
-        "forks_count": 0,
+        "forks_count": 1,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 0,
+        "forks": 1,
         "watchers": 0,
         "score": 0,
         "subscribers_count": 2
diff --git a/2023/CVE-2023-3460.json b/2023/CVE-2023-3460.json
index d9ab340ce1..8f9936e116 100644
--- a/2023/CVE-2023-3460.json
+++ b/2023/CVE-2023-3460.json
@@ -265,8 +265,8 @@
         "description": "Cái này dựng lên với mục đích cho ae tham khảo, chê thì đừng có xem. :))))",
         "fork": false,
         "created_at": "2024-12-11T07:38:22Z",
-        "updated_at": "2024-12-12T01:40:38Z",
-        "pushed_at": "2024-12-12T01:40:33Z",
+        "updated_at": "2024-12-16T13:51:41Z",
+        "pushed_at": "2024-12-16T13:51:36Z",
         "stargazers_count": 0,
         "watchers_count": 0,
         "has_discussions": false,
diff --git a/2023/CVE-2023-38709.json b/2023/CVE-2023-38709.json
index 2e48254200..00a1e9fc30 100644
--- a/2023/CVE-2023-38709.json
+++ b/2023/CVE-2023-38709.json
@@ -14,12 +14,12 @@
         "description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 ,  CVE-2024-38473 , CVE-2023-38709",
         "fork": false,
         "created_at": "2024-10-05T20:32:45Z",
-        "updated_at": "2024-12-16T09:57:04Z",
+        "updated_at": "2024-12-16T15:06:10Z",
         "pushed_at": "2024-10-05T20:37:02Z",
-        "stargazers_count": 31,
-        "watchers_count": 31,
+        "stargazers_count": 32,
+        "watchers_count": 32,
         "has_discussions": false,
-        "forks_count": 6,
+        "forks_count": 7,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
@@ -36,8 +36,8 @@
             "cve-2024-39573"
         ],
         "visibility": "public",
-        "forks": 6,
-        "watchers": 31,
+        "forks": 7,
+        "watchers": 32,
         "score": 0,
         "subscribers_count": 1
     }
diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json
index de9a252f6d..410fe66fa8 100644
--- a/2023/CVE-2023-38831.json
+++ b/2023/CVE-2023-38831.json
@@ -45,10 +45,10 @@
         "description": "CVE-2023-38831 winrar exploit generator",
         "fork": false,
         "created_at": "2023-08-25T09:44:08Z",
-        "updated_at": "2024-12-09T18:18:45Z",
+        "updated_at": "2024-12-16T14:43:13Z",
         "pushed_at": "2023-11-26T06:46:44Z",
-        "stargazers_count": 783,
-        "watchers_count": 783,
+        "stargazers_count": 784,
+        "watchers_count": 784,
         "has_discussions": false,
         "forks_count": 139,
         "allow_forking": true,
@@ -61,7 +61,7 @@
         ],
         "visibility": "public",
         "forks": 139,
-        "watchers": 783,
+        "watchers": 784,
         "score": 0,
         "subscribers_count": 9
     },
@@ -1620,8 +1620,8 @@
         "description": null,
         "fork": false,
         "created_at": "2024-12-03T11:13:37Z",
-        "updated_at": "2024-12-03T11:17:23Z",
-        "pushed_at": "2024-12-03T11:17:20Z",
+        "updated_at": "2024-12-16T15:10:50Z",
+        "pushed_at": "2024-12-16T15:10:46Z",
         "stargazers_count": 0,
         "watchers_count": 0,
         "has_discussions": false,
diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json
index bbfaddd94a..5266b04150 100644
--- a/2023/CVE-2023-45866.json
+++ b/2023/CVE-2023-45866.json
@@ -14,10 +14,10 @@
         "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
         "fork": false,
         "created_at": "2024-01-16T06:52:02Z",
-        "updated_at": "2024-12-16T12:18:00Z",
