diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json
index 1c22c09bc8..c89a3231a9 100644
--- a/2014/CVE-2014-4210.json
+++ b/2014/CVE-2014-4210.json
@@ -45,10 +45,10 @@
         "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2024-11-21T06:52:20Z",
+        "updated_at": "2024-11-25T03:36:21Z",
         "pushed_at": "2023-11-24T09:21:56Z",
-        "stargazers_count": 2013,
-        "watchers_count": 2013,
+        "stargazers_count": 2012,
+        "watchers_count": 2012,
         "has_discussions": true,
         "forks_count": 339,
         "allow_forking": true,
@@ -78,7 +78,7 @@
         ],
         "visibility": "public",
         "forks": 339,
-        "watchers": 2013,
+        "watchers": 2012,
         "score": 0,
         "subscribers_count": 37
     },
diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json
index 5d71cf0e66..5f94cf2224 100644
--- a/2016/CVE-2016-0638.json
+++ b/2016/CVE-2016-0638.json
@@ -14,10 +14,10 @@
         "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2024-11-21T06:52:20Z",
+        "updated_at": "2024-11-25T03:36:21Z",
         "pushed_at": "2023-11-24T09:21:56Z",
-        "stargazers_count": 2013,
-        "watchers_count": 2013,
+        "stargazers_count": 2012,
+        "watchers_count": 2012,
         "has_discussions": true,
         "forks_count": 339,
         "allow_forking": true,
@@ -47,7 +47,7 @@
         ],
         "visibility": "public",
         "forks": 339,
-        "watchers": 2013,
+        "watchers": 2012,
         "score": 0,
         "subscribers_count": 37
     },
diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json
index 71f1588875..b2b77f0403 100644
--- a/2017/CVE-2017-3248.json
+++ b/2017/CVE-2017-3248.json
@@ -45,10 +45,10 @@
         "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2024-11-21T06:52:20Z",
+        "updated_at": "2024-11-25T03:36:21Z",
         "pushed_at": "2023-11-24T09:21:56Z",
-        "stargazers_count": 2013,
-        "watchers_count": 2013,
+        "stargazers_count": 2012,
+        "watchers_count": 2012,
         "has_discussions": true,
         "forks_count": 339,
         "allow_forking": true,
@@ -78,7 +78,7 @@
         ],
         "visibility": "public",
         "forks": 339,
-        "watchers": 2013,
+        "watchers": 2012,
         "score": 0,
         "subscribers_count": 37
     },
diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json
index 45070564ac..f6c3dd9644 100644
--- a/2018/CVE-2018-2628.json
+++ b/2018/CVE-2018-2628.json
@@ -576,10 +576,10 @@
         "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2024-11-21T06:52:20Z",
+        "updated_at": "2024-11-25T03:36:21Z",
         "pushed_at": "2023-11-24T09:21:56Z",
-        "stargazers_count": 2013,
-        "watchers_count": 2013,
+        "stargazers_count": 2012,
+        "watchers_count": 2012,
         "has_discussions": true,
         "forks_count": 339,
         "allow_forking": true,
@@ -609,7 +609,7 @@
         ],
         "visibility": "public",
         "forks": 339,
-        "watchers": 2013,
+        "watchers": 2012,
         "score": 0,
         "subscribers_count": 37
     },
diff --git a/2019/CVE-2019-10149.json b/2019/CVE-2019-10149.json
index b54861c3ec..c752a9da3a 100644
--- a/2019/CVE-2019-10149.json
+++ b/2019/CVE-2019-10149.json
@@ -491,13 +491,13 @@
         "stargazers_count": 0,
         "watchers_count": 0,
         "has_discussions": false,
-        "forks_count": 0,
+        "forks_count": 1,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 0,
+        "forks": 1,
         "watchers": 0,
         "score": 0,
         "subscribers_count": 0
diff --git a/2019/CVE-2019-12422.json b/2019/CVE-2019-12422.json
index 031ce598b1..9113be7b35 100644
--- a/2019/CVE-2019-12422.json
+++ b/2019/CVE-2019-12422.json
@@ -14,8 +14,8 @@
         "description": "若依4.2 (Shiro 1.4.1) Shiro-721 (CVE-2019-12422)漏洞复现环境",
         "fork": false,
         "created_at": "2024-11-08T12:30:13Z",
-        "updated_at": "2024-11-08T12:54:59Z",
-        "pushed_at": "2024-11-08T12:48:53Z",
+        "updated_at": "2024-11-25T01:38:58Z",
+        "pushed_at": "2024-11-25T01:38:54Z",
         "stargazers_count": 1,
         "watchers_count": 1,
         "has_discussions": false,
diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json
index 0490d5913f..fb36ae2989 100644
--- a/2019/CVE-2019-17558.json
+++ b/2019/CVE-2019-17558.json
@@ -45,10 +45,10 @@
         "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
         "fork": false,
         "created_at": "2020-04-01T09:33:35Z",
-        "updated_at": "2024-11-24T14:14:42Z",
+        "updated_at": "2024-11-25T03:35:14Z",
         "pushed_at": "2021-04-04T09:13:57Z",
-        "stargazers_count": 4134,
-        "watchers_count": 4134,
+        "stargazers_count": 4133,
+        "watchers_count": 4133,
         "has_discussions": false,
         "forks_count": 1101,
         "allow_forking": true,
@@ -77,7 +77,7 @@
         ],
         "visibility": "public",
         "forks": 1101,
-        "watchers": 4134,
+        "watchers": 4133,
         "score": 0,
         "subscribers_count": 149
     },
diff --git a/2019/CVE-2019-18935.json b/2019/CVE-2019-18935.json
index a2e66a0902..49074d9286 100644
--- a/2019/CVE-2019-18935.json
+++ b/2019/CVE-2019-18935.json
@@ -324,8 +324,8 @@
         "description": null,
         "fork": false,
         "created_at": "2023-12-25T06:45:11Z",
-        "updated_at": "2024-08-11T12:45:45Z",
-        "pushed_at": "2023-12-25T07:43:43Z",
+        "updated_at": "2024-11-25T04:04:21Z",
+        "pushed_at": "2024-11-25T04:04:18Z",
         "stargazers_count": 6,
         "watchers_count": 6,
         "has_discussions": false,
diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json
index a34b60869b..2a32b6df20 100644
--- a/2019/CVE-2019-2618.json
+++ b/2019/CVE-2019-2618.json
@@ -200,10 +200,10 @@
         "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2024-11-21T06:52:20Z",
+        "updated_at": "2024-11-25T03:36:21Z",
         "pushed_at": "2023-11-24T09:21:56Z",
-        "stargazers_count": 2013,
-        "watchers_count": 2013,
+        "stargazers_count": 2012,
+        "watchers_count": 2012,
         "has_discussions": true,
         "forks_count": 339,
         "allow_forking": true,
@@ -233,7 +233,7 @@
