diff --git a/2008/CVE-2008-1613.json b/2008/CVE-2008-1613.json
deleted file mode 100644
index 47485be320..0000000000
--- a/2008/CVE-2008-1613.json
+++ /dev/null
@@ -1,25 +0,0 @@
-[
-    {
-        "id": 90186634,
-        "name": "CVE-2008-1613",
-        "full_name": "SECFORCE\/CVE-2008-1613",
-        "owner": {
-            "login": "SECFORCE",
-            "id": 8157384,
-            "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8157384?v=4",
-            "html_url": "https:\/\/github.com\/SECFORCE"
-        },
-        "html_url": "https:\/\/github.com\/SECFORCE\/CVE-2008-1613",
-        "description": "RedDot CMS versions 7.5 Build 7.5.0.48 and below full database enumeration exploit that takes advantage of a remote SQL injection vulnerability in ioRD.asp.",
-        "fork": false,
-        "created_at": "2017-05-03T19:39:27Z",
-        "updated_at": "2020-05-18T10:42:05Z",
-        "pushed_at": "2017-05-03T19:40:32Z",
-        "stargazers_count": 3,
-        "watchers_count": 3,
-        "forks_count": 9,
-        "forks": 9,
-        "watchers": 3,
-        "score": 0
-    }
-]
\ No newline at end of file
diff --git a/2008/CVE-2008-2938.json b/2008/CVE-2008-2938.json
deleted file mode 100644
index 78b0b8477c..0000000000
--- a/2008/CVE-2008-2938.json
+++ /dev/null
@@ -1,25 +0,0 @@
-[
-    {
-        "id": 70811001,
-        "name": "Offensive",
-        "full_name": "Naramsim\/Offensive",
-        "owner": {
-            "login": "Naramsim",
-            "id": 8996268,
-            "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/8996268?v=4",
-            "html_url": "https:\/\/github.com\/Naramsim"
-        },
-        "html_url": "https:\/\/github.com\/Naramsim\/Offensive",
-        "description": "Reproducible exploits for: CVE-2016-1240 CVE-2008-2938 CVE-2014-2064 CVE-2014-1904",
-        "fork": false,
-        "created_at": "2016-10-13T13:46:46Z",
-        "updated_at": "2018-09-01T03:40:31Z",
-        "pushed_at": "2017-01-11T15:50:29Z",
-        "stargazers_count": 1,
-        "watchers_count": 1,
-        "forks_count": 3,
-        "forks": 3,
-        "watchers": 1,
-        "score": 0
-    }
-]
\ No newline at end of file
diff --git a/2008/CVE-2008-4609.json b/2008/CVE-2008-4609.json
deleted file mode 100644
index 06b4b9c397..0000000000
--- a/2008/CVE-2008-4609.json
+++ /dev/null
@@ -1,25 +0,0 @@
-[
-    {
-        "id": 58223324,
-        "name": "sockstress",
-        "full_name": "marcelki\/sockstress",
-        "owner": {
-            "login": "marcelki",
-            "id": 8465322,
-            "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/8465322?v=4",
-            "html_url": "https:\/\/github.com\/marcelki"
-        },
-        "html_url": "https:\/\/github.com\/marcelki\/sockstress",
-        "description": "Sockstress (CVE-2008-4609)  DDoS implementation written in Go",
-        "fork": false,
-        "created_at": "2016-05-06T17:21:32Z",
-        "updated_at": "2020-06-04T09:57:06Z",
-        "pushed_at": "2016-07-02T18:52:16Z",
-        "stargazers_count": 12,
-        "watchers_count": 12,
-        "forks_count": 4,
-        "forks": 4,
-        "watchers": 12,
-        "score": 0
-    }
-]
\ No newline at end of file
diff --git a/2008/CVE-2008-6827.json b/2008/CVE-2008-6827.json
deleted file mode 100644
index a49a0e473b..0000000000
--- a/2008/CVE-2008-6827.json
+++ /dev/null
@@ -1,25 +0,0 @@
-[
-    {
-        "id": 127826773,
-        "name": "CVE-2008-6827",
-        "full_name": "alt3kx\/CVE-2008-6827",
-        "owner": {
-            "login": "alt3kx",
-            "id": 3140111,
