[ { "id": 276101400, "name": "CVE-2006-3392", "full_name": "0xtz\/CVE-2006-3392", "owner": { "login": "0xtz", "id": 53442065, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53442065?v=4", "html_url": "https:\/\/github.com\/0xtz" }, "html_url": "https:\/\/github.com\/0xtz\/CVE-2006-3392", "description": "Webmin < 1.290 \/ Usermin < 1.220 - Arbitrary File Disclosure (Python3)", "fork": false, "created_at": "2020-06-30T13:07:31Z", "updated_at": "2020-08-05T16:17:06Z", "pushed_at": "2020-06-30T22:21:46Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 318499385, "name": "CVE-2006-3392", "full_name": "IvanGlinkin\/CVE-2006-3392", "owner": { "login": "IvanGlinkin", "id": 64857726, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64857726?v=4", "html_url": "https:\/\/github.com\/IvanGlinkin" }, "html_url": "https:\/\/github.com\/IvanGlinkin\/CVE-2006-3392", "description": "This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function will help you to get only the important information.", "fork": false, "created_at": "2020-12-04T11:44:22Z", "updated_at": "2022-02-13T23:05:32Z", "pushed_at": "2020-12-04T12:19:11Z", "stargazers_count": 10, "watchers_count": 10, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 10, "score": 0 }, { "id": 424360665, "name": "CVE-2006-3392", "full_name": "Adel-kaka-dz\/CVE-2006-3392", "owner": { "login": "Adel-kaka-dz", "id": 65834056, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65834056?v=4", "html_url": "https:\/\/github.com\/Adel-kaka-dz" }, "html_url": "https:\/\/github.com\/Adel-kaka-dz\/CVE-2006-3392", "description": "It is a simple tool to exploit local file include . vulnerabilities", "fork": false, "created_at": "2021-11-03T19:51:31Z", "updated_at": "2021-11-03T20:25:42Z", "pushed_at": "2021-11-03T20:25:39Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 427745120, "name": "ExploitWebmin", "full_name": "gb21oc\/ExploitWebmin", "owner": { "login": "gb21oc", "id": 66036094, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66036094?v=4", "html_url": "https:\/\/github.com\/gb21oc" }, "html_url": "https:\/\/github.com\/gb21oc\/ExploitWebmin", "description": "Python script to exploit webmin vulnerability cve-2006-3392", "fork": false, "created_at": "2021-11-13T18:40:15Z", "updated_at": "2021-11-13T18:42:47Z", "pushed_at": "2021-11-13T18:42:45Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 440387641, "name": "CVE-2006-3392", "full_name": "kernel-cyber\/CVE-2006-3392", "owner": { "login": "kernel-cyber", "id": 21226709, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21226709?v=4", "html_url": "https:\/\/github.com\/kernel-cyber" }, "html_url": "https:\/\/github.com\/kernel-cyber\/CVE-2006-3392", "description": "Webmin Local File Include (unauthenticated)", "fork": false, "created_at": "2021-12-21T04:18:21Z", "updated_at": "2021-12-21T04:43:07Z", "pushed_at": "2022-09-15T15:49:59Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 } ]