         ],
         "visibility": "public",
         "forks": 339,
-        "watchers": 2013,
+        "watchers": 2012,
         "score": 0,
         "subscribers_count": 37
     }
diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json
index fe31571d2b..95e86ab86a 100644
--- a/2020/CVE-2020-0796.json
+++ b/2020/CVE-2020-0796.json
@@ -1081,7 +1081,7 @@
         "stargazers_count": 240,
         "watchers_count": 240,
         "has_discussions": false,
-        "forks_count": 90,
+        "forks_count": 85,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
@@ -1092,7 +1092,7 @@
             "smbghost"
         ],
         "visibility": "public",
-        "forks": 90,
+        "forks": 85,
         "watchers": 240,
         "score": 0,
         "subscribers_count": 13
diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json
index 4cd71a4eb8..f517ff1b51 100644
--- a/2020/CVE-2020-14882.json
+++ b/2020/CVE-2020-14882.json
@@ -14,10 +14,10 @@
         "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
         "fork": false,
         "created_at": "2020-04-01T09:33:35Z",
-        "updated_at": "2024-11-24T14:14:42Z",
+        "updated_at": "2024-11-25T03:35:14Z",
         "pushed_at": "2021-04-04T09:13:57Z",
-        "stargazers_count": 4134,
-        "watchers_count": 4134,
+        "stargazers_count": 4133,
+        "watchers_count": 4133,
         "has_discussions": false,
         "forks_count": 1101,
         "allow_forking": true,
@@ -46,7 +46,7 @@
         ],
         "visibility": "public",
         "forks": 1101,
-        "watchers": 4134,
+        "watchers": 4133,
         "score": 0,
         "subscribers_count": 149
     },
diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json
index 5b64382323..0877b28d67 100644
--- a/2020/CVE-2020-2551.json
+++ b/2020/CVE-2020-2551.json
@@ -14,10 +14,10 @@
         "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2024-11-21T06:52:20Z",
+        "updated_at": "2024-11-25T03:36:21Z",
         "pushed_at": "2023-11-24T09:21:56Z",
-        "stargazers_count": 2013,
-        "watchers_count": 2013,
+        "stargazers_count": 2012,
+        "watchers_count": 2012,
         "has_discussions": true,
         "forks_count": 339,
         "allow_forking": true,
@@ -47,7 +47,7 @@
         ],
         "visibility": "public",
         "forks": 339,
-        "watchers": 2013,
+        "watchers": 2012,
         "score": 0,
         "subscribers_count": 37
     },
diff --git a/2020/CVE-2020-27950.json b/2020/CVE-2020-27950.json
index 081c158f96..9f1a9232a5 100644
--- a/2020/CVE-2020-27950.json
+++ b/2020/CVE-2020-27950.json
@@ -45,10 +45,10 @@
         "description": "A Bash script for Kali Linux that exploits an iOS WebKit vulnerability (CVE-2020-27950) using Metasploit and ngrok. Automates payload delivery with a public URL via ngrok, checks for required tools, handles errors, and provides an easy way to crash browsers for educational purposes only.",
         "fork": false,
         "created_at": "2024-09-15T16:54:03Z",
-        "updated_at": "2024-11-15T03:41:37Z",
+        "updated_at": "2024-11-25T03:48:38Z",
         "pushed_at": "2024-11-15T03:41:34Z",
-        "stargazers_count": 1,
-        "watchers_count": 1,
+        "stargazers_count": 2,
+        "watchers_count": 2,
         "has_discussions": false,
         "forks_count": 0,
         "allow_forking": true,
@@ -57,7 +57,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 0,
-        "watchers": 1,
+        "watchers": 2,
         "score": 0,
         "subscribers_count": 1
     }
diff --git a/2021/CVE-2021-22911.json b/2021/CVE-2021-22911.json
index 26ce075c2c..414dcd55ae 100644
--- a/2021/CVE-2021-22911.json
+++ b/2021/CVE-2021-22911.json
@@ -14,10 +14,10 @@
         "description": "Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1",
         "fork": false,
         "created_at": "2021-06-05T15:05:01Z",
-        "updated_at": "2024-10-08T14:38:28Z",
+        "updated_at": "2024-11-25T06:21:43Z",
         "pushed_at": "2023-06-11T08:47:04Z",
-        "stargazers_count": 55,
-        "watchers_count": 55,
+        "stargazers_count": 56,
+        "watchers_count": 56,
         "has_discussions": false,
         "forks_count": 8,
         "allow_forking": true,
@@ -26,7 +26,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 8,
-        "watchers": 55,
+        "watchers": 56,
         "score": 0,
         "subscribers_count": 2
     },
diff --git a/2021/CVE-2021-26855.json b/2021/CVE-2021-26855.json
index ab2a637f8d..bfd1ed4f48 100644
--- a/2021/CVE-2021-26855.json
+++ b/2021/CVE-2021-26855.json
@@ -1166,10 +1166,10 @@
         "description": "[ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2021-34523 & CVE-2021-31207 Exploit Chains.",
         "fork": false,
         "created_at": "2021-04-14T11:12:30Z",
-        "updated_at": "2024-10-15T07:30:29Z",
+        "updated_at": "2024-11-25T03:44:15Z",
         "pushed_at": "2022-10-21T08:59:23Z",
-        "stargazers_count": 175,
-        "watchers_count": 175,
+        "stargazers_count": 174,
+        "watchers_count": 174,
         "has_discussions": false,
         "forks_count": 34,
         "allow_forking": true,
@@ -1178,7 +1178,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 34,
-        "watchers": 175,
+        "watchers": 174,
         "score": 0,
         "subscribers_count": 4
     },
diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json
index 49e4c3845d..18bca2df32 100644
--- a/2021/CVE-2021-3156.json
+++ b/2021/CVE-2021-3156.json
@@ -486,10 +486,10 @@
         "description": null,
         "fork": false,
         "created_at": "2021-01-30T20:39:58Z",
-        "updated_at": "2024-11-24T08:02:06Z",
+        "updated_at": "2024-11-25T01:54:30Z",
         "pushed_at": "2021-02-02T17:07:09Z",
-        "stargazers_count": 959,
-        "watchers_count": 959,
+        "stargazers_count": 960,
+        "watchers_count": 960,
         "has_discussions": false,
         "forks_count": 237,
         "allow_forking": true,
@@ -498,7 +498,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 237,
-        "watchers": 959,
+        "watchers": 960,
         "score": 0,
         "subscribers_count": 27
     },
@@ -1885,10 +1885,10 @@
         "description": "Visualization, Fuzzing, Exploit and Patch of Baron Samedit Vulnerability",
