From 479cc6fdb64b5421bb554044387a7eaa2c99e79f Mon Sep 17 00:00:00 2001
From: motikan2010-bot <k.agena1993@gmail.com>
Date: Sat, 5 Mar 2022 21:14:08 +0900
Subject: [PATCH] Auto Update 2022/03/05 12:14:08

---
 2014/CVE-2014-4210.json  |  8 ++---
 2016/CVE-2016-0638.json  |  8 ++---
 2017/CVE-2017-0199.json  |  8 ++---
 2017/CVE-2017-17562.json |  2 +-
 2017/CVE-2017-3248.json  |  8 ++---
 2018/CVE-2018-14847.json |  4 +--
 2018/CVE-2018-2628.json  |  8 ++---
 2019/CVE-2019-11043.json |  8 ++---
 2019/CVE-2019-2618.json  |  8 ++---
 2020/CVE-2020-1938.json  |  8 ++---
 2020/CVE-2020-2551.json  |  8 ++---
 2021/CVE-2021-22205.json |  4 +--
 2021/CVE-2021-28476.json |  4 +--
 2021/CVE-2021-30955.json | 12 +++----
 2021/CVE-2021-32099.json | 27 ++++++++++++++++
 2021/CVE-2021-3560.json  |  4 +--
 2021/CVE-2021-36749.json | 27 ----------------
 2021/CVE-2021-4034.json  | 32 +++++++++----------
 2021/CVE-2021-40444.json |  8 ++---
 2021/CVE-2021-40449.json | 12 +++----
 2021/CVE-2021-42013.json | 12 +++----
 2021/CVE-2021-42278.json |  4 +--
 2021/CVE-2021-42287.json |  8 ++---
 2021/CVE-2021-44228.json | 12 +++----
 2022/CVE-2022-0185.json  | 12 +++----
 2022/CVE-2022-0492.json  |  8 ++---
 2022/CVE-2022-21661.json |  8 ++---
 2022/CVE-2022-21907.json | 31 ++++++++++++-------
 2022/CVE-2022-21971.json |  8 ++---
 2022/CVE-2022-21999.json |  8 ++---
 2022/CVE-2022-22947.json | 67 ++++++++++++++++++++++++++++------------
 2022/CVE-2022-23131.json | 12 +++----
 2022/CVE-2022-25064.json |  4 +--
 README.md                |  3 +-
 34 files changed, 220 insertions(+), 185 deletions(-)

diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json
index 1783177f7b..4ab16aeeda 100644
--- a/2014/CVE-2014-4210.json
+++ b/2014/CVE-2014-4210.json
@@ -40,10 +40,10 @@
         "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2022-03-03T12:32:54Z",
+        "updated_at": "2022-03-05T06:24:33Z",
         "pushed_at": "2020-11-27T15:10:58Z",
-        "stargazers_count": 1303,
-        "watchers_count": 1303,
+        "stargazers_count": 1304,
+        "watchers_count": 1304,
         "forks_count": 283,
         "allow_forking": true,
         "is_template": false,
@@ -71,7 +71,7 @@
         ],
         "visibility": "public",
         "forks": 283,
-        "watchers": 1303,
+        "watchers": 1304,
         "score": 0
     },
     {
diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json
index 77c0bd77ad..8155a7b60d 100644
--- a/2016/CVE-2016-0638.json
+++ b/2016/CVE-2016-0638.json
@@ -13,10 +13,10 @@
         "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2022-03-03T12:32:54Z",
+        "updated_at": "2022-03-05T06:24:33Z",
         "pushed_at": "2020-11-27T15:10:58Z",
-        "stargazers_count": 1303,
-        "watchers_count": 1303,
+        "stargazers_count": 1304,
+        "watchers_count": 1304,
         "forks_count": 283,
         "allow_forking": true,
         "is_template": false,
@@ -44,7 +44,7 @@
         ],
         "visibility": "public",
         "forks": 283,
-        "watchers": 1303,
+        "watchers": 1304,
         "score": 0
     },
     {
diff --git a/2017/CVE-2017-0199.json b/2017/CVE-2017-0199.json
index ab26285e32..fcba70193b 100644
--- a/2017/CVE-2017-0199.json
+++ b/2017/CVE-2017-0199.json
@@ -67,17 +67,17 @@
         "description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
         "fork": false,
         "created_at": "2017-04-17T08:10:07Z",
-        "updated_at": "2022-02-23T01:21:12Z",
+        "updated_at": "2022-03-05T06:44:23Z",
         "pushed_at": "2017-11-19T11:01:16Z",
-        "stargazers_count": 672,
-        "watchers_count": 672,
+        "stargazers_count": 671,
+        "watchers_count": 671,
         "forks_count": 294,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 294,
-        "watchers": 672,
+        "watchers": 671,
         "score": 0
     },
     {
diff --git a/2017/CVE-2017-17562.json b/2017/CVE-2017-17562.json
index d5db9a26bc..ee2fac5bf5 100644
--- a/2017/CVE-2017-17562.json
+++ b/2017/CVE-2017-17562.json
@@ -121,7 +121,7 @@
         "description": "PoC for CVE-2017-17562 written in bash",
         "fork": false,
         "created_at": "2021-11-17T18:21:54Z",
-        "updated_at": "2021-11-25T20:56:47Z",
+        "updated_at": "2022-03-05T11:32:08Z",
         "pushed_at": "2021-11-17T22:55:29Z",
         "stargazers_count": 1,
         "watchers_count": 1,
diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json