-            "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3140111?v=4",
-            "html_url": "https:\/\/github.com\/alt3kx"
-        },
-        "html_url": "https:\/\/github.com\/alt3kx\/CVE-2008-6827",
-        "description": "Symantec Altiris Client Service 6.8.378 - Local Privilege Escalation",
-        "fork": false,
-        "created_at": "2018-04-03T00:08:23Z",
-        "updated_at": "2018-05-04T02:30:55Z",
-        "pushed_at": "2018-05-04T02:30:54Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
-        "forks_count": 0,
-        "forks": 0,
-        "watchers": 0,
-        "score": 0
-    }
-]
\ No newline at end of file
diff --git a/2008/CVE-2008-6970.json b/2008/CVE-2008-6970.json
deleted file mode 100644
index 36a844d1f1..0000000000
--- a/2008/CVE-2008-6970.json
+++ /dev/null
@@ -1,25 +0,0 @@
-[
-    {
-        "id": 58135743,
-        "name": "CVE-2008-6970",
-        "full_name": "KyomaHooin\/CVE-2008-6970",
-        "owner": {
-            "login": "KyomaHooin",
-            "id": 19186867,
-            "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/19186867?v=4",
-            "html_url": "https:\/\/github.com\/KyomaHooin"
-        },
-        "html_url": "https:\/\/github.com\/KyomaHooin\/CVE-2008-6970",
-        "description": "Blind SQL injection brute force.",
-        "fork": false,
-        "created_at": "2016-05-05T14:13:33Z",
-        "updated_at": "2018-05-11T08:02:20Z",
-        "pushed_at": "2018-05-11T08:02:19Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
-        "forks_count": 0,
-        "forks": 0,
-        "watchers": 0,
-        "score": 0
-    }
-]
\ No newline at end of file
diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json
index bd9db8afac..163b58d3ee 100644
--- a/2014/CVE-2014-4210.json
+++ b/2014/CVE-2014-4210.json
@@ -40,8 +40,8 @@
         "pushed_at": "2020-06-17T01:51:30Z",
         "stargazers_count": 476,
         "watchers_count": 476,
-        "forks_count": 115,
-        "forks": 115,
+        "forks_count": 116,
+        "forks": 116,
         "watchers": 476,
         "score": 0
     }
diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json
index bb891c48a6..63bdaaf50a 100644
--- a/2016/CVE-2016-0638.json
+++ b/2016/CVE-2016-0638.json
@@ -17,8 +17,8 @@
         "pushed_at": "2020-06-17T01:51:30Z",
         "stargazers_count": 476,
         "watchers_count": 476,
-        "forks_count": 115,
-        "forks": 115,
+        "forks_count": 116,
+        "forks": 116,
         "watchers": 476,
         "score": 0
     }
diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json
index 0673aa6635..bfa7d83195 100644
--- a/2017/CVE-2017-3248.json
+++ b/2017/CVE-2017-3248.json
@@ -40,8 +40,8 @@
         "pushed_at": "2020-06-17T01:51:30Z",
         "stargazers_count": 476,
         "watchers_count": 476,
-        "forks_count": 115,
-        "forks": 115,
+        "forks_count": 116,
+        "forks": 116,
         "watchers": 476,
         "score": 0
     }
diff --git a/2017/CVE-2017-5123.json b/2017/CVE-2017-5123.json
index 5a5cc287ba..4da4c4fb1a 100644
--- a/2017/CVE-2017-5123.json
+++ b/2017/CVE-2017-5123.json
@@ -105,13 +105,13 @@
         "description": "PoC CVE-2017-5123 - LPE - Bypassing SMEP\/SMAP. No KASLR",
         "fork": false,
         "created_at": "2020-05-08T15:10:38Z",
-        "updated_at": "2020-06-23T01:15:18Z",
+        "updated_at": "2020-06-25T09:27:10Z",
         "pushed_at": "2020-06-19T15:12:31Z",
-        "stargazers_count": 14,
-        "watchers_count": 14,
+        "stargazers_count": 15,
+        "watchers_count": 15,
         "forks_count": 4,
