diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json
index 056a5276b4..40410b65c0 100644
--- a/2016/CVE-2016-0638.json
+++ b/2016/CVE-2016-0638.json
@@ -13,10 +13,10 @@
         "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2023-03-17T08:08:02Z",
+        "updated_at": "2023-03-19T10:43:27Z",
         "pushed_at": "2022-07-17T12:41:46Z",
-        "stargazers_count": 1642,
-        "watchers_count": 1642,
+        "stargazers_count": 1643,
+        "watchers_count": 1643,
         "has_discussions": false,
         "forks_count": 323,
         "allow_forking": true,
@@ -46,7 +46,7 @@
         ],
         "visibility": "public",
         "forks": 323,
-        "watchers": 1642,
+        "watchers": 1643,
         "score": 0
     },
     {
diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json
index 263161ec7a..97738868cf 100644
--- a/2017/CVE-2017-3248.json
+++ b/2017/CVE-2017-3248.json
@@ -42,10 +42,10 @@
         "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2023-03-17T08:08:02Z",
+        "updated_at": "2023-03-19T10:43:27Z",
         "pushed_at": "2022-07-17T12:41:46Z",
-        "stargazers_count": 1642,
-        "watchers_count": 1642,
+        "stargazers_count": 1643,
+        "watchers_count": 1643,
         "has_discussions": false,
         "forks_count": 323,
         "allow_forking": true,
@@ -75,7 +75,7 @@
         ],
         "visibility": "public",
         "forks": 323,
-        "watchers": 1642,
+        "watchers": 1643,
         "score": 0
     },
     {
diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json
index 6ae31f198d..cbed8f7a2a 100644
--- a/2018/CVE-2018-2628.json
+++ b/2018/CVE-2018-2628.json
@@ -568,10 +568,10 @@
         "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2023-03-17T08:08:02Z",
+        "updated_at": "2023-03-19T10:43:27Z",
         "pushed_at": "2022-07-17T12:41:46Z",
-        "stargazers_count": 1642,
-        "watchers_count": 1642,
+        "stargazers_count": 1643,
+        "watchers_count": 1643,
         "has_discussions": false,
         "forks_count": 323,
         "allow_forking": true,
@@ -601,7 +601,7 @@
         ],
         "visibility": "public",
         "forks": 323,
-        "watchers": 1642,
+        "watchers": 1643,
         "score": 0
     },
     {
diff --git a/2018/CVE-2018-3639.json b/2018/CVE-2018-3639.json
index 1977193e6a..27314d787d 100644
--- a/2018/CVE-2018-3639.json
+++ b/2018/CVE-2018-3639.json
@@ -77,10 +77,10 @@
         "description": "Speculative Store Bypass (CVE-2018-3639) proof of concept for Linux",
         "fork": false,
         "created_at": "2019-05-11T12:11:05Z",
-        "updated_at": "2023-03-11T14:31:06Z",
+        "updated_at": "2023-03-19T08:41:46Z",
         "pushed_at": "2021-10-22T16:05:33Z",
-        "stargazers_count": 7,
-        "watchers_count": 7,
+        "stargazers_count": 8,
+        "watchers_count": 8,
         "has_discussions": false,
         "forks_count": 2,
         "allow_forking": true,
@@ -93,7 +93,7 @@
         ],
         "visibility": "public",
         "forks": 2,
-        "watchers": 7,
+        "watchers": 8,
         "score": 0
     },
     {
diff --git a/2018/CVE-2018-6242.json b/2018/CVE-2018-6242.json
index 7cda815eb3..ff0c13ae7e 100644
--- a/2018/CVE-2018-6242.json
+++ b/2018/CVE-2018-6242.json
@@ -13,10 +13,10 @@
         "description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
         "fork": false,
         "created_at": "2018-04-28T11:50:00Z",
-        "updated_at": "2023-03-08T09:30:11Z",
+        "updated_at": "2023-03-19T11:31:46Z",
         "pushed_at": "2022-12-11T10:44:39Z",
-        "stargazers_count": 475,
-        "watchers_count": 475,
+        "stargazers_count": 477,
+        "watchers_count": 477,
         "has_discussions": false,
         "forks_count": 60,
         "allow_forking": true,
@@ -32,7 +32,7 @@
         ],
         "visibility": "public",
         "forks": 60,
