2020-06-21 05:07:51 +02:00
[
{
2023-01-02 13:13:52 +01:00
"id" : 215200285 ,
"name" : "CVE-2019-16278" ,
"full_name" : "jas502n\/CVE-2019-16278" ,
2020-06-21 05:07:51 +02:00
"owner" : {
2023-01-02 13:13:52 +01:00
"login" : "jas502n" ,
"id" : 16593068 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/jas502n" ,
"user_view_type" : "public"
2020-06-21 05:07:51 +02:00
} ,
2023-01-02 13:13:52 +01:00
"html_url" : "https:\/\/github.com\/jas502n\/CVE-2019-16278" ,
"description" : "Directory transversal to remote code execution" ,
2020-06-21 05:07:51 +02:00
"fork" : false ,
2023-01-02 13:13:52 +01:00
"created_at" : "2019-10-15T03:40:13Z" ,
2024-08-13 02:29:46 +02:00
"updated_at" : "2024-08-12T19:53:55Z" ,
2023-01-02 13:13:52 +01:00
"pushed_at" : "2019-10-15T03:53:55Z" ,
2024-08-13 02:29:46 +02:00
"stargazers_count" : 69 ,
"watchers_count" : 69 ,
2023-01-02 13:13:52 +01:00
"has_discussions" : false ,
2023-05-10 20:29:06 +02:00
"forks_count" : 31 ,
2023-01-02 13:13:52 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-05-10 20:29:06 +02:00
"forks" : 31 ,
2024-08-13 02:29:46 +02:00
"watchers" : 69 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 2
2023-01-02 13:13:52 +01:00
} ,
{
"id" : 215258157 ,
"name" : "CVE-2019-16278-PoC" ,
"full_name" : "imjdl\/CVE-2019-16278-PoC" ,
"owner" : {
"login" : "imjdl" ,
"id" : 31382943 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/31382943?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/imjdl" ,
"user_view_type" : "public"
2023-01-02 13:13:52 +01:00
} ,
"html_url" : "https:\/\/github.com\/imjdl\/CVE-2019-16278-PoC" ,
"description" : "CVE-2019-16728 Proof of Concept" ,
"fork" : false ,
"created_at" : "2019-10-15T09:22:36Z" ,
2024-08-13 02:29:46 +02:00
"updated_at" : "2024-08-12T19:53:55Z" ,
2023-01-02 13:13:52 +01:00
"pushed_at" : "2019-10-15T09:28:25Z" ,
2024-08-13 02:29:46 +02:00
"stargazers_count" : 7 ,
"watchers_count" : 7 ,
2022-11-08 01:17:44 +01:00
"has_discussions" : false ,
2021-04-13 23:10:41 +02:00
"forks_count" : 1 ,
2021-09-13 23:12:57 +02:00
"allow_forking" : true ,
2021-10-06 23:13:51 +02:00
"is_template" : false ,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required" : false ,
2023-01-02 13:13:52 +01:00
"topics" : [ ] ,
2021-10-01 23:13:10 +02:00
"visibility" : "public" ,
2021-04-13 23:10:41 +02:00
"forks" : 1 ,
2024-08-13 02:29:46 +02:00
"watchers" : 7 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 2
2021-07-19 05:12:00 +02:00
} ,
{
2023-01-02 13:13:52 +01:00
"id" : 215297351 ,
2021-07-19 05:12:00 +02:00
"name" : "CVE-2019-16278" ,
2023-01-02 13:13:52 +01:00
"full_name" : "ianxtianxt\/CVE-2019-16278" ,
"owner" : {
"login" : "ianxtianxt" ,
"id" : 45796484 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/45796484?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/ianxtianxt" ,
"user_view_type" : "public"
2023-01-02 13:13:52 +01:00
} ,
"html_url" : "https:\/\/github.com\/ianxtianxt\/CVE-2019-16278" ,
"description" : "CVE-2019-16278Nostromo httpd命令执行" ,
"fork" : false ,
"created_at" : "2019-10-15T12:47:59Z" ,
2024-08-13 02:29:46 +02:00
"updated_at" : "2024-08-12T19:53:55Z" ,
2023-01-02 13:13:52 +01:00
"pushed_at" : "2020-01-11T07:25:38Z" ,
2024-08-13 02:29:46 +02:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2023-01-02 13:13:52 +01:00
"has_discussions" : false ,
"forks_count" : 6 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 6 ,
2024-08-13 02:29:46 +02:00
"watchers" : 2 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 2
2023-01-02 13:13:52 +01:00
} ,
{
"id" : 217164072 ,
"name" : "Nostromo_Python3" ,
"full_name" : "darkerego\/Nostromo_Python3" ,
2021-07-19 05:12:00 +02:00
"owner" : {
2023-01-02 13:13:52 +01:00
"login" : "darkerego" ,
