Navigation Menu

Skip to content
View win3zz's full-sized avatar
♾️
{"amount":1,"amount":-1}
♾️
{"amount":1,"amount":-1}
Block or Report

Block or report win3zz

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned

  1. CVE-2023-25157 CVE-2023-25157 Public

    CVE-2023-25157 - GeoServer SQL Injection - PoC

    Python 143 35

  2. CVE-2023-43261 CVE-2023-43261 Public

    CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption

    Python 56 9

  3. Meta-Owned-IT-Assets Meta-Owned-IT-Assets Public

    Curated list of Meta (formerly Facebook) owned IT assets

    44 6

  4. CVE-2017-5638 CVE-2017-5638 Public

    Apache Struts 2.3.5 < 2.3.31 / 2.5 < 2.5.10 - Remote Code Execution - Shell Script

    Shell 15 3

  5. GitHub-Leaked-API-Keys-and-Secrets.md GitHub-Leaked-API-Keys-and-Secrets.md
    1
    # GitHub Search Syntax for Finding API Keys/Secrets/Tokens
    2
    As a security professional, it is important to conduct a thorough reconnaissance. With the increasing use of APIs nowadays, it has become paramount to keep access tokens and other API-related secrets secure in order to prevent leaks. However, despite technological advances, human error remains a factor, and many developers still unknowingly hardcode their API secrets into source code and commit them to public repositories. GitHub, being a widely popular platform for public code repositories, may inadvertently host such leaked secrets. To help identify these vulnerabilities, I have created a comprehensive search list using powerful search syntax that enables the search of thousands of leaked keys and secrets in a single search.
    3
    
                  
    4
    ## Search Syntax:
    5
    
                  
  6. CVE-2023-21939 - Code Exec - Proof o... CVE-2023-21939 - Code Exec - Proof of Concept
    1
    # CVE-2023-21939 - Code Exec - Proof of Concept
    2
    **Vulnerability Summary:**
    3
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs.
    4
    
                  
    5
    **Steps to Reproduce:**: