From a7f76669626a32c5ffcd235c457460cd2b9e45ff Mon Sep 17 00:00:00 2001
From: motikan2010-bot <k.agena1993@gmail.com>
Date: Wed, 13 Sep 2023 03:51:52 +0900
Subject: [PATCH] Auto Update 2023/09/12 18:51:52

---
 2000/CVE-2000-0649.json  |  2 +-
 2002/CVE-2002-20001.json |  6 +--
 2016/CVE-2016-7200.json  | 32 ++++++++++++++
 2017/CVE-2017-12615.json |  2 +-
 2017/CVE-2017-7921.json  |  8 ++--
 2018/CVE-2018-0952.json  | 32 ++++++++++++++
 2018/CVE-2018-9948.json  | 30 ++++++++++++++
 2019/CVE-2019-19781.json | 30 ++++++++++++++
 2020/CVE-2020-1472.json  |  8 ++--
 2022/CVE-2022-1679.json  | 30 ++++++++++++++
 2022/CVE-2022-30190.json | 30 --------------
 2022/CVE-2022-34265.json |  8 ++--
 2022/CVE-2022-47966.json |  8 ++--
 2023/CVE-2023-24488.json | 90 ++++++++++++++++++++++++++++++++++++++++
 2023/CVE-2023-28343.json | 30 ++++++++++++++
 2023/CVE-2023-3124.json  |  8 ++--
 2023/CVE-2023-32233.json |  8 ++--
 2023/CVE-2023-32243.json | 30 ++++++++++++++
 2023/CVE-2023-3269.json  |  8 ++--
 2023/CVE-2023-34960.json | 30 ++++++++++++++
 2023/CVE-2023-3519.json  |  8 ++--
 2023/CVE-2023-35671.json |  8 ++--
 2023/CVE-2023-36874.json |  8 ++--
 2023/CVE-2023-37250.json | 32 ++++++++++++++
 2023/CVE-2023-38831.json | 68 +++++++++++++++++++++++++++++-
 2023/CVE-2023-40031.json |  8 ++--
 README.md                | 33 ++++++++++++++-
 27 files changed, 514 insertions(+), 81 deletions(-)
 create mode 100644 2016/CVE-2016-7200.json
 create mode 100644 2018/CVE-2018-0952.json
 create mode 100644 2023/CVE-2023-37250.json

