From 422c568395e38daa95e42955c5dc38fd7b73d3a5 Mon Sep 17 00:00:00 2001
From: motikan2010-bot <k.agena1993@gmail.com>
Date: Tue, 10 Dec 2024 21:33:02 +0900
Subject: [PATCH] Auto Update 2024/12/10 12:33:02

---
 2018/CVE-2018-14847.json | 12 ++++++------
 2019/CVE-2019-12586.json |  8 ++++----
 2019/CVE-2019-17558.json | 12 ++++++------
 2019/CVE-2019-5736.json  |  8 ++++----
 2020/CVE-2020-0668.json  |  8 ++++----
 2020/CVE-2020-1472.json  |  8 ++++----
 2020/CVE-2020-14882.json | 12 ++++++------
 2021/CVE-2021-1675.json  |  8 ++++----
 2021/CVE-2021-3129.json  |  8 ++++----
 2021/CVE-2021-43032.json |  4 ++--
 2022/CVE-2022-22965.json |  8 ++++----
 2022/CVE-2022-23222.json |  4 ++--
 2022/CVE-2022-38694.json | 16 ++++++++--------
 2023/CVE-2023-0386.json  |  4 ++--
 2023/CVE-2023-21554.json |  8 ++++----
 2023/CVE-2023-29357.json |  2 +-
 2023/CVE-2023-32784.json |  8 ++++----
 2023/CVE-2023-36802.json |  2 +-
 2023/CVE-2023-40028.json | 31 +++++++++++++++++++++++++++++++
 2024/CVE-2024-0044.json  |  8 ++++----
 2024/CVE-2024-1086.json  |  8 ++++----
 2024/CVE-2024-11477.json |  8 ++++----
 2024/CVE-2024-21762.json |  8 ++++----
 2024/CVE-2024-24549.json |  4 ++--
 2024/CVE-2024-37383.json |  8 ++++----
 2024/CVE-2024-38063.json |  8 ++++----
 2024/CVE-2024-38193.json |  8 ++++----
 2024/CVE-2024-4367.json  | 16 ++++++++--------
 2024/CVE-2024-49039.json |  2 +-
 2024/CVE-2024-51378.json |  8 ++++----
 2024/CVE-2024-55586.json | 33 +++++++++++++++++++++++++++++++++
 2024/CVE-2024-6387.json  |  8 ++++----
 README.md                |  4 ++++
 33 files changed, 185 insertions(+), 117 deletions(-)
 create mode 100644 2024/CVE-2024-55586.json

diff --git a/2018/CVE-2018-14847.json b/2018/CVE-2018-14847.json
index ad61c36308..45bb0bfeb1 100644
--- a/2018/CVE-2018-14847.json
+++ b/2018/CVE-2018-14847.json
@@ -267,19 +267,19 @@
         "description": "This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords.  The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead.",
         "fork": false,
         "created_at": "2021-04-21T16:42:31Z",
-        "updated_at": "2024-11-15T07:40:23Z",
+        "updated_at": "2024-12-10T07:33:15Z",
         "pushed_at": "2021-04-21T16:46:37Z",
-        "stargazers_count": 47,
-        "watchers_count": 47,
+        "stargazers_count": 48,
+        "watchers_count": 48,
         "has_discussions": false,
-        "forks_count": 21,
+        "forks_count": 22,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 21,
-        "watchers": 47,
+        "forks": 22,
+        "watchers": 48,
         "score": 0,
         "subscribers_count": 3
     },
diff --git a/2019/CVE-2019-12586.json b/2019/CVE-2019-12586.json
index a144668763..fbf31b21d0 100644
--- a/2019/CVE-2019-12586.json
+++ b/2019/CVE-2019-12586.json
@@ -14,10 +14,10 @@
         "description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
         "fork": false,
         "created_at": "2019-09-03T15:08:49Z",
-        "updated_at": "2024-12-09T19:22:31Z",
+        "updated_at": "2024-12-10T06:49:39Z",
         "pushed_at": "2019-09-08T06:09:11Z",
-        "stargazers_count": 798,
-        "watchers_count": 798,
+        "stargazers_count": 799,
+        "watchers_count": 799,
         "has_discussions": false,
         "forks_count": 69,
         "allow_forking": true,
@@ -32,7 +32,7 @@
         ],
         "visibility": "public",
         "forks": 69,
-        "watchers": 798,
+        "watchers": 799,
         "score": 0,
         "subscribers_count": 34
     }
diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json
index d6aae85087..969c0ec9ab 100644
--- a/2019/CVE-2019-17558.json
+++ b/2019/CVE-2019-17558.json
@@ -45,12 +45,12 @@
         "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
