Auto Update 2023/12/28 18:39:40

This commit is contained in:
motikan2010-bot 2023-12-29 03:39:40 +09:00
parent e1b5b95caa
commit abfd8e9df2
37 changed files with 218 additions and 148 deletions

32
2006/CVE-2006-2842.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 736683121,
"name": "CVE-2006-2842",
"full_name": "karthi-the-hacker\/CVE-2006-2842",
"owner": {
"login": "karthi-the-hacker",
"id": 33289300,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33289300?v=4",
"html_url": "https:\/\/github.com\/karthi-the-hacker"
},
"html_url": "https:\/\/github.com\/karthi-the-hacker\/CVE-2006-2842",
"description": "CVE-2006-2842 is a powerful scanner for bug bounty hunters and penetration testers to discover vulnerabilities in their web applications.",
"fork": false,
"created_at": "2023-12-28T15:17:56Z",
"updated_at": "2023-12-28T15:20:03Z",
"pushed_at": "2023-12-28T15:24:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,12 +43,12 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-12-27T08:25:22Z", "updated_at": "2023-12-28T15:43:55Z",
"pushed_at": "2023-11-24T09:21:56Z", "pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1857, "stargazers_count": 1859,
"watchers_count": 1857, "watchers_count": 1859,
"has_discussions": false, "has_discussions": false,
"forks_count": 339, "forks_count": 340,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -75,8 +75,8 @@
"cve-2020-2883" "cve-2020-2883"
], ],
"visibility": "public", "visibility": "public",
"forks": 339, "forks": 340,
"watchers": 1857, "watchers": 1859,
"score": 0, "score": 0,
"subscribers_count": 35 "subscribers_count": 35
}, },

View file

@ -13,12 +13,12 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-12-27T08:25:22Z", "updated_at": "2023-12-28T15:43:55Z",
"pushed_at": "2023-11-24T09:21:56Z", "pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1857, "stargazers_count": 1859,
"watchers_count": 1857, "watchers_count": 1859,
"has_discussions": false, "has_discussions": false,
"forks_count": 339, "forks_count": 340,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -45,8 +45,8 @@
"cve-2020-2883" "cve-2020-2883"
], ],
"visibility": "public", "visibility": "public",
"forks": 339, "forks": 340,
"watchers": 1857, "watchers": 1859,
"score": 0, "score": 0,
"subscribers_count": 35 "subscribers_count": 35
}, },

View file

@ -13,10 +13,10 @@
"description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability", "description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability",
"fork": false, "fork": false,
"created_at": "2017-10-09T15:13:25Z", "created_at": "2017-10-09T15:13:25Z",
"updated_at": "2023-12-14T13:29:19Z", "updated_at": "2023-12-28T17:10:03Z",
"pushed_at": "2021-07-29T12:00:48Z", "pushed_at": "2021-07-29T12:00:48Z",
"stargazers_count": 128, "stargazers_count": 129,
"watchers_count": 128, "watchers_count": 129,
"has_discussions": false, "has_discussions": false,
"forks_count": 55, "forks_count": 55,
"allow_forking": true, "allow_forking": true,
@ -31,7 +31,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 55, "forks": 55,
"watchers": 128, "watchers": 129,
"score": 0, "score": 0,
"subscribers_count": 11 "subscribers_count": 11
}, },

View file

@ -43,12 +43,12 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-12-27T08:25:22Z", "updated_at": "2023-12-28T15:43:55Z",
"pushed_at": "2023-11-24T09:21:56Z", "pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1857, "stargazers_count": 1859,
"watchers_count": 1857, "watchers_count": 1859,
"has_discussions": false, "has_discussions": false,
"forks_count": 339, "forks_count": 340,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -75,8 +75,8 @@
"cve-2020-2883" "cve-2020-2883"
], ],
"visibility": "public", "visibility": "public",
"forks": 339, "forks": 340,
"watchers": 1857, "watchers": 1859,
"score": 0, "score": 0,
"subscribers_count": 35 "subscribers_count": 35
}, },

