From 57d5e2d8b32069b86b766b3ced7e25d813403a12 Mon Sep 17 00:00:00 2001
From: motikan2010-bot <k.agena1993@gmail.com>
Date: Fri, 13 Sep 2024 15:30:06 +0900
Subject: [PATCH] Auto Update 2024/09/13 06:30:06

---
 2011/CVE-2011-3389.json    |  8 ++++----
 2016/CVE-2016-1000027.json |  8 ++++----
 2017/CVE-2017-12615.json   |  8 ++++----
 2017/CVE-2017-20165.json   |  2 +-
 2018/CVE-2018-7600.json    |  8 ++++----
 2020/CVE-2020-1938.json    |  8 ++++----
 2021/CVE-2021-21972.json   |  8 ++++----
 2021/CVE-2021-3156.json    | 30 ++++++++++++++++++++++++++++++
 2021/CVE-2021-43858.json   | 30 ------------------------------
 2021/CVE-2021-44228.json   |  8 ++++----
 2022/CVE-2022-1388.json    |  2 +-
 2022/CVE-2022-21999.json   |  8 ++++----
 2022/CVE-2022-22947.json   |  8 ++++----
 2022/CVE-2022-22954.json   |  8 ++++----
 2022/CVE-2022-36267.json   |  2 +-
 2022/CVE-2022-40684.json   |  4 ++--
 2022/CVE-2022-41852.json   |  2 +-
 2023/CVE-2023-22809.json   |  4 ++--
 2023/CVE-2023-2598.json    |  8 ++++----
 2023/CVE-2023-28753.json   |  2 +-
 2023/CVE-2023-29357.json   |  2 +-
 2023/CVE-2023-3710.json    |  4 ++--
 2023/CVE-2023-3711.json    |  4 ++--
 2023/CVE-2023-3712.json    |  4 ++--
 2023/CVE-2023-44487.json   |  8 ++++----
 2023/CVE-2023-46604.json   |  4 ++--
 2023/CVE-2023-4863.json    |  8 ++++----
 2024/CVE-2024-1709.json    |  2 +-
 2024/CVE-2024-21626.json   |  8 ++++----
 2024/CVE-2024-2961.json    |  8 ++++----
 2024/CVE-2024-30088.json   |  8 ++++----
 2024/CVE-2024-31666.json   |  2 +-
 2024/CVE-2024-37084.json   |  8 ++++----
 2024/CVE-2024-38077.json   | 12 ++++++------
 2024/CVE-2024-4577.json    |  4 ++--
 2024/CVE-2024-4879.json    | 30 ++++++++++++++++++++++++++++++
 2024/CVE-2024-5356.json    |  2 +-
 2024/CVE-2024-5932.json    | 30 ++++++++++++++++++++++++++++++
 2024/CVE-2024-6387.json    |  8 ++++----
 2024/CVE-2024-7029.json    | 12 ++++++------
 2024/CVE-2024-8522.json    |  2 +-
 README.md                  |  4 +++-
 42 files changed, 201 insertions(+), 139 deletions(-)

diff --git a/2011/CVE-2011-3389.json b/2011/CVE-2011-3389.json
index 3434a8137b..830b595255 100644
--- a/2011/CVE-2011-3389.json
+++ b/2011/CVE-2011-3389.json
@@ -13,10 +13,10 @@
         "description": ":muscle: Proof Of Concept of the BEAST attack against SSL\/TLS CVE-2011-3389 :muscle:",
         "fork": false,
         "created_at": "2015-03-28T10:28:16Z",
-        "updated_at": "2024-08-12T19:16:51Z",
+        "updated_at": "2024-09-13T04:32:23Z",
         "pushed_at": "2019-01-30T21:36:22Z",
-        "stargazers_count": 67,
-        "watchers_count": 67,
+        "stargazers_count": 68,
+        "watchers_count": 68,
         "has_discussions": false,
         "forks_count": 30,
         "allow_forking": true,
@@ -31,7 +31,7 @@
         ],
         "visibility": "public",
         "forks": 30,
-        "watchers": 67,
+        "watchers": 68,
         "score": 0,
         "subscribers_count": 7
     }
diff --git a/2016/CVE-2016-1000027.json b/2016/CVE-2016-1000027.json
index 1085aabe64..ad8471d5c7 100644
--- a/2016/CVE-2016-1000027.json
+++ b/2016/CVE-2016-1000027.json
@@ -13,10 +13,10 @@
         "description": "PoC for CVE-2016-1000027",
         "fork": false,
         "created_at": "2021-02-01T19:46:51Z",
-        "updated_at": "2024-07-30T08:47:51Z",
+        "updated_at": "2024-09-13T03:50:46Z",
         "pushed_at": "2021-03-05T21:52:06Z",
-        "stargazers_count": 10,
-        "watchers_count": 10,
+        "stargazers_count": 11,
+        "watchers_count": 11,
         "has_discussions": false,
         "forks_count": 6,
         "allow_forking": true,
@@ -36,7 +36,7 @@
         ],
         "visibility": "public",
         "forks": 6,
-        "watchers": 10,
+        "watchers": 11,
         "score": 0,
         "subscribers_count": 1
     },
diff --git a/2017/CVE-2017-12615.json b/2017/CVE-2017-12615.json
index 40a18b5a9c..887fa6288c 100644
--- a/2017/CVE-2017-12615.json
+++ b/2017/CVE-2017-12615.json
@@ -403,10 +403,10 @@
         "description": "最新tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
         "fork": false,
         "created_at": "2024-08-29T06:38:16Z",
-        "updated_at": "2024-09-12T02:43:30Z",
+        "updated_at": "2024-09-13T00:36:57Z",
         "pushed_at": "2024-09-09T07:42:24Z",
-        "stargazers_count": 45,
