diff --git a/2014/CVE-2014-0224.json b/2014/CVE-2014-0224.json
index d97b03d1ea..5aac05724d 100644
--- a/2014/CVE-2014-0224.json
+++ b/2014/CVE-2014-0224.json
@@ -13,17 +13,17 @@
         "description": "This script is designed for detection of vulnerable servers (CVE-2014-0224.)  in a wide range of configurations.  It attempts to negotiate using each affected protocol version (SSLv3, TLSv1, TLSv1.1, and TLSv1.2) advertising a comprehensive set of ciphers.",
         "fork": false,
         "created_at": "2014-06-12T04:44:13Z",
-        "updated_at": "2021-07-19T01:55:06Z",
+        "updated_at": "2022-03-06T03:23:13Z",
         "pushed_at": "2014-07-24T20:47:27Z",
-        "stargazers_count": 36,
-        "watchers_count": 36,
+        "stargazers_count": 37,
+        "watchers_count": 37,
         "forks_count": 15,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 15,
-        "watchers": 36,
+        "watchers": 37,
         "score": 0
     },
     {
diff --git a/2015/CVE-2015-6639.json b/2015/CVE-2015-6639.json
index a5ba541e76..9bf30ce8de 100644
--- a/2015/CVE-2015-6639.json
+++ b/2015/CVE-2015-6639.json
@@ -40,17 +40,17 @@
         "description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
         "fork": false,
         "created_at": "2016-06-30T11:56:44Z",
-        "updated_at": "2022-02-17T21:04:44Z",
+        "updated_at": "2022-03-06T02:27:34Z",
         "pushed_at": "2016-06-30T15:32:42Z",
-        "stargazers_count": 316,
-        "watchers_count": 316,
+        "stargazers_count": 317,
+        "watchers_count": 317,
         "forks_count": 108,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 108,
-        "watchers": 316,
+        "watchers": 317,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2016/CVE-2016-2431.json b/2016/CVE-2016-2431.json
index 5b57ddfabc..b91d7a3faa 100644
--- a/2016/CVE-2016-2431.json
+++ b/2016/CVE-2016-2431.json
@@ -40,17 +40,17 @@
         "description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
         "fork": false,
         "created_at": "2016-06-30T11:56:44Z",
-        "updated_at": "2022-02-17T21:04:44Z",
+        "updated_at": "2022-03-06T02:27:34Z",
         "pushed_at": "2016-06-30T15:32:42Z",
-        "stargazers_count": 316,
-        "watchers_count": 316,
+        "stargazers_count": 317,
+        "watchers_count": 317,
         "forks_count": 108,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 108,
-        "watchers": 316,
+        "watchers": 317,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2017/CVE-2017-0199.json b/2017/CVE-2017-0199.json
index fcba70193b..8beabff818 100644
--- a/2017/CVE-2017-0199.json
+++ b/2017/CVE-2017-0199.json
@@ -67,17 +67,17 @@
         "description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
         "fork": false,
         "created_at": "2017-04-17T08:10:07Z",
-        "updated_at": "2022-03-05T06:44:23Z",
+        "updated_at": "2022-03-06T02:16:11Z",
         "pushed_at": "2017-11-19T11:01:16Z",
-        "stargazers_count": 671,
-        "watchers_count": 671,
+        "stargazers_count": 672,
+        "watchers_count": 672,
         "forks_count": 294,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 294,
-        "watchers": 671,
+        "watchers": 672,
         "score": 0
     },
     {
diff --git a/2017/CVE-2017-10271.json b/2017/CVE-2017-10271.json
index 918c902194..c7c1172483 100644
--- a/2017/CVE-2017-10271.json
+++ b/2017/CVE-2017-10271.json
@@ -429,17 +429,17 @@
         "description": "Java反序列化漏洞利用工具V1.0    Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。   支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
         "fork": false,
         "created_at": "2018-09-13T09:44:18Z",
-        "updated_at": "2022-02-23T01:48:08Z",
+        "updated_at": "2022-03-06T03:18:30Z",
