diff --git a/2000/CVE-2000-0649.json b/2000/CVE-2000-0649.json
index fa8890a923..68a30ef30f 100644
--- a/2000/CVE-2000-0649.json
+++ b/2000/CVE-2000-0649.json
@@ -33,35 +33,5 @@
         "watchers": 4,
         "score": 0,
         "subscribers_count": 2
-    },
-    {
-        "id": 421212210,
-        "name": "cve-2000-0649",
-        "full_name": "stevenvegar\/cve-2000-0649",
-        "owner": {
-            "login": "stevenvegar",
-            "id": 70730301,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70730301?v=4",
-            "html_url": "https:\/\/github.com\/stevenvegar"
-        },
-        "html_url": "https:\/\/github.com\/stevenvegar\/cve-2000-0649",
-        "description": "Script fo testing CVE-2000-0649 for Apache and MS IIS servers",
-        "fork": false,
-        "created_at": "2021-10-25T23:14:04Z",
-        "updated_at": "2021-12-17T07:02:21Z",
-        "pushed_at": "2021-10-25T23:32:57Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
-        "has_discussions": false,
-        "forks_count": 0,
-        "allow_forking": true,
-        "is_template": false,
-        "web_commit_signoff_required": false,
-        "topics": [],
-        "visibility": "public",
-        "forks": 0,
-        "watchers": 0,
-        "score": 0,
-        "subscribers_count": 1
     }
 ]
\ No newline at end of file
diff --git a/2015/CVE-2015-0235.json b/2015/CVE-2015-0235.json
index 05ef4c996e..3dda9ebcc1 100644
--- a/2015/CVE-2015-0235.json
+++ b/2015/CVE-2015-0235.json
@@ -29,66 +29,6 @@
         "score": 0,
         "subscribers_count": 2
     },
-    {
-        "id": 29933656,
-        "name": "CVE-2015-0235-cookbook",
-        "full_name": "mikesplain\/CVE-2015-0235-cookbook",
-        "owner": {
-            "login": "mikesplain",
-            "id": 881965,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/881965?v=4",
-            "html_url": "https:\/\/github.com\/mikesplain"
-        },
-        "html_url": "https:\/\/github.com\/mikesplain\/CVE-2015-0235-cookbook",
-        "description": "A chef cookbook to test the GHOST vulnerability",
-        "fork": false,
-        "created_at": "2015-01-27T20:34:42Z",
-        "updated_at": "2017-09-29T11:32:54Z",
-        "pushed_at": "2015-01-27T21:41:24Z",
-        "stargazers_count": 3,
-        "watchers_count": 3,
-        "has_discussions": false,
-        "forks_count": 1,
-        "allow_forking": true,
-        "is_template": false,
-        "web_commit_signoff_required": false,
-        "topics": [],
-        "visibility": "public",
-        "forks": 1,
-        "watchers": 3,
-        "score": 0,
-        "subscribers_count": 2
-    },
-    {
-        "id": 29941036,
-        "name": "CVE-2015-0235-test",
-        "full_name": "aaronfay\/CVE-2015-0235-test",
-        "owner": {
-            "login": "aaronfay",
-            "id": 1033941,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1033941?v=4",
-            "html_url": "https:\/\/github.com\/aaronfay"
-        },
-        "html_url": "https:\/\/github.com\/aaronfay\/CVE-2015-0235-test",
-        "description": "Ansible playbook to check vulnerability for CVE-2015-0235",
-        "fork": false,
-        "created_at": "2015-01-27T23:45:22Z",
-        "updated_at": "2023-03-07T20:55:14Z",
-        "pushed_at": "2015-01-29T03:33:29Z",
-        "stargazers_count": 15,
-        "watchers_count": 15,
-        "has_discussions": false,
-        "forks_count": 3,
-        "allow_forking": true,
-        "is_template": false,
-        "web_commit_signoff_required": false,
-        "topics": [],
-        "visibility": "public",
-        "forks": 3,
-        "watchers": 15,
-        "score": 0,
-        "subscribers_count": 3
-    },
     {
         "id": 29942046,
         "name": "ghost",
@@ -209,66 +149,6 @@
         "score": 0,
         "subscribers_count": 1
     },
-    {
-        "id": 30004399,
-        "name": "cfengine-CVE_2015_0235",
-        "full_name": "nickanderson\/cfengine-CVE_2015_0235",
-        "owner": {
-            "login": "nickanderson",
-            "id": 202896,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/202896?v=4",
-            "html_url": "https:\/\/github.com\/nickanderson"
-        },
-        "html_url": "https:\/\/github.com\/nickanderson\/cfengine-CVE_2015_0235",
-        "description": "gethostbyname*() buffer overflow exploit in glibc - CVE-2015-0235 https:\/\/community.qualys.com\/blogs\/laws-of-vulnerabilities\/2015\/01\/27\/the-ghost-vulnerability",
-        "fork": false,
-        "created_at": "2015-01-29T04:58:54Z",
-        "updated_at": "2016-02-13T01:41:47Z",
-        "pushed_at": "2015-01-29T21:23:45Z",
-        "stargazers_count": 1,
-        "watchers_count": 1,
-        "has_discussions": false,
-        "forks_count": 0,
-        "allow_forking": true,
-        "is_template": false,
-        "web_commit_signoff_required": false,
-        "topics": [],
-        "visibility": "public",
-        "forks": 0,
-        "watchers": 1,
-        "score": 0,
-        "subscribers_count": 1
-    },
-    {
-        "id": 30008427,
-        "name": "cookbook-update-glibc",
-        "full_name": "koudaiii-archives\/cookbook-update-glibc",
-        "owner": {
-            "login": "koudaiii-archives",
-            "id": 51727289,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51727289?v=4",
-            "html_url": "https:\/\/github.com\/koudaiii-archives"
-        },
-        "html_url": "https:\/\/github.com\/koudaiii-archives\/cookbook-update-glibc",
-        "description": "cookbook for update glibc. CVE-2015-0235(GHOST)",
-        "fork": false,
-        "created_at": "2015-01-29T07:14:17Z",
-        "updated_at": "2023-01-28T20:14:16Z",
-        "pushed_at": "2015-01-29T07:38:40Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
-        "has_discussions": false,
-        "forks_count": 0,
-        "allow_forking": true,
-        "is_template": false,
-        "web_commit_signoff_required": false,
-        "topics": [],
-        "visibility": "public",
-        "forks": 0,
-        "watchers": 0,
-        "score": 0,
-        "subscribers_count": 1
-    },
     {
         "id": 30019912,
         "name": "ghostbusters15",
@@ -299,36 +179,6 @@
         "score": 0,
         "subscribers_count": 2
     },
-    {
-        "id": 30066365,
-        "name": "CVE-2015-0235",
-        "full_name": "tobyzxj\/CVE-2015-0235",
-        "owner": {
-            "login": "tobyzxj",
-            "id": 4661855,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4661855?v=4",
-            "html_url": "https:\/\/github.com\/tobyzxj"
-        },
-        "html_url": "https:\/\/github.com\/tobyzxj\/CVE-2015-0235",
-        "description": "glibc gethostbyname bug",
-        "fork": false,
-        "created_at": "2015-01-30T09:58:09Z",
-        "updated_at": "2020-10-17T20:24:46Z",
-        "pushed_at": "2015-01-30T10:02:28Z",
-        "stargazers_count": 1,
-        "watchers_count": 1,
-        "has_discussions": false,
-        "forks_count": 1,
-        "allow_forking": true,
-        "is_template": false,
-        "web_commit_signoff_required": false,
-        "topics": [],
-        "visibility": "public",
-        "forks": 1,
-        "watchers": 1,
-        "score": 0,
-        "subscribers_count": 2
-    },
     {
         "id": 30183649,
         "name": "CVE-2015-0235-workaround",
diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json
index f84fd1a001..da516dbe99 100644
--- a/2016/CVE-2016-5195.json
+++ b/2016/CVE-2016-5195.json
@@ -73,10 +73,10 @@
         "description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
         "fork": false,
         "created_at": "2016-10-21T11:19:21Z",
-        "updated_at": "2023-06-20T11:38:37Z",
+        "updated_at": "2023-06-27T20:02:18Z",
         "pushed_at": "2021-02-03T16:03:40Z",
-        "stargazers_count": 926,
-        "watchers_count": 926,
+        "stargazers_count": 927,
+        "watchers_count": 927,
         "has_discussions": false,
         "forks_count": 405,
         "allow_forking": true,
@@ -85,7 +85,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 405,
