diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json
index c31071ef5c..6e67059152 100644
--- a/2014/CVE-2014-0160.json
+++ b/2014/CVE-2014-0160.json
@@ -253,10 +253,10 @@
         "description": "OpenSSL TLS heartbeat read overrun (CVE-2014-0160)",
         "fork": false,
         "created_at": "2014-04-08T20:58:26Z",
-        "updated_at": "2022-03-23T08:58:41Z",
+        "updated_at": "2024-03-28T09:37:17Z",
         "pushed_at": "2014-04-11T02:40:46Z",
-        "stargazers_count": 38,
-        "watchers_count": 38,
+        "stargazers_count": 39,
+        "watchers_count": 39,
         "has_discussions": false,
         "forks_count": 8,
         "allow_forking": true,
@@ -265,7 +265,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 8,
-        "watchers": 38,
+        "watchers": 39,
         "score": 0,
         "subscribers_count": 3
     },
diff --git a/2018/CVE-2018-0171.json b/2018/CVE-2018-0171.json
index 848e865a28..b68b0d4371 100644
--- a/2018/CVE-2018-0171.json
+++ b/2018/CVE-2018-0171.json
@@ -13,10 +13,10 @@
         "description": "Cisco SmartInstall Exploit [CVE-2018-0171]",
         "fork": false,
         "created_at": "2023-02-01T03:51:56Z",
-        "updated_at": "2024-03-21T22:18:17Z",
+        "updated_at": "2024-03-28T11:57:23Z",
         "pushed_at": "2023-02-06T17:17:40Z",
-        "stargazers_count": 4,
-        "watchers_count": 4,
+        "stargazers_count": 5,
+        "watchers_count": 5,
         "has_discussions": false,
         "forks_count": 2,
         "allow_forking": true,
@@ -30,7 +30,7 @@
         ],
         "visibility": "public",
         "forks": 2,
-        "watchers": 4,
+        "watchers": 5,
         "score": 0,
         "subscribers_count": 1
     }
diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json
index 34bd0aedc9..76d1512157 100644
--- a/2019/CVE-2019-17558.json
+++ b/2019/CVE-2019-17558.json
@@ -43,12 +43,12 @@
         "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
         "fork": false,
         "created_at": "2020-04-01T09:33:35Z",
-        "updated_at": "2024-03-27T08:44:55Z",
+        "updated_at": "2024-03-28T07:47:24Z",
         "pushed_at": "2021-04-04T09:13:57Z",
-        "stargazers_count": 4013,
-        "watchers_count": 4013,
+        "stargazers_count": 4014,
+        "watchers_count": 4014,
         "has_discussions": false,
-        "forks_count": 1081,
+        "forks_count": 1080,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
@@ -74,8 +74,8 @@
             "webshell"
         ],
         "visibility": "public",
-        "forks": 1081,
-        "watchers": 4013,
+        "forks": 1080,
+        "watchers": 4014,
         "score": 0,
         "subscribers_count": 151
     },
diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json
index fe6942bc54..b2a01197b2 100644
--- a/2020/CVE-2020-1472.json
+++ b/2020/CVE-2020-1472.json
@@ -170,10 +170,10 @@
         "description": "Exploit for zerologon cve-2020-1472",
         "fork": false,
         "created_at": "2020-09-14T19:19:07Z",
-        "updated_at": "2024-03-25T06:10:46Z",
+        "updated_at": "2024-03-28T06:43:41Z",
         "pushed_at": "2020-10-15T18:31:15Z",
-        "stargazers_count": 590,
-        "watchers_count": 590,
+        "stargazers_count": 591,
+        "watchers_count": 591,
         "has_discussions": false,
         "forks_count": 143,
         "allow_forking": true,
@@ -182,7 +182,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 143,
-        "watchers": 590,
+        "watchers": 591,
         "score": 0,
         "subscribers_count": 13
     },
diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json
index 153ebdb47e..2b32bab351 100644
--- a/2020/CVE-2020-14882.json
+++ b/2020/CVE-2020-14882.json
@@ -13,12 +13,12 @@
         "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
         "fork": false,
         "created_at": "2020-04-01T09:33:35Z",
-        "updated_at": "2024-03-27T08:44:55Z",
+        "updated_at": "2024-03-28T07:47:24Z",