diff --git a/2000/CVE-2000-0649.json b/2000/CVE-2000-0649.json
index 242ef696ea..fa8890a923 100644
--- a/2000/CVE-2000-0649.json
+++ b/2000/CVE-2000-0649.json
@@ -62,6 +62,6 @@
         "forks": 0,
         "watchers": 0,
         "score": 0,
-        "subscribers_count": 0
+        "subscribers_count": 1
     }
 ]
\ No newline at end of file
diff --git a/2002/CVE-2002-20001.json b/2002/CVE-2002-20001.json
index e642e9818b..c84cd462bf 100644
--- a/2002/CVE-2002-20001.json
+++ b/2002/CVE-2002-20001.json
@@ -10,11 +10,11 @@
             "html_url": "https:\/\/github.com\/c0r0n3r"
         },
         "html_url": "https:\/\/github.com\/c0r0n3r\/dheater",
-        "description": "D(HE)ater is a proof of concept implementation of the D(HE)at  attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.",
+        "description": "D(HE)ater is a proof of concept implementation of the D(HE)at  attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)",
         "fork": false,
         "created_at": "2021-08-31T09:51:12Z",
-        "updated_at": "2023-09-08T18:26:00Z",
-        "pushed_at": "2023-05-07T11:39:29Z",
+        "updated_at": "2023-09-12T16:39:15Z",
+        "pushed_at": "2023-09-12T16:52:26Z",
         "stargazers_count": 154,
         "watchers_count": 154,
         "has_discussions": false,
diff --git a/2016/CVE-2016-7200.json b/2016/CVE-2016-7200.json
new file mode 100644
index 0000000000..096566f5a4
--- /dev/null
+++ b/2016/CVE-2016-7200.json
@@ -0,0 +1,32 @@
+[
+    {
+        "id": 78062082,
+        "name": "chakra-2016-11",
+        "full_name": "theori-io\/chakra-2016-11",
+        "owner": {
+            "login": "theori-io",
+            "id": 18063559,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18063559?v=4",
+            "html_url": "https:\/\/github.com\/theori-io"
+        },
+        "html_url": "https:\/\/github.com\/theori-io\/chakra-2016-11",
+        "description": "Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201)",
+        "fork": false,
+        "created_at": "2017-01-04T23:41:27Z",
+        "updated_at": "2023-09-07T16:47:11Z",
+        "pushed_at": "2017-01-04T23:42:46Z",
+        "stargazers_count": 139,
+        "watchers_count": 139,
+        "has_discussions": false,
+        "forks_count": 52,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 52,
+        "watchers": 139,
+        "score": 0,
+        "subscribers_count": 17
+    }
+]
\ No newline at end of file
diff --git a/2017/CVE-2017-12615.json b/2017/CVE-2017-12615.json
index 40a6f13db9..527edd3ae1 100644
--- a/2017/CVE-2017-12615.json
+++ b/2017/CVE-2017-12615.json
@@ -57,7 +57,7 @@
         "forks": 8,
         "watchers": 11,
         "score": 0,
-        "subscribers_count": 2
+        "subscribers_count": 0
     },
     {
         "id": 106053959,
diff --git a/2017/CVE-2017-7921.json b/2017/CVE-2017-7921.json
index 6f249cfc7f..9f970a7b5d 100644
--- a/2017/CVE-2017-7921.json
+++ b/2017/CVE-2017-7921.json
@@ -13,10 +13,10 @@
         "description": "Hikvision camera CVE-2017-7921-EXP",
         "fork": false,
         "created_at": "2020-04-27T11:49:40Z",
-        "updated_at": "2023-09-05T16:42:05Z",
+        "updated_at": "2023-09-12T13:47:08Z",
         "pushed_at": "2023-05-22T23:24:36Z",
-        "stargazers_count": 74,
-        "watchers_count": 74,
+        "stargazers_count": 75,
+        "watchers_count": 75,
         "has_discussions": false,
         "forks_count": 15,
         "allow_forking": true,
@@ -25,7 +25,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 15,
-        "watchers": 74,
+        "watchers": 75,
         "score": 0,
         "subscribers_count": 3
     },
diff --git a/2018/CVE-2018-0952.json b/2018/CVE-2018-0952.json
new file mode 100644
index 0000000000..da15743fa0
--- /dev/null
+++ b/2018/CVE-2018-0952.json
@@ -0,0 +1,32 @@
+[
+    {
+        "id": 145615979,
+        "name": "CVE-2018-0952-SystemCollector",
+        "full_name": "atredispartners\/CVE-2018-0952-SystemCollector",
+        "owner": {
+            "login": "atredispartners",
+            "id": 7254370,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7254370?v=4",
+            "html_url": "https:\/\/github.com\/atredispartners"
+        },
+        "html_url": "https:\/\/github.com\/atredispartners\/CVE-2018-0952-SystemCollector",
+        "description": "PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service",
+        "fork": false,
+        "created_at": "2018-08-21T20:29:10Z",
+        "updated_at": "2023-09-10T08:29:58Z",
+        "pushed_at": "2018-08-21T20:30:24Z",
+        "stargazers_count": 107,
+        "watchers_count": 107,
+        "has_discussions": false,
+        "forks_count": 37,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 37,
+        "watchers": 107,
+        "score": 0,
+        "subscribers_count": 7
+    }
+]
\ No newline at end of file
diff --git a/2018/CVE-2018-9948.json b/2018/CVE-2018-9948.json
index 57c0569010..126ad0a251 100644
--- a/2018/CVE-2018-9948.json
+++ b/2018/CVE-2018-9948.json
@@ -28,5 +28,35 @@
         "watchers": 5,
         "score": 0,
         "subscribers_count": 1
+    },
+    {
+        "id": 145526091,
+        "name": "cve-2018-9948-9958-exp",
+        "full_name": "orangepirate\/cve-2018-9948-9958-exp",
+        "owner": {
+            "login": "orangepirate",
+            "id": 40813235,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40813235?v=4",
+            "html_url": "https:\/\/github.com\/orangepirate"
+        },
+        "html_url": "https:\/\/github.com\/orangepirate\/cve-2018-9948-9958-exp",
+        "description": "a exp for cve-2018-9948\/9958 , current shellcode called win-calc ",
+        "fork": false,
+        "created_at": "2018-08-21T07:43:38Z",
+        "updated_at": "2018-08-24T00:18:07Z",
+        "pushed_at": "2018-08-24T00:18:06Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "has_discussions": false,