-        "watchers": 926,
+        "watchers": 927,
         "score": 0,
         "subscribers_count": 65
     },
diff --git a/2017/CVE-2017-7494.json b/2017/CVE-2017-7494.json
index aa77869a94..35656b177d 100644
--- a/2017/CVE-2017-7494.json
+++ b/2017/CVE-2017-7494.json
@@ -73,10 +73,10 @@
         "description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
         "fork": false,
         "created_at": "2017-05-26T00:58:25Z",
-        "updated_at": "2023-06-25T06:42:09Z",
+        "updated_at": "2023-06-27T19:13:02Z",
         "pushed_at": "2022-12-27T20:25:09Z",
-        "stargazers_count": 350,
-        "watchers_count": 350,
+        "stargazers_count": 351,
+        "watchers_count": 351,
         "has_discussions": false,
         "forks_count": 110,
         "allow_forking": true,
@@ -91,7 +91,7 @@
         ],
         "visibility": "public",
         "forks": 110,
-        "watchers": 350,
+        "watchers": 351,
         "score": 0,
         "subscribers_count": 10
     },
diff --git a/2017/CVE-2017-8570.json b/2017/CVE-2017-8570.json
index 1cf07989c1..fcda3a799a 100644
--- a/2017/CVE-2017-8570.json
+++ b/2017/CVE-2017-8570.json
@@ -43,10 +43,10 @@
         "description": "Proof of Concept exploit for CVE-2017-8570",
         "fork": false,
         "created_at": "2018-01-09T19:09:33Z",
-        "updated_at": "2023-02-21T15:05:18Z",
+        "updated_at": "2023-06-27T20:52:06Z",
         "pushed_at": "2018-01-09T19:23:43Z",
-        "stargazers_count": 181,
-        "watchers_count": 181,
+        "stargazers_count": 182,
+        "watchers_count": 182,
         "has_discussions": false,
         "forks_count": 103,
         "allow_forking": true,
@@ -55,7 +55,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 103,
-        "watchers": 181,
+        "watchers": 182,
         "score": 0,
         "subscribers_count": 9
     },
diff --git a/2018/CVE-2018-10933.json b/2018/CVE-2018-10933.json
index c6c8695265..7873f0b575 100644
--- a/2018/CVE-2018-10933.json
+++ b/2018/CVE-2018-10933.json
@@ -59,66 +59,6 @@
         "score": 0,
         "subscribers_count": 22
     },
-    {
-        "id": 153477523,
-        "name": "CVE-2018-10933",
-        "full_name": "hook-s3c\/CVE-2018-10933",
-        "owner": {
-            "login": "hook-s3c",
-            "id": 31825993,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31825993?v=4",
-            "html_url": "https:\/\/github.com\/hook-s3c"
-        },
-        "html_url": "https:\/\/github.com\/hook-s3c\/CVE-2018-10933",
-        "description": "CVE-2018-10933 sshlib user authentication attack - docker lab, test and exploit",
-        "fork": false,
-        "created_at": "2018-10-17T15:09:41Z",
-        "updated_at": "2021-12-05T20:25:44Z",
-        "pushed_at": "2018-10-17T15:09:42Z",
-        "stargazers_count": 1,
-        "watchers_count": 1,
-        "has_discussions": false,
-        "forks_count": 1,
-        "allow_forking": true,
-        "is_template": false,
-        "web_commit_signoff_required": false,
-        "topics": [],
-        "visibility": "public",
-        "forks": 1,
-        "watchers": 1,
-        "score": 0,
-        "subscribers_count": 1
-    },
-    {
-        "id": 153506738,
-        "name": "CVE-2018-10933",
-        "full_name": "kn6869610\/CVE-2018-10933",
-        "owner": {
-            "login": "kn6869610",
-            "id": 6917744,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6917744?v=4",
-            "html_url": "https:\/\/github.com\/kn6869610"
-        },
-        "html_url": "https:\/\/github.com\/kn6869610\/CVE-2018-10933",
-        "description": "Leveraging it is a simple matter of presenting the server with the  SSH2_MSG_USERAUTH_SUCCESS message, which shows that the login already occurred without a problem.  The server expects the message SSH2_MSG_USERAUTH_REQUEST to start the authentication procedure, but by skipping it an attacker can log in without showing any credentials.",
-        "fork": false,
-        "created_at": "2018-10-17T18:44:05Z",
-        "updated_at": "2021-12-05T20:25:52Z",
-        "pushed_at": "2018-10-17T18:45:30Z",
-        "stargazers_count": 14,
-        "watchers_count": 14,
-        "has_discussions": false,
-        "forks_count": 3,
-        "allow_forking": true,
-        "is_template": false,
-        "web_commit_signoff_required": false,
-        "topics": [],
-        "visibility": "public",
-        "forks": 3,
-        "watchers": 14,
-        "score": 0,
-        "subscribers_count": 2
-    },
     {
         "id": 153534574,
         "name": "libssh-scanner",
@@ -149,101 +89,6 @@
         "score": 0,
         "subscribers_count": 18
     },
-    {
-        "id": 153562229,
-        "name": "CVE-2018-10933_ssh",
-        "full_name": "likescam\/CVE-2018-10933_ssh",
-        "owner": {
-            "login": "likescam",
-            "id": 2469038,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
-            "html_url": "https:\/\/github.com\/likescam"
-        },
-        "html_url": "https:\/\/github.com\/likescam\/CVE-2018-10933_ssh",
-        "description": null,
-        "fork": false,
-        "created_at": "2018-10-18T04:10:25Z",
-        "updated_at": "2021-12-05T20:26:01Z",
-        "pushed_at": "2018-10-18T04:10:38Z",
-        "stargazers_count": 1,
-        "watchers_count": 1,
-        "has_discussions": false,
-        "forks_count": 1,
-        "allow_forking": true,
-        "is_template": false,
-        "web_commit_signoff_required": false,
-        "topics": [],
-        "visibility": "public",
-        "forks": 1,
-        "watchers": 1,
-        "score": 0,
-        "subscribers_count": 1
-    },
-    {
-        "id": 153598283,
-        "name": "CVE-2018-10933-libSSH-Authentication-Bypass",
-        "full_name": "likescam\/CVE-2018-10933-libSSH-Authentication-Bypass",
-        "owner": {
-            "login": "likescam",
-            "id": 2469038,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
-            "html_url": "https:\/\/github.com\/likescam"
-        },
-        "html_url": "https:\/\/github.com\/likescam\/CVE-2018-10933-libSSH-Authentication-Bypass",
-        "description": null,
-        "fork": false,
-        "created_at": "2018-10-18T09:27:08Z",
-        "updated_at": "2021-12-05T20:26:14Z",
-        "pushed_at": "2018-10-18T09:27:22Z",
-        "stargazers_count": 2,
-        "watchers_count": 2,
-        "has_discussions": false,
-        "forks_count": 1,
-        "allow_forking": true,
-        "is_template": false,
-        "web_commit_signoff_required": false,
-        "topics": [],
-        "visibility": "public",
-        "forks": 1,
-        "watchers": 2,
-        "score": 0,
-        "subscribers_count": 1
-    },
-    {
-        "id": 153643745,
-        "name": "hunt-for-cve-2018-10933",
-        "full_name": "marco-lancini\/hunt-for-cve-2018-10933",
-        "owner": {
-            "login": "marco-lancini",
-            "id": 1472968,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1472968?v=4",
-            "html_url": "https:\/\/github.com\/marco-lancini"
-        },
-        "html_url": "https:\/\/github.com\/marco-lancini\/hunt-for-cve-2018-10933",
-        "description": "Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)",
-        "fork": false,
-        "created_at": "2018-10-18T15:08:25Z",
-        "updated_at": "2023-06-20T11:06:21Z",
-        "pushed_at": "2018-10-18T15:11:35Z",
-        "stargazers_count": 13,
-        "watchers_count": 13,
-        "has_discussions": false,
-        "forks_count": 4,
-        "allow_forking": true,
-        "is_template": false,
-        "web_commit_signoff_required": false,
-        "topics": [
-            "elasticsearch",
-            "exploit",
-            "nmap",
-            "pentesting"
-        ],
-        "visibility": "public",
-        "forks": 4,
-        "watchers": 13,
-        "score": 0,
-        "subscribers_count": 2
-    },
     {
         "id": 153675108,
         "name": "cve-2018-10933",
@@ -304,100 +149,6 @@
         "score": 0,
         "subscribers_count": 1
     },
