PoC-in-GitHub/2019/CVE-2019-16278.json

439 lines
15 KiB
JSON
Raw Normal View History

2020-06-21 05:07:51 +02:00
[
{
2023-01-02 13:13:52 +01:00
"id": 215200285,
"name": "CVE-2019-16278",
"full_name": "jas502n\/CVE-2019-16278",
2020-06-21 05:07:51 +02:00
"owner": {
2023-01-02 13:13:52 +01:00
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/jas502n",
"user_view_type": "public"
2020-06-21 05:07:51 +02:00
},
2023-01-02 13:13:52 +01:00
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-16278",
"description": "Directory transversal to remote code execution",
2020-06-21 05:07:51 +02:00
"fork": false,
2023-01-02 13:13:52 +01:00
"created_at": "2019-10-15T03:40:13Z",
2024-08-13 02:29:46 +02:00
"updated_at": "2024-08-12T19:53:55Z",
2023-01-02 13:13:52 +01:00
"pushed_at": "2019-10-15T03:53:55Z",
2024-08-13 02:29:46 +02:00
"stargazers_count": 69,
"watchers_count": 69,
2023-01-02 13:13:52 +01:00
"has_discussions": false,
2023-05-10 20:29:06 +02:00
"forks_count": 31,
2023-01-02 13:13:52 +01:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2023-05-10 20:29:06 +02:00
"forks": 31,
2024-08-13 02:29:46 +02:00
"watchers": 69,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 2
2023-01-02 13:13:52 +01:00
},
{
"id": 215258157,
"name": "CVE-2019-16278-PoC",
"full_name": "imjdl\/CVE-2019-16278-PoC",
"owner": {
"login": "imjdl",
"id": 31382943,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31382943?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/imjdl",
"user_view_type": "public"
2023-01-02 13:13:52 +01:00
},
"html_url": "https:\/\/github.com\/imjdl\/CVE-2019-16278-PoC",
"description": "CVE-2019-16728 Proof of Concept",
"fork": false,
"created_at": "2019-10-15T09:22:36Z",
2024-08-13 02:29:46 +02:00
"updated_at": "2024-08-12T19:53:55Z",
2023-01-02 13:13:52 +01:00
"pushed_at": "2019-10-15T09:28:25Z",
2024-08-13 02:29:46 +02:00
"stargazers_count": 7,
"watchers_count": 7,
2022-11-08 01:17:44 +01:00
"has_discussions": false,
2021-04-13 23:10:41 +02:00
"forks_count": 1,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required": false,
2023-01-02 13:13:52 +01:00
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-04-13 23:10:41 +02:00
"forks": 1,
2024-08-13 02:29:46 +02:00
"watchers": 7,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 2
2021-07-19 05:12:00 +02:00
},
{
2023-01-02 13:13:52 +01:00
"id": 215297351,
2021-07-19 05:12:00 +02:00
"name": "CVE-2019-16278",
2023-01-02 13:13:52 +01:00
"full_name": "ianxtianxt\/CVE-2019-16278",
"owner": {
"login": "ianxtianxt",
"id": 45796484,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45796484?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/ianxtianxt",
"user_view_type": "public"
2023-01-02 13:13:52 +01:00
},
"html_url": "https:\/\/github.com\/ianxtianxt\/CVE-2019-16278",
"description": "CVE-2019-16278Nostromo httpd命令执行",
"fork": false,
"created_at": "2019-10-15T12:47:59Z",
2024-08-13 02:29:46 +02:00
"updated_at": "2024-08-12T19:53:55Z",
2023-01-02 13:13:52 +01:00
"pushed_at": "2020-01-11T07:25:38Z",
2024-08-13 02:29:46 +02:00
"stargazers_count": 2,
"watchers_count": 2,
2023-01-02 13:13:52 +01:00
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
2024-08-13 02:29:46 +02:00
"watchers": 2,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 2
2023-01-02 13:13:52 +01:00
},
{
"id": 217164072,
"name": "Nostromo_Python3",
"full_name": "darkerego\/Nostromo_Python3",
2021-07-19 05:12:00 +02:00
"owner": {
2023-01-02 13:13:52 +01:00
"login": "darkerego",
"id": 8583665,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8583665?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/darkerego",