         "pushed_at": "2021-04-04T09:13:57Z",
-        "stargazers_count": 4013,
-        "watchers_count": 4013,
+        "stargazers_count": 4014,
+        "watchers_count": 4014,
         "has_discussions": false,
-        "forks_count": 1081,
+        "forks_count": 1080,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
@@ -44,8 +44,8 @@
             "webshell"
         ],
         "visibility": "public",
-        "forks": 1081,
-        "watchers": 4013,
+        "forks": 1080,
+        "watchers": 4014,
         "score": 0,
         "subscribers_count": 151
     },
diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json
index cceb51847b..095ead7703 100644
--- a/2021/CVE-2021-21972.json
+++ b/2021/CVE-2021-21972.json
@@ -851,10 +851,10 @@
         "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
         "fork": false,
         "created_at": "2022-10-04T03:39:27Z",
-        "updated_at": "2024-03-27T12:27:01Z",
+        "updated_at": "2024-03-28T09:51:49Z",
         "pushed_at": "2024-02-01T06:53:03Z",
-        "stargazers_count": 1227,
-        "watchers_count": 1227,
+        "stargazers_count": 1228,
+        "watchers_count": 1228,
         "has_discussions": false,
         "forks_count": 154,
         "allow_forking": true,
@@ -870,7 +870,7 @@
         ],
         "visibility": "public",
         "forks": 154,
-        "watchers": 1227,
+        "watchers": 1228,
         "score": 0,
         "subscribers_count": 12
     }
diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json
index 72dfe4a0c8..6048edcc54 100644
--- a/2021/CVE-2021-34527.json
+++ b/2021/CVE-2021-34527.json
@@ -109,10 +109,10 @@
         "description": "PrintNightmare - Windows Print Spooler RCE\/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits",
         "fork": false,
         "created_at": "2021-07-03T15:15:12Z",
-        "updated_at": "2024-03-26T19:20:00Z",
+        "updated_at": "2024-03-28T06:23:40Z",
         "pushed_at": "2021-09-13T12:12:17Z",
-        "stargazers_count": 105,
-        "watchers_count": 105,
+        "stargazers_count": 104,
+        "watchers_count": 104,
         "has_discussions": false,
         "forks_count": 38,
         "allow_forking": true,
@@ -128,7 +128,7 @@
         ],
         "visibility": "public",
         "forks": 38,
-        "watchers": 105,
+        "watchers": 104,
         "score": 0,
         "subscribers_count": 8
     },
diff --git a/2021/CVE-2021-3490.json b/2021/CVE-2021-3490.json
index 1236e390c4..31ae308a4d 100644
--- a/2021/CVE-2021-3490.json
+++ b/2021/CVE-2021-3490.json
@@ -13,19 +13,19 @@
         "description": null,
         "fork": false,
         "created_at": "2021-06-24T18:50:17Z",
-        "updated_at": "2024-03-27T00:13:33Z",
+        "updated_at": "2024-03-28T09:36:08Z",
         "pushed_at": "2023-07-10T16:41:49Z",
-        "stargazers_count": 285,
-        "watchers_count": 285,
+        "stargazers_count": 286,
+        "watchers_count": 286,
         "has_discussions": false,
-        "forks_count": 51,
+        "forks_count": 52,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 51,
-        "watchers": 285,
+        "forks": 52,
+        "watchers": 286,
         "score": 0,
         "subscribers_count": 8
     },
diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json
index f540e39ec7..18f9843919 100644
--- a/2021/CVE-2021-4034.json
+++ b/2021/CVE-2021-4034.json
@@ -2466,19 +2466,19 @@
         "description": "pkexec (Polkit) exploit of Privilege Escalation vulnerability CVE-2021-4034",
         "fork": false,
         "created_at": "2022-01-28T15:16:44Z",
-        "updated_at": "2024-02-24T11:42:38Z",
+        "updated_at": "2024-03-28T09:35:58Z",
         "pushed_at": "2022-01-28T15:17:47Z",
-        "stargazers_count": 5,
-        "watchers_count": 5,
+        "stargazers_count": 6,
+        "watchers_count": 6,
         "has_discussions": false,
-        "forks_count": 1,