-        "watchers": 475,
+        "watchers": 477,
         "score": 0
     },
     {
diff --git a/2018/CVE-2018-6376.json b/2018/CVE-2018-6376.json
index f33abf765c..5354e30d7b 100644
--- a/2018/CVE-2018-6376.json
+++ b/2018/CVE-2018-6376.json
@@ -13,7 +13,7 @@
         "description": "Joomla!, Second Order SQL Injection",
         "fork": false,
         "created_at": "2018-02-12T05:02:52Z",
-        "updated_at": "2018-10-04T17:23:42Z",
+        "updated_at": "2023-03-19T07:44:34Z",
         "pushed_at": "2018-02-12T12:14:40Z",
         "stargazers_count": 1,
         "watchers_count": 1,
diff --git a/2019/CVE-2019-1458.json b/2019/CVE-2019-1458.json
index 3e6a5cb3d8..7e267326b3 100644
--- a/2019/CVE-2019-1458.json
+++ b/2019/CVE-2019-1458.json
@@ -42,10 +42,10 @@
         "description": "CVE-2019-1458 Windows LPE Exploit",
         "fork": false,
         "created_at": "2020-03-11T08:30:14Z",
-        "updated_at": "2023-02-04T13:29:09Z",
+        "updated_at": "2023-03-19T07:59:19Z",
         "pushed_at": "2020-03-11T09:59:01Z",
-        "stargazers_count": 125,
-        "watchers_count": 125,
+        "stargazers_count": 126,
+        "watchers_count": 126,
         "has_discussions": false,
         "forks_count": 37,
         "allow_forking": true,
@@ -58,7 +58,7 @@
         ],
         "visibility": "public",
         "forks": 37,
-        "watchers": 125,
+        "watchers": 126,
         "score": 0
     },
     {
diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json
index 4ad5dfbb07..706b29ccce 100644
--- a/2019/CVE-2019-2618.json
+++ b/2019/CVE-2019-2618.json
@@ -187,10 +187,10 @@
         "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2023-03-17T08:08:02Z",
+        "updated_at": "2023-03-19T10:43:27Z",
         "pushed_at": "2022-07-17T12:41:46Z",
-        "stargazers_count": 1642,
-        "watchers_count": 1642,
+        "stargazers_count": 1643,
+        "watchers_count": 1643,
         "has_discussions": false,
         "forks_count": 323,
         "allow_forking": true,
@@ -220,7 +220,7 @@
         ],
         "visibility": "public",
         "forks": 323,
-        "watchers": 1642,
+        "watchers": 1643,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-12928.json b/2020/CVE-2020-12928.json
index 4fa6515958..8cafc09bdc 100644
--- a/2020/CVE-2020-12928.json
+++ b/2020/CVE-2020-12928.json
@@ -13,10 +13,10 @@
         "description": "Early 2019 - late 2020. R.I.P. CVE-2020-12928 https:\/\/h0mbre.github.io\/RyzenMaster_CVE\/#",
         "fork": false,
         "created_at": "2020-11-10T13:08:21Z",
-        "updated_at": "2023-03-01T04:16:33Z",
+        "updated_at": "2023-03-19T10:17:07Z",
         "pushed_at": "2021-02-14T15:08:01Z",
-        "stargazers_count": 35,
-        "watchers_count": 35,
+        "stargazers_count": 36,
+        "watchers_count": 36,
         "has_discussions": false,
         "forks_count": 23,
         "allow_forking": true,
@@ -25,7 +25,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 23,
-        "watchers": 35,
+        "watchers": 36,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json
index 0e7a89d157..4ea75a8287 100644
--- a/2020/CVE-2020-1472.json
+++ b/2020/CVE-2020-1472.json
@@ -165,10 +165,10 @@
         "description": "Exploit for zerologon cve-2020-1472",
         "fork": false,
         "created_at": "2020-09-14T19:19:07Z",
-        "updated_at": "2023-03-16T22:40:21Z",
+        "updated_at": "2023-03-19T11:58:04Z",
         "pushed_at": "2020-10-15T18:31:15Z",
-        "stargazers_count": 522,
-        "watchers_count": 522,
+        "stargazers_count": 523,
+        "watchers_count": 523,
         "has_discussions": false,
         "forks_count": 141,
         "allow_forking": true,
@@ -177,7 +177,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 141,
-        "watchers": 522,
+        "watchers": 523,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json
index d0786afd53..3b3ea4f3fc 100644