index 4c6786c911..ac4fec874b 100644
--- a/2017/CVE-2017-3248.json
+++ b/2017/CVE-2017-3248.json
@@ -40,10 +40,10 @@
         "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2022-03-03T12:32:54Z",
+        "updated_at": "2022-03-05T06:24:33Z",
         "pushed_at": "2020-11-27T15:10:58Z",
-        "stargazers_count": 1303,
-        "watchers_count": 1303,
+        "stargazers_count": 1304,
+        "watchers_count": 1304,
         "forks_count": 283,
         "allow_forking": true,
         "is_template": false,
@@ -71,7 +71,7 @@
         ],
         "visibility": "public",
         "forks": 283,
-        "watchers": 1303,
+        "watchers": 1304,
         "score": 0
     },
     {
diff --git a/2018/CVE-2018-14847.json b/2018/CVE-2018-14847.json
index adcd07d6a4..963f927b24 100644
--- a/2018/CVE-2018-14847.json
+++ b/2018/CVE-2018-14847.json
@@ -125,12 +125,12 @@
         "pushed_at": "2019-05-26T13:06:01Z",
         "stargazers_count": 2,
         "watchers_count": 2,
-        "forks_count": 1,
+        "forks_count": 2,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 1,
+        "forks": 2,
         "watchers": 2,
         "score": 0
     },
diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json
index 4aa0af0e3b..3b87eb951a 100644
--- a/2018/CVE-2018-2628.json
+++ b/2018/CVE-2018-2628.json
@@ -530,10 +530,10 @@
         "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2022-03-03T12:32:54Z",
+        "updated_at": "2022-03-05T06:24:33Z",
         "pushed_at": "2020-11-27T15:10:58Z",
-        "stargazers_count": 1303,
-        "watchers_count": 1303,
+        "stargazers_count": 1304,
+        "watchers_count": 1304,
         "forks_count": 283,
         "allow_forking": true,
         "is_template": false,
@@ -561,7 +561,7 @@
         ],
         "visibility": "public",
         "forks": 283,
-        "watchers": 1303,
+        "watchers": 1304,
         "score": 0
     },
     {
diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json
index bc0bf8c1e0..8c6f3d6102 100644
--- a/2019/CVE-2019-11043.json
+++ b/2019/CVE-2019-11043.json
@@ -13,17 +13,17 @@
         "description": "Exploit for CVE-2019-11043",
         "fork": false,
         "created_at": "2019-09-23T21:37:27Z",
-        "updated_at": "2022-02-28T16:24:37Z",
+        "updated_at": "2022-03-05T06:44:59Z",
         "pushed_at": "2019-11-12T18:53:14Z",
-        "stargazers_count": 1701,
-        "watchers_count": 1701,
+        "stargazers_count": 1700,
+        "watchers_count": 1700,
         "forks_count": 254,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 254,
-        "watchers": 1701,
+        "watchers": 1700,
         "score": 0
     },
     {
diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json
index b818488265..ba4eb63584 100644
--- a/2019/CVE-2019-2618.json
+++ b/2019/CVE-2019-2618.json
@@ -175,10 +175,10 @@
         "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2022-03-03T12:32:54Z",
+        "updated_at": "2022-03-05T06:24:33Z",
         "pushed_at": "2020-11-27T15:10:58Z",
-        "stargazers_count": 1303,
-        "watchers_count": 1303,
+        "stargazers_count": 1304,
+        "watchers_count": 1304,
         "forks_count": 283,
         "allow_forking": true,
         "is_template": false,
@@ -206,7 +206,7 @@
         ],
         "visibility": "public",
         "forks": 283,
-        "watchers": 1303,
+        "watchers": 1304,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json
index c72a20d5bf..38c0c74940 100644
--- a/2020/CVE-2020-1938.json
+++ b/2020/CVE-2020-1938.json
@@ -364,10 +364,10 @@
         "description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
         "fork": false,
         "created_at": "2020-02-22T16:16:20Z",
-        "updated_at": "2022-03-04T00:07:58Z",
+        "updated_at": "2022-03-05T06:30:38Z",
         "pushed_at": "2020-03-09T14:51:43Z",
-        "stargazers_count": 238,
-        "watchers_count": 238,
+        "stargazers_count": 239,
+        "watchers_count": 239,
         "forks_count": 93,
         "allow_forking": true,
         "is_template": false,
@@ -380,7 +380,7 @@
         ],
         "visibility": "public",
         "forks": 93,
-        "watchers": 238,
+        "watchers": 239,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json
index 88fa2cb7cf..9ee3cd7e09 100644
--- a/2020/CVE-2020-2551.json
+++ b/2020/CVE-2020-2551.json
@@ -13,10 +13,10 @@