         "fork": false,
         "created_at": "2022-07-04T13:55:24Z",
-        "updated_at": "2023-12-05T12:08:06Z",
+        "updated_at": "2024-11-25T05:54:59Z",
         "pushed_at": "2022-07-15T04:41:17Z",
-        "stargazers_count": 4,
-        "watchers_count": 4,
+        "stargazers_count": 5,
+        "watchers_count": 5,
         "has_discussions": false,
         "forks_count": 0,
         "allow_forking": true,
@@ -1901,7 +1901,7 @@
         ],
         "visibility": "public",
         "forks": 0,
-        "watchers": 4,
+        "watchers": 5,
         "score": 0,
         "subscribers_count": 1
     },
diff --git a/2021/CVE-2021-3560.json b/2021/CVE-2021-3560.json
index 588c80c09b..c99a219fee 100644
--- a/2021/CVE-2021-3560.json
+++ b/2021/CVE-2021-3560.json
@@ -526,10 +526,10 @@
         "description": "PolicyKit CVE-2021-3560 Exploit (Authentication Agent)",
         "fork": false,
         "created_at": "2022-04-29T18:57:30Z",
-        "updated_at": "2024-09-08T01:42:24Z",
+        "updated_at": "2024-11-25T03:32:03Z",
         "pushed_at": "2022-05-02T07:49:01Z",
-        "stargazers_count": 117,
-        "watchers_count": 117,
+        "stargazers_count": 116,
+        "watchers_count": 116,
         "has_discussions": false,
         "forks_count": 12,
         "allow_forking": true,
@@ -538,7 +538,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 12,
-        "watchers": 117,
+        "watchers": 116,
         "score": 0,
         "subscribers_count": 3
     },
diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json
index 290d7eae43..d5dc39c775 100644
--- a/2021/CVE-2021-4034.json
+++ b/2021/CVE-2021-4034.json
@@ -49,10 +49,10 @@
         "description": "CVE-2021-4034 1day",
         "fork": false,
         "created_at": "2022-01-25T23:51:37Z",
-        "updated_at": "2024-11-24T11:12:46Z",
+        "updated_at": "2024-11-25T02:23:48Z",
         "pushed_at": "2022-06-08T04:00:28Z",
-        "stargazers_count": 1966,
-        "watchers_count": 1966,
+        "stargazers_count": 1967,
+        "watchers_count": 1967,
         "has_discussions": false,
         "forks_count": 511,
         "allow_forking": true,
@@ -61,7 +61,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 511,
-        "watchers": 1966,
+        "watchers": 1967,
         "score": 0,
         "subscribers_count": 20
     },
@@ -142,10 +142,10 @@
         "description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)",
         "fork": false,
         "created_at": "2022-01-26T00:56:36Z",
-        "updated_at": "2024-11-24T12:28:54Z",
+        "updated_at": "2024-11-25T04:47:22Z",
         "pushed_at": "2023-05-04T19:24:39Z",
-        "stargazers_count": 1058,
-        "watchers_count": 1058,
+        "stargazers_count": 1059,
+        "watchers_count": 1059,
         "has_discussions": false,
         "forks_count": 305,
         "allow_forking": true,
@@ -158,7 +158,7 @@
         ],
         "visibility": "public",
         "forks": 305,
-        "watchers": 1058,
+        "watchers": 1059,
         "score": 0,
         "subscribers_count": 15
     },
diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json
index eeaca82eb7..27d26156b4 100644
--- a/2021/CVE-2021-42287.json
+++ b/2021/CVE-2021-42287.json
@@ -14,10 +14,10 @@
         "description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
         "fork": false,
         "created_at": "2021-12-11T19:27:30Z",
-        "updated_at": "2024-11-21T05:34:31Z",
+        "updated_at": "2024-11-25T03:42:24Z",
         "pushed_at": "2021-12-16T09:50:15Z",
-        "stargazers_count": 1342,
-        "watchers_count": 1342,
+        "stargazers_count": 1341,
+        "watchers_count": 1341,
         "has_discussions": false,
         "forks_count": 322,
         "allow_forking": true,
@@ -26,7 +26,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 322,
-        "watchers": 1342,
+        "watchers": 1341,
         "score": 0,
         "subscribers_count": 27
     },
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
index b973e1af0a..40226d8117 100644
--- a/2021/CVE-2021-44228.json
+++ b/2021/CVE-2021-44228.json
@@ -107,10 +107,10 @@
         "description": "Remote Code Injection In Log4j",
         "fork": false,
         "created_at": "2021-12-10T05:23:44Z",
-        "updated_at": "2024-11-13T02:00:05Z",
+        "updated_at": "2024-11-25T03:42:23Z",
         "pushed_at": "2022-01-18T12:01:52Z",
-        "stargazers_count": 460,
-        "watchers_count": 460,
+        "stargazers_count": 459,
+        "watchers_count": 459,
         "has_discussions": false,
         "forks_count": 124,
         "allow_forking": true,
@@ -119,7 +119,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 124,
-        "watchers": 460,
+        "watchers": 459,
         "score": 0,
         "subscribers_count": 8
     },
@@ -884,10 +884,10 @@
         "description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
         "fork": false,
         "created_at": "2021-12-10T22:35:00Z",
-        "updated_at": "2024-11-14T07:18:31Z",
+        "updated_at": "2024-11-25T03:42:18Z",
         "pushed_at": "2022-01-15T16:18:44Z",
-        "stargazers_count": 935,
-        "watchers_count": 935,
+        "stargazers_count": 934,
+        "watchers_count": 934,
         "has_discussions": false,
         "forks_count": 142,
         "allow_forking": true,
@@ -916,7 +916,7 @@
         ],
         "visibility": "public",
         "forks": 142,
-        "watchers": 935,
+        "watchers": 934,
         "score": 0,
         "subscribers_count": 25
     },
@@ -3749,10 +3749,10 @@
         "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
         "fork": false,
         "created_at": "2021-12-13T03:57:50Z",
-        "updated_at": "2024-11-24T22:25:03Z",
+        "updated_at": "2024-11-25T05:58:44Z",
         "pushed_at": "2022-11-23T18:23:24Z",
-        "stargazers_count": 3406,
-        "watchers_count": 3406,
+        "stargazers_count": 3407,
+        "watchers_count": 3407,
         "has_discussions": true,
         "forks_count": 740,
         "allow_forking": true,
@@ -3761,7 +3761,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 740,
-        "watchers": 3406,
+        "watchers": 3407,
         "score": 0,