-    {
-        "id": 153855090,
-        "name": "CVE-2018-10933",
-        "full_name": "jas502n\/CVE-2018-10933",
-        "owner": {
-            "login": "jas502n",
-            "id": 16593068,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
-            "html_url": "https:\/\/github.com\/jas502n"
-        },
-        "html_url": "https:\/\/github.com\/jas502n\/CVE-2018-10933",
-        "description": "libssh CVE-2018-10933",
-        "fork": false,
-        "created_at": "2018-10-20T00:24:04Z",
-        "updated_at": "2023-05-23T04:45:13Z",
-        "pushed_at": "2018-10-20T00:29:04Z",
-        "stargazers_count": 20,
-        "watchers_count": 20,
-        "has_discussions": false,
-        "forks_count": 6,
-        "allow_forking": true,
-        "is_template": false,
-        "web_commit_signoff_required": false,
-        "topics": [],
-        "visibility": "public",
-        "forks": 6,
-        "watchers": 20,
-        "score": 0,
-        "subscribers_count": 2
-    },
-    {
-        "id": 153856713,
-        "name": "cve-2018-10933_poc",
-        "full_name": "ninp0\/cve-2018-10933_poc",
-        "owner": {
-            "login": "ninp0",
-            "id": 1008583,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1008583?v=4",
-            "html_url": "https:\/\/github.com\/ninp0"
-        },
-        "html_url": "https:\/\/github.com\/ninp0\/cve-2018-10933_poc",
-        "description": "Variant of hackerhouse-opensource\/cve-2018-10933",
-        "fork": false,
-        "created_at": "2018-10-20T00:53:24Z",
-        "updated_at": "2018-10-22T15:05:53Z",
-        "pushed_at": "2018-10-20T01:53:50Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
-        "has_discussions": false,
-        "forks_count": 0,
-        "allow_forking": true,
-        "is_template": false,
-        "web_commit_signoff_required": false,
-        "topics": [
-            "cve-2018-10933",
-            "exploit",
-            "poc"
-        ],
-        "visibility": "public",
-        "forks": 0,
-        "watchers": 0,
-        "score": 0,
-        "subscribers_count": 2
-    },
-    {
-        "id": 153878160,
-        "name": "CVE-2018-10933_Scanner",
-        "full_name": "pghook\/CVE-2018-10933_Scanner",
-        "owner": {
-            "login": "pghook",
-            "id": 14160529,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14160529?v=4",
-            "html_url": "https:\/\/github.com\/pghook"
-        },
-        "html_url": "https:\/\/github.com\/pghook\/CVE-2018-10933_Scanner",
-        "description": null,
-        "fork": false,
-        "created_at": "2018-10-20T06:53:59Z",
-        "updated_at": "2020-05-15T17:20:56Z",
-        "pushed_at": "2018-10-20T04:54:52Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
-        "has_discussions": false,
-        "forks_count": 3,
-        "allow_forking": true,
-        "is_template": false,
-        "web_commit_signoff_required": false,
-        "topics": [],
-        "visibility": "public",
-        "forks": 3,
-        "watchers": 0,
-        "score": 0,
-        "subscribers_count": 1
-    },
     {
         "id": 153920395,
         "name": "POC-CVE-2018-10933",
@@ -428,36 +179,6 @@
         "score": 0,
         "subscribers_count": 3
     },
-    {
-        "id": 153975086,
-        "name": "pythonprojects-CVE-2018-10933",
-        "full_name": "shifa123\/pythonprojects-CVE-2018-10933",
-        "owner": {
-            "login": "shifa123",
-            "id": 18241082,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18241082?v=4",
-            "html_url": "https:\/\/github.com\/shifa123"
-        },
-        "html_url": "https:\/\/github.com\/shifa123\/pythonprojects-CVE-2018-10933",
-        "description": "CVE-2018-10933",
-        "fork": false,
-        "created_at": "2018-10-21T05:01:12Z",
-        "updated_at": "2022-01-03T19:20:42Z",
-        "pushed_at": "2018-10-21T05:13:13Z",
-        "stargazers_count": 3,
-        "watchers_count": 3,
-        "has_discussions": false,
-        "forks_count": 5,
-        "allow_forking": true,
-        "is_template": false,
-        "web_commit_signoff_required": false,
-        "topics": [],
-        "visibility": "public",
-        "forks": 5,
-        "watchers": 3,
-        "score": 0,
-        "subscribers_count": 2
-    },
     {
         "id": 154050332,
         "name": "CVE-2018-10933",
diff --git a/2018/CVE-2018-12018.json b/2018/CVE-2018-12018.json
deleted file mode 100644
index cc5ea93523..0000000000
--- a/2018/CVE-2018-12018.json
+++ /dev/null
@@ -1,38 +0,0 @@
-[
-    {
-        "id": 153770795,
-        "name": "CVE-2018-12018",
-        "full_name": "k3v142\/CVE-2018-12018",
-        "owner": {
-            "login": "k3v142",
-            "id": 12337759,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12337759?v=4",
-            "html_url": "https:\/\/github.com\/k3v142"
-        },
-        "html_url": "https:\/\/github.com\/k3v142\/CVE-2018-12018",
-        "description": "EPoD (Ethereum Packet of Death)",
-        "fork": false,
-        "created_at": "2018-10-19T11:11:01Z",
-        "updated_at": "2023-01-28T19:03:04Z",
-        "pushed_at": "2018-10-20T21:07:42Z",
-        "stargazers_count": 6,
-        "watchers_count": 6,
-        "has_discussions": false,
-        "forks_count": 1,
-        "allow_forking": true,
-        "is_template": false,
-        "web_commit_signoff_required": false,
-        "topics": [
-            "ethereum",
-            "ethereum-node",
-            "exploit",
-            "python",
-            "vulnerability"
-        ],
-        "visibility": "public",
-        "forks": 1,
-        "watchers": 6,
-        "score": 0,
-        "subscribers_count": 3
-    }
-]
\ No newline at end of file
diff --git a/2018/CVE-2018-14847.json b/2018/CVE-2018-14847.json
index 4ff3a9ad59..63daa9f337 100644
--- a/2018/CVE-2018-14847.json
+++ b/2018/CVE-2018-14847.json
@@ -59,36 +59,6 @@
         "score": 0,
         "subscribers_count": 1
     },
-    {
-        "id": 152906288,
-        "name": "MikroRoot",
-        "full_name": "syrex1013\/MikroRoot",
-        "owner": {
-            "login": "syrex1013",
-            "id": 31669127,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31669127?v=4",
-            "html_url": "https:\/\/github.com\/syrex1013"
-        },
-        "html_url": "https:\/\/github.com\/syrex1013\/MikroRoot",
-        "description": "Automated version of CVE-2018-14847 (MikroTik Exploit)",
-        "fork": false,
-        "created_at": "2018-10-13T19:17:42Z",
-        "updated_at": "2021-12-06T20:08:10Z",
-        "pushed_at": "2018-10-14T08:39:24Z",
-        "stargazers_count": 15,
-        "watchers_count": 15,
-        "has_discussions": false,
-        "forks_count": 2,
-        "allow_forking": true,
-        "is_template": false,
-        "web_commit_signoff_required": false,
-        "topics": [],
-        "visibility": "public",
-        "forks": 2,
-        "watchers": 15,
-        "score": 0,
-        "subscribers_count": 3
-    },
     {
         "id": 161894724,
         "name": "CVE-2018-14847",
diff --git a/2018/CVE-2018-17431.json b/2018/CVE-2018-17431.json
index 76545a03fb..fe20dfd64a 100644
--- a/2018/CVE-2018-17431.json
+++ b/2018/CVE-2018-17431.json
@@ -18,7 +18,7 @@
         "stargazers_count": 2,
         "watchers_count": 2,
         "has_discussions": false,
-        "forks_count": 2,
+        "forks_count": 3,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
@@ -33,7 +33,7 @@
             "remote-code-execution"
         ],
         "visibility": "public",
-        "forks": 2,
+        "forks": 3,
         "watchers": 2,
         "score": 0,
         "subscribers_count": 0
diff --git a/2018/CVE-2018-2893.json b/2018/CVE-2018-2893.json
index 23f63e22fa..f7e9b903bd 100644
--- a/2018/CVE-2018-2893.json
+++ b/2018/CVE-2018-2893.json
@@ -149,36 +149,6 @@
         "score": 0,
         "subscribers_count": 0
     },
-    {
-        "id": 151921677,
-        "name": "CVE-2018-2893",
-        "full_name": "jas502n\/CVE-2018-2893",
-        "owner": {
-            "login": "jas502n",