         "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2022-03-03T12:32:54Z",
+        "updated_at": "2022-03-05T06:24:33Z",
         "pushed_at": "2020-11-27T15:10:58Z",
-        "stargazers_count": 1303,
-        "watchers_count": 1303,
+        "stargazers_count": 1304,
+        "watchers_count": 1304,
         "forks_count": 283,
         "allow_forking": true,
         "is_template": false,
@@ -44,7 +44,7 @@
         ],
         "visibility": "public",
         "forks": 283,
-        "watchers": 1303,
+        "watchers": 1304,
         "score": 0
     },
     {
diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json
index 4f070d40cb..55bc639f22 100644
--- a/2021/CVE-2021-22205.json
+++ b/2021/CVE-2021-22205.json
@@ -125,14 +125,14 @@
         "pushed_at": "2021-11-06T05:20:30Z",
         "stargazers_count": 147,
         "watchers_count": 147,
-        "forks_count": 64,
+        "forks_count": 65,
         "allow_forking": true,
         "is_template": false,
         "topics": [
             "cve-2021-22205"
         ],
         "visibility": "public",
-        "forks": 64,
+        "forks": 65,
         "watchers": 147,
         "score": 0
     },
diff --git a/2021/CVE-2021-28476.json b/2021/CVE-2021-28476.json
index 12e0813027..86f78faf46 100644
--- a/2021/CVE-2021-28476.json
+++ b/2021/CVE-2021-28476.json
@@ -17,7 +17,7 @@
         "pushed_at": "2021-06-01T15:08:23Z",
         "stargazers_count": 204,
         "watchers_count": 204,
-        "forks_count": 34,
+        "forks_count": 35,
         "allow_forking": true,
         "is_template": false,
         "topics": [
@@ -30,7 +30,7 @@
             "vmswitch"
         ],
         "visibility": "public",
-        "forks": 34,
+        "forks": 35,
         "watchers": 204,
         "score": 0
     },
diff --git a/2021/CVE-2021-30955.json b/2021/CVE-2021-30955.json
index 17c5a1fe05..694ca66898 100644
--- a/2021/CVE-2021-30955.json
+++ b/2021/CVE-2021-30955.json
@@ -94,17 +94,17 @@
         "description": "iOS 15.1 kernel exploit POC for CVE-2021-30955",
         "fork": false,
         "created_at": "2022-03-01T12:41:03Z",
-        "updated_at": "2022-03-05T06:07:31Z",
+        "updated_at": "2022-03-05T11:53:06Z",
         "pushed_at": "2022-03-01T16:11:31Z",
-        "stargazers_count": 179,
-        "watchers_count": 179,
-        "forks_count": 28,
+        "stargazers_count": 183,
+        "watchers_count": 183,
+        "forks_count": 29,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 28,
-        "watchers": 179,
+        "forks": 29,
+        "watchers": 183,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2021/CVE-2021-32099.json b/2021/CVE-2021-32099.json
index d994b9b7c8..82bff110f1 100644
--- a/2021/CVE-2021-32099.json
+++ b/2021/CVE-2021-32099.json
@@ -79,5 +79,32 @@
         "forks": 1,
         "watchers": 6,
         "score": 0
+    },
+    {
+        "id": 466400226,
+        "name": "CVE-2021-32099",
+        "full_name": "akr3ch\/CVE-2021-32099",
+        "owner": {
+            "login": "akr3ch",
+            "id": 97300177,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97300177?v=4",
+            "html_url": "https:\/\/github.com\/akr3ch"
+        },
+        "html_url": "https:\/\/github.com\/akr3ch\/CVE-2021-32099",
+        "description": "CVE-2021-32099",
+        "fork": false,
+        "created_at": "2022-03-05T08:53:45Z",
+        "updated_at": "2022-03-05T08:53:45Z",
+        "pushed_at": "2022-03-05T09:01:55Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "forks_count": 0,
+        "allow_forking": true,
+        "is_template": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 0,
+        "watchers": 0,
+        "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2021/CVE-2021-3560.json b/2021/CVE-2021-3560.json
index 0601269930..bed4befbf4 100644
--- a/2021/CVE-2021-3560.json
+++ b/2021/CVE-2021-3560.json
@@ -77,7 +77,7 @@
         "pushed_at": "2021-06-23T11:07:32Z",
         "stargazers_count": 29,
         "watchers_count": 29,
-        "forks_count": 12,
+        "forks_count": 11,
         "allow_forking": true,
         "is_template": false,
         "topics": [
@@ -85,7 +85,7 @@
             "cve-2021-3560"
         ],
         "visibility": "public",
-        "forks": 12,
+        "forks": 11,
         "watchers": 29,
         "score": 0
     },
diff --git a/2021/CVE-2021-36749.json b/2021/CVE-2021-36749.json
index 56b05de75e..65ed28900c 100644