         "forks": 4,
-        "watchers": 14,
+        "watchers": 15,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2017/CVE-2017-9101.json b/2017/CVE-2017-9101.json
index a4eaa16ac5..614712f3b7 100644
--- a/2017/CVE-2017-9101.json
+++ b/2017/CVE-2017-9101.json
@@ -13,13 +13,13 @@
         "description": "Exploit for PlaySMS 1.4 authenticated RCE",
         "fork": false,
         "created_at": "2018-11-06T19:16:29Z",
-        "updated_at": "2020-05-12T02:55:07Z",
+        "updated_at": "2020-06-25T13:25:42Z",
         "pushed_at": "2018-11-06T19:45:40Z",
-        "stargazers_count": 8,
-        "watchers_count": 8,
+        "stargazers_count": 9,
+        "watchers_count": 9,
         "forks_count": 1,
         "forks": 1,
-        "watchers": 8,
+        "watchers": 9,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json
index d12f03e2b7..223eec209e 100644
--- a/2018/CVE-2018-2628.json
+++ b/2018/CVE-2018-2628.json
@@ -454,8 +454,8 @@
         "pushed_at": "2020-06-17T01:51:30Z",
         "stargazers_count": 476,
         "watchers_count": 476,
-        "forks_count": 115,
-        "forks": 115,
+        "forks_count": 116,
+        "forks": 116,
         "watchers": 476,
         "score": 0
     }
diff --git a/2018/CVE-2018-7602.json b/2018/CVE-2018-7602.json
index 7964e02a4a..866443e8a2 100644
--- a/2018/CVE-2018-7602.json
+++ b/2018/CVE-2018-7602.json
@@ -67,5 +67,28 @@
         "forks": 0,
         "watchers": 0,
         "score": 0
+    },
+    {
+        "id": 274906170,
+        "name": "DrupalCVE-2018-7602",
+        "full_name": "cyberharsh\/DrupalCVE-2018-7602",
+        "owner": {
+            "login": "cyberharsh",
+            "id": 57433814,
+            "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/57433814?v=4",
+            "html_url": "https:\/\/github.com\/cyberharsh"
+        },
+        "html_url": "https:\/\/github.com\/cyberharsh\/DrupalCVE-2018-7602",
+        "description": null,
+        "fork": false,
+        "created_at": "2020-06-25T12:06:07Z",
+        "updated_at": "2020-06-25T12:11:52Z",
+        "pushed_at": "2020-06-25T12:11:49Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "forks_count": 0,
+        "forks": 0,
+        "watchers": 0,
+        "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2019/CVE-2019-18935.json b/2019/CVE-2019-18935.json
index 03e9506a3c..1435f1cc6c 100644
--- a/2019/CVE-2019-18935.json
+++ b/2019/CVE-2019-18935.json
@@ -40,8 +40,8 @@
         "pushed_at": "2020-06-19T18:02:31Z",
         "stargazers_count": 144,
         "watchers_count": 144,
-        "forks_count": 31,
-        "forks": 31,
+        "forks_count": 32,
+        "forks": 32,
         "watchers": 144,
         "score": 0
     },
diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json
index 36bcfe02a9..4c435f06dd 100644
--- a/2019/CVE-2019-2618.json
+++ b/2019/CVE-2019-2618.json
@@ -155,8 +155,8 @@
         "pushed_at": "2020-06-17T01:51:30Z",
         "stargazers_count": 476,
         "watchers_count": 476,
-        "forks_count": 115,
-        "forks": 115,
+        "forks_count": 116,
+        "forks": 116,
         "watchers": 476,
         "score": 0
     }
diff --git a/2019/CVE-2019-6260.json b/2019/CVE-2019-6260.json
index c16ccc6478..28e7aee636 100644
--- a/2019/CVE-2019-6260.json
+++ b/2019/CVE-2019-6260.json
@@ -14,7 +14,7 @@
         "fork": false,
         "created_at": "2019-02-21T22:49:53Z",
         "updated_at": "2020-06-24T11:36:56Z",
-        "pushed_at": "2020-06-24T11:38:49Z",
+        "pushed_at": "2020-06-25T11:27:53Z",
         "stargazers_count": 8,
         "watchers_count": 8,