-        "watchers_count": 45,
+        "stargazers_count": 46,
+        "watchers_count": 46,
         "has_discussions": false,
         "forks_count": 1,
         "allow_forking": true,
@@ -423,7 +423,7 @@
         ],
         "visibility": "public",
         "forks": 1,
-        "watchers": 45,
+        "watchers": 46,
         "score": 0,
         "subscribers_count": 1
     }
diff --git a/2017/CVE-2017-20165.json b/2017/CVE-2017-20165.json
index b52582304c..21c072c115 100644
--- a/2017/CVE-2017-20165.json
+++ b/2017/CVE-2017-20165.json
@@ -14,7 +14,7 @@
         "fork": false,
         "created_at": "2023-01-11T10:20:27Z",
         "updated_at": "2024-08-01T05:44:39Z",
-        "pushed_at": "2024-08-01T05:44:43Z",
+        "pushed_at": "2024-09-13T05:41:46Z",
         "stargazers_count": 13,
         "watchers_count": 13,
         "has_discussions": false,
diff --git a/2018/CVE-2018-7600.json b/2018/CVE-2018-7600.json
index 967ce79273..201f55e3e7 100644
--- a/2018/CVE-2018-7600.json
+++ b/2018/CVE-2018-7600.json
@@ -80,10 +80,10 @@
         "description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
         "fork": false,
         "created_at": "2018-04-12T22:53:14Z",
-        "updated_at": "2024-09-05T05:42:59Z",
+        "updated_at": "2024-09-13T03:02:00Z",
         "pushed_at": "2021-01-08T10:31:22Z",
-        "stargazers_count": 574,
-        "watchers_count": 574,
+        "stargazers_count": 575,
+        "watchers_count": 575,
         "has_discussions": false,
         "forks_count": 174,
         "allow_forking": true,
@@ -102,7 +102,7 @@
         ],
         "visibility": "public",
         "forks": 174,
-        "watchers": 574,
+        "watchers": 575,
         "score": 0,
         "subscribers_count": 23
     },
diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json
index 048a24d3a7..75c9ff5d4f 100644
--- a/2020/CVE-2020-1938.json
+++ b/2020/CVE-2020-1938.json
@@ -919,10 +919,10 @@
         "description": "最新tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
         "fork": false,
         "created_at": "2024-08-29T06:38:16Z",
-        "updated_at": "2024-09-12T02:43:30Z",
+        "updated_at": "2024-09-13T00:36:57Z",
         "pushed_at": "2024-09-09T07:42:24Z",
-        "stargazers_count": 45,
-        "watchers_count": 45,
+        "stargazers_count": 46,
+        "watchers_count": 46,
         "has_discussions": false,
         "forks_count": 1,
         "allow_forking": true,
@@ -939,7 +939,7 @@
         ],
         "visibility": "public",
         "forks": 1,
-        "watchers": 45,
+        "watchers": 46,
         "score": 0,
         "subscribers_count": 1
     }
diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json
index 02b434b226..d3b3dd42d8 100644
--- a/2021/CVE-2021-21972.json
+++ b/2021/CVE-2021-21972.json
@@ -851,10 +851,10 @@
         "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
         "fork": false,
         "created_at": "2022-10-04T03:39:27Z",
-        "updated_at": "2024-09-12T08:43:29Z",
+        "updated_at": "2024-09-13T02:34:20Z",
         "pushed_at": "2024-04-25T06:09:38Z",
-        "stargazers_count": 1306,
-        "watchers_count": 1306,
+        "stargazers_count": 1307,
+        "watchers_count": 1307,
         "has_discussions": false,
         "forks_count": 165,
         "allow_forking": true,
@@ -870,7 +870,7 @@
         ],
         "visibility": "public",
         "forks": 165,
-        "watchers": 1306,
+        "watchers": 1307,
         "score": 0,
         "subscribers_count": 15
     }
diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json
index cba5c70da1..ac57f6a228 100644
--- a/2021/CVE-2021-3156.json
+++ b/2021/CVE-2021-3156.json
@@ -2211,5 +2211,35 @@
         "watchers": 0,
         "score": 0,
         "subscribers_count": 1
+    },
+    {
+        "id": 856715099,
+        "name": "CVE-2021-3156",
+        "full_name": "acidburn2049\/CVE-2021-3156",
+        "owner": {
+            "login": "acidburn2049",
+            "id": 181438567,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/181438567?v=4",
+            "html_url": "https:\/\/github.com\/acidburn2049"
+        },
+        "html_url": "https:\/\/github.com\/acidburn2049\/CVE-2021-3156",
+        "description": null,
+        "fork": false,
+        "created_at": "2024-09-13T04:20:36Z",