+        "updated_at": "2024-12-16T13:26:52Z",
         "pushed_at": "2024-08-18T08:26:46Z",
-        "stargazers_count": 1295,
-        "watchers_count": 1295,
+        "stargazers_count": 1297,
+        "watchers_count": 1297,
         "has_discussions": false,
         "forks_count": 221,
         "allow_forking": true,
@@ -26,7 +26,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 221,
-        "watchers": 1295,
+        "watchers": 1297,
         "score": 0,
         "subscribers_count": 21
     },
@@ -200,10 +200,10 @@
         "description": "Exploit basado en vulnerabilidades criticas Bluetooth (CVE-2023-45866, CVE-2024-21306)",
         "fork": false,
         "created_at": "2024-12-15T03:00:47Z",
-        "updated_at": "2024-12-15T06:45:36Z",
+        "updated_at": "2024-12-16T12:33:43Z",
         "pushed_at": "2024-12-15T06:41:13Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
+        "stargazers_count": 1,
+        "watchers_count": 1,
         "has_discussions": false,
         "forks_count": 0,
         "allow_forking": true,
@@ -212,7 +212,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 0,
-        "watchers": 0,
+        "watchers": 1,
         "score": 0,
         "subscribers_count": 1
     }
diff --git a/2024/CVE-2024-10793.json b/2024/CVE-2024-10793.json
index 2e9fa81a06..4d6674bccb 100644
--- a/2024/CVE-2024-10793.json
+++ b/2024/CVE-2024-10793.json
@@ -19,13 +19,13 @@
         "stargazers_count": 3,
         "watchers_count": 3,
         "has_discussions": false,
-        "forks_count": 0,
+        "forks_count": 1,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 0,
+        "forks": 1,
         "watchers": 3,
         "score": 0,
         "subscribers_count": 1
diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json
index 5e38208198..93f9f26d14 100644
--- a/2024/CVE-2024-1086.json
+++ b/2024/CVE-2024-1086.json
@@ -14,12 +14,12 @@
         "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
         "fork": false,
         "created_at": "2024-03-20T21:16:41Z",
-        "updated_at": "2024-12-10T09:00:58Z",
+        "updated_at": "2024-12-16T13:59:35Z",
         "pushed_at": "2024-04-17T16:09:54Z",
-        "stargazers_count": 2299,
-        "watchers_count": 2299,
+        "stargazers_count": 2300,
+        "watchers_count": 2300,
         "has_discussions": false,
-        "forks_count": 299,
+        "forks_count": 297,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
@@ -31,8 +31,8 @@
             "poc"
         ],
         "visibility": "public",
-        "forks": 299,
-        "watchers": 2299,
+        "forks": 297,
+        "watchers": 2300,
         "score": 0,
         "subscribers_count": 26
     },
@@ -190,5 +190,36 @@
         "watchers": 0,
         "score": 0,
         "subscribers_count": 1
+    },
+    {
+        "id": 904336421,
+        "name": "CVE-2024-1086",
+        "full_name": "LLfam\/CVE-2024-1086",
+        "owner": {
+            "login": "LLfam",
+            "id": 43279891,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43279891?v=4",
+            "html_url": "https:\/\/github.com\/LLfam",
+            "user_view_type": "public"
+        },
+        "html_url": "https:\/\/github.com\/LLfam\/CVE-2024-1086",
+        "description": null,
+        "fork": false,
+        "created_at": "2024-12-16T17:33:13Z",
+        "updated_at": "2024-12-16T17:38:28Z",
+        "pushed_at": "2024-12-16T17:38:23Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "has_discussions": false,