+        "forks_count": 0,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 0,
+        "watchers": 0,
+        "score": 0,
+        "subscribers_count": 0
     }
 ]
\ No newline at end of file
diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json
index c1523aaadc..e4fec8ee30 100644
--- a/2019/CVE-2019-19781.json
+++ b/2019/CVE-2019-19781.json
@@ -217,6 +217,36 @@
         "score": 0,
         "subscribers_count": 2
     },
+    {
+        "id": 233274912,
+        "name": "Citrix_CVE-2019-19781",
+        "full_name": "becrevex\/Citrix_CVE-2019-19781",
+        "owner": {
+            "login": "becrevex",
+            "id": 8326868,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8326868?v=4",
+            "html_url": "https:\/\/github.com\/becrevex"
+        },
+        "html_url": "https:\/\/github.com\/becrevex\/Citrix_CVE-2019-19781",
+        "description": "Took at stab at an NSE discovery script for CVE-2019-19781.",
+        "fork": false,
+        "created_at": "2020-01-11T18:04:17Z",
+        "updated_at": "2022-06-27T14:55:57Z",
+        "pushed_at": "2020-01-11T19:48:24Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "has_discussions": false,
+        "forks_count": 0,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 0,
+        "watchers": 0,
+        "score": 0,
+        "subscribers_count": 1
+    },
     {
         "id": 233294562,
         "name": "Exploits_CVE-2019-19781",
diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json
index 61e0623955..25e8f69fa4 100644
--- a/2020/CVE-2020-1472.json
+++ b/2020/CVE-2020-1472.json
@@ -980,10 +980,10 @@
         "description": "POC for checking multiple hosts for Zerologon vulnerability",
         "fork": false,
         "created_at": "2020-09-29T18:45:44Z",
-        "updated_at": "2023-06-04T11:52:31Z",
+        "updated_at": "2023-09-12T14:11:48Z",
         "pushed_at": "2020-10-05T07:47:02Z",
-        "stargazers_count": 9,
-        "watchers_count": 9,
+        "stargazers_count": 10,
+        "watchers_count": 10,
         "has_discussions": false,
         "forks_count": 5,
         "allow_forking": true,
@@ -992,7 +992,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 5,
-        "watchers": 9,
+        "watchers": 10,
         "score": 0,
         "subscribers_count": 2
     },
diff --git a/2022/CVE-2022-1679.json b/2022/CVE-2022-1679.json
index 642647ebc4..a551060795 100644
--- a/2022/CVE-2022-1679.json
+++ b/2022/CVE-2022-1679.json
@@ -28,5 +28,35 @@
         "watchers": 0,
         "score": 0,
         "subscribers_count": 1
+    },
+    {
+        "id": 690703239,
+        "name": "Detection-and-Mitigation-for-CVE-2022-1679",
+        "full_name": "ov3rwatch\/Detection-and-Mitigation-for-CVE-2022-1679",
+        "owner": {
+            "login": "ov3rwatch",
+            "id": 23441286,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23441286?v=4",
+            "html_url": "https:\/\/github.com\/ov3rwatch"
+        },
+        "html_url": "https:\/\/github.com\/ov3rwatch\/Detection-and-Mitigation-for-CVE-2022-1679",
+        "description": null,
+        "fork": false,
+        "created_at": "2023-09-12T17:47:01Z",
+        "updated_at": "2023-09-12T17:48:39Z",
+        "pushed_at": "2023-09-12T17:48:58Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "has_discussions": false,
+        "forks_count": 0,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 0,
+        "watchers": 0,
+        "score": 0,
+        "subscribers_count": 0
     }
 ]
\ No newline at end of file
diff --git a/2022/CVE-2022-30190.json b/2022/CVE-2022-30190.json
index 77dcea8947..d0599ed93e 100644
--- a/2022/CVE-2022-30190.json
+++ b/2022/CVE-2022-30190.json
@@ -2355,36 +2355,6 @@
         "score": 0,
         "subscribers_count": 1
     },
-    {
-        "id": 588668068,
-        "name": "Follina_Vagrant",
-        "full_name": "3barz\/Follina_Vagrant",
-        "owner": {
-            "login": "3barz",
-            "id": 113859310,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113859310?v=4",
-            "html_url": "https:\/\/github.com\/3barz"
-        },
-        "html_url": "https:\/\/github.com\/3barz\/Follina_Vagrant",
-        "description": "Follina(CVE-2022-30190) Vagrant Demo",
-        "fork": false,
-        "created_at": "2023-01-13T17:32:13Z",
-        "updated_at": "2023-01-13T17:36:25Z",
-        "pushed_at": "2023-01-13T17:36:21Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
-        "has_discussions": false,
-        "forks_count": 0,
-        "allow_forking": true,
-        "is_template": false,
-        "web_commit_signoff_required": false,
-        "topics": [],
-        "visibility": "public",
-        "forks": 0,
-        "watchers": 0,
-        "score": 0,
-        "subscribers_count": 1
-    },
     {
         "id": 601379517,
         "name": "CVE-2022-30190",
diff --git a/2022/CVE-2022-34265.json b/2022/CVE-2022-34265.json
index 2217a098d3..0b641b59d8 100644
--- a/2022/CVE-2022-34265.json
+++ b/2022/CVE-2022-34265.json
@@ -13,10 +13,10 @@
         "description": "PoC for CVE-2022-34265 (Django)",
         "fork": false,
         "created_at": "2022-07-07T07:45:28Z",
-        "updated_at": "2023-08-30T09:42:45Z",
+        "updated_at": "2023-09-12T15:37:08Z",
         "pushed_at": "2022-07-30T07:53:43Z",
-        "stargazers_count": 118,
-        "watchers_count": 118,
+        "stargazers_count": 119,
+        "watchers_count": 119,
         "has_discussions": false,
         "forks_count": 17,
         "allow_forking": true,
@@ -25,7 +25,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 17,
-        "watchers": 118,
+        "watchers": 119,
         "score": 0,
         "subscribers_count": 4
     },
diff --git a/2022/CVE-2022-47966.json b/2022/CVE-2022-47966.json