+        "updated_at": "2024-09-13T04:20:37Z",
+        "pushed_at": "2024-09-13T04:20:37Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "has_discussions": false,
+        "forks_count": 0,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 0,
+        "watchers": 0,
+        "score": 0,
+        "subscribers_count": 0
     }
 ]
\ No newline at end of file
diff --git a/2021/CVE-2021-43858.json b/2021/CVE-2021-43858.json
index b241c62d8b..eb8a762891 100644
--- a/2021/CVE-2021-43858.json
+++ b/2021/CVE-2021-43858.json
@@ -1,34 +1,4 @@
 [
-    {
-        "id": 444140549,
-        "name": "cve-2021-43858",
-        "full_name": "0rx1\/cve-2021-43858",
-        "owner": {
-            "login": "0rx1",
-            "id": 12779060,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12779060?v=4",
-            "html_url": "https:\/\/github.com\/0rx1"
-        },
-        "html_url": "https:\/\/github.com\/0rx1\/cve-2021-43858",
-        "description": null,
-        "fork": false,
-        "created_at": "2022-01-03T17:11:54Z",
-        "updated_at": "2023-11-18T03:11:06Z",
-        "pushed_at": "2022-01-03T14:15:40Z",
-        "stargazers_count": 4,
-        "watchers_count": 4,
-        "has_discussions": false,
-        "forks_count": 9,
-        "allow_forking": true,
-        "is_template": false,
-        "web_commit_signoff_required": false,
-        "topics": [],
-        "visibility": "public",
-        "forks": 9,
-        "watchers": 4,
-        "score": 0,
-        "subscribers_count": 0
-    },
     {
         "id": 626802613,
         "name": "CVE-2021-43858-MinIO",
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
index c96b5ea235..888306eb17 100644
--- a/2021/CVE-2021-44228.json
+++ b/2021/CVE-2021-44228.json
@@ -13,10 +13,10 @@
         "description": "Apache Log4j 远程代码执行",
         "fork": false,
         "created_at": "2021-12-09T15:27:38Z",
-        "updated_at": "2024-08-24T16:05:18Z",
+        "updated_at": "2024-09-13T03:18:29Z",
         "pushed_at": "2023-05-14T04:54:32Z",
-        "stargazers_count": 70,
-        "watchers_count": 70,
+        "stargazers_count": 71,
+        "watchers_count": 71,
         "has_discussions": false,
         "forks_count": 25,
         "allow_forking": true,
@@ -25,7 +25,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 25,
-        "watchers": 70,
+        "watchers": 71,
         "score": 0,
         "subscribers_count": 2
     },
diff --git a/2022/CVE-2022-1388.json b/2022/CVE-2022-1388.json
index ea0635bc2c..9d79d6af4c 100644
--- a/2022/CVE-2022-1388.json
+++ b/2022/CVE-2022-1388.json
@@ -2020,6 +2020,6 @@
         "forks": 0,
         "watchers": 0,
         "score": 0,
-        "subscribers_count": 0
+        "subscribers_count": 1
     }
 ]
\ No newline at end of file
diff --git a/2022/CVE-2022-21999.json b/2022/CVE-2022-21999.json
index bf3c053a5d..2149be98fd 100644
--- a/2022/CVE-2022-21999.json
+++ b/2022/CVE-2022-21999.json
@@ -13,10 +13,10 @@
         "description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
         "fork": false,
         "created_at": "2022-02-08T17:25:44Z",
-        "updated_at": "2024-09-10T12:29:40Z",
+        "updated_at": "2024-09-13T04:28:04Z",
         "pushed_at": "2022-02-09T16:54:09Z",
-        "stargazers_count": 756,
-        "watchers_count": 756,
+        "stargazers_count": 757,
+        "watchers_count": 757,
         "has_discussions": false,
         "forks_count": 157,
         "allow_forking": true,
@@ -28,7 +28,7 @@
         ],
         "visibility": "public",
         "forks": 157,
-        "watchers": 756,
+        "watchers": 757,
         "score": 0,
         "subscribers_count": 16
     }
diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json
index 7c83e6c80c..35f185b6a1 100644
--- a/2022/CVE-2022-22947.json
+++ b/2022/CVE-2022-22947.json
@@ -1314,10 +1314,10 @@
         "description": "Spring Cloud Gateway Actuator API SpEL表达式注入命令执行(CVE-2022-22947) 注入哥斯拉内存马",
         "fork": false,
         "created_at": "2022-05-16T15:27:41Z",
-        "updated_at": "2024-08-23T00:20:16Z",
+        "updated_at": "2024-09-13T02:59:32Z",
         "pushed_at": "2022-05-16T15:33:37Z",
-        "stargazers_count": 51,
-        "watchers_count": 51,
+        "stargazers_count": 52,
+        "watchers_count": 52,
