From 49135072a0a2624e891eb440384d545f85d765af Mon Sep 17 00:00:00 2001
From: motikan2010-bot <k.agena1993@gmail.com>
Date: Fri, 24 Dec 2021 21:13:37 +0900
Subject: [PATCH] Auto Update 2021/12/24 12:13:37

---
 2013/CVE-2013-2028.json  |   8 +-
 2014/CVE-2014-4210.json  |   8 +-
 2015/CVE-2015-6639.json  |   6 +-
 2016/CVE-2016-0638.json  |   8 +-
 2017/CVE-2017-3248.json  |   8 +-
 2018/CVE-2018-14847.json |   8 +-
 2018/CVE-2018-2628.json  |   8 +-
 2018/CVE-2018-8065.json  |   8 +-
 2018/CVE-2018-8120.json  |   8 +-
 2019/CVE-2019-17558.json |  12 +-
 2019/CVE-2019-2618.json  |   8 +-
 2019/CVE-2019-5736.json  |   8 +-
 2019/CVE-2019-8601.json  |  12 +-
 2020/CVE-2020-14386.json |   8 +-
 2020/CVE-2020-1472.json  |   8 +-
 2020/CVE-2020-14882.json |  12 +-
 2020/CVE-2020-14883.json |   8 +-
 2020/CVE-2020-2551.json  |   8 +-
 2020/CVE-2020-2883.json  |   4 +-
 2020/CVE-2020-35729.json |   8 +-
 2021/CVE-2021-21123.json |   8 +-
 2021/CVE-2021-21985.json |  43 +----
 2021/CVE-2021-22005.json |  24 +--
 2021/CVE-2021-22205.json |  12 +-
 2021/CVE-2021-25646.json |   4 +-
 2021/CVE-2021-30461.json |  27 ----
 2021/CVE-2021-30632.json |   8 +-
 2021/CVE-2021-3129.json  |  16 +-
 2021/CVE-2021-3156.json  |   8 +-
 2021/CVE-2021-34473.json |   4 +-
 2021/CVE-2021-34496.json |  29 ----
 2021/CVE-2021-34527.json |  27 ----
 2021/CVE-2021-34558.json |  29 ----
 2021/CVE-2021-40444.json |  32 ++--
 2021/CVE-2021-40449.json |   8 +-
 2021/CVE-2021-42013.json |   4 +-
 2021/CVE-2021-42278.json |  28 ++--
 2021/CVE-2021-42287.json |  12 +-
 2021/CVE-2021-43224.json |   8 +-
 2021/CVE-2021-43798.json |   8 +-
 2021/CVE-2021-44228.json | 328 ++++++++++++++++++++++++++-------------
 2021/CVE-2021-44659.json |   8 +-
 2021/CVE-2021-45046.json |  35 ++++-
 README.md                |  26 +---
 44 files changed, 446 insertions(+), 456 deletions(-)
 delete mode 100644 2021/CVE-2021-34496.json
 delete mode 100644 2021/CVE-2021-34558.json

diff --git a/2013/CVE-2013-2028.json b/2013/CVE-2013-2028.json
index 82a0135499..d0165acc82 100644
--- a/2013/CVE-2013-2028.json
+++ b/2013/CVE-2013-2028.json
@@ -40,17 +40,17 @@
         "description": "Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow",
         "fork": false,
         "created_at": "2016-03-23T10:41:00Z",
-        "updated_at": "2021-08-03T01:32:00Z",
+        "updated_at": "2021-12-24T10:35:04Z",
         "pushed_at": "2016-03-23T12:05:38Z",
-        "stargazers_count": 46,
-        "watchers_count": 46,
+        "stargazers_count": 47,
+        "watchers_count": 47,
         "forks_count": 20,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 20,
-        "watchers": 46,
+        "watchers": 47,
         "score": 0
     },
     {
diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json
index 52adb1e005..d9cd0fd400 100644
--- a/2014/CVE-2014-4210.json
+++ b/2014/CVE-2014-4210.json
@@ -40,10 +40,10 @@
         "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2021-12-23T09:07:38Z",
+        "updated_at": "2021-12-24T11:24:25Z",
         "pushed_at": "2020-11-27T15:10:58Z",
-        "stargazers_count": 1249,
-        "watchers_count": 1249,
+        "stargazers_count": 1251,
+        "watchers_count": 1251,
         "forks_count": 277,
         "allow_forking": true,
         "is_template": false,
@@ -71,7 +71,7 @@
         ],
         "visibility": "public",
         "forks": 277,
-        "watchers": 1249,
+        "watchers": 1251,
         "score": 0
     },
     {
diff --git a/2015/CVE-2015-6639.json b/2015/CVE-2015-6639.json
index 95fccec23b..f268352323 100644
--- a/2015/CVE-2015-6639.json
+++ b/2015/CVE-2015-6639.json
@@ -13,16 +13,16 @@
         "description": "QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)",
         "fork": false,
         "created_at": "2016-05-02T12:18:57Z",
-        "updated_at": "2021-11-14T06:34:24Z",
+        "updated_at": "2021-12-24T10:18:55Z",
         "pushed_at": "2019-08-13T07:14:01Z",
         "stargazers_count": 105,
         "watchers_count": 105,
-        "forks_count": 53,
+        "forks_count": 54,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 53,
+        "forks": 54,
         "watchers": 105,
         "score": 0
     },
diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json
index 65524932d7..446ab8c9f7 100644
--- a/2016/CVE-2016-0638.json
+++ b/2016/CVE-2016-0638.json
@@ -13,10 +13,10 @@
         "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2021-12-23T09:07:38Z",
+        "updated_at": "2021-12-24T11:24:25Z",
         "pushed_at": "2020-11-27T15:10:58Z",
-        "stargazers_count": 1249,
-        "watchers_count": 1249,
+        "stargazers_count": 1251,
+        "watchers_count": 1251,
         "forks_count": 277,
         "allow_forking": true,
         "is_template": false,
@@ -44,7 +44,7 @@
         ],
         "visibility": "public",
         "forks": 277,
-        "watchers": 1249,
+        "watchers": 1251,
         "score": 0
     },
     {
diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json
index 2e1914d36f..3baee400ab 100644
--- a/2017/CVE-2017-3248.json
+++ b/2017/CVE-2017-3248.json
@@ -40,10 +40,10 @@
         "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2021-12-23T09:07:38Z",
+        "updated_at": "2021-12-24T11:24:25Z",
         "pushed_at": "2020-11-27T15:10:58Z",
-        "stargazers_count": 1249,
-        "watchers_count": 1249,
+        "stargazers_count": 1251,
+        "watchers_count": 1251,
         "forks_count": 277,
         "allow_forking": true,
         "is_template": false,
@@ -71,7 +71,7 @@
         ],
         "visibility": "public",
         "forks": 277,
-        "watchers": 1249,
+        "watchers": 1251,
         "score": 0
     },
     {
diff --git a/2018/CVE-2018-14847.json b/2018/CVE-2018-14847.json
index 9bb31d2784..393d682ff7 100644
--- a/2018/CVE-2018-14847.json
+++ b/2018/CVE-2018-14847.json
@@ -175,10 +175,10 @@
         "description": "PoC of CVE-2018-14847 Mikrotik Vulnerability using simple script",
         "fork": false,
         "created_at": "2019-09-29T12:21:16Z",
-        "updated_at": "2021-09-23T22:29:56Z",
+        "updated_at": "2021-12-24T11:09:47Z",
         "pushed_at": "2019-09-30T04:10:23Z",
-        "stargazers_count": 11,
-        "watchers_count": 11,
+        "stargazers_count": 12,
+        "watchers_count": 12,
         "forks_count": 1,
         "allow_forking": true,
         "is_template": false,
@@ -190,7 +190,7 @@
         ],
         "visibility": "public",
         "forks": 1,
-        "watchers": 11,
+        "watchers": 12,
         "score": 0
     },
     {
diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json
index 67f935a3ab..6bd7f73057 100644
--- a/2018/CVE-2018-2628.json
+++ b/2018/CVE-2018-2628.json
@@ -530,10 +530,10 @@
         "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2021-12-23T09:07:38Z",
+        "updated_at": "2021-12-24T11:24:25Z",
         "pushed_at": "2020-11-27T15:10:58Z",
-        "stargazers_count": 1249,
-        "watchers_count": 1249,
+        "stargazers_count": 1251,
+        "watchers_count": 1251,
         "forks_count": 277,
         "allow_forking": true,
         "is_template": false,
@@ -561,7 +561,7 @@
         ],
         "visibility": "public",
         "forks": 277,
-        "watchers": 1249,
+        "watchers": 1251,
         "score": 0
     },
     {
diff --git a/2018/CVE-2018-8065.json b/2018/CVE-2018-8065.json
index 9fa137d9b4..d558604217 100644
--- a/2018/CVE-2018-8065.json
+++ b/2018/CVE-2018-8065.json
@@ -13,17 +13,17 @@
         "description": "Flexense HTTP Server <= 10.6.24 - Denial Of Service Exploit",
         "fork": false,
         "created_at": "2018-05-25T17:31:05Z",
-        "updated_at": "2021-08-07T16:45:57Z",
+        "updated_at": "2021-12-24T10:36:59Z",
         "pushed_at": "2018-09-03T18:25:53Z",
-        "stargazers_count": 8,
-        "watchers_count": 8,
+        "stargazers_count": 7,
+        "watchers_count": 7,
         "forks_count": 6,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 6,
-        "watchers": 8,
+        "watchers": 7,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2018/CVE-2018-8120.json b/2018/CVE-2018-8120.json
index f37732bd39..88a23fd36c 100644
--- a/2018/CVE-2018-8120.json
+++ b/2018/CVE-2018-8120.json
@@ -98,17 +98,17 @@
         "description": "CVE-2018-8120 Exploit for Win2003 Win2008 WinXP Win7 ",
         "fork": false,
         "created_at": "2018-06-07T08:30:07Z",
-        "updated_at": "2021-12-15T14:34:16Z",
+        "updated_at": "2021-12-24T08:51:08Z",
         "pushed_at": "2018-08-08T05:48:24Z",
-        "stargazers_count": 287,
-        "watchers_count": 287,
+        "stargazers_count": 288,
+        "watchers_count": 288,
