From 24d539b8ae5b0f531f6ed8950352936aad5d38c8 Mon Sep 17 00:00:00 2001
From: motikan2010-bot <k.agena1993@gmail.com>
Date: Fri, 26 Feb 2021 00:09:00 +0900
Subject: [PATCH] Auto Update 2021/02/26 00:09:00

---
 2014/CVE-2014-4210.json  |  12 ++--
 2016/CVE-2016-0189.json  |   8 +--
 2016/CVE-2016-0638.json  |  12 ++--
 2017/CVE-2017-3248.json  |  12 ++--
 2018/CVE-2018-12463.json |   4 +-
 2018/CVE-2018-2628.json  |  12 ++--
 2018/CVE-2018-5955.json  |   8 +--
 2019/CVE-2019-0708.json  |   8 +--
 2019/CVE-2019-15846.json |   8 +--
 2019/CVE-2019-17558.json |  12 ++--
 2019/CVE-2019-2618.json  |  12 ++--
 2020/CVE-2020-0753.json  |  23 -------
 2020/CVE-2020-0787.json  |   4 +-
 2020/CVE-2020-1472.json  |   8 +--
 2020/CVE-2020-14882.json |  35 ++++++++--
 2020/CVE-2020-14883.json |  23 +++++++
 2020/CVE-2020-17519.json |  23 +++++++
 2020/CVE-2020-1938.json  |  46 -------------
 2020/CVE-2020-2551.json  |  12 ++--
 2020/CVE-2020-8597.json  |   4 +-
 2020/CVE-2020-9992.json  |   8 +--
 2021/CVE-2021-1782.json  |  12 ++--
 2021/CVE-2021-21972.json | 143 +++++++++++++++++++++++++++++----------
 2021/CVE-2021-24085.json |   8 +--
 2021/CVE-2021-3156.json  |  16 ++---
 README.md                |   9 ++-
 26 files changed, 277 insertions(+), 205 deletions(-)

diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json
index cbb1ef7b82..807a608398 100644
--- a/2014/CVE-2014-4210.json
+++ b/2014/CVE-2014-4210.json
@@ -36,13 +36,13 @@
         "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2021-02-24T09:09:53Z",
+        "updated_at": "2021-02-25T12:50:34Z",
         "pushed_at": "2020-11-27T15:10:58Z",
-        "stargazers_count": 924,
-        "watchers_count": 924,
-        "forks_count": 217,
-        "forks": 217,
-        "watchers": 924,
+        "stargazers_count": 926,
+        "watchers_count": 926,
+        "forks_count": 218,
+        "forks": 218,
+        "watchers": 926,
         "score": 0
     },
     {
diff --git a/2016/CVE-2016-0189.json b/2016/CVE-2016-0189.json
index aebcc95e40..d1dbe90677 100644
--- a/2016/CVE-2016-0189.json
+++ b/2016/CVE-2016-0189.json
@@ -13,13 +13,13 @@
         "description": "Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)",
         "fork": false,
         "created_at": "2016-06-22T23:03:30Z",
-        "updated_at": "2021-02-24T05:29:30Z",
+        "updated_at": "2021-02-25T12:01:42Z",
         "pushed_at": "2016-06-23T00:47:50Z",
-        "stargazers_count": 109,
-        "watchers_count": 109,
+        "stargazers_count": 108,
+        "watchers_count": 108,
         "forks_count": 59,
         "forks": 59,
-        "watchers": 109,
+        "watchers": 108,
         "score": 0
     },
     {
diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json
index ea0f6cb03d..daa23b381a 100644
--- a/2016/CVE-2016-0638.json
+++ b/2016/CVE-2016-0638.json
@@ -13,13 +13,13 @@
         "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2021-02-24T09:09:53Z",
+        "updated_at": "2021-02-25T12:50:34Z",
         "pushed_at": "2020-11-27T15:10:58Z",
-        "stargazers_count": 924,
-        "watchers_count": 924,
-        "forks_count": 217,
-        "forks": 217,
-        "watchers": 924,
+        "stargazers_count": 926,
+        "watchers_count": 926,
+        "forks_count": 218,
+        "forks": 218,
+        "watchers": 926,
         "score": 0
     },
     {
diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json
index 39149d25fc..eb74b361b1 100644
--- a/2017/CVE-2017-3248.json
+++ b/2017/CVE-2017-3248.json
@@ -36,13 +36,13 @@
         "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2021-02-24T09:09:53Z",
+        "updated_at": "2021-02-25T12:50:34Z",
         "pushed_at": "2020-11-27T15:10:58Z",
-        "stargazers_count": 924,
-        "watchers_count": 924,
-        "forks_count": 217,
-        "forks": 217,
-        "watchers": 924,
+        "stargazers_count": 926,
+        "watchers_count": 926,