         "has_discussions": false,
         "forks_count": 9,
         "allow_forking": true,
@@ -1326,7 +1326,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 9,
-        "watchers": 51,
+        "watchers": 52,
         "score": 0,
         "subscribers_count": 1
     },
diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json
index 0d1b437861..10ad69fedc 100644
--- a/2022/CVE-2022-22954.json
+++ b/2022/CVE-2022-22954.json
@@ -766,10 +766,10 @@
         "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
         "fork": false,
         "created_at": "2022-10-04T03:39:27Z",
-        "updated_at": "2024-09-12T08:43:29Z",
+        "updated_at": "2024-09-13T02:34:20Z",
         "pushed_at": "2024-04-25T06:09:38Z",
-        "stargazers_count": 1306,
-        "watchers_count": 1306,
+        "stargazers_count": 1307,
+        "watchers_count": 1307,
         "has_discussions": false,
         "forks_count": 165,
         "allow_forking": true,
@@ -785,7 +785,7 @@
         ],
         "visibility": "public",
         "forks": 165,
-        "watchers": 1306,
+        "watchers": 1307,
         "score": 0,
         "subscribers_count": 15
     },
diff --git a/2022/CVE-2022-36267.json b/2022/CVE-2022-36267.json
index c329cfb91e..4bc087255c 100644
--- a/2022/CVE-2022-36267.json
+++ b/2022/CVE-2022-36267.json
@@ -13,7 +13,7 @@
         "description": "PoC Script for CVE-2022-36267: Exploits an unauthenticated remote command injection vulnerability in Airspan AirSpot 5410 antenna.",
         "fork": false,
         "created_at": "2024-01-08T22:23:57Z",
-        "updated_at": "2024-02-03T23:46:44Z",
+        "updated_at": "2024-09-13T01:20:33Z",
         "pushed_at": "2024-01-08T22:37:55Z",
         "stargazers_count": 8,
         "watchers_count": 8,
diff --git a/2022/CVE-2022-40684.json b/2022/CVE-2022-40684.json
index 2519429a10..b92cf8d93b 100644
--- a/2022/CVE-2022-40684.json
+++ b/2022/CVE-2022-40684.json
@@ -48,13 +48,13 @@
         "stargazers_count": 87,
         "watchers_count": 87,
         "has_discussions": false,
-        "forks_count": 35,
+        "forks_count": 34,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 35,
+        "forks": 34,
         "watchers": 87,
         "score": 0,
         "subscribers_count": 3
diff --git a/2022/CVE-2022-41852.json b/2022/CVE-2022-41852.json
index f01494c4ee..a9b0094087 100644
--- a/2022/CVE-2022-41852.json
+++ b/2022/CVE-2022-41852.json
@@ -69,6 +69,6 @@
         "forks": 0,
         "watchers": 0,
         "score": 0,
-        "subscribers_count": 0
+        "subscribers_count": 1
     }
 ]
\ No newline at end of file
diff --git a/2023/CVE-2023-22809.json b/2023/CVE-2023-22809.json
index 72d968d206..f5dede6240 100644
--- a/2023/CVE-2023-22809.json
+++ b/2023/CVE-2023-22809.json
@@ -18,7 +18,7 @@
         "stargazers_count": 147,
         "watchers_count": 147,
         "has_discussions": false,
-        "forks_count": 35,
+        "forks_count": 36,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
@@ -33,7 +33,7 @@
             "vulnerability"
         ],
         "visibility": "public",
-        "forks": 35,
+        "forks": 36,
         "watchers": 147,
         "score": 0,
         "subscribers_count": 3
diff --git a/2023/CVE-2023-2598.json b/2023/CVE-2023-2598.json
index 3f1c8966d7..4a106411ae 100644
--- a/2023/CVE-2023-2598.json
+++ b/2023/CVE-2023-2598.json
@@ -13,10 +13,10 @@
         "description": "LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.",
         "fork": false,
         "created_at": "2023-11-16T23:41:27Z",
-        "updated_at": "2024-09-02T09:37:59Z",
+        "updated_at": "2024-09-13T02:33:35Z",
         "pushed_at": "2023-11-23T18:37:18Z",
-        "stargazers_count": 86,
-        "watchers_count": 86,
+        "stargazers_count": 87,
+        "watchers_count": 87,
         "has_discussions": false,
         "forks_count": 12,
         "allow_forking": true,
@@ -25,7 +25,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 12,
-        "watchers": 86,
+        "watchers": 87,
         "score": 0,
         "subscribers_count": 7
     },
diff --git a/2023/CVE-2023-28753.json b/2023/CVE-2023-28753.json
index 3eca4c3f77..6d42c842e3 100644
--- a/2023/CVE-2023-28753.json
+++ b/2023/CVE-2023-28753.json
@@ -27,6 +27,6 @@
         "forks": 0,
         "watchers": 0,
         "score": 0,
