From 946ea6f4eae96fe6633ef5a172319683f7ac2cec Mon Sep 17 00:00:00 2001
From: motikan2010-bot <k.agena1993@gmail.com>
Date: Tue, 4 Aug 2020 06:10:07 +0900
Subject: [PATCH] Auto Update 2020/08/04 06:10:07

---
 2005/CVE-2005-2428.json  | 25 ----------------
 2008/CVE-2008-0166.json  |  8 ++---
 2009/CVE-2009-0229.json  | 25 ----------------
 2009/CVE-2009-0689.json  | 25 ----------------
 2009/CVE-2009-1244.json  | 25 ----------------
 2009/CVE-2009-1330.json  | 46 -----------------------------
 2009/CVE-2009-1437.json  | 25 ----------------
 2009/CVE-2009-2698.json  | 25 ----------------
 2009/CVE-2009-4137.json  | 25 ----------------
 2009/CVE-2009-5147.json  | 23 ---------------
 2014/CVE-2014-4210.json  |  8 ++---
 2016/CVE-2016-0638.json  |  8 ++---
 2017/CVE-2017-2370.json  | 46 -----------------------------
 2017/CVE-2017-3248.json  |  8 ++---
 2017/CVE-2017-3599.json  |  8 ++---
 2017/CVE-2017-3730.json  | 23 ---------------
 2017/CVE-2017-7494.json  |  8 ++---
 2018/CVE-2018-2628.json  |  8 ++---
 2018/CVE-2018-4441.json  |  8 ++---
 2018/CVE-2018-6242.json  |  4 +--
 2018/CVE-2018-8414.json  |  4 +--
 2019/CVE-2019-0604.json  |  8 ++---
 2019/CVE-2019-11539.json |  4 +--
 2019/CVE-2019-17570.json |  8 ++---
 2019/CVE-2019-19634.json |  8 ++---
 2019/CVE-2019-2618.json  |  8 ++---
 2019/CVE-2019-3980.json  |  4 +--
 2019/CVE-2019-9730.json  |  4 +--
 2020/CVE-2020-0601.json  |  8 ++---
 2020/CVE-2020-0668.json  |  4 +--
 2020/CVE-2020-0674.json  |  4 +--
 2020/CVE-2020-0688.json  | 16 +++++-----
 2020/CVE-2020-0787.json  |  8 ++---
 2020/CVE-2020-1048.json  | 23 ---------------
 2020/CVE-2020-1313.json  |  8 ++---
 2020/CVE-2020-13151.json |  6 ++--
 2020/CVE-2020-14645.json |  4 +--
 2020/CVE-2020-2551.json  |  8 ++---
 2020/CVE-2020-3952.json  |  8 ++---
 2020/CVE-2020-5902.json  |  4 +--
 2020/CVE-2020-9934.json  |  8 ++---
 README.md                | 63 ----------------------------------------
 42 files changed, 101 insertions(+), 500 deletions(-)
 delete mode 100644 2005/CVE-2005-2428.json
 delete mode 100644 2009/CVE-2009-0229.json
 delete mode 100644 2009/CVE-2009-0689.json
 delete mode 100644 2009/CVE-2009-1244.json
 delete mode 100644 2009/CVE-2009-1437.json
 delete mode 100644 2009/CVE-2009-2698.json
 delete mode 100644 2009/CVE-2009-4137.json