-            "id": 16593068,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
-            "html_url": "https:\/\/github.com\/jas502n"
-        },
-        "html_url": "https:\/\/github.com\/jas502n\/CVE-2018-2893",
-        "description": "CVE-2018-2893",
-        "fork": false,
-        "created_at": "2018-10-07T08:41:14Z",
-        "updated_at": "2023-06-02T07:03:04Z",
-        "pushed_at": "2018-10-07T09:53:54Z",
-        "stargazers_count": 11,
-        "watchers_count": 11,
-        "has_discussions": false,
-        "forks_count": 9,
-        "allow_forking": true,
-        "is_template": false,
-        "web_commit_signoff_required": false,
-        "topics": [],
-        "visibility": "public",
-        "forks": 9,
-        "watchers": 11,
-        "score": 0,
-        "subscribers_count": 1
-    },
     {
         "id": 219763712,
         "name": "CVE-2018-2893",
diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json
index 749db9b634..63f2307b5a 100644
--- a/2019/CVE-2019-0708.json
+++ b/2019/CVE-2019-0708.json
@@ -1597,7 +1597,7 @@
         "forks": 22,
         "watchers": 3,
         "score": 0,
-        "subscribers_count": 0
+        "subscribers_count": 1
     },
     {
         "id": 188287755,
@@ -2082,7 +2082,7 @@
         "forks": 15,
         "watchers": 41,
         "score": 0,
-        "subscribers_count": 4
+        "subscribers_count": 5
     },
     {
         "id": 189959275,
@@ -2478,7 +2478,7 @@
         "forks": 97,
         "watchers": 293,
         "score": 0,
-        "subscribers_count": 20
+        "subscribers_count": 21
     },
     {
         "id": 198731225,
diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json
index 919fcb3684..a451bd6046 100644
--- a/2019/CVE-2019-11043.json
+++ b/2019/CVE-2019-11043.json
@@ -267,7 +267,7 @@
         "forks": 45,
         "watchers": 144,
         "score": 0,
-        "subscribers_count": 8
+        "subscribers_count": 9
     },
     {
         "id": 218080163,
diff --git a/2019/CVE-2019-11932.json b/2019/CVE-2019-11932.json
index e1d20bec4a..c9f4922818 100644
--- a/2019/CVE-2019-11932.json
+++ b/2019/CVE-2019-11932.json
@@ -493,7 +493,7 @@
         "forks": 4,
         "watchers": 14,
         "score": 0,
-        "subscribers_count": 1
+        "subscribers_count": 2
     },
     {
         "id": 382906478,
diff --git a/2019/CVE-2019-12453.json b/2019/CVE-2019-12453.json
index cf6cfb6683..742d80db03 100644
--- a/2019/CVE-2019-12453.json
+++ b/2019/CVE-2019-12453.json
@@ -27,6 +27,6 @@
         "forks": 1,
         "watchers": 1,
         "score": 0,
-        "subscribers_count": 0
+        "subscribers_count": 1
     }
 ]
\ No newline at end of file
diff --git a/2019/CVE-2019-12475.json b/2019/CVE-2019-12475.json
index 6a8a1dc9af..ea14cbbf8c 100644
--- a/2019/CVE-2019-12475.json
+++ b/2019/CVE-2019-12475.json
@@ -27,6 +27,6 @@
         "forks": 1,
         "watchers": 1,
         "score": 0,
-        "subscribers_count": 0
+        "subscribers_count": 1
     }
 ]
\ No newline at end of file
diff --git a/2019/CVE-2019-15126.json b/2019/CVE-2019-15126.json
index 1213f76063..db7b0b41a5 100644
--- a/2019/CVE-2019-15126.json
+++ b/2019/CVE-2019-15126.json
@@ -57,7 +57,7 @@
         "forks": 63,
         "watchers": 210,
         "score": 0,
-        "subscribers_count": 15
+        "subscribers_count": 16
     },
     {
         "id": 248283931,
diff --git a/2019/CVE-2019-18935.json b/2019/CVE-2019-18935.json
index c44c34e117..83d28a53e8 100644
--- a/2019/CVE-2019-18935.json
+++ b/2019/CVE-2019-18935.json
@@ -43,10 +43,10 @@
         "description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
         "fork": false,
         "created_at": "2019-12-12T07:58:11Z",
-        "updated_at": "2023-06-20T23:45:09Z",
+        "updated_at": "2023-06-27T21:29:33Z",
         "pushed_at": "2022-04-14T18:23:38Z",
-        "stargazers_count": 299,
-        "watchers_count": 299,
+        "stargazers_count": 301,
+        "watchers_count": 301,
         "has_discussions": false,
         "forks_count": 84,
         "allow_forking": true,
@@ -55,7 +55,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 84,
-        "watchers": 299,
+        "watchers": 301,
         "score": 0,
         "subscribers_count": 12
     },
diff --git a/2019/CVE-2019-3403.json b/2019/CVE-2019-3403.json
index f9633cb93d..e3daabc31b 100644
--- a/2019/CVE-2019-3403.json
+++ b/2019/CVE-2019-3403.json
@@ -27,7 +27,7 @@
         "forks": 1,
         "watchers": 1,
         "score": 0,
-        "subscribers_count": 1
+        "subscribers_count": 2
     },
     {
         "id": 349235683,
diff --git a/2019/CVE-2019-5624.json b/2019/CVE-2019-5624.json
index 8460a59034..fc89dc45de 100644
--- a/2019/CVE-2019-5624.json
+++ b/2019/CVE-2019-5624.json
@@ -35,6 +35,6 @@
         "forks": 7,
         "watchers": 14,
         "score": 0,
-        "subscribers_count": 3
+        "subscribers_count": 4
     }
 ]
\ No newline at end of file
diff --git a/2019/CVE-2019-5700.json b/2019/CVE-2019-5700.json
index 3adb4933ec..ff8666a848 100644
--- a/2019/CVE-2019-5700.json
+++ b/2019/CVE-2019-5700.json
@@ -27,6 +27,6 @@
         "forks": 0,
         "watchers": 11,
         "score": 0,
-        "subscribers_count": 5
+        "subscribers_count": 6
     }
 ]
\ No newline at end of file
diff --git a/2019/CVE-2019-6447.json b/2019/CVE-2019-6447.json
index b94a98b0c4..bbde507557 100644
--- a/2019/CVE-2019-6447.json
+++ b/2019/CVE-2019-6447.json
@@ -32,7 +32,7 @@
         "forks": 136,
         "watchers": 665,
         "score": 0,
-        "subscribers_count": 42
+        "subscribers_count": 43
     },
     {
         "id": 263921419,
diff --git a/2020/CVE-2020-0069.json b/2020/CVE-2020-0069.json
index 9561ac8164..fe5cb92789 100644
--- a/2020/CVE-2020-0069.json
+++ b/2020/CVE-2020-0069.json
@@ -13,10 +13,10 @@
         "description": "Root your MediaTek device with CVE-2020-0069",
         "fork": false,
         "created_at": "2019-09-06T12:12:48Z",
-        "updated_at": "2023-06-26T20:40:00Z",
+        "updated_at": "2023-06-27T20:02:22Z",
         "pushed_at": "2023-02-06T19:18:56Z",
-        "stargazers_count": 114,
-        "watchers_count": 114,
+        "stargazers_count": 115,
+        "watchers_count": 115,
         "has_discussions": false,
         "forks_count": 22,
         "allow_forking": true,
@@ -30,7 +30,7 @@
         ],
         "visibility": "public",
         "forks": 22,
-        "watchers": 114,
+        "watchers": 115,
         "score": 0,
         "subscribers_count": 9
     },
diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json
index de860b9973..4df64dd16a 100644
--- a/2020/CVE-2020-0796.json
+++ b/2020/CVE-2020-0796.json
@@ -1096,10 +1096,10 @@
         "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
         "fork": false,
         "created_at": "2020-03-30T11:42:56Z",
-        "updated_at": "2023-06-27T02:17:44Z",
+        "updated_at": "2023-06-27T19:32:09Z",
         "pushed_at": "2020-12-07T20:04:27Z",
-        "stargazers_count": 1262,
-        "watchers_count": 1262,
+        "stargazers_count": 1263,
+        "watchers_count": 1263,
         "has_discussions": false,
         "forks_count": 368,
         "allow_forking": true,
@@ -1114,7 +1114,7 @@
         ],
         "visibility": "public",
         "forks": 368,
-        "watchers": 1262,
+        "watchers": 1263,
         "score": 0,
         "subscribers_count": 34
     },
@@ -1398,7 +1398,7 @@
         "forks": 6,
         "watchers": 7,
         "score": 0,
-        "subscribers_count": 1
+        "subscribers_count": 2
     },
     {
         "id": 255573167,
diff --git a/2020/CVE-2020-1015.json b/2020/CVE-2020-1015.json
index f18f947664..5bc8e46f0a 100644
--- a/2020/CVE-2020-1015.json
+++ b/2020/CVE-2020-1015.json
@@ -27,6 +27,6 @@
         "forks": 10,
         "watchers": 40,
         "score": 0,
-        "subscribers_count": 2
+        "subscribers_count": 3
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-1054.json b/2020/CVE-2020-1054.json
index f4ed3eb829..a65d26936e 100644
--- a/2020/CVE-2020-1054.json
+++ b/2020/CVE-2020-1054.json
