diff --git a/2012/CVE-2012-1823.json b/2012/CVE-2012-1823.json
index 60acd059f4..05fcb6b11f 100644
--- a/2012/CVE-2012-1823.json
+++ b/2012/CVE-2012-1823.json
@@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2015-09-08T14:37:25Z",
- "updated_at": "2017-03-17T07:12:48Z",
+ "updated_at": "2025-01-03T12:20:42Z",
"pushed_at": "2015-09-08T14:40:12Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
- "watchers": 0,
+ "watchers": 1,
"score": 0,
"subscribers_count": 2
},
diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json
index 977e7cb030..32021b9e32 100644
--- a/2014/CVE-2014-0160.json
+++ b/2014/CVE-2014-0160.json
@@ -45,10 +45,10 @@
"description": "OpenSSL CVE-2014-0160 Heartbleed vulnerability test",
"fork": false,
"created_at": "2014-04-08T04:25:23Z",
- "updated_at": "2024-12-20T15:54:03Z",
+ "updated_at": "2025-01-03T16:50:21Z",
"pushed_at": "2014-05-27T22:32:26Z",
- "stargazers_count": 450,
- "watchers_count": 450,
+ "stargazers_count": 451,
+ "watchers_count": 451,
"has_discussions": false,
"forks_count": 86,
"allow_forking": true,
@@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 86,
- "watchers": 450,
+ "watchers": 451,
"score": 0,
"subscribers_count": 30
},
@@ -169,10 +169,10 @@
"description": "Multi-threaded tool for scanning many hosts for CVE-2014-0160.",
"fork": false,
"created_at": "2014-04-08T10:10:43Z",
- "updated_at": "2024-08-12T19:23:38Z",
+ "updated_at": "2025-01-03T16:50:42Z",
"pushed_at": "2015-07-02T14:47:31Z",
- "stargazers_count": 572,
- "watchers_count": 572,
+ "stargazers_count": 573,
+ "watchers_count": 573,
"has_discussions": false,
"forks_count": 213,
"allow_forking": true,
@@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 213,
- "watchers": 572,
+ "watchers": 573,
"score": 0,
"subscribers_count": 57
},
diff --git a/2017/CVE-2017-20165.json b/2017/CVE-2017-20165.json
index e71458310d..890bd8bae8 100644
--- a/2017/CVE-2017-20165.json
+++ b/2017/CVE-2017-20165.json
@@ -14,8 +14,8 @@
"description": "Fork of the send module to deal with CVE-2017-20165",
"fork": false,
"created_at": "2023-01-11T10:20:27Z",
- "updated_at": "2024-12-29T10:28:34Z",
- "pushed_at": "2024-12-22T17:22:54Z",
+ "updated_at": "2025-01-03T17:29:40Z",
+ "pushed_at": "2025-01-03T17:29:41Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
diff --git a/2017/CVE-2017-7921.json b/2017/CVE-2017-7921.json
index a22e8bd255..0a17ff6dba 100644
--- a/2017/CVE-2017-7921.json
+++ b/2017/CVE-2017-7921.json
@@ -107,10 +107,10 @@
"description": "This python file will decrypt the configurationFile used by hikvision cameras vulnerable to CVE-2017-7921.",
"fork": false,
"created_at": "2021-01-29T16:08:35Z",
- "updated_at": "2024-12-25T13:08:20Z",
+ "updated_at": "2025-01-03T14:57:57Z",
"pushed_at": "2021-01-29T16:22:39Z",
- "stargazers_count": 100,
- "watchers_count": 100,
+ "stargazers_count": 101,
+ "watchers_count": 101,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
- "watchers": 100,
+ "watchers": 101,
"score": 0,
"subscribers_count": 3
},
diff --git a/2017/CVE-2017-8056.json b/2017/CVE-2017-8056.json
index 270ccc95e1..8922eab974 100644
--- a/2017/CVE-2017-8056.json
+++ b/2017/CVE-2017-8056.json
@@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2019/CVE-2019-2890.json b/2019/CVE-2019-2890.json
index 829e29642b..7c4e490f35 100644
--- a/2019/CVE-2019-2890.json
+++ b/2019/CVE-2019-2890.json
@@ -138,10 +138,10 @@