"user_view_type": "public"
2021-07-19 05:12:00 +02:00
},
2023-01-02 13:13:52 +01:00
"html_url": "https:\/\/github.com\/darkerego\/Nostromo_Python3",
"description": "CVE-2019-16278 Python3 Exploit Code",
2021-07-19 05:12:00 +02:00
"fork": false,
2023-01-02 13:13:52 +01:00
"created_at": "2019-10-23T22:24:18Z",
2023-09-10 02:33:46 +02:00
"updated_at": "2023-09-09T18:40:27Z",
2023-01-02 13:13:52 +01:00
"pushed_at": "2019-10-23T22:26:41Z",
2023-09-10 02:33:46 +02:00
"stargazers_count": 1,
"watchers_count": 1,
2022-11-08 07:19:29 +01:00
"has_discussions": false,
2023-01-02 13:13:52 +01:00
"forks_count": 2,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required": false,
2021-10-06 23:13:51 +02:00
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2023-01-02 13:13:52 +01:00
"forks": 2,
2023-09-10 02:33:46 +02:00
"watchers": 1,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 3
2022-03-24 13:14:41 +01:00
},
{
2023-01-02 13:13:52 +01:00
"id": 223463242,
2022-03-24 13:14:41 +01:00
"name": "CVE-2019-16278",
2023-01-02 13:13:52 +01:00
"full_name": "AnubisSec\/CVE-2019-16278",
2022-03-24 13:14:41 +01:00
"owner": {
2023-01-02 13:13:52 +01:00
"login": "AnubisSec",
"id": 38790814,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38790814?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/AnubisSec",
"user_view_type": "public"
2022-03-24 13:14:41 +01:00
},
2023-01-02 13:13:52 +01:00
"html_url": "https:\/\/github.com\/AnubisSec\/CVE-2019-16278",
"description": "A quick python exploit for the Nostromo 1.9.6 remote code execution vulnerability. Simply takes a host and port that the web server is running on. ",
2022-03-24 13:14:41 +01:00
"fork": false,
2023-01-02 13:13:52 +01:00
"created_at": "2019-11-22T18:35:14Z",
2024-08-13 02:29:46 +02:00
"updated_at": "2024-08-12T19:55:06Z",
2023-01-02 13:13:52 +01:00
"pushed_at": "2019-11-22T18:57:29Z",
2024-08-13 02:29:46 +02:00
"stargazers_count": 8,
"watchers_count": 8,
2023-01-02 13:13:52 +01:00
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
2024-08-13 02:29:46 +02:00
"watchers": 8,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 2
2023-01-02 13:13:52 +01:00
},
{
"id": 224208624,
"name": "CVE-2019-16278-Nostromo_1.9.6-RCE",
2023-12-30 01:46:10 +01:00
"full_name": "aN0mad\/CVE-2019-16278-Nostromo_1.9.6-RCE",
2023-01-02 13:13:52 +01:00
"owner": {
2023-12-30 01:46:10 +01:00
"login": "aN0mad",
2023-01-02 13:13:52 +01:00
"id": 36172640,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36172640?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/aN0mad",
"user_view_type": "public"
2023-01-02 13:13:52 +01:00
},
2023-12-30 01:46:10 +01:00
"html_url": "https:\/\/github.com\/aN0mad\/CVE-2019-16278-Nostromo_1.9.6-RCE",
2023-01-02 13:13:52 +01:00
"description": "Python script to exploit RCE in Nostromo nhttpd <= 1.9.6.",
"fork": false,
"created_at": "2019-11-26T14:15:44Z",
2024-09-05 20:30:03 +02:00
"updated_at": "2024-09-05T17:01:13Z",
2023-01-02 13:13:52 +01:00
"pushed_at": "2019-11-26T14:26:03Z",
2024-09-05 20:30:03 +02:00
"stargazers_count": 6,
"watchers_count": 6,
2023-01-02 13:13:52 +01:00
"has_discussions": false,
2024-09-02 20:29:37 +02:00
"forks_count": 1,
2023-01-02 13:13:52 +01:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-09-02 20:29:37 +02:00
"forks": 1,
2024-09-05 20:30:03 +02:00
"watchers": 6,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 1
2023-01-02 13:13:52 +01:00
},
{
"id": 231114950,
"name": "cve-2019-16278",
"full_name": "Kr0ff\/cve-2019-16278",