         "fork": false,
         "created_at": "2020-04-01T09:33:35Z",
-        "updated_at": "2024-12-09T21:26:15Z",
+        "updated_at": "2024-12-10T10:44:39Z",
         "pushed_at": "2021-04-04T09:13:57Z",
-        "stargazers_count": 4136,
-        "watchers_count": 4136,
+        "stargazers_count": 4137,
+        "watchers_count": 4137,
         "has_discussions": false,
-        "forks_count": 1099,
+        "forks_count": 1100,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
@@ -76,8 +76,8 @@
             "webshell"
         ],
         "visibility": "public",
-        "forks": 1099,
-        "watchers": 4136,
+        "forks": 1100,
+        "watchers": 4137,
         "score": 0,
         "subscribers_count": 149
     },
diff --git a/2019/CVE-2019-5736.json b/2019/CVE-2019-5736.json
index aa7e003087..2b05e60fd1 100644
--- a/2019/CVE-2019-5736.json
+++ b/2019/CVE-2019-5736.json
@@ -45,10 +45,10 @@
         "description": "PoC for CVE-2019-5736",
         "fork": false,
         "created_at": "2019-02-13T05:26:32Z",
-        "updated_at": "2024-11-19T09:37:59Z",
+        "updated_at": "2024-12-10T10:06:00Z",
         "pushed_at": "2022-01-05T04:09:42Z",
-        "stargazers_count": 640,
-        "watchers_count": 640,
+        "stargazers_count": 641,
+        "watchers_count": 641,
         "has_discussions": false,
         "forks_count": 163,
         "allow_forking": true,
@@ -57,7 +57,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 163,
-        "watchers": 640,
+        "watchers": 641,
         "score": 0,
         "subscribers_count": 13
     },
diff --git a/2020/CVE-2020-0668.json b/2020/CVE-2020-0668.json
index 50f80360c6..6219c5c653 100644
--- a/2020/CVE-2020-0668.json
+++ b/2020/CVE-2020-0668.json
@@ -14,10 +14,10 @@
         "description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
         "fork": false,
         "created_at": "2020-02-20T06:22:40Z",
-        "updated_at": "2024-11-28T15:21:59Z",
+        "updated_at": "2024-12-10T09:41:30Z",
         "pushed_at": "2020-02-20T11:03:18Z",
-        "stargazers_count": 212,
-        "watchers_count": 212,
+        "stargazers_count": 213,
+        "watchers_count": 213,
         "has_discussions": false,
         "forks_count": 53,
         "allow_forking": true,
@@ -26,7 +26,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 53,
-        "watchers": 212,
+        "watchers": 213,
         "score": 0,
         "subscribers_count": 7
     },
diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json
index e5d77f9a1e..f97ca8073b 100644
--- a/2020/CVE-2020-1472.json
+++ b/2020/CVE-2020-1472.json
@@ -45,10 +45,10 @@
         "description": "Test tool for CVE-2020-1472",
         "fork": false,
         "created_at": "2020-09-08T08:58:37Z",
-        "updated_at": "2024-12-10T04:10:22Z",
+        "updated_at": "2024-12-10T11:33:12Z",
         "pushed_at": "2023-07-20T10:51:42Z",
-        "stargazers_count": 1739,
-        "watchers_count": 1739,
+        "stargazers_count": 1740,
+        "watchers_count": 1740,
         "has_discussions": false,
         "forks_count": 359,
         "allow_forking": true,
@@ -57,7 +57,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 359,
-        "watchers": 1739,
+        "watchers": 1740,
         "score": 0,
         "subscribers_count": 86
     },
diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json
index 75e079a7d5..2f452db61d 100644
--- a/2020/CVE-2020-14882.json
+++ b/2020/CVE-2020-14882.json
@@ -14,12 +14,12 @@
         "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
         "fork": false,
         "created_at": "2020-04-01T09:33:35Z",
-        "updated_at": "2024-12-09T21:26:15Z",
+        "updated_at": "2024-12-10T10:44:39Z",
         "pushed_at": "2021-04-04T09:13:57Z",