View file

@ -27,6 +27,6 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 1
} }
] ]

View file

@ -18,13 +18,13 @@
"stargazers_count": 2, "stargazers_count": 2,
"watchers_count": 2, "watchers_count": 2,
"has_discussions": false, "has_discussions": false,
"forks_count": 7, "forks_count": 8,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 7, "forks": 8,
"watchers": 2, "watchers": 2,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0

View file

@ -587,12 +587,12 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-12-27T08:25:22Z", "updated_at": "2023-12-28T15:43:55Z",
"pushed_at": "2023-11-24T09:21:56Z", "pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1857, "stargazers_count": 1859,
"watchers_count": 1857, "watchers_count": 1859,
"has_discussions": false, "has_discussions": false,
"forks_count": 339, "forks_count": 340,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -619,8 +619,8 @@
"cve-2020-2883" "cve-2020-2883"
], ],
"visibility": "public", "visibility": "public",
"forks": 339, "forks": 340,
"watchers": 1857, "watchers": 1859,
"score": 0, "score": 0,
"subscribers_count": 35 "subscribers_count": 35
}, },

View file

@ -18,13 +18,13 @@
"stargazers_count": 347, "stargazers_count": 347,
"watchers_count": 347, "watchers_count": 347,
"has_discussions": false, "has_discussions": false,
"forks_count": 84, "forks_count": 83,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 84, "forks": 83,
"watchers": 347, "watchers": 347,
"score": 0, "score": 0,
"subscribers_count": 12 "subscribers_count": 12

View file

@ -193,12 +193,12 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-12-27T08:25:22Z", "updated_at": "2023-12-28T15:43:55Z",
"pushed_at": "2023-11-24T09:21:56Z", "pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1857, "stargazers_count": 1859,
"watchers_count": 1857, "watchers_count": 1859,
"has_discussions": false, "has_discussions": false,
"forks_count": 339, "forks_count": 340,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -225,8 +225,8 @@
"cve-2020-2883" "cve-2020-2883"
], ],
"visibility": "public", "visibility": "public",
"forks": 339, "forks": 340,
"watchers": 1857, "watchers": 1859,
"score": 0, "score": 0,
"subscribers_count": 35 "subscribers_count": 35
} }

View file

@ -43,10 +43,10 @@
"description": "PoC for CVE-2019-5736", "description": "PoC for CVE-2019-5736",
"fork": false, "fork": false,
"created_at": "2019-02-13T05:26:32Z", "created_at": "2019-02-13T05:26:32Z",
"updated_at": "2023-12-28T03:28:33Z", "updated_at": "2023-12-28T13:09:42Z",
"pushed_at": "2022-01-05T04:09:42Z", "pushed_at": "2022-01-05T04:09:42Z",
"stargazers_count": 628, "stargazers_count": 629,
"watchers_count": 628, "watchers_count": 629,
"has_discussions": false, "has_discussions": false,
"forks_count": 172, "forks_count": 172,
"allow_forking": true, "allow_forking": true,
@ -55,7 +55,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 172, "forks": 172,
"watchers": 628, "watchers": 629,
"score": 0, "score": 0,
"subscribers_count": 13 "subscribers_count": 13
}, },

View file

@ -13,12 +13,12 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-12-27T08:25:22Z", "updated_at": "2023-12-28T15:43:55Z",
"pushed_at": "2023-11-24T09:21:56Z", "pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1857, "stargazers_count": 1859,
"watchers_count": 1857, "watchers_count": 1859,
"has_discussions": false, "has_discussions": false,
"forks_count": 339, "forks_count": 340,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -45,8 +45,8 @@
"cve-2020-2883" "cve-2020-2883"
], ],
"visibility": "public", "visibility": "public",
"forks": 339, "forks": 340,
"watchers": 1857, "watchers": 1859,
"score": 0, "score": 0,
"subscribers_count": 35 "subscribers_count": 35
}, },