--- a/2021/CVE-2021-36749.json
+++ b/2021/CVE-2021-36749.json
@@ -30,33 +30,6 @@
         "watchers": 52,
         "score": 0
     },
-    {
-        "id": 416979824,
-        "name": "CVE-2021-36749",
-        "full_name": "BrucessKING\/CVE-2021-36749",
-        "owner": {
-            "login": "BrucessKING",
-            "id": 39517489,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39517489?v=4",
-            "html_url": "https:\/\/github.com\/BrucessKING"
-        },
-        "html_url": "https:\/\/github.com\/BrucessKING\/CVE-2021-36749",
-        "description": "Apache Druid 任意文件读取",
-        "fork": false,
-        "created_at": "2021-10-14T03:47:02Z",
-        "updated_at": "2021-12-02T09:50:15Z",
-        "pushed_at": "2021-10-15T02:31:03Z",
-        "stargazers_count": 29,
-        "watchers_count": 29,
-        "forks_count": 8,
-        "allow_forking": true,
-        "is_template": false,
-        "topics": [],
-        "visibility": "public",
-        "forks": 8,
-        "watchers": 29,
-        "score": 0
-    },
     {
         "id": 417224229,
         "name": "CVE-2021-36749",
diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json
index 8083870f15..58579f0b37 100644
--- a/2021/CVE-2021-4034.json
+++ b/2021/CVE-2021-4034.json
@@ -46,10 +46,10 @@
         "description": "Local Privilege Escalation in polkit's pkexec",
         "fork": false,
         "created_at": "2022-01-25T23:11:30Z",
-        "updated_at": "2022-03-01T01:45:58Z",
+        "updated_at": "2022-03-05T10:47:22Z",
         "pushed_at": "2022-01-26T01:01:15Z",
-        "stargazers_count": 56,
-        "watchers_count": 56,
+        "stargazers_count": 57,
+        "watchers_count": 57,
         "forks_count": 29,
         "allow_forking": true,
         "is_template": false,
@@ -60,7 +60,7 @@
         ],
         "visibility": "public",
         "forks": 29,
-        "watchers": 56,
+        "watchers": 57,
         "score": 0
     },
     {
@@ -106,17 +106,17 @@
         "description": "CVE-2021-4034 1day",
         "fork": false,
         "created_at": "2022-01-25T23:51:37Z",
-        "updated_at": "2022-03-04T10:33:15Z",
+        "updated_at": "2022-03-05T11:59:55Z",
         "pushed_at": "2022-01-30T14:22:23Z",
-        "stargazers_count": 1376,
-        "watchers_count": 1376,
+        "stargazers_count": 1378,
+        "watchers_count": 1378,
         "forks_count": 394,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 394,
-        "watchers": 1376,
+        "watchers": 1378,
         "score": 0
     },
     {
@@ -187,10 +187,10 @@
         "description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)",
         "fork": false,
         "created_at": "2022-01-26T00:56:36Z",
-        "updated_at": "2022-03-05T03:10:30Z",
+        "updated_at": "2022-03-05T10:37:38Z",
         "pushed_at": "2022-02-12T05:22:58Z",
-        "stargazers_count": 799,
-        "watchers_count": 799,
+        "stargazers_count": 800,
+        "watchers_count": 800,
         "forks_count": 258,
         "allow_forking": true,
         "is_template": false,
@@ -201,7 +201,7 @@
         ],
         "visibility": "public",
         "forks": 258,
-        "watchers": 799,
+        "watchers": 800,
         "score": 0
     },
     {
@@ -299,17 +299,17 @@
         "description": "PoC for CVE-2021-4034",
         "fork": false,
         "created_at": "2022-01-26T02:02:25Z",
-        "updated_at": "2022-02-19T20:03:21Z",
+        "updated_at": "2022-03-05T10:24:49Z",
         "pushed_at": "2022-01-26T02:27:53Z",
-        "stargazers_count": 42,
-        "watchers_count": 42,
+        "stargazers_count": 43,
+        "watchers_count": 43,
         "forks_count": 37,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 37,
-        "watchers": 42,
+        "watchers": 43,
         "score": 0
     },
     {
diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json
index 0c3b48b754..9091d0a4d3 100644
--- a/2021/CVE-2021-40444.json
+++ b/2021/CVE-2021-40444.json
@@ -229,17 +229,17 @@
         "description": "CVE-2021-40444",
         "fork": false,
         "created_at": "2021-12-19T08:16:07Z",
-        "updated_at": "2022-02-27T22:40:48Z",
+        "updated_at": "2022-03-05T06:35:54Z",
         "pushed_at": "2021-12-19T08:27:33Z",
-        "stargazers_count": 55,
-        "watchers_count": 55,
+        "stargazers_count": 56,
+        "watchers_count": 56,