diff --git a/2005/CVE-2005-2428.json b/2005/CVE-2005-2428.json
deleted file mode 100644
index 7c4515dae6..0000000000
--- a/2005/CVE-2005-2428.json
+++ /dev/null
@@ -1,25 +0,0 @@
-[
-    {
-        "id": 178449456,
-        "name": "CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit",
-        "full_name": "schwankner\/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit",
-        "owner": {
-            "login": "schwankner",
-            "id": 1496765,
-            "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/1496765?v=4",
-            "html_url": "https:\/\/github.com\/schwankner"
-        },
-        "html_url": "https:\/\/github.com\/schwankner\/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit",
-        "description": "IBM Lotus Domino <= R8 Password Hash Extraction Exploit",
-        "fork": false,
-        "created_at": "2019-03-29T17:31:14Z",
-        "updated_at": "2019-08-26T16:40:59Z",
-        "pushed_at": "2019-03-29T17:31:55Z",
-        "stargazers_count": 2,
-        "watchers_count": 2,
-        "forks_count": 1,
-        "forks": 1,
-        "watchers": 2,
-        "score": 0
-    }
-]
\ No newline at end of file
diff --git a/2008/CVE-2008-0166.json b/2008/CVE-2008-0166.json
index a7cbfe7025..eda2ff12eb 100644
--- a/2008/CVE-2008-0166.json
+++ b/2008/CVE-2008-0166.json
@@ -13,13 +13,13 @@
         "description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
         "fork": false,
         "created_at": "2013-09-22T21:20:31Z",
-        "updated_at": "2020-08-02T13:01:44Z",
+        "updated_at": "2020-08-03T17:22:57Z",
         "pushed_at": "2017-04-24T14:16:56Z",
-        "stargazers_count": 264,
-        "watchers_count": 264,
+        "stargazers_count": 265,
+        "watchers_count": 265,
         "forks_count": 85,
         "forks": 85,
-        "watchers": 264,
+        "watchers": 265,
         "score": 0
     },
     {
diff --git a/2009/CVE-2009-0229.json b/2009/CVE-2009-0229.json
deleted file mode 100644
index 72d012c2f3..0000000000
--- a/2009/CVE-2009-0229.json
+++ /dev/null
@@ -1,25 +0,0 @@
-[
-    {
-        "id": 264008888,
-        "name": "CVE-2009-0229-PoC",
-        "full_name": "zveriu\/CVE-2009-0229-PoC",
-        "owner": {
-            "login": "zveriu",
-            "id": 3428446,
-            "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3428446?v=4",
-            "html_url": "https:\/\/github.com\/zveriu"
-        },
-        "html_url": "https:\/\/github.com\/zveriu\/CVE-2009-0229-PoC",
-        "description": "PoC for CVE-2009-0229 \"Print Spooler Read File Vulnerability\" LPE AFR (related to CVE-2020-1048)",
-        "fork": false,
-        "created_at": "2020-05-14T19:40:50Z",
-        "updated_at": "2020-05-20T20:29:49Z",
-        "pushed_at": "2020-05-15T11:32:42Z",
-        "stargazers_count": 2,
-        "watchers_count": 2,
-        "forks_count": 1,
-        "forks": 1,
-        "watchers": 2,
-        "score": 0
-    }
-]
\ No newline at end of file
diff --git a/2009/CVE-2009-0689.json b/2009/CVE-2009-0689.json
deleted file mode 100644
index 402abbca20..0000000000
--- a/2009/CVE-2009-0689.json
+++ /dev/null
@@ -1,25 +0,0 @@
-[
-    {
-        "id": 162229782,
-        "name": "str2hax",
-        "full_name": "Fullmetal5\/str2hax",
-        "owner": {
-            "login": "Fullmetal5",
-            "id": 3742968,
-            "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3742968?v=4",
-            "html_url": "https:\/\/github.com\/Fullmetal5"
-        },
-        "html_url": "https:\/\/github.com\/Fullmetal5\/str2hax",
-        "description": "An implementation of CVE-2009-0689 for the Nintendo Wii.",
-        "fork": false,
-        "created_at": "2018-12-18T04:24:43Z",
-        "updated_at": "2020-07-13T19:50:36Z",
-        "pushed_at": "2019-09-30T23:38:11Z",
-        "stargazers_count": 27,
-        "watchers_count": 27,
-        "forks_count": 4,
-        "forks": 4,
-        "watchers": 27,
-        "score": 0
-    }
-]
\ No newline at end of file
diff --git a/2009/CVE-2009-1244.json b/2009/CVE-2009-1244.json
deleted file mode 100644
index de05e8ad94..0000000000
--- a/2009/CVE-2009-1244.json
+++ /dev/null
@@ -1,25 +0,0 @@
-[
-    {
-        "id": 191334884,
-        "name": "vmware_exploit_pack_CVE-2009-1244",
-        "full_name": "piotrbania\/vmware_exploit_pack_CVE-2009-1244",
-        "owner": {
-            "login": "piotrbania",
-            "id": 51699228,
-            "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/51699228?v=4",
-            "html_url": "https:\/\/github.com\/piotrbania"
-        },
-        "html_url": "https:\/\/github.com\/piotrbania\/vmware_exploit_pack_CVE-2009-1244",
-        "description": "vmware cloudburst exploit CVE-2009-1244",
-        "fork": false,
-        "created_at": "2019-06-11T09:08:52Z",
-        "updated_at": "2020-04-14T09:22:50Z",
-        "pushed_at": "2019-06-11T13:49:03Z",
-        "stargazers_count": 1,
-        "watchers_count": 1,
-        "forks_count": 0,
-        "forks": 0,
-        "watchers": 1,
-        "score": 0
-    }
-]
\ No newline at end of file
diff --git a/2009/CVE-2009-1330.json b/2009/CVE-2009-1330.json
index 39109d701a..a413fe9115 100644
--- a/2009/CVE-2009-1330.json
+++ b/2009/CVE-2009-1330.json
@@ -1,50 +1,4 @@
 [
-    {
-        "id": 163585014,
-        "name": "CVE-2009-1330",
-        "full_name": "adenkiewicz\/CVE-2009-1330",
-        "owner": {
-            "login": "adenkiewicz",
-            "id": 1060275,
-            "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1060275?v=4",
-            "html_url": "https:\/\/github.com\/adenkiewicz"
-        },
-        "html_url": "https:\/\/github.com\/adenkiewicz\/CVE-2009-1330",
-        "description": "Simple exploit for Easy RM to MP3 Converter 2.7.3.700 on Windows 7 32b.",
-        "fork": false,
-        "created_at": "2018-12-30T12:17:08Z",
-        "updated_at": "2018-12-31T10:09:34Z",
-        "pushed_at": "2018-12-31T09:59:17Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
-        "forks_count": 0,
-        "forks": 0,
-        "watchers": 0,
-        "score": 0
-    },
-    {
-        "id": 164236833,
-        "name": "CVE-2009-1330",
-        "full_name": "war4uthor\/CVE-2009-1330",
-        "owner": {
-            "login": "war4uthor",
-            "id": 45926018,
-            "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/45926018?v=4",
-            "html_url": "https:\/\/github.com\/war4uthor"
-        },
-        "html_url": "https:\/\/github.com\/war4uthor\/CVE-2009-1330",
-        "description": "CVE-2009-1330 - Easy RM to MP3 Converter Local Buffer Overflow. Tested on Windows XP Professional SP3",
-        "fork": false,
-        "created_at": "2019-01-05T17:32:00Z",