"id" : 8583665 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/8583665?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/darkerego" ,
"user_view_type" : "public"
2021-07-19 05:12:00 +02:00
} ,
2023-01-02 13:13:52 +01:00
"html_url" : "https:\/\/github.com\/darkerego\/Nostromo_Python3" ,
"description" : "CVE-2019-16278 Python3 Exploit Code" ,
2021-07-19 05:12:00 +02:00
"fork" : false ,
2023-01-02 13:13:52 +01:00
"created_at" : "2019-10-23T22:24:18Z" ,
2023-09-10 02:33:46 +02:00
"updated_at" : "2023-09-09T18:40:27Z" ,
2023-01-02 13:13:52 +01:00
"pushed_at" : "2019-10-23T22:26:41Z" ,
2023-09-10 02:33:46 +02:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2022-11-08 07:19:29 +01:00
"has_discussions" : false ,
2023-01-02 13:13:52 +01:00
"forks_count" : 2 ,
2021-09-13 23:12:57 +02:00
"allow_forking" : true ,
2021-10-06 23:13:51 +02:00
"is_template" : false ,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required" : false ,
2021-10-06 23:13:51 +02:00
"topics" : [ ] ,
2021-10-01 23:13:10 +02:00
"visibility" : "public" ,
2023-01-02 13:13:52 +01:00
"forks" : 2 ,
2023-09-10 02:33:46 +02:00
"watchers" : 1 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 3
2022-03-24 13:14:41 +01:00
} ,
{
2023-01-02 13:13:52 +01:00
"id" : 223463242 ,
2022-03-24 13:14:41 +01:00
"name" : "CVE-2019-16278" ,
2023-01-02 13:13:52 +01:00
"full_name" : "AnubisSec\/CVE-2019-16278" ,
2022-03-24 13:14:41 +01:00
"owner" : {
2023-01-02 13:13:52 +01:00
"login" : "AnubisSec" ,
"id" : 38790814 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/38790814?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/AnubisSec" ,
"user_view_type" : "public"
2022-03-24 13:14:41 +01:00
} ,
2023-01-02 13:13:52 +01:00
"html_url" : "https:\/\/github.com\/AnubisSec\/CVE-2019-16278" ,
"description" : "A quick python exploit for the Nostromo 1.9.6 remote code execution vulnerability. Simply takes a host and port that the web server is running on. " ,
2022-03-24 13:14:41 +01:00
"fork" : false ,
2023-01-02 13:13:52 +01:00
"created_at" : "2019-11-22T18:35:14Z" ,
2024-08-13 02:29:46 +02:00
"updated_at" : "2024-08-12T19:55:06Z" ,
2023-01-02 13:13:52 +01:00
"pushed_at" : "2019-11-22T18:57:29Z" ,
2024-08-13 02:29:46 +02:00
"stargazers_count" : 8 ,
"watchers_count" : 8 ,
2023-01-02 13:13:52 +01:00
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 3 ,
2024-08-13 02:29:46 +02:00
"watchers" : 8 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 2
2023-01-02 13:13:52 +01:00
} ,
{
"id" : 224208624 ,
"name" : "CVE-2019-16278-Nostromo_1.9.6-RCE" ,
2023-12-30 01:46:10 +01:00
"full_name" : "aN0mad\/CVE-2019-16278-Nostromo_1.9.6-RCE" ,
2023-01-02 13:13:52 +01:00
"owner" : {
2023-12-30 01:46:10 +01:00
"login" : "aN0mad" ,
2023-01-02 13:13:52 +01:00
"id" : 36172640 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/36172640?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/aN0mad" ,
"user_view_type" : "public"
2023-01-02 13:13:52 +01:00
} ,
2023-12-30 01:46:10 +01:00
"html_url" : "https:\/\/github.com\/aN0mad\/CVE-2019-16278-Nostromo_1.9.6-RCE" ,
2023-01-02 13:13:52 +01:00
"description" : "Python script to exploit RCE in Nostromo nhttpd <= 1.9.6." ,
"fork" : false ,
"created_at" : "2019-11-26T14:15:44Z" ,
2024-09-05 20:30:03 +02:00
"updated_at" : "2024-09-05T17:01:13Z" ,
2023-01-02 13:13:52 +01:00
"pushed_at" : "2019-11-26T14:26:03Z" ,
2024-09-05 20:30:03 +02:00
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
2023-01-02 13:13:52 +01:00
"has_discussions" : false ,
2024-09-02 20:29:37 +02:00
"forks_count" : 1 ,
2023-01-02 13:13:52 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-09-02 20:29:37 +02:00
"forks" : 1 ,
2024-09-05 20:30:03 +02:00
"watchers" : 6 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-01-02 13:13:52 +01:00