         "forks_count": 21,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 21,
-        "watchers": 55,
+        "watchers": 56,
         "score": 0
     },
     {
diff --git a/2021/CVE-2021-40449.json b/2021/CVE-2021-40449.json
index 739ca6d7ad..63c82f1da3 100644
--- a/2021/CVE-2021-40449.json
+++ b/2021/CVE-2021-40449.json
@@ -152,17 +152,17 @@
         "description": null,
         "fork": false,
         "created_at": "2022-02-20T16:23:26Z",
-        "updated_at": "2022-02-26T16:46:28Z",
+        "updated_at": "2022-03-05T12:07:34Z",
         "pushed_at": "2022-02-20T16:34:32Z",
-        "stargazers_count": 9,
-        "watchers_count": 9,
-        "forks_count": 5,
+        "stargazers_count": 10,
+        "watchers_count": 10,
+        "forks_count": 6,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 5,
-        "watchers": 9,
+        "forks": 6,
+        "watchers": 10,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2021/CVE-2021-42013.json b/2021/CVE-2021-42013.json
index e33d6e1ff7..99e403ae6e 100644
--- a/2021/CVE-2021-42013.json
+++ b/2021/CVE-2021-42013.json
@@ -354,17 +354,17 @@
         "description": "CVE-2021-42013批量",
         "fork": false,
         "created_at": "2022-03-04T06:38:26Z",
-        "updated_at": "2022-03-05T01:16:12Z",
+        "updated_at": "2022-03-05T10:48:51Z",
         "pushed_at": "2022-03-04T10:49:00Z",
-        "stargazers_count": 19,
-        "watchers_count": 19,
-        "forks_count": 4,
+        "stargazers_count": 21,
+        "watchers_count": 21,
+        "forks_count": 5,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 4,
-        "watchers": 19,
+        "forks": 5,
+        "watchers": 21,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json
index 150049907e..ca8e50f4d1 100644
--- a/2021/CVE-2021-42278.json
+++ b/2021/CVE-2021-42278.json
@@ -17,7 +17,7 @@
         "pushed_at": "2021-12-21T10:11:05Z",
         "stargazers_count": 746,
         "watchers_count": 746,
-        "forks_count": 163,
+        "forks_count": 164,
         "allow_forking": true,
         "is_template": false,
         "topics": [
@@ -27,7 +27,7 @@
             "s4u2self"
         ],
         "visibility": "public",
-        "forks": 163,
+        "forks": 164,
         "watchers": 746,
         "score": 0
     },
diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json
index b534408450..73e3577e32 100644
--- a/2021/CVE-2021-42287.json
+++ b/2021/CVE-2021-42287.json
@@ -13,17 +13,17 @@
         "description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
         "fork": false,
         "created_at": "2021-12-11T19:27:30Z",
-        "updated_at": "2022-03-04T18:15:49Z",
+        "updated_at": "2022-03-05T06:35:35Z",
         "pushed_at": "2021-12-16T09:50:15Z",
-        "stargazers_count": 1042,
-        "watchers_count": 1042,
+        "stargazers_count": 1043,
+        "watchers_count": 1043,
         "forks_count": 278,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 278,
-        "watchers": 1042,
+        "watchers": 1043,
         "score": 0
     },
     {
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
index 107254f8db..1968041fde 100644
--- a/2021/CVE-2021-44228.json
+++ b/2021/CVE-2021-44228.json
@@ -911,7 +911,7 @@
         "pushed_at": "2022-01-22T14:55:02Z",
         "stargazers_count": 1264,
         "watchers_count": 1264,
-        "forks_count": 339,
+        "forks_count": 340,
         "allow_forking": true,
         "is_template": false,
         "topics": [
@@ -921,7 +921,7 @@
             "security"
         ],
         "visibility": "public",
-        "forks": 339,
+        "forks": 340,
         "watchers": 1264,
         "score": 0
     },
@@ -1375,10 +1375,10 @@
         "description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
         "fork": false,
         "created_at": "2021-12-11T11:18:46Z",
-        "updated_at": "2022-03-03T06:49:29Z",
+        "updated_at": "2022-03-05T11:40:15Z",
         "pushed_at": "2022-02-17T20:52:22Z",
-        "stargazers_count": 773,
-        "watchers_count": 773,
+        "stargazers_count": 774,
+        "watchers_count": 774,
         "forks_count": 160,
         "allow_forking": true,
         "is_template": false,
@@ -1398,7 +1398,7 @@
         ],
         "visibility": "public",
         "forks": 160,
-        "watchers": 773,
+        "watchers": 774,
         "score": 0
     },
     {
diff --git a/2022/CVE-2022-0185.json b/2022/CVE-2022-0185.json