-        "subscribers_count": 0
+        "subscribers_count": 1
     }
 ]
\ No newline at end of file
diff --git a/2023/CVE-2023-29357.json b/2023/CVE-2023-29357.json
index 6a3f4a50de..6e851b78e0 100644
--- a/2023/CVE-2023-29357.json
+++ b/2023/CVE-2023-29357.json
@@ -184,6 +184,6 @@
         "forks": 0,
         "watchers": 0,
         "score": 0,
-        "subscribers_count": 0
+        "subscribers_count": 1
     }
 ]
\ No newline at end of file
diff --git a/2023/CVE-2023-3710.json b/2023/CVE-2023-3710.json
index 8657d3cbb9..292cb6eb28 100644
--- a/2023/CVE-2023-3710.json
+++ b/2023/CVE-2023-3710.json
@@ -10,10 +10,10 @@
             "html_url": "https:\/\/github.com\/vpxuser"
         },
         "html_url": "https:\/\/github.com\/vpxuser\/CVE-2023-3710-POC",
-        "description": null,
+        "description": "Honeywell PM43工控打印机管理后台username参数RCE漏洞证明POC",
         "fork": false,
         "created_at": "2023-07-03T01:14:02Z",
-        "updated_at": "2024-08-12T09:51:53Z",
+        "updated_at": "2024-09-13T00:33:35Z",
         "pushed_at": "2023-09-27T01:11:00Z",
         "stargazers_count": 5,
         "watchers_count": 5,
diff --git a/2023/CVE-2023-3711.json b/2023/CVE-2023-3711.json
index 060a05548c..bb4c5cc9c6 100644
--- a/2023/CVE-2023-3711.json
+++ b/2023/CVE-2023-3711.json
@@ -10,10 +10,10 @@
             "html_url": "https:\/\/github.com\/vpxuser"
         },
         "html_url": "https:\/\/github.com\/vpxuser\/CVE-2023-3711-POC",
-        "description": null,
+        "description": "Honeywell PM43工控打印机管理后台XSS漏洞证明POC",
         "fork": false,
         "created_at": "2023-07-03T02:10:42Z",
-        "updated_at": "2023-10-13T05:59:27Z",
+        "updated_at": "2024-09-13T00:32:54Z",
         "pushed_at": "2023-09-27T01:09:51Z",
         "stargazers_count": 0,
         "watchers_count": 0,
diff --git a/2023/CVE-2023-3712.json b/2023/CVE-2023-3712.json
index d4f9705351..5062d20737 100644
--- a/2023/CVE-2023-3712.json
+++ b/2023/CVE-2023-3712.json
@@ -10,10 +10,10 @@
             "html_url": "https:\/\/github.com\/vpxuser"
         },
         "html_url": "https:\/\/github.com\/vpxuser\/CVE-2023-3712-POC",
-        "description": null,
+        "description": "Honeywell PM43工控打印机管理后台userpassword参数RCE漏洞证明POC",
         "fork": false,
         "created_at": "2023-07-03T01:51:11Z",
-        "updated_at": "2024-01-26T19:00:11Z",
+        "updated_at": "2024-09-13T00:33:59Z",
         "pushed_at": "2023-09-27T01:11:18Z",
         "stargazers_count": 2,
         "watchers_count": 2,
diff --git a/2023/CVE-2023-44487.json b/2023/CVE-2023-44487.json
index 2a8cab7896..20eb22c658 100644
--- a/2023/CVE-2023-44487.json
+++ b/2023/CVE-2023-44487.json
@@ -141,10 +141,10 @@
         "description": "Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)",
         "fork": false,
         "created_at": "2023-10-13T23:55:32Z",
-        "updated_at": "2024-09-10T07:45:49Z",
+        "updated_at": "2024-09-13T01:52:08Z",
         "pushed_at": "2023-10-30T20:22:37Z",
-        "stargazers_count": 53,
-        "watchers_count": 53,
+        "stargazers_count": 54,
+        "watchers_count": 54,
         "has_discussions": false,
         "forks_count": 15,
         "allow_forking": true,
@@ -153,7 +153,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 15,
-        "watchers": 53,
+        "watchers": 54,
         "score": 0,
         "subscribers_count": 4
     },
diff --git a/2023/CVE-2023-46604.json b/2023/CVE-2023-46604.json
index 03f6c61930..133917b70e 100644
--- a/2023/CVE-2023-46604.json
+++ b/2023/CVE-2023-46604.json
@@ -645,8 +645,8 @@
         "description": "ActiveMQ RCE (CVE-2023-46604) 回显利用工具",
         "fork": false,
         "created_at": "2024-03-05T07:09:21Z",
-        "updated_at": "2024-08-13T15:41:00Z",
-        "pushed_at": "2024-03-05T09:16:50Z",
+        "updated_at": "2024-09-13T05:35:28Z",
+        "pushed_at": "2024-09-13T05:35:25Z",
         "stargazers_count": 5,
         "watchers_count": 5,
         "has_discussions": false,
diff --git a/2023/CVE-2023-4863.json b/2023/CVE-2023-4863.json
index 28628f2293..d3a7e8c0f5 100644
--- a/2023/CVE-2023-4863.json
+++ b/2023/CVE-2023-4863.json
@@ -223,10 +223,10 @@
         "description": null,
         "fork": false,
         "created_at": "2023-12-18T23:12:25Z",
-        "updated_at": "2024-08-27T22:26:30Z",