         "forks_count": 124,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 124,
-        "watchers": 287,
+        "watchers": 288,
         "score": 0
     },
     {
diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json
index 882fe8623b..3b8a4ad03d 100644
--- a/2019/CVE-2019-17558.json
+++ b/2019/CVE-2019-17558.json
@@ -40,11 +40,11 @@
         "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
         "fork": false,
         "created_at": "2020-04-01T09:33:35Z",
-        "updated_at": "2021-12-24T01:44:11Z",
+        "updated_at": "2021-12-24T08:41:05Z",
         "pushed_at": "2021-04-04T09:13:57Z",
-        "stargazers_count": 3064,
-        "watchers_count": 3064,
-        "forks_count": 909,
+        "stargazers_count": 3067,
+        "watchers_count": 3067,
+        "forks_count": 911,
         "allow_forking": true,
         "is_template": false,
         "topics": [
@@ -69,8 +69,8 @@
             "webshell"
         ],
         "visibility": "public",
-        "forks": 909,
-        "watchers": 3064,
+        "forks": 911,
+        "watchers": 3067,
         "score": 0
     },
     {
diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json
index 78592ed569..0c0add30ae 100644
--- a/2019/CVE-2019-2618.json
+++ b/2019/CVE-2019-2618.json
@@ -175,10 +175,10 @@
         "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2021-12-23T09:07:38Z",
+        "updated_at": "2021-12-24T11:24:25Z",
         "pushed_at": "2020-11-27T15:10:58Z",
-        "stargazers_count": 1249,
-        "watchers_count": 1249,
+        "stargazers_count": 1251,
+        "watchers_count": 1251,
         "forks_count": 277,
         "allow_forking": true,
         "is_template": false,
@@ -206,7 +206,7 @@
         ],
         "visibility": "public",
         "forks": 277,
-        "watchers": 1249,
+        "watchers": 1251,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2019/CVE-2019-5736.json b/2019/CVE-2019-5736.json
index f158ac65ad..884cb5167e 100644
--- a/2019/CVE-2019-5736.json
+++ b/2019/CVE-2019-5736.json
@@ -40,17 +40,17 @@
         "description": "PoC for CVE-2019-5736",
         "fork": false,
         "created_at": "2019-02-13T05:26:32Z",
-        "updated_at": "2021-12-21T22:20:09Z",
+        "updated_at": "2021-12-24T09:42:33Z",
         "pushed_at": "2019-02-19T11:45:13Z",
-        "stargazers_count": 548,
-        "watchers_count": 548,
+        "stargazers_count": 549,
+        "watchers_count": 549,
         "forks_count": 151,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 151,
-        "watchers": 548,
+        "watchers": 549,
         "score": 0
     },
     {
diff --git a/2019/CVE-2019-8601.json b/2019/CVE-2019-8601.json
index a0a0e9e63f..2bab3aaa03 100644
--- a/2019/CVE-2019-8601.json
+++ b/2019/CVE-2019-8601.json
@@ -13,17 +13,17 @@
         "description": "Exploiting a patched vulnerability in JavaScriptCore",
         "fork": false,
         "created_at": "2020-01-02T00:12:22Z",
-        "updated_at": "2021-10-01T14:13:32Z",
+        "updated_at": "2021-12-24T08:06:47Z",
         "pushed_at": "2020-01-02T00:13:22Z",
-        "stargazers_count": 9,
-        "watchers_count": 9,
-        "forks_count": 2,
+        "stargazers_count": 10,
+        "watchers_count": 10,
+        "forks_count": 3,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 2,
-        "watchers": 9,
+        "forks": 3,
+        "watchers": 10,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-14386.json b/2020/CVE-2020-14386.json
index 6e75c5fa4d..2bbcc3f3e1 100644
--- a/2020/CVE-2020-14386.json
+++ b/2020/CVE-2020-14386.json
@@ -13,17 +13,17 @@
         "description": null,
         "fork": false,
         "created_at": "2020-09-17T21:25:18Z",
-        "updated_at": "2021-11-29T02:30:40Z",
+        "updated_at": "2021-12-24T06:50:06Z",
         "pushed_at": "2020-09-18T00:01:00Z",
-        "stargazers_count": 42,
-        "watchers_count": 42,
+        "stargazers_count": 43,
+        "watchers_count": 43,
         "forks_count": 16,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 16,
-        "watchers": 42,
+        "watchers": 43,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json
index 69c8163a0d..e695434d74 100644
--- a/2020/CVE-2020-1472.json
+++ b/2020/CVE-2020-1472.json
@@ -155,17 +155,17 @@
         "description": "Exploit for zerologon cve-2020-1472",
         "fork": false,
         "created_at": "2020-09-14T19:19:07Z",
-        "updated_at": "2021-12-23T09:27:27Z",
+        "updated_at": "2021-12-24T06:43:52Z",
         "pushed_at": "2020-10-15T18:31:15Z",
-        "stargazers_count": 388,
-        "watchers_count": 388,
+        "stargazers_count": 389,
+        "watchers_count": 389,
         "forks_count": 118,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 118,
-        "watchers": 388,
+        "watchers": 389,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json
index 0a1e48fe39..3143e141ae 100644
--- a/2020/CVE-2020-14882.json
+++ b/2020/CVE-2020-14882.json
@@ -13,11 +13,11 @@
         "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
         "fork": false,
         "created_at": "2020-04-01T09:33:35Z",
-        "updated_at": "2021-12-24T01:44:11Z",
+        "updated_at": "2021-12-24T08:41:05Z",
         "pushed_at": "2021-04-04T09:13:57Z",
-        "stargazers_count": 3064,
-        "watchers_count": 3064,
-        "forks_count": 909,
+        "stargazers_count": 3067,
+        "watchers_count": 3067,
+        "forks_count": 911,
         "allow_forking": true,
         "is_template": false,
         "topics": [
@@ -42,8 +42,8 @@
             "webshell"
         ],
         "visibility": "public",
-        "forks": 909,
-        "watchers": 3064,
+        "forks": 911,
+        "watchers": 3067,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json
index 513b368cfd..24827ab19e 100644
--- a/2020/CVE-2020-14883.json
+++ b/2020/CVE-2020-14883.json
@@ -44,12 +44,12 @@
         "pushed_at": "2020-11-11T09:12:20Z",
         "stargazers_count": 7,
         "watchers_count": 7,
-        "forks_count": 3,
+        "forks_count": 4,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 3,
+        "forks": 4,
         "watchers": 7,
         "score": 0
     },
@@ -125,7 +125,7 @@
         "pushed_at": "2021-07-30T03:28:00Z",
         "stargazers_count": 912,
         "watchers_count": 912,
-        "forks_count": 285,
+        "forks_count": 286,
         "allow_forking": true,
         "is_template": false,
         "topics": [
@@ -134,7 +134,7 @@
             "poc"
         ],
         "visibility": "public",
-        "forks": 285,
+        "forks": 286,
         "watchers": 912,
         "score": 0
     }
diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json
index d01f148a51..be4d231beb 100644
--- a/2020/CVE-2020-2551.json
+++ b/2020/CVE-2020-2551.json
@@ -13,10 +13,10 @@
         "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2021-12-23T09:07:38Z",
+        "updated_at": "2021-12-24T11:24:25Z",
         "pushed_at": "2020-11-27T15:10:58Z",
-        "stargazers_count": 1249,
-        "watchers_count": 1249,
+        "stargazers_count": 1251,
+        "watchers_count": 1251,
         "forks_count": 277,
         "allow_forking": true,
         "is_template": false,
@@ -44,7 +44,7 @@
         ],
         "visibility": "public",
         "forks": 277,
-        "watchers": 1249,
+        "watchers": 1251,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-2883.json b/2020/CVE-2020-2883.json
index 6517563518..985d21276d 100644
--- a/2020/CVE-2020-2883.json
+++ b/2020/CVE-2020-2883.json
@@ -103,12 +103,12 @@
         "pushed_at": "2020-08-25T03:17:32Z",
         "stargazers_count": 304,
         "watchers_count": 304,
-        "forks_count": 43,
+        "forks_count": 44,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 43,
+        "forks": 44,
         "watchers": 304,
         "score": 0
     },
diff --git a/2020/CVE-2020-35729.json b/2020/CVE-2020-35729.json
index 9db65929ad..6b84767dbb 100644
--- a/2020/CVE-2020-35729.json
+++ b/2020/CVE-2020-35729.json
@@ -13,10 +13,10 @@
         "description": "CVE-2020-35729",
         "fork": false,
         "created_at": "2021-04-09T07:59:43Z",
-        "updated_at": "2021-10-24T06:20:50Z",
+        "updated_at": "2021-12-24T06:18:33Z",
         "pushed_at": "2021-04-09T08:00:19Z",
-        "stargazers_count": 4,
-        "watchers_count": 4,
+        "stargazers_count": 5,
+        "watchers_count": 5,
         "forks_count": 2,
         "allow_forking": true,
         "is_template": false,
@@ -27,7 +27,7 @@
         ],
         "visibility": "public",
         "forks": 2,
-        "watchers": 4,
+        "watchers": 5,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2021/CVE-2021-21123.json b/2021/CVE-2021-21123.json
index 55e80565aa..3d3818f442 100644
--- a/2021/CVE-2021-21123.json
+++ b/2021/CVE-2021-21123.json
@@ -13,10 +13,10 @@
         "description": "🐱‍💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
         "fork": false,
         "created_at": "2021-03-22T11:53:57Z",
-        "updated_at": "2021-12-12T02:47:33Z",
+        "updated_at": "2021-12-24T10:11:49Z",
         "pushed_at": "2021-03-22T18:24:20Z",
-        "stargazers_count": 124,
-        "watchers_count": 124,
+        "stargazers_count": 125,
+        "watchers_count": 125,
         "forks_count": 22,
         "allow_forking": true,
         "is_template": false,
@@ -38,7 +38,7 @@
         ],
         "visibility": "public",
         "forks": 22,
-        "watchers": 124,
+        "watchers": 125,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2021/CVE-2021-21985.json b/2021/CVE-2021-21985.json
index 88bbb7d279..2e228bba44 100644
--- a/2021/CVE-2021-21985.json
+++ b/2021/CVE-2021-21985.json
@@ -128,17 +128,17 @@
         "description": "CVE-2021-21985 VMware vCenter Server远程代码执行漏洞 EXP (更新可回显EXP)",
         "fork": false,
         "created_at": "2021-06-03T09:59:21Z",
-        "updated_at": "2021-12-23T18:09:04Z",
+        "updated_at": "2021-12-24T07:15:03Z",
         "pushed_at": "2021-06-09T10:13:56Z",
-        "stargazers_count": 305,
-        "watchers_count": 305,
+        "stargazers_count": 306,
+        "watchers_count": 306,
         "forks_count": 67,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 67,
-        "watchers": 305,
+        "watchers": 306,
         "score": 0
     },
     {
@@ -155,17 +155,17 @@
         "description": "cve-2021-21985 exploit",
         "fork": false,
         "created_at": "2021-06-03T12:17:06Z",
-        "updated_at": "2021-12-23T01:20:03Z",
+        "updated_at": "2021-12-24T11:45:26Z",
         "pushed_at": "2021-12-16T08:25:02Z",
-        "stargazers_count": 84,
-        "watchers_count": 84,
+        "stargazers_count": 85,
+        "watchers_count": 85,
         "forks_count": 28,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 28,
-        "watchers": 84,
+        "watchers": 85,
         "score": 0
     },
     {
@@ -226,33 +226,6 @@
         "watchers": 28,
         "score": 0
     },
-    {
-        "id": 384003238,
-        "name": "CVE-2021-21985",
-        "full_name": "haiclover\/CVE-2021-21985",
-        "owner": {
-            "login": "haiclover",
-            "id": 20736458,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20736458?v=4",
-            "html_url": "https:\/\/github.com\/haiclover"
-        },
-        "html_url": "https:\/\/github.com\/haiclover\/CVE-2021-21985",
-        "description": null,
-        "fork": false,
-        "created_at": "2021-07-08T04:45:19Z",
-        "updated_at": "2021-07-12T11:04:39Z",
-        "pushed_at": "2021-07-12T11:04:36Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
-        "forks_count": 0,
-        "allow_forking": true,
-        "is_template": false,
-        "topics": [],
-        "visibility": "public",
-        "forks": 0,
-        "watchers": 0,
-        "score": 0
-    },
     {
         "id": 426353517,
         "name": "CVE-2021-21985_PoC",
diff --git a/2021/CVE-2021-22005.json b/2021/CVE-2021-22005.json
index 42c41e2951..9b052bdf03 100644
--- a/2021/CVE-2021-22005.json
+++ b/2021/CVE-2021-22005.json
@@ -121,17 +121,17 @@
         "description": "CVE-2021-22005 - VMWare vCenter Server File Upload to RCE",
         "fork": false,
         "created_at": "2021-09-25T16:21:56Z",
-        "updated_at": "2021-12-24T03:25:45Z",
+        "updated_at": "2021-12-24T10:47:43Z",
         "pushed_at": "2021-10-02T03:17:45Z",
-        "stargazers_count": 191,
-        "watchers_count": 191,
-        "forks_count": 48,
+        "stargazers_count": 193,
+        "watchers_count": 193,
+        "forks_count": 49,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 48,
-        "watchers": 191,
+        "forks": 49,
+        "watchers": 193,
         "score": 0
     },
     {
@@ -283,17 +283,17 @@
         "description": null,
         "fork": false,
         "created_at": "2021-12-18T08:18:50Z",
-        "updated_at": "2021-12-24T06:11:26Z",
+        "updated_at": "2021-12-24T10:16:54Z",
         "pushed_at": "2021-12-22T10:32:37Z",
-        "stargazers_count": 54,
-        "watchers_count": 54,
-        "forks_count": 12,
+        "stargazers_count": 56,
+        "watchers_count": 56,
+        "forks_count": 14,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 12,
-        "watchers": 54,
+        "forks": 14,
+        "watchers": 56,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json
index 17893e2eb3..39d9288d3e 100644
--- a/2021/CVE-2021-22205.json
+++ b/2021/CVE-2021-22205.json
@@ -13,17 +13,17 @@
         "description": null,
         "fork": false,
         "created_at": "2021-06-05T15:42:16Z",
-        "updated_at": "2021-12-20T06:24:47Z",
+        "updated_at": "2021-12-24T09:05:20Z",
         "pushed_at": "2021-11-02T14:45:24Z",
-        "stargazers_count": 170,
-        "watchers_count": 170,
+        "stargazers_count": 171,
+        "watchers_count": 171,
         "forks_count": 42,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 42,
-        "watchers": 170,
+        "watchers": 171,
         "score": 0
     },
     {
@@ -125,14 +125,14 @@
         "pushed_at": "2021-11-06T05:20:30Z",
         "stargazers_count": 118,
         "watchers_count": 118,
-        "forks_count": 49,
+        "forks_count": 50,
         "allow_forking": true,
         "is_template": false,
         "topics": [
             "cve-2021-22205"
         ],
         "visibility": "public",
-        "forks": 49,
+        "forks": 50,
         "watchers": 118,
         "score": 0
     },
diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json
index 117912f769..6f6f4c59ee 100644
--- a/2021/CVE-2021-25646.json
+++ b/2021/CVE-2021-25646.json
@@ -125,7 +125,7 @@
         "pushed_at": "2021-07-30T03:28:00Z",
         "stargazers_count": 912,
         "watchers_count": 912,
-        "forks_count": 285,
+        "forks_count": 286,
         "allow_forking": true,
         "is_template": false,
         "topics": [
@@ -134,7 +134,7 @@
             "poc"
         ],
         "visibility": "public",
-        "forks": 285,
+        "forks": 286,
         "watchers": 912,
         "score": 0
     },
diff --git a/2021/CVE-2021-30461.json b/2021/CVE-2021-30461.json
index 9a157d00eb..3a004bc4db 100644
--- a/2021/CVE-2021-30461.json
+++ b/2021/CVE-2021-30461.json
@@ -87,32 +87,5 @@
         "forks": 5,
         "watchers": 14,
         "score": 0
-    },
-    {
-        "id": 386052413,
-        "name": "CVE-2021-30461",
-        "full_name": "puckiestyle\/CVE-2021-30461",
-        "owner": {
-            "login": "puckiestyle",
-            "id": 57447087,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
-            "html_url": "https:\/\/github.com\/puckiestyle"
-        },
-        "html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-30461",
-        "description": null,
-        "fork": false,
-        "created_at": "2021-07-14T19:20:11Z",
-        "updated_at": "2021-07-14T19:20:24Z",
-        "pushed_at": "2021-07-14T19:20:21Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
-        "forks_count": 0,
-        "allow_forking": true,
-        "is_template": false,
-        "topics": [],
-        "visibility": "public",
-        "forks": 0,
-        "watchers": 0,
-        "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2021/CVE-2021-30632.json b/2021/CVE-2021-30632.json
index c2db3ed47d..4e4790534c 100644
--- a/2021/CVE-2021-30632.json
+++ b/2021/CVE-2021-30632.json
@@ -13,17 +13,17 @@
         "description": "PoC CVE-2021-30632 - Out of bounds write in V8",
         "fork": false,
         "created_at": "2021-09-20T09:49:51Z",
-        "updated_at": "2021-11-30T11:23:11Z",
+        "updated_at": "2021-12-24T06:17:39Z",
         "pushed_at": "2021-09-20T09:52:06Z",
-        "stargazers_count": 65,
-        "watchers_count": 65,
+        "stargazers_count": 66,
+        "watchers_count": 66,
         "forks_count": 13,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 13,
-        "watchers": 65,
+        "watchers": 66,
         "score": 0
     },
     {
diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json
index aa134d6694..bb1f0fa8d9 100644
--- a/2021/CVE-2021-3129.json
+++ b/2021/CVE-2021-3129.json
@@ -13,17 +13,17 @@
         "description": "Exploit for CVE-2021-3129",
         "fork": false,
         "created_at": "2021-01-13T12:52:20Z",
-        "updated_at": "2021-12-19T16:42:50Z",
