From dda43ab20838ea00f887c413d3319c85ccdfe1a1 Mon Sep 17 00:00:00 2001
From: motikan2010-bot <k.agena1993@gmail.com>
Date: Sat, 29 Apr 2023 09:34:57 +0900
Subject: [PATCH] Auto Update 2023/04/29 00:34:57

---
 2019/CVE-2019-17558.json | 12 ++++++------
 2020/CVE-2020-12695.json |  8 ++++----
 2020/CVE-2020-14882.json | 12 ++++++------
 2020/CVE-2020-35489.json | 29 +++++++++++++++++++++++++++++
 2021/CVE-2021-29447.json |  8 ++++----
 2021/CVE-2021-3156.json  |  8 ++++----
 2021/CVE-2021-40444.json |  4 ++--
 2022/CVE-2022-3699.json  |  8 ++++----
 2022/CVE-2022-38181.json |  8 ++++----
 2022/CVE-2022-39197.json |  4 ++--
 2022/CVE-2022-42045.json | 12 ++++++------
 2022/CVE-2022-42889.json | 12 ++++++------
 2023/CVE-2023-0179.json  |  8 ++++----
 2023/CVE-2023-21768.json |  8 ++++----
 2023/CVE-2023-25136.json | 37 +++++++++++++++++++++++++++++++++----
 2023/CVE-2023-29007.json |  4 ++--
 2023/CVE-2023-29489.json |  8 ++++----
 README.md                |  2 ++
 18 files changed, 126 insertions(+), 66 deletions(-)

diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json
index 1425cbe811..6384342e31 100644
--- a/2019/CVE-2019-17558.json
+++ b/2019/CVE-2019-17558.json
@@ -42,12 +42,12 @@
         "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
         "fork": false,
         "created_at": "2020-04-01T09:33:35Z",
-        "updated_at": "2023-04-28T08:37:18Z",
+        "updated_at": "2023-04-28T21:06:39Z",
         "pushed_at": "2021-04-04T09:13:57Z",
-        "stargazers_count": 3738,
-        "watchers_count": 3738,
+        "stargazers_count": 3739,
+        "watchers_count": 3739,
         "has_discussions": false,
-        "forks_count": 1077,
+        "forks_count": 1078,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
@@ -73,8 +73,8 @@
             "webshell"
         ],
         "visibility": "public",
-        "forks": 1077,
-        "watchers": 3738,
+        "forks": 1078,
+        "watchers": 3739,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-12695.json b/2020/CVE-2020-12695.json
index 9bd3f382c8..a161528cd3 100644
--- a/2020/CVE-2020-12695.json
+++ b/2020/CVE-2020-12695.json
@@ -13,10 +13,10 @@
         "description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
         "fork": false,
         "created_at": "2020-06-08T07:37:49Z",
-        "updated_at": "2023-04-27T20:10:40Z",
+        "updated_at": "2023-04-28T21:13:43Z",
         "pushed_at": "2021-08-07T16:48:55Z",
-        "stargazers_count": 388,
-        "watchers_count": 388,
+        "stargazers_count": 389,
+        "watchers_count": 389,
         "has_discussions": false,
         "forks_count": 69,
         "allow_forking": true,
@@ -25,7 +25,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 69,
-        "watchers": 388,
+        "watchers": 389,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json
index 4870ca1161..44c402dd98 100644
--- a/2020/CVE-2020-14882.json
+++ b/2020/CVE-2020-14882.json
@@ -13,12 +13,12 @@
         "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
         "fork": false,
         "created_at": "2020-04-01T09:33:35Z",
-        "updated_at": "2023-04-28T08:37:18Z",
+        "updated_at": "2023-04-28T21:06:39Z",
         "pushed_at": "2021-04-04T09:13:57Z",
-        "stargazers_count": 3738,
-        "watchers_count": 3738,
+        "stargazers_count": 3739,
+        "watchers_count": 3739,
         "has_discussions": false,
-        "forks_count": 1077,
+        "forks_count": 1078,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
@@ -44,8 +44,8 @@
             "webshell"
         ],
         "visibility": "public",
-        "forks": 1077,
-        "watchers": 3738,
+        "forks": 1078,
+        "watchers": 3739,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-35489.json b/2020/CVE-2020-35489.json
index f95de2d78b..da8cb9ad93 100644
--- a/2020/CVE-2020-35489.json
+++ b/2020/CVE-2020-35489.json
@@ -62,5 +62,34 @@
         "forks": 1,
         "watchers": 2,
         "score": 0
+    },
+    {
+        "id": 634051631,
+        "name": "CVE-2020-35489",
+        "full_name": "bod4k\/CVE-2020-35489",
+        "owner": {
+            "login": "bod4k",
+            "id": 37278209,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37278209?v=4",