--- a/2020/CVE-2020-2551.json
+++ b/2020/CVE-2020-2551.json
@@ -13,10 +13,10 @@
         "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
         "fork": false,
         "created_at": "2020-01-15T04:26:29Z",
-        "updated_at": "2023-03-17T08:08:02Z",
+        "updated_at": "2023-03-19T10:43:27Z",
         "pushed_at": "2022-07-17T12:41:46Z",
-        "stargazers_count": 1642,
-        "watchers_count": 1642,
+        "stargazers_count": 1643,
+        "watchers_count": 1643,
         "has_discussions": false,
         "forks_count": 323,
         "allow_forking": true,
@@ -46,7 +46,7 @@
         ],
         "visibility": "public",
         "forks": 323,
-        "watchers": 1642,
+        "watchers": 1643,
         "score": 0
     },
     {
diff --git a/2021/CVE-2021-36934.json b/2021/CVE-2021-36934.json
index ea8ff7f7c6..c5b597e8f0 100644
--- a/2021/CVE-2021-36934.json
+++ b/2021/CVE-2021-36934.json
@@ -81,13 +81,13 @@
         "stargazers_count": 33,
         "watchers_count": 33,
         "has_discussions": false,
-        "forks_count": 18,
+        "forks_count": 19,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 18,
+        "forks": 19,
         "watchers": 33,
         "score": 0
     },
diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json
index 6040688c69..a3e34371de 100644
--- a/2021/CVE-2021-4034.json
+++ b/2021/CVE-2021-4034.json
@@ -77,10 +77,10 @@
         "description": "CVE-2021-4034 1day",
         "fork": false,
         "created_at": "2022-01-25T23:51:37Z",
-        "updated_at": "2023-03-18T18:36:52Z",
+        "updated_at": "2023-03-19T10:33:22Z",
         "pushed_at": "2022-06-08T04:00:28Z",
-        "stargazers_count": 1766,
-        "watchers_count": 1766,
+        "stargazers_count": 1767,
+        "watchers_count": 1767,
         "has_discussions": false,
         "forks_count": 505,
         "allow_forking": true,
@@ -89,7 +89,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 505,
-        "watchers": 1766,
+        "watchers": 1767,
         "score": 0
     },
     {
diff --git a/2021/CVE-2021-4045.json b/2021/CVE-2021-4045.json
index 698deba8ad..6f19e71b12 100644
--- a/2021/CVE-2021-4045.json
+++ b/2021/CVE-2021-4045.json
@@ -13,10 +13,10 @@
         "description": "Exploit for command injection vulnerability found in uhttpd binary from TP-Link Tapo c200 IP camera",
         "fork": false,
         "created_at": "2021-11-15T14:48:14Z",
-        "updated_at": "2023-03-14T14:38:39Z",
+        "updated_at": "2023-03-19T11:17:05Z",
         "pushed_at": "2023-01-01T21:12:20Z",
-        "stargazers_count": 30,
-        "watchers_count": 30,
+        "stargazers_count": 31,
+        "watchers_count": 31,
         "has_discussions": false,
         "forks_count": 6,
         "allow_forking": true,
@@ -31,7 +31,7 @@
         ],
         "visibility": "public",
         "forks": 6,
-        "watchers": 30,
+        "watchers": 31,
         "score": 0
     },
     {
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
index a5c87cd06e..58261889c2 100644
--- a/2021/CVE-2021-44228.json
+++ b/2021/CVE-2021-44228.json
@@ -5156,10 +5156,10 @@
         "description": "Tool that runs a test to check whether one of your applications is affected by the recent vulnerabilities in log4j: CVE-2021-44228 and CVE-2021-45046",
         "fork": false,
         "created_at": "2021-12-13T21:47:41Z",
-        "updated_at": "2023-03-09T09:24:17Z",
+        "updated_at": "2023-03-19T07:59:48Z",
         "pushed_at": "2022-12-27T20:59:51Z",
-        "stargazers_count": 68,
-        "watchers_count": 68,
+        "stargazers_count": 69,
+        "watchers_count": 69,
         "has_discussions": false,
         "forks_count": 14,
         "allow_forking": true,
@@ -5176,7 +5176,7 @@
         ],
         "visibility": "public",
         "forks": 14,
-        "watchers": 68,
+        "watchers": 69,
         "score": 0
     },
     {