+        "forks_count": 0,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 0,
+        "watchers": 0,
+        "score": 0,
+        "subscribers_count": 0
     }
 ]
\ No newline at end of file
diff --git a/2024/CVE-2024-10914.json b/2024/CVE-2024-10914.json
index 415e59a4a2..dd6f593522 100644
--- a/2024/CVE-2024-10914.json
+++ b/2024/CVE-2024-10914.json
@@ -146,8 +146,8 @@
         "description": "CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices.",
         "fork": false,
         "created_at": "2024-11-16T16:32:05Z",
-        "updated_at": "2024-12-16T11:58:05Z",
-        "pushed_at": "2024-12-16T11:58:00Z",
+        "updated_at": "2024-12-16T14:08:57Z",
+        "pushed_at": "2024-12-16T14:08:53Z",
         "stargazers_count": 1,
         "watchers_count": 1,
         "has_discussions": false,
diff --git a/2024/CVE-2024-21306.json b/2024/CVE-2024-21306.json
index 7cec0871a6..b1cc21c6f9 100644
--- a/2024/CVE-2024-21306.json
+++ b/2024/CVE-2024-21306.json
@@ -76,10 +76,10 @@
         "description": "Exploit basado en vulnerabilidades criticas Bluetooth (CVE-2023-45866, CVE-2024-21306)",
         "fork": false,
         "created_at": "2024-12-15T03:00:47Z",
-        "updated_at": "2024-12-15T06:45:36Z",
+        "updated_at": "2024-12-16T12:33:43Z",
         "pushed_at": "2024-12-15T06:41:13Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
+        "stargazers_count": 1,
+        "watchers_count": 1,
         "has_discussions": false,
         "forks_count": 0,
         "allow_forking": true,
@@ -88,7 +88,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 0,
-        "watchers": 0,
+        "watchers": 1,
         "score": 0,
         "subscribers_count": 1
     }
diff --git a/2024/CVE-2024-23692.json b/2024/CVE-2024-23692.json
index e06fde4be9..f8e0e706e5 100644
--- a/2024/CVE-2024-23692.json
+++ b/2024/CVE-2024-23692.json
@@ -45,10 +45,10 @@
         "description": "Unauthenticated RCE Flaw in Rejetto HTTP File Server (CVE-2024-23692)",
         "fork": false,
         "created_at": "2024-06-13T06:00:24Z",
-        "updated_at": "2024-11-11T12:02:29Z",
+        "updated_at": "2024-12-16T15:23:00Z",
         "pushed_at": "2024-06-13T07:00:23Z",
-        "stargazers_count": 8,
-        "watchers_count": 8,
+        "stargazers_count": 9,
+        "watchers_count": 9,
         "has_discussions": false,
         "forks_count": 6,
         "allow_forking": true,
@@ -57,7 +57,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 6,
-        "watchers": 8,
+        "watchers": 9,
         "score": 0,
         "subscribers_count": 1
     },
@@ -293,10 +293,10 @@
         "description": "POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692 ",
         "fork": false,
         "created_at": "2024-09-15T12:15:35Z",
-        "updated_at": "2024-12-05T09:44:16Z",
+        "updated_at": "2024-12-16T15:09:24Z",
         "pushed_at": "2024-11-26T14:45:12Z",
-        "stargazers_count": 35,
-        "watchers_count": 35,
+        "stargazers_count": 36,
+        "watchers_count": 36,
         "has_discussions": false,
         "forks_count": 15,
         "allow_forking": true,
@@ -310,7 +310,7 @@
         ],
         "visibility": "public",
         "forks": 15,
-        "watchers": 35,
+        "watchers": 36,
         "score": 0,
         "subscribers_count": 1
     },
diff --git a/2024/CVE-2024-38472.json b/2024/CVE-2024-38472.json
index d8780ea1d8..6adc97addc 100644
--- a/2024/CVE-2024-38472.json
+++ b/2024/CVE-2024-38472.json
@@ -45,12 +45,12 @@