-        "stargazers_count": 4136,
-        "watchers_count": 4136,
+        "stargazers_count": 4137,
+        "watchers_count": 4137,
         "has_discussions": false,
-        "forks_count": 1099,
+        "forks_count": 1100,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
@@ -45,8 +45,8 @@
             "webshell"
         ],
         "visibility": "public",
-        "forks": 1099,
-        "watchers": 4136,
+        "forks": 1100,
+        "watchers": 4137,
         "score": 0,
         "subscribers_count": 149
     },
diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json
index c0b20e9237..f748e3c932 100644
--- a/2021/CVE-2021-1675.json
+++ b/2021/CVE-2021-1675.json
@@ -311,10 +311,10 @@
         "description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
         "fork": false,
         "created_at": "2021-07-01T23:45:58Z",
-        "updated_at": "2024-12-09T22:38:01Z",
+        "updated_at": "2024-12-10T08:10:54Z",
         "pushed_at": "2021-07-05T08:54:06Z",
-        "stargazers_count": 1020,
-        "watchers_count": 1020,
+        "stargazers_count": 1021,
+        "watchers_count": 1021,
         "has_discussions": false,
         "forks_count": 231,
         "allow_forking": true,
@@ -323,7 +323,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 231,
-        "watchers": 1020,
+        "watchers": 1021,
         "score": 0,
         "subscribers_count": 26
     },
diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json
index 7a7833b192..ef135e8460 100644
--- a/2021/CVE-2021-3129.json
+++ b/2021/CVE-2021-3129.json
@@ -76,10 +76,10 @@
         "description": null,
         "fork": false,
         "created_at": "2021-01-25T08:42:28Z",
-        "updated_at": "2024-10-21T16:34:50Z",
+        "updated_at": "2024-12-10T07:47:47Z",
         "pushed_at": "2021-01-25T08:49:59Z",
-        "stargazers_count": 71,
-        "watchers_count": 71,
+        "stargazers_count": 72,
+        "watchers_count": 72,
         "has_discussions": false,
         "forks_count": 29,
         "allow_forking": true,
@@ -88,7 +88,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 29,
-        "watchers": 71,
+        "watchers": 72,
         "score": 0,
         "subscribers_count": 1
     },
diff --git a/2021/CVE-2021-43032.json b/2021/CVE-2021-43032.json
index cf5491e43a..9fa3c1b662 100644
--- a/2021/CVE-2021-43032.json
+++ b/2021/CVE-2021-43032.json
@@ -19,7 +19,7 @@
         "stargazers_count": 3,
         "watchers_count": 3,
         "has_discussions": false,
-        "forks_count": 2,
+        "forks_count": 3,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
@@ -30,7 +30,7 @@
             "xenforo2"
         ],
         "visibility": "public",
-        "forks": 2,
+        "forks": 3,
         "watchers": 3,
         "score": 0,
         "subscribers_count": 0
diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json
index 3659a255e4..f2fe68c19e 100644
--- a/2022/CVE-2022-22965.json
+++ b/2022/CVE-2022-22965.json
@@ -132,10 +132,10 @@
         "description": "Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit",
         "fork": false,
         "created_at": "2022-03-31T00:24:28Z",
-        "updated_at": "2024-12-03T03:14:04Z",
+        "updated_at": "2024-12-10T08:51:14Z",
         "pushed_at": "2022-08-04T18:26:18Z",
-        "stargazers_count": 311,
-        "watchers_count": 311,
+        "stargazers_count": 310,
+        "watchers_count": 310,
         "has_discussions": false,
         "forks_count": 237,
         "allow_forking": true,
@@ -144,7 +144,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 237,
-        "watchers": 311,
+        "watchers": 310,
         "score": 0,
         "subscribers_count": 10
     },