+        "forks_count": 218,
+        "forks": 218,
+        "watchers": 926,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2018/CVE-2018-12463.json b/2018/CVE-2018-12463.json
index 236944a548..e2bd231fb6 100644
--- a/2018/CVE-2018-12463.json
+++ b/2018/CVE-2018-12463.json
@@ -17,8 +17,8 @@
         "pushed_at": "2018-07-17T08:13:34Z",
         "stargazers_count": 4,
         "watchers_count": 4,
-        "forks_count": 0,
-        "forks": 0,
+        "forks_count": 1,
+        "forks": 1,
         "watchers": 4,
         "score": 0
     }
diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json
index ebb68734f2..341c7fe5f6 100644
--- a/2018/CVE-2018-2628.json
+++ b/2018/CVE-2018-2628.json
@@ -450,13 +450,13 @@
         "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2021-02-24T09:09:53Z",
+        "updated_at": "2021-02-25T12:50:34Z",
         "pushed_at": "2020-11-27T15:10:58Z",
-        "stargazers_count": 924,
-        "watchers_count": 924,
-        "forks_count": 217,
-        "forks": 217,
-        "watchers": 924,
+        "stargazers_count": 926,
+        "watchers_count": 926,
+        "forks_count": 218,
+        "forks": 218,
+        "watchers": 926,
         "score": 0
     },
     {
diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json
index ac84d788aa..4cdfd010b2 100644
--- a/2018/CVE-2018-5955.json
+++ b/2018/CVE-2018-5955.json
@@ -36,13 +36,13 @@
         "description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
         "fork": false,
         "created_at": "2019-12-21T22:45:55Z",
-        "updated_at": "2021-02-25T01:40:37Z",
+        "updated_at": "2021-02-25T09:23:41Z",
         "pushed_at": "2020-01-05T21:46:25Z",
-        "stargazers_count": 371,
-        "watchers_count": 371,
+        "stargazers_count": 372,
+        "watchers_count": 372,
         "forks_count": 85,
         "forks": 85,
-        "watchers": 371,
+        "watchers": 372,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json
index 390bb619f2..92f7f34955 100644
--- a/2019/CVE-2019-0708.json
+++ b/2019/CVE-2019-0708.json
@@ -2244,13 +2244,13 @@
         "description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )",
         "fork": false,
         "created_at": "2019-09-30T19:46:21Z",
-        "updated_at": "2021-02-24T12:03:22Z",
+        "updated_at": "2021-02-25T12:42:32Z",
         "pushed_at": "2021-02-06T00:24:21Z",
-        "stargazers_count": 178,
-        "watchers_count": 178,
+        "stargazers_count": 179,
+        "watchers_count": 179,
         "forks_count": 69,
         "forks": 69,
-        "watchers": 178,
+        "watchers": 179,
         "score": 0
     },
     {
diff --git a/2019/CVE-2019-15846.json b/2019/CVE-2019-15846.json
index a518a8407b..ad17e55c0b 100644
--- a/2019/CVE-2019-15846.json
+++ b/2019/CVE-2019-15846.json
@@ -13,13 +13,13 @@
         "description": "PoC materials to exploit CVE-2019-15846",
         "fork": false,
         "created_at": "2019-10-09T15:19:58Z",
-        "updated_at": "2021-02-17T01:29:27Z",
+        "updated_at": "2021-02-25T12:07:17Z",
         "pushed_at": "2019-10-10T09:55:59Z",
-        "stargazers_count": 26,
-        "watchers_count": 26,
+        "stargazers_count": 27,
+        "watchers_count": 27,
         "forks_count": 9,
         "forks": 9,
-        "watchers": 26,
+        "watchers": 27,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json
index e3d7409f53..57e43140aa 100644
--- a/2019/CVE-2019-17558.json
+++ b/2019/CVE-2019-17558.json
@@ -36,13 +36,13 @@
         "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
         "fork": false,
         "created_at": "2020-04-01T09:33:35Z",
-        "updated_at": "2021-02-24T08:30:09Z",
+        "updated_at": "2021-02-25T11:33:30Z",
         "pushed_at": "2020-11-07T05:55:00Z",
-        "stargazers_count": 2352,
-        "watchers_count": 2352,
-        "forks_count": 665,
-        "forks": 665,