+        "forks_count": 2,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 1,
-        "watchers": 5,
+        "forks": 2,
+        "watchers": 6,
         "score": 0,
         "subscribers_count": 2
     },
diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json
index 3188adabed..f71c9b4793 100644
--- a/2021/CVE-2021-40444.json
+++ b/2021/CVE-2021-40444.json
@@ -223,10 +223,10 @@
         "description": "CVE-2021-40444 PoC",
         "fork": false,
         "created_at": "2021-09-10T16:55:53Z",
-        "updated_at": "2024-03-25T18:09:09Z",
+        "updated_at": "2024-03-28T06:23:50Z",
         "pushed_at": "2021-12-25T18:31:02Z",
-        "stargazers_count": 1531,
-        "watchers_count": 1531,
+        "stargazers_count": 1530,
+        "watchers_count": 1530,
         "has_discussions": false,
         "forks_count": 480,
         "allow_forking": true,
@@ -235,7 +235,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 480,
-        "watchers": 1531,
+        "watchers": 1530,
         "score": 0,
         "subscribers_count": 28
     },
diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json
index 15c4880170..9a8822ae31 100644
--- a/2021/CVE-2021-42278.json
+++ b/2021/CVE-2021-42278.json
@@ -13,10 +13,10 @@
         "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
         "fork": false,
         "created_at": "2021-12-11T15:10:30Z",
-        "updated_at": "2024-03-19T07:30:38Z",
+        "updated_at": "2024-03-28T07:27:11Z",
         "pushed_at": "2022-07-10T22:23:13Z",
-        "stargazers_count": 954,
-        "watchers_count": 954,
+        "stargazers_count": 955,
+        "watchers_count": 955,
         "has_discussions": false,
         "forks_count": 191,
         "allow_forking": true,
@@ -30,7 +30,7 @@
         ],
         "visibility": "public",
         "forks": 191,
-        "watchers": 954,
+        "watchers": 955,
         "score": 0,
         "subscribers_count": 26
     },
diff --git a/2021/CVE-2021-43798.json b/2021/CVE-2021-43798.json
index 5f2c71b2c1..7b531d03e2 100644
--- a/2021/CVE-2021-43798.json
+++ b/2021/CVE-2021-43798.json
@@ -201,10 +201,10 @@
         "description": "A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins \/ extract secret_key \/ decrypt data_source info automatic.",
         "fork": false,
         "created_at": "2021-12-07T15:11:34Z",
-        "updated_at": "2024-03-26T13:58:11Z",
-        "pushed_at": "2023-11-07T02:48:51Z",
-        "stargazers_count": 236,
-        "watchers_count": 236,
+        "updated_at": "2024-03-28T09:50:02Z",
+        "pushed_at": "2024-03-28T08:46:27Z",
+        "stargazers_count": 238,
+        "watchers_count": 238,
         "has_discussions": false,
         "forks_count": 36,
         "allow_forking": true,
@@ -217,7 +217,7 @@
         ],
         "visibility": "public",
         "forks": 36,
-        "watchers": 236,
+        "watchers": 238,
         "score": 0,
         "subscribers_count": 5
     },
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
index 8445927cc7..b600944001 100644
--- a/2021/CVE-2021-44228.json
+++ b/2021/CVE-2021-44228.json
@@ -6721,36 +6721,6 @@
         "score": 0,
         "subscribers_count": 1
     },
-    {
-        "id": 438650245,
-        "name": "log4j_temp_CVE-2021-44228",
-        "full_name": "111coding\/log4j_temp_CVE-2021-44228",
-        "owner": {
-            "login": "111coding",
-            "id": 49793527,
-            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49793527?v=4",
-            "html_url": "https:\/\/github.com\/111coding"
-        },
-        "html_url": "https:\/\/github.com\/111coding\/log4j_temp_CVE-2021-44228",
-        "description": null,
-        "fork": false,
-        "created_at": "2021-12-15T14:01:23Z",
-        "updated_at": "2021-12-18T17:13:29Z",
-        "pushed_at": "2021-12-18T17:13:25Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
-        "has_discussions": false,
-        "forks_count": 0,
-        "allow_forking": true,
-        "is_template": false,