diff --git a/2022/CVE-2022-23222.json b/2022/CVE-2022-23222.json
index 734d9f75eb..755d3af374 100644
--- a/2022/CVE-2022-23222.json
+++ b/2022/CVE-2022-23222.json
@@ -19,13 +19,13 @@
         "stargazers_count": 560,
         "watchers_count": 560,
         "has_discussions": false,
-        "forks_count": 95,
+        "forks_count": 97,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 95,
+        "forks": 97,
         "watchers": 560,
         "score": 0,
         "subscribers_count": 7
diff --git a/2022/CVE-2022-38694.json b/2022/CVE-2022-38694.json
index 1901f1a07c..d557b87b5d 100644
--- a/2022/CVE-2022-38694.json
+++ b/2022/CVE-2022-38694.json
@@ -14,10 +14,10 @@
         "description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
         "fork": false,
         "created_at": "2023-06-10T08:31:26Z",
-        "updated_at": "2024-12-09T20:56:58Z",
+        "updated_at": "2024-12-10T09:39:01Z",
         "pushed_at": "2024-08-01T15:09:15Z",
-        "stargazers_count": 306,
-        "watchers_count": 306,
+        "stargazers_count": 307,
+        "watchers_count": 307,
         "has_discussions": true,
         "forks_count": 44,
         "allow_forking": true,
@@ -29,7 +29,7 @@
         ],
         "visibility": "public",
         "forks": 44,
-        "watchers": 306,
+        "watchers": 307,
         "score": 0,
         "subscribers_count": 8
     },
@@ -48,10 +48,10 @@
         "description": "Bootloader unlock using CVE-2022-38694 for Anbernic Unisoc T820 devices",
         "fork": false,
         "created_at": "2024-06-27T14:28:13Z",
-        "updated_at": "2024-12-02T01:03:31Z",
+        "updated_at": "2024-12-10T09:48:51Z",
         "pushed_at": "2024-10-15T10:16:57Z",
-        "stargazers_count": 27,
-        "watchers_count": 27,
+        "stargazers_count": 28,
+        "watchers_count": 28,
         "has_discussions": false,
         "forks_count": 0,
         "allow_forking": true,
@@ -60,7 +60,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 0,
-        "watchers": 27,
+        "watchers": 28,
         "score": 0,
         "subscribers_count": 3
     }
diff --git a/2023/CVE-2023-0386.json b/2023/CVE-2023-0386.json
index 9daf1a5cab..8618423326 100644
--- a/2023/CVE-2023-0386.json
+++ b/2023/CVE-2023-0386.json
@@ -81,13 +81,13 @@
         "stargazers_count": 385,
         "watchers_count": 385,
         "has_discussions": false,
-        "forks_count": 65,
+        "forks_count": 63,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 65,
+        "forks": 63,
         "watchers": 385,
         "score": 0,
         "subscribers_count": 4
diff --git a/2023/CVE-2023-21554.json b/2023/CVE-2023-21554.json
index 7525aa85d9..a99eb0dc49 100644
--- a/2023/CVE-2023-21554.json
+++ b/2023/CVE-2023-21554.json
@@ -45,10 +45,10 @@
         "description": null,
         "fork": false,
         "created_at": "2023-08-17T17:16:46Z",
-        "updated_at": "2024-10-30T14:41:33Z",
+        "updated_at": "2024-12-10T07:00:42Z",
         "pushed_at": "2023-08-21T21:22:40Z",
-        "stargazers_count": 19,
-        "watchers_count": 19,
+        "stargazers_count": 20,
+        "watchers_count": 20,
         "has_discussions": false,
         "forks_count": 3,
         "allow_forking": true,
@@ -57,7 +57,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 3,
-        "watchers": 19,
+        "watchers": 20,
         "score": 0,
         "subscribers_count": 1
     }
diff --git a/2023/CVE-2023-29357.json b/2023/CVE-2023-29357.json
index 9aae7536f4..526a590d78 100644
--- a/2023/CVE-2023-29357.json
+++ b/2023/CVE-2023-29357.json
@@ -14,7 +14,7 @@
         "description": "Microsoft SharePoint Server Elevation of Privilege Vulnerability",
         "fork": false,
         "created_at": "2023-09-26T16:18:41Z",