} ,
{
"id" : 231114950 ,
"name" : "cve-2019-16278" ,
"full_name" : "Kr0ff\/cve-2019-16278" ,
"owner" : {
"login" : "Kr0ff" ,
"id" : 35173514 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/35173514?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/Kr0ff" ,
"user_view_type" : "public"
2023-01-02 13:13:52 +01:00
} ,
"html_url" : "https:\/\/github.com\/Kr0ff\/cve-2019-16278" ,
"description" : "(Nhttpd) Nostromo 1.9.6 RCE due to Directory Traversal " ,
"fork" : false ,
"created_at" : "2019-12-31T16:06:13Z" ,
"updated_at" : "2020-02-19T19:35:33Z" ,
"pushed_at" : "2019-12-31T16:07:48Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2022-11-08 07:19:29 +01:00
"has_discussions" : false ,
2022-03-28 14:17:37 +02:00
"forks_count" : 1 ,
2022-03-24 13:14:41 +01:00
"allow_forking" : true ,
"is_template" : false ,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required" : false ,
2022-03-24 13:14:41 +01:00
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-28 14:17:37 +02:00
"forks" : 1 ,
2023-01-02 13:13:52 +01:00
"watchers" : 1 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 2
2023-01-07 01:35:14 +01:00
} ,
2024-01-19 19:42:50 +01:00
{
"id" : 231220055 ,
"name" : "CVE-2019-16278" ,
"full_name" : "NHPT\/CVE-2019-16278" ,
"owner" : {
"login" : "NHPT" ,
"id" : 42366434 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/42366434?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/NHPT" ,
"user_view_type" : "public"
2024-01-19 19:42:50 +01:00
} ,
"html_url" : "https:\/\/github.com\/NHPT\/CVE-2019-16278" ,
"description" : "CVE-2019-16278: Nostromo Web服务器的RCE漏洞" ,
"fork" : false ,
"created_at" : "2020-01-01T13:28:40Z" ,
2024-08-13 02:29:46 +02:00
"updated_at" : "2024-08-12T19:56:11Z" ,
2024-01-19 19:42:50 +01:00
"pushed_at" : "2020-01-01T13:36:22Z" ,
2024-08-13 02:29:46 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2024-01-19 19:42:50 +01:00
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
2024-08-13 02:29:46 +02:00
"watchers" : 0 ,
2024-01-19 19:42:50 +01:00
"score" : 0 ,
"subscribers_count" : 2
} ,
2023-09-20 02:41:04 +02:00
{
"id" : 251251110 ,
"name" : "cve-2019-16278" ,
"full_name" : "keshiba\/cve-2019-16278" ,
"owner" : {
"login" : "keshiba" ,
"id" : 62872563 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/62872563?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/keshiba" ,
"user_view_type" : "public"
2023-09-20 02:41:04 +02:00
} ,
"html_url" : "https:\/\/github.com\/keshiba\/cve-2019-16278" ,
"description" : "Exploit for the CVE-2019-16278 vulnerability" ,
"fork" : false ,
"created_at" : "2020-03-30T08:54:06Z" ,
"updated_at" : "2022-06-24T16:41:10Z" ,
"pushed_at" : "2022-06-24T16:41:07Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
2024-09-26 20:31:05 +02:00
"forks_count" : 0 ,
2023-09-20 02:41:04 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"exploits" ,
"httpd"
] ,
"visibility" : "public" ,
2024-09-26 20:31:05 +02:00
"forks" : 0 ,
2023-09-20 02:41:04 +02:00
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
2023-01-07 01:35:14 +01:00
{
"id" : 387298591 ,
"name" : "CVE-2019-16278" ,
2024-11-11 19:31:45 +01:00
"full_name" : "n3rdh4x0r\/CVE-2019-16278" ,
2023-01-07 01:35:14 +01:00
"owner" : {
2024-11-11 19:31:45 +01:00
"login" : "n3rdh4x0r" ,
2023-01-07 01:35:14 +01:00
"id" : 66146701 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4" ,
2024-11-11 19:31:45 +01:00
"html_url" : "https:\/\/github.com\/n3rdh4x0r" ,
2024-10-18 02:30:24 +02:00
"user_view_type" : "public"
2023-01-07 01:35:14 +01:00
} ,
2024-11-11 19:31:45 +01:00
"html_url" : "https:\/\/github.com\/n3rdh4x0r\/CVE-2019-16278" ,
2023-01-07 01:35:14 +01:00
"description" : null ,
"fork" : false ,
"created_at" : "2021-07-19T00:45:07Z" ,