-        "web_commit_signoff_required": false,
-        "topics": [],
-        "visibility": "public",
-        "forks": 0,
-        "watchers": 0,
-        "score": 0,
-        "subscribers_count": 2
-    },
     {
         "id": 438664340,
         "name": "log4j-vuln-coverage-check",
diff --git a/2022/CVE-2022-0337.json b/2022/CVE-2022-0337.json
index e67ca832bf..ca7788475b 100644
--- a/2022/CVE-2022-0337.json
+++ b/2022/CVE-2022-0337.json
@@ -13,10 +13,10 @@
         "description": "🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337",
         "fork": false,
         "created_at": "2022-03-19T08:10:46Z",
-        "updated_at": "2024-03-24T02:53:53Z",
+        "updated_at": "2024-03-28T10:13:18Z",
         "pushed_at": "2022-09-04T17:28:56Z",
-        "stargazers_count": 323,
-        "watchers_count": 323,
+        "stargazers_count": 324,
+        "watchers_count": 324,
         "has_discussions": false,
         "forks_count": 36,
         "allow_forking": true,
@@ -41,7 +41,7 @@
         ],
         "visibility": "public",
         "forks": 36,
-        "watchers": 323,
+        "watchers": 324,
         "score": 0,
         "subscribers_count": 6
     },
diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json
index da12f06b04..dcdf2d22d0 100644
--- a/2022/CVE-2022-22954.json
+++ b/2022/CVE-2022-22954.json
@@ -766,10 +766,10 @@
         "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
         "fork": false,
         "created_at": "2022-10-04T03:39:27Z",
-        "updated_at": "2024-03-27T12:27:01Z",
+        "updated_at": "2024-03-28T09:51:49Z",
         "pushed_at": "2024-02-01T06:53:03Z",
-        "stargazers_count": 1227,
-        "watchers_count": 1227,
+        "stargazers_count": 1228,
+        "watchers_count": 1228,
         "has_discussions": false,
         "forks_count": 154,
         "allow_forking": true,
@@ -785,7 +785,7 @@
         ],
         "visibility": "public",
         "forks": 154,
-        "watchers": 1227,
+        "watchers": 1228,
         "score": 0,
         "subscribers_count": 12
     },
diff --git a/2022/CVE-2022-2586.json b/2022/CVE-2022-2586.json
index 53a5db3483..87513fb9dc 100644
--- a/2022/CVE-2022-2586.json
+++ b/2022/CVE-2022-2586.json
@@ -48,13 +48,13 @@
         "stargazers_count": 3,
         "watchers_count": 3,
         "has_discussions": false,
-        "forks_count": 2,
+        "forks_count": 3,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 2,
+        "forks": 3,
         "watchers": 3,
         "score": 0,
         "subscribers_count": 1
diff --git a/2023/CVE-2023-23397.json b/2023/CVE-2023-23397.json
index 8d7058b2be..e4bf83a34c 100644
--- a/2023/CVE-2023-23397.json
+++ b/2023/CVE-2023-23397.json
@@ -690,13 +690,13 @@
         "stargazers_count": 5,
         "watchers_count": 5,
         "has_discussions": false,
-        "forks_count": 1,
+        "forks_count": 2,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 1,
+        "forks": 2,
         "watchers": 5,
         "score": 0,
         "subscribers_count": 1
diff --git a/2023/CVE-2023-24955.json b/2023/CVE-2023-24955.json
index 16ab0fb48e..9937a38ecd 100644
--- a/2023/CVE-2023-24955.json
+++ b/2023/CVE-2023-24955.json
@@ -13,10 +13,10 @@
         "description": "Exploit for Microsoft SharePoint 2019",
         "fork": false,
         "created_at": "2023-12-28T09:08:47Z",
-        "updated_at": "2024-03-27T00:23:14Z",
+        "updated_at": "2024-03-28T10:46:11Z",
         "pushed_at": "2023-12-28T10:02:02Z",
-        "stargazers_count": 3,
-        "watchers_count": 3,
+        "stargazers_count": 4,
+        "watchers_count": 4,
         "has_discussions": false,
         "forks_count": 2,
         "allow_forking": true,
@@ -25,7 +25,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 2,
-        "watchers": 3,
+        "watchers": 4,
         "score": 0,
         "subscribers_count": 1
     }
diff --git a/2023/CVE-2023-33246.json b/2023/CVE-2023-33246.json