+        "updated_at": "2024-09-13T04:48:20Z",
         "pushed_at": "2024-05-13T17:40:58Z",
-        "stargazers_count": 44,
-        "watchers_count": 44,
+        "stargazers_count": 45,
+        "watchers_count": 45,
         "has_discussions": false,
         "forks_count": 5,
         "allow_forking": true,
@@ -235,7 +235,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 5,
-        "watchers": 44,
+        "watchers": 45,
         "score": 0,
         "subscribers_count": 3
     },
diff --git a/2024/CVE-2024-1709.json b/2024/CVE-2024-1709.json
index 618e5b22f8..ff8ec25fce 100644
--- a/2024/CVE-2024-1709.json
+++ b/2024/CVE-2024-1709.json
@@ -156,6 +156,6 @@
         "forks": 0,
         "watchers": 0,
         "score": 0,
-        "subscribers_count": 0
+        "subscribers_count": 1
     }
 ]
\ No newline at end of file
diff --git a/2024/CVE-2024-21626.json b/2024/CVE-2024-21626.json
index f2ab23a395..eff76693a1 100644
--- a/2024/CVE-2024-21626.json
+++ b/2024/CVE-2024-21626.json
@@ -43,10 +43,10 @@
         "description": "PoC and Detection for CVE-2024-21626",
         "fork": false,
         "created_at": "2024-02-01T15:28:37Z",
-        "updated_at": "2024-08-20T08:38:22Z",
+        "updated_at": "2024-09-13T05:50:44Z",
         "pushed_at": "2024-02-06T16:09:05Z",
-        "stargazers_count": 69,
-        "watchers_count": 69,
+        "stargazers_count": 70,
+        "watchers_count": 70,
         "has_discussions": false,
         "forks_count": 11,
         "allow_forking": true,
@@ -55,7 +55,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 11,
-        "watchers": 69,
+        "watchers": 70,
         "score": 0,
         "subscribers_count": 3
     },
diff --git a/2024/CVE-2024-2961.json b/2024/CVE-2024-2961.json
index 216fcfe340..84deebdb3f 100644
--- a/2024/CVE-2024-2961.json
+++ b/2024/CVE-2024-2961.json
@@ -73,10 +73,10 @@
         "description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
         "fork": false,
         "created_at": "2024-05-27T08:30:06Z",
-        "updated_at": "2024-09-11T15:30:00Z",
+        "updated_at": "2024-09-13T05:11:52Z",
         "pushed_at": "2024-09-11T15:29:33Z",
-        "stargazers_count": 364,
-        "watchers_count": 364,
+        "stargazers_count": 365,
+        "watchers_count": 365,
         "has_discussions": false,
         "forks_count": 50,
         "allow_forking": true,
@@ -85,7 +85,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 50,
-        "watchers": 364,
+        "watchers": 365,
         "score": 0,
         "subscribers_count": 7
     },
diff --git a/2024/CVE-2024-30088.json b/2024/CVE-2024-30088.json
index a643736d05..a47e5e71b8 100644
--- a/2024/CVE-2024-30088.json
+++ b/2024/CVE-2024-30088.json
@@ -103,10 +103,10 @@
         "description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088",
         "fork": false,
         "created_at": "2024-07-15T08:07:05Z",
-        "updated_at": "2024-09-12T21:35:31Z",
+        "updated_at": "2024-09-13T04:19:13Z",
         "pushed_at": "2024-09-08T21:23:34Z",
-        "stargazers_count": 352,
-        "watchers_count": 352,
+        "stargazers_count": 353,
+        "watchers_count": 353,
         "has_discussions": false,
         "forks_count": 28,
         "allow_forking": true,
@@ -115,7 +115,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 28,
-        "watchers": 352,
+        "watchers": 353,
         "score": 0,
         "subscribers_count": 18
     },
diff --git a/2024/CVE-2024-31666.json b/2024/CVE-2024-31666.json
index 8c46a045ea..4825d6c561 100644
--- a/2024/CVE-2024-31666.json
+++ b/2024/CVE-2024-31666.json
@@ -27,6 +27,6 @@
         "forks": 0,
         "watchers": 0,
         "score": 0,
-        "subscribers_count": 0
+        "subscribers_count": 1
     }
 ]
\ No newline at end of file
diff --git a/2024/CVE-2024-37084.json b/2024/CVE-2024-37084.json
index de286381a8..40aa004463 100644
--- a/2024/CVE-2024-37084.json
+++ b/2024/CVE-2024-37084.json
@@ -43,10 +43,10 @@
         "description": "Spring Cloud Remote Code Execution",
         "fork": false,
         "created_at": "2024-09-11T14:09:50Z",
-        "updated_at": "2024-09-11T14:15:01Z",
+        "updated_at": "2024-09-13T03:21:50Z",
         "pushed_at": "2024-09-11T14:12:32Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