diff --git a/2022/CVE-2022-0337.json b/2022/CVE-2022-0337.json
index 5ffa4527db..911f98d091 100644
--- a/2022/CVE-2022-0337.json
+++ b/2022/CVE-2022-0337.json
@@ -13,7 +13,7 @@
         "description": "🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337",
         "fork": false,
         "created_at": "2022-03-19T08:10:46Z",
-        "updated_at": "2023-03-13T15:04:56Z",
+        "updated_at": "2023-03-19T11:58:01Z",
         "pushed_at": "2022-09-04T17:28:56Z",
         "stargazers_count": 313,
         "watchers_count": 313,
diff --git a/2022/CVE-2022-0739.json b/2022/CVE-2022-0739.json
index 20959af826..163e220e82 100644
--- a/2022/CVE-2022-0739.json
+++ b/2022/CVE-2022-0739.json
@@ -206,5 +206,34 @@
         "forks": 0,
         "watchers": 0,
         "score": 0
+    },
+    {
+        "id": 616018302,
+        "name": "Bash-exploit-for-CVE-2022-0739",
+        "full_name": "luxel-h\/Bash-exploit-for-CVE-2022-0739",
+        "owner": {
+            "login": "luxel-h",
+            "id": 125658579,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125658579?v=4",
+            "html_url": "https:\/\/github.com\/luxel-h"
+        },
+        "html_url": "https:\/\/github.com\/luxel-h\/Bash-exploit-for-CVE-2022-0739",
+        "description": null,
+        "fork": false,
+        "created_at": "2023-03-19T11:35:03Z",
+        "updated_at": "2023-03-19T11:53:50Z",
+        "pushed_at": "2023-03-19T11:52:41Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "has_discussions": false,
+        "forks_count": 0,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 0,
+        "watchers": 0,
+        "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2022/CVE-2022-20452.json b/2022/CVE-2022-20452.json
index 6bda86baed..10d7a110bf 100644
--- a/2022/CVE-2022-20452.json
+++ b/2022/CVE-2022-20452.json
@@ -13,10 +13,10 @@
         "description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
         "fork": false,
         "created_at": "2023-01-10T16:24:51Z",
-        "updated_at": "2023-03-17T07:07:00Z",
+        "updated_at": "2023-03-19T07:40:28Z",
         "pushed_at": "2023-01-10T16:25:49Z",
-        "stargazers_count": 177,
-        "watchers_count": 177,
+        "stargazers_count": 178,
+        "watchers_count": 178,
         "has_discussions": false,
         "forks_count": 32,
         "allow_forking": true,
@@ -25,7 +25,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 32,
-        "watchers": 177,
+        "watchers": 178,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2022/CVE-2022-23773.json b/2022/CVE-2022-23773.json
index e7b08f5862..a7b93328f0 100644
--- a/2022/CVE-2022-23773.json
+++ b/2022/CVE-2022-23773.json
@@ -56,5 +56,34 @@
         "forks": 0,
         "watchers": 0,
         "score": 0
+    },
+    {
+        "id": 615996454,
+        "name": "CVE-2022-23773-Reproduce",
+        "full_name": "Liuyushung\/CVE-2022-23773-Reproduce",
+        "owner": {
+            "login": "Liuyushung",
+            "id": 51371214,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51371214?v=4",
+            "html_url": "https:\/\/github.com\/Liuyushung"
+        },
+        "html_url": "https:\/\/github.com\/Liuyushung\/CVE-2022-23773-Reproduce",
+        "description": null,
+        "fork": false,
+        "created_at": "2023-03-19T10:08:47Z",
+        "updated_at": "2023-03-19T10:12:25Z",
+        "pushed_at": "2023-03-19T11:57:01Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "has_discussions": false,
+        "forks_count": 0,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 0,
+        "watchers": 0,
+        "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2022/CVE-2022-2588.json b/2022/CVE-2022-2588.json
index fd83fcd4d3..8570a19620 100644
--- a/2022/CVE-2022-2588.json
+++ b/2022/CVE-2022-2588.json
@@ -13,10 +13,10 @@
         "description": "exploit for CVE-2022-2588",
         "fork": false,
         "created_at": "2022-08-11T06:01:24Z",