+            "html_url": "https:\/\/github.com\/bod4k"
+        },
+        "html_url": "https:\/\/github.com\/bod4k\/CVE-2020-35489",
+        "description": "POC for  Contact Form 7 < 5.3.2 - Unrestricted File Upload  (Maybe Code execution )",
+        "fork": false,
+        "created_at": "2023-04-28T22:59:53Z",
+        "updated_at": "2023-04-28T23:01:43Z",
+        "pushed_at": "2023-04-28T23:01:40Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "has_discussions": false,
+        "forks_count": 0,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 0,
+        "watchers": 0,
+        "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2021/CVE-2021-29447.json b/2021/CVE-2021-29447.json
index 4c49a22025..a0dfbb29e4 100644
--- a/2021/CVE-2021-29447.json
+++ b/2021/CVE-2021-29447.json
@@ -158,10 +158,10 @@
         "description": "Arbitrary file read controller based on CVE-2021-29447",
         "fork": false,
         "created_at": "2022-11-06T04:26:20Z",
-        "updated_at": "2022-11-08T13:24:21Z",
+        "updated_at": "2023-04-28T22:17:00Z",
         "pushed_at": "2022-11-11T06:27:31Z",
-        "stargazers_count": 2,
-        "watchers_count": 2,
+        "stargazers_count": 3,
+        "watchers_count": 3,
         "has_discussions": false,
         "forks_count": 0,
         "allow_forking": true,
@@ -170,7 +170,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 0,
-        "watchers": 2,
+        "watchers": 3,
         "score": 0
     },
     {
diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json
index 0ef76a1d8c..99bc43b24d 100644
--- a/2021/CVE-2021-3156.json
+++ b/2021/CVE-2021-3156.json
@@ -1039,10 +1039,10 @@
         "description": "Sudo Baron Samedit Exploit",
         "fork": false,
         "created_at": "2021-03-15T17:37:02Z",
-        "updated_at": "2023-04-28T08:36:29Z",
+        "updated_at": "2023-04-28T20:38:36Z",
         "pushed_at": "2022-01-13T05:48:01Z",
-        "stargazers_count": 586,
-        "watchers_count": 586,
+        "stargazers_count": 587,
+        "watchers_count": 587,
         "has_discussions": false,
         "forks_count": 160,
         "allow_forking": true,
@@ -1051,7 +1051,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 160,
-        "watchers": 586,
+        "watchers": 587,
         "score": 0
     },
     {
diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json
index 4ce24e62c8..13aa07c0a7 100644
--- a/2021/CVE-2021-40444.json
+++ b/2021/CVE-2021-40444.json
@@ -221,13 +221,13 @@
         "stargazers_count": 1464,
         "watchers_count": 1464,
         "has_discussions": false,
-        "forks_count": 485,
+        "forks_count": 486,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 485,
+        "forks": 486,
         "watchers": 1464,
         "score": 0
     },
diff --git a/2022/CVE-2022-3699.json b/2022/CVE-2022-3699.json
index 6ca62a0dce..e67d3ac8f1 100644
--- a/2022/CVE-2022-3699.json
+++ b/2022/CVE-2022-3699.json
@@ -42,10 +42,10 @@
         "description": "CVE-2022-3699 with arbitrary kernel code execution capability",
         "fork": false,
         "created_at": "2022-12-25T04:34:26Z",
-        "updated_at": "2023-04-12T07:05:12Z",
+        "updated_at": "2023-04-28T23:20:44Z",
         "pushed_at": "2022-12-27T21:30:08Z",
-        "stargazers_count": 63,
-        "watchers_count": 63,
+        "stargazers_count": 64,
+        "watchers_count": 64,
         "has_discussions": false,
         "forks_count": 26,
         "allow_forking": true,
@@ -54,7 +54,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 26,
-        "watchers": 63,
+        "watchers": 64,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2022/CVE-2022-38181.json b/2022/CVE-2022-38181.json
index b2f518da0c..4bcb7eced9 100644
--- a/2022/CVE-2022-38181.json
+++ b/2022/CVE-2022-38181.json
@@ -42,10 +42,10 @@
         "description": "CVE-2022-38181 POC for FireTV 3rd gen Cube (gazelle)",
         "fork": false,
         "created_at": "2023-04-13T13:25:09Z",
-        "updated_at": "2023-04-13T13:35:38Z",
+        "updated_at": "2023-04-28T19:01:15Z",
         "pushed_at": "2023-04-13T13:29:17Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
+        "stargazers_count": 1,
+        "watchers_count": 1,
         "has_discussions": false,