         "subscribers_count": 55
     },
@@ -7264,7 +7264,7 @@
         "fork": false,
         "created_at": "2021-12-15T21:09:00Z",
         "updated_at": "2023-06-22T04:46:02Z",
-        "pushed_at": "2024-11-18T05:54:30Z",
+        "pushed_at": "2024-11-25T05:57:14Z",
         "stargazers_count": 4,
         "watchers_count": 4,
         "has_discussions": false,
diff --git a/2022/CVE-2022-0824.json b/2022/CVE-2022-0824.json
index 92b8874247..14930c87fe 100644
--- a/2022/CVE-2022-0824.json
+++ b/2022/CVE-2022-0824.json
@@ -14,10 +14,10 @@
         "description": "Webmin <=1.984, CVE-2022-0824 Post-Auth Reverse Shell PoC",
         "fork": false,
         "created_at": "2022-03-06T00:03:31Z",
-        "updated_at": "2024-09-24T07:27:57Z",
+        "updated_at": "2024-11-25T04:07:38Z",
         "pushed_at": "2022-03-06T07:01:15Z",
-        "stargazers_count": 109,
-        "watchers_count": 109,
+        "stargazers_count": 110,
+        "watchers_count": 110,
         "has_discussions": false,
         "forks_count": 38,
         "allow_forking": true,
@@ -31,7 +31,7 @@
         ],
         "visibility": "public",
         "forks": 38,
-        "watchers": 109,
+        "watchers": 110,
         "score": 0,
         "subscribers_count": 4
     },
diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json
index 22508f76da..9c22e3a4b8 100644
--- a/2022/CVE-2022-0847.json
+++ b/2022/CVE-2022-0847.json
@@ -2695,7 +2695,7 @@
         "stargazers_count": 9,
         "watchers_count": 9,
         "has_discussions": false,
-        "forks_count": 0,
+        "forks_count": 1,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
@@ -2707,7 +2707,7 @@
             "unix"
         ],
         "visibility": "public",
-        "forks": 0,
+        "forks": 1,
         "watchers": 9,
         "score": 0,
         "subscribers_count": 1
diff --git a/2022/CVE-2022-25845.json b/2022/CVE-2022-25845.json
index 5259f62d1b..f7320a1292 100644
--- a/2022/CVE-2022-25845.json
+++ b/2022/CVE-2022-25845.json
@@ -107,10 +107,10 @@
         "description": "CVE-2022-25845(fastjson1.2.80) exploit in Spring Env!",
         "fork": false,
         "created_at": "2024-11-07T13:06:44Z",
-        "updated_at": "2024-11-22T01:46:26Z",
+        "updated_at": "2024-11-25T02:35:44Z",
         "pushed_at": "2024-11-07T13:38:18Z",
-        "stargazers_count": 69,
-        "watchers_count": 69,
+        "stargazers_count": 71,
+        "watchers_count": 71,
         "has_discussions": false,
         "forks_count": 9,
         "allow_forking": true,
@@ -119,7 +119,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 9,
-        "watchers": 69,
+        "watchers": 71,
         "score": 0,
         "subscribers_count": 3
     }
diff --git a/2022/CVE-2022-2588.json b/2022/CVE-2022-2588.json
index 60e684f06a..ab08841be0 100644
--- a/2022/CVE-2022-2588.json
+++ b/2022/CVE-2022-2588.json
@@ -14,10 +14,10 @@
         "description": "exploit for CVE-2022-2588",
         "fork": false,
         "created_at": "2022-08-11T06:01:24Z",
-        "updated_at": "2024-11-23T23:32:37Z",
+        "updated_at": "2024-11-25T01:42:23Z",
         "pushed_at": "2023-03-04T05:52:28Z",
-        "stargazers_count": 467,
-        "watchers_count": 467,
+        "stargazers_count": 468,
+        "watchers_count": 468,
         "has_discussions": false,
         "forks_count": 68,
         "allow_forking": true,
@@ -26,7 +26,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 68,
-        "watchers": 467,
+        "watchers": 468,
         "score": 0,
         "subscribers_count": 49
     },
diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json
index ee2a00d66d..c49ee995fd 100644
--- a/2022/CVE-2022-26134.json
+++ b/2022/CVE-2022-26134.json
@@ -14,10 +14,10 @@
         "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
         "fork": false,
         "created_at": "2022-05-31T07:44:01Z",
-        "updated_at": "2024-11-22T01:59:11Z",
+        "updated_at": "2024-11-25T06:09:21Z",
         "pushed_at": "2023-02-26T14:06:05Z",
-        "stargazers_count": 1169,
-        "watchers_count": 1169,
+        "stargazers_count": 1170,
+        "watchers_count": 1170,
         "has_discussions": true,
         "forks_count": 190,
         "allow_forking": true,
@@ -46,7 +46,7 @@
         ],
         "visibility": "public",
         "forks": 190,
-        "watchers": 1169,
+        "watchers": 1170,
         "score": 0,
         "subscribers_count": 19
     },
diff --git a/2022/CVE-2022-29464.json b/2022/CVE-2022-29464.json
index 9e88652a55..c651a37770 100644
--- a/2022/CVE-2022-29464.json
+++ b/2022/CVE-2022-29464.json
@@ -501,10 +501,10 @@
         "description": "CVE-2022-29464 PoC for WSO2 products",
         "fork": false,
         "created_at": "2022-06-04T16:46:52Z",
-        "updated_at": "2023-10-28T20:03:13Z",
+        "updated_at": "2024-11-25T04:18:25Z",
         "pushed_at": "2022-06-04T17:55:28Z",
-        "stargazers_count": 2,
-        "watchers_count": 2,
+        "stargazers_count": 3,
+        "watchers_count": 3,
         "has_discussions": false,
         "forks_count": 2,
         "allow_forking": true,
@@ -513,7 +513,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 2,
-        "watchers": 2,
+        "watchers": 3,
         "score": 0,
         "subscribers_count": 1
     },
diff --git a/2022/CVE-2022-30190.json b/2022/CVE-2022-30190.json
index db7497b892..219f30c7a3 100644
--- a/2022/CVE-2022-30190.json
+++ b/2022/CVE-2022-30190.json
@@ -146,10 +146,10 @@
         "description": "Microsoft Office Word Rce 复现(CVE-2022-30190)",
         "fork": false,
         "created_at": "2022-05-31T12:15:18Z",
-        "updated_at": "2024-11-24T13:54:03Z",
+        "updated_at": "2024-11-25T04:47:09Z",
         "pushed_at": "2022-05-31T12:27:50Z",
-        "stargazers_count": 58,
-        "watchers_count": 58,
+        "stargazers_count": 59,
+        "watchers_count": 59,
         "has_discussions": false,
         "forks_count": 14,
         "allow_forking": true,
@@ -158,7 +158,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 14,
-        "watchers": 58,
+        "watchers": 59,
         "score": 0,
         "subscribers_count": 2
     },
@@ -852,10 +852,10 @@
         "description": "CVE-2022-30190-follina.py-修改版,可以自定义word模板,方便实战中钓鱼使用。",
