2020-06-21 05:07:51 +02:00
[
{
"id" : 203542766 ,
"name" : "CVE-2019-11510" ,
"full_name" : "projectzeroindia\/CVE-2019-11510" ,
"owner" : {
"login" : "projectzeroindia" ,
"id" : 54312442 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/54312442?v=4" ,
"html_url" : "https:\/\/github.com\/projectzeroindia"
} ,
"html_url" : "https:\/\/github.com\/projectzeroindia\/CVE-2019-11510" ,
"description" : "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)" ,
"fork" : false ,
"created_at" : "2019-08-21T08:40:26Z" ,
2020-07-04 23:09:10 +02:00
"updated_at" : "2020-07-04T15:43:00Z" ,
2020-06-21 05:07:51 +02:00
"pushed_at" : "2020-01-11T13:55:33Z" ,
2020-07-04 23:09:10 +02:00
"stargazers_count" : 318 ,
"watchers_count" : 318 ,
2020-07-09 11:08:19 +02:00
"forks_count" : 128 ,
"forks" : 128 ,
2020-07-04 23:09:10 +02:00
"watchers" : 318 ,
2020-06-21 05:07:51 +02:00
"score" : 0
} ,
{
"id" : 203567273 ,
"name" : "Pulse" ,
"full_name" : "ladyleet1337\/Pulse" ,
"owner" : {
"login" : "ladyleet1337" ,
"id" : 26109832 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/26109832?v=4" ,
"html_url" : "https:\/\/github.com\/ladyleet1337"
} ,
"html_url" : "https:\/\/github.com\/ladyleet1337\/Pulse" ,
"description" : "Pulse Secure VPN CVE-2019-11510" ,
"fork" : false ,
"created_at" : "2019-08-21T11:08:48Z" ,
2020-07-13 11:08:16 +02:00
"updated_at" : "2020-07-13T08:26:29Z" ,
"pushed_at" : "2020-07-13T08:26:27Z" ,
2020-06-21 05:07:51 +02:00
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"forks_count" : 2 ,
"forks" : 2 ,
"watchers" : 4 ,
"score" : 0
} ,
{
"id" : 203747377 ,
"name" : "CVE-2019-11510-poc" ,
"full_name" : "imjdl\/CVE-2019-11510-poc" ,
"owner" : {
"login" : "imjdl" ,
"id" : 31382943 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/31382943?v=4" ,
"html_url" : "https:\/\/github.com\/imjdl"
} ,
"html_url" : "https:\/\/github.com\/imjdl\/CVE-2019-11510-poc" ,
"description" : "Pulse Secure SSL VPN pre-auth file reading" ,
"fork" : false ,
"created_at" : "2019-08-22T08:18:19Z" ,
2020-06-22 17:09:15 +02:00
"updated_at" : "2020-06-22T09:44:45Z" ,
2020-06-21 05:07:51 +02:00
"pushed_at" : "2019-08-26T19:33:43Z" ,
2020-06-22 17:09:15 +02:00
"stargazers_count" : 46 ,
"watchers_count" : 46 ,
2020-06-24 11:08:13 +02:00
"forks_count" : 16 ,
"forks" : 16 ,
2020-06-22 17:09:15 +02:00
"watchers" : 46 ,
2020-06-21 05:07:51 +02:00
"score" : 0
} ,
{
"id" : 204579243 ,
"name" : "CVE-2019-11510_poc" ,
"full_name" : "es0\/CVE-2019-11510_poc" ,
"owner" : {
"login" : "es0" ,
"id" : 10739380 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/10739380?v=4" ,
"html_url" : "https:\/\/github.com\/es0"
} ,
"html_url" : "https:\/\/github.com\/es0\/CVE-2019-11510_poc" ,
"description" : "PoC for CVE-2019-11510 | Pulse Secure 8.1R15.1\/8.2\/8.3\/9.0 SSL VPN - Arbitrary File Disclosure vulnerability" ,
"fork" : false ,
"created_at" : "2019-08-26T23:30:15Z" ,
2020-07-07 05:08:44 +02:00
"updated_at" : "2020-07-07T01:57:08Z" ,
2020-06-21 05:07:51 +02:00
"pushed_at" : "2019-08-27T00:52:49Z" ,
2020-07-07 05:08:44 +02:00
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"forks_count" : 3 ,
"forks" : 3 ,
"watchers" : 4 ,
2020-06-21 05:07:51 +02:00
"score" : 0
} ,
{
"id" : 204608508 ,
"name" : "http-pulse_ssl_vpn.nse" ,
"full_name" : "r00tpgp\/http-pulse_ssl_vpn.nse" ,
"owner" : {
"login" : "r00tpgp" ,
"id" : 29351179 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/29351179?v=4" ,
"html_url" : "https:\/\/github.com\/r00tpgp"
} ,
"html_url" : "https:\/\/github.com\/r00tpgp\/http-pulse_ssl_vpn.nse" ,
"description" : "Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510" ,