         "pushed_at": "2020-10-01T20:20:41Z",
-        "stargazers_count": 317,
-        "watchers_count": 317,
+        "stargazers_count": 318,
+        "watchers_count": 318,
         "forks_count": 109,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 109,
-        "watchers": 317,
+        "watchers": 318,
         "score": 0
     },
     {
diff --git a/2017/CVE-2017-5674.json b/2017/CVE-2017-5674.json
index 88c3f0428f..947fdfa006 100644
--- a/2017/CVE-2017-5674.json
+++ b/2017/CVE-2017-5674.json
@@ -13,8 +13,8 @@
         "description": null,
         "fork": false,
         "created_at": "2021-05-01T14:04:58Z",
-        "updated_at": "2021-05-04T04:23:05Z",
-        "pushed_at": "2021-05-04T04:23:04Z",
+        "updated_at": "2022-03-06T05:15:35Z",
+        "pushed_at": "2022-03-06T05:15:32Z",
         "stargazers_count": 0,
         "watchers_count": 0,
         "forks_count": 0,
diff --git a/2017/CVE-2017-5689.json b/2017/CVE-2017-5689.json
index fe2a077c3f..6fee9123d7 100644
--- a/2017/CVE-2017-5689.json
+++ b/2017/CVE-2017-5689.json
@@ -94,17 +94,17 @@
         "description": "CVE-2017-5689 Proof-of-Concept exploit",
         "fork": false,
         "created_at": "2017-07-27T21:06:08Z",
-        "updated_at": "2022-03-04T20:59:30Z",
+        "updated_at": "2022-03-06T01:51:18Z",
         "pushed_at": "2017-07-27T21:08:49Z",
-        "stargazers_count": 52,
-        "watchers_count": 52,
+        "stargazers_count": 53,
+        "watchers_count": 53,
         "forks_count": 16,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 16,
-        "watchers": 52,
+        "watchers": 53,
         "score": 0
     },
     {
diff --git a/2018/CVE-2018-8060.json b/2018/CVE-2018-8060.json
index 1fa4e6e63e..e4aa771b73 100644
--- a/2018/CVE-2018-8060.json
+++ b/2018/CVE-2018-8060.json
@@ -25,32 +25,5 @@
         "forks": 3,
         "watchers": 4,
         "score": 0
-    },
-    {
-        "id": 365731888,
-        "name": "CVE-2018-8060",
-        "full_name": "Crystalware\/CVE-2018-8060",
-        "owner": {
-            "login": "Crystalware",
-            "id": 49976592,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49976592?v=4",
-            "html_url": "https:\/\/github.com\/Crystalware"
-        },
-        "html_url": "https:\/\/github.com\/Crystalware\/CVE-2018-8060",
-        "description": "Proof of concept for the HWiNFO AMD64 Null Pointer Dereference vulnerability.",
-        "fork": false,
-        "created_at": "2021-05-09T11:04:59Z",
-        "updated_at": "2021-05-09T11:07:53Z",
-        "pushed_at": "2021-05-09T11:07:51Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
-        "forks_count": 0,
-        "allow_forking": true,
-        "is_template": false,
-        "topics": [],
-        "visibility": "public",
-        "forks": 0,
-        "watchers": 0,
-        "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2019/CVE-2019-13600.json b/2019/CVE-2019-13600.json
deleted file mode 100644
index bc2eb88423..0000000000
--- a/2019/CVE-2019-13600.json
+++ /dev/null
@@ -1,37 +0,0 @@
-[
-    {
-        "id": 295028706,
-        "name": "CVE-2019-13600",
-        "full_name": "Crystalware\/CVE-2019-13600",
-        "owner": {
-            "login": "Crystalware",
-            "id": 49976592,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49976592?v=4",
-            "html_url": "https:\/\/github.com\/Crystalware"
-        },
-        "html_url": "https:\/\/github.com\/Crystalware\/CVE-2019-13600",
-        "description": "My first zero day.",
-        "fork": false,
-        "created_at": "2020-09-12T21:25:14Z",
-        "updated_at": "2021-09-05T04:14:43Z",
-        "pushed_at": "2021-07-10T22:54:17Z",
-        "stargazers_count": 1,
-        "watchers_count": 1,
-        "forks_count": 0,
-        "allow_forking": true,