View file

@ -13,10 +13,10 @@
"description": "IBM Maximo Asset Management is vulnerable to Information Disclosure via XXE Vulnerability (CVE-2020-4463)", "description": "IBM Maximo Asset Management is vulnerable to Information Disclosure via XXE Vulnerability (CVE-2020-4463)",
"fork": false, "fork": false,
"created_at": "2020-08-13T09:03:40Z", "created_at": "2020-08-13T09:03:40Z",
"updated_at": "2023-12-08T01:45:58Z", "updated_at": "2023-12-28T12:31:34Z",
"pushed_at": "2023-09-19T10:38:28Z", "pushed_at": "2023-09-19T10:38:28Z",
"stargazers_count": 49, "stargazers_count": 48,
"watchers_count": 49, "watchers_count": 48,
"has_discussions": false, "has_discussions": false,
"forks_count": 16, "forks_count": 16,
"allow_forking": true, "allow_forking": true,
@ -31,7 +31,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 16, "forks": 16,
"watchers": 49, "watchers": 48,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-8554: Man in the middle using LoadBalancer or ExternalIPs", "description": "CVE-2020-8554: Man in the middle using LoadBalancer or ExternalIPs",
"fork": false, "fork": false,
"created_at": "2020-12-01T16:58:39Z", "created_at": "2020-12-01T16:58:39Z",
"updated_at": "2021-12-16T10:30:25Z", "updated_at": "2023-12-28T16:33:55Z",
"pushed_at": "2021-12-31T12:02:38Z", "pushed_at": "2021-12-31T12:02:38Z",
"stargazers_count": 4, "stargazers_count": 3,
"watchers_count": 4, "watchers_count": 3,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 3,
"watchers": 4, "watchers": 3,
"score": 0, "score": 0,
"subscribers_count": 28 "subscribers_count": 28
}, },

View file

@ -172,10 +172,10 @@
"description": "Local Privilege Escalation Edition for CVE-2021-1675\/CVE-2021-34527", "description": "Local Privilege Escalation Edition for CVE-2021-1675\/CVE-2021-34527",
"fork": false, "fork": false,
"created_at": "2021-07-01T09:47:13Z", "created_at": "2021-07-01T09:47:13Z",
"updated_at": "2023-12-20T04:04:07Z", "updated_at": "2023-12-28T17:43:01Z",
"pushed_at": "2021-07-05T06:46:12Z", "pushed_at": "2021-07-05T06:46:12Z",
"stargazers_count": 331, "stargazers_count": 332,
"watchers_count": 331, "watchers_count": 332,
"has_discussions": false, "has_discussions": false,
"forks_count": 79, "forks_count": 79,
"allow_forking": true, "allow_forking": true,
@ -193,7 +193,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 79, "forks": 79,
"watchers": 331, "watchers": 332,
"score": 0, "score": 0,
"subscribers_count": 14 "subscribers_count": 14
}, },