-        "watchers": 2352,
+        "stargazers_count": 2353,
+        "watchers_count": 2353,
+        "forks_count": 666,
+        "forks": 666,
+        "watchers": 2353,
         "score": 0
     },
     {
diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json
index 77bfe45356..bdc861c16a 100644
--- a/2019/CVE-2019-2618.json
+++ b/2019/CVE-2019-2618.json
@@ -151,13 +151,13 @@
         "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2021-02-24T09:09:53Z",
+        "updated_at": "2021-02-25T12:50:34Z",
         "pushed_at": "2020-11-27T15:10:58Z",
-        "stargazers_count": 924,
-        "watchers_count": 924,
-        "forks_count": 217,
-        "forks": 217,
-        "watchers": 924,
+        "stargazers_count": 926,
+        "watchers_count": 926,
+        "forks_count": 218,
+        "forks": 218,
+        "watchers": 926,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-0753.json b/2020/CVE-2020-0753.json
index f5f570c68f..047370189b 100644
--- a/2020/CVE-2020-0753.json
+++ b/2020/CVE-2020-0753.json
@@ -21,28 +21,5 @@
         "forks": 11,
         "watchers": 14,
         "score": 0
-    },
-    {
-        "id": 242502226,
-        "name": "CVE-2020-0753-and-CVE-2020-0754",
-        "full_name": "VikasVarshney\/CVE-2020-0753-and-CVE-2020-0754",
-        "owner": {
-            "login": "VikasVarshney",
-            "id": 3353731,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3353731?v=4",
-            "html_url": "https:\/\/github.com\/VikasVarshney"
-        },
-        "html_url": "https:\/\/github.com\/VikasVarshney\/CVE-2020-0753-and-CVE-2020-0754",
-        "description": "Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six unfixed Window DOS Vulnerabilities.",
-        "fork": false,
-        "created_at": "2020-02-23T11:10:49Z",
-        "updated_at": "2020-03-11T13:36:15Z",
-        "pushed_at": "2020-02-22T13:57:48Z",
-        "stargazers_count": 3,
-        "watchers_count": 3,
-        "forks_count": 13,
-        "forks": 13,
-        "watchers": 3,
-        "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-0787.json b/2020/CVE-2020-0787.json
index 034a0f9d60..70447f0704 100644
--- a/2020/CVE-2020-0787.json
+++ b/2020/CVE-2020-0787.json
@@ -17,8 +17,8 @@
         "pushed_at": "2020-09-11T07:38:22Z",
         "stargazers_count": 503,
         "watchers_count": 503,
-        "forks_count": 124,
-        "forks": 124,
+        "forks_count": 125,
+        "forks": 125,
         "watchers": 503,
         "score": 0
     },
diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json
index 135b696516..ccf663cc0a 100644
--- a/2020/CVE-2020-1472.json
+++ b/2020/CVE-2020-1472.json
@@ -36,13 +36,13 @@
         "description": "Test tool for CVE-2020-1472",
         "fork": false,
         "created_at": "2020-09-08T08:58:37Z",
-        "updated_at": "2021-02-23T18:28:09Z",
+        "updated_at": "2021-02-25T11:07:20Z",
         "pushed_at": "2020-10-21T12:10:28Z",
-        "stargazers_count": 1245,
-        "watchers_count": 1245,
+        "stargazers_count": 1246,
+        "watchers_count": 1246,
         "forks_count": 289,
         "forks": 289,
-        "watchers": 1245,
+        "watchers": 1246,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json
index f9d41a0dd4..705842757a 100644
--- a/2020/CVE-2020-14882.json
+++ b/2020/CVE-2020-14882.json
@@ -13,13 +13,13 @@
         "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
         "fork": false,
         "created_at": "2020-04-01T09:33:35Z",
-        "updated_at": "2021-02-24T08:30:09Z",
+        "updated_at": "2021-02-25T11:33:30Z",
         "pushed_at": "2020-11-07T05:55:00Z",
-        "stargazers_count": 2352,
-        "watchers_count": 2352,
-        "forks_count": 665,
-        "forks": 665,
-        "watchers": 2352,
+        "stargazers_count": 2353,
+        "watchers_count": 2353,
+        "forks_count": 666,
+        "forks": 666,