-        "is_template": false,
-        "topics": [
-            "binary",
-            "c",
-            "cve-2019-13600",
-            "exploit",
-            "poc",
-            "proof-of-concept",
-            "windows"
-        ],
-        "visibility": "public",
-        "forks": 0,
-        "watchers": 1,
-        "score": 0
-    }
-]
\ No newline at end of file
diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json
index b9b981461d..a7e43289de 100644
--- a/2019/CVE-2019-17558.json
+++ b/2019/CVE-2019-17558.json
@@ -44,7 +44,7 @@
         "pushed_at": "2021-04-04T09:13:57Z",
         "stargazers_count": 3195,
         "watchers_count": 3195,
-        "forks_count": 948,
+        "forks_count": 947,
         "allow_forking": true,
         "is_template": false,
         "topics": [
@@ -69,7 +69,7 @@
             "webshell"
         ],
         "visibility": "public",
-        "forks": 948,
+        "forks": 947,
         "watchers": 3195,
         "score": 0
     },
diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json
index e550a443f5..03c9193a99 100644
--- a/2019/CVE-2019-2725.json
+++ b/2019/CVE-2019-2725.json
@@ -13,17 +13,17 @@
         "description": "Java反序列化漏洞利用工具V1.0    Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。   支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
         "fork": false,
         "created_at": "2018-09-13T09:44:18Z",
-        "updated_at": "2022-02-23T01:48:08Z",
+        "updated_at": "2022-03-06T03:18:30Z",
         "pushed_at": "2020-10-01T20:20:41Z",
-        "stargazers_count": 317,
-        "watchers_count": 317,
+        "stargazers_count": 318,
+        "watchers_count": 318,
         "forks_count": 109,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 109,
-        "watchers": 317,
+        "watchers": 318,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-1350.json b/2020/CVE-2020-1350.json
index 4bb42a7b63..3ff15065e0 100644
--- a/2020/CVE-2020-1350.json
+++ b/2020/CVE-2020-1350.json
@@ -222,17 +222,17 @@
         "description": "A denial-of-service proof-of-concept for CVE-2020-1350",
         "fork": false,
         "created_at": "2020-07-15T23:00:00Z",
-        "updated_at": "2022-01-24T21:03:40Z",
+        "updated_at": "2022-03-06T03:42:04Z",
         "pushed_at": "2020-07-17T13:07:29Z",
-        "stargazers_count": 233,
-        "watchers_count": 233,
+        "stargazers_count": 232,
+        "watchers_count": 232,
         "forks_count": 52,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 52,
-        "watchers": 233,
+        "watchers": 232,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json
index 2f981f9fc3..5e4d68be20 100644
--- a/2020/CVE-2020-14882.json
+++ b/2020/CVE-2020-14882.json
@@ -17,7 +17,7 @@
         "pushed_at": "2021-04-04T09:13:57Z",
         "stargazers_count": 3195,
         "watchers_count": 3195,
-        "forks_count": 948,
+        "forks_count": 947,
         "allow_forking": true,
         "is_template": false,
         "topics": [
@@ -42,7 +42,7 @@
             "webshell"
         ],
         "visibility": "public",
-        "forks": 948,
+        "forks": 947,
         "watchers": 3195,
         "score": 0
     },
diff --git a/2020/CVE-2020-14979.json b/2020/CVE-2020-14979.json
deleted file mode 100644
index c85b3c3eec..0000000000
--- a/2020/CVE-2020-14979.json
+++ /dev/null
@@ -1,29 +0,0 @@
-[
-    {
-        "id": 365756839,
-        "name": "CVE-2020-14979",
-        "full_name": "Crystalware\/CVE-2020-14979",
-        "owner": {
-            "login": "Crystalware",
-            "id": 49976592,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49976592?v=4",
-            "html_url": "https:\/\/github.com\/Crystalware"
-        },
-        "html_url": "https:\/\/github.com\/Crystalware\/CVE-2020-14979",