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2021-3129", "description": "Exploit for CVE-2021-3129",
"fork": false, "fork": false,
"created_at": "2021-01-13T12:52:20Z", "created_at": "2021-01-13T12:52:20Z",
"updated_at": "2023-12-26T21:27:42Z", "updated_at": "2023-12-28T16:20:08Z",
"pushed_at": "2021-01-29T13:59:07Z", "pushed_at": "2021-01-29T13:59:07Z",
"stargazers_count": 255, "stargazers_count": 256,
"watchers_count": 255, "watchers_count": 256,
"has_discussions": false, "has_discussions": false,
"forks_count": 70, "forks_count": 70,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 70, "forks": 70,
"watchers": 255, "watchers": 256,
"score": 0, "score": 0,
"subscribers_count": 14 "subscribers_count": 14
}, },
@ -347,10 +347,10 @@
"description": "Laravel RCE (CVE-2021-3129)", "description": "Laravel RCE (CVE-2021-3129)",
"fork": false, "fork": false,
"created_at": "2022-04-16T17:22:55Z", "created_at": "2022-04-16T17:22:55Z",
"updated_at": "2023-12-28T07:19:50Z", "updated_at": "2023-12-28T16:36:00Z",
"pushed_at": "2023-11-22T09:28:49Z", "pushed_at": "2023-11-22T09:28:49Z",
"stargazers_count": 54, "stargazers_count": 55,
"watchers_count": 54, "watchers_count": 55,
"has_discussions": false, "has_discussions": false,
"forks_count": 15, "forks_count": 15,
"allow_forking": true, "allow_forking": true,
@ -368,7 +368,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 15, "forks": 15,
"watchers": 54, "watchers": 55,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -223,10 +223,10 @@
"description": "CVE-2021-40444 PoC", "description": "CVE-2021-40444 PoC",
"fork": false, "fork": false,
"created_at": "2021-09-10T16:55:53Z", "created_at": "2021-09-10T16:55:53Z",
"updated_at": "2023-12-20T04:06:03Z", "updated_at": "2023-12-28T16:02:46Z",
"pushed_at": "2021-12-25T18:31:02Z", "pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1496, "stargazers_count": 1497,
"watchers_count": 1496, "watchers_count": 1497,
"has_discussions": false, "has_discussions": false,
"forks_count": 490, "forks_count": 490,
"allow_forking": true, "allow_forking": true,
@ -235,7 +235,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 490, "forks": 490,
"watchers": 1496, "watchers": 1497,
"score": 0, "score": 0,
"subscribers_count": 28 "subscribers_count": 28
}, },
@ -523,10 +523,10 @@
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit", "description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false, "fork": false,
"created_at": "2021-09-15T22:34:35Z", "created_at": "2021-09-15T22:34:35Z",
"updated_at": "2023-12-25T07:25:06Z", "updated_at": "2023-12-28T16:02:49Z",
"pushed_at": "2023-10-11T18:44:51Z", "pushed_at": "2023-10-11T18:44:51Z",
"stargazers_count": 765, "stargazers_count": 766,
"watchers_count": 765, "watchers_count": 766,
"has_discussions": false, "has_discussions": false,
"forks_count": 173, "forks_count": 173,
"allow_forking": true, "allow_forking": true,
@ -542,7 +542,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 173, "forks": 173,
"watchers": 765, "watchers": 766,
"score": 0, "score": 0,
"subscribers_count": 19 "subscribers_count": 19
}, },

View file

@ -13,10 +13,10 @@
"description": "A demo exploit for CVE-2021-44026, a SQL injection in Roundcube", "description": "A demo exploit for CVE-2021-44026, a SQL injection in Roundcube",
"fork": false, "fork": false,
"created_at": "2023-11-14T11:32:36Z", "created_at": "2023-11-14T11:32:36Z",
"updated_at": "2023-12-27T11:50:11Z", "updated_at": "2023-12-28T18:03:55Z",
"pushed_at": "2023-12-22T11:29:43Z", "pushed_at": "2023-12-22T11:29:43Z",
"stargazers_count": 1, "stargazers_count": 3,
"watchers_count": 1, "watchers_count": 3,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 1, "watchers": 3,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -919,10 +919,10 @@
"description": "CVE-2022-22965\\Spring-Core-RCE堪比关于 Apache Log4j2核弹级别漏洞exp的rce一键利用", "description": "CVE-2022-22965\\Spring-Core-RCE堪比关于 Apache Log4j2核弹级别漏洞exp的rce一键利用",
"fork": false, "fork": false,
"created_at": "2022-04-02T09:13:54Z", "created_at": "2022-04-02T09:13:54Z",
"updated_at": "2023-12-28T08:36:18Z", "updated_at": "2023-12-28T15:17:22Z",
"pushed_at": "2022-04-02T10:14:11Z", "pushed_at": "2022-04-02T10:14:11Z",
"stargazers_count": 12, "stargazers_count": 13,
"watchers_count": 12, "watchers_count": 13,
"has_discussions": false, "has_discussions": false,
"forks_count": 7, "forks_count": 7,
"allow_forking": true, "allow_forking": true,
@ -931,7 +931,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 7, "forks": 7,
"watchers": 12, "watchers": 13,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -13,10 +13,10 @@
"description": "HTTP3-attacks (CVE-2022-30592)", "description": "HTTP3-attacks (CVE-2022-30592)",
"fork": false, "fork": false,
"created_at": "2022-08-06T09:57:43Z", "created_at": "2022-08-06T09:57:43Z",
"updated_at": "2023-12-12T08:17:04Z", "updated_at": "2023-12-28T13:20:31Z",
"pushed_at": "2022-12-18T03:36:03Z", "pushed_at": "2022-12-18T03:36:03Z",
"stargazers_count": 65, "stargazers_count": 66,
"watchers_count": 65, "watchers_count": 66,
"has_discussions": false, "has_discussions": false,
"forks_count": 20, "forks_count": 20,
"allow_forking": true, "allow_forking": true,
@ -30,7 +30,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 20, "forks": 20,
"watchers": 65, "watchers": 66,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
} }