-        "updated_at": "2024-12-02T08:24:01Z",
+        "updated_at": "2024-12-10T11:18:40Z",
         "pushed_at": "2023-09-26T19:04:21Z",
         "stargazers_count": 229,
         "watchers_count": 229,
diff --git a/2023/CVE-2023-32784.json b/2023/CVE-2023-32784.json
index 994fd2a0cf..5cba8a302d 100644
--- a/2023/CVE-2023-32784.json
+++ b/2023/CVE-2023-32784.json
@@ -14,10 +14,10 @@
         "description": "Original PoC for CVE-2023-32784",
         "fork": false,
         "created_at": "2023-05-01T17:08:55Z",
-        "updated_at": "2024-12-09T01:45:06Z",
+        "updated_at": "2024-12-10T12:02:34Z",
         "pushed_at": "2023-08-17T19:26:55Z",
-        "stargazers_count": 628,
-        "watchers_count": 628,
+        "stargazers_count": 629,
+        "watchers_count": 629,
         "has_discussions": false,
         "forks_count": 57,
         "allow_forking": true,
@@ -29,7 +29,7 @@
         ],
         "visibility": "public",
         "forks": 57,
-        "watchers": 628,
+        "watchers": 629,
         "score": 0,
         "subscribers_count": 11
     },
diff --git a/2023/CVE-2023-36802.json b/2023/CVE-2023-36802.json
index 94c56d6246..e5255696e3 100644
--- a/2023/CVE-2023-36802.json
+++ b/2023/CVE-2023-36802.json
@@ -107,7 +107,7 @@
         "description": "Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver",
         "fork": false,
         "created_at": "2023-10-23T18:33:41Z",
-        "updated_at": "2024-11-26T14:03:56Z",
+        "updated_at": "2024-12-10T12:12:57Z",
         "pushed_at": "2023-10-26T11:44:46Z",
         "stargazers_count": 112,
         "watchers_count": 112,
diff --git a/2023/CVE-2023-40028.json b/2023/CVE-2023-40028.json
index 93fa34a8cb..b842f4a6de 100644
--- a/2023/CVE-2023-40028.json
+++ b/2023/CVE-2023-40028.json
@@ -29,5 +29,36 @@
         "watchers": 2,
         "score": 0,
         "subscribers_count": 1
+    },
+    {
+        "id": 901224300,
+        "name": "CVE-2023-40028",
+        "full_name": "BBSynapse\/CVE-2023-40028",
+        "owner": {
+            "login": "BBSynapse",
+            "id": 147707839,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/147707839?v=4",
+            "html_url": "https:\/\/github.com\/BBSynapse",
+            "user_view_type": "public"
+        },
+        "html_url": "https:\/\/github.com\/BBSynapse\/CVE-2023-40028",
+        "description": "CVE-2023-40028 wirkt sich auf Ghost, ein Open-Source-Content-Management-System (CMS) aus.",
+        "fork": false,
+        "created_at": "2024-12-10T09:12:20Z",
+        "updated_at": "2024-12-10T09:18:19Z",
+        "pushed_at": "2024-12-10T09:18:16Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "has_discussions": false,
+        "forks_count": 0,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 0,
+        "watchers": 0,
+        "score": 0,
+        "subscribers_count": 0
     }
 ]
\ No newline at end of file
diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json
index 079fe9d060..cc5ea026b6 100644
--- a/2024/CVE-2024-0044.json
+++ b/2024/CVE-2024-0044.json
@@ -76,10 +76,10 @@
         "description": "利用 CVE-2024-0044 Android 权限提升下载任意目标App沙箱文件。",
         "fork": false,
         "created_at": "2024-07-03T10:29:06Z",
-        "updated_at": "2024-11-13T03:17:51Z",
+        "updated_at": "2024-12-10T08:42:34Z",
         "pushed_at": "2024-09-03T09:31:58Z",
-        "stargazers_count": 5,
-        "watchers_count": 5,
+        "stargazers_count": 6,
+        "watchers_count": 6,
         "has_discussions": false,
         "forks_count": 2,
         "allow_forking": true,
@@ -88,7 +88,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 2,
-        "watchers": 5,
+        "watchers": 6,
         "score": 0,
         "subscribers_count": 1
     },
diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json
index e79a03f6c4..5e38208198 100644
--- a/2024/CVE-2024-1086.json
+++ b/2024/CVE-2024-1086.json
@@ -14,10 +14,10 @@
         "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
         "fork": false,
         "created_at": "2024-03-20T21:16:41Z",
-        "updated_at": "2024-12-05T15:39:28Z",
+        "updated_at": "2024-12-10T09:00:58Z",
         "pushed_at": "2024-04-17T16:09:54Z",
-        "stargazers_count": 2298,
-        "watchers_count": 2298,
+        "stargazers_count": 2299,
+        "watchers_count": 2299,
         "has_discussions": false,
         "forks_count": 299,
         "allow_forking": true,
@@ -32,7 +32,7 @@
         ],
         "visibility": "public",
         "forks": 299,
-        "watchers": 2298,
+        "watchers": 2299,
         "score": 0,
         "subscribers_count": 26
     },
diff --git a/2024/CVE-2024-11477.json b/2024/CVE-2024-11477.json
index 7ce7967a45..e6791978da 100644
--- a/2024/CVE-2024-11477.json
+++ b/2024/CVE-2024-11477.json
@@ -14,10 +14,10 @@
         "description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis",
         "fork": false,
         "created_at": "2024-11-29T06:13:36Z",
-        "updated_at": "2024-12-10T03:31:43Z",
+        "updated_at": "2024-12-10T09:52:02Z",
         "pushed_at": "2024-12-04T01:01:28Z",
-        "stargazers_count": 32,
-        "watchers_count": 32,
+        "stargazers_count": 33,
+        "watchers_count": 33,
         "has_discussions": false,
         "forks_count": 7,
         "allow_forking": true,
@@ -26,7 +26,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 7,
-        "watchers": 32,
+        "watchers": 33,
         "score": 0,
         "subscribers_count": 1
     }
diff --git a/2024/CVE-2024-21762.json b/2024/CVE-2024-21762.json
index d82d4cf0b3..ec75ccb934 100644
--- a/2024/CVE-2024-21762.json
+++ b/2024/CVE-2024-21762.json
@@ -14,10 +14,10 @@
         "description": "Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762",
         "fork": false,
         "created_at": "2024-02-28T21:16:10Z",
-        "updated_at": "2024-11-20T16:30:41Z",
+        "updated_at": "2024-12-10T10:25:51Z",
         "pushed_at": "2024-07-05T09:37:05Z",
-        "stargazers_count": 93,
-        "watchers_count": 93,
+        "stargazers_count": 94,
+        "watchers_count": 94,
         "has_discussions": false,
         "forks_count": 13,
         "allow_forking": true,
@@ -26,7 +26,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 13,
-        "watchers": 93,
+        "watchers": 94,
         "score": 0,
         "subscribers_count": 6
     },
diff --git a/2024/CVE-2024-24549.json b/2024/CVE-2024-24549.json
index d62d42c760..e4beacee19 100644
--- a/2024/CVE-2024-24549.json
+++ b/2024/CVE-2024-24549.json
@@ -50,13 +50,13 @@
         "stargazers_count": 2,
         "watchers_count": 2,
         "has_discussions": false,
-        "forks_count": 0,
+        "forks_count": 1,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 0,
+        "forks": 1,
         "watchers": 2,
         "score": 0,
         "subscribers_count": 1
diff --git a/2024/CVE-2024-37383.json b/2024/CVE-2024-37383.json
index 0b9571d7f7..9a5631879f 100644
--- a/2024/CVE-2024-37383.json
+++ b/2024/CVE-2024-37383.json
@@ -14,10 +14,10 @@
         "description": "Proof of concept for CVE-2024-37383",
         "fork": false,
         "created_at": "2024-10-24T04:01:03Z",
-        "updated_at": "2024-11-10T22:07:27Z",
+        "updated_at": "2024-12-10T07:33:20Z",
         "pushed_at": "2024-10-24T05:48:34Z",
-        "stargazers_count": 3,
-        "watchers_count": 3,
+        "stargazers_count": 4,
+        "watchers_count": 4,
         "has_discussions": false,
         "forks_count": 0,