-        "updated_at": "2023-03-14T21:03:40Z",
+        "updated_at": "2023-03-19T12:02:56Z",
         "pushed_at": "2023-03-04T05:52:28Z",
-        "stargazers_count": 418,
-        "watchers_count": 418,
+        "stargazers_count": 419,
+        "watchers_count": 419,
         "has_discussions": false,
         "forks_count": 60,
         "allow_forking": true,
@@ -25,7 +25,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 60,
-        "watchers": 418,
+        "watchers": 419,
         "score": 0
     },
     {
diff --git a/2022/CVE-2022-27255.json b/2022/CVE-2022-27255.json
index 2cff4568ac..7742266c1f 100644
--- a/2022/CVE-2022-27255.json
+++ b/2022/CVE-2022-27255.json
@@ -13,10 +13,10 @@
         "description": null,
         "fork": false,
         "created_at": "2022-07-06T17:29:04Z",
-        "updated_at": "2023-03-08T18:09:28Z",
+        "updated_at": "2023-03-19T09:55:07Z",
         "pushed_at": "2022-08-30T13:23:51Z",
-        "stargazers_count": 253,
-        "watchers_count": 253,
+        "stargazers_count": 254,
+        "watchers_count": 254,
         "has_discussions": false,
         "forks_count": 49,
         "allow_forking": true,
@@ -25,7 +25,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 49,
-        "watchers": 253,
+        "watchers": 254,
         "score": 0
     },
     {
diff --git a/2022/CVE-2022-32250.json b/2022/CVE-2022-32250.json
index 02d5d64d97..b8566f1455 100644
--- a/2022/CVE-2022-32250.json
+++ b/2022/CVE-2022-32250.json
@@ -18,13 +18,13 @@
         "stargazers_count": 131,
         "watchers_count": 131,
         "has_discussions": false,
-        "forks_count": 34,
+        "forks_count": 35,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 34,
+        "forks": 35,
         "watchers": 131,
         "score": 0
     },
diff --git a/2022/CVE-2022-34918.json b/2022/CVE-2022-34918.json
index 3d8aad49b3..eed565d7a9 100644
--- a/2022/CVE-2022-34918.json
+++ b/2022/CVE-2022-34918.json
@@ -158,10 +158,10 @@
         "description": "CVE-2022-34918 netfilter nf_tables 本地提权 POC",
         "fork": false,
         "created_at": "2022-08-02T09:52:02Z",
-        "updated_at": "2023-03-17T14:35:51Z",
+        "updated_at": "2023-03-19T08:31:56Z",
         "pushed_at": "2022-09-15T03:19:28Z",
-        "stargazers_count": 199,
-        "watchers_count": 199,
+        "stargazers_count": 200,
+        "watchers_count": 200,
         "has_discussions": false,
         "forks_count": 36,
         "allow_forking": true,
@@ -170,7 +170,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 36,
-        "watchers": 199,
+        "watchers": 200,
         "score": 0
     },
     {
diff --git a/2022/CVE-2022-3699.json b/2022/CVE-2022-3699.json
index cc4e6c2697..e12a6e6402 100644
--- a/2022/CVE-2022-3699.json
+++ b/2022/CVE-2022-3699.json
@@ -13,10 +13,10 @@
         "description": "Lenovo Diagnostics Driver EoP - Arbitrary R\/W",
         "fork": false,
         "created_at": "2022-11-09T14:15:30Z",
-        "updated_at": "2023-02-27T03:17:02Z",
+        "updated_at": "2023-03-19T12:09:44Z",
         "pushed_at": "2022-12-05T23:36:42Z",
-        "stargazers_count": 140,
-        "watchers_count": 140,
+        "stargazers_count": 141,
+        "watchers_count": 141,
         "has_discussions": false,
         "forks_count": 35,
         "allow_forking": true,
@@ -25,7 +25,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 35,
-        "watchers": 140,
+        "watchers": 141,
         "score": 0
     },
     {
diff --git a/2022/CVE-2022-44268.json b/2022/CVE-2022-44268.json
index 0ca64deb26..304a6eb8cf 100644
--- a/2022/CVE-2022-44268.json
+++ b/2022/CVE-2022-44268.json
@@ -18,13 +18,13 @@
         "stargazers_count": 214,
         "watchers_count": 214,
         "has_discussions": false,
-        "forks_count": 30,
+        "forks_count": 31,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 30,
+        "forks": 31,