index 6728b80ecb..9f505ea89f 100644
--- a/2023/CVE-2023-33246.json
+++ b/2023/CVE-2023-33246.json
@@ -138,7 +138,7 @@
         "stargazers_count": 96,
         "watchers_count": 96,
         "has_discussions": false,
-        "forks_count": 20,
+        "forks_count": 21,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
@@ -148,7 +148,7 @@
             "rocketmq"
         ],
         "visibility": "public",
-        "forks": 20,
+        "forks": 21,
         "watchers": 96,
         "score": 0,
         "subscribers_count": 3
diff --git a/2023/CVE-2023-36874.json b/2023/CVE-2023-36874.json
index 6b70f12428..258de9df5e 100644
--- a/2023/CVE-2023-36874.json
+++ b/2023/CVE-2023-36874.json
@@ -13,10 +13,10 @@
         "description": "CVE-2023-36874 PoC",
         "fork": false,
         "created_at": "2023-08-20T13:50:42Z",
-        "updated_at": "2024-03-19T07:31:07Z",
+        "updated_at": "2024-03-28T11:44:33Z",
         "pushed_at": "2024-03-13T18:33:17Z",
-        "stargazers_count": 80,
-        "watchers_count": 80,
+        "stargazers_count": 79,
+        "watchers_count": 79,
         "has_discussions": false,
         "forks_count": 27,
         "allow_forking": true,
@@ -25,7 +25,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 27,
-        "watchers": 80,
+        "watchers": 79,
         "score": 0,
         "subscribers_count": 1
     },
diff --git a/2023/CVE-2023-42442.json b/2023/CVE-2023-42442.json
index cf6f7ff49b..c8765b0ac1 100644
--- a/2023/CVE-2023-42442.json
+++ b/2023/CVE-2023-42442.json
@@ -43,10 +43,10 @@
         "description": "JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 \/ CVE-2023-42820 \/ RCE 2021",
         "fork": false,
         "created_at": "2023-10-14T09:35:07Z",
-        "updated_at": "2024-03-27T15:06:59Z",
+        "updated_at": "2024-03-28T07:17:02Z",
         "pushed_at": "2024-02-20T09:03:22Z",
-        "stargazers_count": 139,
-        "watchers_count": 139,
+        "stargazers_count": 140,
+        "watchers_count": 140,
         "has_discussions": false,
         "forks_count": 11,
         "allow_forking": true,
@@ -59,7 +59,7 @@
         ],
         "visibility": "public",
         "forks": 11,
-        "watchers": 139,
+        "watchers": 140,
         "score": 0,
         "subscribers_count": 1
     },
diff --git a/2023/CVE-2023-42789.json b/2023/CVE-2023-42789.json
new file mode 100644
index 0000000000..963dae5670
--- /dev/null
+++ b/2023/CVE-2023-42789.json
@@ -0,0 +1,32 @@
+[
+    {
+        "id": 778714358,
+        "name": "CVE-2023-42789",
+        "full_name": "jhonnybonny\/CVE-2023-42789",
+        "owner": {
+            "login": "jhonnybonny",
+            "id": 87495218,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87495218?v=4",
+            "html_url": "https:\/\/github.com\/jhonnybonny"
+        },
+        "html_url": "https:\/\/github.com\/jhonnybonny\/CVE-2023-42789",
+        "description": "Check CVE-2023-42789  ",
+        "fork": false,
+        "created_at": "2024-03-28T08:59:12Z",
+        "updated_at": "2024-03-28T09:03:10Z",
+        "pushed_at": "2024-03-28T09:10:21Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "has_discussions": false,
+        "forks_count": 0,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 0,
+        "watchers": 0,
+        "score": 0,
+        "subscribers_count": 0
+    }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json
index 015b81679e..70761399ab 100644
--- a/2023/CVE-2023-45866.json
+++ b/2023/CVE-2023-45866.json
@@ -13,19 +13,19 @@
         "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
         "fork": false,
         "created_at": "2024-01-16T06:52:02Z",
-        "updated_at": "2024-03-28T06:09:54Z",
+        "updated_at": "2024-03-28T12:05:22Z",
         "pushed_at": "2024-03-27T18:25:56Z",
-        "stargazers_count": 158,
-        "watchers_count": 158,
+        "stargazers_count": 187,
+        "watchers_count": 187,
         "has_discussions": false,
-        "forks_count": 30,