-        "updated_at": "2019-01-06T12:29:19Z",
-        "pushed_at": "2019-01-06T12:29:18Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
-        "forks_count": 0,
-        "forks": 0,
-        "watchers": 0,
-        "score": 0
-    },
     {
         "id": 171340357,
         "name": "CVE-2009-1330_EasyRMToMp3Converter",
diff --git a/2009/CVE-2009-1437.json b/2009/CVE-2009-1437.json
deleted file mode 100644
index d8f1949e71..0000000000
--- a/2009/CVE-2009-1437.json
+++ /dev/null
@@ -1,25 +0,0 @@
-[
-    {
-        "id": 122073610,
-        "name": "CVE-2009-1437",
-        "full_name": "HanseSecure\/CVE-2009-1437",
-        "owner": {
-            "login": "HanseSecure",
-            "id": 24669088,
-            "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/24669088?v=4",
-            "html_url": "https:\/\/github.com\/HanseSecure"
-        },
-        "html_url": "https:\/\/github.com\/HanseSecure\/CVE-2009-1437",
-        "description": null,
-        "fork": false,
-        "created_at": "2018-02-19T14:26:18Z",
-        "updated_at": "2019-09-01T20:20:18Z",
-        "pushed_at": "2018-02-23T19:27:50Z",
-        "stargazers_count": 3,
-        "watchers_count": 3,
-        "forks_count": 0,
-        "forks": 0,
-        "watchers": 3,
-        "score": 0
-    }
-]
\ No newline at end of file
diff --git a/2009/CVE-2009-2698.json b/2009/CVE-2009-2698.json
deleted file mode 100644
index fb5df0cf47..0000000000
--- a/2009/CVE-2009-2698.json
+++ /dev/null
@@ -1,25 +0,0 @@
-[
-    {
-        "id": 121771822,
-        "name": "CVE-2009-2698",
-        "full_name": "xiaoxiaoleo\/CVE-2009-2698",
-        "owner": {
-            "login": "xiaoxiaoleo",
-            "id": 9813186,
-            "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/9813186?v=4",
-            "html_url": "https:\/\/github.com\/xiaoxiaoleo"
-        },
-        "html_url": "https:\/\/github.com\/xiaoxiaoleo\/CVE-2009-2698",
-        "description": "CVE-2009-2698 compiled for CentOS 4.8",
-        "fork": false,
-        "created_at": "2018-02-16T16:17:24Z",
-        "updated_at": "2018-03-12T20:07:49Z",
-        "pushed_at": "2018-02-16T16:30:00Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
-        "forks_count": 0,
-        "forks": 0,
-        "watchers": 0,
-        "score": 0
-    }
-]
\ No newline at end of file
diff --git a/2009/CVE-2009-4137.json b/2009/CVE-2009-4137.json
deleted file mode 100644
index 82a196bbb7..0000000000
--- a/2009/CVE-2009-4137.json
+++ /dev/null
@@ -1,25 +0,0 @@
-[
-    {
-        "id": 112379736,
-        "name": "CVE-2009-4137",
-        "full_name": "Alexeyan\/CVE-2009-4137",
-        "owner": {
-            "login": "Alexeyan",
-            "id": 6674109,
-            "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/6674109?v=4",
-            "html_url": "https:\/\/github.com\/Alexeyan"
-        },
-        "html_url": "https:\/\/github.com\/Alexeyan\/CVE-2009-4137",
-        "description": "Exploit for piwik CVE-2009-4140 RCE",
-        "fork": false,
-        "created_at": "2017-11-28T19:31:47Z",
-        "updated_at": "2019-12-19T19:46:29Z",
-        "pushed_at": "2018-01-15T10:40:23Z",
-        "stargazers_count": 4,
-        "watchers_count": 4,
-        "forks_count": 3,
-        "forks": 3,
-        "watchers": 4,
-        "score": 0
-    }
-]
\ No newline at end of file
diff --git a/2009/CVE-2009-5147.json b/2009/CVE-2009-5147.json
index e4a7718767..8175461fe0 100644
--- a/2009/CVE-2009-5147.json
+++ b/2009/CVE-2009-5147.json
@@ -21,28 +21,5 @@
         "forks": 0,
         "watchers": 0,
         "score": 0
-    },
-    {
-        "id": 183373457,
-        "name": "-Ruby-dl-handle.c-CVE-2009-5147-",
-        "full_name": "zhangyongbo100\/-Ruby-dl-handle.c-CVE-2009-5147-",
-        "owner": {
-            "login": "zhangyongbo100",
-            "id": 49974023,
-            "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/49974023?v=4",
-            "html_url": "https:\/\/github.com\/zhangyongbo100"
-        },
-        "html_url": "https:\/\/github.com\/zhangyongbo100\/-Ruby-dl-handle.c-CVE-2009-5147-",
-        "description": null,
-        "fork": false,
-        "created_at": "2019-04-25T06:46:50Z",
-        "updated_at": "2020-05-20T03:19:01Z",
-        "pushed_at": "2019-04-25T06:49:16Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
-        "forks_count": 0,
-        "forks": 0,
-        "watchers": 0,
-        "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json
index fe854f88ce..fb6d51a607 100644
--- a/2014/CVE-2014-4210.json
+++ b/2014/CVE-2014-4210.json
@@ -36,13 +36,13 @@
         "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2020-08-03T08:22:27Z",
+        "updated_at": "2020-08-03T16:12:57Z",
         "pushed_at": "2020-07-30T05:31:08Z",
-        "stargazers_count": 614,
-        "watchers_count": 614,
+        "stargazers_count": 616,
+        "watchers_count": 616,
         "forks_count": 148,
         "forks": 148,
-        "watchers": 614,
+        "watchers": 616,
         "score": 0
     },
     {
diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json
index 5ffecb34c8..23e4d1d4b6 100644
--- a/2016/CVE-2016-0638.json
+++ b/2016/CVE-2016-0638.json
@@ -13,13 +13,13 @@
         "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2020-08-03T08:22:27Z",
+        "updated_at": "2020-08-03T16:12:57Z",
         "pushed_at": "2020-07-30T05:31:08Z",
-        "stargazers_count": 614,
-        "watchers_count": 614,
+        "stargazers_count": 616,
+        "watchers_count": 616,
         "forks_count": 148,
         "forks": 148,
-        "watchers": 614,
+        "watchers": 616,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2017/CVE-2017-2370.json b/2017/CVE-2017-2370.json
index 62ba0b77cb..85a4fb9d26 100644
--- a/2017/CVE-2017-2370.json
+++ b/2017/CVE-2017-2370.json
@@ -1,50 +1,4 @@
 [
-    {
-        "id": 80148945,
-        "name": "extra_recipe",
-        "full_name": "maximehip\/extra_recipe",
-        "owner": {
-            "login": "maximehip",
-            "id": 6273425,
-            "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/6273425?v=4",
-            "html_url": "https:\/\/github.com\/maximehip"
-        },
-        "html_url": "https:\/\/github.com\/maximehip\/extra_recipe",
-        "description": "Ian Beer's exploit for CVE-2017-2370 (kernel memory r\/w on iOS 10.2)  https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=1004",
-        "fork": false,
-        "created_at": "2017-01-26T19:47:43Z",
-        "updated_at": "2017-01-26T19:48:19Z",
-        "pushed_at": "2017-01-26T19:48:18Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
-        "forks_count": 1,
-        "forks": 1,
-        "watchers": 0,
-        "score": 0
-    },
-    {
-        "id": 80717942,
-        "name": "extra_recipe",
-        "full_name": "JackBro\/extra_recipe",
-        "owner": {
-            "login": "JackBro",
-            "id": 21210712,
-            "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/21210712?v=4",
-            "html_url": "https:\/\/github.com\/JackBro"
-        },
-        "html_url": "https:\/\/github.com\/JackBro\/extra_recipe",
-        "description": "Ian Beer's exploit for CVE-2017-2370 (kernel memory r\/w on iOS 10.2)",
-        "fork": false,
-        "created_at": "2017-02-02T11:16:38Z",
-        "updated_at": "2017-10-14T08:34:32Z",
-        "pushed_at": "2017-01-27T17:44:09Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
-        "forks_count": 0,
-        "forks": 0,
-        "watchers": 0,
-        "score": 0
-    },
     {
         "id": 81874110,
         "name": "extra_recipe-iOS-10.2",
diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json
index 6189bd6547..b32657ced4 100644
--- a/2017/CVE-2017-3248.json
+++ b/2017/CVE-2017-3248.json
@@ -36,13 +36,13 @@
         "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2020-08-03T08:22:27Z",
+        "updated_at": "2020-08-03T16:12:57Z",
         "pushed_at": "2020-07-30T05:31:08Z",
-        "stargazers_count": 614,
-        "watchers_count": 614,
+        "stargazers_count": 616,
+        "watchers_count": 616,
         "forks_count": 148,
         "forks": 148,
-        "watchers": 614,
+        "watchers": 616,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2017/CVE-2017-3599.json b/2017/CVE-2017-3599.json
index 458dc363f9..e8d6881599 100644
--- a/2017/CVE-2017-3599.json
+++ b/2017/CVE-2017-3599.json
@@ -13,13 +13,13 @@
         "description": "Proof of concept exploit for CVE-2017-3599",
         "fork": false,
         "created_at": "2017-04-18T17:08:39Z",
-        "updated_at": "2020-05-15T17:39:30Z",
+        "updated_at": "2020-08-03T19:51:16Z",
         "pushed_at": "2017-04-18T17:10:18Z",
-        "stargazers_count": 16,
-        "watchers_count": 16,
+        "stargazers_count": 17,
+        "watchers_count": 17,
         "forks_count": 17,
         "forks": 17,
-        "watchers": 16,
+        "watchers": 17,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2017/CVE-2017-3730.json b/2017/CVE-2017-3730.json
index d160053a9d..23fa2045df 100644
--- a/2017/CVE-2017-3730.json
+++ b/2017/CVE-2017-3730.json
@@ -1,27 +1,4 @@
 [
-    {
-        "id": 79682713,
-        "name": "CVE-2017-3730",
-        "full_name": "guidovranken\/CVE-2017-3730",
-        "owner": {
-            "login": "guidovranken",
-            "id": 6846644,
-            "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/6846644?v=4",
-            "html_url": "https:\/\/github.com\/guidovranken"
-        },
-        "html_url": "https:\/\/github.com\/guidovranken\/CVE-2017-3730",
-        "description": "OpenSSL CVE-2017-3730 proof-of-concept",
-        "fork": false,
-        "created_at": "2017-01-22T00:40:34Z",
-        "updated_at": "2018-12-04T20:01:55Z",
-        "pushed_at": "2017-01-26T01:30:54Z",
-        "stargazers_count": 11,
-        "watchers_count": 11,
-        "forks_count": 5,
-        "forks": 5,
-        "watchers": 11,
-        "score": 0
-    },
     {
         "id": 97466064,
         "name": "OpenSSL-CVE-2017-3730",
diff --git a/2017/CVE-2017-7494.json b/2017/CVE-2017-7494.json
index 650534c83e..5c1d456f71 100644
--- a/2017/CVE-2017-7494.json
+++ b/2017/CVE-2017-7494.json
@@ -128,13 +128,13 @@
         "description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability",
         "fork": false,
         "created_at": "2017-06-05T16:25:57Z",
-        "updated_at": "2020-08-02T02:10:39Z",
+        "updated_at": "2020-08-03T18:15:37Z",
         "pushed_at": "2017-11-27T16:28:14Z",
-        "stargazers_count": 196,
-        "watchers_count": 196,
+        "stargazers_count": 197,
+        "watchers_count": 197,
         "forks_count": 68,
         "forks": 68,
-        "watchers": 196,
+        "watchers": 197,
         "score": 0
     },
     {
diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json
index dbc9d068b4..e3f2fa0d89 100644
--- a/2018/CVE-2018-2628.json
+++ b/2018/CVE-2018-2628.json
@@ -450,13 +450,13 @@
         "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2020-08-03T08:22:27Z",
+        "updated_at": "2020-08-03T16:12:57Z",
         "pushed_at": "2020-07-30T05:31:08Z",
-        "stargazers_count": 614,
-        "watchers_count": 614,
+        "stargazers_count": 616,
+        "watchers_count": 616,
         "forks_count": 148,
         "forks": 148,
-        "watchers": 614,
+        "watchers": 616,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2018/CVE-2018-4441.json b/2018/CVE-2018-4441.json
index 25d47c65b3..b73547bc13 100644
--- a/2018/CVE-2018-4441.json
+++ b/2018/CVE-2018-4441.json
@@ -13,13 +13,13 @@
         "description": "A WebKit exploit using CVE-2018-4441 to obtain RCE on PS4 6.20.",
         "fork": false,
         "created_at": "2019-03-08T18:06:10Z",
-        "updated_at": "2020-07-19T02:56:57Z",
+        "updated_at": "2020-08-03T21:01:09Z",
         "pushed_at": "2019-03-08T18:42:56Z",
-        "stargazers_count": 198,
-        "watchers_count": 198,
+        "stargazers_count": 199,
+        "watchers_count": 199,
         "forks_count": 54,
         "forks": 54,
-        "watchers": 198,
+        "watchers": 199,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2018/CVE-2018-6242.json b/2018/CVE-2018-6242.json
index 1e09905c2d..4c1f4a9fe9 100644
--- a/2018/CVE-2018-6242.json
+++ b/2018/CVE-2018-6242.json
@@ -82,8 +82,8 @@
         "description": "A WebUSB based payload launcher for devices vulnerable to CVE-2018-6242",
         "fork": false,
         "created_at": "2020-05-12T20:39:24Z",
-        "updated_at": "2020-05-23T18:22:57Z",
-        "pushed_at": "2020-05-23T05:46:52Z",
+        "updated_at": "2020-08-03T20:44:02Z",
+        "pushed_at": "2020-08-03T20:44:00Z",
         "stargazers_count": 1,
         "watchers_count": 1,
         "forks_count": 0,
diff --git a/2018/CVE-2018-8414.json b/2018/CVE-2018-8414.json
index df42fc36b2..23b962baa8 100644
--- a/2018/CVE-2018-8414.json
+++ b/2018/CVE-2018-8414.json
@@ -17,8 +17,8 @@
         "pushed_at": "2018-08-24T20:40:42Z",
         "stargazers_count": 18,
         "watchers_count": 18,
-        "forks_count": 5,
-        "forks": 5,
+        "forks_count": 4,
+        "forks": 4,
         "watchers": 18,
         "score": 0
     }
diff --git a/2019/CVE-2019-0604.json b/2019/CVE-2019-0604.json
index 2117152c81..8dff8cd890 100644
--- a/2019/CVE-2019-0604.json
+++ b/2019/CVE-2019-0604.json