         "allow_forking": true,
@@ -26,7 +26,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 0,
-        "watchers": 3,
+        "watchers": 4,
         "score": 0,
         "subscribers_count": 1
     },
diff --git a/2024/CVE-2024-38063.json b/2024/CVE-2024-38063.json
index 265fe3109f..52002855c5 100644
--- a/2024/CVE-2024-38063.json
+++ b/2024/CVE-2024-38063.json
@@ -420,10 +420,10 @@
         "description": "CVE-2024-38063 is a critical security vulnerability in the Windows TCP\/IP stack that allows for remote code execution (RCE)",
         "fork": false,
         "created_at": "2024-08-31T13:56:26Z",
-        "updated_at": "2024-12-09T08:30:58Z",
+        "updated_at": "2024-12-10T07:03:44Z",
         "pushed_at": "2024-12-09T07:16:33Z",
-        "stargazers_count": 16,
-        "watchers_count": 16,
+        "stargazers_count": 18,
+        "watchers_count": 18,
         "has_discussions": false,
         "forks_count": 4,
         "allow_forking": true,
@@ -432,7 +432,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 4,
-        "watchers": 16,
+        "watchers": 18,
         "score": 0,
         "subscribers_count": 1
     },
diff --git a/2024/CVE-2024-38193.json b/2024/CVE-2024-38193.json
index 99a8418858..b6d53ad21d 100644
--- a/2024/CVE-2024-38193.json
+++ b/2024/CVE-2024-38193.json
@@ -14,10 +14,10 @@
         "description": null,
         "fork": false,
         "created_at": "2024-12-03T08:56:59Z",
-        "updated_at": "2024-12-10T05:43:18Z",
+        "updated_at": "2024-12-10T09:52:26Z",
         "pushed_at": "2024-11-18T23:48:31Z",
-        "stargazers_count": 29,
-        "watchers_count": 29,
+        "stargazers_count": 31,
+        "watchers_count": 31,
         "has_discussions": false,
         "forks_count": 16,
         "allow_forking": true,
@@ -26,7 +26,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 16,
-        "watchers": 29,
+        "watchers": 31,
         "score": 0,
         "subscribers_count": 0
     }
diff --git a/2024/CVE-2024-4367.json b/2024/CVE-2024-4367.json
index 41de9fefc7..70a57fa62a 100644
--- a/2024/CVE-2024-4367.json
+++ b/2024/CVE-2024-4367.json
@@ -45,10 +45,10 @@
         "description": "CVE-2024-4367 arbitrary js execution in pdf js",
         "fork": false,
         "created_at": "2024-05-20T22:56:10Z",
-        "updated_at": "2024-11-20T16:30:47Z",
+        "updated_at": "2024-12-10T07:46:23Z",
         "pushed_at": "2024-05-20T23:09:43Z",
-        "stargazers_count": 44,
-        "watchers_count": 44,
+        "stargazers_count": 45,
+        "watchers_count": 45,
         "has_discussions": false,
         "forks_count": 8,
         "allow_forking": true,
@@ -57,7 +57,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 8,
-        "watchers": 44,
+        "watchers": 45,
         "score": 0,
         "subscribers_count": 1
     },
@@ -278,10 +278,10 @@
         "description": null,
         "fork": false,
         "created_at": "2024-09-04T14:43:33Z",
-        "updated_at": "2024-11-27T00:52:45Z",
+        "updated_at": "2024-12-10T12:07:46Z",
         "pushed_at": "2024-09-04T15:17:57Z",
-        "stargazers_count": 1,
-        "watchers_count": 1,
+        "stargazers_count": 2,
+        "watchers_count": 2,
         "has_discussions": false,
         "forks_count": 0,
         "allow_forking": true,
@@ -290,7 +290,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 0,
-        "watchers": 1,
+        "watchers": 2,
         "score": 0,
         "subscribers_count": 1
     },
diff --git a/2024/CVE-2024-49039.json b/2024/CVE-2024-49039.json
index c8213cd982..defbee2931 100644
--- a/2024/CVE-2024-49039.json
+++ b/2024/CVE-2024-49039.json
@@ -14,7 +14,7 @@
         "description": "WPTaskScheduler RPC Persistence &  CVE-2024-49039 via Task Scheduler",