         "watchers": 214,
         "score": 0
     },
@@ -195,13 +195,13 @@
         "stargazers_count": 114,
         "watchers_count": 114,
         "has_discussions": false,
-        "forks_count": 17,
+        "forks_count": 18,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 17,
+        "forks": 18,
         "watchers": 114,
         "score": 0
     },
diff --git a/2022/CVE-2022-46689.json b/2022/CVE-2022-46689.json
index c7f2733b43..600ab55474 100644
--- a/2022/CVE-2022-46689.json
+++ b/2022/CVE-2022-46689.json
@@ -378,10 +378,10 @@
         "description": "Example of CVE-2022-46689 aka MacDirtyCow.",
         "fork": false,
         "created_at": "2023-03-01T08:23:49Z",
-        "updated_at": "2023-03-18T11:28:54Z",
+        "updated_at": "2023-03-19T10:34:06Z",
         "pushed_at": "2023-03-01T08:25:46Z",
-        "stargazers_count": 2,
-        "watchers_count": 2,
+        "stargazers_count": 3,
+        "watchers_count": 3,
         "has_discussions": false,
         "forks_count": 0,
         "allow_forking": true,
@@ -397,7 +397,7 @@
         ],
         "visibility": "public",
         "forks": 0,
-        "watchers": 2,
+        "watchers": 3,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2023/CVE-2023-0861.json b/2023/CVE-2023-0861.json
index 534e152696..d38ce34433 100644
--- a/2023/CVE-2023-0861.json
+++ b/2023/CVE-2023-0861.json
@@ -13,10 +13,10 @@
         "description": "Analyzing and Reproducing the Command Injection Vulnerability (CVE-2023-0861) in NetModule Routers",
         "fork": false,
         "created_at": "2023-03-12T17:43:00Z",
-        "updated_at": "2023-03-18T17:22:37Z",
+        "updated_at": "2023-03-19T11:04:34Z",
         "pushed_at": "2023-03-16T19:17:47Z",
-        "stargazers_count": 4,
-        "watchers_count": 4,
+        "stargazers_count": 6,
+        "watchers_count": 6,
         "has_discussions": false,
         "forks_count": 1,
         "allow_forking": true,
@@ -25,7 +25,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 1,
-        "watchers": 4,
+        "watchers": 6,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2023/CVE-2023-21036.json b/2023/CVE-2023-21036.json
index d08e684854..1ef10c3920 100644
--- a/2023/CVE-2023-21036.json
+++ b/2023/CVE-2023-21036.json
@@ -13,10 +13,10 @@
         "description": "Discord bot which monitors for and deletes images vulnerable to the Acropalypse exploit (CVE-2023-21036)",
         "fork": false,
         "created_at": "2023-03-19T02:15:23Z",
-        "updated_at": "2023-03-19T05:21:46Z",
+        "updated_at": "2023-03-19T07:34:00Z",
         "pushed_at": "2023-03-19T05:21:43Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
+        "stargazers_count": 1,
+        "watchers_count": 1,
         "has_discussions": false,
         "forks_count": 0,
         "allow_forking": true,
@@ -25,7 +25,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 0,
-        "watchers": 0,
+        "watchers": 1,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2023/CVE-2023-21608.json b/2023/CVE-2023-21608.json
index a836c86903..f280657b56 100644
--- a/2023/CVE-2023-21608.json
+++ b/2023/CVE-2023-21608.json
@@ -13,10 +13,10 @@
         "description": "Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit",
         "fork": false,
         "created_at": "2023-01-30T12:57:48Z",
-        "updated_at": "2023-03-16T15:50:50Z",
+        "updated_at": "2023-03-19T12:17:46Z",
         "pushed_at": "2023-02-27T04:51:20Z",
-        "stargazers_count": 183,
-        "watchers_count": 183,
+        "stargazers_count": 184,
+        "watchers_count": 184,
         "has_discussions": false,
         "forks_count": 41,
         "allow_forking": true,
@@ -35,7 +35,7 @@
         ],
         "visibility": "public",
         "forks": 41,
-        "watchers": 183,
+        "watchers": 184,
         "score": 0
     },
     {
diff --git a/2023/CVE-2023-21768.json b/2023/CVE-2023-21768.json