@@ -13,13 +13,13 @@
         "description": "CVE-2019-0604",
         "fork": false,
         "created_at": "2019-03-23T05:01:54Z",
-        "updated_at": "2020-07-31T13:24:33Z",
+        "updated_at": "2020-08-03T17:08:15Z",
         "pushed_at": "2019-03-22T05:45:44Z",
-        "stargazers_count": 127,
-        "watchers_count": 127,
+        "stargazers_count": 126,
+        "watchers_count": 126,
         "forks_count": 75,
         "forks": 75,
-        "watchers": 127,
+        "watchers": 126,
         "score": 0
     },
     {
diff --git a/2019/CVE-2019-11539.json b/2019/CVE-2019-11539.json
index b351d121b1..e70a15fc64 100644
--- a/2019/CVE-2019-11539.json
+++ b/2019/CVE-2019-11539.json
@@ -17,8 +17,8 @@
         "pushed_at": "2019-09-04T17:39:35Z",
         "stargazers_count": 110,
         "watchers_count": 110,
-        "forks_count": 29,
-        "forks": 29,
+        "forks_count": 30,
+        "forks": 30,
         "watchers": 110,
         "score": 0
     }
diff --git a/2019/CVE-2019-17570.json b/2019/CVE-2019-17570.json
index 9bf139b236..5e3974800b 100644
--- a/2019/CVE-2019-17570.json
+++ b/2019/CVE-2019-17570.json
@@ -36,13 +36,13 @@
         "description": "CVE-2019-17570 details and proof of concept",
         "fork": false,
         "created_at": "2020-01-24T11:32:18Z",
-        "updated_at": "2020-08-03T14:13:44Z",
+        "updated_at": "2020-08-03T15:27:54Z",
         "pushed_at": "2020-06-15T22:01:13Z",
-        "stargazers_count": 60,
-        "watchers_count": 60,
+        "stargazers_count": 61,
+        "watchers_count": 61,
         "forks_count": 8,
         "forks": 8,
-        "watchers": 60,
+        "watchers": 61,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2019/CVE-2019-19634.json b/2019/CVE-2019-19634.json
index f7d7e32557..2a5a21357e 100644
--- a/2019/CVE-2019-19634.json
+++ b/2019/CVE-2019-19634.json
@@ -13,13 +13,13 @@
         "description": "This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4",
         "fork": false,
         "created_at": "2019-12-08T10:44:51Z",
-        "updated_at": "2020-07-31T12:58:39Z",
+        "updated_at": "2020-08-03T15:28:46Z",
         "pushed_at": "2019-12-08T17:55:01Z",
-        "stargazers_count": 34,
-        "watchers_count": 34,
+        "stargazers_count": 33,
+        "watchers_count": 33,
         "forks_count": 9,
         "forks": 9,
-        "watchers": 34,
+        "watchers": 33,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json
index 10fc7cc2be..cd97b046b0 100644
--- a/2019/CVE-2019-2618.json
+++ b/2019/CVE-2019-2618.json
@@ -151,13 +151,13 @@
         "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2020-08-03T08:22:27Z",
+        "updated_at": "2020-08-03T16:12:57Z",
         "pushed_at": "2020-07-30T05:31:08Z",
-        "stargazers_count": 614,
-        "watchers_count": 614,
+        "stargazers_count": 616,
+        "watchers_count": 616,
         "forks_count": 148,
         "forks": 148,
-        "watchers": 614,
+        "watchers": 616,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2019/CVE-2019-3980.json b/2019/CVE-2019-3980.json
index a87a9646d5..5415d60141 100644
--- a/2019/CVE-2019-3980.json
+++ b/2019/CVE-2019-3980.json
@@ -13,8 +13,8 @@
         "description": null,
         "fork": false,
         "created_at": "2020-08-03T14:12:56Z",
-        "updated_at": "2020-08-03T14:12:57Z",
-        "pushed_at": "2020-08-03T14:12:57Z",
+        "updated_at": "2020-08-03T16:13:37Z",
+        "pushed_at": "2020-08-03T16:13:34Z",
         "stargazers_count": 0,
         "watchers_count": 0,
         "forks_count": 0,
diff --git a/2019/CVE-2019-9730.json b/2019/CVE-2019-9730.json
index b9914db372..ea4ad8126c 100644
--- a/2019/CVE-2019-9730.json
+++ b/2019/CVE-2019-9730.json
@@ -17,8 +17,8 @@
         "pushed_at": "2019-04-15T11:17:39Z",
         "stargazers_count": 29,
         "watchers_count": 29,
-        "forks_count": 10,
-        "forks": 10,
+        "forks_count": 11,
+        "forks": 11,
         "watchers": 29,
         "score": 0
     }
diff --git a/2020/CVE-2020-0601.json b/2020/CVE-2020-0601.json
index 786a9ecf03..9750991087 100644
--- a/2020/CVE-2020-0601.json
+++ b/2020/CVE-2020-0601.json
@@ -128,13 +128,13 @@
         "description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
         "fork": false,
         "created_at": "2020-01-15T23:07:41Z",
-        "updated_at": "2020-07-28T10:20:53Z",
+        "updated_at": "2020-08-03T17:55:20Z",
         "pushed_at": "2020-01-20T23:33:19Z",
-        "stargazers_count": 818,
-        "watchers_count": 818,
+        "stargazers_count": 819,
+        "watchers_count": 819,
         "forks_count": 213,
         "forks": 213,
-        "watchers": 818,
+        "watchers": 819,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-0668.json b/2020/CVE-2020-0668.json
index 9ceec8d7c4..fe1fe9efa3 100644
--- a/2020/CVE-2020-0668.json
+++ b/2020/CVE-2020-0668.json
@@ -17,8 +17,8 @@
         "pushed_at": "2020-02-26T09:24:45Z",
         "stargazers_count": 44,
         "watchers_count": 44,
-        "forks_count": 15,
-        "forks": 15,
+        "forks_count": 16,
+        "forks": 16,
         "watchers": 44,
         "score": 0
     },
diff --git a/2020/CVE-2020-0674.json b/2020/CVE-2020-0674.json
index 32098fada4..c8d2f1cb26 100644
--- a/2020/CVE-2020-0674.json
+++ b/2020/CVE-2020-0674.json
@@ -40,8 +40,8 @@
         "pushed_at": "2020-05-15T09:03:36Z",
         "stargazers_count": 159,
         "watchers_count": 159,
-        "forks_count": 51,
-        "forks": 51,
+        "forks_count": 52,
+        "forks": 52,
         "watchers": 159,
         "score": 0
     }
diff --git a/2020/CVE-2020-0688.json b/2020/CVE-2020-0688.json
index c8876c53f2..f343e89bfc 100644
--- a/2020/CVE-2020-0688.json
+++ b/2020/CVE-2020-0688.json
@@ -59,13 +59,13 @@
         "description": "cve-2020-0688",
         "fork": false,
         "created_at": "2020-02-27T02:54:27Z",
-        "updated_at": "2020-08-03T01:30:06Z",
+        "updated_at": "2020-08-03T20:54:30Z",
         "pushed_at": "2020-06-19T09:28:15Z",
-        "stargazers_count": 203,
-        "watchers_count": 203,
+        "stargazers_count": 204,
+        "watchers_count": 204,
         "forks_count": 75,
         "forks": 75,
-        "watchers": 203,
+        "watchers": 204,
         "score": 0
     },
     {
@@ -82,13 +82,13 @@
         "description": "CVE-2020-0688_EXP Auto trigger payload & encrypt method",
         "fork": false,
         "created_at": "2020-02-27T13:53:46Z",
-        "updated_at": "2020-07-24T14:51:57Z",
+        "updated_at": "2020-08-03T20:57:47Z",
         "pushed_at": "2020-02-27T15:57:53Z",
-        "stargazers_count": 116,
-        "watchers_count": 116,
+        "stargazers_count": 117,