index 8cd5fa1069..50174279c0 100644
--- a/2022/CVE-2022-0185.json
+++ b/2022/CVE-2022-0185.json
@@ -13,17 +13,17 @@
         "description": "CVE-2022-0185",
         "fork": false,
         "created_at": "2022-01-19T06:19:38Z",
-        "updated_at": "2022-03-05T05:37:20Z",
+        "updated_at": "2022-03-05T10:44:45Z",
         "pushed_at": "2022-01-25T17:00:16Z",
-        "stargazers_count": 296,
-        "watchers_count": 296,
-        "forks_count": 36,
+        "stargazers_count": 298,
+        "watchers_count": 298,
+        "forks_count": 37,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 36,
-        "watchers": 296,
+        "forks": 37,
+        "watchers": 298,
         "score": 0
     },
     {
diff --git a/2022/CVE-2022-0492.json b/2022/CVE-2022-0492.json
index fd0e3dcb0b..d5b45ba4d4 100644
--- a/2022/CVE-2022-0492.json
+++ b/2022/CVE-2022-0492.json
@@ -13,17 +13,17 @@
         "description": "Test whether a container environment is vulnerable to container escapes via CVE-2022-0492",
         "fork": false,
         "created_at": "2022-02-28T01:25:26Z",
-        "updated_at": "2022-03-04T19:43:22Z",
+        "updated_at": "2022-03-05T11:54:42Z",
         "pushed_at": "2022-02-28T01:25:57Z",
-        "stargazers_count": 5,
-        "watchers_count": 5,
+        "stargazers_count": 7,
+        "watchers_count": 7,
         "forks_count": 0,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 0,
-        "watchers": 5,
+        "watchers": 7,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2022/CVE-2022-21661.json b/2022/CVE-2022-21661.json
index 36d89a7124..36f1a9de5b 100644
--- a/2022/CVE-2022-21661.json
+++ b/2022/CVE-2022-21661.json
@@ -40,17 +40,17 @@
         "description": null,
         "fork": false,
         "created_at": "2022-02-12T11:31:26Z",
-        "updated_at": "2022-03-04T16:53:28Z",
+        "updated_at": "2022-03-05T09:29:56Z",
         "pushed_at": "2022-02-17T03:59:18Z",
-        "stargazers_count": 6,
-        "watchers_count": 6,
+        "stargazers_count": 7,
+        "watchers_count": 7,
         "forks_count": 1,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 1,
-        "watchers": 6,
+        "watchers": 7,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2022/CVE-2022-21907.json b/2022/CVE-2022-21907.json
index a3f2fac6b9..cad95d5f4f 100644
--- a/2022/CVE-2022-21907.json
+++ b/2022/CVE-2022-21907.json
@@ -37,13 +37,13 @@
             "html_url": "https:\/\/github.com\/mauricelambert"
         },
         "html_url": "https:\/\/github.com\/mauricelambert\/CVE-2022-21907",
-        "description": "This repository detects a system vulnerable to CVE-2022-21907 and protects against this vulnerability if desired. I add exploit, payload and demonstration.",
+        "description": "CVE-2022-21907: detection, protection, exploitation and demonstration. Exploitation: Powershell, Python, Ruby, NMAP and Metasploit. Detection and protection: Powershell. Demonstration: Youtube.",
         "fork": false,
         "created_at": "2022-01-15T20:50:25Z",
-        "updated_at": "2022-02-24T03:17:43Z",
-        "pushed_at": "2022-01-28T07:27:00Z",
-        "stargazers_count": 15,
-        "watchers_count": 15,
+        "updated_at": "2022-03-05T10:51:04Z",
+        "pushed_at": "2022-03-05T10:40:42Z",
+        "stargazers_count": 16,
+        "watchers_count": 16,
         "forks_count": 6,
         "allow_forking": true,
         "is_template": false,
@@ -51,19 +51,26 @@
             "bluescreen",
             "crash",
             "cve",
+            "cve-2022-21907",
             "denial-of-service",
             "detection",
             "dos",
             "exploit",
             "iis",
+            "metasploit",
+            "microsoft",
+            "nmap",
+            "payload",
             "powershell",
             "protection",
             "python3",
+            "ruby",
+            "vulnerability",
             "webserver"
         ],
         "visibility": "public",
         "forks": 6,
-        "watchers": 15,
+        "watchers": 16,
         "score": 0
     },
     {
@@ -134,10 +141,10 @@
         "description": "Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers",
         "fork": false,
         "created_at": "2022-01-17T15:42:37Z",
-        "updated_at": "2022-03-02T20:12:33Z",
+        "updated_at": "2022-03-05T11:09:04Z",
         "pushed_at": "2022-02-25T11:05:11Z",
-        "stargazers_count": 54,
