2019-12-08 22:19:20 +09:00
[
2020-05-07 12:07:35 +09:00
{
"id" : 215200285 ,
"name" : "CVE-2019-16278" ,
"full_name" : "jas502n\/CVE-2019-16278" ,
"owner" : {
"login" : "jas502n" ,
"id" : 16593068 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4" ,
"html_url" : "https:\/\/github.com\/jas502n"
} ,
"html_url" : "https:\/\/github.com\/jas502n\/CVE-2019-16278" ,
"description" : "Directory transversal to remote code execution" ,
"fork" : false ,
"created_at" : "2019-10-15T03:40:13Z" ,
2020-05-19 00:09:13 +09:00
"updated_at" : "2020-05-18T10:43:21Z" ,
2020-05-07 12:07:35 +09:00
"pushed_at" : "2019-10-15T03:53:55Z" ,
2020-05-19 00:09:13 +09:00
"stargazers_count" : 62 ,
"watchers_count" : 62 ,
2020-05-07 12:07:35 +09:00
"forks_count" : 25 ,
"forks" : 25 ,
2020-05-19 00:09:13 +09:00
"watchers" : 62 ,
2020-05-07 12:07:35 +09:00
"score" : 0
} ,
{
"id" : 215258157 ,
"name" : "CVE-2019-16278-PoC" ,
"full_name" : "imjdl\/CVE-2019-16278-PoC" ,
"owner" : {
"login" : "imjdl" ,
"id" : 31382943 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/31382943?v=4" ,
"html_url" : "https:\/\/github.com\/imjdl"
} ,
"html_url" : "https:\/\/github.com\/imjdl\/CVE-2019-16278-PoC" ,
"description" : "CVE-2019-16728 Proof of Concept" ,
"fork" : false ,
"created_at" : "2019-10-15T09:22:36Z" ,
2020-05-19 00:09:13 +09:00
"updated_at" : "2020-05-18T10:43:21Z" ,
2020-05-07 12:07:35 +09:00
"pushed_at" : "2019-10-15T09:28:25Z" ,
2020-05-19 00:09:13 +09:00
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
2020-05-07 12:07:35 +09:00
"forks_count" : 1 ,
"forks" : 1 ,
2020-05-19 00:09:13 +09:00
"watchers" : 6 ,
2020-05-07 12:07:35 +09:00
"score" : 0
} ,
2019-12-08 22:19:20 +09:00
{
"id" : 215297351 ,
"name" : "CVE-2019-16278" ,
"full_name" : "ianxtianxt\/CVE-2019-16278" ,
"owner" : {
"login" : "ianxtianxt" ,
"id" : 45796484 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/45796484?v=4" ,
2019-12-12 14:14:27 +09:00
"html_url" : "https:\/\/github.com\/ianxtianxt"
2019-12-08 22:19:20 +09:00
} ,
"html_url" : "https:\/\/github.com\/ianxtianxt\/CVE-2019-16278" ,
"description" : "CVE-2019-16278Nostromo httpd命令执行" ,
"fork" : false ,
"created_at" : "2019-10-15T12:47:59Z" ,
2020-05-19 00:09:13 +09:00
"updated_at" : "2020-05-18T10:43:21Z" ,
2020-01-11 19:00:02 +09:00
"pushed_at" : "2020-01-11T07:25:38Z" ,
2020-05-19 00:09:13 +09:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2020-05-01 18:07:31 +09:00
"forks_count" : 4 ,
"forks" : 4 ,
2020-05-19 00:09:13 +09:00
"watchers" : 3 ,
2019-12-10 00:05:38 +09:00
"score" : 0
2019-12-08 22:19:20 +09:00
} ,
{
"id" : 217164072 ,
"name" : "Nostromo_Python3" ,
"full_name" : "darkerego\/Nostromo_Python3" ,
"owner" : {
"login" : "darkerego" ,
"id" : 8583665 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/8583665?v=4" ,
2019-12-12 14:14:27 +09:00
"html_url" : "https:\/\/github.com\/darkerego"