+        "updated_at": "2021-12-24T06:36:04Z",
         "pushed_at": "2021-01-29T13:59:07Z",
-        "stargazers_count": 188,
-        "watchers_count": 188,
+        "stargazers_count": 189,
+        "watchers_count": 189,
         "forks_count": 52,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 52,
-        "watchers": 188,
+        "watchers": 189,
         "score": 0
     },
     {
@@ -121,10 +121,10 @@
         "description": "Exploit for CVE-2021-3129",
         "fork": false,
         "created_at": "2021-01-27T10:16:35Z",
-        "updated_at": "2021-12-22T01:14:44Z",
+        "updated_at": "2021-12-24T06:42:35Z",
         "pushed_at": "2021-03-07T04:39:58Z",
-        "stargazers_count": 34,
-        "watchers_count": 34,
+        "stargazers_count": 35,
+        "watchers_count": 35,
         "forks_count": 13,
         "allow_forking": true,
         "is_template": false,
@@ -135,7 +135,7 @@
         ],
         "visibility": "public",
         "forks": 13,
-        "watchers": 34,
+        "watchers": 35,
         "score": 0
     },
     {
diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json
index 5f87628d51..4063458188 100644
--- a/2021/CVE-2021-3156.json
+++ b/2021/CVE-2021-3156.json
@@ -1158,17 +1158,17 @@
         "description": "CVE-2021-3156 - Sudo Baron Samedit",
         "fork": false,
         "created_at": "2021-04-29T06:29:26Z",
-        "updated_at": "2021-12-18T05:37:22Z",
+        "updated_at": "2021-12-24T11:25:04Z",
         "pushed_at": "2021-08-11T15:52:19Z",
-        "stargazers_count": 115,
-        "watchers_count": 115,
+        "stargazers_count": 116,
+        "watchers_count": 116,
         "forks_count": 7,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 7,
-        "watchers": 115,
+        "watchers": 116,
         "score": 0
     },
     {
diff --git a/2021/CVE-2021-34473.json b/2021/CVE-2021-34473.json
index 2db5f44f85..ab7ccb050f 100644
--- a/2021/CVE-2021-34473.json
+++ b/2021/CVE-2021-34473.json
@@ -98,12 +98,12 @@
         "pushed_at": "2021-09-07T15:18:45Z",
         "stargazers_count": 18,
         "watchers_count": 18,
-        "forks_count": 8,
+        "forks_count": 9,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 8,
+        "forks": 9,
         "watchers": 18,
         "score": 0
     },
diff --git a/2021/CVE-2021-34496.json b/2021/CVE-2021-34496.json
deleted file mode 100644
index 960516fd01..0000000000
--- a/2021/CVE-2021-34496.json
+++ /dev/null
@@ -1,29 +0,0 @@
-[
-    {
-        "id": 386161559,
-        "name": "CVE-2021-34496",
-        "full_name": "fkm75P8YjLkb\/CVE-2021-34496",
-        "owner": {
-            "login": "fkm75P8YjLkb",
-            "id": 82131630,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82131630?v=4",
-            "html_url": "https:\/\/github.com\/fkm75P8YjLkb"
-        },
-        "html_url": "https:\/\/github.com\/fkm75P8YjLkb\/CVE-2021-34496",
-        "description": null,
-        "fork": false,
-        "created_at": "2021-07-15T04:23:58Z",
-        "updated_at": "2021-07-15T04:23:58Z",
-        "pushed_at": "2021-07-15T04:23:59Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
-        "forks_count": 0,
-        "allow_forking": true,
-        "is_template": false,
-        "topics": [],
-        "visibility": "public",
-        "forks": 0,
-        "watchers": 0,
-        "score": 0
-    }
-]
\ No newline at end of file
diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json
index 4072469907..955bc0c9a1 100644
--- a/2021/CVE-2021-34527.json
+++ b/2021/CVE-2021-34527.json
@@ -1,31 +1,4 @@
 [
-    {
-        "id": 382267064,
-        "name": "PrintNightmare",
-        "full_name": "glshnu\/PrintNightmare",
-        "owner": {
-            "login": "glshnu",
-            "id": 7205231,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7205231?v=4",
-            "html_url": "https:\/\/github.com\/glshnu"
-        },
-        "html_url": "https:\/\/github.com\/glshnu\/PrintNightmare",
-        "description": "Kritische Sicherheitslücke PrintNightmare CVE-2021-34527",
-        "fork": false,
-        "created_at": "2021-07-02T07:30:52Z",
-        "updated_at": "2021-08-05T03:00:36Z",
-        "pushed_at": "2021-07-12T15:07:05Z",
-        "stargazers_count": 4,
-        "watchers_count": 4,
-        "forks_count": 4,
-        "allow_forking": true,
-        "is_template": false,
-        "topics": [],
-        "visibility": "public",
-        "forks": 4,
-        "watchers": 4,
-        "score": 0
-    },
     {
         "id": 382645654,
         "name": "PrintNightmare-CVE-2021-34527",
diff --git a/2021/CVE-2021-34558.json b/2021/CVE-2021-34558.json
deleted file mode 100644
index 45b2e9c764..0000000000
--- a/2021/CVE-2021-34558.json
+++ /dev/null
@@ -1,29 +0,0 @@
-[
-    {
-        "id": 385496417,
-        "name": "cve-2021-34558",
-        "full_name": "alexzorin\/cve-2021-34558",
-        "owner": {
-            "login": "alexzorin",
-            "id": 311534,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/311534?v=4",
-            "html_url": "https:\/\/github.com\/alexzorin"
-        },
-        "html_url": "https:\/\/github.com\/alexzorin\/cve-2021-34558",
-        "description": null,
-        "fork": false,
-        "created_at": "2021-07-13T06:15:21Z",
-        "updated_at": "2021-12-15T14:42:32Z",
-        "pushed_at": "2021-07-13T06:16:11Z",
-        "stargazers_count": 35,
-        "watchers_count": 35,
-        "forks_count": 2,
-        "allow_forking": true,
-        "is_template": false,
-        "topics": [],
-        "visibility": "public",
-        "forks": 2,
-        "watchers": 35,
-        "score": 0
-    }
-]
\ No newline at end of file
diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json
index 2ac3a586a4..ca0f5860c7 100644
--- a/2021/CVE-2021-40444.json
+++ b/2021/CVE-2021-40444.json
@@ -229,17 +229,17 @@
         "description": "CVE-2021-40444 PoC",
         "fork": false,
         "created_at": "2021-09-10T16:55:53Z",
-        "updated_at": "2021-12-23T10:21:35Z",
+        "updated_at": "2021-12-24T06:31:03Z",
         "pushed_at": "2021-09-11T09:50:26Z",
-        "stargazers_count": 1331,
-        "watchers_count": 1331,
+        "stargazers_count": 1332,
+        "watchers_count": 1332,
         "forks_count": 437,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 437,
-        "watchers": 1331,
+        "watchers": 1332,
         "score": 0
     },
     {
@@ -256,17 +256,17 @@
         "description": null,
         "fork": false,
         "created_at": "2021-09-11T02:49:37Z",
-        "updated_at": "2021-12-15T14:42:58Z",
+        "updated_at": "2021-12-24T11:57:05Z",
         "pushed_at": "2021-09-11T02:49:31Z",
-        "stargazers_count": 6,
-        "watchers_count": 6,
+        "stargazers_count": 5,
+        "watchers_count": 5,
         "forks_count": 3,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 3,
-        "watchers": 6,
+        "watchers": 5,
         "score": 0
     },
     {
@@ -553,10 +553,10 @@
         "description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
         "fork": false,
         "created_at": "2021-09-15T22:34:35Z",
-        "updated_at": "2021-12-23T23:25:23Z",
+        "updated_at": "2021-12-24T11:05:28Z",
         "pushed_at": "2021-10-12T23:05:07Z",
-        "stargazers_count": 532,
-        "watchers_count": 532,
+        "stargazers_count": 536,
+        "watchers_count": 536,
         "forks_count": 120,
         "allow_forking": true,
         "is_template": false,
@@ -570,7 +570,7 @@
         ],
         "visibility": "public",
         "forks": 120,
-        "watchers": 532,
+        "watchers": 536,
         "score": 0
     },
     {
@@ -923,17 +923,17 @@
         "description": "CVE-2021-40444",
         "fork": false,
         "created_at": "2021-12-19T08:16:07Z",
-        "updated_at": "2021-12-24T03:57:30Z",
+        "updated_at": "2021-12-24T09:40:59Z",
         "pushed_at": "2021-12-19T08:27:33Z",
-        "stargazers_count": 28,
-        "watchers_count": 28,
+        "stargazers_count": 30,
+        "watchers_count": 30,
         "forks_count": 8,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 8,
-        "watchers": 28,
+        "watchers": 30,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2021/CVE-2021-40449.json b/2021/CVE-2021-40449.json
index 4c908f997d..144d01aab7 100644
--- a/2021/CVE-2021-40449.json
+++ b/2021/CVE-2021-40449.json
@@ -40,17 +40,17 @@
         "description": "windows 10 14393 LPE",
         "fork": false,
         "created_at": "2021-10-20T09:24:36Z",
-        "updated_at": "2021-12-23T10:28:19Z",
+        "updated_at": "2021-12-24T10:53:29Z",
         "pushed_at": "2021-10-28T03:51:09Z",