+        "forks_count": 33,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 30,
-        "watchers": 158,
+        "forks": 33,
+        "watchers": 187,
         "score": 0,
         "subscribers_count": 3
     },
diff --git a/2023/CVE-2023-47246.json b/2023/CVE-2023-47246.json
index e65e19866b..2fca8008fa 100644
--- a/2023/CVE-2023-47246.json
+++ b/2023/CVE-2023-47246.json
@@ -18,7 +18,7 @@
         "stargazers_count": 49,
         "watchers_count": 49,
         "has_discussions": false,
-        "forks_count": 10,
+        "forks_count": 11,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
@@ -30,7 +30,7 @@
             "sysaid"
         ],
         "visibility": "public",
-        "forks": 10,
+        "forks": 11,
         "watchers": 49,
         "score": 0,
         "subscribers_count": 1
diff --git a/2023/CVE-2023-48022.json b/2023/CVE-2023-48022.json
index d2f4b99290..7442ca9379 100644
--- a/2023/CVE-2023-48022.json
+++ b/2023/CVE-2023-48022.json
@@ -13,10 +13,10 @@
         "description": "CVE-2023-48022 exploit modified from Bishop Fox work",
         "fork": false,
         "created_at": "2024-01-10T06:26:01Z",
-        "updated_at": "2024-01-10T06:33:09Z",
+        "updated_at": "2024-03-28T06:53:18Z",
         "pushed_at": "2024-01-10T06:33:04Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
+        "stargazers_count": 1,
+        "watchers_count": 1,
         "has_discussions": false,
         "forks_count": 1,
         "allow_forking": true,
@@ -25,7 +25,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 1,
-        "watchers": 0,
+        "watchers": 1,
         "score": 0,
         "subscribers_count": 1
     }
diff --git a/2023/CVE-2023-48788.json b/2023/CVE-2023-48788.json
index bea4d2a283..1ad2c8422e 100644
--- a/2023/CVE-2023-48788.json
+++ b/2023/CVE-2023-48788.json
@@ -13,10 +13,10 @@
         "description": "Fortinet FortiClient EMS SQL Injection",
         "fork": false,
         "created_at": "2024-03-18T20:50:48Z",
-        "updated_at": "2024-03-28T02:08:42Z",
+        "updated_at": "2024-03-28T12:02:44Z",
         "pushed_at": "2024-03-20T20:42:41Z",
-        "stargazers_count": 22,
-        "watchers_count": 22,
+        "stargazers_count": 23,
+        "watchers_count": 23,
         "has_discussions": false,
         "forks_count": 6,
         "allow_forking": true,
@@ -25,7 +25,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 6,
-        "watchers": 22,
+        "watchers": 23,
         "score": 0,
         "subscribers_count": 4
     }
diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json
index 914ebcd1f9..416e5ed452 100644
--- a/2024/CVE-2024-1086.json
+++ b/2024/CVE-2024-1086.json
@@ -13,12 +13,12 @@
         "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
         "fork": false,
         "created_at": "2024-03-20T21:16:41Z",
-        "updated_at": "2024-03-28T06:25:09Z",
+        "updated_at": "2024-03-28T12:30:02Z",
         "pushed_at": "2024-03-27T09:22:28Z",
-        "stargazers_count": 392,
-        "watchers_count": 392,
+        "stargazers_count": 420,
+        "watchers_count": 420,
         "has_discussions": false,
-        "forks_count": 39,
+        "forks_count": 43,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
@@ -30,8 +30,8 @@
             "poc"
         ],
         "visibility": "public",
-        "forks": 39,
-        "watchers": 392,
+        "forks": 43,
+        "watchers": 420,
         "score": 0,
         "subscribers_count": 1
     }
diff --git a/2024/CVE-2024-20767.json b/2024/CVE-2024-20767.json
index 088ccb003d..3771720470 100644
--- a/2024/CVE-2024-20767.json
+++ b/2024/CVE-2024-20767.json
@@ -82,6 +82,36 @@
         "stargazers_count": 5,
         "watchers_count": 5,
         "has_discussions": false,
+        "forks_count": 1,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 1,
+        "watchers": 5,
+        "score": 0,
+        "subscribers_count": 1
+    },
+    {
+        "id": 778686568,