-        "description": "Exploit proof of concept for EVGA's WinRing0 device driver.",
-        "fork": false,
-        "created_at": "2021-05-09T13:16:03Z",
-        "updated_at": "2021-09-08T14:02:47Z",
-        "pushed_at": "2021-06-21T01:53:23Z",
-        "stargazers_count": 1,
-        "watchers_count": 1,
-        "forks_count": 0,
-        "allow_forking": true,
-        "is_template": false,
-        "topics": [],
-        "visibility": "public",
-        "forks": 0,
-        "watchers": 1,
-        "score": 0
-    }
-]
\ No newline at end of file
diff --git a/2020/CVE-2020-9014.json b/2020/CVE-2020-9014.json
deleted file mode 100644
index 08e5a1f679..0000000000
--- a/2020/CVE-2020-9014.json
+++ /dev/null
@@ -1,29 +0,0 @@
-[
-    {
-        "id": 390601262,
-        "name": "CVE-2020-9014",
-        "full_name": "Crystalware\/CVE-2020-9014",
-        "owner": {
-            "login": "Crystalware",
-            "id": 49976592,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49976592?v=4",
-            "html_url": "https:\/\/github.com\/Crystalware"
-        },
-        "html_url": "https:\/\/github.com\/Crystalware\/CVE-2020-9014",
-        "description": "Proof of concept code for CVE-2020-9014",
-        "fork": false,
-        "created_at": "2021-07-29T04:37:09Z",
-        "updated_at": "2021-07-29T04:51:30Z",
-        "pushed_at": "2021-07-29T04:51:27Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
-        "forks_count": 0,
-        "allow_forking": true,
-        "is_template": false,
-        "topics": [],
-        "visibility": "public",
-        "forks": 0,
-        "watchers": 0,
-        "score": 0
-    }
-]
\ No newline at end of file
diff --git a/2021/CVE-2021-21985.json b/2021/CVE-2021-21985.json
index 7a7d68dd16..c1e68e7a9c 100644
--- a/2021/CVE-2021-21985.json
+++ b/2021/CVE-2021-21985.json
@@ -44,12 +44,12 @@
         "pushed_at": "2022-01-16T04:17:08Z",
         "stargazers_count": 191,
         "watchers_count": 191,
-        "forks_count": 46,
+        "forks_count": 47,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 46,
+        "forks": 47,
         "watchers": 191,
         "score": 0
     },
diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json
index 55bc639f22..3da927b163 100644
--- a/2021/CVE-2021-22205.json
+++ b/2021/CVE-2021-22205.json
@@ -13,17 +13,17 @@
         "description": null,
         "fork": false,
         "created_at": "2021-06-05T15:42:16Z",
-        "updated_at": "2022-02-07T12:09:15Z",
+        "updated_at": "2022-03-06T04:57:33Z",
         "pushed_at": "2021-11-02T14:45:24Z",
-        "stargazers_count": 177,
-        "watchers_count": 177,
-        "forks_count": 44,
+        "stargazers_count": 178,
+        "watchers_count": 178,
+        "forks_count": 45,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 44,
-        "watchers": 177,
+        "forks": 45,
+        "watchers": 178,
         "score": 0
     },
     {
diff --git a/2021/CVE-2021-27965.json b/2021/CVE-2021-27965.json
index c73955a140..4f39ab67a0 100644
--- a/2021/CVE-2021-27965.json
+++ b/2021/CVE-2021-27965.json
@@ -42,29 +42,29 @@
         "score": 0
     },
     {
-        "id": 390672212,
+        "id": 423304617,
         "name": "CVE-2021-27965",
-        "full_name": "Crystalware\/CVE-2021-27965",
+        "full_name": "Jeromeyoung\/CVE-2021-27965",
         "owner": {
-            "login": "Crystalware",
-            "id": 49976592,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49976592?v=4",
-            "html_url": "https:\/\/github.com\/Crystalware"
+            "login": "Jeromeyoung",
+            "id": 39945364,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39945364?v=4",
+            "html_url": "https:\/\/github.com\/Jeromeyoung"
         },