"description": "CVE-2019-2890 WebLogic 反序列化RCE漏洞",
"fork": false,
"created_at": "2019-12-08T05:03:32Z",
- "updated_at": "2024-11-25T09:55:59Z",
+ "updated_at": "2025-01-03T14:34:21Z",
"pushed_at": "2019-12-08T05:50:42Z",
- "stargazers_count": 42,
- "watchers_count": 42,
+ "stargazers_count": 43,
+ "watchers_count": 43,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@@ -150,7 +150,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
- "watchers": 42,
+ "watchers": 43,
"score": 0,
"subscribers_count": 2
},
diff --git a/2020/CVE-2020-3452.json b/2020/CVE-2020-3452.json
index 424a7c3716..c405a50c84 100644
--- a/2020/CVE-2020-3452.json
+++ b/2020/CVE-2020-3452.json
@@ -467,7 +467,7 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
- "forks_count": 1,
+ "forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -476,7 +476,7 @@
"penetration-testing"
],
"visibility": "public",
- "forks": 1,
+ "forks": 2,
"watchers": 5,
"score": 0,
"subscribers_count": 2
diff --git a/2020/CVE-2020-9038.json b/2020/CVE-2020-9038.json
index 3d285950ba..da031a37b2 100644
--- a/2020/CVE-2020-9038.json
+++ b/2020/CVE-2020-9038.json
@@ -14,10 +14,10 @@
"description": "Disclosure report of CVE-2020-9038",
"fork": false,
"created_at": "2020-02-27T11:02:16Z",
- "updated_at": "2024-08-12T19:58:10Z",
+ "updated_at": "2025-01-03T18:12:10Z",
"pushed_at": "2020-02-27T11:38:30Z",
- "stargazers_count": 4,
- "watchers_count": 4,
+ "stargazers_count": 5,
+ "watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 4,
+ "watchers": 5,
"score": 0,
"subscribers_count": 1
}
diff --git a/2021/CVE-2021-27928.json b/2021/CVE-2021-27928.json
index 7b072f6788..31fa2125b2 100644
--- a/2021/CVE-2021-27928.json
+++ b/2021/CVE-2021-27928.json
@@ -14,10 +14,10 @@
"description": "CVE-2021-27928 MariaDB\/MySQL-'wsrep provider' 命令注入漏洞",
"fork": false,
"created_at": "2021-04-15T06:40:49Z",
- "updated_at": "2024-10-06T15:29:45Z",
+ "updated_at": "2025-01-03T13:24:24Z",
"pushed_at": "2023-06-29T15:57:12Z",
- "stargazers_count": 60,
- "watchers_count": 60,
+ "stargazers_count": 61,
+ "watchers_count": 61,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 16,
- "watchers": 60,
+ "watchers": 61,
"score": 0,
"subscribers_count": 1
},
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
index 1ac7a43b2a..398416c84a 100644
--- a/2021/CVE-2021-44228.json
+++ b/2021/CVE-2021-44228.json
@@ -3749,10 +3749,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
- "updated_at": "2025-01-03T06:15:33Z",
+ "updated_at": "2025-01-03T17:53:38Z",
"pushed_at": "2022-11-23T18:23:24Z",
- "stargazers_count": 3405,
- "watchers_count": 3405,
+ "stargazers_count": 3404,
+ "watchers_count": 3404,
"has_discussions": true,
"forks_count": 739,
"allow_forking": true,
@@ -3761,7 +3761,7 @@
"topics": [],
"visibility": "public",
"forks": 739,
- "watchers": 3405,
+ "watchers": 3404,
"score": 0,
"subscribers_count": 55
},
@@ -12768,7 +12768,7 @@
"fork": false,
"created_at": "2025-01-03T10:15:17Z",
"updated_at": "2025-01-03T10:15:21Z",
- "pushed_at": "2025-01-03T10:18:47Z",
+ "pushed_at": "2025-01-03T16:36:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
diff --git a/2022/CVE-2022-29464.json b/2022/CVE-2022-29464.json
index 447fa899e0..08b753f5fa 100644
--- a/2022/CVE-2022-29464.json
+++ b/2022/CVE-2022-29464.json
@@ -501,10 +501,10 @@
"description": "CVE-2022-29464 PoC for WSO2 products",
"fork": false,