+        "name": "cve-2024-20767",
+        "full_name": "huyqa\/cve-2024-20767",
+        "owner": {
+            "login": "huyqa",
+            "id": 56718313,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56718313?v=4",
+            "html_url": "https:\/\/github.com\/huyqa"
+        },
+        "html_url": "https:\/\/github.com\/huyqa\/cve-2024-20767",
+        "description": null,
+        "fork": false,
+        "created_at": "2024-03-28T07:46:31Z",
+        "updated_at": "2024-03-28T07:47:00Z",
+        "pushed_at": "2024-03-28T07:46:57Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "has_discussions": false,
         "forks_count": 0,
         "allow_forking": true,
         "is_template": false,
@@ -89,8 +119,8 @@
         "topics": [],
         "visibility": "public",
         "forks": 0,
-        "watchers": 5,
+        "watchers": 0,
         "score": 0,
-        "subscribers_count": 1
+        "subscribers_count": 0
     }
 ]
\ No newline at end of file
diff --git a/2024/CVE-2024-21388.json b/2024/CVE-2024-21388.json
new file mode 100644
index 0000000000..fd58094e05
--- /dev/null
+++ b/2024/CVE-2024-21388.json
@@ -0,0 +1,32 @@
+[
+    {
+        "id": 778727781,
+        "name": "CVE-2024-21388",
+        "full_name": "d0rb\/CVE-2024-21388",
+        "owner": {
+            "login": "d0rb",
+            "id": 10403781,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10403781?v=4",
+            "html_url": "https:\/\/github.com\/d0rb"
+        },
+        "html_url": "https:\/\/github.com\/d0rb\/CVE-2024-21388",
+        "description": "This Python script exploits a vulnerability (CVE-2024-21388) in Microsoft Edge, allowing silent installation of browser extensions with elevated privileges via a private API.",
+        "fork": false,
+        "created_at": "2024-03-28T09:31:31Z",
+        "updated_at": "2024-03-28T09:33:26Z",
+        "pushed_at": "2024-03-28T09:33:23Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "has_discussions": false,
+        "forks_count": 0,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 0,
+        "watchers": 0,
+        "score": 0,
+        "subscribers_count": 0
+    }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-21413.json b/2024/CVE-2024-21413.json
index c4650b883b..ff98f43ca5 100644
--- a/2024/CVE-2024-21413.json
+++ b/2024/CVE-2024-21413.json
@@ -43,10 +43,10 @@
         "description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
         "fork": false,
         "created_at": "2024-02-16T15:17:59Z",
-        "updated_at": "2024-03-27T07:19:06Z",
+        "updated_at": "2024-03-28T09:14:01Z",
         "pushed_at": "2024-02-19T20:00:35Z",
-        "stargazers_count": 547,
-        "watchers_count": 547,
+        "stargazers_count": 548,
+        "watchers_count": 548,
         "has_discussions": false,
         "forks_count": 123,
         "allow_forking": true,
@@ -55,7 +55,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 123,
-        "watchers": 547,
+        "watchers": 548,
         "score": 0,
         "subscribers_count": 7
     },
diff --git a/2024/CVE-2024-21626.json b/2024/CVE-2024-21626.json
index 8621b25479..607a1af709 100644
--- a/2024/CVE-2024-21626.json
+++ b/2024/CVE-2024-21626.json
@@ -43,10 +43,10 @@
         "description": "PoC and Detection for CVE-2024-21626",
         "fork": false,
         "created_at": "2024-02-01T15:28:37Z",
-        "updated_at": "2024-03-15T14:51:58Z",
+        "updated_at": "2024-03-28T08:09:37Z",
         "pushed_at": "2024-02-06T16:09:05Z",
-        "stargazers_count": 51,
-        "watchers_count": 51,
+        "stargazers_count": 52,
+        "watchers_count": 52,
         "has_discussions": false,
         "forks_count": 9,
         "allow_forking": true,
@@ -55,7 +55,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 9,
-        "watchers": 51,
+        "watchers": 52,
         "score": 0,
         "subscribers_count": 3
     },
diff --git a/2024/CVE-2024-2193.json b/2024/CVE-2024-2193.json