2019-12-08 22:19:20 +09:00
} ,
"html_url" : "https:\/\/github.com\/darkerego\/Nostromo_Python3" ,
"description" : "CVE-2019-16278 Python3 Exploit Code" ,
"fork" : false ,
"created_at" : "2019-10-23T22:24:18Z" ,
"updated_at" : "2019-10-23T22:26:43Z" ,
"pushed_at" : "2019-10-23T22:26:41Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 1 ,
"forks" : 1 ,
"watchers" : 0 ,
2019-12-12 14:14:27 +09:00
"score" : 0
} ,
{
2019-12-26 12:30:02 +09:00
"id" : 223463242 ,
"name" : "CVE-2019-16278" ,
"full_name" : "AnubisSec\/CVE-2019-16278" ,
2019-12-12 14:14:27 +09:00
"owner" : {
2019-12-26 12:30:02 +09:00
"login" : "AnubisSec" ,
"id" : 38790814 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/38790814?v=4" ,
"html_url" : "https:\/\/github.com\/AnubisSec"
2019-12-12 14:14:27 +09:00
} ,
2019-12-26 12:30:02 +09:00
"html_url" : "https:\/\/github.com\/AnubisSec\/CVE-2019-16278" ,
"description" : "A quick python exploit for the Nostromo 1.9.6 remote code execution vulnerability. Simply takes a host and port that the web server is running on. " ,
2019-12-12 14:14:27 +09:00
"fork" : false ,
2019-12-26 12:30:02 +09:00
"created_at" : "2019-11-22T18:35:14Z" ,
2020-05-19 00:09:13 +09:00
"updated_at" : "2020-05-18T10:43:26Z" ,
2019-12-26 12:30:02 +09:00
"pushed_at" : "2019-11-22T18:57:29Z" ,
2020-05-19 00:09:13 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2020-04-25 00:10:36 +09:00
"forks_count" : 2 ,
"forks" : 2 ,
2020-05-19 00:09:13 +09:00
"watchers" : 1 ,
2019-12-10 00:05:38 +09:00
"score" : 0
2019-12-08 22:19:20 +09:00
} ,
{
"id" : 224208624 ,
"name" : "CVE-2019-16278-Nostromo_1.9.6-RCE" ,
2020-05-14 06:08:19 +09:00
"full_name" : "theRealFr13nd\/CVE-2019-16278-Nostromo_1.9.6-RCE" ,
2019-12-08 22:19:20 +09:00
"owner" : {
2020-05-14 06:08:19 +09:00
"login" : "theRealFr13nd" ,
2019-12-08 22:19:20 +09:00
"id" : 36172640 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/36172640?v=4" ,
2020-05-14 06:08:19 +09:00
"html_url" : "https:\/\/github.com\/theRealFr13nd"
2019-12-08 22:19:20 +09:00
} ,
2020-05-14 06:08:19 +09:00
"html_url" : "https:\/\/github.com\/theRealFr13nd\/CVE-2019-16278-Nostromo_1.9.6-RCE" ,
2019-12-08 22:19:20 +09:00
"description" : "Python script to exploit RCE in Nostromo nhttpd <= 1.9.6." ,
"fork" : false ,
"created_at" : "2019-11-26T14:15:44Z" ,
"updated_at" : "2019-11-26T14:26:05Z" ,
"pushed_at" : "2019-11-26T14:26:03Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2020-04-13 00:10:36 +09:00
"forks_count" : 1 ,
"forks" : 1 ,
2019-12-08 22:19:20 +09:00
"watchers" : 0 ,
2019-12-10 00:05:38 +09:00
"score" : 0
2020-01-01 06:30:01 +09:00
} ,
{
"id" : 231114950 ,
"name" : "cve-2019-16278" ,
"full_name" : "Kr0ff\/cve-2019-16278" ,
"owner" : {
"login" : "Kr0ff" ,
"id" : 35173514 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/35173514?v=4" ,
"html_url" : "https:\/\/github.com\/Kr0ff"
