diff --git a/2015/CVE-2015-3825.json b/2015/CVE-2015-3825.json
index e09cf6b1f0..f6e3ac6f05 100644
--- a/2015/CVE-2015-3825.json
+++ b/2015/CVE-2015-3825.json
@@ -14,10 +14,10 @@
"description": "This app verifies if your device is still vulnerable to CVE-2015-3825 \/ CVE-2015-3837, aka \"One Class to Rule Them All\", by checking if it contains the vulnerable conscrypt's OpenSSLX509Certificate class. A patch was released in August 2015 by Google.",
"fork": false,
"created_at": "2016-02-13T08:57:44Z",
- "updated_at": "2024-10-25T17:46:02Z",
+ "updated_at": "2024-12-31T01:32:43Z",
"pushed_at": "2016-02-13T09:16:01Z",
- "stargazers_count": 4,
- "watchers_count": 4,
+ "stargazers_count": 5,
+ "watchers_count": 5,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
- "watchers": 4,
+ "watchers": 5,
"score": 0,
"subscribers_count": 2
}
diff --git a/2016/CVE-2016-10277.json b/2016/CVE-2016-10277.json
index 5043341df7..371d5f258c 100644
--- a/2016/CVE-2016-10277.json
+++ b/2016/CVE-2016-10277.json
@@ -14,10 +14,10 @@
"description": "Motorola Untethered Jailbreak: Exploiting CVE-2016-10277 for Secure Boot and Device Locking bypass ",
"fork": false,
"created_at": "2017-06-06T12:00:27Z",
- "updated_at": "2024-10-25T17:43:27Z",
+ "updated_at": "2024-12-31T01:32:26Z",
"pushed_at": "2017-08-30T15:17:08Z",
- "stargazers_count": 69,
- "watchers_count": 69,
+ "stargazers_count": 70,
+ "watchers_count": 70,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
- "watchers": 69,
+ "watchers": 70,
"score": 0,
"subscribers_count": 18
},
diff --git a/2016/CVE-2016-8467.json b/2016/CVE-2016-8467.json
index e38f90ca25..d23c4054eb 100644
--- a/2016/CVE-2016-8467.json
+++ b/2016/CVE-2016-8467.json
@@ -14,10 +14,10 @@
"description": "This app checks if you're vulnerable to CVE-2016-8467 and\/or if your bootmode property has been tampered with.",
"fork": false,
"created_at": "2017-01-08T12:14:57Z",
- "updated_at": "2024-10-25T17:46:49Z",
+ "updated_at": "2024-12-31T01:32:42Z",
"pushed_at": "2017-01-08T13:17:27Z",
- "stargazers_count": 7,
- "watchers_count": 7,
+ "stargazers_count": 8,
+ "watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 7,
+ "watchers": 8,
"score": 0,
"subscribers_count": 3
}
diff --git a/2018/CVE-2018-9995.json b/2018/CVE-2018-9995.json
index 017b36e6f2..aa7073ee2a 100644
--- a/2018/CVE-2018-9995.json
+++ b/2018/CVE-2018-9995.json
@@ -174,13 +174,13 @@
"stargazers_count": 108,
"watchers_count": 108,
"has_discussions": false,
- "forks_count": 37,
+ "forks_count": 36,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 37,
+ "forks": 36,
"watchers": 108,
"score": 0,
"subscribers_count": 15
diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json
index b49e513d59..44ed1714f9 100644
--- a/2019/CVE-2019-0708.json
+++ b/2019/CVE-2019-0708.json
@@ -1902,10 +1902,10 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
- "updated_at": "2024-12-01T14:42:56Z",
+ "updated_at": "2024-12-31T02:23:31Z",
"pushed_at": "2021-12-02T12:00:46Z",
- "stargazers_count": 1175,
- "watchers_count": 1175,
+ "stargazers_count": 1176,
+ "watchers_count": 1176,
"has_discussions": false,
"forks_count": 346,
"allow_forking": true,
@@ -1914,7 +1914,7 @@
"topics": [],
"visibility": "public",
"forks": 346,
- "watchers": 1175,
+ "watchers": 1176,
"score": 0,
"subscribers_count": 69
},
diff --git a/2020/CVE-2020-0041.json b/2020/CVE-2020-0041.json
index dc1cd43551..0da79d6525 100644
--- a/2020/CVE-2020-0041.json
+++ b/2020/CVE-2020-0041.json
@@ -14,10 +14,10 @@
"description": "Exploits for Android Binder bug CVE-2020-0041",
"fork": false,