-        "html_url": "https:\/\/github.com\/Crystalware\/CVE-2021-27965",
+        "html_url": "https:\/\/github.com\/Jeromeyoung\/CVE-2021-27965",
         "description": "Proof of concept for CVE-2021-27965 (Stack-based Buffer Overflow)",
         "fork": false,
-        "created_at": "2021-07-29T09:32:56Z",
-        "updated_at": "2021-10-31T02:39:44Z",
+        "created_at": "2021-11-01T01:41:37Z",
+        "updated_at": "2021-11-01T01:41:37Z",
         "pushed_at": "2021-10-31T02:39:41Z",
         "stargazers_count": 0,
         "watchers_count": 0,
-        "forks_count": 1,
+        "forks_count": 0,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 1,
+        "forks": 0,
         "watchers": 0,
         "score": 0
     }
diff --git a/2021/CVE-2021-28476.json b/2021/CVE-2021-28476.json
index 86f78faf46..1217afcf32 100644
--- a/2021/CVE-2021-28476.json
+++ b/2021/CVE-2021-28476.json
@@ -52,12 +52,12 @@
         "pushed_at": "2021-06-02T14:54:14Z",
         "stargazers_count": 10,
         "watchers_count": 10,
-        "forks_count": 1,
+        "forks_count": 2,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 1,
+        "forks": 2,
         "watchers": 10,
         "score": 0
     },
diff --git a/2021/CVE-2021-30955.json b/2021/CVE-2021-30955.json
index 20fb40f8d4..5821ae789c 100644
--- a/2021/CVE-2021-30955.json
+++ b/2021/CVE-2021-30955.json
@@ -94,17 +94,17 @@
         "description": "iOS 15.1 kernel exploit POC for CVE-2021-30955",
         "fork": false,
         "created_at": "2022-03-01T12:41:03Z",
-        "updated_at": "2022-03-05T22:36:34Z",
+        "updated_at": "2022-03-06T01:45:04Z",
         "pushed_at": "2022-03-01T16:11:31Z",
-        "stargazers_count": 190,
-        "watchers_count": 190,
+        "stargazers_count": 192,
+        "watchers_count": 192,
         "forks_count": 29,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 29,
-        "watchers": 190,
+        "watchers": 192,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json
index bd2c07bf1b..c2bd47a07d 100644
--- a/2021/CVE-2021-3156.json
+++ b/2021/CVE-2021-3156.json
@@ -726,17 +726,17 @@
         "description": "Root shell PoC for CVE-2021-3156",
         "fork": false,
         "created_at": "2021-02-03T19:57:56Z",
-        "updated_at": "2022-03-05T03:59:08Z",
+        "updated_at": "2022-03-06T02:12:05Z",
         "pushed_at": "2022-02-13T12:21:53Z",
-        "stargazers_count": 88,
-        "watchers_count": 88,
+        "stargazers_count": 89,
+        "watchers_count": 89,
         "forks_count": 39,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 39,
-        "watchers": 88,
+        "watchers": 89,
         "score": 0
     },
     {
diff --git a/2021/CVE-2021-36260.json b/2021/CVE-2021-36260.json
index 58356a5439..31b3ccd115 100644
--- a/2021/CVE-2021-36260.json
+++ b/2021/CVE-2021-36260.json
@@ -44,12 +44,12 @@
         "pushed_at": "2021-10-28T06:37:37Z",
         "stargazers_count": 96,
         "watchers_count": 96,
-        "forks_count": 44,
+        "forks_count": 45,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 44,
+        "forks": 45,
         "watchers": 96,
         "score": 0
     },
diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json
index 400983293f..db3d3c261e 100644
--- a/2021/CVE-2021-4034.json
+++ b/2021/CVE-2021-4034.json
@@ -106,17 +106,17 @@
         "description": "CVE-2021-4034 1day",
         "fork": false,
         "created_at": "2022-01-25T23:51:37Z",
-        "updated_at": "2022-03-05T11:59:55Z",
+        "updated_at": "2022-03-06T01:02:09Z",
         "pushed_at": "2022-01-30T14:22:23Z",
-        "stargazers_count": 1378,
-        "watchers_count": 1378,
+        "stargazers_count": 1379,
+        "watchers_count": 1379,
         "forks_count": 394,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 394,