"created_at": "2022-06-04T16:46:52Z",
- "updated_at": "2024-11-25T04:18:25Z",
+ "updated_at": "2025-01-03T16:28:31Z",
"pushed_at": "2022-06-04T17:55:28Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "stargazers_count": 4,
+ "watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -513,7 +513,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
- "watchers": 3,
+ "watchers": 4,
"score": 0,
"subscribers_count": 1
},
diff --git a/2022/CVE-2022-31101.json b/2022/CVE-2022-31101.json
index 2c867eb446..84a540dac0 100644
--- a/2022/CVE-2022-31101.json
+++ b/2022/CVE-2022-31101.json
@@ -51,10 +51,10 @@
"description": "Exploit for PrestaShop bockwishlist module 2.1.0 SQLi (CVE-2022-31101)",
"fork": false,
"created_at": "2022-08-09T10:29:48Z",
- "updated_at": "2024-08-12T20:26:01Z",
+ "updated_at": "2025-01-03T17:27:02Z",
"pushed_at": "2022-08-09T14:55:35Z",
- "stargazers_count": 26,
- "watchers_count": 26,
+ "stargazers_count": 25,
+ "watchers_count": 25,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@@ -68,7 +68,7 @@
],
"visibility": "public",
"forks": 13,
- "watchers": 26,
+ "watchers": 25,
"score": 0,
"subscribers_count": 2
}
diff --git a/2022/CVE-2022-46169.json b/2022/CVE-2022-46169.json
index 32aa25b3a9..d73443e42e 100644
--- a/2022/CVE-2022-46169.json
+++ b/2022/CVE-2022-46169.json
@@ -146,10 +146,10 @@
"description": "PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22",
"fork": false,
"created_at": "2023-01-05T16:56:06Z",
- "updated_at": "2024-11-30T08:26:52Z",
+ "updated_at": "2025-01-03T17:25:08Z",
"pushed_at": "2023-05-05T18:06:58Z",
- "stargazers_count": 30,
- "watchers_count": 30,
+ "stargazers_count": 29,
+ "watchers_count": 29,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@@ -162,7 +162,7 @@
],
"visibility": "public",
"forks": 8,
- "watchers": 30,
+ "watchers": 29,
"score": 0,
"subscribers_count": 2
},
diff --git a/2023/CVE-2023-28432.json b/2023/CVE-2023-28432.json
index 25a2e63124..e02f18b6ec 100644
--- a/2023/CVE-2023-28432.json
+++ b/2023/CVE-2023-28432.json
@@ -14,10 +14,10 @@
"description": "CVE-2023-28434 nuclei templates",
"fork": false,
"created_at": "2023-03-23T14:44:24Z",
- "updated_at": "2024-06-21T10:46:37Z",
+ "updated_at": "2025-01-03T14:32:47Z",
"pushed_at": "2023-03-23T15:53:05Z",
- "stargazers_count": 32,
- "watchers_count": 32,
+ "stargazers_count": 33,
+ "watchers_count": 33,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 8,
- "watchers": 32,
+ "watchers": 33,
"score": 0,
"subscribers_count": 2
},
diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json
index 0877ff57f7..93364f250b 100644
--- a/2023/CVE-2023-45866.json
+++ b/2023/CVE-2023-45866.json
@@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
- "updated_at": "2025-01-03T06:37:24Z",
+ "updated_at": "2025-01-03T17:36:59Z",
"pushed_at": "2024-08-18T08:26:46Z",
- "stargazers_count": 1323,
- "watchers_count": 1323,
+ "stargazers_count": 1332,
+ "watchers_count": 1332,
"has_discussions": false,
"forks_count": 227,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 227,
- "watchers": 1323,
+ "watchers": 1332,
"score": 0,
"subscribers_count": 21
},
diff --git a/2023/CVE-2023-46604.json b/2023/CVE-2023-46604.json
index e231536ee5..6a683868c8 100644
--- a/2023/CVE-2023-46604.json
+++ b/2023/CVE-2023-46604.json
@@ -699,7 +699,7 @@
"fork": false,
"created_at": "2024-04-17T13:10:34Z",
"updated_at": "2024-10-30T15:47:10Z",