-        "stargazers_count": 74,
-        "watchers_count": 74,
+        "stargazers_count": 75,
+        "watchers_count": 75,
         "forks_count": 33,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 33,
-        "watchers": 74,
+        "watchers": 75,
         "score": 0
     },
     {
diff --git a/2021/CVE-2021-42013.json b/2021/CVE-2021-42013.json
index a9863a8131..7a7f5a2858 100644
--- a/2021/CVE-2021-42013.json
+++ b/2021/CVE-2021-42013.json
@@ -293,8 +293,8 @@
         "description": "Apache 远程代码执行 (CVE-2021-42013)批量检测工具:Apache HTTP Server是美国阿帕奇(Apache)基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点,发现 Apache HTTP Server 2.4.50 中针对 CVE-2021-41773 的修复不够充分。攻击者可以使用路径遍历攻击将 URL 映射到由类似别名的指令配置的目录之外的文件。如果这些目录之外的文件不受通常的默认配置“要求全部拒绝”的保护,则这些请求可能会成功。如果还为这些别名路径启用了 CGI 脚本,则这可能允许远程代码执行。此问题仅影响 Apache 2.4.49 和 Apache 2.4.50,而不影响更早版本。",
         "fork": false,
         "created_at": "2021-12-23T14:46:41Z",
-        "updated_at": "2021-12-23T15:51:43Z",
-        "pushed_at": "2021-12-23T15:51:41Z",
+        "updated_at": "2021-12-24T07:38:42Z",
+        "pushed_at": "2021-12-24T07:38:39Z",
         "stargazers_count": 2,
         "watchers_count": 2,
         "forks_count": 0,
diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json
index ad0d2a489e..c25db28f0c 100644
--- a/2021/CVE-2021-42278.json
+++ b/2021/CVE-2021-42278.json
@@ -13,10 +13,10 @@
         "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
         "fork": false,
         "created_at": "2021-12-11T15:10:30Z",
-        "updated_at": "2021-12-24T05:59:54Z",
+        "updated_at": "2021-12-24T09:56:02Z",
         "pushed_at": "2021-12-21T10:11:05Z",
-        "stargazers_count": 647,
-        "watchers_count": 647,
+        "stargazers_count": 650,
+        "watchers_count": 650,
         "forks_count": 134,
         "allow_forking": true,
         "is_template": false,
@@ -28,7 +28,7 @@
         ],
         "visibility": "public",
         "forks": 134,
-        "watchers": 647,
+        "watchers": 650,
         "score": 0
     },
     {
@@ -45,17 +45,17 @@
         "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
         "fork": false,
         "created_at": "2021-12-13T10:28:12Z",
-        "updated_at": "2021-12-23T22:19:02Z",
+        "updated_at": "2021-12-24T09:28:32Z",
         "pushed_at": "2021-12-20T04:51:01Z",
-        "stargazers_count": 160,
-        "watchers_count": 160,
+        "stargazers_count": 161,
+        "watchers_count": 161,
         "forks_count": 29,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 29,
-        "watchers": 160,
+        "watchers": 161,
         "score": 0
     },
     {
@@ -99,17 +99,17 @@
         "description": "Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)",
         "fork": false,
         "created_at": "2021-12-13T23:15:05Z",
-        "updated_at": "2021-12-22T10:08:04Z",
+        "updated_at": "2021-12-24T09:50:08Z",
         "pushed_at": "2021-12-13T23:15:47Z",
-        "stargazers_count": 162,
-        "watchers_count": 162,
-        "forks_count": 22,
+        "stargazers_count": 164,
+        "watchers_count": 164,
+        "forks_count": 23,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 22,
-        "watchers": 162,
+        "forks": 23,
+        "watchers": 164,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json
index 6a5ed784fb..0685e72724 100644
--- a/2021/CVE-2021-42287.json
+++ b/2021/CVE-2021-42287.json
@@ -13,17 +13,17 @@
         "description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
         "fork": false,
         "created_at": "2021-12-11T19:27:30Z",
-        "updated_at": "2021-12-24T05:14:10Z",
+        "updated_at": "2021-12-24T11:43:43Z",
         "pushed_at": "2021-12-16T09:50:15Z",
-        "stargazers_count": 937,
-        "watchers_count": 937,
-        "forks_count": 245,
+        "stargazers_count": 939,
+        "watchers_count": 939,
+        "forks_count": 246,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 245,
-        "watchers": 937,
+        "forks": 246,
+        "watchers": 939,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2021/CVE-2021-43224.json b/2021/CVE-2021-43224.json
index bb977cafe3..285c2e6ec5 100644
--- a/2021/CVE-2021-43224.json
+++ b/2021/CVE-2021-43224.json
@@ -13,17 +13,17 @@
         "description": "Windows Common Log File System Driver  POC",
         "fork": false,
         "created_at": "2021-12-21T01:51:41Z",
-        "updated_at": "2021-12-24T04:02:58Z",
+        "updated_at": "2021-12-24T11:44:39Z",
         "pushed_at": "2021-12-21T06:57:06Z",
-        "stargazers_count": 54,
-        "watchers_count": 54,
+        "stargazers_count": 57,
+        "watchers_count": 57,
         "forks_count": 16,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 16,
-        "watchers": 54,
+        "watchers": 57,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2021/CVE-2021-43798.json b/2021/CVE-2021-43798.json
index d5195c2f8f..e7b31f8cdd 100644
--- a/2021/CVE-2021-43798.json
+++ b/2021/CVE-2021-43798.json
@@ -183,10 +183,10 @@
         "description": "A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins \/ extract secret_key \/ decrypt data_source info automatic.",
         "fork": false,
         "created_at": "2021-12-07T15:11:34Z",
-        "updated_at": "2021-12-24T02:42:26Z",
+        "updated_at": "2021-12-24T08:41:37Z",
         "pushed_at": "2021-12-09T07:22:26Z",
-        "stargazers_count": 177,
-        "watchers_count": 177,
+        "stargazers_count": 176,
+        "watchers_count": 176,
         "forks_count": 24,
         "allow_forking": true,
         "is_template": false,
@@ -197,7 +197,7 @@
         ],
         "visibility": "public",
         "forks": 24,
-        "watchers": 177,
+        "watchers": 176,
         "score": 0
     },
     {
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
index a79c3e8de9..16537adeb7 100644
--- a/2021/CVE-2021-44228.json
+++ b/2021/CVE-2021-44228.json
@@ -94,17 +94,17 @@
         "description": "Remote Code Injection In Log4j",
         "fork": false,
         "created_at": "2021-12-10T05:23:44Z",
-        "updated_at": "2021-12-24T06:04:29Z",
+        "updated_at": "2021-12-24T08:54:55Z",
         "pushed_at": "2021-12-14T15:30:16Z",
-        "stargazers_count": 269,
-        "watchers_count": 269,
-        "forks_count": 75,
+        "stargazers_count": 272,
+        "watchers_count": 272,
+        "forks_count": 76,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 75,
-        "watchers": 269,
+        "forks": 76,
+        "watchers": 272,
         "score": 0
     },
     {
@@ -390,17 +390,17 @@
         "description": "Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.",
         "fork": false,
         "created_at": "2021-12-10T12:38:20Z",
-        "updated_at": "2021-12-24T04:32:26Z",
-        "pushed_at": "2021-12-20T22:54:49Z",
-        "stargazers_count": 827,
-        "watchers_count": 827,
-        "forks_count": 325,
+        "updated_at": "2021-12-24T10:17:16Z",
+        "pushed_at": "2021-12-24T08:51:30Z",
+        "stargazers_count": 829,
+        "watchers_count": 829,
+        "forks_count": 327,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 325,
-        "watchers": 827,
+        "forks": 327,
+        "watchers": 829,
         "score": 0
     },
     {
@@ -858,10 +858,10 @@
         "description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches",
         "fork": false,
         "created_at": "2021-12-10T22:35:00Z",
-        "updated_at": "2021-12-23T19:33:22Z",
+        "updated_at": "2021-12-24T07:37:11Z",
         "pushed_at": "2021-12-20T18:11:42Z",
-        "stargazers_count": 538,
-        "watchers_count": 538,
+        "stargazers_count": 539,
+        "watchers_count": 539,
         "forks_count": 84,
         "allow_forking": true,
         "is_template": false,
@@ -888,7 +888,7 @@
         ],
         "visibility": "public",
         "forks": 84,
-        "watchers": 538,
+        "watchers": 539,
         "score": 0
     },
     {
@@ -905,11 +905,11 @@
         "description": "A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. ",
         "fork": false,
         "created_at": "2021-12-10T23:19:28Z",
-        "updated_at": "2021-12-24T02:59:58Z",
+        "updated_at": "2021-12-24T09:30:01Z",
         "pushed_at": "2021-12-22T20:14:52Z",
-        "stargazers_count": 968,
-        "watchers_count": 968,
-        "forks_count": 233,
+        "stargazers_count": 975,
+        "watchers_count": 975,
+        "forks_count": 234,
         "allow_forking": true,
         "is_template": false,
         "topics": [
@@ -919,8 +919,8 @@
             "security"
         ],
         "visibility": "public",
-        "forks": 233,