-        "watchers": 1378,
+        "watchers": 1379,
         "score": 0
     },
     {
@@ -908,10 +908,10 @@
         "description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
         "fork": false,
         "created_at": "2022-01-26T14:26:10Z",
-        "updated_at": "2022-03-05T18:37:28Z",
+        "updated_at": "2022-03-06T01:14:12Z",
         "pushed_at": "2022-01-27T20:09:24Z",
-        "stargazers_count": 445,
-        "watchers_count": 445,
+        "stargazers_count": 447,
+        "watchers_count": 447,
         "forks_count": 81,
         "allow_forking": true,
         "is_template": false,
@@ -920,7 +920,7 @@
         ],
         "visibility": "public",
         "forks": 81,
-        "watchers": 445,
+        "watchers": 447,
         "score": 0
     },
     {
@@ -3154,7 +3154,7 @@
         "fork": false,
         "created_at": "2022-02-14T22:09:44Z",
         "updated_at": "2022-03-02T19:20:59Z",
-        "pushed_at": "2022-03-04T20:45:04Z",
+        "pushed_at": "2022-03-06T05:46:12Z",
         "stargazers_count": 0,
         "watchers_count": 0,
         "forks_count": 0,
diff --git a/2021/CVE-2021-42013.json b/2021/CVE-2021-42013.json
index 99e403ae6e..5afaf17e41 100644
--- a/2021/CVE-2021-42013.json
+++ b/2021/CVE-2021-42013.json
@@ -354,17 +354,17 @@
         "description": "CVE-2021-42013批量",
         "fork": false,
         "created_at": "2022-03-04T06:38:26Z",
-        "updated_at": "2022-03-05T10:48:51Z",
+        "updated_at": "2022-03-06T05:54:27Z",
         "pushed_at": "2022-03-04T10:49:00Z",
-        "stargazers_count": 21,
-        "watchers_count": 21,
+        "stargazers_count": 22,
+        "watchers_count": 22,
         "forks_count": 5,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 5,
-        "watchers": 21,
+        "watchers": 22,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
index 3f2305c7b3..f8db6551f5 100644
--- a/2021/CVE-2021-44228.json
+++ b/2021/CVE-2021-44228.json
@@ -1972,12 +1972,12 @@
         "pushed_at": "2021-12-11T10:39:41Z",
         "stargazers_count": 3,
         "watchers_count": 3,
-        "forks_count": 36,
+        "forks_count": 37,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 36,
+        "forks": 37,
         "watchers": 3,
         "score": 0
     },
@@ -3208,17 +3208,17 @@
         "description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)",
         "fork": false,
         "created_at": "2021-12-12T22:52:02Z",
-        "updated_at": "2022-03-02T06:30:38Z",
+        "updated_at": "2022-03-06T03:42:40Z",
         "pushed_at": "2021-12-20T15:34:21Z",
-        "stargazers_count": 321,
-        "watchers_count": 321,
+        "stargazers_count": 320,
+        "watchers_count": 320,
         "forks_count": 50,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 50,
-        "watchers": 321,
+        "watchers": 320,
         "score": 0
     },
     {
@@ -3552,12 +3552,12 @@
         "pushed_at": "2022-02-06T03:18:29Z",
         "stargazers_count": 2768,
         "watchers_count": 2768,
-        "forks_count": 671,
+        "forks_count": 672,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
-        "forks": 671,
+        "forks": 672,
         "watchers": 2768,
         "score": 0
     },
@@ -5422,10 +5422,10 @@
         "description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)",
         "fork": false,
         "created_at": "2021-12-14T10:04:42Z",
-        "updated_at": "2022-03-02T03:30:20Z",
+        "updated_at": "2022-03-06T00:38:15Z",
         "pushed_at": "2022-01-27T16:08:20Z",
-        "stargazers_count": 406,
-        "watchers_count": 406,
+        "stargazers_count": 407,
+        "watchers_count": 407,
         "forks_count": 89,
         "allow_forking": true,
         "is_template": false,