View file

@ -13,19 +13,19 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2022-07-19T12:46:45Z", "created_at": "2022-07-19T12:46:45Z",
"updated_at": "2023-12-27T09:57:09Z", "updated_at": "2023-12-28T14:04:01Z",
"pushed_at": "2022-09-06T14:05:22Z", "pushed_at": "2022-09-06T14:05:22Z",
"stargazers_count": 242, "stargazers_count": 241,
"watchers_count": 242, "watchers_count": 241,
"has_discussions": false, "has_discussions": false,
"forks_count": 38, "forks_count": 39,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 38, "forks": 39,
"watchers": 242, "watchers": 241,
"score": 0, "score": 0,
"subscribers_count": 13 "subscribers_count": 13
}, },

View file

@ -13,10 +13,10 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692", "description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false, "fork": false,
"created_at": "2023-06-10T08:31:26Z", "created_at": "2023-06-10T08:31:26Z",
"updated_at": "2023-12-28T02:38:52Z", "updated_at": "2023-12-28T17:15:24Z",
"pushed_at": "2023-12-01T16:28:38Z", "pushed_at": "2023-12-01T16:28:38Z",
"stargazers_count": 137, "stargazers_count": 138,
"watchers_count": 137, "watchers_count": 138,
"has_discussions": true, "has_discussions": true,
"forks_count": 20, "forks_count": 20,
"allow_forking": true, "allow_forking": true,
@ -28,7 +28,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 20, "forks": 20,
"watchers": 137, "watchers": 138,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
} }