         "fork": false,
         "created_at": "2022-06-02T12:33:18Z",
-        "updated_at": "2024-11-12T07:47:40Z",
+        "updated_at": "2024-11-25T03:31:59Z",
         "pushed_at": "2023-04-13T16:46:26Z",
-        "stargazers_count": 396,
-        "watchers_count": 396,
+        "stargazers_count": 395,
+        "watchers_count": 395,
         "has_discussions": false,
         "forks_count": 56,
         "allow_forking": true,
@@ -864,7 +864,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 56,
-        "watchers": 396,
+        "watchers": 395,
         "score": 0,
         "subscribers_count": 4
     },
diff --git a/2023/CVE-2023-23752.json b/2023/CVE-2023-23752.json
index 1a6143e46b..39bfd3aad2 100644
--- a/2023/CVE-2023-23752.json
+++ b/2023/CVE-2023-23752.json
@@ -1026,10 +1026,10 @@
         "description": "A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7",
         "fork": false,
         "created_at": "2023-12-04T13:05:08Z",
-        "updated_at": "2024-11-23T12:07:21Z",
+        "updated_at": "2024-11-25T06:02:13Z",
         "pushed_at": "2023-12-04T13:30:56Z",
-        "stargazers_count": 8,
-        "watchers_count": 8,
+        "stargazers_count": 9,
+        "watchers_count": 9,
         "has_discussions": false,
         "forks_count": 3,
         "allow_forking": true,
@@ -1044,7 +1044,7 @@
         ],
         "visibility": "public",
         "forks": 3,
-        "watchers": 8,
+        "watchers": 9,
         "score": 0,
         "subscribers_count": 1
     },
diff --git a/2023/CVE-2023-41425.json b/2023/CVE-2023-41425.json
index 1a1d67528e..0a1b8045cc 100644
--- a/2023/CVE-2023-41425.json
+++ b/2023/CVE-2023-41425.json
@@ -320,6 +320,6 @@
         "forks": 0,
         "watchers": 0,
         "score": 0,
-        "subscribers_count": 0
+        "subscribers_count": 1
     }
 ]
\ No newline at end of file
diff --git a/2023/CVE-2023-4634.json b/2023/CVE-2023-4634.json
index ce85ce5871..4d8e2aee34 100644
--- a/2023/CVE-2023-4634.json
+++ b/2023/CVE-2023-4634.json
@@ -14,10 +14,10 @@
         "description": "CVE-2023-4634",
         "fork": false,
         "created_at": "2023-09-05T07:44:15Z",
-        "updated_at": "2024-10-30T04:42:03Z",
+        "updated_at": "2024-11-25T06:12:49Z",
         "pushed_at": "2023-09-07T05:36:10Z",
-        "stargazers_count": 45,
-        "watchers_count": 45,
+        "stargazers_count": 46,
+        "watchers_count": 46,
         "has_discussions": false,
         "forks_count": 9,
         "allow_forking": true,
@@ -26,7 +26,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 9,
-        "watchers": 45,
+        "watchers": 46,
         "score": 0,
         "subscribers_count": 3
     }
diff --git a/2024/CVE-2024-0012.json b/2024/CVE-2024-0012.json
index 23d7bc4a71..dd52783786 100644
--- a/2024/CVE-2024-0012.json
+++ b/2024/CVE-2024-0012.json
@@ -14,19 +14,19 @@
         "description": null,
         "fork": false,
         "created_at": "2024-11-19T08:29:32Z",
-        "updated_at": "2024-11-22T12:12:57Z",
+        "updated_at": "2024-11-25T06:15:42Z",
         "pushed_at": "2024-11-19T09:28:42Z",
-        "stargazers_count": 19,
-        "watchers_count": 19,
+        "stargazers_count": 20,
+        "watchers_count": 20,
         "has_discussions": false,
-        "forks_count": 2,
+        "forks_count": 3,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 2,
-        "watchers": 19,
+        "forks": 3,
+        "watchers": 20,
         "score": 0,
         "subscribers_count": 0
     },
diff --git a/2024/CVE-2024-10924.json b/2024/CVE-2024-10924.json
index ac20e2358e..866230fd8c 100644
--- a/2024/CVE-2024-10924.json
+++ b/2024/CVE-2024-10924.json
@@ -113,10 +113,10 @@
         "description": "Exploits Really Simple Security < 9.1.2 authentication bypass (CVE-2024-10924).",
         "fork": false,
         "created_at": "2024-11-19T10:07:28Z",
-        "updated_at": "2024-11-23T03:39:12Z",
+        "updated_at": "2024-11-25T03:44:56Z",
         "pushed_at": "2024-11-19T12:20:16Z",
-        "stargazers_count": 11,
-        "watchers_count": 11,
+        "stargazers_count": 13,
+        "watchers_count": 13,
         "has_discussions": false,
         "forks_count": 11,
         "allow_forking": true,
@@ -134,7 +134,7 @@
         ],
         "visibility": "public",
         "forks": 11,
-        "watchers": 11,
+        "watchers": 13,
         "score": 0,
         "subscribers_count": 1
     },
diff --git a/2024/CVE-2024-11318.json b/2024/CVE-2024-11318.json
index 068cb7c35b..2021e8ecb8 100644
--- a/2024/CVE-2024-11318.json
+++ b/2024/CVE-2024-11318.json
@@ -35,6 +35,6 @@
         "forks": 0,
         "watchers": 1,
         "score": 0,
-        "subscribers_count": 0
+        "subscribers_count": 1
     }
 ]
\ No newline at end of file
diff --git a/2024/CVE-2024-11387.json b/2024/CVE-2024-11387.json
index fbfe1af5e4..3f0e051c40 100644
--- a/2024/CVE-2024-11387.json
+++ b/2024/CVE-2024-11387.json
@@ -28,6 +28,6 @@
         "forks": 0,
         "watchers": 0,
         "score": 0,
-        "subscribers_count": 0
+        "subscribers_count": 1
     }
 ]
\ No newline at end of file
diff --git a/2024/CVE-2024-21338.json b/2024/CVE-2024-21338.json
index e7765597e1..655c749af6 100644
--- a/2024/CVE-2024-21338.json
+++ b/2024/CVE-2024-21338.json
@@ -169,10 +169,10 @@
         "description": "Windows AppLocker Driver (appid.sys) LPE",
         "fork": false,
         "created_at": "2024-07-29T13:18:06Z",
-        "updated_at": "2024-11-25T00:30:32Z",
+        "updated_at": "2024-11-25T06:45:48Z",
         "pushed_at": "2024-07-29T13:29:59Z",
-        "stargazers_count": 37,
-        "watchers_count": 37,
+        "stargazers_count": 39,
+        "watchers_count": 39,
         "has_discussions": false,
         "forks_count": 13,
         "allow_forking": true,
@@ -186,7 +186,7 @@
         ],
         "visibility": "public",
         "forks": 13,
-        "watchers": 37,
+        "watchers": 39,
         "score": 0,
         "subscribers_count": 1
     }
diff --git a/2024/CVE-2024-21413.json b/2024/CVE-2024-21413.json
index 65f249df0d..8e5d95553e 100644
--- a/2024/CVE-2024-21413.json
+++ b/2024/CVE-2024-21413.json
@@ -45,10 +45,10 @@
         "description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
         "fork": false,