- "pushed_at": "2024-12-27T16:46:46Z",
+ "pushed_at": "2025-01-03T16:59:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
diff --git a/2024/CVE-2024-10793.json b/2024/CVE-2024-10793.json
index 8ceeef61f7..bc08d59321 100644
--- a/2024/CVE-2024-10793.json
+++ b/2024/CVE-2024-10793.json
@@ -14,10 +14,10 @@
"description": "CVE-2024-10793 poc exploit",
"fork": false,
"created_at": "2024-11-17T18:44:53Z",
- "updated_at": "2024-12-30T01:27:43Z",
+ "updated_at": "2025-01-03T14:51:08Z",
"pushed_at": "2024-11-17T19:51:53Z",
- "stargazers_count": 7,
- "watchers_count": 7,
+ "stargazers_count": 8,
+ "watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 7,
+ "watchers": 8,
"score": 0,
"subscribers_count": 1
},
diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json
index 45578d19cc..d142ed48ea 100644
--- a/2024/CVE-2024-1086.json
+++ b/2024/CVE-2024-1086.json
@@ -14,10 +14,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
- "updated_at": "2025-01-03T10:51:03Z",
+ "updated_at": "2025-01-03T15:13:52Z",
"pushed_at": "2024-04-17T16:09:54Z",
- "stargazers_count": 2317,
- "watchers_count": 2317,
+ "stargazers_count": 2318,
+ "watchers_count": 2318,
"has_discussions": false,
"forks_count": 300,
"allow_forking": true,
@@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 300,
- "watchers": 2317,
+ "watchers": 2318,
"score": 0,
"subscribers_count": 26
},
diff --git a/2024/CVE-2024-12356.json b/2024/CVE-2024-12356.json
index 1b5eec198d..a168fab26d 100644
--- a/2024/CVE-2024-12356.json
+++ b/2024/CVE-2024-12356.json
@@ -14,10 +14,10 @@
"description": "CVE-2024-12356: Improper Neutralization of Special Elements used in a Command ('Command Injection') (CWE-77)",
"fork": false,
"created_at": "2024-12-17T15:01:37Z",
- "updated_at": "2024-12-27T01:00:33Z",
+ "updated_at": "2025-01-03T13:01:56Z",
"pushed_at": "2024-12-17T15:31:40Z",
- "stargazers_count": 4,
- "watchers_count": 4,
+ "stargazers_count": 3,
+ "watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 4,
+ "watchers": 3,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-38819.json b/2024/CVE-2024-38819.json
index d21d523e59..bfe8f5b758 100644
--- a/2024/CVE-2024-38819.json
+++ b/2024/CVE-2024-38819.json
@@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-14T09:22:33Z",
- "updated_at": "2025-01-02T23:24:33Z",
+ "updated_at": "2025-01-03T14:51:17Z",
"pushed_at": "2024-12-14T10:13:45Z",
- "stargazers_count": 33,
- "watchers_count": 33,
+ "stargazers_count": 34,
+ "watchers_count": 34,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
- "watchers": 33,
+ "watchers": 34,
"score": 0,
"subscribers_count": 3
},
diff --git a/2024/CVE-2024-42327.json b/2024/CVE-2024-42327.json
index 712efbdcfa..9e761177a8 100644
--- a/2024/CVE-2024-42327.json
+++ b/2024/CVE-2024-42327.json
@@ -200,8 +200,8 @@
"description": "Zabbix CVE-2024-42327 PoC",
"fork": false,
"created_at": "2025-01-01T18:25:44Z",
- "updated_at": "2025-01-02T20:40:49Z",
- "pushed_at": "2025-01-02T20:40:45Z",
+ "updated_at": "2025-01-03T13:49:06Z",
+ "pushed_at": "2025-01-03T13:49:03Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
diff --git a/2024/CVE-2024-49113.json b/2024/CVE-2024-49113.json
index bafa717cfc..65399a5cbd 100644
--- a/2024/CVE-2024-49113.json
+++ b/2024/CVE-2024-49113.json
@@ -14,19 +14,19 @@
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
"fork": false,
"created_at": "2025-01-01T15:48:38Z",