-        "watchers": 968,
+        "forks": 234,
+        "watchers": 975,
         "score": 0
     },
     {
@@ -1233,11 +1233,11 @@
         "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
         "fork": false,
         "created_at": "2021-12-11T07:19:11Z",
-        "updated_at": "2021-12-24T05:35:50Z",
-        "pushed_at": "2021-12-23T15:22:33Z",
-        "stargazers_count": 135,
-        "watchers_count": 135,
-        "forks_count": 44,
+        "updated_at": "2021-12-24T08:18:36Z",
+        "pushed_at": "2021-12-24T07:00:13Z",
+        "stargazers_count": 138,
+        "watchers_count": 138,
+        "forks_count": 45,
         "allow_forking": true,
         "is_template": false,
         "topics": [
@@ -1246,8 +1246,8 @@
             "log4j2"
         ],
         "visibility": "public",
-        "forks": 44,
-        "watchers": 135,
+        "forks": 45,
+        "watchers": 138,
         "score": 0
     },
     {
@@ -1372,10 +1372,10 @@
         "description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
         "fork": false,
         "created_at": "2021-12-11T11:18:46Z",
-        "updated_at": "2021-12-24T03:54:30Z",
+        "updated_at": "2021-12-24T09:26:08Z",
         "pushed_at": "2021-12-23T03:42:30Z",
-        "stargazers_count": 658,
-        "watchers_count": 658,
+        "stargazers_count": 660,
+        "watchers_count": 660,
         "forks_count": 130,
         "allow_forking": true,
         "is_template": false,
@@ -1391,7 +1391,7 @@
         ],
         "visibility": "public",
         "forks": 130,
-        "watchers": 658,
+        "watchers": 660,
         "score": 0
     },
     {
@@ -1462,8 +1462,8 @@
         "description": null,
         "fork": false,
         "created_at": "2021-12-11T12:16:45Z",
-        "updated_at": "2021-12-23T16:20:02Z",
-        "pushed_at": "2021-12-23T16:19:59Z",
+        "updated_at": "2021-12-24T11:01:22Z",
+        "pushed_at": "2021-12-24T11:02:55Z",
         "stargazers_count": 1,
         "watchers_count": 1,
         "forks_count": 1,
@@ -1887,7 +1887,7 @@
         "pushed_at": "2021-12-22T17:26:01Z",
         "stargazers_count": 523,
         "watchers_count": 523,
-        "forks_count": 83,
+        "forks_count": 84,
         "allow_forking": true,
         "is_template": false,
         "topics": [
@@ -1904,7 +1904,7 @@
             "vulnerability-scanner"
         ],
         "visibility": "public",
-        "forks": 83,
+        "forks": 84,
         "watchers": 523,
         "score": 0
     },
@@ -2504,17 +2504,17 @@
         "description": "Scan systems and docker images for potential log4j vulnerabilities. Able to patch (remove JndiLookup.class) from layered archives. Will detect in-depth (layered archives jar\/zip\/tar\/war and scans for vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046 and CVE-2021-45105). Binaries for Windows, Linux and OsX, but can be build on each platform supported by supported Golang.",
         "fork": false,
         "created_at": "2021-12-12T12:16:07Z",
-        "updated_at": "2021-12-23T19:53:53Z",
+        "updated_at": "2021-12-24T07:53:50Z",
         "pushed_at": "2021-12-23T19:53:50Z",
-        "stargazers_count": 41,
-        "watchers_count": 41,
+        "stargazers_count": 42,
+        "watchers_count": 42,
         "forks_count": 6,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 6,
-        "watchers": 41,
+        "watchers": 42,
         "score": 0
     },
     {
@@ -2839,17 +2839,17 @@
         "description": "A Byte Buddy Java agent-based fix for CVE-2021-44228, the log4j 2.x \"JNDI LDAP\" vulnerability.",
         "fork": false,
         "created_at": "2021-12-12T15:29:20Z",
-        "updated_at": "2021-12-22T08:29:14Z",
+        "updated_at": "2021-12-24T10:34:52Z",
         "pushed_at": "2021-12-22T16:09:08Z",
-        "stargazers_count": 65,
-        "watchers_count": 65,
+        "stargazers_count": 66,
+        "watchers_count": 66,
         "forks_count": 10,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 10,
-        "watchers": 65,
+        "watchers": 66,
         "score": 0
     },
     {
@@ -3536,17 +3536,17 @@
         "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
         "fork": false,
         "created_at": "2021-12-13T03:57:50Z",
-        "updated_at": "2021-12-24T05:47:23Z",
+        "updated_at": "2021-12-24T12:11:06Z",
         "pushed_at": "2021-12-23T17:05:14Z",
-        "stargazers_count": 2300,
-        "watchers_count": 2300,
-        "forks_count": 529,
+        "stargazers_count": 2315,
+        "watchers_count": 2315,
+        "forks_count": 530,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 529,
-        "watchers": 2300,
+        "forks": 530,
+        "watchers": 2315,
         "score": 0
     },
     {
@@ -3567,12 +3567,12 @@
         "pushed_at": "2021-12-22T18:22:42Z",
         "stargazers_count": 222,
         "watchers_count": 222,
-        "forks_count": 75,
+        "forks_count": 76,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 75,
+        "forks": 76,
         "watchers": 222,
         "score": 0
     },
@@ -3979,17 +3979,17 @@
         "description": "Burp extension to scan Log4Shell (CVE-2021-44228) vulnerability pre and post auth.",
         "fork": false,
         "created_at": "2021-12-13T11:06:46Z",
-        "updated_at": "2021-12-24T02:03:55Z",
+        "updated_at": "2021-12-24T08:19:15Z",
         "pushed_at": "2021-12-16T06:53:21Z",
-        "stargazers_count": 42,
-        "watchers_count": 42,
+        "stargazers_count": 43,
+        "watchers_count": 43,
         "forks_count": 14,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 14,
-        "watchers": 42,
+        "watchers": 43,
         "score": 0
     },
     {
@@ -4377,6 +4377,41 @@
         "watchers": 0,
         "score": 0
     },
+    {
+        "id": 437948564,
+        "name": "log4shell_ioc_ips",
+        "full_name": "hackinghippo\/log4shell_ioc_ips",
+        "owner": {
+            "login": "hackinghippo",
+            "id": 96073490,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96073490?v=4",
+            "html_url": "https:\/\/github.com\/hackinghippo"
+        },
+        "html_url": "https:\/\/github.com\/hackinghippo\/log4shell_ioc_ips",
+        "description": "log4j \/ log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon  (CVE-2021-44228)",
+        "fork": false,
+        "created_at": "2021-12-13T16:39:16Z",
+        "updated_at": "2021-12-24T12:00:31Z",
+        "pushed_at": "2021-12-24T12:00:29Z",
+        "stargazers_count": 22,
+        "watchers_count": 22,
+        "forks_count": 9,
+        "allow_forking": true,
+        "is_template": false,
+        "topics": [
+            "cve",
+            "cve-2021-44228",
+            "ioc",
+            "list",
+            "log4j",
+            "log4shell",
+            "shell4log"
+        ],
+        "visibility": "public",
+        "forks": 9,
+        "watchers": 22,
+        "score": 0
+    },
     {
         "id": 437948858,
         "name": "log4j-1.2.15-mod",
@@ -4858,17 +4893,17 @@
         "description": "PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs",
         "fork": false,
         "created_at": "2021-12-13T21:39:51Z",
-        "updated_at": "2021-12-23T21:09:08Z",
+        "updated_at": "2021-12-24T08:28:51Z",
         "pushed_at": "2021-12-21T01:24:46Z",
-        "stargazers_count": 255,
-        "watchers_count": 255,
-        "forks_count": 26,
+        "stargazers_count": 256,
+        "watchers_count": 256,
+        "forks_count": 27,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 26,
-        "watchers": 255,
+        "forks": 27,
+        "watchers": 256,
         "score": 0
     },
     {
@@ -5402,11 +5437,11 @@
         "description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)",
         "fork": false,
         "created_at": "2021-12-14T10:04:42Z",
-        "updated_at": "2021-12-24T00:01:59Z",
+        "updated_at": "2021-12-24T11:58:29Z",
         "pushed_at": "2021-12-23T22:12:36Z",
-        "stargazers_count": 342,
-        "watchers_count": 342,
-        "forks_count": 63,
+        "stargazers_count": 346,
+        "watchers_count": 346,
+        "forks_count": 65,
         "allow_forking": true,
         "is_template": false,
         "topics": [
@@ -5420,8 +5455,8 @@
             "python"
         ],
         "visibility": "public",
-        "forks": 63,
-        "watchers": 342,
+        "forks": 65,
+        "watchers": 346,
         "score": 0
     },
     {
@@ -5438,17 +5473,17 @@
         "description": null,
         "fork": false,
         "created_at": "2021-12-14T12:37:23Z",
-        "updated_at": "2021-12-24T05:56:54Z",