+        "watchers": 2353,
         "score": 0
     },
     {
@@ -573,5 +573,28 @@
         "forks": 0,
         "watchers": 0,
         "score": 0
+    },
+    {
+        "id": 342244938,
+        "name": "CVE-2020-14882",
+        "full_name": "milo2012\/CVE-2020-14882",
+        "owner": {
+            "login": "milo2012",
+            "id": 905335,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/905335?v=4",
+            "html_url": "https:\/\/github.com\/milo2012"
+        },
+        "html_url": "https:\/\/github.com\/milo2012\/CVE-2020-14882",
+        "description": "CVE-2020-14882",
+        "fork": false,
+        "created_at": "2021-02-25T12:57:08Z",
+        "updated_at": "2021-02-25T12:58:49Z",
+        "pushed_at": "2021-02-25T12:58:47Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "forks_count": 0,
+        "forks": 0,
+        "watchers": 0,
+        "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json
index 0b665e44a7..e5386c59c1 100644
--- a/2020/CVE-2020-14883.json
+++ b/2020/CVE-2020-14883.json
@@ -67,5 +67,28 @@
         "forks": 0,
         "watchers": 3,
         "score": 0
+    },
+    {
+        "id": 342220518,
+        "name": "westone-CVE-2020-14883-scanner",
+        "full_name": "Osyanina\/westone-CVE-2020-14883-scanner",
+        "owner": {
+            "login": "Osyanina",
+            "id": 78467376,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78467376?v=4",
+            "html_url": "https:\/\/github.com\/Osyanina"
+        },
+        "html_url": "https:\/\/github.com\/Osyanina\/westone-CVE-2020-14883-scanner",
+        "description": "A vulnerability scanner that detects CVE-2020-14883 vulnerabilities.",
+        "fork": false,
+        "created_at": "2021-02-25T11:21:56Z",
+        "updated_at": "2021-02-25T11:28:40Z",
+        "pushed_at": "2021-02-25T11:28:38Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "forks_count": 0,
+        "forks": 0,
+        "watchers": 0,
+        "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-17519.json b/2020/CVE-2020-17519.json
index ef736e40e0..8425668b9a 100644
--- a/2020/CVE-2020-17519.json
+++ b/2020/CVE-2020-17519.json
@@ -159,5 +159,28 @@
         "forks": 0,
         "watchers": 1,
         "score": 0
+    },
+    {
+        "id": 342216598,
+        "name": "westone-CVE-2020-17519-scanner",
+        "full_name": "Osyanina\/westone-CVE-2020-17519-scanner",
+        "owner": {
+            "login": "Osyanina",
+            "id": 78467376,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78467376?v=4",
+            "html_url": "https:\/\/github.com\/Osyanina"
+        },
+        "html_url": "https:\/\/github.com\/Osyanina\/westone-CVE-2020-17519-scanner",
+        "description": "A vulnerability scanner that detects CVE-2020-17519 vulnerabilities.",
+        "fork": false,
+        "created_at": "2021-02-25T11:06:05Z",
+        "updated_at": "2021-02-25T11:27:31Z",
+        "pushed_at": "2021-02-25T11:27:29Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "forks_count": 0,
+        "forks": 0,
+        "watchers": 0,
+        "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json
index 2ed31ba4b9..6f66729750 100644
--- a/2020/CVE-2020-1938.json
+++ b/2020/CVE-2020-1938.json
@@ -114,29 +114,6 @@
         "watchers": 3,
         "score": 0
     },
-    {
-        "id": 242163769,
-        "name": "CVE-2020-1938TomcatAjpScanner",
-        "full_name": "woaiqiukui\/CVE-2020-1938TomcatAjpScanner",
-        "owner": {
-            "login": "woaiqiukui",
-            "id": 49117752,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49117752?v=4",
-            "html_url": "https:\/\/github.com\/woaiqiukui"
-        },
-        "html_url": "https:\/\/github.com\/woaiqiukui\/CVE-2020-1938TomcatAjpScanner",
-        "description": "批量扫描TomcatAJP漏洞",
-        "fork": false,
-        "created_at": "2020-02-21T14:55:40Z",
-        "updated_at": "2021-01-26T08:06:51Z",