         "created_at": "2024-02-16T15:17:59Z",
-        "updated_at": "2024-11-24T18:00:45Z",
+        "updated_at": "2024-11-25T01:56:55Z",
         "pushed_at": "2024-02-19T20:00:35Z",
-        "stargazers_count": 697,
-        "watchers_count": 697,
+        "stargazers_count": 698,
+        "watchers_count": 698,
         "has_discussions": false,
         "forks_count": 153,
         "allow_forking": true,
@@ -57,7 +57,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 153,
-        "watchers": 697,
+        "watchers": 698,
         "score": 0,
         "subscribers_count": 10
     },
diff --git a/2024/CVE-2024-21534.json b/2024/CVE-2024-21534.json
index 586d4749cb..b52acef8ff 100644
--- a/2024/CVE-2024-21534.json
+++ b/2024/CVE-2024-21534.json
@@ -32,8 +32,8 @@
     },
     {
         "id": 892949211,
-        "name": "CVE-2024-21534-poc",
-        "full_name": "XiaomingX\/CVE-2024-21534-poc",
+        "name": "cve-2024-21534-poc",
+        "full_name": "XiaomingX\/cve-2024-21534-poc",
         "owner": {
             "login": "XiaomingX",
             "id": 5387930,
@@ -41,11 +41,11 @@
             "html_url": "https:\/\/github.com\/XiaomingX",
             "user_view_type": "public"
         },
-        "html_url": "https:\/\/github.com\/XiaomingX\/CVE-2024-21534-poc",
+        "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-21534-poc",
         "description": "jsonpath-plus 包(版本 <=10.0.7)存在严重的远程代码执行(RCE)漏洞,允许攻击者通过 Node.js 的 VM 模块执行任意代码。该漏洞由于输入验证不严格导致,影响版本为 10.0.7 以下,CVSS 分数为 9.8(极其严重)。漏洞首次公开于 2024 年 10 月 11 日。",
         "fork": false,
         "created_at": "2024-11-23T05:54:24Z",
-        "updated_at": "2024-11-24T06:36:46Z",
+        "updated_at": "2024-11-25T05:24:15Z",
         "pushed_at": "2024-11-23T05:57:35Z",
         "stargazers_count": 0,
         "watchers_count": 0,
diff --git a/2024/CVE-2024-21762.json b/2024/CVE-2024-21762.json
index 84b0342138..fbe65507e1 100644
--- a/2024/CVE-2024-21762.json
+++ b/2024/CVE-2024-21762.json
@@ -214,6 +214,6 @@
         "forks": 0,
         "watchers": 0,
         "score": 0,
-        "subscribers_count": 0
+        "subscribers_count": 1
     }
 ]
\ No newline at end of file
diff --git a/2024/CVE-2024-29404.json b/2024/CVE-2024-29404.json
index 6fac8c0c52..ff06687b48 100644
--- a/2024/CVE-2024-29404.json
+++ b/2024/CVE-2024-29404.json
@@ -28,6 +28,6 @@
         "forks": 0,
         "watchers": 0,
         "score": 0,
-        "subscribers_count": 0
+        "subscribers_count": 1
     }
 ]
\ No newline at end of file
diff --git a/2024/CVE-2024-30090.json b/2024/CVE-2024-30090.json
index 2b7fdec83a..35a07c9032 100644
--- a/2024/CVE-2024-30090.json
+++ b/2024/CVE-2024-30090.json
@@ -14,19 +14,19 @@
         "description": "CVE-2024-30090 - LPE PoC",
         "fork": false,
         "created_at": "2024-10-17T08:38:47Z",
-        "updated_at": "2024-11-23T09:42:48Z",
+        "updated_at": "2024-11-25T02:51:02Z",
         "pushed_at": "2024-10-17T09:53:33Z",
-        "stargazers_count": 95,
-        "watchers_count": 95,
+        "stargazers_count": 97,
+        "watchers_count": 97,
         "has_discussions": false,
-        "forks_count": 21,
+        "forks_count": 22,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 21,
-        "watchers": 95,
+        "forks": 22,
+        "watchers": 97,
         "score": 0,
         "subscribers_count": 3
     }
diff --git a/2024/CVE-2024-32002.json b/2024/CVE-2024-32002.json
index ec0c3e562b..276c0de013 100644
--- a/2024/CVE-2024-32002.json
+++ b/2024/CVE-2024-32002.json
@@ -81,7 +81,7 @@
         "stargazers_count": 516,
         "watchers_count": 516,
         "has_discussions": false,
-        "forks_count": 145,
+        "forks_count": 146,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
@@ -92,7 +92,7 @@
             "rce"
         ],
         "visibility": "public",
-        "forks": 145,
+        "forks": 146,
         "watchers": 516,
         "score": 0,
         "subscribers_count": 3
diff --git a/2024/CVE-2024-33901.json b/2024/CVE-2024-33901.json
index ad41655798..efd27dc2fb 100644
--- a/2024/CVE-2024-33901.json
+++ b/2024/CVE-2024-33901.json
@@ -14,10 +14,10 @@
         "description": "Short program that demonstrates the vulnerability CVE-2024-33901 in KeePassXC version 2.7.7",
         "fork": false,
         "created_at": "2024-11-24T05:43:27Z",
-        "updated_at": "2024-11-24T23:34:06Z",
+        "updated_at": "2024-11-25T06:15:40Z",
         "pushed_at": "2024-11-24T23:34:03Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
+        "stargazers_count": 2,
+        "watchers_count": 2,
         "has_discussions": false,
         "forks_count": 0,
         "allow_forking": true,
@@ -26,8 +26,8 @@
         "topics": [],
         "visibility": "public",
         "forks": 0,
-        "watchers": 0,
+        "watchers": 2,
         "score": 0,
-        "subscribers_count": 0
+        "subscribers_count": 1
     }
 ]
\ No newline at end of file
diff --git a/2024/CVE-2024-35250.json b/2024/CVE-2024-35250.json
index e208847d75..a22a20511f 100644
--- a/2024/CVE-2024-35250.json
+++ b/2024/CVE-2024-35250.json
@@ -14,10 +14,10 @@
         "description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
         "fork": false,
         "created_at": "2024-10-13T19:30:20Z",
-        "updated_at": "2024-11-21T05:18:07Z",
+        "updated_at": "2024-11-25T06:25:10Z",
         "pushed_at": "2024-11-12T15:28:48Z",
-        "stargazers_count": 208,
-        "watchers_count": 208,
+        "stargazers_count": 209,
+        "watchers_count": 209,
         "has_discussions": false,
         "forks_count": 46,
         "allow_forking": true,
@@ -26,7 +26,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 46,
-        "watchers": 208,
+        "watchers": 209,
         "score": 0,
         "subscribers_count": 6
     },
@@ -45,10 +45,10 @@
         "description": "Cobalt Strike 的 CVE-2024-35250 的 BOF。(请给我加个星,谢谢。) ",
         "fork": false,
         "created_at": "2024-10-25T10:06:09Z",
-        "updated_at": "2024-11-23T02:44:01Z",
+        "updated_at": "2024-11-25T03:42:58Z",
         "pushed_at": "2024-10-21T04:15:27Z",
-        "stargazers_count": 2,
-        "watchers_count": 2,
+        "stargazers_count": 3,
+        "watchers_count": 3,
         "has_discussions": false,