- "updated_at": "2025-01-03T12:27:54Z",
+ "updated_at": "2025-01-03T18:07:23Z",
"pushed_at": "2025-01-02T16:07:23Z",
- "stargazers_count": 304,
- "watchers_count": 304,
+ "stargazers_count": 319,
+ "watchers_count": 319,
"has_discussions": false,
- "forks_count": 66,
+ "forks_count": 70,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 66,
- "watchers": 304,
+ "forks": 70,
+ "watchers": 319,
"score": 0,
"subscribers_count": 2
},
@@ -45,10 +45,10 @@
"description": null,
"fork": false,
"created_at": "2025-01-03T07:05:33Z",
- "updated_at": "2025-01-03T08:20:06Z",
+ "updated_at": "2025-01-03T17:00:41Z",
"pushed_at": "2025-01-03T08:20:03Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 1,
"score": 0,
"subscribers_count": 0
}
diff --git a/2024/CVE-2024-53677.json b/2024/CVE-2024-53677.json
index ace95b87f5..dae9b364f4 100644
--- a/2024/CVE-2024-53677.json
+++ b/2024/CVE-2024-53677.json
@@ -45,10 +45,10 @@
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
"fork": false,
"created_at": "2024-12-13T17:42:55Z",
- "updated_at": "2025-01-02T13:20:33Z",
+ "updated_at": "2025-01-03T14:51:03Z",
"pushed_at": "2024-12-20T10:05:15Z",
- "stargazers_count": 79,
- "watchers_count": 79,
+ "stargazers_count": 80,
+ "watchers_count": 80,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
- "watchers": 79,
+ "watchers": 80,
"score": 0,
"subscribers_count": 3
},
diff --git a/2024/CVE-2024-54152.json b/2024/CVE-2024-54152.json
index cb6629277b..31562ecca4 100644
--- a/2024/CVE-2024-54152.json
+++ b/2024/CVE-2024-54152.json
@@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-30T01:07:48Z",
- "updated_at": "2025-01-03T11:24:41Z",
+ "updated_at": "2025-01-03T13:29:47Z",
"pushed_at": "2024-12-30T01:08:00Z",
- "stargazers_count": 12,
- "watchers_count": 12,
+ "stargazers_count": 11,
+ "watchers_count": 11,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
- "watchers": 12,
+ "watchers": 11,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-54330.json b/2024/CVE-2024-54330.json
new file mode 100644
index 0000000000..b8c429b7c0
--- /dev/null
+++ b/2024/CVE-2024-54330.json
@@ -0,0 +1,33 @@
+[
+ {
+ "id": 911139468,
+ "name": "CVE-2024-54330",
+ "full_name": "RandomRobbieBF\/CVE-2024-54330",
+ "owner": {
+ "login": "RandomRobbieBF",
+ "id": 51722811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
+ "html_url": "https:\/\/github.com\/RandomRobbieBF",
+ "user_view_type": "public"
+ },
+ "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-54330",
+ "description": "Hurrakify <= 2.4 - Unauthenticated Server-Side Request Forgery",
+ "fork": false,
+ "created_at": "2025-01-02T10:31:51Z",
+ "updated_at": "2025-01-03T15:42:04Z",
+ "pushed_at": "2025-01-02T10:32:23Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-55875.json b/2024/CVE-2024-55875.json
index 20c23e7bd8..b24e5a6eae 100644
--- a/2024/CVE-2024-55875.json
+++ b/2024/CVE-2024-55875.json
@@ -14,10 +14,10 @@
"description": "CVE-2024-55875 | GHSA-7mj5-hjjj-8rgw | http4k first CVE",
"fork": false,
"created_at": "2024-12-13T06:21:36Z",
- "updated_at": "2024-12-19T13:21:39Z",
+ "updated_at": "2025-01-03T14:51:11Z",
"pushed_at": "2024-12-13T07:28:34Z",
- "stargazers_count": 5,
- "watchers_count": 5,
+ "stargazers_count": 6,
+ "watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 5,
+ "watchers": 6,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-55988.json b/2024/CVE-2024-55988.json