-        "pushed_at": "2020-02-22T01:58:22Z",
-        "stargazers_count": 10,
-        "watchers_count": 10,
-        "forks_count": 2,
-        "forks": 2,
-        "watchers": 10,
-        "score": 0
-    },
     {
         "id": 242193832,
         "name": "tomcat-cve-2020-1938-check",
@@ -160,29 +137,6 @@
         "watchers": 3,
         "score": 0
     },
-    {
-        "id": 242284250,
-        "name": "GhostCat-LFI-exp",
-        "full_name": "ze0r\/GhostCat-LFI-exp",
-        "owner": {
-            "login": "ze0r",
-            "id": 43227253,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43227253?v=4",
-            "html_url": "https:\/\/github.com\/ze0r"
-        },
-        "html_url": "https:\/\/github.com\/ze0r\/GhostCat-LFI-exp",
-        "description": "CVE-2020-1938",
-        "fork": false,
-        "created_at": "2020-02-22T05:17:09Z",
-        "updated_at": "2020-12-23T12:17:04Z",
-        "pushed_at": "2020-02-22T05:23:53Z",
-        "stargazers_count": 10,
-        "watchers_count": 10,
-        "forks_count": 7,
-        "forks": 7,
-        "watchers": 10,
-        "score": 0
-    },
     {
         "id": 242345920,
         "name": "CNVD-2020-10487-Bulk-verification",
diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json
index ffb0309f80..9cc3f345fe 100644
--- a/2020/CVE-2020-2551.json
+++ b/2020/CVE-2020-2551.json
@@ -13,13 +13,13 @@
         "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2021-02-24T09:09:53Z",
+        "updated_at": "2021-02-25T12:50:34Z",
         "pushed_at": "2020-11-27T15:10:58Z",
-        "stargazers_count": 924,
-        "watchers_count": 924,
-        "forks_count": 217,
-        "forks": 217,
-        "watchers": 924,
+        "stargazers_count": 926,
+        "watchers_count": 926,
+        "forks_count": 218,
+        "forks": 218,
+        "watchers": 926,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-8597.json b/2020/CVE-2020-8597.json
index 11198953a1..d89d64a227 100644
--- a/2020/CVE-2020-8597.json
+++ b/2020/CVE-2020-8597.json
@@ -17,8 +17,8 @@
         "pushed_at": "2020-03-10T19:01:21Z",
         "stargazers_count": 63,
         "watchers_count": 63,
-        "forks_count": 24,
-        "forks": 24,
+        "forks_count": 25,
+        "forks": 25,
         "watchers": 63,
         "score": 0
     },
diff --git a/2020/CVE-2020-9992.json b/2020/CVE-2020-9992.json
index d5e1d067ef..1d9feac44b 100644
--- a/2020/CVE-2020-9992.json
+++ b/2020/CVE-2020-9992.json
@@ -13,13 +13,13 @@
         "description": "CVE-2020-9992 - A design flaw in MobileDevice.framework\/Xcode and iOS\/iPadOS\/tvOS Development Tools allows an attacker in the same network to gain remote code execution on a target device",
         "fork": false,
         "created_at": "2020-09-16T23:35:22Z",
-        "updated_at": "2021-02-21T15:40:41Z",
+        "updated_at": "2021-02-25T12:43:06Z",
         "pushed_at": "2020-09-23T14:52:06Z",
-        "stargazers_count": 48,
-        "watchers_count": 48,
+        "stargazers_count": 49,
+        "watchers_count": 49,
         "forks_count": 9,
         "forks": 9,
-        "watchers": 48,
+        "watchers": 49,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2021/CVE-2021-1782.json b/2021/CVE-2021-1782.json
index 980b1d3624..6e95ad5092 100644
--- a/2021/CVE-2021-1782.json
+++ b/2021/CVE-2021-1782.json
@@ -13,13 +13,13 @@
         "description": null,
         "fork": false,
         "created_at": "2021-02-10T14:38:05Z",
-        "updated_at": "2021-02-24T08:36:35Z",
+        "updated_at": "2021-02-25T12:54:58Z",
         "pushed_at": "2021-02-10T14:39:04Z",
-        "stargazers_count": 13,
-        "watchers_count": 13,
-        "forks_count": 1,
-        "forks": 1,
-        "watchers": 13,
+        "stargazers_count": 14,
+        "watchers_count": 14,
+        "forks_count": 2,
+        "forks": 2,