"owner": {
"login": "Kr0ff",
"id": 35173514,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35173514?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/Kr0ff",
"user_view_type": "public"
2023-01-02 13:13:52 +01:00
},
"html_url": "https:\/\/github.com\/Kr0ff\/cve-2019-16278",
"description": "(Nhttpd) Nostromo 1.9.6 RCE due to Directory Traversal ",
"fork": false,
"created_at": "2019-12-31T16:06:13Z",
"updated_at": "2020-02-19T19:35:33Z",
"pushed_at": "2019-12-31T16:07:48Z",
"stargazers_count": 1,
"watchers_count": 1,
2022-11-08 07:19:29 +01:00
"has_discussions": false,
2022-03-28 14:17:37 +02:00
"forks_count": 1,
2022-03-24 13:14:41 +01:00
"allow_forking": true,
"is_template": false,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required": false,
2022-03-24 13:14:41 +01:00
"topics": [],
"visibility": "public",
2022-03-28 14:17:37 +02:00
"forks": 1,
2023-01-02 13:13:52 +01:00
"watchers": 1,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 2
2023-01-07 01:35:14 +01:00
},
2024-01-19 19:42:50 +01:00
{
"id": 231220055,
"name": "CVE-2019-16278",
"full_name": "NHPT\/CVE-2019-16278",
"owner": {
"login": "NHPT",
"id": 42366434,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42366434?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/NHPT",
"user_view_type": "public"
2024-01-19 19:42:50 +01:00
},
"html_url": "https:\/\/github.com\/NHPT\/CVE-2019-16278",
"description": "CVE-2019-16278Nostromo Web服务器的RCE漏洞",
"fork": false,
"created_at": "2020-01-01T13:28:40Z",
2024-08-13 02:29:46 +02:00
"updated_at": "2024-08-12T19:56:11Z",
2024-01-19 19:42:50 +01:00
"pushed_at": "2020-01-01T13:36:22Z",
2024-08-13 02:29:46 +02:00
"stargazers_count": 0,
"watchers_count": 0,
2024-01-19 19:42:50 +01:00
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
2024-08-13 02:29:46 +02:00
"watchers": 0,
2024-01-19 19:42:50 +01:00
"score": 0,
"subscribers_count": 2
},
2023-09-20 02:41:04 +02:00
{
"id": 251251110,
"name": "cve-2019-16278",
"full_name": "keshiba\/cve-2019-16278",
"owner": {
"login": "keshiba",
"id": 62872563,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62872563?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/keshiba",
"user_view_type": "public"
2023-09-20 02:41:04 +02:00
},
"html_url": "https:\/\/github.com\/keshiba\/cve-2019-16278",
"description": "Exploit for the CVE-2019-16278 vulnerability",
"fork": false,
"created_at": "2020-03-30T08:54:06Z",
"updated_at": "2022-06-24T16:41:10Z",
"pushed_at": "2022-06-24T16:41:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
2024-09-26 20:31:05 +02:00
"forks_count": 0,
2023-09-20 02:41:04 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"exploits",
"httpd"
],
"visibility": "public",
2024-09-26 20:31:05 +02:00
"forks": 0,
2023-09-20 02:41:04 +02:00
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
2023-01-07 01:35:14 +01:00
{
"id": 387298591,
"name": "CVE-2019-16278",
2024-11-11 19:31:45 +01:00
"full_name": "n3rdh4x0r\/CVE-2019-16278",
2023-01-07 01:35:14 +01:00
"owner": {
2024-11-11 19:31:45 +01:00
"login": "n3rdh4x0r",
2023-01-07 01:35:14 +01:00
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
2024-11-11 19:31:45 +01:00
"html_url": "https:\/\/github.com\/n3rdh4x0r",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2023-01-07 01:35:14 +01:00
},
2024-11-11 19:31:45 +01:00
"html_url": "https:\/\/github.com\/n3rdh4x0r\/CVE-2019-16278",
2023-01-07 01:35:14 +01:00
"description": null,
"fork": false,
"created_at": "2021-07-19T00:45:07Z",
"updated_at": "2022-04-23T17:25:31Z",