"created_at": "2020-03-31T17:53:57Z",
- "updated_at": "2024-12-16T11:17:13Z",
+ "updated_at": "2024-12-31T03:51:15Z",
"pushed_at": "2020-04-08T08:55:30Z",
- "stargazers_count": 224,
- "watchers_count": 224,
+ "stargazers_count": 225,
+ "watchers_count": 225,
"has_discussions": false,
"forks_count": 68,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 68,
- "watchers": 224,
+ "watchers": 225,
"score": 0,
"subscribers_count": 11
},
diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json
index 2dbced82b3..3d529f6cb6 100644
--- a/2020/CVE-2020-1472.json
+++ b/2020/CVE-2020-1472.json
@@ -50,13 +50,13 @@
"stargazers_count": 1746,
"watchers_count": 1746,
"has_discussions": false,
- "forks_count": 359,
+ "forks_count": 358,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 359,
+ "forks": 358,
"watchers": 1746,
"score": 0,
"subscribers_count": 86
diff --git a/2021/CVE-2021-21772.json b/2021/CVE-2021-21772.json
new file mode 100644
index 0000000000..a51fcf3174
--- /dev/null
+++ b/2021/CVE-2021-21772.json
@@ -0,0 +1,33 @@
+[
+ {
+ "id": 910351207,
+ "name": "New-lib3mf.dll-for-MeshMixer",
+ "full_name": "3dluvr\/New-lib3mf.dll-for-MeshMixer",
+ "owner": {
+ "login": "3dluvr",
+ "id": 3603819,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3603819?v=4",
+ "html_url": "https:\/\/github.com\/3dluvr",
+ "user_view_type": "public"
+ },
+ "html_url": "https:\/\/github.com\/3dluvr\/New-lib3mf.dll-for-MeshMixer",
+ "description": "Precompiled lib3mf.dll for MeshMixer which includes a backported patch for CVE-2021-21772 and zlib 1.3.1",
+ "fork": false,
+ "created_at": "2024-12-31T03:48:46Z",
+ "updated_at": "2024-12-31T04:26:07Z",
+ "pushed_at": "2024-12-31T04:25:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-35211.json b/2021/CVE-2021-35211.json
index b83188077f..86e8ab4304 100644
--- a/2021/CVE-2021-35211.json
+++ b/2021/CVE-2021-35211.json
@@ -60,36 +60,5 @@
"watchers": 1,
"score": 0,
"subscribers_count": 2
- },
- {
- "id": 447857478,
- "name": "CVE-2021-35211",
- "full_name": "BishopFox\/CVE-2021-35211",
- "owner": {
- "login": "BishopFox",
- "id": 4523757,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4523757?v=4",
- "html_url": "https:\/\/github.com\/BishopFox",
- "user_view_type": "public"
- },
- "html_url": "https:\/\/github.com\/BishopFox\/CVE-2021-35211",
- "description": null,
- "fork": false,
- "created_at": "2022-01-14T05:52:17Z",
- "updated_at": "2024-12-03T03:14:04Z",
- "pushed_at": "2022-01-14T05:56:09Z",
- "stargazers_count": 35,
- "watchers_count": 35,
- "has_discussions": false,
- "forks_count": 9,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 9,
- "watchers": 35,
- "score": 0,
- "subscribers_count": 4
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json
index ef060004c2..ed7107ceb3 100644
--- a/2021/CVE-2021-41773.json
+++ b/2021/CVE-2021-41773.json
@@ -2352,12 +2352,12 @@
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
"fork": false,
"created_at": "2022-03-12T21:24:55Z",
- "updated_at": "2024-12-15T22:43:51Z",
+ "updated_at": "2024-12-31T03:18:22Z",
"pushed_at": "2022-03-12T21:30:58Z",
- "stargazers_count": 103,
- "watchers_count": 103,
+ "stargazers_count": 104,
+ "watchers_count": 104,
"has_discussions": false,
- "forks_count": 34,
+ "forks_count": 35,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -2372,8 +2372,8 @@
"thehackersbrain"
],
"visibility": "public",
- "forks": 34,
- "watchers": 103,
+ "forks": 35,
+ "watchers": 104,
"score": 0,
"subscribers_count": 2
},
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
index 74776d5a16..a0a152bcea 100644