@@ -5441,7 +5441,7 @@
         ],
         "visibility": "public",
         "forks": 89,
-        "watchers": 406,
+        "watchers": 407,
         "score": 0
     },
     {
diff --git a/2022/CVE-2022-0492.json b/2022/CVE-2022-0492.json
index 5c97945e41..07caeb926d 100644
--- a/2022/CVE-2022-0492.json
+++ b/2022/CVE-2022-0492.json
@@ -13,17 +13,17 @@
         "description": "Test whether a container environment is vulnerable to container escapes via CVE-2022-0492",
         "fork": false,
         "created_at": "2022-02-28T01:25:26Z",
-        "updated_at": "2022-03-05T19:14:43Z",
+        "updated_at": "2022-03-06T06:01:46Z",
         "pushed_at": "2022-02-28T01:25:57Z",
-        "stargazers_count": 12,
-        "watchers_count": 12,
+        "stargazers_count": 13,
+        "watchers_count": 13,
         "forks_count": 0,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 0,
-        "watchers": 12,
+        "watchers": 13,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2022/CVE-2022-0824.json b/2022/CVE-2022-0824.json
index 626ebe02ac..2346962995 100644
--- a/2022/CVE-2022-0824.json
+++ b/2022/CVE-2022-0824.json
@@ -10,17 +10,22 @@
             "html_url": "https:\/\/github.com\/faisalfs10x"
         },
         "html_url": "https:\/\/github.com\/faisalfs10x\/Webmin-CVE-2022-0824-revshell",
-        "description": "Webmin CVE-2022-0824 Reverse Shell",
+        "description": "Webmin CVE-2022-0824 Post-Auth Reverse Shell",
         "fork": false,
         "created_at": "2022-03-06T00:03:31Z",
-        "updated_at": "2022-03-06T00:06:58Z",
-        "pushed_at": "2022-03-06T00:06:55Z",
+        "updated_at": "2022-03-06T06:15:29Z",
+        "pushed_at": "2022-03-06T00:36:18Z",
         "stargazers_count": 0,
         "watchers_count": 0,
         "forks_count": 0,
         "allow_forking": true,
         "is_template": false,
-        "topics": [],
+        "topics": [
+            "cve",
+            "exploit",
+            "proof-of-concept",
+            "vulnerability"
+        ],
         "visibility": "public",
         "forks": 0,
         "watchers": 0,
diff --git a/2022/CVE-2022-21971.json b/2022/CVE-2022-21971.json
index 6c7bc7240a..ceed5c6700 100644
--- a/2022/CVE-2022-21971.json
+++ b/2022/CVE-2022-21971.json
@@ -13,10 +13,10 @@
         "description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"",
         "fork": false,
         "created_at": "2022-02-26T20:37:42Z",
-        "updated_at": "2022-03-05T08:02:05Z",
+        "updated_at": "2022-03-06T05:58:52Z",
         "pushed_at": "2022-02-26T20:45:19Z",
-        "stargazers_count": 195,
-        "watchers_count": 195,
+        "stargazers_count": 196,
+        "watchers_count": 196,
         "forks_count": 35,
         "allow_forking": true,
         "is_template": false,
@@ -30,7 +30,7 @@
         ],
         "visibility": "public",
         "forks": 35,
-        "watchers": 195,
+        "watchers": 196,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2022/CVE-2022-21999.json b/2022/CVE-2022-21999.json
index 13e88570bc..3d1119fdeb 100644
--- a/2022/CVE-2022-21999.json
+++ b/2022/CVE-2022-21999.json
@@ -13,10 +13,10 @@
         "description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
         "fork": false,
         "created_at": "2022-02-08T17:25:44Z",
-        "updated_at": "2022-03-05T08:59:41Z",
+        "updated_at": "2022-03-06T01:03:22Z",
         "pushed_at": "2022-02-09T16:54:09Z",
-        "stargazers_count": 474,
-        "watchers_count": 474,
+        "stargazers_count": 475,
+        "watchers_count": 475,
         "forks_count": 90,
         "allow_forking": true,
         "is_template": false,
@@ -26,7 +26,7 @@
         ],
         "visibility": "public",
         "forks": 90,
-        "watchers": 474,
