2021-02-03 12:09:51 +09:00
[
2021-08-01 06:14:16 +09:00
{
"id" : 276101400 ,
"name" : "CVE-2006-3392" ,
"full_name" : "0xtz\/CVE-2006-3392" ,
"owner" : {
"login" : "0xtz" ,
"id" : 53442065 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/53442065?v=4" ,
"html_url" : "https:\/\/github.com\/0xtz"
} ,
"html_url" : "https:\/\/github.com\/0xtz\/CVE-2006-3392" ,
"description" : "Webmin < 1.290 \/ Usermin < 1.220 - Arbitrary File Disclosure (Python3)" ,
"fork" : false ,
"created_at" : "2020-06-30T13:07:31Z" ,
"updated_at" : "2020-08-05T16:17:06Z" ,
"pushed_at" : "2020-06-30T22:21:46Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2021-10-13 18:15:44 +09:00
"forks_count" : 1 ,
2021-09-14 06:12:57 +09:00
"allow_forking" : true ,
2021-10-07 06:13:51 +09:00
"is_template" : false ,
"topics" : [ ] ,
2021-10-02 06:13:10 +09:00
"visibility" : "public" ,
2021-10-13 18:15:44 +09:00
"forks" : 1 ,
2021-08-01 06:14:16 +09:00
"watchers" : 1 ,
2021-02-03 12:09:51 +09:00
"score" : 0
2021-08-01 06:14:16 +09:00
} ,
{
"id" : 318499385 ,
"name" : "CVE-2006-3392" ,
"full_name" : "IvanGlinkin\/CVE-2006-3392" ,
"owner" : {
"login" : "IvanGlinkin" ,
"id" : 64857726 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/64857726?v=4" ,
"html_url" : "https:\/\/github.com\/IvanGlinkin"
} ,
"html_url" : "https:\/\/github.com\/IvanGlinkin\/CVE-2006-3392" ,
"description" : "This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function will help you to get only the important information." ,
"fork" : false ,
"created_at" : "2020-12-04T11:44:22Z" ,
2021-12-27 21:13:33 +09:00
"updated_at" : "2021-12-27T11:23:54Z" ,
2021-08-01 06:14:16 +09:00
"pushed_at" : "2020-12-04T12:19:11Z" ,
2021-12-27 21:13:33 +09:00
"stargazers_count" : 9 ,
"watchers_count" : 9 ,
2021-08-01 06:14:16 +09:00
"forks_count" : 1 ,
2021-09-14 06:12:57 +09:00
"allow_forking" : true ,
2021-10-07 06:13:51 +09:00
"is_template" : false ,
"topics" : [ ] ,
2021-10-02 06:13:10 +09:00
"visibility" : "public" ,
2021-08-01 06:14:16 +09:00
"forks" : 1 ,
2021-12-27 21:13:33 +09:00
"watchers" : 9 ,
2021-08-01 06:14:16 +09:00
"score" : 0
2021-11-04 09:12:52 +09:00
} ,
2022-02-05 03:14:14 +09:00
{
"id" : 337509859 ,
"name" : "CVE-2006-3392" ,
"full_name" : "xen00rw\/CVE-2006-3392" ,
"owner" : {
"login" : "xen00rw" ,
"id" : 70721608 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/70721608?v=4" ,
"html_url" : "https:\/\/github.com\/xen00rw"
} ,
"html_url" : "https:\/\/github.com\/xen00rw\/CVE-2006-3392" ,
"description" : "Script to get files from the server in a vulnerable Webmin Service. Simple and easy to use." ,
"fork" : false ,
"created_at" : "2021-02-09T19:13:59Z" ,
"updated_at" : "2022-02-04T13:36:34Z" ,
"pushed_at" : "2021-02-12T15:01:54Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"script" ,
"webmin"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
2021-11-04 09:12:52 +09:00
{
"id" : 424360665 ,
"name" : "CVE-2006-3392" ,
"full_name" : "Adel-kaka-dz\/CVE-2006-3392" ,
"owner" : {
"login" : "Adel-kaka-dz" ,
"id" : 65834056 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/65834056?v=4" ,
"html_url" : "https:\/\/github.com\/Adel-kaka-dz"
} ,
"html_url" : "https:\/\/github.com\/Adel-kaka-dz\/CVE-2006-3392" ,
"description" : "It is a simple tool to exploit local file include . vulnerabilities" ,
"fork" : false ,
"created_at" : "2021-11-03T19:51:31Z" ,
"updated_at" : "2021-11-03T20:25:42Z" ,
"pushed_at" : "2021-11-03T20:25:39Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-11-14 09:12:54 +09:00
} ,
{
"id" : 427745120 ,
"name" : "ExploitWebmin" ,
"full_name" : "gb21oc\/ExploitWebmin" ,
"owner" : {
"login" : "gb21oc" ,
"id" : 66036094 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/66036094?v=4" ,
"html_url" : "https:\/\/github.com\/gb21oc"
} ,
"html_url" : "https:\/\/github.com\/gb21oc\/ExploitWebmin" ,
"description" : "Python script to exploit webmin vulnerability cve-2006-3392" ,
"fork" : false ,
"created_at" : "2021-11-13T18:40:15Z" ,
"updated_at" : "2021-11-13T18:42:47Z" ,
"pushed_at" : "2021-11-13T18:42:45Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-12-21 15:13:46 +09:00
} ,
{
"id" : 440387641 ,
"name" : "CVE-2006-3392" ,
"full_name" : "windsormoreira\/CVE-2006-3392" ,
"owner" : {
"login" : "windsormoreira" ,
"id" : 21226709 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/21226709?v=4" ,
"html_url" : "https:\/\/github.com\/windsormoreira"
} ,
"html_url" : "https:\/\/github.com\/windsormoreira\/CVE-2006-3392" ,
"description" : "Webmin Local File Include (unauthenticated)" ,
"fork" : false ,
"created_at" : "2021-12-21T04:18:21Z" ,
"updated_at" : "2021-12-21T04:43:07Z" ,
"pushed_at" : "2021-12-21T04:43:04Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-02-03 12:09:51 +09:00
}
]