index 14cc939d1f..39931963aa 100644
--- a/2022/CVE-2022-47966.json
+++ b/2022/CVE-2022-47966.json
@@ -13,10 +13,10 @@
         "description": "POC for CVE-2022-47966 affecting multiple ManageEngine products",
         "fork": false,
         "created_at": "2023-01-17T21:26:28Z",
-        "updated_at": "2023-08-24T20:45:31Z",
+        "updated_at": "2023-09-12T15:26:04Z",
         "pushed_at": "2023-01-19T13:10:07Z",
-        "stargazers_count": 117,
-        "watchers_count": 117,
+        "stargazers_count": 118,
+        "watchers_count": 118,
         "has_discussions": false,
         "forks_count": 30,
         "allow_forking": true,
@@ -25,7 +25,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 30,
-        "watchers": 117,
+        "watchers": 118,
         "score": 0,
         "subscribers_count": 5
     },
diff --git a/2023/CVE-2023-24488.json b/2023/CVE-2023-24488.json
index f69da0893a..ce47844be4 100644
--- a/2023/CVE-2023-24488.json
+++ b/2023/CVE-2023-24488.json
@@ -1,4 +1,94 @@
 [
+    {
+        "id": 661072883,
+        "name": "CVE-2023-24488-PoC",
+        "full_name": "SirBugs\/CVE-2023-24488-PoC",
+        "owner": {
+            "login": "SirBugs",
+            "id": 37689994,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37689994?v=4",
+            "html_url": "https:\/\/github.com\/SirBugs"
+        },
+        "html_url": "https:\/\/github.com\/SirBugs\/CVE-2023-24488-PoC",
+        "description": "CVE-2023-24488 PoC",
+        "fork": false,
+        "created_at": "2023-07-01T17:47:17Z",
+        "updated_at": "2023-07-24T21:45:44Z",
+        "pushed_at": "2023-07-01T17:49:16Z",
+        "stargazers_count": 4,
+        "watchers_count": 4,
+        "has_discussions": false,
+        "forks_count": 1,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 1,
+        "watchers": 4,
+        "score": 0,
+        "subscribers_count": 1
+    },
+    {
+        "id": 661909414,
+        "name": "CVE-2023-24488",
+        "full_name": "Abo5\/CVE-2023-24488",
+        "owner": {
+            "login": "Abo5",
+            "id": 40110835,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40110835?v=4",
+            "html_url": "https:\/\/github.com\/Abo5"
+        },
+        "html_url": "https:\/\/github.com\/Abo5\/CVE-2023-24488",
+        "description": "CVE-2023-24488.rb The provided script is a Ruby script used to check and detect the CVE-2023-24488 security vulnerability in Citrix Gateway and Citrix ADC.",
+        "fork": false,
+        "created_at": "2023-07-04T00:29:56Z",
+        "updated_at": "2023-07-22T18:29:56Z",
+        "pushed_at": "2023-07-04T00:40:46Z",
+        "stargazers_count": 8,
+        "watchers_count": 8,
+        "has_discussions": false,
+        "forks_count": 3,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 3,
+        "watchers": 8,
+        "score": 0,
+        "subscribers_count": 1
+    },
+    {
+        "id": 662260047,
+        "name": "CVE-2023-24488",
+        "full_name": "securitycipher\/CVE-2023-24488",
+        "owner": {
+            "login": "securitycipher",
+            "id": 111536600,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/111536600?v=4",
+            "html_url": "https:\/\/github.com\/securitycipher"
+        },
+        "html_url": "https:\/\/github.com\/securitycipher\/CVE-2023-24488",
+        "description": "POC for CVE-2023-24488",
+        "fork": false,
+        "created_at": "2023-07-04T18:02:50Z",
+        "updated_at": "2023-07-19T18:59:08Z",
+        "pushed_at": "2023-07-04T18:39:03Z",
+        "stargazers_count": 7,
+        "watchers_count": 7,
+        "has_discussions": false,
+        "forks_count": 2,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 2,
+        "watchers": 7,
+        "score": 0,
+        "subscribers_count": 1
+    },
     {
         "id": 662853030,
         "name": "cve-2023-24488",
diff --git a/2023/CVE-2023-28343.json b/2023/CVE-2023-28343.json
index a143219aa1..96eb625a7b 100644
--- a/2023/CVE-2023-28343.json
+++ b/2023/CVE-2023-28343.json
@@ -58,5 +58,35 @@
         "watchers": 9,
         "score": 0,
         "subscribers_count": 2
+    },
+    {
+        "id": 661672662,
+        "name": "CVE-2023-28343",
+        "full_name": "hba343434\/CVE-2023-28343",
+        "owner": {
+            "login": "hba343434",
+            "id": 120598843,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120598843?v=4",
+            "html_url": "https:\/\/github.com\/hba343434"
+        },
+        "html_url": "https:\/\/github.com\/hba343434\/CVE-2023-28343",
+        "description": "CVE-2023-28343",
+        "fork": false,
+        "created_at": "2023-07-03T11:48:21Z",
+        "updated_at": "2023-07-06T15:42:44Z",
+        "pushed_at": "2023-07-03T11:50:59Z",
+        "stargazers_count": 1,
+        "watchers_count": 1,
+        "has_discussions": false,
+        "forks_count": 1,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 1,
+        "watchers": 1,
+        "score": 0,
+        "subscribers_count": 1
     }
 ]
\ No newline at end of file
diff --git a/2023/CVE-2023-3124.json b/2023/CVE-2023-3124.json
index 77ac4d6840..35317ff0f5 100644
--- a/2023/CVE-2023-3124.json
+++ b/2023/CVE-2023-3124.json
@@ -13,10 +13,10 @@
         "description": "CVE-2023-3124 PoC",
         "fork": false,
         "created_at": "2023-09-05T12:32:50Z",
-        "updated_at": "2023-09-05T12:41:27Z",
+        "updated_at": "2023-09-12T16:31:05Z",
         "pushed_at": "2023-09-05T15:58:17Z",
-        "stargazers_count": 1,
-        "watchers_count": 1,
+        "stargazers_count": 2,
+        "watchers_count": 2,
         "has_discussions": false,
         "forks_count": 0,
         "allow_forking": true,
@@ -30,7 +30,7 @@
         ],
         "visibility": "public",
         "forks": 0,
-        "watchers": 1,
+        "watchers": 2,
         "score": 0,