+        "stargazers_count": 1,
+        "watchers_count": 1,
         "has_discussions": false,
         "forks_count": 0,
         "allow_forking": true,
@@ -55,7 +55,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 0,
-        "watchers": 0,
+        "watchers": 1,
         "score": 0,
         "subscribers_count": 1
     }
diff --git a/2024/CVE-2024-38077.json b/2024/CVE-2024-38077.json
index 96c43da2cc..81bc1f5487 100644
--- a/2024/CVE-2024-38077.json
+++ b/2024/CVE-2024-38077.json
@@ -43,19 +43,19 @@
         "description": "RDL的堆溢出导致的RCE",
         "fork": false,
         "created_at": "2024-08-09T05:00:44Z",
-        "updated_at": "2024-09-12T09:04:33Z",
+        "updated_at": "2024-09-13T02:06:05Z",
         "pushed_at": "2024-08-14T04:43:05Z",
-        "stargazers_count": 194,
-        "watchers_count": 194,
+        "stargazers_count": 195,
+        "watchers_count": 195,
         "has_discussions": false,
-        "forks_count": 82,
+        "forks_count": 83,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 82,
-        "watchers": 194,
+        "forks": 83,
+        "watchers": 195,
         "score": 0,
         "subscribers_count": 5
     },
diff --git a/2024/CVE-2024-4577.json b/2024/CVE-2024-4577.json
index d25074c9f4..cc2c1545d4 100644
--- a/2024/CVE-2024-4577.json
+++ b/2024/CVE-2024-4577.json
@@ -1527,7 +1527,7 @@
         "forks": 0,
         "watchers": 0,
         "score": 0,
-        "subscribers_count": 0
+        "subscribers_count": 1
     },
     {
         "id": 856557928,
@@ -1557,6 +1557,6 @@
         "forks": 0,
         "watchers": 0,
         "score": 0,
-        "subscribers_count": 0
+        "subscribers_count": 1
     }
 ]
\ No newline at end of file
diff --git a/2024/CVE-2024-4879.json b/2024/CVE-2024-4879.json
index 6d195e3669..0e74f4eb8d 100644
--- a/2024/CVE-2024-4879.json
+++ b/2024/CVE-2024-4879.json
@@ -268,5 +268,35 @@
         "watchers": 4,
         "score": 0,
         "subscribers_count": 1
+    },
+    {
+        "id": 856665318,
+        "name": "CVE-2024-4879",
+        "full_name": "0xWhoami35\/CVE-2024-4879",
+        "owner": {
+            "login": "0xWhoami35",
+            "id": 107396843,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107396843?v=4",
+            "html_url": "https:\/\/github.com\/0xWhoami35"
+        },
+        "html_url": "https:\/\/github.com\/0xWhoami35\/CVE-2024-4879",
+        "description": null,
+        "fork": false,
+        "created_at": "2024-09-13T01:20:34Z",
+        "updated_at": "2024-09-13T01:33:09Z",
+        "pushed_at": "2024-09-13T01:33:05Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "has_discussions": false,
+        "forks_count": 0,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 0,
+        "watchers": 0,
+        "score": 0,
+        "subscribers_count": 0
     }
 ]
\ No newline at end of file
diff --git a/2024/CVE-2024-5356.json b/2024/CVE-2024-5356.json
index 91e559aca8..322e187fcb 100644
--- a/2024/CVE-2024-5356.json
+++ b/2024/CVE-2024-5356.json
@@ -27,6 +27,6 @@
         "forks": 0,
         "watchers": 1,
         "score": 0,
-        "subscribers_count": 0
+        "subscribers_count": 1
     }
 ]
\ No newline at end of file
diff --git a/2024/CVE-2024-5932.json b/2024/CVE-2024-5932.json
index 9f60e2d0dc..373bdc8602 100644
--- a/2024/CVE-2024-5932.json
+++ b/2024/CVE-2024-5932.json
@@ -1,4 +1,34 @@
 [
+    {
+        "id": 845461331,
+        "name": "CVE-2024-5932-PoC",
+        "full_name": "0xb0mb3r\/CVE-2024-5932-PoC",
+        "owner": {
+            "login": "0xb0mb3r",
+            "id": 177725137,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/177725137?v=4",
+            "html_url": "https:\/\/github.com\/0xb0mb3r"
+        },
+        "html_url": "https:\/\/github.com\/0xb0mb3r\/CVE-2024-5932-PoC",
+        "description": "Proof-of-Concept for CVE-2024-5932  GiveWP PHP Object Injection ",
+        "fork": false,
+        "created_at": "2024-08-21T09:51:21Z",
+        "updated_at": "2024-09-13T01:58:46Z",
+        "pushed_at": "2024-08-22T15:20:46Z",
+        "stargazers_count": 2,
+        "watchers_count": 2,
+        "has_discussions": false,
+        "forks_count": 0,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 0,
+        "watchers": 2,
+        "score": 0,
