From dda43ab20838ea00f887c413d3319c85ccdfe1a1 Mon Sep 17 00:00:00 2001 From: motikan2010-bot <k.agena1993@gmail.com> Date: Sat, 29 Apr 2023 09:34:57 +0900 Subject: [PATCH] Auto Update 2023/04/29 00:34:57 --- 2019/CVE-2019-17558.json | 12 ++++++------ 2020/CVE-2020-12695.json | 8 ++++---- 2020/CVE-2020-14882.json | 12 ++++++------ 2020/CVE-2020-35489.json | 29 +++++++++++++++++++++++++++++ 2021/CVE-2021-29447.json | 8 ++++---- 2021/CVE-2021-3156.json | 8 ++++---- 2021/CVE-2021-40444.json | 4 ++-- 2022/CVE-2022-3699.json | 8 ++++---- 2022/CVE-2022-38181.json | 8 ++++---- 2022/CVE-2022-39197.json | 4 ++-- 2022/CVE-2022-42045.json | 12 ++++++------ 2022/CVE-2022-42889.json | 12 ++++++------ 2023/CVE-2023-0179.json | 8 ++++---- 2023/CVE-2023-21768.json | 8 ++++---- 2023/CVE-2023-25136.json | 37 +++++++++++++++++++++++++++++++++---- 2023/CVE-2023-29007.json | 4 ++-- 2023/CVE-2023-29489.json | 8 ++++---- README.md | 2 ++ 18 files changed, 126 insertions(+), 66 deletions(-) diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 1425cbe811..6384342e31 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -42,12 +42,12 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2023-04-28T08:37:18Z", + "updated_at": "2023-04-28T21:06:39Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3738, - "watchers_count": 3738, + "stargazers_count": 3739, + "watchers_count": 3739, "has_discussions": false, - "forks_count": 1077, + "forks_count": 1078, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -73,8 +73,8 @@ "webshell" ], "visibility": "public", - "forks": 1077, - "watchers": 3738, + "forks": 1078, + "watchers": 3739, "score": 0 }, { diff --git a/2020/CVE-2020-12695.json b/2020/CVE-2020-12695.json index 9bd3f382c8..a161528cd3 100644 --- a/2020/CVE-2020-12695.json +++ b/2020/CVE-2020-12695.json @@ -13,10 +13,10 @@ "description": "Vulnerability checker for Callstranger (CVE-2020-12695)", "fork": false, "created_at": "2020-06-08T07:37:49Z", - "updated_at": "2023-04-27T20:10:40Z", + "updated_at": "2023-04-28T21:13:43Z", "pushed_at": "2021-08-07T16:48:55Z", - "stargazers_count": 388, - "watchers_count": 388, + "stargazers_count": 389, + "watchers_count": 389, "has_discussions": false, "forks_count": 69, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 69, - "watchers": 388, + "watchers": 389, "score": 0 }, { diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 4870ca1161..44c402dd98 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,12 +13,12 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2023-04-28T08:37:18Z", + "updated_at": "2023-04-28T21:06:39Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3738, - "watchers_count": 3738, + "stargazers_count": 3739, + "watchers_count": 3739, "has_discussions": false, - "forks_count": 1077, + "forks_count": 1078, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -44,8 +44,8 @@ "webshell" ], "visibility": "public", - "forks": 1077, - "watchers": 3738, + "forks": 1078, + "watchers": 3739, "score": 0 }, { diff --git a/2020/CVE-2020-35489.json b/2020/CVE-2020-35489.json index f95de2d78b..da8cb9ad93 100644 --- a/2020/CVE-2020-35489.json +++ b/2020/CVE-2020-35489.json @@ -62,5 +62,34 @@ "forks": 1, "watchers": 2, "score": 0 + }, + { + "id": 634051631, + "name": "CVE-2020-35489", + "full_name": "bod4k\/CVE-2020-35489", + "owner": { + "login": "bod4k", + "id": 37278209, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37278209?v=4", + "html_url": "https:\/\/github.com\/bod4k" + }, + "html_url": "https:\/\/github.com\/bod4k\/CVE-2020-35489", + "description": "POC for Contact Form 7 < 5.3.2 - Unrestricted File Upload (Maybe Code execution )", + "fork": false, + "created_at": "2023-04-28T22:59:53Z", + "updated_at": "2023-04-28T23:01:43Z", + "pushed_at": "2023-04-28T23:01:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-29447.json b/2021/CVE-2021-29447.json index 4c49a22025..a0dfbb29e4 100644 --- a/2021/CVE-2021-29447.json +++ b/2021/CVE-2021-29447.json @@ -158,10 +158,10 @@ "description": "Arbitrary file read controller based on CVE-2021-29447", "fork": false, "created_at": "2022-11-06T04:26:20Z", - "updated_at": "2022-11-08T13:24:21Z", + "updated_at": "2023-04-28T22:17:00Z", "pushed_at": "2022-11-11T06:27:31Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -170,7 +170,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0 }, { diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index 0ef76a1d8c..99bc43b24d 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -1039,10 +1039,10 @@ "description": "Sudo Baron Samedit Exploit", "fork": false, "created_at": "2021-03-15T17:37:02Z", - "updated_at": "2023-04-28T08:36:29Z", + "updated_at": "2023-04-28T20:38:36Z", "pushed_at": "2022-01-13T05:48:01Z", - "stargazers_count": 586, - "watchers_count": 586, + "stargazers_count": 587, + "watchers_count": 587, "has_discussions": false, "forks_count": 160, "allow_forking": true, @@ -1051,7 +1051,7 @@ "topics": [], "visibility": "public", "forks": 160, - "watchers": 586, + "watchers": 587, "score": 0 }, { diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index 4ce24e62c8..13aa07c0a7 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -221,13 +221,13 @@ "stargazers_count": 1464, "watchers_count": 1464, "has_discussions": false, - "forks_count": 485, + "forks_count": 486, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 485, + "forks": 486, "watchers": 1464, "score": 0 }, diff --git a/2022/CVE-2022-3699.json b/2022/CVE-2022-3699.json index 6ca62a0dce..e67d3ac8f1 100644 --- a/2022/CVE-2022-3699.json +++ b/2022/CVE-2022-3699.json @@ -42,10 +42,10 @@ "description": "CVE-2022-3699 with arbitrary kernel code execution capability", "fork": false, "created_at": "2022-12-25T04:34:26Z", - "updated_at": "2023-04-12T07:05:12Z", + "updated_at": "2023-04-28T23:20:44Z", "pushed_at": "2022-12-27T21:30:08Z", - "stargazers_count": 63, - "watchers_count": 63, + "stargazers_count": 64, + "watchers_count": 64, "has_discussions": false, "forks_count": 26, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 26, - "watchers": 63, + "watchers": 64, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-38181.json b/2022/CVE-2022-38181.json index b2f518da0c..4bcb7eced9 100644 --- a/2022/CVE-2022-38181.json +++ b/2022/CVE-2022-38181.json @@ -42,10 +42,10 @@ "description": "CVE-2022-38181 POC for FireTV 3rd gen Cube (gazelle)", "fork": false, "created_at": "2023-04-13T13:25:09Z", - "updated_at": "2023-04-13T13:35:38Z", + "updated_at": "2023-04-28T19:01:15Z", "pushed_at": "2023-04-13T13:29:17Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-39197.json b/2022/CVE-2022-39197.json index d14329782c..df36b9e5de 100644 --- a/2022/CVE-2022-39197.json +++ b/2022/CVE-2022-39197.json @@ -316,13 +316,13 @@ "stargazers_count": 319, "watchers_count": 319, "has_discussions": false, - "forks_count": 83, + "forks_count": 82, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 83, + "forks": 82, "watchers": 319, "score": 0 }, diff --git a/2022/CVE-2022-42045.json b/2022/CVE-2022-42045.json index 7decd17c33..8a334d5d4f 100644 --- a/2022/CVE-2022-42045.json +++ b/2022/CVE-2022-42045.json @@ -13,19 +13,19 @@ "description": null, "fork": false, "created_at": "2022-10-23T15:58:18Z", - "updated_at": "2023-04-18T13:08:16Z", + "updated_at": "2023-04-28T19:55:47Z", "pushed_at": "2022-10-24T10:13:34Z", - "stargazers_count": 33, - "watchers_count": 33, + "stargazers_count": 32, + "watchers_count": 32, "has_discussions": false, - "forks_count": 13, + "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 13, - "watchers": 33, + "forks": 12, + "watchers": 32, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-42889.json b/2022/CVE-2022-42889.json index 3961666f40..5dbc15978a 100644 --- a/2022/CVE-2022-42889.json +++ b/2022/CVE-2022-42889.json @@ -178,19 +178,19 @@ "description": "cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text version 1.10. ", "fork": false, "created_at": "2022-10-18T13:53:55Z", - "updated_at": "2023-02-22T14:25:34Z", + "updated_at": "2023-04-28T19:55:46Z", "pushed_at": "2022-10-18T14:10:07Z", - "stargazers_count": 39, - "watchers_count": 39, + "stargazers_count": 38, + "watchers_count": 38, "has_discussions": false, - "forks_count": 14, + "forks_count": 13, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 14, - "watchers": 39, + "forks": 13, + "watchers": 38, "score": 0 }, { diff --git a/2023/CVE-2023-0179.json b/2023/CVE-2023-0179.json index ab35846454..8f0655dfad 100644 --- a/2023/CVE-2023-0179.json +++ b/2023/CVE-2023-0179.json @@ -42,10 +42,10 @@ "description": "针对(CVE-2023-0179)漏洞利用 