new file mode 100644
index 0000000000..18c99b13ba
--- /dev/null
+++ b/2024/CVE-2024-55988.json
@@ -0,0 +1,33 @@
+[
+ {
+ "id": 911576506,
+ "name": "CVE-2024-55988",
+ "full_name": "RandomRobbieBF\/CVE-2024-55988",
+ "owner": {
+ "login": "RandomRobbieBF",
+ "id": 51722811,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
+ "html_url": "https:\/\/github.com\/RandomRobbieBF",
+ "user_view_type": "public"
+ },
+ "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-55988",
+ "description": "Navayan CSV Export <= 1.0.9 - Unauthenticated SQL Injection",
+ "fork": false,
+ "created_at": "2025-01-03T10:45:42Z",
+ "updated_at": "2025-01-03T15:33:26Z",
+ "pushed_at": "2025-01-03T11:02:23Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-56433.json b/2024/CVE-2024-56433.json
new file mode 100644
index 0000000000..9dc962ec47
--- /dev/null
+++ b/2024/CVE-2024-56433.json
@@ -0,0 +1,33 @@
+[
+ {
+ "id": 911625725,
+ "name": "CVE-2024-56433",
+ "full_name": "JonnyWhatshisface\/CVE-2024-56433",
+ "owner": {
+ "login": "JonnyWhatshisface",
+ "id": 6776518,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6776518?v=4",
+ "html_url": "https:\/\/github.com\/JonnyWhatshisface",
+ "user_view_type": "public"
+ },
+ "html_url": "https:\/\/github.com\/JonnyWhatshisface\/CVE-2024-56433",
+ "description": "CVE-2024-56433 - shadow-utils Default subordinate ID for local users creates risk of collision",
+ "fork": false,
+ "created_at": "2025-01-03T13:11:25Z",
+ "updated_at": "2025-01-03T13:44:45Z",
+ "pushed_at": "2025-01-03T13:44:42Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/README.md b/README.md
index ea9aa8bc6b..4cdb90a98e 100644
--- a/README.md
+++ b/README.md
@@ -7749,6 +7749,13 @@
- [RandomRobbieBF/CVE-2024-54262](https://github.com/RandomRobbieBF/CVE-2024-54262)
+### CVE-2024-54330 (2024-12-13)
+
+Server-Side Request Forgery (SSRF) vulnerability in Hep Hep Hurra (HHH) Hurrakify allows Server Side Request Forgery.This issue affects Hurrakify: from n/a through 2.4.
+
+
+- [RandomRobbieBF/CVE-2024-54330](https://github.com/RandomRobbieBF/CVE-2024-54330)
+
### CVE-2024-54679 (2024-12-05)
CyberPanel (aka Cyber Panel) before 6778ad1 does not require the FilemanagerAdmin capability for restartMySQL actions.
@@ -7791,6 +7798,13 @@
- [Wi1DN00B/CVE-2024-55968](https://github.com/Wi1DN00B/CVE-2024-55968)
- [null-event/CVE-2024-55968](https://github.com/null-event/CVE-2024-55968)
+### CVE-2024-55988 (2024-12-16)
+
+Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Amol Nirmala Waman Navayan CSV Export allows Blind SQL Injection.This issue affects Navayan CSV Export: from n/a through 1.0.9.
+
+
+- [RandomRobbieBF/CVE-2024-55988](https://github.com/RandomRobbieBF/CVE-2024-55988)
+
### CVE-2024-56115 (2024-12-18)
A vulnerability in Amiro.CMS before 7.8.4 exists due to the failure to take measures to neutralize special elements. It allows remote attackers to conduct a Cross-Site Scripting (XSS) attack.
@@ -7827,6 +7841,13 @@
- [UnionTech-Software/libtheora-CVE-2024-56431-PoC](https://github.com/UnionTech-Software/libtheora-CVE-2024-56431-PoC)
+### CVE-2024-56433 (2024-12-26)
+
+shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.
+
+
+- [JonnyWhatshisface/CVE-2024-56433](https://github.com/JonnyWhatshisface/CVE-2024-56433)
+
### CVE-2024-1642470
- [Symbolexe/CVE-2024-1642470](https://github.com/Symbolexe/CVE-2024-1642470)