--- a/2021/CVE-2021-44228.json
+++ b/2021/CVE-2021-44228.json
@@ -381,10 +381,10 @@
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-10T12:38:20Z",
- "updated_at": "2024-12-30T13:34:08Z",
+ "updated_at": "2024-12-31T02:58:20Z",
"pushed_at": "2024-04-26T03:16:26Z",
- "stargazers_count": 1111,
- "watchers_count": 1111,
+ "stargazers_count": 1110,
+ "watchers_count": 1110,
"has_discussions": false,
"forks_count": 534,
"allow_forking": true,
@@ -395,7 +395,7 @@
],
"visibility": "public",
"forks": 534,
- "watchers": 1111,
+ "watchers": 1110,
"score": 0,
"subscribers_count": 23
},
@@ -1467,7 +1467,7 @@
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T11:18:46Z",
- "updated_at": "2024-12-28T13:11:35Z",
+ "updated_at": "2024-12-31T01:18:28Z",
"pushed_at": "2022-04-07T14:47:03Z",
"stargazers_count": 851,
"watchers_count": 851,
@@ -6374,7 +6374,7 @@
"description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228",
"fork": false,
"created_at": "2021-12-14T23:33:51Z",
- "updated_at": "2024-12-21T07:23:09Z",
+ "updated_at": "2024-12-31T01:18:23Z",
"pushed_at": "2022-03-23T18:12:51Z",
"stargazers_count": 344,
"watchers_count": 344,
diff --git a/2022/CVE-2022-30190.json b/2022/CVE-2022-30190.json
index becd02afa8..a15acb4de1 100644
--- a/2022/CVE-2022-30190.json
+++ b/2022/CVE-2022-30190.json
@@ -1611,10 +1611,10 @@
"description": "Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)",
"fork": false,
"created_at": "2022-06-09T09:32:10Z",
- "updated_at": "2024-12-02T21:29:46Z",
+ "updated_at": "2024-12-31T05:22:20Z",
"pushed_at": "2022-06-16T07:28:13Z",
- "stargazers_count": 29,
- "watchers_count": 29,
+ "stargazers_count": 30,
+ "watchers_count": 30,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@@ -1633,7 +1633,7 @@
],
"visibility": "public",
"forks": 12,
- "watchers": 29,
+ "watchers": 30,
"score": 0,
"subscribers_count": 2
},
diff --git a/2022/CVE-2022-46689.json b/2022/CVE-2022-46689.json
index f8ff6380e6..e67ea1c44e 100644
--- a/2022/CVE-2022-46689.json
+++ b/2022/CVE-2022-46689.json
@@ -107,10 +107,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
- "updated_at": "2024-12-23T08:59:44Z",
+ "updated_at": "2024-12-31T02:53:03Z",
"pushed_at": "2023-08-02T09:35:14Z",
- "stargazers_count": 883,
- "watchers_count": 883,
+ "stargazers_count": 884,
+ "watchers_count": 884,
"has_discussions": false,
"forks_count": 72,
"allow_forking": true,
@@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 72,
- "watchers": 883,
+ "watchers": 884,
"score": 0,
"subscribers_count": 26
},
diff --git a/2023/CVE-2023-21939.json b/2023/CVE-2023-21939.json
index e5624b66eb..5a37293da5 100644
--- a/2023/CVE-2023-21939.json
+++ b/2023/CVE-2023-21939.json
@@ -14,10 +14,10 @@
"description": "JDK CVE-2023-21939",
"fork": false,
"created_at": "2023-08-26T06:45:26Z",
- "updated_at": "2024-10-24T02:44:54Z",
+ "updated_at": "2024-12-31T01:23:52Z",
"pushed_at": "2023-08-26T06:57:55Z",
- "stargazers_count": 96,
- "watchers_count": 96,
+ "stargazers_count": 95,
+ "watchers_count": 95,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
- "watchers": 96,
+ "watchers": 95,
"score": 0,
"subscribers_count": 0
}
diff --git a/2023/CVE-2023-28252.json b/2023/CVE-2023-28252.json
index 2d27dadf21..c973565b0d 100644
--- a/2023/CVE-2023-28252.json
+++ b/2023/CVE-2023-28252.json
@@ -19,13 +19,13 @@
"stargazers_count": 173,
"watchers_count": 173,
"has_discussions": false,
- "forks_count": 45,
+ "forks_count": 47,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 45,
+ "forks": 47,
"watchers": 173,
"score": 0,
"subscribers_count": 2