         "forks_count": 3,
         "allow_forking": true,
@@ -57,7 +57,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 3,
-        "watchers": 2,
+        "watchers": 3,
         "score": 0,
         "subscribers_count": 0
     },
@@ -76,10 +76,10 @@
         "description": "CVE-2024-35250 的 Beacon Object File (BOF) 实现。",
         "fork": false,
         "created_at": "2024-11-23T12:12:00Z",
-        "updated_at": "2024-11-24T11:12:24Z",
+        "updated_at": "2024-11-25T01:58:28Z",
         "pushed_at": "2024-11-23T12:20:56Z",
-        "stargazers_count": 1,
-        "watchers_count": 1,
+        "stargazers_count": 2,
+        "watchers_count": 2,
         "has_discussions": false,
         "forks_count": 0,
         "allow_forking": true,
@@ -92,7 +92,7 @@
         ],
         "visibility": "public",
         "forks": 0,
-        "watchers": 1,
+        "watchers": 2,
         "score": 0,
         "subscribers_count": 1
     }
diff --git a/2024/CVE-2024-4367.json b/2024/CVE-2024-4367.json
index b5fba2c7a6..88987f2d05 100644
--- a/2024/CVE-2024-4367.json
+++ b/2024/CVE-2024-4367.json
@@ -216,10 +216,10 @@
         "description": "This project is intended to serve as a proof of concept to demonstrate exploiting the vulnerability in the PDF.js (pdfjs-dist) library reported in CVE-2024-4367",
         "fork": false,
         "created_at": "2024-06-17T11:39:41Z",
-        "updated_at": "2024-08-11T10:08:06Z",
+        "updated_at": "2024-11-25T04:23:00Z",
         "pushed_at": "2024-06-20T13:40:31Z",
-        "stargazers_count": 6,
-        "watchers_count": 6,
+        "stargazers_count": 7,
+        "watchers_count": 7,
         "has_discussions": false,
         "forks_count": 0,
         "allow_forking": true,
@@ -228,7 +228,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 0,
-        "watchers": 6,
+        "watchers": 7,
         "score": 0,
         "subscribers_count": 6
     },
diff --git a/2024/CVE-2024-4406.json b/2024/CVE-2024-4406.json
index f587d19dd8..93c124eba9 100644
--- a/2024/CVE-2024-4406.json
+++ b/2024/CVE-2024-4406.json
@@ -14,10 +14,10 @@
         "description": "Files related to the Pwn2Own Toronto 2023 exploit against the Xiaomi 13 Pro.",
         "fork": false,
         "created_at": "2024-10-14T09:38:04Z",
-        "updated_at": "2024-11-15T23:07:26Z",
+        "updated_at": "2024-11-25T06:46:01Z",
         "pushed_at": "2024-10-14T09:43:53Z",
-        "stargazers_count": 17,
-        "watchers_count": 17,
+        "stargazers_count": 18,
+        "watchers_count": 18,
         "has_discussions": false,
         "forks_count": 4,
         "allow_forking": true,
@@ -26,7 +26,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 4,
-        "watchers": 17,
+        "watchers": 18,
         "score": 0,
         "subscribers_count": 1
     }
diff --git a/2024/CVE-2024-47575.json b/2024/CVE-2024-47575.json
index 64cab520a8..04c437074f 100644
--- a/2024/CVE-2024-47575.json
+++ b/2024/CVE-2024-47575.json
@@ -14,10 +14,10 @@
         "description": "Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575",
         "fork": false,
         "created_at": "2024-11-07T21:03:30Z",
-        "updated_at": "2024-11-24T20:36:26Z",
+        "updated_at": "2024-11-25T03:57:48Z",
         "pushed_at": "2024-11-14T16:25:52Z",
-        "stargazers_count": 63,
-        "watchers_count": 63,
+        "stargazers_count": 64,
+        "watchers_count": 64,
         "has_discussions": false,
         "forks_count": 22,
         "allow_forking": true,
@@ -26,7 +26,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 22,
-        "watchers": 63,
+        "watchers": 64,
         "score": 0,
         "subscribers_count": 0
     },
diff --git a/2024/CVE-2024-48336.json b/2024/CVE-2024-48336.json
index 9121d4c779..ad4ee30d7c 100644
--- a/2024/CVE-2024-48336.json
+++ b/2024/CVE-2024-48336.json
@@ -19,13 +19,13 @@
         "stargazers_count": 174,
         "watchers_count": 174,
         "has_discussions": false,
-        "forks_count": 28,
+        "forks_count": 29,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 28,
+        "forks": 29,
         "watchers": 174,
         "score": 0,
         "subscribers_count": 8
diff --git a/2024/CVE-2024-48990.json b/2024/CVE-2024-48990.json
index 8d8797228b..095688150f 100644
--- a/2024/CVE-2024-48990.json
+++ b/2024/CVE-2024-48990.json
@@ -14,19 +14,19 @@
         "description": "PoC for CVE-2024-48990",
         "fork": false,
         "created_at": "2024-11-20T18:41:25Z",
-        "updated_at": "2024-11-24T22:27:14Z",
+        "updated_at": "2024-11-25T04:18:50Z",
         "pushed_at": "2024-11-20T18:49:33Z",
-        "stargazers_count": 59,
-        "watchers_count": 59,
+        "stargazers_count": 64,
+        "watchers_count": 64,
         "has_discussions": false,
-        "forks_count": 9,
+        "forks_count": 10,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 9,
-        "watchers": 59,
+        "forks": 10,
+        "watchers": 64,
         "score": 0,
         "subscribers_count": 1
     },
@@ -121,7 +121,7 @@
         "forks": 0,
         "watchers": 0,
         "score": 0,
-        "subscribers_count": 0
+        "subscribers_count": 1
     },
     {
         "id": 893347321,
@@ -152,7 +152,7 @@
         "forks": 0,
         "watchers": 0,
         "score": 0,
-        "subscribers_count": 0
+        "subscribers_count": 1
     },
     {
         "id": 893500783,
@@ -183,7 +183,7 @@
         "forks": 0,
         "watchers": 0,
         "score": 0,
-        "subscribers_count": 0
+        "subscribers_count": 1
     },
     {
         "id": 893561658,
@@ -220,6 +220,37 @@
         "forks": 0,
         "watchers": 0,
         "score": 0,
+        "subscribers_count": 1
+    },
+    {
+        "id": 893730273,
+        "name": "CVE-2024-48990-Exploit",
+        "full_name": "ally-petitt\/CVE-2024-48990-Exploit",
+        "owner": {
+            "login": "ally-petitt",
+            "id": 76501220,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76501220?v=4",
+            "html_url": "https:\/\/github.com\/ally-petitt",
+            "user_view_type": "public"
+        },
+        "html_url": "https:\/\/github.com\/ally-petitt\/CVE-2024-48990-Exploit",
+        "description": "My exploit for CVE-2024-48990. Full details of how I made this are on my blog.",