@@ -27,7 +27,7 @@
         "forks": 32,
         "watchers": 87,
         "score": 0,
-        "subscribers_count": 7
+        "subscribers_count": 8
     },
     {
         "id": 280822745,
diff --git a/2020/CVE-2020-1337.json b/2020/CVE-2020-1337.json
index 1ee3b51808..1909535581 100644
--- a/2020/CVE-2020-1337.json
+++ b/2020/CVE-2020-1337.json
@@ -67,7 +67,7 @@
         "forks": 2,
         "watchers": 13,
         "score": 0,
-        "subscribers_count": 2
+        "subscribers_count": 3
     },
     {
         "id": 286767343,
diff --git a/2020/CVE-2020-13935.json b/2020/CVE-2020-13935.json
index 62e9eaa2fb..eb69f128f5 100644
--- a/2020/CVE-2020-13935.json
+++ b/2020/CVE-2020-13935.json
@@ -27,7 +27,7 @@
         "forks": 43,
         "watchers": 159,
         "score": 0,
-        "subscribers_count": 2
+        "subscribers_count": 3
     },
     {
         "id": 499143889,
diff --git a/2020/CVE-2020-14181.json b/2020/CVE-2020-14181.json
index a8a890dee9..81e5ea6aa3 100644
--- a/2020/CVE-2020-14181.json
+++ b/2020/CVE-2020-14181.json
@@ -27,7 +27,7 @@
         "forks": 1,
         "watchers": 1,
         "score": 0,
-        "subscribers_count": 1
+        "subscribers_count": 2
     },
     {
         "id": 307446561,
diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json
index e3563ca950..ea06af7b8e 100644
--- a/2020/CVE-2020-1472.json
+++ b/2020/CVE-2020-1472.json
@@ -57,7 +57,7 @@
         "forks": 359,
         "watchers": 1592,
         "score": 0,
-        "subscribers_count": 89
+        "subscribers_count": 90
     },
     {
         "id": 295480770,
@@ -154,7 +154,7 @@
         "forks": 65,
         "watchers": 348,
         "score": 0,
-        "subscribers_count": 8
+        "subscribers_count": 9
     },
     {
         "id": 295515909,
diff --git a/2020/CVE-2020-16898.json b/2020/CVE-2020-16898.json
index 68987b1807..bcd895e3d7 100644
--- a/2020/CVE-2020-16898.json
+++ b/2020/CVE-2020-16898.json
@@ -256,7 +256,7 @@
         "forks": 5,
         "watchers": 21,
         "score": 0,
-        "subscribers_count": 2
+        "subscribers_count": 3
     },
     {
         "id": 304797048,
diff --git a/2020/CVE-2020-2038.json b/2020/CVE-2020-2038.json
index 8835b84b27..551b4262a3 100644
--- a/2020/CVE-2020-2038.json
+++ b/2020/CVE-2020-2038.json
@@ -27,6 +27,6 @@
         "forks": 0,
         "watchers": 2,
         "score": 0,
-        "subscribers_count": 1
+        "subscribers_count": 2
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-28054.json b/2020/CVE-2020-28054.json
index 42f8bd5c17..9ac4df5a66 100644
--- a/2020/CVE-2020-28054.json
+++ b/2020/CVE-2020-28054.json
@@ -35,6 +35,6 @@
         "forks": 1,
         "watchers": 6,
         "score": 0,
-        "subscribers_count": 2
+        "subscribers_count": 3
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-28243.json b/2020/CVE-2020-28243.json
index 50bde19b11..33195b21c6 100644
--- a/2020/CVE-2020-28243.json
+++ b/2020/CVE-2020-28243.json
@@ -33,6 +33,6 @@
         "forks": 4,
         "watchers": 17,
         "score": 0,
-        "subscribers_count": 2
+        "subscribers_count": 3
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-5267.json b/2020/CVE-2020-5267.json
index 753f6c68e7..87eb2d64c2 100644
--- a/2020/CVE-2020-5267.json
+++ b/2020/CVE-2020-5267.json
@@ -27,6 +27,6 @@
         "forks": 1,
         "watchers": 2,
         "score": 0,
-        "subscribers_count": 2
+        "subscribers_count": 3
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-5377.json b/2020/CVE-2020-5377.json
index 044366ce49..30a7a4e3a1 100644
--- a/2020/CVE-2020-5377.json
+++ b/2020/CVE-2020-5377.json
@@ -27,6 +27,6 @@
         "forks": 0,
         "watchers": 1,
         "score": 0,
-        "subscribers_count": 2
+        "subscribers_count": 3
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-6287.json b/2020/CVE-2020-6287.json
index a1935b357f..4424d344a5 100644
--- a/2020/CVE-2020-6287.json
+++ b/2020/CVE-2020-6287.json
@@ -57,7 +57,7 @@
         "forks": 27,
         "watchers": 95,
         "score": 0,
-        "subscribers_count": 3
+        "subscribers_count": 4
     },
     {
         "id": 281263657,
diff --git a/2020/CVE-2020-7931.json b/2020/CVE-2020-7931.json
index b0a7b0095c..aed51ebbdb 100644
--- a/2020/CVE-2020-7931.json
+++ b/2020/CVE-2020-7931.json
@@ -13,10 +13,10 @@
         "description": "Hacking Artifactory with server side template injection",
         "fork": false,
         "created_at": "2020-03-11T13:56:43Z",
-        "updated_at": "2023-04-13T16:01:26Z",
+        "updated_at": "2023-06-27T20:42:31Z",
         "pushed_at": "2020-03-12T06:55:39Z",
-        "stargazers_count": 49,
-        "watchers_count": 49,
+        "stargazers_count": 50,
+        "watchers_count": 50,
         "has_discussions": false,
         "forks_count": 15,
         "allow_forking": true,
@@ -32,7 +32,7 @@
         ],
         "visibility": "public",
         "forks": 15,
-        "watchers": 49,
+        "watchers": 50,
         "score": 0,
         "subscribers_count": 4
     }
diff --git a/2020/CVE-2020-9548.json b/2020/CVE-2020-9548.json
index 6959baaee7..30f873af8e 100644
--- a/2020/CVE-2020-9548.json
+++ b/2020/CVE-2020-9548.json
@@ -27,6 +27,6 @@
         "forks": 12,
         "watchers": 24,
         "score": 0,
-        "subscribers_count": 1
+        "subscribers_count": 2
     }
 ]
\ No newline at end of file
diff --git a/2021/CVE-2021-32537.json b/2021/CVE-2021-32537.json
index 87c9588e61..bf3c4ddafe 100644
--- a/2021/CVE-2021-32537.json
+++ b/2021/CVE-2021-32537.json
@@ -13,10 +13,10 @@
         "description": "PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.",
         "fork": false,
         "created_at": "2021-06-09T15:44:00Z",
-        "updated_at": "2023-06-08T12:37:33Z",
+        "updated_at": "2023-06-27T19:12:24Z",
         "pushed_at": "2021-06-26T18:31:23Z",
-        "stargazers_count": 57,
-        "watchers_count": 57,
+        "stargazers_count": 58,
+        "watchers_count": 58,
         "has_discussions": false,
         "forks_count": 13,
         "allow_forking": true,
@@ -31,7 +31,7 @@
         ],
         "visibility": "public",
         "forks": 13,
-        "watchers": 57,
+        "watchers": 58,
         "score": 0,
         "subscribers_count": 6
     }
diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json
index bb62e55510..d20b9a8b27 100644
--- a/2021/CVE-2021-34527.json
+++ b/2021/CVE-2021-34527.json
@@ -114,7 +114,7 @@
         "stargazers_count": 88,
         "watchers_count": 88,
         "has_discussions": false,
-        "forks_count": 32,
+        "forks_count": 33,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
@@ -127,7 +127,7 @@
             "windowsexploits"
         ],
         "visibility": "public",
-        "forks": 32,
+        "forks": 33,
         "watchers": 88,
         "score": 0,
         "subscribers_count": 8
diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json
index f555a1d9f9..e0b60c2da5 100644
--- a/2021/CVE-2021-4034.json
+++ b/2021/CVE-2021-4034.json
@@ -4726,5 +4726,35 @@
         "watchers": 0,
         "score": 0,
         "subscribers_count": 2
+    },
+    {
+        "id": 659471096,
+        "name": "lab_cve-2021-4034-polkit-emulation-and-detection",
+        "full_name": "ps-interactive\/lab_cve-2021-4034-polkit-emulation-and-detection",
+        "owner": {
+            "login": "ps-interactive",
+            "id": 35313392,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35313392?v=4",
+            "html_url": "https:\/\/github.com\/ps-interactive"
+        },
+        "html_url": "https:\/\/github.com\/ps-interactive\/lab_cve-2021-4034-polkit-emulation-and-detection",
+        "description": null,
+        "fork": false,
+        "created_at": "2023-06-27T23:06:02Z",
+        "updated_at": "2023-06-27T23:15:26Z",
+        "pushed_at": "2023-06-27T23:21:52Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "has_discussions": false,
+        "forks_count": 0,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 0,
+        "watchers": 0,
+        "score": 0,