+        "watchers": 475,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json
index ee7b43f18a..2432d5cedb 100644
--- a/2022/CVE-2022-22947.json
+++ b/2022/CVE-2022-22947.json
@@ -13,17 +13,17 @@
         "description": "CVE-2022-22947",
         "fork": false,
         "created_at": "2022-03-02T11:58:55Z",
-        "updated_at": "2022-03-05T14:33:14Z",
+        "updated_at": "2022-03-06T05:21:32Z",
         "pushed_at": "2022-03-03T14:03:30Z",
-        "stargazers_count": 140,
-        "watchers_count": 140,
+        "stargazers_count": 146,
+        "watchers_count": 146,
         "forks_count": 52,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 52,
-        "watchers": 140,
+        "watchers": 146,
         "score": 0
     },
     {
@@ -339,17 +339,17 @@
         "description": "CVE-2021-42013批量",
         "fork": false,
         "created_at": "2022-03-04T06:38:26Z",
-        "updated_at": "2022-03-05T10:48:51Z",
+        "updated_at": "2022-03-06T05:54:27Z",
         "pushed_at": "2022-03-04T10:49:00Z",
-        "stargazers_count": 21,
-        "watchers_count": 21,
+        "stargazers_count": 22,
+        "watchers_count": 22,
         "forks_count": 5,
         "allow_forking": true,
         "is_template": false,
         "topics": [],
         "visibility": "public",
         "forks": 5,
-        "watchers": 21,
+        "watchers": 22,
         "score": 0
     },
     {
diff --git a/README.md b/README.md
index d72732d940..81f81e55d7 100644
--- a/README.md
+++ b/README.md
@@ -2169,7 +2169,7 @@ The MsIo64.sys driver before 1.1.19.1016 in MSI Dragon Center before 2.0.98.0 ha
 </code>
 
 - [mathisvickie/CVE-2021-27965](https://github.com/mathisvickie/CVE-2021-27965)
-- [Crystalware/CVE-2021-27965](https://github.com/Crystalware/CVE-2021-27965)
+- [Jeromeyoung/CVE-2021-27965](https://github.com/Jeromeyoung/CVE-2021-27965)
 
 ### CVE-2021-28079 (2021-04-26)
 
@@ -6337,14 +6337,6 @@ Stored Cross-site scripting (XSS) vulnerability in Blackboard Learn/PeopleTool v
 
 - [kyletimmermans/blackboard-xss](https://github.com/kyletimmermans/blackboard-xss)
 
-### CVE-2020-9014 (2021-02-05)
-
-<code>
-In Epson iProjection v2.30, the driver file (EMP_NSAU.sys) allows local users to cause a denial of service (BSOD) via crafted input to the virtual audio device driver with IOCTL 0x9C402402, 0x9C402406, or 0x9C40240A. \Device\EMPNSAUIO and \DosDevices\EMPNSAU are similarly affected.
-</code>
-
-- [Crystalware/CVE-2020-9014](https://github.com/Crystalware/CVE-2020-9014)
-
 ### CVE-2020-9038 (2020-02-17)
 
 <code>
@@ -7657,14 +7649,6 @@ On TP-Link TL-WR740N v4 and TL-WR740ND v4 devices, an attacker with access to th
 
 - [g-rubert/CVE-2020-14965](https://github.com/g-rubert/CVE-2020-14965)
 
-### CVE-2020-14979 (2020-08-11)
-
-<code>
-The WinRing0.sys and WinRing0x64.sys drivers 1.2.0 in EVGA Precision X1 through 1.0.6 allow local users, including low integrity processes, to read and write to arbitrary memory locations. This allows any user to gain NT AUTHORITY\SYSTEM privileges by mapping \Device\PhysicalMemory into the calling process.
-</code>
-
-- [Crystalware/CVE-2020-14979](https://github.com/Crystalware/CVE-2020-14979)
-
 ### CVE-2020-15002 (2020-10-23)
 
 <code>
@@ -11893,9 +11877,6 @@ In lib/mini_magick/image.rb in MiniMagick before 4.9.4, a fetched remote image f
 
 - [masahiro331/CVE-2019-13574](https://github.com/masahiro331/CVE-2019-13574)
 
-### CVE-2019-13600
-- [Crystalware/CVE-2019-13600](https://github.com/Crystalware/CVE-2019-13600)
-
 ### CVE-2019-13633 (2020-10-19)
 
 <code>
@@ -14508,7 +14489,6 @@ HWiNFO AMD64 Kernel driver version 8.98 and lower allows an unprivileged user to
 </code>
 
 - [otavioarj/SIOCtl](https://github.com/otavioarj/SIOCtl)
-- [Crystalware/CVE-2018-8060](https://github.com/Crystalware/CVE-2018-8060)
 
 ### CVE-2018-8065 (2018-03-12)