diff --git a/2023/CVE-2023-38709.json b/2023/CVE-2023-38709.json
index a73501421b..2a32e7472d 100644
--- a/2023/CVE-2023-38709.json
+++ b/2023/CVE-2023-38709.json
@@ -14,10 +14,10 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false,
"created_at": "2024-10-05T20:32:45Z",
- "updated_at": "2024-12-26T06:26:47Z",
+ "updated_at": "2024-12-31T05:58:53Z",
"pushed_at": "2024-10-05T20:37:02Z",
- "stargazers_count": 46,
- "watchers_count": 46,
+ "stargazers_count": 54,
+ "watchers_count": 54,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@@ -37,7 +37,7 @@
],
"visibility": "public",
"forks": 8,
- "watchers": 46,
+ "watchers": 54,
"score": 0,
"subscribers_count": 1
}
diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json
index 8a787fca5b..b69c08ab8d 100644
--- a/2023/CVE-2023-38831.json
+++ b/2023/CVE-2023-38831.json
@@ -1665,6 +1665,37 @@
"forks": 0,
"watchers": 0,
"score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 910356526,
+ "name": "CVE-2023-38831WinRAR-dai-ma-zhi-xing-lou-dong-fu-xian-zi-yuan-wen-jian",
+ "full_name": "chaos198800\/CVE-2023-38831WinRAR-dai-ma-zhi-xing-lou-dong-fu-xian-zi-yuan-wen-jian",
+ "owner": {
+ "login": "chaos198800",
+ "id": 190506189,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/190506189?v=4",
+ "html_url": "https:\/\/github.com\/chaos198800",
+ "user_view_type": "public"
+ },
+ "html_url": "https:\/\/github.com\/chaos198800\/CVE-2023-38831WinRAR-dai-ma-zhi-xing-lou-dong-fu-xian-zi-yuan-wen-jian",
+ "description": "CVE-2023-38831WinRAR代码执行漏洞复现资源文件",
+ "fork": false,
+ "created_at": "2024-12-31T04:14:34Z",
+ "updated_at": "2024-12-31T04:15:31Z",
+ "pushed_at": "2024-12-31T04:15:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
"subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2023/CVE-2023-40931.json b/2023/CVE-2023-40931.json
index efa8b15271..cfc7594824 100644
--- a/2023/CVE-2023-40931.json
+++ b/2023/CVE-2023-40931.json
@@ -59,6 +59,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2023/CVE-2023-4147.json b/2023/CVE-2023-4147.json
index ec2d6dae42..67164a3695 100644
--- a/2023/CVE-2023-4147.json
+++ b/2023/CVE-2023-4147.json
@@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2023/CVE-2023-4911.json b/2023/CVE-2023-4911.json
index 9ea5d4308b..7782e26dde 100644
--- a/2023/CVE-2023-4911.json
+++ b/2023/CVE-2023-4911.json
@@ -76,10 +76,10 @@
"description": "CVE-2023-4911 proof of concept",
"fork": false,
"created_at": "2023-10-04T14:32:49Z",
- "updated_at": "2024-12-27T14:00:23Z",
+ "updated_at": "2024-12-31T04:46:52Z",
"pushed_at": "2023-10-08T23:24:24Z",
- "stargazers_count": 165,
- "watchers_count": 165,
+ "stargazers_count": 166,
+ "watchers_count": 166,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
- "watchers": 165,
+ "watchers": 166,
"score": 0,
"subscribers_count": 5
},
diff --git a/2023/CVE-2023-52251.json b/2023/CVE-2023-52251.json
index c0b582c16e..9dca996657 100644
--- a/2023/CVE-2023-52251.json
+++ b/2023/CVE-2023-52251.json
@@ -14,10 +14,10 @@
"description": "CVE-2023-52251 There is a Remote Code Execution vulnerability provectus\/kafka-ui.",
"fork": false,
"created_at": "2024-01-06T11:07:36Z",
- "updated_at": "2024-12-17T15:21:38Z",
+ "updated_at": "2024-12-31T02:23:38Z",
"pushed_at": "2024-01-23T19:06:14Z",
- "stargazers_count": 18,
- "watchers_count": 18,
+ "stargazers_count": 19,
+ "watchers_count": 19,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 3,
- "watchers": 18,
+ "watchers": 19,
"score": 0,
"subscribers_count": 2
}
diff --git a/2024/CVE-2024-21182.json b/2024/CVE-2024-21182.json
index 9b29c0d978..22cff78e13 100644