+        "subscribers_count": 0
     }
 ]
\ No newline at end of file
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
index d2e6621348..4b54f7eba3 100644
--- a/2021/CVE-2021-44228.json
+++ b/2021/CVE-2021-44228.json
@@ -1268,10 +1268,10 @@
         "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
         "fork": false,
         "created_at": "2021-12-11T07:19:11Z",
-        "updated_at": "2023-06-27T03:46:09Z",
+        "updated_at": "2023-06-27T21:26:15Z",
         "pushed_at": "2023-06-13T09:17:54Z",
-        "stargazers_count": 691,
-        "watchers_count": 691,
+        "stargazers_count": 692,
+        "watchers_count": 692,
         "has_discussions": false,
         "forks_count": 114,
         "allow_forking": true,
@@ -1285,7 +1285,7 @@
         ],
         "visibility": "public",
         "forks": 114,
-        "watchers": 691,
+        "watchers": 692,
         "score": 0,
         "subscribers_count": 10
     },
diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json
index 57bcf3c7bf..659b5a62d1 100644
--- a/2022/CVE-2022-0847.json
+++ b/2022/CVE-2022-0847.json
@@ -1215,10 +1215,10 @@
         "description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
         "fork": false,
         "created_at": "2022-03-12T20:57:24Z",
-        "updated_at": "2023-06-27T02:11:14Z",
+        "updated_at": "2023-06-27T21:20:13Z",
         "pushed_at": "2023-05-20T05:55:45Z",
-        "stargazers_count": 419,
-        "watchers_count": 419,
+        "stargazers_count": 420,
+        "watchers_count": 420,
         "has_discussions": false,
         "forks_count": 123,
         "allow_forking": true,
@@ -1227,7 +1227,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 123,
-        "watchers": 419,
+        "watchers": 420,
         "score": 0,
         "subscribers_count": 15
     },
diff --git a/2022/CVE-2022-20421.json b/2022/CVE-2022-20421.json
index 6095bd5c9b..0b4a434798 100644
--- a/2022/CVE-2022-20421.json
+++ b/2022/CVE-2022-20421.json
@@ -13,10 +13,10 @@
         "description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
         "fork": false,
         "created_at": "2023-03-23T10:25:59Z",
-        "updated_at": "2023-06-24T19:27:47Z",
+        "updated_at": "2023-06-27T21:58:35Z",
         "pushed_at": "2023-05-27T15:39:41Z",
-        "stargazers_count": 152,
-        "watchers_count": 152,
+        "stargazers_count": 153,
+        "watchers_count": 153,
         "has_discussions": false,
         "forks_count": 22,
         "allow_forking": true,
@@ -25,7 +25,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 22,
-        "watchers": 152,
+        "watchers": 153,
         "score": 0,
         "subscribers_count": 4
     }
diff --git a/2022/CVE-2022-3602.json b/2022/CVE-2022-3602.json
index 747a23cbc0..4833a45025 100644
--- a/2022/CVE-2022-3602.json
+++ b/2022/CVE-2022-3602.json
@@ -13,10 +13,10 @@
         "description": "Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3",
         "fork": false,
         "created_at": "2022-10-28T09:51:41Z",
-        "updated_at": "2023-06-23T14:21:49Z",
+        "updated_at": "2023-06-27T23:24:09Z",
         "pushed_at": "2022-11-18T15:47:17Z",
-        "stargazers_count": 534,
-        "watchers_count": 534,
+        "stargazers_count": 533,
+        "watchers_count": 533,
         "has_discussions": false,
         "forks_count": 112,
         "allow_forking": true,
@@ -30,7 +30,7 @@
         ],
         "visibility": "public",
         "forks": 112,
-        "watchers": 534,
+        "watchers": 533,
         "score": 0,
         "subscribers_count": 49
     },
diff --git a/2022/CVE-2022-42889.json b/2022/CVE-2022-42889.json
index 3c597f0f44..c8312fe1dd 100644
--- a/2022/CVE-2022-42889.json
+++ b/2022/CVE-2022-42889.json
@@ -1333,10 +1333,10 @@
         "description": "This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the CVE id: CVE-2022-42889.  ",
         "fork": false,
         "created_at": "2023-06-27T08:29:24Z",
-        "updated_at": "2023-06-27T09:01:59Z",
+        "updated_at": "2023-06-27T20:49:18Z",
         "pushed_at": "2023-06-27T09:01:14Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
+        "stargazers_count": 1,
+        "watchers_count": 1,
         "has_discussions": false,
         "forks_count": 1,
         "allow_forking": true,
@@ -1345,7 +1345,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 1,
-        "watchers": 0,
+        "watchers": 1,
         "score": 0,
         "subscribers_count": 0
     }
diff --git a/2022/CVE-2022-44268.json b/2022/CVE-2022-44268.json
index 092bb3e572..f4cd344ce8 100644
--- a/2022/CVE-2022-44268.json
+++ b/2022/CVE-2022-44268.json
@@ -226,10 +226,10 @@
         "description": "ImageMagick LFI PoC [CVE-2022-44268]",
         "fork": false,
         "created_at": "2023-02-06T10:44:43Z",
-        "updated_at": "2023-06-26T18:05:55Z",
+        "updated_at": "2023-06-27T23:04:53Z",
         "pushed_at": "2023-02-06T10:48:56Z",
-        "stargazers_count": 24,
-        "watchers_count": 24,
+        "stargazers_count": 25,
+        "watchers_count": 25,
         "has_discussions": false,
         "forks_count": 4,
         "allow_forking": true,
@@ -242,7 +242,7 @@
         ],
         "visibility": "public",
         "forks": 4,
-        "watchers": 24,
+        "watchers": 25,
         "score": 0,
         "subscribers_count": 0
     },
diff --git a/2023/CVE-2023-27997.json b/2023/CVE-2023-27997.json
index af919c88af..16e88c3782 100644
--- a/2023/CVE-2023-27997.json
+++ b/2023/CVE-2023-27997.json
@@ -103,10 +103,10 @@
         "description": "Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing",
         "fork": false,
         "created_at": "2023-06-16T20:15:36Z",
-        "updated_at": "2023-06-27T12:36:24Z",
+        "updated_at": "2023-06-27T20:00:59Z",
         "pushed_at": "2023-06-20T21:32:56Z",
-        "stargazers_count": 31,
-        "watchers_count": 31,
+        "stargazers_count": 34,
+        "watchers_count": 34,
         "has_discussions": false,
         "forks_count": 5,
         "allow_forking": true,
@@ -115,7 +115,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 5,
-        "watchers": 31,
+        "watchers": 34,
         "score": 0,
         "subscribers_count": 1
     },
diff --git a/2023/CVE-2023-32243.json b/2023/CVE-2023-32243.json
index 8f0525f46d..e36f9b9801 100644
--- a/2023/CVE-2023-32243.json
+++ b/2023/CVE-2023-32243.json
@@ -73,10 +73,10 @@
         "description": "CVE-2023-32243",
         "fork": false,
         "created_at": "2023-05-15T09:39:45Z",
-        "updated_at": "2023-06-26T07:09:48Z",
+        "updated_at": "2023-06-27T22:55:35Z",
         "pushed_at": "2023-06-05T08:13:19Z",
-        "stargazers_count": 55,
-        "watchers_count": 55,
+        "stargazers_count": 56,
+        "watchers_count": 56,
         "has_discussions": false,
         "forks_count": 23,
         "allow_forking": true,
@@ -89,7 +89,7 @@
         ],
         "visibility": "public",
         "forks": 23,
-        "watchers": 55,
+        "watchers": 56,
         "score": 0,
         "subscribers_count": 3
     },
diff --git a/2023/CVE-2023-34362.json b/2023/CVE-2023-34362.json
index fed5b34d2e..79f10a9b93 100644
--- a/2023/CVE-2023-34362.json
+++ b/2023/CVE-2023-34362.json
@@ -103,10 +103,10 @@
         "description": "CVE-2023-34362: MOVEit Transfer Unauthenticated RCE",
         "fork": false,
         "created_at": "2023-06-12T12:56:12Z",
-        "updated_at": "2023-06-23T10:46:57Z",
+        "updated_at": "2023-06-27T21:38:55Z",
         "pushed_at": "2023-06-13T08:46:03Z",
-        "stargazers_count": 54,
-        "watchers_count": 54,
+        "stargazers_count": 55,
+        "watchers_count": 55,
         "has_discussions": false,
         "forks_count": 20,
         "allow_forking": true,
@@ -115,7 +115,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 20,
-        "watchers": 54,
+        "watchers": 55,
         "score": 0,
         "subscribers_count": 3
     },
diff --git a/README.md b/README.md
index bd5082dda3..f70ed1d03f 100644
--- a/README.md
+++ b/README.md
@@ -1817,35 +1817,35 @@
 