该漏洞被分配为CVE-2023-0179,影响了从5.5到6.2-rc3的所有Linux版本,该漏洞在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。", "fork": false, "created_at": "2023-03-16T02:20:52Z", - "updated_at": "2023-04-28T16:48:22Z", + "updated_at": "2023-04-28T19:02:32Z", "pushed_at": "2023-03-16T02:22:28Z", - "stargazers_count": 188, - "watchers_count": 188, + "stargazers_count": 189, + "watchers_count": 189, "has_discussions": false, "forks_count": 22, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 22, - "watchers": 188, + "watchers": 189, "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-21768.json b/2023/CVE-2023-21768.json index 0b7b0a6ea1..c51852ec5f 100644 --- a/2023/CVE-2023-21768.json +++ b/2023/CVE-2023-21768.json @@ -13,10 +13,10 @@ "description": "LPE exploit for CVE-2023-21768", "fork": false, "created_at": "2023-03-07T23:00:27Z", - "updated_at": "2023-04-26T20:50:13Z", + "updated_at": "2023-04-28T22:47:07Z", "pushed_at": "2023-03-10T08:58:44Z", - "stargazers_count": 389, - "watchers_count": 389, + "stargazers_count": 390, + "watchers_count": 390, "has_discussions": false, "forks_count": 146, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 146, - "watchers": 389, + "watchers": 390, "score": 0 }, { diff --git a/2023/CVE-2023-25136.json b/2023/CVE-2023-25136.json index 29869d4104..adcb9375de 100644 --- a/2023/CVE-2023-25136.json +++ b/2023/CVE-2023-25136.json @@ -71,10 +71,10 @@ "description": "OpenSSH 9.1 vulnerability mass scan and exploit", "fork": false, "created_at": "2023-02-22T19:44:08Z", - "updated_at": "2023-04-20T09:51:30Z", + "updated_at": "2023-04-28T19:24:58Z", "pushed_at": "2023-03-07T10:43:36Z", - "stargazers_count": 91, - "watchers_count": 91, + "stargazers_count": 92, + "watchers_count": 92, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -83,7 +83,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 91, + "watchers": 92, "score": 0 }, { @@ -114,5 +114,34 @@ "forks": 7, "watchers": 37, "score": 0 + }, + { + "id": 634006271, + "name": "CVE-2023-25136", + "full_name": "nhakobyan685\/CVE-2023-25136", + "owner": { + "login": "nhakobyan685", + "id": 118097522, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118097522?v=4", + "html_url": "https:\/\/github.com\/nhakobyan685" + }, + "html_url": "https:\/\/github.com\/nhakobyan685\/CVE-2023-25136", + "description": "OpenSSH 9.1 vulnerability mass scan and exploit", + "fork": false, + "created_at": "2023-04-28T19:46:03Z", + "updated_at": "2023-04-28T20:28:08Z", + "pushed_at": "2023-04-28T20:29:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-29007.json b/2023/CVE-2023-29007.json index 6e86319cc7..937581fb41 100644 --- a/2023/CVE-2023-29007.json +++ b/2023/CVE-2023-29007.json @@ -18,7 +18,7 @@ "stargazers_count": 9, "watchers_count": 9, "has_discussions": false, - "forks_count": 6, + "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -26,7 +26,7 @@ "cve" ], "visibility": "public", - "forks": 6, + "forks": 7, "watchers": 9, "score": 0 } diff --git a/2023/CVE-2023-29489.json b/2023/CVE-2023-29489.json index d1687c9edb..9ccbb69170 100644 --- a/2023/CVE-2023-29489.json +++ b/2023/CVE-2023-29489.json @@ -42,10 +42,10 @@ "description": null, "fork": false, "created_at": "2023-04-27T20:51:47Z", - "updated_at": "2023-04-27T20:51:48Z", + "updated_at": "2023-04-28T21:29:10Z", "pushed_at": "2023-04-27T21:17:52Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -54,7 +54,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 }, { diff --git a/README.md b/README.md index 4ce7322fe9..00d19bf6e4 100644 --- a/README.md +++ b/README.md @@ -631,6 +631,7 @@ OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options. - [ticofookfook/CVE-2023-25136](https://github.com/ticofookfook/CVE-2023-25136) - [Christbowel/CVE-2023-25136](https://github.com/Christbowel/CVE-2023-25136) - [adhikara13/CVE-2023-25136](https://github.com/adhikara13/CVE-2023-25136) +- [nhakobyan685/CVE-2023-25136](https://github.com/nhakobyan685/CVE-2023-25136) ### CVE-2023-25194 (2023-02-07) @@ -19370,6 +19371,7 @@ The contact-form-7 (aka Contact Form 7) plugin before 5.3.2 for WordPress allows - [dn9uy3n/Check-WP-CVE-2020-35489](https://github.com/dn9uy3n/Check-WP-CVE-2020-35489) - [X0UCYB3R/Check-WP-CVE-2020-35489](https://github.com/X0UCYB3R/Check-WP-CVE-2020-35489) +- [bod4k/CVE-2020-35489](https://github.com/bod4k/CVE-2020-35489) ### CVE-2020-35498 (2021-02-11)