+        "fork": false,
+        "created_at": "2024-11-25T05:28:20Z",
+        "updated_at": "2024-11-25T05:29:14Z",
+        "pushed_at": "2024-11-25T05:29:10Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "has_discussions": false,
+        "forks_count": 0,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 0,
+        "watchers": 0,
+        "score": 0,
         "subscribers_count": 0
     }
 ]
\ No newline at end of file
diff --git a/2024/CVE-2024-49039.json b/2024/CVE-2024-49039.json
index 89fe142e51..ca0fafd5d5 100644
--- a/2024/CVE-2024-49039.json
+++ b/2024/CVE-2024-49039.json
@@ -14,10 +14,10 @@
         "description": "WPTaskScheduler RPC Persistence &  CVE-2024-49039 via Task Scheduler",
         "fork": false,
         "created_at": "2024-11-19T08:57:18Z",
-        "updated_at": "2024-11-24T21:18:30Z",
+        "updated_at": "2024-11-25T03:43:01Z",
         "pushed_at": "2024-11-19T09:15:26Z",
-        "stargazers_count": 4,
-        "watchers_count": 4,
+        "stargazers_count": 5,
+        "watchers_count": 5,
         "has_discussions": false,
         "forks_count": 3,
         "allow_forking": true,
@@ -26,7 +26,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 3,
-        "watchers": 4,
+        "watchers": 5,
         "score": 0,
         "subscribers_count": 1
     }
diff --git a/2024/CVE-2024-50395.json b/2024/CVE-2024-50395.json
new file mode 100644
index 0000000000..c53176cb36
--- /dev/null
+++ b/2024/CVE-2024-50395.json
@@ -0,0 +1,33 @@
+[
+    {
+        "id": 893743289,
+        "name": "CVE-2024-50395",
+        "full_name": "neko-hat\/CVE-2024-50395",
+        "owner": {
+            "login": "neko-hat",
+            "id": 29542700,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29542700?v=4",
+            "html_url": "https:\/\/github.com\/neko-hat",
+            "user_view_type": "public"
+        },
+        "html_url": "https:\/\/github.com\/neko-hat\/CVE-2024-50395",
+        "description": null,
+        "fork": false,
+        "created_at": "2024-11-25T06:06:25Z",
+        "updated_at": "2024-11-25T06:11:52Z",
+        "pushed_at": "2024-11-25T06:11:47Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "has_discussions": false,
+        "forks_count": 0,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 0,
+        "watchers": 0,
+        "score": 0,
+        "subscribers_count": 0
+    }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json
index 1b2ee81528..3d302d31bd 100644
--- a/2024/CVE-2024-6387.json
+++ b/2024/CVE-2024-6387.json
@@ -2914,6 +2914,6 @@
         "forks": 0,
         "watchers": 0,
         "score": 0,
-        "subscribers_count": 0
+        "subscribers_count": 1
     }
 ]
\ No newline at end of file
diff --git a/2024/CVE-2024-9465.json b/2024/CVE-2024-9465.json
index 3f8c4f1373..8dfe27a001 100644
--- a/2024/CVE-2024-9465.json
+++ b/2024/CVE-2024-9465.json
@@ -14,10 +14,10 @@
         "description": "Proof of Concept Exploit for CVE-2024-9465",
         "fork": false,
         "created_at": "2024-10-09T16:22:05Z",
-        "updated_at": "2024-11-20T16:31:06Z",
+        "updated_at": "2024-11-25T02:31:41Z",
         "pushed_at": "2024-10-09T16:34:42Z",
-        "stargazers_count": 25,
-        "watchers_count": 25,
+        "stargazers_count": 26,
+        "watchers_count": 26,
         "has_discussions": false,
         "forks_count": 4,
         "allow_forking": true,
@@ -26,7 +26,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 4,
-        "watchers": 25,
+        "watchers": 26,
         "score": 0,
         "subscribers_count": 4
     },
diff --git a/2024/CVE-2024-9926.json b/2024/CVE-2024-9926.json
index b651c3690b..2cf54398c2 100644
--- a/2024/CVE-2024-9926.json
+++ b/2024/CVE-2024-9926.json
@@ -14,10 +14,10 @@
         "description": "WARNING: This is a vulnerable application to test the exploit for the Jetpack < 13.9.1 broken access control (CVE-2024-9926). Run it at your own risk!",
         "fork": false,
         "created_at": "2024-10-23T19:12:55Z",
-        "updated_at": "2024-11-09T11:13:41Z",
+        "updated_at": "2024-11-25T03:27:38Z",
         "pushed_at": "2024-11-09T11:13:38Z",
-        "stargazers_count": 1,
-        "watchers_count": 1,
+        "stargazers_count": 2,
+        "watchers_count": 2,
         "has_discussions": false,
         "forks_count": 0,
         "allow_forking": true,
@@ -32,7 +32,7 @@
         ],
         "visibility": "public",
         "forks": 0,
-        "watchers": 1,
+        "watchers": 2,
         "score": 0,
         "subscribers_count": 1
     },
diff --git a/README.md b/README.md
index fd00e8d597..3d58e98722 100644
--- a/README.md
+++ b/README.md
@@ -2416,7 +2416,7 @@
 </code>
 
 - [pabloopez/CVE-2024-21534](https://github.com/pabloopez/CVE-2024-21534)
-- [XiaomingX/CVE-2024-21534-poc](https://github.com/XiaomingX/CVE-2024-21534-poc)
+- [XiaomingX/cve-2024-21534-poc](https://github.com/XiaomingX/cve-2024-21534-poc)
 
 ### CVE-2024-21626 (2024-01-31)
 
@@ -6643,6 +6643,7 @@
 - [pentestfunctions/CVE-2024-48990-PoC-Testing](https://github.com/pentestfunctions/CVE-2024-48990-PoC-Testing)
 - [r0xdeadbeef/CVE-2024-48990-exploit](https://github.com/r0xdeadbeef/CVE-2024-48990-exploit)
 - [njeru-codes/needrestart-vulnerability-poc](https://github.com/njeru-codes/needrestart-vulnerability-poc)
+- [ally-petitt/CVE-2024-48990-Exploit](https://github.com/ally-petitt/CVE-2024-48990-Exploit)
 
 ### CVE-2024-49039 (2024-11-12)
 
@@ -6707,6 +6708,13 @@
 
 - [Nyamort/CVE-2024-50340](https://github.com/Nyamort/CVE-2024-50340)
 
+### CVE-2024-50395 (2024-11-22)
+
+<code>An authorization bypass through user-controlled key vulnerability has been reported to affect Media Streaming add-on. If exploited, the vulnerability could allow local network attackers to gain privilege.\n\nWe have already fixed the vulnerability in the following version:\nMedia Streaming add-on 500.1.1.6 ( 2024/08/02 ) and later
+</code>
+
+- [neko-hat/CVE-2024-50395](https://github.com/neko-hat/CVE-2024-50395)
+
 ### CVE-2024-50427 (2024-10-29)
 
 <code>Unrestricted Upload of File with Dangerous Type vulnerability in Devsoft Baltic OÜ SurveyJS: Drag &amp; Drop WordPress Form Builder.This issue affects SurveyJS: Drag &amp; Drop WordPress Form Builder: from n/a through 1.9.136.