 - [leekenghwa/CVE-2023-34830---Reflected-XSS-found-in-I-doit-Open-v24-and-below](https://github.com/leekenghwa/CVE-2023-34830---Reflected-XSS-found-in-I-doit-Open-v24-and-below)
 
-### CVE-2023-34835 (-)
+### CVE-2023-34835 (2023-06-27)
 
 <code>A Cross Site Scripting vulnerability in Microworld Technologies eScan Management console v.14.0.1400.2281 allows a remote attacker to execute arbitrary JavaScript code via a vulnerable delete_file parameter.
 </code>
 
 - [sahiloj/CVE-2023-34835](https://github.com/sahiloj/CVE-2023-34835)
 
-### CVE-2023-34836 (-)
+### CVE-2023-34836 (2023-06-27)
 
 <code>A Cross Site Scripting vulnerability in Microworld Technologies eScan Management console v.14.0.1400.2281 allows a remote attacker to execute arbitrary code via a crafted script to the Dtltyp and ListName parameters.
 </code>
 
 - [sahiloj/CVE-2023-34836](https://github.com/sahiloj/CVE-2023-34836)
 
-### CVE-2023-34837 (-)
+### CVE-2023-34837 (2023-06-27)
 
 <code>A Cross Site Scripting vulnerability in Microworld Technologies eScan Management console v.14.0.1400.2281 allows a remote attacker to execute arbitrary code via a vulnerable parameter GrpPath.
 </code>
 
 - [sahiloj/CVE-2023-34837](https://github.com/sahiloj/CVE-2023-34837)
 
-### CVE-2023-34838 (-)
+### CVE-2023-34838 (2023-06-27)
 
 <code>A Cross Site Scripting vulnerability in Microworld Technologies eScan Management console v.14.0.1400.2281 allows a remote attacker to execute arbitrary code via a crafted script to the Description parameter.
 </code>
 
 - [sahiloj/CVE-2023-34838](https://github.com/sahiloj/CVE-2023-34838)
 
-### CVE-2023-34839 (-)
+### CVE-2023-34839 (2023-06-27)
 
 <code>A Cross Site Request Forgery (CSRF) vulnerability in Issabel issabel-pbx v.4.0.0-6 allows a remote attacker to gain privileges via a Custom CSRF exploit to create new user function in the application.
 </code>
@@ -1855,6 +1855,9 @@
 ### CVE-2023-34840
 - [Xh4H/CVE-2023-34840](https://github.com/Xh4H/CVE-2023-34840)
 
+### CVE-2023-34843
+- [rootd4ddy/CVE-2023-34843](https://github.com/rootd4ddy/CVE-2023-34843)
+
 ### CVE-2023-34852 (2023-06-15)
 
 <code>PublicCMS &lt;=V4.0.202302 is vulnerable to Insecure Permissions.
@@ -9115,6 +9118,7 @@
 - [mutur4/CVE-2021-4034](https://github.com/mutur4/CVE-2021-4034)
 - [crypticdante/CVE-2021-4034_Python3](https://github.com/crypticdante/CVE-2021-4034_Python3)
 - [TheSermux/CVE-2021-4034](https://github.com/TheSermux/CVE-2021-4034)
+- [ps-interactive/lab_cve-2021-4034-polkit-emulation-and-detection](https://github.com/ps-interactive/lab_cve-2021-4034-polkit-emulation-and-detection)
 
 ### CVE-2021-4043 (2022-02-04)
 
@@ -23341,7 +23345,6 @@
 - [bigsizeme/CVE-2018-2893](https://github.com/bigsizeme/CVE-2018-2893)
 - [pyn3rd/CVE-2018-2893](https://github.com/pyn3rd/CVE-2018-2893)
 - [qianl0ng/CVE-2018-2893](https://github.com/qianl0ng/CVE-2018-2893)
-- [jas502n/CVE-2018-2893](https://github.com/jas502n/CVE-2018-2893)
 - [ianxtianxt/CVE-2018-2893](https://github.com/ianxtianxt/CVE-2018-2893)
 
 ### CVE-2018-2894 (2018-07-18)
@@ -24703,19 +24706,10 @@
 
 - [SoledaD208/CVE-2018-10933](https://github.com/SoledaD208/CVE-2018-10933)
 - [blacknbunny/CVE-2018-10933](https://github.com/blacknbunny/CVE-2018-10933)
-- [hook-s3c/CVE-2018-10933](https://github.com/hook-s3c/CVE-2018-10933)
-- [kn6869610/CVE-2018-10933](https://github.com/kn6869610/CVE-2018-10933)
 - [leapsecurity/libssh-scanner](https://github.com/leapsecurity/libssh-scanner)
-- [likescam/CVE-2018-10933_ssh](https://github.com/likescam/CVE-2018-10933_ssh)
-- [likescam/CVE-2018-10933-libSSH-Authentication-Bypass](https://github.com/likescam/CVE-2018-10933-libSSH-Authentication-Bypass)
-- [marco-lancini/hunt-for-cve-2018-10933](https://github.com/marco-lancini/hunt-for-cve-2018-10933)
 - [hackerhouse-opensource/cve-2018-10933](https://github.com/hackerhouse-opensource/cve-2018-10933)
 - [cve-2018/cve-2018-10933](https://github.com/cve-2018/cve-2018-10933)
-- [jas502n/CVE-2018-10933](https://github.com/jas502n/CVE-2018-10933)
-- [ninp0/cve-2018-10933_poc](https://github.com/ninp0/cve-2018-10933_poc)
-- [pghook/CVE-2018-10933_Scanner](https://github.com/pghook/CVE-2018-10933_Scanner)
 - [Virgula0/POC-CVE-2018-10933](https://github.com/Virgula0/POC-CVE-2018-10933)
-- [shifa123/pythonprojects-CVE-2018-10933](https://github.com/shifa123/pythonprojects-CVE-2018-10933)
 - [xFreed0m/CVE-2018-10933](https://github.com/xFreed0m/CVE-2018-10933)
 - [Bifrozt/CVE-2018-10933](https://github.com/Bifrozt/CVE-2018-10933)
 - [r3dxpl0it/CVE-2018-10933](https://github.com/r3dxpl0it/CVE-2018-10933)
@@ -24893,13 +24887,6 @@
 
 - [anmuxi-bai/CVE-2018-11790](https://github.com/anmuxi-bai/CVE-2018-11790)
 
-### CVE-2018-12018 (2018-07-04)
-
-<code>The GetBlockHeadersMsg handler in the LES protocol implementation in Go Ethereum (aka geth) before 1.8.11 may lead to an access violation because of an integer signedness error for the array index, which allows attackers to launch a Denial of Service attack by sending a packet with a -1 query.Skip value. The vulnerable remote node would be crashed by such an attack immediately, aka the EPoD (Ethereum Packet of Death) issue.
-</code>
-
-- [k3v142/CVE-2018-12018](https://github.com/k3v142/CVE-2018-12018)
-
 ### CVE-2018-12031 (2018-06-07)
 
 <code>Local file inclusion in Eaton Intelligent Power Manager v1.6 allows an attacker to include a file via server/node_upgrade_srv.js directory traversal with the firmware parameter in a downloadFirmware action.
@@ -25211,7 +25198,6 @@
 
 - [BasuCert/WinboxPoC](https://github.com/BasuCert/WinboxPoC)
 - [msterusky/WinboxExploit](https://github.com/msterusky/WinboxExploit)
-- [syrex1013/MikroRoot](https://github.com/syrex1013/MikroRoot)
 - [jas502n/CVE-2018-14847](https://github.com/jas502n/CVE-2018-14847)
 - [mahmoodsabir/mikrotik-beast](https://github.com/mahmoodsabir/mikrotik-beast)
 - [Tr33-He11/winboxPOC](https://github.com/Tr33-He11/winboxPOC)
@@ -29670,16 +29656,11 @@
 </code>
 
 - [fser/ghost-checker](https://github.com/fser/ghost-checker)
-- [mikesplain/CVE-2015-0235-cookbook](https://github.com/mikesplain/CVE-2015-0235-cookbook)
-- [aaronfay/CVE-2015-0235-test](https://github.com/aaronfay/CVE-2015-0235-test)
 - [piyokango/ghost](https://github.com/piyokango/ghost)
 - [mholzinger/CVE-2015-0235_GHOST](https://github.com/mholzinger/CVE-2015-0235_GHOST)
 - [adherzog/ansible-CVE-2015-0235-GHOST](https://github.com/adherzog/ansible-CVE-2015-0235-GHOST)
 - [favoretti/lenny-libc6](https://github.com/favoretti/lenny-libc6)
-- [nickanderson/cfengine-CVE_2015_0235](https://github.com/nickanderson/cfengine-CVE_2015_0235)
-- [koudaiii-archives/cookbook-update-glibc](https://github.com/koudaiii-archives/cookbook-update-glibc)
 - [F88/ghostbusters15](https://github.com/F88/ghostbusters15)
-- [tobyzxj/CVE-2015-0235](https://github.com/tobyzxj/CVE-2015-0235)
 - [makelinux/CVE-2015-0235-workaround](https://github.com/makelinux/CVE-2015-0235-workaround)
 - [arm13/ghost_exploit](https://github.com/arm13/ghost_exploit)
 - [alanmeyer/CVE-glibc](https://github.com/alanmeyer/CVE-glibc)
@@ -33115,7 +33096,6 @@
 </code>
 
 - [rafaelh/CVE-2000-0649](https://github.com/rafaelh/CVE-2000-0649)
-- [stevenvegar/cve-2000-0649](https://github.com/stevenvegar/cve-2000-0649)
 
 ### CVE-2000-0979 (2001-01-22)