+        "watchers_count": 117,
         "forks_count": 47,
         "forks": 47,
-        "watchers": 116,
+        "watchers": 117,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-0787.json b/2020/CVE-2020-0787.json
index bf6cafece3..3d1c935507 100644
--- a/2020/CVE-2020-0787.json
+++ b/2020/CVE-2020-0787.json
@@ -13,13 +13,13 @@
         "description": "Support ALL Windows Version",
         "fork": false,
         "created_at": "2020-06-16T08:57:51Z",
-        "updated_at": "2020-07-31T13:07:29Z",
+        "updated_at": "2020-08-03T15:29:45Z",
         "pushed_at": "2020-06-18T00:42:57Z",
-        "stargazers_count": 382,
-        "watchers_count": 382,
+        "stargazers_count": 383,
+        "watchers_count": 383,
         "forks_count": 89,
         "forks": 89,
-        "watchers": 382,
+        "watchers": 383,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-1048.json b/2020/CVE-2020-1048.json
index 474d8b4bff..e4169fb3c1 100644
--- a/2020/CVE-2020-1048.json
+++ b/2020/CVE-2020-1048.json
@@ -1,27 +1,4 @@
 [
-    {
-        "id": 264008888,
-        "name": "CVE-2009-0229-PoC",
-        "full_name": "zveriu\/CVE-2009-0229-PoC",
-        "owner": {
-            "login": "zveriu",
-            "id": 3428446,
-            "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3428446?v=4",
-            "html_url": "https:\/\/github.com\/zveriu"
-        },
-        "html_url": "https:\/\/github.com\/zveriu\/CVE-2009-0229-PoC",
-        "description": "PoC for CVE-2009-0229 \"Print Spooler Read File Vulnerability\" LPE AFR (related to CVE-2020-1048)",
-        "fork": false,
-        "created_at": "2020-05-14T19:40:50Z",
-        "updated_at": "2020-05-20T20:29:49Z",
-        "pushed_at": "2020-05-15T11:32:42Z",
-        "stargazers_count": 2,
-        "watchers_count": 2,
-        "forks_count": 1,
-        "forks": 1,
-        "watchers": 2,
-        "score": 0
-    },
     {
         "id": 274483148,
         "name": "CVE-2020-1048",
diff --git a/2020/CVE-2020-1313.json b/2020/CVE-2020-1313.json
index 70712a1d32..9260033077 100644
--- a/2020/CVE-2020-1313.json
+++ b/2020/CVE-2020-1313.json
@@ -13,13 +13,13 @@
         "description": "Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability",
         "fork": false,
         "created_at": "2020-07-29T15:56:50Z",
-        "updated_at": "2020-08-03T12:21:25Z",
+        "updated_at": "2020-08-03T20:32:18Z",
         "pushed_at": "2020-07-30T07:48:40Z",
-        "stargazers_count": 84,
-        "watchers_count": 84,
+        "stargazers_count": 89,
+        "watchers_count": 89,
         "forks_count": 10,
         "forks": 10,
-        "watchers": 84,
+        "watchers": 89,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-13151.json b/2020/CVE-2020-13151.json
index 32a1a053d8..a37c7b2675 100644
--- a/2020/CVE-2020-13151.json
+++ b/2020/CVE-2020-13151.json
@@ -10,11 +10,11 @@
             "html_url": "https:\/\/github.com\/b4ny4n"
         },
         "html_url": "https:\/\/github.com\/b4ny4n\/CVE-2020-13151",
-        "description": null,
+        "description": "POC for CVE-2020-13151",
         "fork": false,
         "created_at": "2020-08-01T14:29:59Z",
-        "updated_at": "2020-08-01T21:58:32Z",
-        "pushed_at": "2020-08-01T21:58:29Z",
+        "updated_at": "2020-08-03T18:55:39Z",
+        "pushed_at": "2020-08-03T18:55:37Z",
         "stargazers_count": 0,
         "watchers_count": 0,
         "forks_count": 0,
diff --git a/2020/CVE-2020-14645.json b/2020/CVE-2020-14645.json
index 814303481e..dd3334e884 100644
--- a/2020/CVE-2020-14645.json
+++ b/2020/CVE-2020-14645.json
@@ -17,8 +17,8 @@
         "pushed_at": "2020-07-20T03:51:06Z",
         "stargazers_count": 63,
         "watchers_count": 63,
-        "forks_count": 8,
-        "forks": 8,
+        "forks_count": 9,
+        "forks": 9,
         "watchers": 63,
         "score": 0
     },
diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json
index 7fb8c73468..48cae0d06b 100644
--- a/2020/CVE-2020-2551.json
+++ b/2020/CVE-2020-2551.json
@@ -13,13 +13,13 @@
         "description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2020-08-03T08:22:27Z",
+        "updated_at": "2020-08-03T16:12:57Z",
         "pushed_at": "2020-07-30T05:31:08Z",
-        "stargazers_count": 614,
-        "watchers_count": 614,
+        "stargazers_count": 616,
+        "watchers_count": 616,
         "forks_count": 148,
         "forks": 148,
-        "watchers": 614,
+        "watchers": 616,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-3952.json b/2020/CVE-2020-3952.json
index 8963739cc1..b87273ee5b 100644
--- a/2020/CVE-2020-3952.json
+++ b/2020/CVE-2020-3952.json
@@ -59,13 +59,13 @@
         "description": "Exploit for CVE-2020-3952 in vCenter 6.7",
         "fork": false,
         "created_at": "2020-04-16T07:40:51Z",
-        "updated_at": "2020-07-31T13:13:30Z",
+        "updated_at": "2020-08-03T15:28:47Z",
         "pushed_at": "2020-04-16T08:38:42Z",
-        "stargazers_count": 193,
-        "watchers_count": 193,
+        "stargazers_count": 192,
+        "watchers_count": 192,
         "forks_count": 42,
         "forks": 42,
-        "watchers": 193,
+        "watchers": 192,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-5902.json b/2020/CVE-2020-5902.json
index 142bfb4bc7..38e7af062c 100644
--- a/2020/CVE-2020-5902.json
+++ b/2020/CVE-2020-5902.json
@@ -201,8 +201,8 @@
         "pushed_at": "2020-07-05T20:32:18Z",
         "stargazers_count": 11,
         "watchers_count": 11,
-        "forks_count": 7,
-        "forks": 7,
+        "forks_count": 8,
+        "forks": 8,
         "watchers": 11,
         "score": 0
     },
diff --git a/2020/CVE-2020-9934.json b/2020/CVE-2020-9934.json
index c5348cd415..156c398588 100644
--- a/2020/CVE-2020-9934.json
+++ b/2020/CVE-2020-9934.json
@@ -13,13 +13,13 @@
         "description": "CVE-2020–9934 POC",
         "fork": false,
         "created_at": "2020-07-27T22:09:01Z",
-        "updated_at": "2020-08-03T05:57:44Z",
+        "updated_at": "2020-08-03T15:15:09Z",
         "pushed_at": "2020-07-28T16:39:20Z",
-        "stargazers_count": 8,
-        "watchers_count": 8,
+        "stargazers_count": 9,
+        "watchers_count": 9,
         "forks_count": 1,
         "forks": 1,
-        "watchers": 8,
+        "watchers": 9,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/README.md b/README.md
index 91b20fbc37..511cd10d13 100644
--- a/README.md
+++ b/README.md
@@ -330,7 +330,6 @@ An elevation of privilege vulnerability exists in the way that the User-Mode Pow
 An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka 'Windows Print Spooler Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1070.
 </code>
 