         "subscribers_count": 1
     }
diff --git a/2023/CVE-2023-32233.json b/2023/CVE-2023-32233.json
index ce83100955..b486e41710 100644
--- a/2023/CVE-2023-32233.json
+++ b/2023/CVE-2023-32233.json
@@ -43,10 +43,10 @@
         "description": "CVE-2023-32233: Linux内核中的安全漏洞",
         "fork": false,
         "created_at": "2023-05-16T03:06:40Z",
-        "updated_at": "2023-09-12T09:18:12Z",
+        "updated_at": "2023-09-12T15:22:37Z",
         "pushed_at": "2023-05-16T04:34:16Z",
-        "stargazers_count": 325,
-        "watchers_count": 325,
+        "stargazers_count": 326,
+        "watchers_count": 326,
         "has_discussions": false,
         "forks_count": 71,
         "allow_forking": true,
@@ -55,7 +55,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 71,
-        "watchers": 325,
+        "watchers": 326,
         "score": 0,
         "subscribers_count": 4
     },
diff --git a/2023/CVE-2023-32243.json b/2023/CVE-2023-32243.json
index 8e15d55863..b12663aa56 100644
--- a/2023/CVE-2023-32243.json
+++ b/2023/CVE-2023-32243.json
@@ -243,6 +243,36 @@
         "score": 0,
         "subscribers_count": 1
     },
+    {
+        "id": 661522187,
+        "name": "WP-CVE-2023-32243",
+        "full_name": "Jenderal92\/WP-CVE-2023-32243",
+        "owner": {
+            "login": "Jenderal92",
+            "id": 59664965,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59664965?v=4",
+            "html_url": "https:\/\/github.com\/Jenderal92"
+        },
+        "html_url": "https:\/\/github.com\/Jenderal92\/WP-CVE-2023-32243",
+        "description": "Python 2.7",
+        "fork": false,
+        "created_at": "2023-07-03T04:16:16Z",
+        "updated_at": "2023-07-24T14:30:30Z",
+        "pushed_at": "2023-07-03T04:17:45Z",
+        "stargazers_count": 4,
+        "watchers_count": 4,
+        "has_discussions": false,
+        "forks_count": 5,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 5,
+        "watchers": 4,
+        "score": 0,
+        "subscribers_count": 1
+    },
     {
         "id": 672367254,
         "name": "Mass-CVE-2023-32243",
diff --git a/2023/CVE-2023-3269.json b/2023/CVE-2023-3269.json
index 0841577b1c..7ed2f231e0 100644
--- a/2023/CVE-2023-3269.json
+++ b/2023/CVE-2023-3269.json
@@ -13,10 +13,10 @@
         "description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
         "fork": false,
         "created_at": "2023-06-28T13:22:26Z",
-        "updated_at": "2023-09-12T02:10:03Z",
+        "updated_at": "2023-09-12T15:01:18Z",
         "pushed_at": "2023-07-28T13:20:45Z",
-        "stargazers_count": 415,
-        "watchers_count": 415,
+        "stargazers_count": 416,
+        "watchers_count": 416,
         "has_discussions": false,
         "forks_count": 44,
         "allow_forking": true,
@@ -25,7 +25,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 44,
-        "watchers": 415,
+        "watchers": 416,
         "score": 0,
         "subscribers_count": 16
     }
diff --git a/2023/CVE-2023-34960.json b/2023/CVE-2023-34960.json
index 225d8b52a5..23250ae81c 100644
--- a/2023/CVE-2023-34960.json
+++ b/2023/CVE-2023-34960.json
@@ -29,6 +29,36 @@
         "score": 0,
         "subscribers_count": 1
     },
+    {
+        "id": 661661784,
+        "name": "CHAMILO-CVE-2023-34960",
+        "full_name": "Jenderal92\/CHAMILO-CVE-2023-34960",
+        "owner": {
+            "login": "Jenderal92",
+            "id": 59664965,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59664965?v=4",
+            "html_url": "https:\/\/github.com\/Jenderal92"
+        },
+        "html_url": "https:\/\/github.com\/Jenderal92\/CHAMILO-CVE-2023-34960",
+        "description": "Python 2.7",
+        "fork": false,
+        "created_at": "2023-07-03T11:17:42Z",
+        "updated_at": "2023-07-03T12:02:55Z",
+        "pushed_at": "2023-07-03T11:19:39Z",
+        "stargazers_count": 1,
+        "watchers_count": 1,
+        "has_discussions": false,
+        "forks_count": 3,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 3,
+        "watchers": 1,
+        "score": 0,
+        "subscribers_count": 1
+    },
     {
         "id": 664245908,
         "name": "Chamilo_CVE-2023-34960-EXP",
diff --git a/2023/CVE-2023-3519.json b/2023/CVE-2023-3519.json
index ee79d72b5f..97e634cea1 100644
--- a/2023/CVE-2023-3519.json
+++ b/2023/CVE-2023-3519.json
@@ -172,10 +172,10 @@
         "description": "RCE exploit for CVE-2023-3519",
         "fork": false,
         "created_at": "2023-07-21T20:17:43Z",
-        "updated_at": "2023-09-12T12:12:06Z",
+        "updated_at": "2023-09-12T16:59:33Z",
         "pushed_at": "2023-08-23T16:27:28Z",
-        "stargazers_count": 182,
-        "watchers_count": 182,
+        "stargazers_count": 183,
+        "watchers_count": 183,
         "has_discussions": false,
         "forks_count": 31,
         "allow_forking": true,
@@ -184,7 +184,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 31,
-        "watchers": 182,
+        "watchers": 183,
         "score": 0,
         "subscribers_count": 3
     },
diff --git a/2023/CVE-2023-35671.json b/2023/CVE-2023-35671.json
index 159c125a7b..5035035a20 100644
--- a/2023/CVE-2023-35671.json
+++ b/2023/CVE-2023-35671.json
@@ -13,10 +13,10 @@
         "description": "Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet",
         "fork": false,
         "created_at": "2023-09-01T20:16:28Z",
-        "updated_at": "2023-09-12T10:40:45Z",
+        "updated_at": "2023-09-12T14:32:09Z",
         "pushed_at": "2023-09-12T07:52:40Z",
-        "stargazers_count": 2,
-        "watchers_count": 2,
+        "stargazers_count": 3,
+        "watchers_count": 3,
         "has_discussions": false,
         "forks_count": 0,
         "allow_forking": true,
@@ -25,7 +25,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 0,
-        "watchers": 2,