+        "updated_at": "2021-12-24T08:20:54Z",
         "pushed_at": "2021-12-23T15:14:47Z",
-        "stargazers_count": 44,
-        "watchers_count": 44,
+        "stargazers_count": 45,
+        "watchers_count": 45,
         "forks_count": 8,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 8,
-        "watchers": 44,
+        "watchers": 45,
         "score": 0
     },
     {
@@ -5708,17 +5743,17 @@
         "description": "Tools for investigating Log4j CVE-2021-44228",
         "fork": false,
         "created_at": "2021-12-14T19:08:14Z",
-        "updated_at": "2021-12-23T21:03:12Z",
+        "updated_at": "2021-12-24T10:51:40Z",
         "pushed_at": "2021-12-23T21:03:08Z",
-        "stargazers_count": 79,
-        "watchers_count": 79,
+        "stargazers_count": 80,
+        "watchers_count": 80,
         "forks_count": 6,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 6,
-        "watchers": 79,
+        "watchers": 80,
         "score": 0
     },
     {
@@ -5853,8 +5888,8 @@
         "description": "CVE-2021-44228 Log4J multithreaded Mass Exploitation tool compatible with URL\/IP lists.",
         "fork": false,
         "created_at": "2021-12-14T22:19:29Z",
-        "updated_at": "2021-12-23T20:55:16Z",
-        "pushed_at": "2021-12-23T12:47:21Z",
+        "updated_at": "2021-12-24T08:58:53Z",
+        "pushed_at": "2021-12-24T08:58:51Z",
         "stargazers_count": 2,
         "watchers_count": 2,
         "forks_count": 0,
@@ -5983,17 +6018,17 @@
         "description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228",
         "fork": false,
         "created_at": "2021-12-14T23:33:51Z",
-        "updated_at": "2021-12-24T04:03:41Z",
+        "updated_at": "2021-12-24T08:47:17Z",
         "pushed_at": "2021-12-23T20:16:12Z",
-        "stargazers_count": 237,
-        "watchers_count": 237,
+        "stargazers_count": 238,
+        "watchers_count": 238,
         "forks_count": 57,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 57,
-        "watchers": 237,
+        "watchers": 238,
         "score": 0
     },
     {
@@ -6483,17 +6518,17 @@
         "description": "we are providing DevOps and security teams script to identify cloud workloads that may be vulnerable to the Log4j vulnerability(CVE-2021-44228) in their AWS account. The script enables security teams to identify external-facing AWS assets by running the exploit on them, and thus be able to map them and quickly patch them",
         "fork": false,
         "created_at": "2021-12-15T15:42:06Z",
-        "updated_at": "2021-12-21T22:56:53Z",
+        "updated_at": "2021-12-24T09:10:14Z",
         "pushed_at": "2021-12-17T16:00:03Z",
-        "stargazers_count": 10,
-        "watchers_count": 10,
+        "stargazers_count": 11,
+        "watchers_count": 11,
         "forks_count": 1,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 1,
-        "watchers": 10,
+        "watchers": 11,
         "score": 0
     },
     {
@@ -6999,7 +7034,7 @@
         "fork": false,
         "created_at": "2021-12-16T11:54:11Z",
         "updated_at": "2021-12-23T18:54:42Z",
-        "pushed_at": "2021-12-23T14:49:04Z",
+        "pushed_at": "2021-12-24T11:32:13Z",
         "stargazers_count": 7,
         "watchers_count": 7,
         "forks_count": 1,
@@ -8149,6 +8184,33 @@
         "watchers": 1,
         "score": 0
     },
+    {
+        "id": 439698618,
+        "name": "log4shell-docker-lab",
+        "full_name": "axelcurmi\/log4shell-docker-lab",
+        "owner": {
+            "login": "axelcurmi",
+            "id": 23001923,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23001923?v=4",
+            "html_url": "https:\/\/github.com\/axelcurmi"
+        },
+        "html_url": "https:\/\/github.com\/axelcurmi\/log4shell-docker-lab",
+        "description": "Log4Shell (CVE-2021-44228) docker lab",
+        "fork": false,
+        "created_at": "2021-12-18T19:30:35Z",
+        "updated_at": "2021-12-24T10:28:50Z",
+        "pushed_at": "2021-12-24T10:28:47Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "forks_count": 0,
+        "allow_forking": true,
+        "is_template": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 0,
+        "watchers": 0,
+        "score": 0
+    },
     {
         "id": 439712818,
         "name": "log4j-2021-vulnerability-study",
@@ -8244,8 +8306,8 @@
         "description": "Vulnerability analysis, patch management and exploitation tool forCVE-2021-44228 \/ CVE-2021-45046 \/ CVE-2021-4104",
         "fork": false,
         "created_at": "2021-12-19T05:13:25Z",
-        "updated_at": "2021-12-19T18:11:23Z",
-        "pushed_at": "2021-12-19T18:11:20Z",
+        "updated_at": "2021-12-24T09:42:14Z",
+        "pushed_at": "2021-12-24T07:00:28Z",
         "stargazers_count": 1,
         "watchers_count": 1,
         "forks_count": 1,
@@ -8894,11 +8956,11 @@
         "description": "Ansible detector scanner playbook to verify target Linux hosts using the official Red Hat Log4j detector script RHSB-2021-009 Remote Code Execution - log4j (CVE-2021-44228)",
         "fork": false,
         "created_at": "2021-12-21T22:14:24Z",
-        "updated_at": "2021-12-24T03:45:39Z",
+        "updated_at": "2021-12-24T10:57:33Z",
         "pushed_at": "2021-12-23T22:22:23Z",
-        "stargazers_count": 44,
-        "watchers_count": 44,
-        "forks_count": 3,
+        "stargazers_count": 47,
+        "watchers_count": 47,
+        "forks_count": 4,
         "allow_forking": true,
         "is_template": false,
         "topics": [
@@ -8910,8 +8972,8 @@
             "security"
         ],
         "visibility": "public",
-        "forks": 3,
-        "watchers": 44,
+        "forks": 4,
+        "watchers": 47,
         "score": 0
     },
     {
@@ -8928,8 +8990,8 @@
         "description": "Log4Shell Demo with AWS",
         "fork": false,
         "created_at": "2021-12-22T03:34:40Z",
-        "updated_at": "2021-12-22T04:05:07Z",
-        "pushed_at": "2021-12-22T03:35:44Z",
+        "updated_at": "2021-12-24T08:56:47Z",
+        "pushed_at": "2021-12-24T08:56:44Z",
         "stargazers_count": 0,
         "watchers_count": 0,
         "forks_count": 0,
@@ -9051,20 +9113,20 @@
     },
     {
         "id": 440898542,
-        "name": "Log4JChecker",
-        "full_name": "NatteeSetobol\/Log4JChecker",
+        "name": "Log4JPOC",
+        "full_name": "NatteeSetobol\/Log4JPOC",
         "owner": {
             "login": "NatteeSetobol",
             "id": 6789925,
             "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6789925?v=4",
             "html_url": "https:\/\/github.com\/NatteeSetobol"
         },
-        "html_url": "https:\/\/github.com\/NatteeSetobol\/Log4JChecker",
-        "description": "Log4JChecker checks for CVE-2021-44228 vulnerability",
+        "html_url": "https:\/\/github.com\/NatteeSetobol\/Log4JPOC",
+        "description": "POC for CVE-2021-44228 vulnerability",
         "fork": false,
         "created_at": "2021-12-22T15:15:12Z",
-        "updated_at": "2021-12-23T01:54:05Z",
-        "pushed_at": "2021-12-23T01:54:02Z",
+        "updated_at": "2021-12-24T10:15:11Z",
+        "pushed_at": "2021-12-24T10:14:43Z",
         "stargazers_count": 0,
         "watchers_count": 0,
         "forks_count": 0,
@@ -9208,13 +9270,67 @@
         "pushed_at": "2021-12-24T02:39:06Z",
         "stargazers_count": 2,
         "watchers_count": 2,
+        "forks_count": 1,
+        "allow_forking": true,
+        "is_template": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 1,
+        "watchers": 2,
+        "score": 0
+    },
+    {
+        "id": 441364313,
+        "name": "log4j-CVE-2021-44228-workaround",
+        "full_name": "grimch\/log4j-CVE-2021-44228-workaround",
+        "owner": {
+            "login": "grimch",
+            "id": 58831200,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58831200?v=4",
+            "html_url": "https:\/\/github.com\/grimch"
+        },
+        "html_url": "https:\/\/github.com\/grimch\/log4j-CVE-2021-44228-workaround",
+        "description": "general purpose workaround for the log4j CVE-2021-44228 vulnerability",
+        "fork": false,
+        "created_at": "2021-12-24T04:23:17Z",
+        "updated_at": "2021-12-24T06:54:25Z",
+        "pushed_at": "2021-12-24T06:54:22Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
         "forks_count": 0,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 0,
-        "watchers": 2,
+        "watchers": 0,
+        "score": 0
+    },
+    {
+        "id": 441423344,
+        "name": "log4j-shell-csw",
+        "full_name": "cybersecurityworks553\/log4j-shell-csw",
+        "owner": {
+            "login": "cybersecurityworks553",