+        "watchers": 14,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json
index 20e2b6aba5..b7c615564d 100644
--- a/2021/CVE-2021-21972.json
+++ b/2021/CVE-2021-21972.json
@@ -13,13 +13,13 @@
         "description": null,
         "fork": false,
         "created_at": "2021-02-24T09:56:21Z",
-        "updated_at": "2021-02-25T08:29:59Z",
+        "updated_at": "2021-02-25T11:05:47Z",
         "pushed_at": "2021-02-25T01:19:09Z",
-        "stargazers_count": 50,
-        "watchers_count": 50,
-        "forks_count": 35,
-        "forks": 35,
-        "watchers": 50,
+        "stargazers_count": 53,
+        "watchers_count": 53,
+        "forks_count": 36,
+        "forks": 36,
+        "watchers": 53,
         "score": 0
     },
     {
@@ -36,13 +36,13 @@
         "description": "CVE-2021-21972 Exploit",
         "fork": false,
         "created_at": "2021-02-24T11:14:58Z",
-        "updated_at": "2021-02-25T09:03:30Z",
+        "updated_at": "2021-02-25T14:19:05Z",
         "pushed_at": "2021-02-25T05:45:59Z",
-        "stargazers_count": 104,
-        "watchers_count": 104,
-        "forks_count": 47,
-        "forks": 47,
-        "watchers": 104,
+        "stargazers_count": 126,
+        "watchers_count": 126,
+        "forks_count": 54,
+        "forks": 54,
+        "watchers": 126,
         "score": 0
     },
     {
@@ -82,13 +82,13 @@
         "description": "Proof of Concept Exploit for vCenter CVE-2021-21972",
         "fork": false,
         "created_at": "2021-02-24T16:31:34Z",
-        "updated_at": "2021-02-25T09:04:53Z",
+        "updated_at": "2021-02-25T14:36:33Z",
         "pushed_at": "2021-02-24T18:51:10Z",
-        "stargazers_count": 36,
-        "watchers_count": 36,
-        "forks_count": 12,
-        "forks": 12,
-        "watchers": 36,
+        "stargazers_count": 45,
+        "watchers_count": 45,
+        "forks_count": 16,
+        "forks": 16,
+        "watchers": 45,
         "score": 0
     },
     {
@@ -105,8 +105,8 @@
         "description": "A vulnerability scanner that detects CVE-2021-21972 vulnerabilities.",
         "fork": false,
         "created_at": "2021-02-25T03:19:25Z",
-        "updated_at": "2021-02-25T05:38:43Z",
-        "pushed_at": "2021-02-25T05:36:57Z",
+        "updated_at": "2021-02-25T11:27:10Z",
+        "pushed_at": "2021-02-25T11:27:08Z",
         "stargazers_count": 0,
         "watchers_count": 0,
         "forks_count": 0,
@@ -128,13 +128,13 @@
         "description": null,
         "fork": false,
         "created_at": "2021-02-25T05:10:06Z",
-        "updated_at": "2021-02-25T06:40:55Z",
+        "updated_at": "2021-02-25T14:09:45Z",
         "pushed_at": "2021-02-25T05:49:19Z",
-        "stargazers_count": 1,
-        "watchers_count": 1,
-        "forks_count": 0,
-        "forks": 0,
-        "watchers": 1,
+        "stargazers_count": 9,
+        "watchers_count": 9,
+        "forks_count": 1,
+        "forks": 1,
+        "watchers": 9,
         "score": 0
     },
     {
@@ -151,13 +151,13 @@
         "description": "CVE-2021-21972",
         "fork": false,
         "created_at": "2021-02-25T05:16:38Z",
-        "updated_at": "2021-02-25T06:35:11Z",
+        "updated_at": "2021-02-25T15:03:09Z",
         "pushed_at": "2021-02-25T05:21:50Z",
-        "stargazers_count": 1,
-        "watchers_count": 1,
-        "forks_count": 1,
-        "forks": 1,
-        "watchers": 1,
+        "stargazers_count": 8,
+        "watchers_count": 8,
+        "forks_count": 2,
+        "forks": 2,
+        "watchers": 8,
         "score": 0
     },
     {
@@ -197,13 +197,82 @@
         "description": "VMware vCenter 未授权RCE(CVE-2021-21972)",
         "fork": false,
         "created_at": "2021-02-25T07:17:21Z",
-        "updated_at": "2021-02-25T08:31:54Z",
-        "pushed_at": "2021-02-25T07:32:59Z",
-        "stargazers_count": 2,
-        "watchers_count": 2,
+        "updated_at": "2021-02-25T13:38:18Z",