+        "watchers": 3,
         "score": 0,
         "subscribers_count": 0
     }
diff --git a/2023/CVE-2023-36874.json b/2023/CVE-2023-36874.json
index 3fb9c134da..10c5918039 100644
--- a/2023/CVE-2023-36874.json
+++ b/2023/CVE-2023-36874.json
@@ -73,10 +73,10 @@
         "description": null,
         "fork": false,
         "created_at": "2023-08-23T12:07:40Z",
-        "updated_at": "2023-09-12T06:20:36Z",
+        "updated_at": "2023-09-12T16:23:01Z",
         "pushed_at": "2023-08-23T16:46:53Z",
-        "stargazers_count": 177,
-        "watchers_count": 177,
+        "stargazers_count": 178,
+        "watchers_count": 178,
         "has_discussions": false,
         "forks_count": 40,
         "allow_forking": true,
@@ -85,7 +85,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 40,
-        "watchers": 177,
+        "watchers": 178,
         "score": 0,
         "subscribers_count": 4
     },
diff --git a/2023/CVE-2023-37250.json b/2023/CVE-2023-37250.json
new file mode 100644
index 0000000000..0731015c57
--- /dev/null
+++ b/2023/CVE-2023-37250.json
@@ -0,0 +1,32 @@
+[
+    {
+        "id": 661203032,
+        "name": "CVE-2023-37250",
+        "full_name": "ewilded\/CVE-2023-37250",
+        "owner": {
+            "login": "ewilded",
+            "id": 1158719,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1158719?v=4",
+            "html_url": "https:\/\/github.com\/ewilded"
+        },
+        "html_url": "https:\/\/github.com\/ewilded\/CVE-2023-37250",
+        "description": "PoC",
+        "fork": false,
+        "created_at": "2023-07-02T05:37:51Z",
+        "updated_at": "2023-07-07T03:46:15Z",
+        "pushed_at": "2023-07-03T10:34:45Z",
+        "stargazers_count": 1,
+        "watchers_count": 1,
+        "has_discussions": false,
+        "forks_count": 1,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 1,
+        "watchers": 1,
+        "score": 0,
+        "subscribers_count": 1
+    }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json
index b3676c24de..30f3150f82 100644
--- a/2023/CVE-2023-38831.json
+++ b/2023/CVE-2023-38831.json
@@ -43,7 +43,7 @@
         "description": "CVE-2023-38831 winrar exploit generator",
         "fork": false,
         "created_at": "2023-08-25T09:44:08Z",
-        "updated_at": "2023-09-12T11:49:49Z",
+        "updated_at": "2023-09-12T15:36:16Z",
         "pushed_at": "2023-08-30T14:20:43Z",
         "stargazers_count": 616,
         "watchers_count": 616,
@@ -751,5 +751,71 @@
         "watchers": 0,
         "score": 0,
         "subscribers_count": 1
+    },
+    {
+        "id": 690603491,
+        "name": "CVE-2023-38831",
+        "full_name": "Malwareman007\/CVE-2023-38831",
+        "owner": {
+            "login": "Malwareman007",
+            "id": 86009160,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86009160?v=4",
+            "html_url": "https:\/\/github.com\/Malwareman007"
+        },
+        "html_url": "https:\/\/github.com\/Malwareman007\/CVE-2023-38831",
+        "description": "CVE-2023-38831 WinRaR Exploit Generator",
+        "fork": false,
+        "created_at": "2023-09-12T14:07:00Z",
+        "updated_at": "2023-09-12T14:24:58Z",
+        "pushed_at": "2023-09-12T16:39:44Z",
+        "stargazers_count": 1,
+        "watchers_count": 1,
+        "has_discussions": false,
+        "forks_count": 0,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [
+            "0day-exploit",
+            "cve-2023-38831",
+            "exploit",
+            "vulnerability",
+            "winrar"
+        ],
+        "visibility": "public",
+        "forks": 0,
+        "watchers": 1,
+        "score": 0,
+        "subscribers_count": 0
+    },
+    {
+        "id": 690658119,
+        "name": "CVE-2023-38831-WinRAR-Exploit",
+        "full_name": "ameerpornillos\/CVE-2023-38831-WinRAR-Exploit",
+        "owner": {
+            "login": "ameerpornillos",
+            "id": 44928938,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44928938?v=4",
+            "html_url": "https:\/\/github.com\/ameerpornillos"
+        },
+        "html_url": "https:\/\/github.com\/ameerpornillos\/CVE-2023-38831-WinRAR-Exploit",
+        "description": "Proof of concept (PoC) exploit for WinRAR vulnerability (CVE-2023-38831) vulnerability",
+        "fork": false,
+        "created_at": "2023-09-12T16:01:17Z",
+        "updated_at": "2023-09-12T16:07:54Z",
+        "pushed_at": "2023-09-12T16:26:22Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "has_discussions": false,
+        "forks_count": 0,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 0,
+        "watchers": 0,
+        "score": 0,
+        "subscribers_count": 0
     }
 ]
\ No newline at end of file
diff --git a/2023/CVE-2023-40031.json b/2023/CVE-2023-40031.json
index 2c860a6fd6..416586b07d 100644
--- a/2023/CVE-2023-40031.json
+++ b/2023/CVE-2023-40031.json
@@ -13,10 +13,10 @@
         "description": "notepad++堆缓冲区溢出漏洞CVE-2023-40031 分析与复现",
         "fork": false,
         "created_at": "2023-09-08T05:43:12Z",
-        "updated_at": "2023-09-10T13:45:06Z",
+        "updated_at": "2023-09-12T17:27:08Z",
         "pushed_at": "2023-09-08T05:48:52Z",
-        "stargazers_count": 9,
-        "watchers_count": 9,
+        "stargazers_count": 10,
+        "watchers_count": 10,
         "has_discussions": false,
         "forks_count": 5,
         "allow_forking": true,
@@ -25,7 +25,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 5,
-        "watchers": 9,
+        "watchers": 10,
         "score": 0,
         "subscribers_count": 1
     }
diff --git a/README.md b/README.md
index fe0d9138c9..09f9871b48 100644
--- a/README.md
+++ b/README.md
@@ -1119,6 +1119,9 @@
 <code>Cross site scripting vulnerability in Citrix ADC and Citrix Gateway  in allows and attacker to perform cross site scripting
 </code>
 