+        "subscribers_count": 1
+    },
     {
         "id": 847287273,
         "name": "CVE-2024-5932",
diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json
index 278601c571..95eb2c5931 100644
--- a/2024/CVE-2024-6387.json
+++ b/2024/CVE-2024-6387.json
@@ -1403,10 +1403,10 @@
         "description": "PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit) ",
         "fork": false,
         "created_at": "2024-07-02T18:32:46Z",
-        "updated_at": "2024-09-12T16:00:31Z",
+        "updated_at": "2024-09-13T03:47:57Z",
         "pushed_at": "2024-07-05T15:19:28Z",
-        "stargazers_count": 51,
-        "watchers_count": 51,
+        "stargazers_count": 54,
+        "watchers_count": 54,
         "has_discussions": false,
         "forks_count": 21,
         "allow_forking": true,
@@ -1424,7 +1424,7 @@
         ],
         "visibility": "public",
         "forks": 21,
-        "watchers": 51,
+        "watchers": 54,
         "score": 0,
         "subscribers_count": 1
     },
diff --git a/2024/CVE-2024-7029.json b/2024/CVE-2024-7029.json
index 20f944b4ef..322e352805 100644
--- a/2024/CVE-2024-7029.json
+++ b/2024/CVE-2024-7029.json
@@ -13,19 +13,19 @@
         "description": null,
         "fork": false,
         "created_at": "2024-08-30T07:58:27Z",
-        "updated_at": "2024-09-12T11:00:00Z",
+        "updated_at": "2024-09-13T05:13:04Z",
         "pushed_at": "2024-08-29T17:41:35Z",
-        "stargazers_count": 5,
-        "watchers_count": 5,
+        "stargazers_count": 6,
+        "watchers_count": 6,
         "has_discussions": false,
-        "forks_count": 1,
+        "forks_count": 2,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 1,
-        "watchers": 5,
+        "forks": 2,
+        "watchers": 6,
         "score": 0,
         "subscribers_count": 0
     },
diff --git a/2024/CVE-2024-8522.json b/2024/CVE-2024-8522.json
index 5e27bf7b05..c530a5d486 100644
--- a/2024/CVE-2024-8522.json
+++ b/2024/CVE-2024-8522.json
@@ -33,6 +33,6 @@
         "forks": 0,
         "watchers": 0,
         "score": 0,
-        "subscribers_count": 0
+        "subscribers_count": 1
     }
 ]
\ No newline at end of file
diff --git a/README.md b/README.md
index 1814f56b70..513434e79f 100644
--- a/README.md
+++ b/README.md
@@ -973,6 +973,7 @@
 - [NoTsPepino/CVE-2024-4879-CVE-2024-5217-ServiceNow-RCE-Scanning](https://github.com/NoTsPepino/CVE-2024-4879-CVE-2024-5217-ServiceNow-RCE-Scanning)
 - [jdusane/CVE-2024-4879](https://github.com/jdusane/CVE-2024-4879)
 - [fa-rrel/CVE-2024-4879](https://github.com/fa-rrel/CVE-2024-4879)
+- [0xWhoami35/CVE-2024-4879](https://github.com/0xWhoami35/CVE-2024-4879)
 
 ### CVE-2024-4883 (2024-06-25)
 
@@ -1118,6 +1119,7 @@
 <code>The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.14.1 via deserialization of untrusted input from the 'give_title' parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to execute code remotely, and to delete arbitrary files.
 </code>
 
+- [0xb0mb3r/CVE-2024-5932-PoC](https://github.com/0xb0mb3r/CVE-2024-5932-PoC)
 - [EQSTLab/CVE-2024-5932](https://github.com/EQSTLab/CVE-2024-5932)
 
 ### CVE-2024-5947 (2024-06-13)
@@ -20567,6 +20569,7 @@
 - [SamTruss/LMU-CVE-2021-3156](https://github.com/SamTruss/LMU-CVE-2021-3156)
 - [lypd0/CVE-2021-3156-checker](https://github.com/lypd0/CVE-2021-3156-checker)
 - [Typical0day/CVE-2021-3156](https://github.com/Typical0day/CVE-2021-3156)
+- [acidburn2049/CVE-2021-3156](https://github.com/acidburn2049/CVE-2021-3156)
 
 ### CVE-2021-3157
 - [CrackerCat/cve-2021-3157](https://github.com/CrackerCat/cve-2021-3157)
@@ -25402,7 +25405,6 @@
 <code>MinIO is a Kubernetes native application for cloud storage. Prior to version `RELEASE.2021-12-27T07-23-18Z`, a malicious client can hand-craft an HTTP API call that allows for updating policy for a user and gaining higher privileges. The patch in version `RELEASE.2021-12-27T07-23-18Z` changes the accepted request body type and removes the ability to apply policy changes through this API. There is a workaround for this vulnerability: Changing passwords can be disabled by adding an explicit `Deny` rule to disable the API for users.
 </code>
 
-- [0rx1/cve-2021-43858](https://github.com/0rx1/cve-2021-43858)
 - [khuntor/CVE-2021-43858-MinIO](https://github.com/khuntor/CVE-2021-43858-MinIO)
 
 ### CVE-2021-43883 (2021-12-15)