} ,
"html_url" : "https:\/\/github.com\/Kr0ff\/cve-2019-16278" ,
"description" : "(Nhttpd) Nostromo 1.9.6 RCE due to Directory Traversal " ,
"fork" : false ,
"created_at" : "2019-12-31T16:06:13Z" ,
2020-02-20 06:07:35 +09:00
"updated_at" : "2020-02-19T19:35:33Z" ,
2020-01-01 06:30:01 +09:00
"pushed_at" : "2019-12-31T16:07:48Z" ,
2020-02-20 06:07:35 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2020-01-01 06:30:01 +09:00
"forks_count" : 0 ,
"forks" : 0 ,
2020-02-20 06:07:35 +09:00
"watchers" : 1 ,
2020-01-01 06:30:01 +09:00
"score" : 0
2020-01-02 00:30:02 +09:00
} ,
{
"id" : 231220055 ,
"name" : "CVE-2019-16278" ,
"full_name" : "NHPT\/CVE-2019-16278" ,
"owner" : {
"login" : "NHPT" ,
"id" : 42366434 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/42366434?v=4" ,
"html_url" : "https:\/\/github.com\/NHPT"
} ,
"html_url" : "https:\/\/github.com\/NHPT\/CVE-2019-16278" ,
"description" : "CVE-2019-16278: Nostromo Web服务器的RCE漏洞" ,
"fork" : false ,
"created_at" : "2020-01-01T13:28:40Z" ,
2020-05-19 00:09:13 +09:00
"updated_at" : "2020-05-18T10:43:31Z" ,
2020-01-02 00:30:02 +09:00
"pushed_at" : "2020-01-01T13:36:22Z" ,
2020-05-19 00:09:13 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2020-01-02 00:30:02 +09:00
"forks_count" : 0 ,
"forks" : 0 ,
2020-05-19 00:09:13 +09:00
"watchers" : 0 ,
2020-01-02 00:30:02 +09:00
"score" : 0
2020-03-01 00:07:28 +09:00
} ,
{
"id" : 243942211 ,
"name" : "nostromo_1_9_6_rce" ,
"full_name" : "Unam3dd\/nostromo_1_9_6_rce" ,
"owner" : {
"login" : "Unam3dd" ,
"id" : 34691959 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/34691959?v=4" ,
"html_url" : "https:\/\/github.com\/Unam3dd"
} ,
"html_url" : "https:\/\/github.com\/Unam3dd\/nostromo_1_9_6_rce" ,
"description" : "Nostromo 1.9.6 - Remote Code Exectuion - CVE-2019-16278" ,
"fork" : false ,
"created_at" : "2020-02-29T09:42:59Z" ,
"updated_at" : "2020-02-29T10:06:50Z" ,
"pushed_at" : "2020-02-29T10:06:48Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2020-03-30 18:07:36 +09:00
} ,
{
"id" : 251251110 ,
2020-03-31 00:07:33 +09:00
"name" : "cve-2019-16278" ,
"full_name" : "keshiba\/cve-2019-16278" ,
2020-03-30 18:07:36 +09:00
"owner" : {
"login" : "keshiba" ,
"id" : 62872563 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/62872563?v=4" ,
"html_url" : "https:\/\/github.com\/keshiba"
} ,
2020-03-31 00:07:33 +09:00
"html_url" : "https:\/\/github.com\/keshiba\/cve-2019-16278" ,
2020-04-01 18:08:09 +09:00
"description" : "Exploit for the CVE-2019-16278 vulnerability" ,
2020-03-30 18:07:36 +09:00
"fork" : false ,
"created_at" : "2020-03-30T08:54:06Z" ,
2020-04-01 18:08:09 +09:00
"updated_at" : "2020-04-01T06:07:06Z" ,
2020-04-01 06:08:07 +09:00
"pushed_at" : "2020-03-31T19:28:21Z" ,
2020-03-30 18:07:36 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2019-12-08 22:19:20 +09:00
}
]