"updated_at" : "2022-04-23T17:25:31Z" ,
"pushed_at" : "2022-04-23T17:25:29Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-04-04 08:28:56 +02:00
} ,
2023-05-08 20:30:41 +02:00
{
"id" : 473589212 ,
"name" : "CVE-2019-16278" ,
"full_name" : "alexander-fernandes\/CVE-2019-16278" ,
"owner" : {
"login" : "alexander-fernandes" ,
"id" : 82245105 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/82245105?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/alexander-fernandes" ,
"user_view_type" : "public"
2023-05-08 20:30:41 +02:00
} ,
"html_url" : "https:\/\/github.com\/alexander-fernandes\/CVE-2019-16278" ,
"description" : "A quick python exploit for the Nostromo 1.9.6 remote code execution vulnerability. Only takes in host and port of web server as required arguments." ,
"fork" : false ,
"created_at" : "2022-03-24T12:06:55Z" ,
"updated_at" : "2022-03-24T12:25:16Z" ,
"pushed_at" : "2022-03-24T12:25:13Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-05-08 20:30:41 +02:00
} ,
2023-05-05 02:28:48 +02:00
{
"id" : 636450695 ,
"name" : "CVE-2019-16278-Nostromo-1.9.6-RCE" ,
"full_name" : "FredBrave\/CVE-2019-16278-Nostromo-1.9.6-RCE" ,
"owner" : {
"login" : "FredBrave" ,
"id" : 114189847 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/114189847?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/FredBrave" ,
"user_view_type" : "public"
2023-05-05 02:28:48 +02:00
} ,
"html_url" : "https:\/\/github.com\/FredBrave\/CVE-2019-16278-Nostromo-1.9.6-RCE" ,
"description" : "This is a exploit of CVE-2019-16278 for Nostromo 1.9.6 RCE. This exploit allows RCE on the victim machine." ,
"fork" : false ,
"created_at" : "2023-05-04T21:59:23Z" ,
"updated_at" : "2023-05-04T22:07:58Z" ,
"pushed_at" : "2023-05-04T22:07:53Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
2023-05-10 20:29:06 +02:00
"forks_count" : 0 ,
2023-05-05 02:28:48 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-05-10 20:29:06 +02:00
"forks" : 0 ,
2023-05-05 02:28:48 +02:00
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-09-16 20:30:03 +02:00
} ,
{
"id" : 692498488 ,
"name" : "CVE-2019-16278" ,
"full_name" : "0xTabun\/CVE-2019-16278" ,
"owner" : {
"login" : "0xTabun" ,
"id" : 144548207 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/144548207?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/0xTabun" ,
"user_view_type" : "public"
2023-09-16 20:30:03 +02:00
} ,
"html_url" : "https:\/\/github.com\/0xTabun\/CVE-2019-16278" ,
"description" : "Nostromo 1.9.6 reverse shell" ,
"fork" : false ,
"created_at" : "2023-09-16T17:01:25Z" ,
"updated_at" : "2023-09-16T17:01:46Z" ,
"pushed_at" : "2023-09-16T17:09:36Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
2023-09-18 02:33:52 +02:00
"subscribers_count" : 1
2024-11-12 07:31:39 +01:00
} ,
{
"id" : 886972763 ,
"name" : "CVE-2019-16278-Nostromo-1.9.6-RCE" ,
"full_name" : "cancela24\/CVE-2019-16278-Nostromo-1.9.6-RCE" ,
"owner" : {
"login" : "cancela24" ,
"id" : 103641206 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/103641206?v=4" ,
"html_url" : "https:\/\/github.com\/cancela24" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/cancela24\/CVE-2019-16278-Nostromo-1.9.6-RCE" ,
"description" : "This repository contains an exploit for CVE-2019-16278 in Nostromo Web Server 1.9.6, allowing remote code execution via a directory traversal vulnerability. The script uses pwntools to establish a reverse shell. For educational and authorized testing use only." ,
"fork" : false ,
"created_at" : "2024-11-12T00:13:24Z" ,
"updated_at" : "2024-11-12T00:16:01Z" ,
"pushed_at" : "2024-11-12T00:15:57Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
2024-11-13 01:31:30 +01:00
"subscribers_count" : 1
2020-06-21 05:07:51 +02:00
}
]