+- [SirBugs/CVE-2023-24488-PoC](https://github.com/SirBugs/CVE-2023-24488-PoC)
+- [Abo5/CVE-2023-24488](https://github.com/Abo5/CVE-2023-24488)
+- [securitycipher/CVE-2023-24488](https://github.com/securitycipher/CVE-2023-24488)
 - [codeb0ss/cve-2023-24488](https://github.com/codeb0ss/cve-2023-24488)
 - [NSTCyber/CVE-2023-24488-SIEM-Sigma-Rule](https://github.com/NSTCyber/CVE-2023-24488-SIEM-Sigma-Rule)
 - [LazyySec/CVE-2023-24488](https://github.com/LazyySec/CVE-2023-24488)
@@ -1608,6 +1611,7 @@
 
 - [gobysec/CVE-2023-28343](https://github.com/gobysec/CVE-2023-28343)
 - [superzerosec/CVE-2023-28343](https://github.com/superzerosec/CVE-2023-28343)
+- [hba343434/CVE-2023-28343](https://github.com/hba343434/CVE-2023-28343)
 
 ### CVE-2023-28432 (2023-03-22)
 
@@ -2167,6 +2171,7 @@
 - [YouGina/CVE-2023-32243](https://github.com/YouGina/CVE-2023-32243)
 - [thatonesecguy/Wordpress-Vulnerability-Identification-Scripts](https://github.com/thatonesecguy/Wordpress-Vulnerability-Identification-Scripts)
 - [manavvedawala/CVE-2023-32243-proof-of-concept](https://github.com/manavvedawala/CVE-2023-32243-proof-of-concept)
+- [Jenderal92/WP-CVE-2023-32243](https://github.com/Jenderal92/WP-CVE-2023-32243)
 - [shaoyu521/Mass-CVE-2023-32243](https://github.com/shaoyu521/Mass-CVE-2023-32243)
 
 ### CVE-2023-32315 (2023-05-26)
@@ -2629,6 +2634,7 @@
 </code>
 
 - [Aituglo/CVE-2023-34960](https://github.com/Aituglo/CVE-2023-34960)
+- [Jenderal92/CHAMILO-CVE-2023-34960](https://github.com/Jenderal92/CHAMILO-CVE-2023-34960)
 - [YongYe-Security/Chamilo_CVE-2023-34960-EXP](https://github.com/YongYe-Security/Chamilo_CVE-2023-34960-EXP)
 - [Pari-Malam/CVE-2023-34960](https://github.com/Pari-Malam/CVE-2023-34960)
 - [Mantodkaz/CVE-2023-34960](https://github.com/Mantodkaz/CVE-2023-34960)
@@ -2884,6 +2890,13 @@
 
 - [sahiloj/CVE-2023-37191](https://github.com/sahiloj/CVE-2023-37191)
 
+### CVE-2023-37250 (2023-08-20)
+
+<code>Unity Parsec has a TOCTOU race condition that permits local attackers to escalate privileges to SYSTEM if Parsec was installed in &quot;Per User&quot; mode. The application intentionally launches DLLs from a user-owned directory but intended to always perform integrity verification of those DLLs. This affects Parsec Loader versions through 8. Parsec Loader 9 is a fixed version.
+</code>
+
+- [ewilded/CVE-2023-37250](https://github.com/ewilded/CVE-2023-37250)
+
 ### CVE-2023-37474 (2023-07-14)
 