View file

@ -14,17 +14,17 @@
"fork": false, "fork": false,
"created_at": "2023-04-13T02:56:24Z", "created_at": "2023-04-13T02:56:24Z",
"updated_at": "2023-04-13T02:56:31Z", "updated_at": "2023-04-13T02:56:31Z",
"pushed_at": "2023-04-13T06:32:28Z", "pushed_at": "2023-12-28T14:49:04Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 1,
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "A proof of concept for CVE-20231326 in apport-cli 2.26.0", "description": "A proof of concept for CVE-20231326 in apport-cli 2.26.0",
"fork": false, "fork": false,
"created_at": "2023-12-06T00:07:40Z", "created_at": "2023-12-06T00:07:40Z",
"updated_at": "2023-12-24T21:16:14Z", "updated_at": "2023-12-28T15:11:00Z",
"pushed_at": "2023-12-06T12:46:08Z", "pushed_at": "2023-12-06T12:46:08Z",
"stargazers_count": 8, "stargazers_count": 9,
"watchers_count": 8, "watchers_count": 9,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 8, "watchers": 9,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -499,10 +499,10 @@
"description": "配合 CVE-2023-22515 后台上传jar包实现RCE", "description": "配合 CVE-2023-22515 后台上传jar包实现RCE",
"fork": false, "fork": false,
"created_at": "2023-11-09T12:55:25Z", "created_at": "2023-11-09T12:55:25Z",
"updated_at": "2023-12-14T07:00:43Z", "updated_at": "2023-12-28T18:31:49Z",
"pushed_at": "2023-11-09T14:21:58Z", "pushed_at": "2023-11-09T14:21:58Z",
"stargazers_count": 9, "stargazers_count": 10,
"watchers_count": 9, "watchers_count": 10,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -511,7 +511,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 9, "watchers": 10,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -13,10 +13,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2023-09-04T07:48:13Z", "created_at": "2023-09-04T07:48:13Z",
"updated_at": "2023-12-27T10:01:35Z", "updated_at": "2023-12-28T15:49:49Z",
"pushed_at": "2023-09-04T07:51:58Z", "pushed_at": "2023-09-04T07:51:58Z",
"stargazers_count": 119, "stargazers_count": 120,
"watchers_count": 119, "watchers_count": 120,
"has_discussions": false, "has_discussions": false,
"forks_count": 32, "forks_count": 32,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 32, "forks": 32,
"watchers": 119, "watchers": 120,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -43,10 +43,10 @@
"description": "Ubuntu Privilege Escalation bash one-liner using CVE-2023-32629 & CVE-2023-2640", "description": "Ubuntu Privilege Escalation bash one-liner using CVE-2023-32629 & CVE-2023-2640",
"fork": false, "fork": false,
"created_at": "2023-11-09T09:19:23Z", "created_at": "2023-11-09T09:19:23Z",
"updated_at": "2023-12-24T08:44:47Z", "updated_at": "2023-12-28T12:35:52Z",
"pushed_at": "2023-11-15T08:35:06Z", "pushed_at": "2023-11-15T08:35:06Z",
"stargazers_count": 95, "stargazers_count": 96,
"watchers_count": 95, "watchers_count": 96,
"has_discussions": false, "has_discussions": false,
"forks_count": 17, "forks_count": 17,
"allow_forking": true, "allow_forking": true,
@ -55,7 +55,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 17, "forks": 17,
"watchers": 95, "watchers": 96,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -18,7 +18,7 @@
"stargazers_count": 85, "stargazers_count": 85,
"watchers_count": 85, "watchers_count": 85,
"has_discussions": false, "has_discussions": false,
"forks_count": 14, "forks_count": 15,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -27,7 +27,7 @@
"vulnerability" "vulnerability"
], ],
"visibility": "public", "visibility": "public",
"forks": 14, "forks": 15,
"watchers": 85, "watchers": 85,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3

View file

@ -13,10 +13,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2023-12-19T11:21:12Z", "created_at": "2023-12-19T11:21:12Z",
"updated_at": "2023-12-24T18:04:12Z", "updated_at": "2023-12-28T12:37:52Z",
"pushed_at": "2023-12-24T10:47:00Z", "pushed_at": "2023-12-24T10:47:00Z",
"stargazers_count": 6, "stargazers_count": 7,
"watchers_count": 6, "watchers_count": 7,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 6, "watchers": 7,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -13,10 +13,10 @@
"description": "CrushFTP <= 10.5.1 Remote Code Execution. Researchers: Ryan Emmons, Evan Malamis", "description": "CrushFTP <= 10.5.1 Remote Code Execution. Researchers: Ryan Emmons, Evan Malamis",
"fork": false, "fork": false,
"created_at": "2023-12-27T00:06:20Z", "created_at": "2023-12-27T00:06:20Z",
"updated_at": "2023-12-28T01:51:17Z", "updated_at": "2023-12-28T16:08:19Z",
"pushed_at": "2023-12-27T23:24:43Z", "pushed_at": "2023-12-27T23:24:43Z",
"stargazers_count": 3, "stargazers_count": 4,
"watchers_count": 3, "watchers_count": 4,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 3, "watchers": 4,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -242,7 +242,7 @@
"fork": false, "fork": false,
"created_at": "2023-11-08T20:56:22Z", "created_at": "2023-11-08T20:56:22Z",
"updated_at": "2023-12-21T07:11:51Z", "updated_at": "2023-12-21T07:11:51Z",
"pushed_at": "2023-12-25T09:18:20Z", "pushed_at": "2023-12-28T16:12:15Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2023-09-21T05:22:51Z", "created_at": "2023-09-21T05:22:51Z",
"updated_at": "2023-12-27T11:17:24Z", "updated_at": "2023-12-28T15:05:47Z",
"pushed_at": "2023-12-18T04:25:00Z", "pushed_at": "2023-12-18T04:25:00Z",
"stargazers_count": 263, "stargazers_count": 264,
"watchers_count": 263, "watchers_count": 264,
"has_discussions": false, "has_discussions": false,
"forks_count": 42, "forks_count": 42,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 42, "forks": 42,
"watchers": 263, "watchers": 264,
"score": 0, "score": 0,
"subscribers_count": 13 "subscribers_count": 13
}, },