         "fork": false,
         "created_at": "2024-11-19T08:57:18Z",
-        "updated_at": "2024-12-09T08:10:55Z",
+        "updated_at": "2024-12-10T08:51:16Z",
         "pushed_at": "2024-11-19T09:15:26Z",
         "stargazers_count": 83,
         "watchers_count": 83,
diff --git a/2024/CVE-2024-51378.json b/2024/CVE-2024-51378.json
index 0907756625..b4ba6fc152 100644
--- a/2024/CVE-2024-51378.json
+++ b/2024/CVE-2024-51378.json
@@ -14,10 +14,10 @@
         "description": "Exploit for CyberPanel Pre-Auth RCE via Command Injection",
         "fork": false,
         "created_at": "2024-10-29T23:34:27Z",
-        "updated_at": "2024-12-09T20:20:18Z",
+        "updated_at": "2024-12-10T10:14:45Z",
         "pushed_at": "2024-11-01T10:12:49Z",
-        "stargazers_count": 16,
-        "watchers_count": 16,
+        "stargazers_count": 17,
+        "watchers_count": 17,
         "has_discussions": false,
         "forks_count": 3,
         "allow_forking": true,
@@ -26,7 +26,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 3,
-        "watchers": 16,
+        "watchers": 17,
         "score": 0,
         "subscribers_count": 1
     }
diff --git a/2024/CVE-2024-55586.json b/2024/CVE-2024-55586.json
new file mode 100644
index 0000000000..1468729074
--- /dev/null
+++ b/2024/CVE-2024-55586.json
@@ -0,0 +1,33 @@
+[
+    {
+        "id": 874221488,
+        "name": "CVE-2024-55586",
+        "full_name": "CSIRTTrizna\/CVE-2024-55586",
+        "owner": {
+            "login": "CSIRTTrizna",
+            "id": 170928596,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170928596?v=4",
+            "html_url": "https:\/\/github.com\/CSIRTTrizna",
+            "user_view_type": "public"
+        },
+        "html_url": "https:\/\/github.com\/CSIRTTrizna\/CVE-2024-55586",
+        "description": null,
+        "fork": false,
+        "created_at": "2024-10-17T13:04:26Z",
+        "updated_at": "2024-12-10T06:57:30Z",
+        "pushed_at": "2024-10-17T13:13:03Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "has_discussions": false,
+        "forks_count": 0,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 0,
+        "watchers": 0,
+        "score": 0,
+        "subscribers_count": 0
+    }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json
index 5cd76fb526..5e4b8611bb 100644
--- a/2024/CVE-2024-6387.json
+++ b/2024/CVE-2024-6387.json
@@ -2211,10 +2211,10 @@
         "description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
         "fork": false,
         "created_at": "2024-07-08T11:27:49Z",
-        "updated_at": "2024-12-09T18:18:45Z",
+        "updated_at": "2024-12-10T08:51:15Z",
         "pushed_at": "2024-08-22T08:50:25Z",
-        "stargazers_count": 58,
-        "watchers_count": 58,
+        "stargazers_count": 57,
+        "watchers_count": 57,
         "has_discussions": false,
         "forks_count": 23,
         "allow_forking": true,
@@ -2223,7 +2223,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 23,
-        "watchers": 58,
+        "watchers": 57,
         "score": 0,
         "subscribers_count": 2
     },
diff --git a/README.md b/README.md
index 5c79c1cedf..8c339a3d0d 100644
--- a/README.md
+++ b/README.md
@@ -7375,6 +7375,9 @@
 
 - [hotplugin0x01/CVE-2024-54679](https://github.com/hotplugin0x01/CVE-2024-54679)
 
+### CVE-2024-55586
+- [CSIRTTrizna/CVE-2024-55586](https://github.com/CSIRTTrizna/CVE-2024-55586)
+
 ### CVE-2024-1642470
 - [Symbolexe/CVE-2024-1642470](https://github.com/Symbolexe/CVE-2024-1642470)
 
@@ -13206,6 +13209,7 @@
 </code>
 
 - [0xyassine/CVE-2023-40028](https://github.com/0xyassine/CVE-2023-40028)
+- [BBSynapse/CVE-2023-40028](https://github.com/BBSynapse/CVE-2023-40028)
 
 ### CVE-2023-40031 (2023-08-25)