 <code>Copyparty is a portable file server. Versions prior to 1.8.2 are subject to a path traversal vulnerability detected in the `.cpr` subfolder. The Path Traversal attack technique allows an attacker access to files, directories, and commands that reside outside the web document root directory. This issue has been addressed in commit `043e3c7d` which has been included in release 1.8.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
@@ -3106,6 +3119,8 @@
 - [xaitax/WinRAR-CVE-2023-38831](https://github.com/xaitax/WinRAR-CVE-2023-38831)
 - [LuxCodeDev/CVE-2023-38831_WinRAR](https://github.com/LuxCodeDev/CVE-2023-38831_WinRAR)
 - [GOTonyGO/CVE-2023-38831-winrar](https://github.com/GOTonyGO/CVE-2023-38831-winrar)
+- [Malwareman007/CVE-2023-38831](https://github.com/Malwareman007/CVE-2023-38831)
+- [ameerpornillos/CVE-2023-38831-WinRAR-Exploit](https://github.com/ameerpornillos/CVE-2023-38831-WinRAR-Exploit)
 
 ### CVE-2023-38836 (2023-08-21)
 
@@ -3966,6 +3981,7 @@
 </code>
 
 - [EkamSinghWalia/-Detection-and-Mitigation-for-CVE-2022-1679](https://github.com/EkamSinghWalia/-Detection-and-Mitigation-for-CVE-2022-1679)
+- [ov3rwatch/Detection-and-Mitigation-for-CVE-2022-1679](https://github.com/ov3rwatch/Detection-and-Mitigation-for-CVE-2022-1679)
 
 ### CVE-2022-1802 (2022-12-22)
 
@@ -6891,7 +6907,6 @@
 - [0xAbbarhSF/FollinaXploit](https://github.com/0xAbbarhSF/FollinaXploit)
 - [michealadams30/Cve-2022-30190](https://github.com/michealadams30/Cve-2022-30190)
 - [melting0256/Enterprise-Cybersecurity](https://github.com/melting0256/Enterprise-Cybersecurity)
-- [3barz/Follina_Vagrant](https://github.com/3barz/Follina_Vagrant)
 - [yrkuo/CVE-2022-30190](https://github.com/yrkuo/CVE-2022-30190)
 - [ToxicEnvelope/FOLLINA-CVE-2022-30190](https://github.com/ToxicEnvelope/FOLLINA-CVE-2022-30190)
 - [meowhua15/CVE-2022-30190](https://github.com/meowhua15/CVE-2022-30190)
@@ -24567,6 +24582,7 @@
 - [ianxtianxt/CVE-2019-19781](https://github.com/ianxtianxt/CVE-2019-19781)
 - [mpgn/CVE-2019-19781](https://github.com/mpgn/CVE-2019-19781)
 - [oways/CVE-2019-19781](https://github.com/oways/CVE-2019-19781)
+- [becrevex/Citrix_CVE-2019-19781](https://github.com/becrevex/Citrix_CVE-2019-19781)
 - [unknowndevice64/Exploits_CVE-2019-19781](https://github.com/unknowndevice64/Exploits_CVE-2019-19781)
 - [haxrob/citrixmash_scanner](https://github.com/haxrob/citrixmash_scanner)
 - [jamesjguthrie/Shitrix-CVE-2019-19781](https://github.com/jamesjguthrie/Shitrix-CVE-2019-19781)
@@ -24859,6 +24875,13 @@
 
 - [preempt/credssp](https://github.com/preempt/credssp)
 
+### CVE-2018-0952 (2018-08-15)
+
+<code>An Elevation of Privilege vulnerability exists when Diagnostics Hub Standard Collector allows file creation in arbitrary locations, aka &quot;Diagnostic Hub Standard Collector Elevation Of Privilege Vulnerability.&quot; This affects Windows Server 2016, Windows 10, Microsoft Visual Studio, Windows 10 Servers.
+</code>
+
+- [atredispartners/CVE-2018-0952-SystemCollector](https://github.com/atredispartners/CVE-2018-0952-SystemCollector)
+
 ### CVE-2018-0959 (2018-05-09)
 
 <code>A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system, aka &quot;Hyper-V Remote Code Execution Vulnerability.&quot; This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
@@ -26365,6 +26388,7 @@
 </code>
 
 - [manojcode/Foxit-Reader-RCE-with-virualalloc-and-shellcode-for-CVE-2018-9948-and-CVE-2018-9958](https://github.com/manojcode/Foxit-Reader-RCE-with-virualalloc-and-shellcode-for-CVE-2018-9948-and-CVE-2018-9958)
+- [orangepirate/cve-2018-9948-9958-exp](https://github.com/orangepirate/cve-2018-9948-9958-exp)
 
 ### CVE-2018-9950 (2018-05-17)
 
@@ -31136,6 +31160,13 @@
 
 - [0xcl/cve-2016-7190](https://github.com/0xcl/cve-2016-7190)
 
+### CVE-2016-7200 (2016-11-10)
+
+<code>The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka &quot;Scripting Engine Memory Corruption Vulnerability,&quot; a different vulnerability than CVE-2016-7201, CVE-2016-7202, CVE-2016-7203, CVE-2016-7208, CVE-2016-7240, CVE-2016-7242, and CVE-2016-7243.
+</code>
+
+- [theori-io/chakra-2016-11](https://github.com/theori-io/chakra-2016-11)
+
 ### CVE-2016-7255 (2016-11-10)
 
 <code>The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka &quot;Win32k Elevation of Privilege Vulnerability.&quot;