-        "watchers_count": 54,
+        "stargazers_count": 55,
+        "watchers_count": 55,
         "forks_count": 9,
         "allow_forking": true,
         "is_template": false,
@@ -151,7 +158,7 @@
         ],
         "visibility": "public",
         "forks": 9,
-        "watchers": 54,
+        "watchers": 55,
         "score": 0
     },
     {
@@ -172,12 +179,12 @@
         "pushed_at": "2022-01-23T14:28:54Z",
         "stargazers_count": 3,
         "watchers_count": 3,
-        "forks_count": 1,
+        "forks_count": 2,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 1,
+        "forks": 2,
         "watchers": 3,
         "score": 0
     },
diff --git a/2022/CVE-2022-21971.json b/2022/CVE-2022-21971.json
index 0be1d938f8..234707581d 100644
--- a/2022/CVE-2022-21971.json
+++ b/2022/CVE-2022-21971.json
@@ -13,10 +13,10 @@
         "description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"",
         "fork": false,
         "created_at": "2022-02-26T20:37:42Z",
-        "updated_at": "2022-03-04T23:36:17Z",
+        "updated_at": "2022-03-05T08:02:05Z",
         "pushed_at": "2022-02-26T20:45:19Z",
-        "stargazers_count": 193,
-        "watchers_count": 193,
+        "stargazers_count": 195,
+        "watchers_count": 195,
         "forks_count": 36,
         "allow_forking": true,
         "is_template": false,
@@ -30,7 +30,7 @@
         ],
         "visibility": "public",
         "forks": 36,
-        "watchers": 193,
+        "watchers": 195,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2022/CVE-2022-21999.json b/2022/CVE-2022-21999.json
index 33c2f6e3de..13e88570bc 100644
--- a/2022/CVE-2022-21999.json
+++ b/2022/CVE-2022-21999.json
@@ -13,10 +13,10 @@
         "description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
         "fork": false,
         "created_at": "2022-02-08T17:25:44Z",
-        "updated_at": "2022-03-05T01:41:34Z",
+        "updated_at": "2022-03-05T08:59:41Z",
         "pushed_at": "2022-02-09T16:54:09Z",
-        "stargazers_count": 475,
-        "watchers_count": 475,
+        "stargazers_count": 474,
+        "watchers_count": 474,
         "forks_count": 90,
         "allow_forking": true,
         "is_template": false,
@@ -26,7 +26,7 @@
         ],
         "visibility": "public",
         "forks": 90,
-        "watchers": 475,
+        "watchers": 474,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json
index 22b8032733..40982bf451 100644
--- a/2022/CVE-2022-22947.json
+++ b/2022/CVE-2022-22947.json
@@ -13,17 +13,17 @@
         "description": "CVE-2022-22947",
         "fork": false,
         "created_at": "2022-03-02T11:58:55Z",
-        "updated_at": "2022-03-05T06:14:07Z",
+        "updated_at": "2022-03-05T11:22:15Z",
         "pushed_at": "2022-03-03T14:03:30Z",
-        "stargazers_count": 136,
-        "watchers_count": 136,
+        "stargazers_count": 139,
+        "watchers_count": 139,
         "forks_count": 52,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 52,
-        "watchers": 136,
+        "watchers": 139,
         "score": 0
     },
     {
@@ -94,17 +94,17 @@
         "description": "Spring cloud gateway code injection : CVE-2022-22947",
         "fork": false,
         "created_at": "2022-03-03T11:14:37Z",
-        "updated_at": "2022-03-04T09:24:38Z",
+        "updated_at": "2022-03-05T07:46:37Z",
         "pushed_at": "2022-03-03T11:27:18Z",
-        "stargazers_count": 6,
-        "watchers_count": 6,
+        "stargazers_count": 8,
+        "watchers_count": 8,
         "forks_count": 1,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 1,
-        "watchers": 6,
+        "watchers": 8,
         "score": 0
     },
     {
@@ -339,17 +339,17 @@
         "description": "CVE-2021-42013批量",
         "fork": false,
         "created_at": "2022-03-04T06:38:26Z",
-        "updated_at": "2022-03-05T01:16:12Z",
+        "updated_at": "2022-03-05T10:48:51Z",
         "pushed_at": "2022-03-04T10:49:00Z",
-        "stargazers_count": 19,
-        "watchers_count": 19,
-        "forks_count": 4,
+        "stargazers_count": 21,
+        "watchers_count": 21,
+        "forks_count": 5,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 4,
-        "watchers": 19,
+        "forks": 5,
+        "watchers": 21,
         "score": 0
     },
     {
@@ -444,20 +444,20 @@
             "html_url": "https:\/\/github.com\/chaosec2021"
         },