         "forks_count": 5,
diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json
index ffe770933a..904b4ecba8 100644
--- a/2020/CVE-2020-0796.json
+++ b/2020/CVE-2020-0796.json
@@ -1186,13 +1186,13 @@
         "description": "CVE-2020-0796 Remote Code Execution POC",
         "fork": false,
         "created_at": "2020-04-20T14:35:48Z",
-        "updated_at": "2020-06-25T07:18:52Z",
+        "updated_at": "2020-06-25T11:38:08Z",
         "pushed_at": "2020-06-09T20:46:45Z",
-        "stargazers_count": 276,
-        "watchers_count": 276,
+        "stargazers_count": 277,
+        "watchers_count": 277,
         "forks_count": 79,
         "forks": 79,
-        "watchers": 276,
+        "watchers": 277,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-1048.json b/2020/CVE-2020-1048.json
index b3c7121401..46666dfe5a 100644
--- a/2020/CVE-2020-1048.json
+++ b/2020/CVE-2020-1048.json
@@ -36,8 +36,8 @@
         "description": "POC exploit code for CVE-2020-1048(PrintDemon)",
         "fork": false,
         "created_at": "2020-06-23T18:45:24Z",
-        "updated_at": "2020-06-23T19:07:23Z",
-        "pushed_at": "2020-06-23T19:07:20Z",
+        "updated_at": "2020-06-25T12:22:09Z",
+        "pushed_at": "2020-06-25T12:22:06Z",
         "stargazers_count": 0,
         "watchers_count": 0,
         "forks_count": 0,
diff --git a/2020/CVE-2020-10665.json b/2020/CVE-2020-10665.json
index 5d2a530e29..c2b362f721 100644
--- a/2020/CVE-2020-10665.json
+++ b/2020/CVE-2020-10665.json
@@ -10,16 +10,16 @@
             "html_url": "https:\/\/github.com\/spaceraccoon"
         },
         "html_url": "https:\/\/github.com\/spaceraccoon\/CVE-2020-10665",
-        "description": null,
+        "description": "POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation",
         "fork": false,
         "created_at": "2020-06-25T07:35:29Z",
-        "updated_at": "2020-06-25T07:49:37Z",
+        "updated_at": "2020-06-25T13:56:22Z",
         "pushed_at": "2020-06-25T07:49:34Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
+        "stargazers_count": 3,
+        "watchers_count": 3,
         "forks_count": 0,
         "forks": 0,
-        "watchers": 0,
+        "watchers": 3,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json
index 3a13b38653..7886cf8c1a 100644
--- a/2020/CVE-2020-2551.json
+++ b/2020/CVE-2020-2551.json
@@ -17,8 +17,8 @@
         "pushed_at": "2020-06-17T01:51:30Z",
         "stargazers_count": 476,
         "watchers_count": 476,
-        "forks_count": 115,
-        "forks": 115,
+        "forks_count": 116,
+        "forks": 116,
         "watchers": 476,
         "score": 0
     },
diff --git a/2020/CVE-2020-8163.json b/2020/CVE-2020-8163.json
index 9b431a6168..be9fa09d08 100644
--- a/2020/CVE-2020-8163.json
+++ b/2020/CVE-2020-8163.json
@@ -17,8 +17,8 @@
         "pushed_at": "2020-06-19T21:24:19Z",
         "stargazers_count": 27,
         "watchers_count": 27,
-        "forks_count": 7,
-        "forks": 7,
+        "forks_count": 8,
+        "forks": 8,
         "watchers": 27,
         "score": 0
     }
diff --git a/README.md b/README.md
index fcf66dfe8c..3de0e84f17 100644
--- a/README.md
+++ b/README.md
@@ -7428,6 +7428,7 @@ A remote code execution vulnerability exists within multiple subsystems of Drupa
 - [1337g/Drupalgedon3](https://github.com/1337g/Drupalgedon3)
 - [happynote3966/CVE-2018-7602](https://github.com/happynote3966/CVE-2018-7602)
 - [kastellanos/CVE-2018-7602](https://github.com/kastellanos/CVE-2018-7602)
+- [cyberharsh/DrupalCVE-2018-7602](https://github.com/cyberharsh/DrupalCVE-2018-7602)
 