         "description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 ,  CVE-2024-38473 , CVE-2023-38709",
         "fork": false,
         "created_at": "2024-10-05T20:32:45Z",
-        "updated_at": "2024-12-16T09:57:04Z",
+        "updated_at": "2024-12-16T15:06:10Z",
         "pushed_at": "2024-10-05T20:37:02Z",
-        "stargazers_count": 31,
-        "watchers_count": 31,
+        "stargazers_count": 32,
+        "watchers_count": 32,
         "has_discussions": false,
-        "forks_count": 6,
+        "forks_count": 7,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
@@ -67,8 +67,8 @@
             "cve-2024-39573"
         ],
         "visibility": "public",
-        "forks": 6,
-        "watchers": 31,
+        "forks": 7,
+        "watchers": 32,
         "score": 0,
         "subscribers_count": 1
     }
diff --git a/2024/CVE-2024-38819.json b/2024/CVE-2024-38819.json
index 72be74c8f5..8c06fd849c 100644
--- a/2024/CVE-2024-38819.json
+++ b/2024/CVE-2024-38819.json
@@ -19,13 +19,13 @@
         "stargazers_count": 16,
         "watchers_count": 16,
         "has_discussions": false,
-        "forks_count": 5,
+        "forks_count": 7,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 5,
+        "forks": 7,
         "watchers": 16,
         "score": 0,
         "subscribers_count": 2
diff --git a/2024/CVE-2024-38998.json b/2024/CVE-2024-38998.json
index 94dd4085d6..6798e0932b 100644
--- a/2024/CVE-2024-38998.json
+++ b/2024/CVE-2024-38998.json
@@ -2,15 +2,15 @@
     {
         "id": 902615056,
         "name": "PP_CVE-2024-38998",
-        "full_name": "AlbedoPrime\/PP_CVE-2024-38998",
+        "full_name": "z3ldr1\/PP_CVE-2024-38998",
         "owner": {
-            "login": "AlbedoPrime",
+            "login": "z3ldr1",
             "id": 128452420,
             "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128452420?v=4",
-            "html_url": "https:\/\/github.com\/AlbedoPrime",
+            "html_url": "https:\/\/github.com\/z3ldr1",
             "user_view_type": "public"
         },
-        "html_url": "https:\/\/github.com\/AlbedoPrime\/PP_CVE-2024-38998",
+        "html_url": "https:\/\/github.com\/z3ldr1\/PP_CVE-2024-38998",
         "description": "Uma vulnerabilidade (CVE-2024-38998) foi identificada na versão 2.3.6 do módulo JavaScript requirejs. Ela explora prototype pollution na função config, permitindo que invasores modifiquem Object.prototype com entradas maliciosas. Isso pode causar DoS, execução remota de código (RCE) ou XSS. A gravidade é crítica (CVSS 9.8). ",
         "fork": false,
         "created_at": "2024-12-12T23:19:44Z",
diff --git a/2024/CVE-2024-46538.json b/2024/CVE-2024-46538.json
index 1eda19c15f..cca5fa8818 100644
--- a/2024/CVE-2024-46538.json
+++ b/2024/CVE-2024-46538.json
@@ -55,10 +55,10 @@
         "description": "based on [EQSTLab](https:\/\/github.com\/EQSTLab)",
         "fork": false,
         "created_at": "2024-12-04T15:51:40Z",
-        "updated_at": "2024-12-12T23:58:51Z",
+        "updated_at": "2024-12-16T14:03:29Z",
         "pushed_at": "2024-12-04T16:00:45Z",
-        "stargazers_count": 3,
-        "watchers_count": 3,
+        "stargazers_count": 4,
+        "watchers_count": 4,
         "has_discussions": false,
         "forks_count": 2,
         "allow_forking": true,
@@ -67,7 +67,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 2,
-        "watchers": 3,
+        "watchers": 4,
         "score": 0,
         "subscribers_count": 1
     }
diff --git a/2024/CVE-2024-49039.json b/2024/CVE-2024-49039.json