         "html_url": "https:\/\/github.com\/chaosec2021\/CVE-2022-22947-POC",
-        "description": "CVE-2022-22947批量检测脚本,回显命令没进行正则,大佬们先用着,后续再更",
+        "description": "CVE-2022-22947批量检测脚本,回显命令已经正则好,超时时间不超过2s,欢迎师傅们尝试",
         "fork": false,
         "created_at": "2022-03-04T11:31:00Z",
-        "updated_at": "2022-03-04T17:28:24Z",
-        "pushed_at": "2022-03-04T11:36:47Z",
-        "stargazers_count": 3,
-        "watchers_count": 3,
+        "updated_at": "2022-03-05T09:56:59Z",
+        "pushed_at": "2022-03-05T12:07:39Z",
+        "stargazers_count": 5,
+        "watchers_count": 5,
         "forks_count": 3,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 3,
-        "watchers": 3,
+        "watchers": 5,
         "score": 0
     },
     {
@@ -513,5 +513,32 @@
         "forks": 0,
         "watchers": 4,
         "score": 0
+    },
+    {
+        "id": 466368589,
+        "name": "CVE-2022-22947",
+        "full_name": "22ke\/CVE-2022-22947",
+        "owner": {
+            "login": "22ke",
+            "id": 39191639,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39191639?v=4",
+            "html_url": "https:\/\/github.com\/22ke"
+        },
+        "html_url": "https:\/\/github.com\/22ke\/CVE-2022-22947",
+        "description": null,
+        "fork": false,
+        "created_at": "2022-03-05T06:19:46Z",
+        "updated_at": "2022-03-05T11:05:04Z",
+        "pushed_at": "2022-03-05T06:39:43Z",
+        "stargazers_count": 2,
+        "watchers_count": 2,
+        "forks_count": 0,
+        "allow_forking": true,
+        "is_template": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 0,
+        "watchers": 2,
+        "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2022/CVE-2022-23131.json b/2022/CVE-2022-23131.json
index 801993fafa..02bea2c7cf 100644
--- a/2022/CVE-2022-23131.json
+++ b/2022/CVE-2022-23131.json
@@ -40,17 +40,17 @@
         "description": "cve-2022-23131 exp",
         "fork": false,
         "created_at": "2022-02-18T08:38:53Z",
-        "updated_at": "2022-03-04T08:57:15Z",
+        "updated_at": "2022-03-05T10:59:52Z",
         "pushed_at": "2022-02-21T04:27:48Z",
-        "stargazers_count": 76,
-        "watchers_count": 76,
-        "forks_count": 30,
+        "stargazers_count": 77,
+        "watchers_count": 77,
+        "forks_count": 31,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 30,
-        "watchers": 76,
+        "forks": 31,
+        "watchers": 77,
         "score": 0
     },
     {
diff --git a/2022/CVE-2022-25064.json b/2022/CVE-2022-25064.json
index 784c3a6f92..b41bcedb5b 100644
--- a/2022/CVE-2022-25064.json
+++ b/2022/CVE-2022-25064.json
@@ -17,12 +17,12 @@
         "pushed_at": "2022-03-05T01:02:42Z",
         "stargazers_count": 20,
         "watchers_count": 20,
-        "forks_count": 6,
+        "forks_count": 7,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 6,
+        "forks": 7,
         "watchers": 20,
         "score": 0
     }
diff --git a/README.md b/README.md
index d3f3334807..aec505c5bc 100644
--- a/README.md
+++ b/README.md
@@ -265,6 +265,7 @@ In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are v
 - [chaosec2021/CVE-2022-22947-POC](https://github.com/chaosec2021/CVE-2022-22947-POC)
 - [Xd-tl/CVE-2022-22947-Rce_POC](https://github.com/Xd-tl/CVE-2022-22947-Rce_POC)
 - [march0s1as/CVE-2022-22947](https://github.com/march0s1as/CVE-2022-22947)
+- [22ke/CVE-2022-22947](https://github.com/22ke/CVE-2022-22947)
 
 ### CVE-2022-23046 (2022-01-19)
 
@@ -2563,6 +2564,7 @@ A SQL injection vulnerability in the pandora_console component of Artica Pandora
 - [zjicmDarkWing/CVE-2021-32099](https://github.com/zjicmDarkWing/CVE-2021-32099)
 - [ibnuuby/CVE-2021-32099](https://github.com/ibnuuby/CVE-2021-32099)
 - [l3eol3eo/CVE-2021-32099_SQLi](https://github.com/l3eol3eo/CVE-2021-32099_SQLi)
+- [akr3ch/CVE-2021-32099](https://github.com/akr3ch/CVE-2021-32099)
 
 ### CVE-2021-32471 (2021-05-10)
 
@@ -2786,7 +2788,6 @@ In the Druid ingestion system, the InputSource is used for reading data from a c
 </code>
 
 - [Sma11New/PocList](https://github.com/Sma11New/PocList)
-- [BrucessKING/CVE-2021-36749](https://github.com/BrucessKING/CVE-2021-36749)
 - [dorkerdevil/CVE-2021-36749](https://github.com/dorkerdevil/CVE-2021-36749)
 - [zwlsix/apache_druid_CVE-2021-36749](https://github.com/zwlsix/apache_druid_CVE-2021-36749)
 - [Jun-5heng/CVE-2021-36749](https://github.com/Jun-5heng/CVE-2021-36749)