         "forks_count": 0,
         "allow_forking": true,
@@ -54,7 +54,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 0,
-        "watchers": 0,
+        "watchers": 1,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2022/CVE-2022-39197.json b/2022/CVE-2022-39197.json
index d14329782c..df36b9e5de 100644
--- a/2022/CVE-2022-39197.json
+++ b/2022/CVE-2022-39197.json
@@ -316,13 +316,13 @@
         "stargazers_count": 319,
         "watchers_count": 319,
         "has_discussions": false,
-        "forks_count": 83,
+        "forks_count": 82,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 83,
+        "forks": 82,
         "watchers": 319,
         "score": 0
     },
diff --git a/2022/CVE-2022-42045.json b/2022/CVE-2022-42045.json
index 7decd17c33..8a334d5d4f 100644
--- a/2022/CVE-2022-42045.json
+++ b/2022/CVE-2022-42045.json
@@ -13,19 +13,19 @@
         "description": null,
         "fork": false,
         "created_at": "2022-10-23T15:58:18Z",
-        "updated_at": "2023-04-18T13:08:16Z",
+        "updated_at": "2023-04-28T19:55:47Z",
         "pushed_at": "2022-10-24T10:13:34Z",
-        "stargazers_count": 33,
-        "watchers_count": 33,
+        "stargazers_count": 32,
+        "watchers_count": 32,
         "has_discussions": false,
-        "forks_count": 13,
+        "forks_count": 12,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 13,
-        "watchers": 33,
+        "forks": 12,
+        "watchers": 32,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2022/CVE-2022-42889.json b/2022/CVE-2022-42889.json
index 3961666f40..5dbc15978a 100644
--- a/2022/CVE-2022-42889.json
+++ b/2022/CVE-2022-42889.json
@@ -178,19 +178,19 @@
         "description": "cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text version 1.10. ",
         "fork": false,
         "created_at": "2022-10-18T13:53:55Z",
-        "updated_at": "2023-02-22T14:25:34Z",
+        "updated_at": "2023-04-28T19:55:46Z",
         "pushed_at": "2022-10-18T14:10:07Z",
-        "stargazers_count": 39,
-        "watchers_count": 39,
+        "stargazers_count": 38,
+        "watchers_count": 38,
         "has_discussions": false,
-        "forks_count": 14,
+        "forks_count": 13,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
         "topics": [],
         "visibility": "public",
-        "forks": 14,
-        "watchers": 39,
+        "forks": 13,
+        "watchers": 38,
         "score": 0
     },
     {
diff --git a/2023/CVE-2023-0179.json b/2023/CVE-2023-0179.json
index ab35846454..8f0655dfad 100644
--- a/2023/CVE-2023-0179.json
+++ b/2023/CVE-2023-0179.json
@@ -42,10 +42,10 @@
         "description": "针对(CVE-2023-0179)漏洞利用  该漏洞被分配为CVE-2023-0179,影响了从5.5到6.2-rc3的所有Linux版本,该漏洞在6.1.6上被测试。  漏洞的细节和文章可以在os-security上找到。",
         "fork": false,
         "created_at": "2023-03-16T02:20:52Z",
-        "updated_at": "2023-04-28T16:48:22Z",
+        "updated_at": "2023-04-28T19:02:32Z",
         "pushed_at": "2023-03-16T02:22:28Z",
-        "stargazers_count": 188,
-        "watchers_count": 188,
+        "stargazers_count": 189,
+        "watchers_count": 189,
         "has_discussions": false,
         "forks_count": 22,
         "allow_forking": true,
@@ -54,7 +54,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 22,
-        "watchers": 188,
+        "watchers": 189,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2023/CVE-2023-21768.json b/2023/CVE-2023-21768.json
index 0b7b0a6ea1..c51852ec5f 100644
--- a/2023/CVE-2023-21768.json
+++ b/2023/CVE-2023-21768.json
@@ -13,10 +13,10 @@
         "description": "LPE exploit for CVE-2023-21768",
         "fork": false,
         "created_at": "2023-03-07T23:00:27Z",
-        "updated_at": "2023-04-26T20:50:13Z",
+        "updated_at": "2023-04-28T22:47:07Z",
         "pushed_at": "2023-03-10T08:58:44Z",
-        "stargazers_count": 389,
-        "watchers_count": 389,
+        "stargazers_count": 390,
+        "watchers_count": 390,
         "has_discussions": false,
         "forks_count": 146,
         "allow_forking": true,
@@ -25,7 +25,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 146,
-        "watchers": 389,
+        "watchers": 390,
         "score": 0
     },
     {
diff --git a/2023/CVE-2023-25136.json b/2023/CVE-2023-25136.json