+        "pushed_at": "2021-02-25T09:54:53Z",
+        "stargazers_count": 7,
+        "watchers_count": 7,
         "forks_count": 0,
         "forks": 0,
-        "watchers": 2,
+        "watchers": 7,
+        "score": 0
+    },
+    {
+        "id": 342190619,
+        "name": "CVE-2021-21972",
+        "full_name": "L-pin\/CVE-2021-21972",
+        "owner": {
+            "login": "L-pin",
+            "id": 23657203,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23657203?v=4",
+            "html_url": "https:\/\/github.com\/L-pin"
+        },
+        "html_url": "https:\/\/github.com\/L-pin\/CVE-2021-21972",
+        "description": null,
+        "fork": false,
+        "created_at": "2021-02-25T09:28:17Z",
+        "updated_at": "2021-02-25T09:54:49Z",
+        "pushed_at": "2021-02-25T09:54:48Z",
+        "stargazers_count": 1,
+        "watchers_count": 1,
+        "forks_count": 0,
+        "forks": 0,
+        "watchers": 1,
+        "score": 0
+    },
+    {
+        "id": 342203695,
+        "name": "CVE-2021-21972",
+        "full_name": "B1anda0\/CVE-2021-21972",
+        "owner": {
+            "login": "B1anda0",
+            "id": 74232513,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74232513?v=4",
+            "html_url": "https:\/\/github.com\/B1anda0"
+        },
+        "html_url": "https:\/\/github.com\/B1anda0\/CVE-2021-21972",
+        "description": "VMware vCenter Server远程代码执行漏洞 (CVE-2021-21972)批量检测脚本",
+        "fork": false,
+        "created_at": "2021-02-25T10:16:20Z",
+        "updated_at": "2021-02-25T11:35:04Z",
+        "pushed_at": "2021-02-25T10:26:53Z",
+        "stargazers_count": 1,
+        "watchers_count": 1,
+        "forks_count": 0,
+        "forks": 0,
+        "watchers": 1,
+        "score": 0
+    },
+    {
+        "id": 342246923,
+        "name": "CVE-2021-21972",
+        "full_name": "renini\/CVE-2021-21972",
+        "owner": {
+            "login": "renini",
+            "id": 1587083,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1587083?v=4",
+            "html_url": "https:\/\/github.com\/renini"
+        },
+        "html_url": "https:\/\/github.com\/renini\/CVE-2021-21972",
+        "description": "CVE-2021-21972",
+        "fork": false,
+        "created_at": "2021-02-25T13:04:37Z",
+        "updated_at": "2021-02-25T13:15:22Z",
+        "pushed_at": "2021-02-25T13:11:43Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "forks_count": 0,
+        "forks": 0,
+        "watchers": 0,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2021/CVE-2021-24085.json b/2021/CVE-2021-24085.json
index 50b8ffe47b..d3c789bb12 100644
--- a/2021/CVE-2021-24085.json
+++ b/2021/CVE-2021-24085.json
@@ -13,13 +13,13 @@
         "description": null,
         "fork": false,
         "created_at": "2021-02-15T14:41:25Z",
-        "updated_at": "2021-02-24T22:20:06Z",
+        "updated_at": "2021-02-25T10:16:36Z",
         "pushed_at": "2021-02-15T15:11:00Z",
-        "stargazers_count": 14,
-        "watchers_count": 14,
+        "stargazers_count": 15,
+        "watchers_count": 15,
         "forks_count": 4,
         "forks": 4,
-        "watchers": 14,
+        "watchers": 15,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json
index d409ca82e0..fbe8db3c38 100644
--- a/2021/CVE-2021-3156.json
+++ b/2021/CVE-2021-3156.json
@@ -381,13 +381,13 @@
         "description": null,
         "fork": false,
         "created_at": "2021-01-30T20:39:58Z",
-        "updated_at": "2021-02-24T19:41:25Z",
+        "updated_at": "2021-02-25T11:35:49Z",
         "pushed_at": "2021-02-02T17:07:09Z",
-        "stargazers_count": 612,
-        "watchers_count": 612,
+        "stargazers_count": 613,
+        "watchers_count": 613,
         "forks_count": 173,
         "forks": 173,
-        "watchers": 612,
+        "watchers": 613,
         "score": 0
     },
     {
@@ -726,13 +726,13 @@
         "description": "CVE-2021-3156漏洞复现",