index 44a6b02cb5..0df554c087 100644
--- a/2024/CVE-2024-49039.json
+++ b/2024/CVE-2024-49039.json
@@ -14,10 +14,10 @@
         "description": "WPTaskScheduler RPC Persistence &  CVE-2024-49039 via Task Scheduler",
         "fork": false,
         "created_at": "2024-11-19T08:57:18Z",
-        "updated_at": "2024-12-15T08:29:33Z",
+        "updated_at": "2024-12-16T13:59:04Z",
         "pushed_at": "2024-11-19T09:15:26Z",
-        "stargazers_count": 87,
-        "watchers_count": 87,
+        "stargazers_count": 88,
+        "watchers_count": 88,
         "has_discussions": false,
         "forks_count": 19,
         "allow_forking": true,
@@ -26,8 +26,39 @@
         "topics": [],
         "visibility": "public",
         "forks": 19,
-        "watchers": 87,
+        "watchers": 88,
         "score": 0,
         "subscribers_count": 1
+    },
+    {
+        "id": 904220023,
+        "name": "CVE-2024-49039",
+        "full_name": "Alexandr-bit253\/CVE-2024-49039",
+        "owner": {
+            "login": "Alexandr-bit253",
+            "id": 102812557,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102812557?v=4",
+            "html_url": "https:\/\/github.com\/Alexandr-bit253",
+            "user_view_type": "public"
+        },
+        "html_url": "https:\/\/github.com\/Alexandr-bit253\/CVE-2024-49039",
+        "description": null,
+        "fork": false,
+        "created_at": "2024-12-16T13:25:56Z",
+        "updated_at": "2024-12-16T16:07:49Z",
+        "pushed_at": "2024-12-16T13:28:19Z",
+        "stargazers_count": 1,
+        "watchers_count": 1,
+        "has_discussions": false,
+        "forks_count": 0,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 0,
+        "watchers": 1,
+        "score": 0,
+        "subscribers_count": 0
     }
 ]
\ No newline at end of file
diff --git a/2024/CVE-2024-49112.json b/2024/CVE-2024-49112.json
new file mode 100644
index 0000000000..6397e4643a
--- /dev/null
+++ b/2024/CVE-2024-49112.json
@@ -0,0 +1,33 @@
+[
+    {
+        "id": 904227549,
+        "name": "poc_monitor",
+        "full_name": "tnkr\/poc_monitor",
+        "owner": {
+            "login": "tnkr",
+            "id": 24298003,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24298003?v=4",
+            "html_url": "https:\/\/github.com\/tnkr",
+            "user_view_type": "public"
+        },
+        "html_url": "https:\/\/github.com\/tnkr\/poc_monitor",
+        "description": "A short scraper looking for a POC of CVE-2024-49112",
+        "fork": false,
+        "created_at": "2024-12-16T13:41:40Z",
+        "updated_at": "2024-12-16T16:12:54Z",
+        "pushed_at": "2024-12-16T14:12:03Z",
+        "stargazers_count": 4,
+        "watchers_count": 4,
+        "has_discussions": false,
+        "forks_count": 0,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 0,
+        "watchers": 4,
+        "score": 0,
+        "subscribers_count": 0
+    }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-50623.json b/2024/CVE-2024-50623.json
index 190224b7c0..b6ef9b7909 100644
--- a/2024/CVE-2024-50623.json
+++ b/2024/CVE-2024-50623.json
@@ -14,10 +14,10 @@
         "description": "Cleo Unrestricted file upload and download PoC (CVE-2024-50623)",
         "fork": false,
         "created_at": "2024-12-11T14:19:55Z",
-        "updated_at": "2024-12-14T15:47:45Z",
+        "updated_at": "2024-12-16T16:19:14Z",
         "pushed_at": "2024-12-11T14:23:19Z",
-        "stargazers_count": 17,
-        "watchers_count": 17,