index 29869d4104..adcb9375de 100644
--- a/2023/CVE-2023-25136.json
+++ b/2023/CVE-2023-25136.json
@@ -71,10 +71,10 @@
         "description": "OpenSSH 9.1 vulnerability mass scan and exploit",
         "fork": false,
         "created_at": "2023-02-22T19:44:08Z",
-        "updated_at": "2023-04-20T09:51:30Z",
+        "updated_at": "2023-04-28T19:24:58Z",
         "pushed_at": "2023-03-07T10:43:36Z",
-        "stargazers_count": 91,
-        "watchers_count": 91,
+        "stargazers_count": 92,
+        "watchers_count": 92,
         "has_discussions": false,
         "forks_count": 18,
         "allow_forking": true,
@@ -83,7 +83,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 18,
-        "watchers": 91,
+        "watchers": 92,
         "score": 0
     },
     {
@@ -114,5 +114,34 @@
         "forks": 7,
         "watchers": 37,
         "score": 0
+    },
+    {
+        "id": 634006271,
+        "name": "CVE-2023-25136",
+        "full_name": "nhakobyan685\/CVE-2023-25136",
+        "owner": {
+            "login": "nhakobyan685",
+            "id": 118097522,
+            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118097522?v=4",
+            "html_url": "https:\/\/github.com\/nhakobyan685"
+        },
+        "html_url": "https:\/\/github.com\/nhakobyan685\/CVE-2023-25136",
+        "description": "OpenSSH 9.1 vulnerability mass scan and exploit",
+        "fork": false,
+        "created_at": "2023-04-28T19:46:03Z",
+        "updated_at": "2023-04-28T20:28:08Z",
+        "pushed_at": "2023-04-28T20:29:10Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "has_discussions": false,
+        "forks_count": 0,
+        "allow_forking": true,
+        "is_template": false,
+        "web_commit_signoff_required": false,
+        "topics": [],
+        "visibility": "public",
+        "forks": 0,
+        "watchers": 0,
+        "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2023/CVE-2023-29007.json b/2023/CVE-2023-29007.json
index 6e86319cc7..937581fb41 100644
--- a/2023/CVE-2023-29007.json
+++ b/2023/CVE-2023-29007.json
@@ -18,7 +18,7 @@
         "stargazers_count": 9,
         "watchers_count": 9,
         "has_discussions": false,
-        "forks_count": 6,
+        "forks_count": 7,
         "allow_forking": true,
         "is_template": false,
         "web_commit_signoff_required": false,
@@ -26,7 +26,7 @@
             "cve"
         ],
         "visibility": "public",
-        "forks": 6,
+        "forks": 7,
         "watchers": 9,
         "score": 0
     }
diff --git a/2023/CVE-2023-29489.json b/2023/CVE-2023-29489.json
index d1687c9edb..9ccbb69170 100644
--- a/2023/CVE-2023-29489.json
+++ b/2023/CVE-2023-29489.json
@@ -42,10 +42,10 @@
         "description": null,
         "fork": false,
         "created_at": "2023-04-27T20:51:47Z",
-        "updated_at": "2023-04-27T20:51:48Z",
+        "updated_at": "2023-04-28T21:29:10Z",
         "pushed_at": "2023-04-27T21:17:52Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
+        "stargazers_count": 1,
+        "watchers_count": 1,
         "has_discussions": false,
         "forks_count": 0,
         "allow_forking": true,
@@ -54,7 +54,7 @@
         "topics": [],
         "visibility": "public",
         "forks": 0,
-        "watchers": 0,
+        "watchers": 1,
         "score": 0
     },
     {
diff --git a/README.md b/README.md
index 4ce7322fe9..00d19bf6e4 100644
--- a/README.md
+++ b/README.md
@@ -631,6 +631,7 @@ OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.
 - [ticofookfook/CVE-2023-25136](https://github.com/ticofookfook/CVE-2023-25136)
 - [Christbowel/CVE-2023-25136](https://github.com/Christbowel/CVE-2023-25136)
 - [adhikara13/CVE-2023-25136](https://github.com/adhikara13/CVE-2023-25136)
+- [nhakobyan685/CVE-2023-25136](https://github.com/nhakobyan685/CVE-2023-25136)
 
 ### CVE-2023-25194 (2023-02-07)
 
@@ -19370,6 +19371,7 @@ The contact-form-7 (aka Contact Form 7) plugin before 5.3.2 for WordPress allows
 
 - [dn9uy3n/Check-WP-CVE-2020-35489](https://github.com/dn9uy3n/Check-WP-CVE-2020-35489)
 - [X0UCYB3R/Check-WP-CVE-2020-35489](https://github.com/X0UCYB3R/Check-WP-CVE-2020-35489)
+- [bod4k/CVE-2020-35489](https://github.com/bod4k/CVE-2020-35489)
 
 ### CVE-2020-35498 (2021-02-11)