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-50254: PoC Exploit for Deepin-reader RCE that affects unpatched Deepin Linux Desktops. Deepin Linux's default document reader \"deepin-reader\" software suffers from a serious vulnerability due to a design flaw that leads to Remote Command Execution via crafted docx document.", "description": "CVE-2023-50254: PoC Exploit for Deepin-reader RCE that affects unpatched Deepin Linux Desktops. Deepin Linux's default document reader \"deepin-reader\" software suffers from a serious vulnerability due to a design flaw that leads to Remote Command Execution via crafted docx document.",
"fork": false, "fork": false,
"created_at": "2023-12-22T06:50:28Z", "created_at": "2023-12-22T06:50:28Z",
"updated_at": "2023-12-28T08:41:06Z", "updated_at": "2023-12-28T14:35:25Z",
"pushed_at": "2023-12-22T06:59:34Z", "pushed_at": "2023-12-22T06:59:34Z",
"stargazers_count": 8, "stargazers_count": 9,
"watchers_count": 8, "watchers_count": 9,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 8, "watchers": 9,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
} }

View file

@ -208,5 +208,35 @@
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 736713584,
"name": "CVE-2023-51385_test-star-main",
"full_name": "siyi-star\/CVE-2023-51385_test-star-main",
"owner": {
"login": "siyi-star",
"id": 60383315,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60383315?v=4",
"html_url": "https:\/\/github.com\/siyi-star"
},
"html_url": "https:\/\/github.com\/siyi-star\/CVE-2023-51385_test-star-main",
"description": "CVE-2023-51385_test-star-main",
"fork": false,
"created_at": "2023-12-28T16:56:13Z",
"updated_at": "2023-12-28T16:56:13Z",
"pushed_at": "2023-12-28T17:40:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -13,10 +13,10 @@
"description": "Postfix SMTP Smuggling - Expect Script POC", "description": "Postfix SMTP Smuggling - Expect Script POC",
"fork": false, "fork": false,
"created_at": "2023-12-26T17:02:20Z", "created_at": "2023-12-26T17:02:20Z",
"updated_at": "2023-12-28T05:44:07Z", "updated_at": "2023-12-28T14:28:30Z",
"pushed_at": "2023-12-26T20:16:45Z", "pushed_at": "2023-12-26T20:16:45Z",
"stargazers_count": 2, "stargazers_count": 3,
"watchers_count": 2, "watchers_count": 3,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 2, "watchers": 3,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -13,10 +13,10 @@
"description": "Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution", "description": "Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution",
"fork": false, "fork": false,
"created_at": "2023-12-13T20:26:59Z", "created_at": "2023-12-13T20:26:59Z",
"updated_at": "2023-12-28T12:06:51Z", "updated_at": "2023-12-28T12:45:25Z",
"pushed_at": "2023-12-15T18:13:06Z", "pushed_at": "2023-12-15T18:13:06Z",
"stargazers_count": 46, "stargazers_count": 47,
"watchers_count": 46, "watchers_count": 47,
"has_discussions": false, "has_discussions": false,
"forks_count": 13, "forks_count": 13,
"allow_forking": true, "allow_forking": true,
@ -39,7 +39,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 13, "forks": 13,
"watchers": 46, "watchers": 47,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -6026,6 +6026,7 @@
- [zls1793/CVE-2023-51385_test](https://github.com/zls1793/CVE-2023-51385_test) - [zls1793/CVE-2023-51385_test](https://github.com/zls1793/CVE-2023-51385_test)