 ### CVE-2018-7690
 
@@ -13710,22 +13711,6 @@ Stack-based buffer overflow in TFTP Server SP 1.4 for Windows allows remote atta
 
 - [Axua/CVE-2008-1611](https://github.com/Axua/CVE-2008-1611)
 
-### CVE-2008-1613
-
-<code>
-SQL injection vulnerability in ioRD.asp in RedDot CMS 7.5 Build 7.5.0.48, and possibly other versions including 6.5 and 7.0, allows remote attackers to execute arbitrary SQL commands via the LngId parameter.
-</code>
-
-- [SECFORCE/CVE-2008-1613](https://github.com/SECFORCE/CVE-2008-1613)
-
-### CVE-2008-2938
-
-<code>
-Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when allowLinking and UTF-8 are enabled, allows remote attackers to read arbitrary files via encoded directory traversal sequences in the URI, a different vulnerability than CVE-2008-2370.  NOTE: versions earlier than 6.0.18 were reported affected, but the vendor advisory lists 6.0.16 as the last affected version.
-</code>
-
-- [Naramsim/Offensive](https://github.com/Naramsim/Offensive)
-
 ### CVE-2008-4250
 
 <code>
@@ -13734,14 +13719,6 @@ The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP
 
 - [thunderstrike9090/Conflicker_analysis_scripts](https://github.com/thunderstrike9090/Conflicker_analysis_scripts)
 
-### CVE-2008-4609
-
-<code>
-The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress.
-</code>
-
-- [marcelki/sockstress](https://github.com/marcelki/sockstress)
-
 ### CVE-2008-4654
 
 <code>
@@ -13767,22 +13744,6 @@ Heap-based buffer overflow in Microsoft SQL Server 2000 SP4, 8.00.2050, 8.00.203
 
 - [SECFORCE/CVE-2008-5416](https://github.com/SECFORCE/CVE-2008-5416)
 
-### CVE-2008-6827
-
-<code>
-The ListView control in the Client GUI (AClient.exe) in Symantec Altiris Deployment Solution 6.x before 6.9.355 SP1 allows local users to gain SYSTEM privileges and execute arbitrary commands via a &quot;Shatter&quot; style attack on the &quot;command prompt&quot; hidden GUI button to (1) overwrite the CommandLine parameter to cmd.exe to use SYSTEM privileges and (2) modify the DLL that is loaded using the LoadLibrary API function.
-</code>
-
-- [alt3kx/CVE-2008-6827](https://github.com/alt3kx/CVE-2008-6827)
-
-### CVE-2008-6970
-
-<code>
-SQL injection vulnerability in dosearch.inc.php in UBB.threads 7.3.1 and earlier allows remote attackers to execute arbitrary SQL commands via the Forum[] array parameter.
-</code>
-
-- [KyomaHooin/CVE-2008-6970](https://github.com/KyomaHooin/CVE-2008-6970)
-
 ### CVE-2008-7220
 
 <code>