+            "id": 63910792,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63910792?v=4",
+            "html_url": "https:\/\/github.com\/cybersecurityworks553"
+        },
+        "html_url": "https:\/\/github.com\/cybersecurityworks553\/log4j-shell-csw",
+        "description": "A Proof-Of-Concept Exploit for CVE-2021-44228 vulnerability.",
+        "fork": false,
+        "created_at": "2021-12-24T09:26:38Z",
+        "updated_at": "2021-12-24T10:16:13Z",
+        "pushed_at": "2021-12-24T10:16:10Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "forks_count": 0,
+        "allow_forking": true,
+        "is_template": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 0,
+        "watchers": 0,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2021/CVE-2021-44659.json b/2021/CVE-2021-44659.json
index 10f1d53b4c..45dc99b06e 100644
--- a/2021/CVE-2021-44659.json
+++ b/2021/CVE-2021-44659.json
@@ -13,17 +13,17 @@
         "description": null,
         "fork": false,
         "created_at": "2021-12-22T14:46:21Z",
-        "updated_at": "2021-12-22T21:34:28Z",
+        "updated_at": "2021-12-24T06:56:19Z",
         "pushed_at": "2021-12-22T21:34:25Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
+        "stargazers_count": 1,
+        "watchers_count": 1,
         "forks_count": 0,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 0,
-        "watchers": 0,
+        "watchers": 1,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2021/CVE-2021-45046.json b/2021/CVE-2021-45046.json
index fff54248ad..c0f96e3b18 100644
--- a/2021/CVE-2021-45046.json
+++ b/2021/CVE-2021-45046.json
@@ -209,17 +209,44 @@
         "description": "Log4j 漏洞本地检测脚本。 Scan all java processes on your host to check whether it's affected by log4j2 remote code execution vulnerability (CVE-2021-45046)",
         "fork": false,
         "created_at": "2021-12-20T12:07:41Z",
-        "updated_at": "2021-12-24T05:45:42Z",
+        "updated_at": "2021-12-24T07:31:24Z",
         "pushed_at": "2021-12-22T06:24:42Z",
-        "stargazers_count": 68,
-        "watchers_count": 68,
+        "stargazers_count": 70,
+        "watchers_count": 70,
         "forks_count": 7,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 7,
-        "watchers": 68,
+        "watchers": 70,
+        "score": 0
+    },
+    {
+        "id": 441418197,
+        "name": "Log4Shell-Sandbox-Signature",
+        "full_name": "CaptanMoss\/Log4Shell-Sandbox-Signature",
+        "owner": {
+            "login": "CaptanMoss",
+            "id": 10811344,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10811344?v=4",
+            "html_url": "https:\/\/github.com\/CaptanMoss"
+        },
+        "html_url": "https:\/\/github.com\/CaptanMoss\/Log4Shell-Sandbox-Signature",
+        "description": "Log4Shell(CVE-2021-45046) Sandbox Signature",
+        "fork": false,
+        "created_at": "2021-12-24T09:02:55Z",
+        "updated_at": "2021-12-24T09:31:46Z",
+        "pushed_at": "2021-12-24T09:31:43Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "forks_count": 0,
+        "allow_forking": true,
+        "is_template": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 0,
+        "watchers": 0,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/README.md b/README.md
index 48583468f1..8b9e1e47dd 100644
--- a/README.md
+++ b/README.md
@@ -804,7 +804,6 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability due to
 - [xnianq/cve-2021-21985_exp](https://github.com/xnianq/cve-2021-21985_exp)
 - [daedalus/CVE-2021-21985](https://github.com/daedalus/CVE-2021-21985)
 - [testanull/Project_CVE-2021-21985_PoC](https://github.com/testanull/Project_CVE-2021-21985_PoC)
-- [haiclover/CVE-2021-21985](https://github.com/haiclover/CVE-2021-21985)
 - [sknux/CVE-2021-21985_PoC](https://github.com/sknux/CVE-2021-21985_PoC)
 
 ### CVE-2021-22005 (2021-09-23)
@@ -1890,7 +1889,6 @@ A remote code execution issue was discovered in the web UI of VoIPmonitor before
 - [daedalus/CVE-2021-30461](https://github.com/daedalus/CVE-2021-30461)
 - [Vulnmachines/CVE-2021-30461](https://github.com/Vulnmachines/CVE-2021-30461)
 - [Al1ex/CVE-2021-30461](https://github.com/Al1ex/CVE-2021-30461)
-- [puckiestyle/CVE-2021-30461](https://github.com/puckiestyle/CVE-2021-30461)
 
 ### CVE-2021-30481 (2021-04-10)
 
@@ -2328,14 +2326,6 @@ Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique
 - [KaLendsi/CVE-2021-34486](https://github.com/KaLendsi/CVE-2021-34486)
 - [b1tg/CVE-2021-34486-exp](https://github.com/b1tg/CVE-2021-34486-exp)
 
-### CVE-2021-34496 (2021-07-14)
-
-<code>
-Windows GDI Information Disclosure Vulnerability
-</code>
-
-- [fkm75P8YjLkb/CVE-2021-34496](https://github.com/fkm75P8YjLkb/CVE-2021-34496)
-
 ### CVE-2021-34523 (2021-07-14)
 
 <code>
@@ -2350,21 +2340,12 @@ Microsoft Exchange Server Elevation of Privilege Vulnerability This CVE ID is un
 Windows Print Spooler Remote Code Execution Vulnerability
 </code>
 
-- [glshnu/PrintNightmare](https://github.com/glshnu/PrintNightmare)
 - [nemo-wq/PrintNightmare-CVE-2021-34527](https://github.com/nemo-wq/PrintNightmare-CVE-2021-34527)
 - [byt3bl33d3r/ItWasAllADream](https://github.com/byt3bl33d3r/ItWasAllADream)
 - [0xirison/PrintNightmare-Patcher](https://github.com/0xirison/PrintNightmare-Patcher)
 - [Tomparte/PrintNightmare](https://github.com/Tomparte/PrintNightmare)
 - [Amaranese/CVE-2021-34527](https://github.com/Amaranese/CVE-2021-34527)
 
-### CVE-2021-34558 (2021-07-15)
-
-<code>
-The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.
-</code>
-
-- [alexzorin/cve-2021-34558](https://github.com/alexzorin/cve-2021-34558)
-
 ### CVE-2021-34646 (2021-08-30)
 
 <code>
@@ -3899,6 +3880,7 @@ Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features u
 - [AlexandreHeroux/Fix-CVE-2021-44228](https://github.com/AlexandreHeroux/Fix-CVE-2021-44228)
 - [kossatzd/log4j-CVE-2021-44228-test](https://github.com/kossatzd/log4j-CVE-2021-44228-test)
 - [tobiasoed/log4j-CVE-2021-44228](https://github.com/tobiasoed/log4j-CVE-2021-44228)
+- [hackinghippo/log4shell_ioc_ips](https://github.com/hackinghippo/log4shell_ioc_ips)
 - [p3dr16k/log4j-1.2.15-mod](https://github.com/p3dr16k/log4j-1.2.15-mod)
 - [claranet/ansible-role-log4shell](https://github.com/claranet/ansible-role-log4shell)
 - [taurusxin/CVE-2021-44228](https://github.com/taurusxin/CVE-2021-44228)
@@ -4032,6 +4014,7 @@ Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features u
 - [shivakumarjayaraman/log4jvulnerability-CVE-2021-44228](https://github.com/shivakumarjayaraman/log4jvulnerability-CVE-2021-44228)
 - [j3kz/CVE-2021-44228-PoC](https://github.com/j3kz/CVE-2021-44228-PoC)
 - [Apipia/log4j-pcap-activity](https://github.com/Apipia/log4j-pcap-activity)
+- [axelcurmi/log4shell-docker-lab](https://github.com/axelcurmi/log4shell-docker-lab)
 - [otaviokr/log4j-2021-vulnerability-study](https://github.com/otaviokr/log4j-2021-vulnerability-study)
 - [kkyehit/log4j_CVE-2021-44228](https://github.com/kkyehit/log4j_CVE-2021-44228)
 - [trickyearlobe/inspec-log4j](https://github.com/trickyearlobe/inspec-log4j)
@@ -4064,12 +4047,14 @@ Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features u
 - [ossie-git/log4shell_sentinel](https://github.com/ossie-git/log4shell_sentinel)
 - [r00thunter/Log4Shell](https://github.com/r00thunter/Log4Shell)
 - [asyzdykov/cve-2021-44228-fix-jars](https://github.com/asyzdykov/cve-2021-44228-fix-jars)
-- [NatteeSetobol/Log4JChecker](https://github.com/NatteeSetobol/Log4JChecker)
+- [NatteeSetobol/Log4JPOC](https://github.com/NatteeSetobol/Log4JPOC)
 - [BJLIYANLIANG/log4j-scanner](https://github.com/BJLIYANLIANG/log4j-scanner)
 - [0x3SC4L4T3/Apache-Log4j-POC](https://github.com/0x3SC4L4T3/Apache-Log4j-POC)
 - [TaroballzChen/CVE-2021-44228-log4jVulnScanner-metasploit](https://github.com/TaroballzChen/CVE-2021-44228-log4jVulnScanner-metasploit)
 - [lucab85/ansible-role-log4shell](https://github.com/lucab85/ansible-role-log4shell)
 - [ainrm/log4j-scan](https://github.com/ainrm/log4j-scan)
+- [grimch/log4j-CVE-2021-44228-workaround](https://github.com/grimch/log4j-CVE-2021-44228-workaround)
+- [cybersecurityworks553/log4j-shell-csw](https://github.com/cybersecurityworks553/log4j-shell-csw)
 
 ### CVE-2021-44659 (2021-12-22)
 
@@ -4112,6 +4097,7 @@ It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was i
 - [lukepasek/log4jjndilookupremove](https://github.com/lukepasek/log4jjndilookupremove)
 - [ludy-dev/cve-2021-45046](https://github.com/ludy-dev/cve-2021-45046)
 - [lijiejie/log4j2_vul_local_scanner](https://github.com/lijiejie/log4j2_vul_local_scanner)
+- [CaptanMoss/Log4Shell-Sandbox-Signature](https://github.com/CaptanMoss/Log4Shell-Sandbox-Signature)
 
 ### CVE-2021-45105 (2021-12-18)