- [WLaoDuo/CVE-2023-51385_poc-test](https://github.com/WLaoDuo/CVE-2023-51385_poc-test) - [WLaoDuo/CVE-2023-51385_poc-test](https://github.com/WLaoDuo/CVE-2023-51385_poc-test)
- [zhulin2/testCVE-2023-51385](https://github.com/zhulin2/testCVE-2023-51385) - [zhulin2/testCVE-2023-51385](https://github.com/zhulin2/testCVE-2023-51385)
- [siyi-star/CVE-2023-51385_test-star-main](https://github.com/siyi-star/CVE-2023-51385_test-star-main)
### CVE-2023-51504 ### CVE-2023-51504
- [Sybelle03/CVE-2023-51504](https://github.com/Sybelle03/CVE-2023-51504) - [Sybelle03/CVE-2023-51504](https://github.com/Sybelle03/CVE-2023-51504)
@ -17080,7 +17081,7 @@
### CVE-2021-41349 (2021-11-09) ### CVE-2021-41349 (2021-11-09)
<code>Microsoft Exchange Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-42305. <code>Microsoft Exchange Server Spoofing Vulnerability
</code> </code>
- [exploit-io/CVE-2021-41349](https://github.com/exploit-io/CVE-2021-41349) - [exploit-io/CVE-2021-41349](https://github.com/exploit-io/CVE-2021-41349)
@ -17457,7 +17458,7 @@
### CVE-2021-42278 (2021-11-09) ### CVE-2021-42278 (2021-11-09)
<code>Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42282, CVE-2021-42287, CVE-2021-42291. <code>Active Directory Domain Services Elevation of Privilege Vulnerability
</code> </code>
- [safebuffer/sam-the-admin](https://github.com/safebuffer/sam-the-admin) - [safebuffer/sam-the-admin](https://github.com/safebuffer/sam-the-admin)
@ -17468,7 +17469,7 @@
### CVE-2021-42287 (2021-11-09) ### CVE-2021-42287 (2021-11-09)
<code>Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42278, CVE-2021-42282, CVE-2021-42291. <code>Active Directory Domain Services Elevation of Privilege Vulnerability
</code> </code>
- [cube0x0/noPac](https://github.com/cube0x0/noPac) - [cube0x0/noPac](https://github.com/cube0x0/noPac)
@ -38143,6 +38144,13 @@
- [Axua/CVE-2006-1236](https://github.com/Axua/CVE-2006-1236) - [Axua/CVE-2006-1236](https://github.com/Axua/CVE-2006-1236)
### CVE-2006-2842 (2006-06-06)
<code>** DISPUTED ** PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter. NOTE: this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals is enabled. Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE. However, the original developer has posted a security advisory, so there might be relevant real-world environments under which this vulnerability is applicable.
</code>
- [karthi-the-hacker/CVE-2006-2842](https://github.com/karthi-the-hacker/CVE-2006-2842)
### CVE-2006-3392 (2006-07-06) ### CVE-2006-3392 (2006-07-06)
<code>Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML, which allows remote attackers to read arbitrary files, as demonstrated using &quot;..%01&quot; sequences, which bypass the removal of &quot;../&quot; sequences before bytes such as &quot;%01&quot; are removed from the filename. NOTE: This is a different issue than CVE-2006-3274. <code>Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML, which allows remote attackers to read arbitrary files, as demonstrated using &quot;..%01&quot; sequences, which bypass the removal of &quot;../&quot; sequences before bytes such as &quot;%01&quot; are removed from the filename. NOTE: This is a different issue than CVE-2006-3274.