PoC-in-GitHub/2006/CVE-2006-3392.json
2022-02-05 03:14:14 +09:00

167 lines
No EOL
5.7 KiB
JSON

[
{
"id": 276101400,
"name": "CVE-2006-3392",
"full_name": "0xtz\/CVE-2006-3392",
"owner": {
"login": "0xtz",
"id": 53442065,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53442065?v=4",
"html_url": "https:\/\/github.com\/0xtz"
},
"html_url": "https:\/\/github.com\/0xtz\/CVE-2006-3392",
"description": "Webmin < 1.290 \/ Usermin < 1.220 - Arbitrary File Disclosure (Python3)",
"fork": false,
"created_at": "2020-06-30T13:07:31Z",
"updated_at": "2020-08-05T16:17:06Z",
"pushed_at": "2020-06-30T22:21:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 318499385,
"name": "CVE-2006-3392",
"full_name": "IvanGlinkin\/CVE-2006-3392",
"owner": {
"login": "IvanGlinkin",
"id": 64857726,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64857726?v=4",
"html_url": "https:\/\/github.com\/IvanGlinkin"
},
"html_url": "https:\/\/github.com\/IvanGlinkin\/CVE-2006-3392",
"description": "This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function will help you to get only the important information.",
"fork": false,
"created_at": "2020-12-04T11:44:22Z",
"updated_at": "2021-12-27T11:23:54Z",
"pushed_at": "2020-12-04T12:19:11Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 9,
"score": 0
},
{
"id": 337509859,
"name": "CVE-2006-3392",
"full_name": "xen00rw\/CVE-2006-3392",
"owner": {
"login": "xen00rw",
"id": 70721608,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70721608?v=4",
"html_url": "https:\/\/github.com\/xen00rw"
},
"html_url": "https:\/\/github.com\/xen00rw\/CVE-2006-3392",
"description": "Script to get files from the server in a vulnerable Webmin Service. Simple and easy to use.",
"fork": false,
"created_at": "2021-02-09T19:13:59Z",
"updated_at": "2022-02-04T13:36:34Z",
"pushed_at": "2021-02-12T15:01:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"script",
"webmin"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 424360665,
"name": "CVE-2006-3392",
"full_name": "Adel-kaka-dz\/CVE-2006-3392",
"owner": {
"login": "Adel-kaka-dz",
"id": 65834056,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65834056?v=4",
"html_url": "https:\/\/github.com\/Adel-kaka-dz"
},
"html_url": "https:\/\/github.com\/Adel-kaka-dz\/CVE-2006-3392",
"description": "It is a simple tool to exploit local file include . vulnerabilities",
"fork": false,
"created_at": "2021-11-03T19:51:31Z",
"updated_at": "2021-11-03T20:25:42Z",
"pushed_at": "2021-11-03T20:25:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 427745120,
"name": "ExploitWebmin",
"full_name": "gb21oc\/ExploitWebmin",
"owner": {
"login": "gb21oc",
"id": 66036094,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66036094?v=4",
"html_url": "https:\/\/github.com\/gb21oc"
},
"html_url": "https:\/\/github.com\/gb21oc\/ExploitWebmin",
"description": "Python script to exploit webmin vulnerability cve-2006-3392",
"fork": false,
"created_at": "2021-11-13T18:40:15Z",
"updated_at": "2021-11-13T18:42:47Z",
"pushed_at": "2021-11-13T18:42:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 440387641,
"name": "CVE-2006-3392",
"full_name": "windsormoreira\/CVE-2006-3392",
"owner": {
"login": "windsormoreira",
"id": 21226709,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21226709?v=4",
"html_url": "https:\/\/github.com\/windsormoreira"
},
"html_url": "https:\/\/github.com\/windsormoreira\/CVE-2006-3392",
"description": "Webmin Local File Include (unauthenticated)",
"fork": false,
"created_at": "2021-12-21T04:18:21Z",
"updated_at": "2021-12-21T04:43:07Z",
"pushed_at": "2021-12-21T04:43:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]