+        "stargazers_count": 18,
+        "watchers_count": 18,
         "has_discussions": false,
         "forks_count": 5,
         "allow_forking": true,
@@ -26,7 +26,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 5,
-        "watchers": 17,
+        "watchers": 18,
         "score": 0,
         "subscribers_count": 0
     }
diff --git a/2024/CVE-2024-53677.json b/2024/CVE-2024-53677.json
index 274c168141..c6da3c8f66 100644
--- a/2024/CVE-2024-53677.json
+++ b/2024/CVE-2024-53677.json
@@ -50,13 +50,13 @@
         "stargazers_count": 8,
         "watchers_count": 8,
         "has_discussions": false,
-        "forks_count": 4,
+        "forks_count": 5,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 4,
+        "forks": 5,
         "watchers": 8,
         "score": 0,
         "subscribers_count": 1
diff --git a/2024/CVE-2024-9464.json b/2024/CVE-2024-9464.json
index 897e52b9cf..e278efad47 100644
--- a/2024/CVE-2024-9464.json
+++ b/2024/CVE-2024-9464.json
@@ -14,10 +14,10 @@
         "description": "Proof of Concept Exploit for CVE-2024-9464",
         "fork": false,
         "created_at": "2024-10-09T16:36:25Z",
-        "updated_at": "2024-11-25T11:50:34Z",
+        "updated_at": "2024-12-16T15:16:53Z",
         "pushed_at": "2024-10-09T16:41:41Z",
-        "stargazers_count": 43,
-        "watchers_count": 43,
+        "stargazers_count": 44,
+        "watchers_count": 44,
         "has_discussions": false,
         "forks_count": 11,
         "allow_forking": true,
@@ -26,7 +26,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 11,
-        "watchers": 43,
+        "watchers": 44,
         "score": 0,
         "subscribers_count": 4
     }
diff --git a/2024/CVE-2024-9796.json b/2024/CVE-2024-9796.json
index c125bbdfc2..bbf205093d 100644
--- a/2024/CVE-2024-9796.json
+++ b/2024/CVE-2024-9796.json
@@ -45,7 +45,7 @@
         "description": "WordPress WP-Advanced-Search <= 3.3.9 - Unauthenticated SQL Injection",
         "fork": false,
         "created_at": "2024-11-15T22:55:18Z",
-        "updated_at": "2024-11-26T14:47:16Z",
+        "updated_at": "2024-12-16T14:47:33Z",
         "pushed_at": "2024-11-15T23:04:07Z",
         "stargazers_count": 3,
         "watchers_count": 3,
diff --git a/README.md b/README.md
index 40c9cdcfe0..c4f9473a2f 100644
--- a/README.md
+++ b/README.md
@@ -311,6 +311,7 @@
 - [kevcooper/CVE-2024-1086-checker](https://github.com/kevcooper/CVE-2024-1086-checker)
 - [feely666/CVE-2024-1086](https://github.com/feely666/CVE-2024-1086)
 - [xzx482/CVE-2024-1086](https://github.com/xzx482/CVE-2024-1086)
+- [LLfam/CVE-2024-1086](https://github.com/LLfam/CVE-2024-1086)
 
 ### CVE-2024-1112 (2024-01-31)
 
@@ -5754,7 +5755,7 @@
 <code>jrburke requirejs v2.3.6 was discovered to contain a prototype pollution via the function config. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties.
 </code>
 
-- [AlbedoPrime/PP_CVE-2024-38998](https://github.com/AlbedoPrime/PP_CVE-2024-38998)
+- [z3ldr1/PP_CVE-2024-38998](https://github.com/z3ldr1/PP_CVE-2024-38998)
 
 ### CVE-2024-39031 (2024-07-09)
 
@@ -6924,6 +6925,14 @@
 </code>
 
 - [je5442804/WPTaskScheduler_CVE-2024-49039](https://github.com/je5442804/WPTaskScheduler_CVE-2024-49039)
+- [Alexandr-bit253/CVE-2024-49039](https://github.com/Alexandr-bit253/CVE-2024-49039)
+
+### CVE-2024-49112 (2024-12-10)
+
+<code>Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
+</code>
+
+- [tnkr/poc_monitor](https://github.com/tnkr/poc_monitor)
 
 ### CVE-2024-49203 (2024-11-20)