index 9c6a2e0dd5..9da85e3718 100644
--- a/2023/CVE-2023-21768.json
+++ b/2023/CVE-2023-21768.json
@@ -18,13 +18,13 @@
         "stargazers_count": 306,
         "watchers_count": 306,
         "has_discussions": false,
-        "forks_count": 113,
+        "forks_count": 114,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 113,
+        "forks": 114,
         "watchers": 306,
         "score": 0
     },
@@ -71,12 +71,12 @@
         "description": "Using CVE-2023-21768 to manual map kernel mode driver ",
         "fork": false,
         "created_at": "2023-03-10T19:08:28Z",
-        "updated_at": "2023-03-19T01:51:36Z",
+        "updated_at": "2023-03-19T07:30:27Z",
         "pushed_at": "2023-03-10T20:16:53Z",
-        "stargazers_count": 90,
-        "watchers_count": 90,
+        "stargazers_count": 91,
+        "watchers_count": 91,
         "has_discussions": false,
-        "forks_count": 26,
+        "forks_count": 27,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
@@ -90,8 +90,8 @@
             "windows"
         ],
         "visibility": "public",
-        "forks": 26,
-        "watchers": 90,
+        "forks": 27,
+        "watchers": 91,
         "score": 0
     },
     {
@@ -113,13 +113,13 @@
         "stargazers_count": 10,
         "watchers_count": 10,
         "has_discussions": false,
-        "forks_count": 0,
+        "forks_count": 1,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 0,
+        "forks": 1,
         "watchers": 10,
         "score": 0
     }
diff --git a/2023/CVE-2023-23397.json b/2023/CVE-2023-23397.json
index 0d923b6c97..2e94860c7c 100644
--- a/2023/CVE-2023-23397.json
+++ b/2023/CVE-2023-23397.json
@@ -13,10 +13,10 @@
         "description": "Exploit for the CVE-2023-23397",
         "fork": false,
         "created_at": "2023-03-15T17:03:38Z",
-        "updated_at": "2023-03-18T22:39:44Z",
+        "updated_at": "2023-03-19T11:45:58Z",
         "pushed_at": "2023-03-15T17:53:53Z",
-        "stargazers_count": 115,
-        "watchers_count": 115,
+        "stargazers_count": 116,
+        "watchers_count": 116,
         "has_discussions": false,
         "forks_count": 32,
         "allow_forking": true,
@@ -25,7 +25,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 32,
-        "watchers": 115,
+        "watchers": 116,
         "score": 0
     },
     {
@@ -129,10 +129,10 @@
         "description": "Simple PoC in PowerShell for CVE-2023-23397",
         "fork": false,
         "created_at": "2023-03-16T19:10:37Z",
-        "updated_at": "2023-03-18T14:34:33Z",
+        "updated_at": "2023-03-19T11:45:46Z",
         "pushed_at": "2023-03-16T19:29:49Z",
-        "stargazers_count": 9,
-        "watchers_count": 9,
+        "stargazers_count": 11,
+        "watchers_count": 11,
         "has_discussions": false,
         "forks_count": 3,
         "allow_forking": true,
@@ -151,7 +151,7 @@
         ],
         "visibility": "public",
         "forks": 3,
-        "watchers": 9,
+        "watchers": 11,
         "score": 0
     },
     {
@@ -168,10 +168,10 @@
         "description": null,
         "fork": false,
         "created_at": "2023-03-16T19:43:39Z",
-        "updated_at": "2023-03-19T03:55:03Z",
+        "updated_at": "2023-03-19T11:46:11Z",
         "pushed_at": "2023-03-17T07:47:40Z",
-        "stargazers_count": 173,
-        "watchers_count": 173,
+        "stargazers_count": 179,
+        "watchers_count": 179,
         "has_discussions": false,
         "forks_count": 25,
         "allow_forking": true,
@@ -180,7 +180,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 25,
-        "watchers": 173,
+        "watchers": 179,
         "score": 0
     },
     {
@@ -327,5 +327,34 @@
         "forks": 0,
         "watchers": 0,
         "score": 0
+    },
+    {
+        "id": 615967703,
+        "name": "CVE-2023-23397-POC-Using-Interop-Outlook",
+        "full_name": "ahmedkhlief\/CVE-2023-23397-POC-Using-Interop-Outlook",