"pushed_at": "2022-04-23T17:25:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 1
2023-04-04 08:28:56 +02:00
},
2023-05-08 20:30:41 +02:00
{
"id": 473589212,
"name": "CVE-2019-16278",
"full_name": "alexander-fernandes\/CVE-2019-16278",
"owner": {
"login": "alexander-fernandes",
"id": 82245105,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82245105?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/alexander-fernandes",
"user_view_type": "public"
2023-05-08 20:30:41 +02:00
},
"html_url": "https:\/\/github.com\/alexander-fernandes\/CVE-2019-16278",
"description": "A quick python exploit for the Nostromo 1.9.6 remote code execution vulnerability. Only takes in host and port of web server as required arguments.",
"fork": false,
"created_at": "2022-03-24T12:06:55Z",
"updated_at": "2022-03-24T12:25:16Z",
"pushed_at": "2022-03-24T12:25:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 1
2023-05-08 20:30:41 +02:00
},
2023-05-05 02:28:48 +02:00
{
"id": 636450695,
"name": "CVE-2019-16278-Nostromo-1.9.6-RCE",
"full_name": "FredBrave\/CVE-2019-16278-Nostromo-1.9.6-RCE",
"owner": {
"login": "FredBrave",
"id": 114189847,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114189847?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/FredBrave",
"user_view_type": "public"
2023-05-05 02:28:48 +02:00
},
"html_url": "https:\/\/github.com\/FredBrave\/CVE-2019-16278-Nostromo-1.9.6-RCE",
"description": "This is a exploit of CVE-2019-16278 for Nostromo 1.9.6 RCE. This exploit allows RCE on the victim machine.",
"fork": false,
"created_at": "2023-05-04T21:59:23Z",
"updated_at": "2023-05-04T22:07:58Z",
"pushed_at": "2023-05-04T22:07:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
2023-05-10 20:29:06 +02:00
"forks_count": 0,
2023-05-05 02:28:48 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2023-05-10 20:29:06 +02:00
"forks": 0,
2023-05-05 02:28:48 +02:00
"watchers": 0,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 1
2023-09-16 20:30:03 +02:00
},
{
"id": 692498488,
"name": "CVE-2019-16278",
"full_name": "0xTabun\/CVE-2019-16278",
"owner": {
"login": "0xTabun",
"id": 144548207,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144548207?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/0xTabun",
"user_view_type": "public"
2023-09-16 20:30:03 +02:00
},
"html_url": "https:\/\/github.com\/0xTabun\/CVE-2019-16278",
"description": "Nostromo 1.9.6 reverse shell",
"fork": false,
"created_at": "2023-09-16T17:01:25Z",
"updated_at": "2023-09-16T17:01:46Z",
"pushed_at": "2023-09-16T17:09:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2023-09-18 02:33:52 +02:00
"subscribers_count": 1
2024-11-12 07:31:39 +01:00
},
{
"id": 886972763,
"name": "CVE-2019-16278-Nostromo-1.9.6-RCE",
"full_name": "cancela24\/CVE-2019-16278-Nostromo-1.9.6-RCE",
"owner": {
"login": "cancela24",
"id": 103641206,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103641206?v=4",
"html_url": "https:\/\/github.com\/cancela24",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cancela24\/CVE-2019-16278-Nostromo-1.9.6-RCE",
"description": "This repository contains an exploit for CVE-2019-16278 in Nostromo Web Server 1.9.6, allowing remote code execution via a directory traversal vulnerability. The script uses pwntools to establish a reverse shell. For educational and authorized testing use only.",
"fork": false,
"created_at": "2024-11-12T00:13:24Z",
"updated_at": "2024-11-12T00:16:01Z",
"pushed_at": "2024-11-12T00:15:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-11-13 01:31:30 +01:00
"subscribers_count": 1
2020-06-21 05:07:51 +02:00
}
]