new file mode 100644
index 0000000000..456f1c3a2a
--- /dev/null
+++ b/2024/CVE-2024-2193.json
@@ -0,0 +1,32 @@
+[
+    {
+        "id": 778680882,
+        "name": "CVE-2024-2193",
+        "full_name": "uthrasri\/CVE-2024-2193",
+        "owner": {
+            "login": "uthrasri",
+            "id": 145666390,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4",
+            "html_url": "https:\/\/github.com\/uthrasri"
+        },
+        "html_url": "https:\/\/github.com\/uthrasri\/CVE-2024-2193",
+        "description": null,
+        "fork": false,
+        "created_at": "2024-03-28T07:30:04Z",
+        "updated_at": "2024-03-28T07:31:14Z",
+        "pushed_at": "2024-03-28T07:31:46Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "has_discussions": false,
+        "forks_count": 0,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 0,
+        "watchers": 0,
+        "score": 0,
+        "subscribers_count": 0
+    }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-28085.json b/2024/CVE-2024-28085.json
index e7bb614b8e..bd7e1a4b3e 100644
--- a/2024/CVE-2024-28085.json
+++ b/2024/CVE-2024-28085.json
@@ -13,10 +13,10 @@
         "description": "WallEscape vulnerability in util-linux",
         "fork": false,
         "created_at": "2024-03-11T00:15:03Z",
-        "updated_at": "2024-03-28T03:01:18Z",
+        "updated_at": "2024-03-28T09:55:38Z",
         "pushed_at": "2024-03-12T00:28:14Z",
-        "stargazers_count": 6,
-        "watchers_count": 6,
+        "stargazers_count": 7,
+        "watchers_count": 7,
         "has_discussions": false,
         "forks_count": 0,
         "allow_forking": true,
@@ -32,7 +32,7 @@
         ],
         "visibility": "public",
         "forks": 0,
-        "watchers": 6,
+        "watchers": 7,
         "score": 0,
         "subscribers_count": 1
     }
diff --git a/README.md b/README.md
index 7c0cb6ad9a..e160773cb4 100644
--- a/README.md
+++ b/README.md
@@ -175,6 +175,9 @@
 ### CVE-2024-2169
 - [douglasbuzatto/G3-Loop-DoS](https://github.com/douglasbuzatto/G3-Loop-DoS)
 
+### CVE-2024-2193
+- [uthrasri/CVE-2024-2193](https://github.com/uthrasri/CVE-2024-2193)
+
 ### CVE-2024-2432
 - [Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP](https://github.com/Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP)
 
@@ -220,6 +223,7 @@
 - [yoryio/CVE-2024-20767](https://github.com/yoryio/CVE-2024-20767)
 - [m-cetin/CVE-2024-20767](https://github.com/m-cetin/CVE-2024-20767)
 - [Chocapikk/CVE-2024-20767](https://github.com/Chocapikk/CVE-2024-20767)
+- [huyqa/cve-2024-20767](https://github.com/huyqa/cve-2024-20767)
 
 ### CVE-2024-20931 (2024-02-16)
 
@@ -245,6 +249,13 @@
 
 - [d0rb/CVE-2024-21378](https://github.com/d0rb/CVE-2024-21378)
 
+### CVE-2024-21388 (2024-01-30)
+
+<code>Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
+</code>
+
+- [d0rb/CVE-2024-21388](https://github.com/d0rb/CVE-2024-21388)
+
 ### CVE-2024-21412 (2024-02-13)
 
 <code>Internet Shortcut Files Security Feature Bypass Vulnerability
@@ -6340,6 +6351,9 @@
 
 - [actuator/wave.ai.browser](https://github.com/actuator/wave.ai.browser)
 
+### CVE-2023-42789
+- [jhonnybonny/CVE-2023-42789](https://github.com/jhonnybonny/CVE-2023-42789)
+
 ### CVE-2023-42793 (2023-09-19)
 
 <code>In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible
@@ -20464,7 +20478,6 @@
 - [gitlab-de/log4j-resources](https://github.com/gitlab-de/log4j-resources)
 - [redhuntlabs/Log4JHunt](https://github.com/redhuntlabs/Log4JHunt)
 - [mss/log4shell-hotfix-side-effect](https://github.com/mss/log4shell-hotfix-side-effect)
-- [111coding/log4j_temp_CVE-2021-44228](https://github.com/111coding/log4j_temp_CVE-2021-44228)
 - [MeterianHQ/log4j-vuln-coverage-check](https://github.com/MeterianHQ/log4j-vuln-coverage-check)
 - [sebiboga/jmeter-fix-cve-2021-44228-windows](https://github.com/sebiboga/jmeter-fix-cve-2021-44228-windows)
 - [mitiga/log4shell-cloud-scanner](https://github.com/mitiga/log4shell-cloud-scanner)