-- [zveriu/CVE-2009-0229-PoC](https://github.com/zveriu/CVE-2009-0229-PoC)
 - [shubham0d/CVE-2020-1048](https://github.com/shubham0d/CVE-2020-1048)
 
 ### CVE-2020-1054
@@ -8690,8 +8689,6 @@ An issue was discovered in certain Apple products. iOS before 10.2.1 is affected
 An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. macOS before 10.12.3 is affected. tvOS before 10.1.1 is affected. watchOS before 3.1.3 is affected. The issue involves the &quot;Kernel&quot; component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (buffer overflow) via a crafted app.
 </code>
 
-- [maximehip/extra_recipe](https://github.com/maximehip/extra_recipe)
-- [JackBro/extra_recipe](https://github.com/JackBro/extra_recipe)
 - [Rootkitsmm/extra_recipe-iOS-10.2](https://github.com/Rootkitsmm/extra_recipe-iOS-10.2)
 - [Peterpan0927/CVE-2017-2370](https://github.com/Peterpan0927/CVE-2017-2370)
 
@@ -8815,7 +8812,6 @@ Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Serve
 In OpenSSL 1.1.0 before 1.1.0d, if a malicious server supplies bad parameters for a DHE or ECDHE key exchange then this can result in the client attempting to dereference a NULL pointer leading to a client crash. This could be exploited in a Denial of Service attack.
 </code>
 