+        "owner": {
+            "login": "ahmedkhlief",
+            "id": 24752712,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24752712?v=4",
+            "html_url": "https:\/\/github.com\/ahmedkhlief"
+        },
+        "html_url": "https:\/\/github.com\/ahmedkhlief\/CVE-2023-23397-POC-Using-Interop-Outlook",
+        "description": null,
+        "fork": false,
+        "created_at": "2023-03-19T08:07:58Z",
+        "updated_at": "2023-03-19T10:18:31Z",
+        "pushed_at": "2023-03-19T08:10:44Z",
+        "stargazers_count": 1,
+        "watchers_count": 1,
+        "has_discussions": false,
+        "forks_count": 0,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 0,
+        "watchers": 1,
+        "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2023/CVE-2023-23415.json b/2023/CVE-2023-23415.json
index ca4ddfebdc..7e2d7a691e 100644
--- a/2023/CVE-2023-23415.json
+++ b/2023/CVE-2023-23415.json
@@ -13,19 +13,19 @@
         "description": "CVE-2023-23415",
         "fork": false,
         "created_at": "2023-03-17T12:38:30Z",
-        "updated_at": "2023-03-19T04:43:02Z",
+        "updated_at": "2023-03-19T12:08:40Z",
         "pushed_at": "2023-03-17T12:45:04Z",
-        "stargazers_count": 16,
-        "watchers_count": 16,
+        "stargazers_count": 28,
+        "watchers_count": 28,
         "has_discussions": false,
-        "forks_count": 2,
+        "forks_count": 4,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 2,
-        "watchers": 16,
+        "forks": 4,
+        "watchers": 28,
         "score": 0
     },
     {
diff --git a/2023/CVE-2023-25136.json b/2023/CVE-2023-25136.json
index 62f34f7fee..be5f8bc353 100644
--- a/2023/CVE-2023-25136.json
+++ b/2023/CVE-2023-25136.json
@@ -71,10 +71,10 @@
         "description": "OpenSSH 9.1 vulnerability mass scan and exploit",
         "fork": false,
         "created_at": "2023-02-22T19:44:08Z",
-        "updated_at": "2023-03-18T15:07:54Z",
+        "updated_at": "2023-03-19T11:12:46Z",
         "pushed_at": "2023-03-07T10:43:36Z",
-        "stargazers_count": 83,
-        "watchers_count": 83,
+        "stargazers_count": 85,
+        "watchers_count": 85,
         "has_discussions": false,
         "forks_count": 15,
         "allow_forking": true,
@@ -83,7 +83,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 15,
-        "watchers": 83,
+        "watchers": 85,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/README.md b/README.md
index 188b2d782b..6829e15a6c 100644
--- a/README.md
+++ b/README.md
@@ -264,6 +264,7 @@ Microsoft Outlook Elevation of Privilege Vulnerability
 - [ahmedkhlief/CVE-2023-23397-POC](https://github.com/ahmedkhlief/CVE-2023-23397-POC)
 - [BillSkiCO/CVE-2023-23397_EXPLOIT](https://github.com/BillSkiCO/CVE-2023-23397_EXPLOIT)
 - [djackreuter/CVE-2023-23397-PoC](https://github.com/djackreuter/CVE-2023-23397-PoC)
+- [ahmedkhlief/CVE-2023-23397-POC-Using-Interop-Outlook](https://github.com/ahmedkhlief/CVE-2023-23397-POC-Using-Interop-Outlook)
 
 ### CVE-2023-23415 (2023-03-14)
 
@@ -572,6 +573,7 @@ The BookingPress WordPress plugin before 1.0.11 fails to properly sanitize user
 - [Ki11i0n4ir3/CVE-2022-0739](https://github.com/Ki11i0n4ir3/CVE-2022-0739)
 - [viardant/CVE-2022-0739](https://github.com/viardant/CVE-2022-0739)
 - [ElGanz0/CVE-2022-0739](https://github.com/ElGanz0/CVE-2022-0739)
+- [luxel-h/Bash-exploit-for-CVE-2022-0739](https://github.com/luxel-h/Bash-exploit-for-CVE-2022-0739)
 
 ### CVE-2022-0778 (2022-03-15)
 
@@ -2359,6 +2361,7 @@ cmd/go in Go before 1.16.14 and 1.17.x before 1.17.7 can misinterpret branch nam
 
 - [danbudris/CVE-2022-23773-repro](https://github.com/danbudris/CVE-2022-23773-repro)
 - [danbudris/CVE-2022-23773-repro-target](https://github.com/danbudris/CVE-2022-23773-repro-target)
+- [Liuyushung/CVE-2022-23773-Reproduce](https://github.com/Liuyushung/CVE-2022-23773-Reproduce)
 
 ### CVE-2022-23779 (2022-03-02)