         "fork": false,
         "created_at": "2021-02-07T11:09:51Z",
-        "updated_at": "2021-02-24T04:59:21Z",
+        "updated_at": "2021-02-25T11:05:51Z",
         "pushed_at": "2021-02-07T11:10:01Z",
-        "stargazers_count": 2,
-        "watchers_count": 2,
+        "stargazers_count": 3,
+        "watchers_count": 3,
         "forks_count": 0,
         "forks": 0,
-        "watchers": 2,
+        "watchers": 3,
         "score": 0
     },
     {
diff --git a/README.md b/README.md
index f0d051a3bd..a60743cca8 100644
--- a/README.md
+++ b/README.md
@@ -211,6 +211,9 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability in a v
 - [milo2012/CVE-2021-21972](https://github.com/milo2012/CVE-2021-21972)
 - [Udyz/CVE-2021-21972](https://github.com/Udyz/CVE-2021-21972)
 - [conjojo/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972](https://github.com/conjojo/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972)
+- [L-pin/CVE-2021-21972](https://github.com/L-pin/CVE-2021-21972)
+- [B1anda0/CVE-2021-21972](https://github.com/B1anda0/CVE-2021-21972)
+- [renini/CVE-2021-21972](https://github.com/renini/CVE-2021-21972)
 
 ### CVE-2021-24085
 - [sourceincite/CVE-2021-24085](https://github.com/sourceincite/CVE-2021-24085)
@@ -527,7 +530,6 @@ An elevation of privilege vulnerability exists in Windows Error Reporting (WER)
 </code>
 
 - [afang5472/CVE-2020-0753-and-CVE-2020-0754](https://github.com/afang5472/CVE-2020-0753-and-CVE-2020-0754)
-- [VikasVarshney/CVE-2020-0753-and-CVE-2020-0754](https://github.com/VikasVarshney/CVE-2020-0753-and-CVE-2020-0754)
 
 ### CVE-2020-0787 (2020-03-12)
 
@@ -898,9 +900,7 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc
 - [nibiwodong/CNVD-2020-10487-Tomcat-ajp-POC](https://github.com/nibiwodong/CNVD-2020-10487-Tomcat-ajp-POC)
 - [bkfish/CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner](https://github.com/bkfish/CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner)
 - [dacade/CVE-2020-1938](https://github.com/dacade/CVE-2020-1938)
-- [woaiqiukui/CVE-2020-1938TomcatAjpScanner](https://github.com/woaiqiukui/CVE-2020-1938TomcatAjpScanner)
 - [fatal0/tomcat-cve-2020-1938-check](https://github.com/fatal0/tomcat-cve-2020-1938-check)
-- [ze0r/GhostCat-LFI-exp](https://github.com/ze0r/GhostCat-LFI-exp)
 - [delsadan/CNVD-2020-10487-Bulk-verification](https://github.com/delsadan/CNVD-2020-10487-Bulk-verification)
 - [00theway/Ghostcat-CNVD-2020-10487](https://github.com/00theway/Ghostcat-CNVD-2020-10487)
 - [shaunmclernon/ghostcat-verification](https://github.com/shaunmclernon/ghostcat-verification)
@@ -2863,6 +2863,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
 - [securitysqs/poc](https://github.com/securitysqs/poc)
 - [ShmilySec/CVE-2020-14882](https://github.com/ShmilySec/CVE-2020-14882)
 - [pwn3z/CVE-2020-14882-WebLogic](https://github.com/pwn3z/CVE-2020-14882-WebLogic)
+- [milo2012/CVE-2020-14882](https://github.com/milo2012/CVE-2020-14882)
 
 ### CVE-2020-14883 (2020-10-21)
 
@@ -2873,6 +2874,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
 - [murataydemir/CVE-2020-14883](https://github.com/murataydemir/CVE-2020-14883)
 - [B1anda0/CVE-2020-14883](https://github.com/B1anda0/CVE-2020-14883)
 - [fan1029/CVE-2020-14883EXP](https://github.com/fan1029/CVE-2020-14883EXP)
+- [Osyanina/westone-CVE-2020-14883-scanner](https://github.com/Osyanina/westone-CVE-2020-14883-scanner)
 
 ### CVE-2020-14947 (2020-06-30)
 
@@ -3236,6 +3238,7 @@ A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as
 - [murataydemir/CVE-2020-17519](https://github.com/murataydemir/CVE-2020-17519)
 - [radbsie/CVE-2020-17519-Exp](https://github.com/radbsie/CVE-2020-17519-Exp)
 - [yaunsky/CVE-2020-17519-Apache-Flink](https://github.com/yaunsky/CVE-2020-17519-Apache-Flink)
+- [Osyanina/westone-CVE-2020-17519-scanner](https://github.com/Osyanina/westone-CVE-2020-17519-scanner)
 
 ### CVE-2020-17523 (2021-02-03)