-- [guidovranken/CVE-2017-3730](https://github.com/guidovranken/CVE-2017-3730)
 - [ymmah/OpenSSL-CVE-2017-3730](https://github.com/ymmah/OpenSSL-CVE-2017-3730)
 
 ### CVE-2017-3881
@@ -14109,14 +14105,6 @@ Liferay Portal through 6.2.10 allows remote authenticated users to execute arbit
 
 
 ## 2009
-### CVE-2009-0229
-
-<code>
-The Windows Printing Service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 allows local users to read arbitrary files via a crafted separator page, aka &quot;Print Spooler Read File Vulnerability.&quot;
-</code>
-
-- [zveriu/CVE-2009-0229-PoC](https://github.com/zveriu/CVE-2009-0229-PoC)
-
 ### CVE-2009-0473
 
 <code>
@@ -14125,14 +14113,6 @@ Open redirect vulnerability in the web interface in the Rockwell Automation Cont
 
 - [akbarq/CVE-2009-0473](https://github.com/akbarq/CVE-2009-0473)
 
-### CVE-2009-0689
-
-<code>
-Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.
-</code>
-
-- [Fullmetal5/str2hax](https://github.com/Fullmetal5/str2hax)
-
 ### CVE-2009-1151
 
 <code>
@@ -14141,14 +14121,6 @@ Static code injection vulnerability in setup.php in phpMyAdmin 2.11.x before 2.1
 
 - [minervais/pocs](https://github.com/minervais/pocs)
 
-### CVE-2009-1244
-
-<code>
-Unspecified vulnerability in the virtual machine display function in VMware Workstation 6.5.1 and earlier; VMware Player 2.5.1 and earlier; VMware ACE 2.5.1 and earlier; VMware Server 1.x before 1.0.9 build 156507 and 2.x before 2.0.1 build 156745; VMware Fusion before 2.0.4 build 159196; VMware ESXi 3.5; and VMware ESX 3.0.2, 3.0.3, and 3.5 allows guest OS users to execute arbitrary code on the host OS via unknown vectors, a different vulnerability than CVE-2008-4916.
-</code>
-
-- [piotrbania/vmware_exploit_pack_CVE-2009-1244](https://github.com/piotrbania/vmware_exploit_pack_CVE-2009-1244)
-
 ### CVE-2009-1324
 
 <code>
@@ -14163,18 +14135,8 @@ Stack-based buffer overflow in Mini-stream ASX to MP3 Converter 3.0.0.7 allows r
 Stack-based buffer overflow in Easy RM to MP3 Converter allows remote attackers to execute arbitrary code via a long filename in a playlist (.pls) file.
 </code>
 
-- [adenkiewicz/CVE-2009-1330](https://github.com/adenkiewicz/CVE-2009-1330)
-- [war4uthor/CVE-2009-1330](https://github.com/war4uthor/CVE-2009-1330)
 - [exploitwritter/CVE-2009-1330_EasyRMToMp3Converter](https://github.com/exploitwritter/CVE-2009-1330_EasyRMToMp3Converter)
 
-### CVE-2009-1437
-
-<code>
-Stack-based buffer overflow in PortableApps CoolPlayer Portable (aka CoolPlayer+ Portable) 2.19.6 and earlier allows remote attackers to execute arbitrary code via a long string in a malformed playlist (.m3u) file. NOTE: this may overlap CVE-2008-3408.
-</code>
-
-- [HanseSecure/CVE-2009-1437](https://github.com/HanseSecure/CVE-2009-1437)
-
 ### CVE-2009-1904
 
 <code>
@@ -14191,14 +14153,6 @@ The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not in
 
 - [jdvalentini/CVE-2009-2692](https://github.com/jdvalentini/CVE-2009-2692)
 
-### CVE-2009-2698
-
-<code>
-The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2) net/ipv6/udp.c in the Linux kernel before 2.6.19 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving the MSG_MORE flag and a UDP socket.
-</code>
-
-- [xiaoxiaoleo/CVE-2009-2698](https://github.com/xiaoxiaoleo/CVE-2009-2698)
-
 ### CVE-2009-3103
 
 <code>
@@ -14223,14 +14177,6 @@ The StartServiceCtrlDispatcher function in the cvpnd service (cvpnd.exe) in Cisc
 
 - [alt3kx/CVE-2009-4118](https://github.com/alt3kx/CVE-2009-4118)
 
-### CVE-2009-4137
-
-<code>
-The loadContentFromCookie function in core/Cookie.php in Piwik before 0.5 does not validate strings obtained from cookies before calling the unserialize function, which allows remote attackers to execute arbitrary code or upload arbitrary files via vectors related to the __destruct function in the Piwik_Config class; php://filter URIs; the __destruct functions in Zend Framework, as demonstrated by the Zend_Log destructor; the shutdown functions in Zend Framework, as demonstrated by the Zend_Log_Writer_Mail class; the render function in the Piwik_View class; Smarty templates; and the _eval function in Smarty.
-</code>
-
-- [Alexeyan/CVE-2009-4137](https://github.com/Alexeyan/CVE-2009-4137)
-
 ### CVE-2009-4660
 
 <code>
@@ -14246,7 +14192,6 @@ DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2.
 </code>
 
 - [vpereira/CVE-2009-5147](https://github.com/vpereira/CVE-2009-5147)
-- [zhangyongbo100/-Ruby-dl-handle.c-CVE-2009-5147-](https://github.com/zhangyongbo100/-Ruby-dl-handle.c-CVE-2009-5147-)
 
 
 ## 2008
@@ -14522,14 +14467,6 @@ Race condition in libsafe 2.0.16 and earlier, when running in multi-threaded app
 
 - [tagatac/libsafe-CVE-2005-1125](https://github.com/tagatac/libsafe-CVE-2005-1125)
 
-### CVE-2005-2428
-
-<code>
-Lotus Domino R5 and R6 WebMail, with &quot;Generate HTML for all fields&quot; enabled, stores sensitive data from names.nsf in hidden form fields, which allows remote attackers to read the HTML source to obtain sensitive information such as (1) the password hash in the HTTPPassword field, (2) the password change date in the HTTPPasswordChangeDate field, (3) the client platform in the ClntPltfrm field, (4) the client machine name in the ClntMachine field, and (5) the client Lotus Domino release in the ClntBld field, a different vulnerability than CVE-2005-2696.
-</code>
-
-- [schwankner/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit](https://github.com/schwankner/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit)
-
 
 ## 2004
 ### CVE-2004-0558