--- a/2024/CVE-2024-21182.json
+++ b/2024/CVE-2024-21182.json
@@ -14,10 +14,10 @@
"description": "PoC for CVE-2024-21182",
"fork": false,
"created_at": "2024-12-29T15:48:03Z",
- "updated_at": "2024-12-30T21:08:09Z",
+ "updated_at": "2024-12-31T05:15:18Z",
"pushed_at": "2024-12-29T15:56:14Z",
- "stargazers_count": 19,
- "watchers_count": 19,
+ "stargazers_count": 23,
+ "watchers_count": 23,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
- "watchers": 19,
+ "watchers": 23,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-31317.json b/2024/CVE-2024-31317.json
index bcb3edaf70..230d943cef 100644
--- a/2024/CVE-2024-31317.json
+++ b/2024/CVE-2024-31317.json
@@ -14,10 +14,10 @@
"description": "CVE-2024-31317",
"fork": false,
"created_at": "2024-12-05T01:36:59Z",
- "updated_at": "2024-12-17T15:42:10Z",
+ "updated_at": "2024-12-31T03:39:46Z",
"pushed_at": "2024-12-05T01:52:45Z",
- "stargazers_count": 12,
- "watchers_count": 12,
+ "stargazers_count": 13,
+ "watchers_count": 13,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
- "watchers": 12,
+ "watchers": 13,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-3400.json b/2024/CVE-2024-3400.json
index e45afb0e34..b1ca2152d0 100644
--- a/2024/CVE-2024-3400.json
+++ b/2024/CVE-2024-3400.json
@@ -76,10 +76,10 @@
"description": "CVE-2024-3400",
"fork": false,
"created_at": "2024-04-13T14:00:31Z",
- "updated_at": "2024-12-19T14:25:45Z",
+ "updated_at": "2024-12-31T01:26:44Z",
"pushed_at": "2024-04-18T07:11:17Z",
- "stargazers_count": 65,
- "watchers_count": 65,
+ "stargazers_count": 66,
+ "watchers_count": 66,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
- "watchers": 65,
+ "watchers": 66,
"score": 0,
"subscribers_count": 2
},
diff --git a/2024/CVE-2024-38472.json b/2024/CVE-2024-38472.json
index a6314fb0f4..1a91a66423 100644
--- a/2024/CVE-2024-38472.json
+++ b/2024/CVE-2024-38472.json
@@ -45,10 +45,10 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false,
"created_at": "2024-10-05T20:32:45Z",
- "updated_at": "2024-12-26T06:26:47Z",
+ "updated_at": "2024-12-31T05:58:53Z",
"pushed_at": "2024-10-05T20:37:02Z",
- "stargazers_count": 46,
- "watchers_count": 46,
+ "stargazers_count": 54,
+ "watchers_count": 54,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@@ -68,7 +68,7 @@
],
"visibility": "public",
"forks": 8,
- "watchers": 46,
+ "watchers": 54,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-4573.json b/2024/CVE-2024-4573.json
index 8fa00e7cda..a405c06717 100644
--- a/2024/CVE-2024-4573.json
+++ b/2024/CVE-2024-4573.json
@@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-50379.json b/2024/CVE-2024-50379.json
index 647a251e45..464afe0104 100644
--- a/2024/CVE-2024-50379.json
+++ b/2024/CVE-2024-50379.json
@@ -107,10 +107,10 @@
"description": "Apache Tomcat(CVE-2024-50379)条件竞争致远程代码执行漏洞批量检测脚本",
"fork": false,
"created_at": "2024-12-20T05:24:10Z",
- "updated_at": "2024-12-28T09:53:18Z",
+ "updated_at": "2024-12-31T04:22:20Z",
"pushed_at": "2024-12-20T05:41:23Z",
- "stargazers_count": 7,
- "watchers_count": 7,
+ "stargazers_count": 8,
+ "watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
- "watchers": 7,
+ "watchers": 8,
"score": 0,
"subscribers_count": 2
},
@@ -262,8 +262,8 @@
"description": "CVE-2024-50379-exp",
"fork": false,
"created_at": "2024-12-25T02:41:31Z",
- "updated_at": "2024-12-30T01:38:07Z",
- "pushed_at": "2024-12-26T08:52:15Z",
+ "updated_at": "2024-12-31T06:26:31Z",
+ "pushed_at": "2024-12-31T06:26:28Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
diff --git a/2024/CVE-2024-53677.json b/2024/CVE-2024-53677.json
index 63cac8d186..9d6f8007b1 100644
--- a/2024/CVE-2024-53677.json
+++ b/2024/CVE-2024-53677.json
@@ -14,10 +14,10 @@
"description": "s2-067(CVE-2024-53677)",
"fork": false,
"created_at": "2024-12-12T08:30:14Z",
- "updated_at": "2024-12-25T05:40:04Z",
+ "updated_at": "2024-12-31T02:36:33Z",
"pushed_at": "2024-12-17T10:37:17Z",
- "stargazers_count": 7,
- "watchers_count": 7,
+ "stargazers_count": 8,
+ "watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
- "watchers": 7,
+ "watchers": 8,
"score": 0,
"subscribers_count": 4
},
diff --git a/2024/CVE-2024-54152.json b/2024/CVE-2024-54152.json
index 70544ba5d2..12b313cb05 100644
--- a/2024/CVE-2024-54152.json
+++ b/2024/CVE-2024-54152.json
@@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-30T01:07:48Z",
- "updated_at": "2024-12-30T19:11:16Z",
+ "updated_at": "2024-12-31T03:48:11Z",
"pushed_at": "2024-12-30T01:08:00Z",
- "stargazers_count": 2,
- "watchers_count": 2,
+ "stargazers_count": 4,
+ "watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -26,8 +26,8 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 2,
+ "watchers": 4,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-54819.json b/2024/CVE-2024-54819.json
index dedd108d9f..994523972b 100644
--- a/2024/CVE-2024-54819.json
+++ b/2024/CVE-2024-54819.json
@@ -31,6 +31,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-9932.json b/2024/CVE-2024-9932.json
index 529d989f25..5086266a89 100644
--- a/2024/CVE-2024-9932.json
+++ b/2024/CVE-2024-9932.json
@@ -14,10 +14,10 @@
"description": "Wux Blog Editor <= 3.0.0 - Unauthenticated Arbitrary File Upload",
"fork": false,
"created_at": "2024-11-05T15:00:39Z",
- "updated_at": "2024-11-19T06:00:58Z",
+ "updated_at": "2024-12-31T05:05:46Z",
"pushed_at": "2024-11-05T15:02:04Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "stargazers_count": 4,
+ "watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
- "watchers": 3,
+ "watchers": 4,
"score": 0,
"subscribers_count": 1
}
diff --git a/README.md b/README.md
index b1b74c3cbe..ce08b9bea8 100644
--- a/README.md
+++ b/README.md
@@ -13483,6 +13483,7 @@
- [RonF98/CVE-2023-38831-POC](https://github.com/RonF98/CVE-2023-38831-POC)
- [VictoriousKnight/CVE-2023-38831_Exploit](https://github.com/VictoriousKnight/CVE-2023-38831_Exploit)
- [kuyrathdaro/winrar-cve-2023-38831](https://github.com/kuyrathdaro/winrar-cve-2023-38831)
+- [chaos198800/CVE-2023-38831WinRAR-dai-ma-zhi-xing-lou-dong-fu-xian-zi-yuan-wen-jian](https://github.com/chaos198800/CVE-2023-38831WinRAR-dai-ma-zhi-xing-lou-dong-fu-xian-zi-yuan-wen-jian)
### CVE-2023-38836 (2023-08-21)
@@ -24702,6 +24703,13 @@
### CVE-2021-21716
- [MojithaR/CVE-2023-21716-EXPLOIT.py](https://github.com/MojithaR/CVE-2023-21716-EXPLOIT.py)
+### CVE-2021-21772 (2021-03-10)
+
+A use-after-free vulnerability exists in the NMR::COpcPackageReader::releaseZIP() functionality of 3MF Consortium lib3mf 2.0.0. A specially crafted 3MF file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
+
+
+- [3dluvr/New-lib3mf.dll-for-MeshMixer](https://github.com/3dluvr/New-lib3mf.dll-for-MeshMixer)
+
### CVE-2021-21809 (2021-06-23)
A command execution vulnerability exists in the default legacy spellchecker plugin in Moodle 3.10. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities.
@@ -26863,7 +26871,6 @@
- [NattiSamson/Serv-U-CVE-2021-35211](https://github.com/NattiSamson/Serv-U-CVE-2021-35211)
- [0xhaggis/CVE-2021-35211](https://github.com/0xhaggis/CVE-2021-35211)
-- [BishopFox/CVE-2021-35211](https://github.com/BishopFox/CVE-2021-35211)
### CVE-2021-35215 (2021-09-01)