"fork" : false ,
"created_at" : "2019-08-27T03:04:19Z" ,
"updated_at" : "2020-04-21T06:45:53Z" ,
"pushed_at" : "2019-08-27T07:03:26Z" ,
"stargazers_count" : 13 ,
"watchers_count" : 13 ,
"forks_count" : 4 ,
"forks" : 4 ,
"watchers" : 13 ,
"score" : 0
} ,
{
"id" : 204666616 ,
"name" : "CVE-2019-11510-1" ,
"full_name" : "jas502n\/CVE-2019-11510-1" ,
"owner" : {
"login" : "jas502n" ,
"id" : 16593068 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4" ,
"html_url" : "https:\/\/github.com\/jas502n"
} ,
"html_url" : "https:\/\/github.com\/jas502n\/CVE-2019-11510-1" ,
"description" : "SSL VPN Rce" ,
"fork" : false ,
"created_at" : "2019-08-27T09:21:10Z" ,
2020-06-27 05:08:00 +02:00
"updated_at" : "2020-06-27T03:05:40Z" ,
2020-06-21 05:07:51 +02:00
"pushed_at" : "2019-08-27T09:29:05Z" ,
2020-06-27 05:08:00 +02:00
"stargazers_count" : 50 ,
"watchers_count" : 50 ,
2020-06-27 11:08:08 +02:00
"forks_count" : 18 ,
"forks" : 18 ,
2020-06-27 05:08:00 +02:00
"watchers" : 50 ,
2020-06-21 05:07:51 +02:00
"score" : 0
} ,
{
"id" : 205106127 ,
"name" : "CVE-2019-11510" ,
"full_name" : "jason3e7\/CVE-2019-11510" ,
"owner" : {
"login" : "jason3e7" ,
"id" : 3059297 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/3059297?v=4" ,
"html_url" : "https:\/\/github.com\/jason3e7"
} ,
"html_url" : "https:\/\/github.com\/jason3e7\/CVE-2019-11510" ,
"description" : null ,
"fork" : false ,
"created_at" : "2019-08-29T07:27:57Z" ,
"updated_at" : "2019-08-29T07:28:54Z" ,
"pushed_at" : "2019-08-29T07:28:52Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 207348255 ,
"name" : "pwn-pulse" ,
"full_name" : "BishopFox\/pwn-pulse" ,
"owner" : {
"login" : "BishopFox" ,
"id" : 4523757 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/4523757?v=4" ,
"html_url" : "https:\/\/github.com\/BishopFox"
} ,
"html_url" : "https:\/\/github.com\/BishopFox\/pwn-pulse" ,
"description" : "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)" ,
"fork" : false ,
"created_at" : "2019-09-09T15:58:39Z" ,
2020-07-08 17:08:14 +02:00
"updated_at" : "2020-07-08T14:09:16Z" ,
2020-06-21 05:07:51 +02:00
"pushed_at" : "2020-01-15T17:01:50Z" ,
2020-07-08 17:08:14 +02:00
"stargazers_count" : 79 ,
"watchers_count" : 79 ,
"forks_count" : 37 ,
"forks" : 37 ,
"watchers" : 79 ,
2020-06-21 05:07:51 +02:00
"score" : 0
} ,
{
"id" : 226548291 ,
"name" : "pulsexploit" ,
"full_name" : "aqhmal\/pulsexploit" ,
"owner" : {
"login" : "aqhmal" ,
"id" : 22043590 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/22043590?v=4" ,
"html_url" : "https:\/\/github.com\/aqhmal"
} ,
"html_url" : "https:\/\/github.com\/aqhmal\/pulsexploit" ,
"description" : "Automated script for Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API. You must have a Shodan account to use this script." ,
"fork" : false ,
"created_at" : "2019-12-07T17:09:24Z" ,
"updated_at" : "2020-04-25T05:06:47Z" ,
"pushed_at" : "2020-04-25T05:06:45Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"forks_count" : 1 ,
"forks" : 1 ,
"watchers" : 2 ,
"score" : 0
} ,
{
"id" : 256271162 ,
"name" : "check-your-pulse" ,
"full_name" : "cisagov\/check-your-pulse" ,
"owner" : {
"login" : "cisagov" ,
"id" : 18539691 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/18539691?v=4" ,
"html_url" : "https:\/\/github.com\/cisagov"
} ,
"html_url" : "https:\/\/github.com\/cisagov\/check-your-pulse" ,
"description" : "This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11510." ,
"fork" : false ,
"created_at" : "2020-04-16T16:32:47Z" ,
"updated_at" : "2020-06-20T18:21:10Z" ,
"pushed_at" : "2020-04-24T14:06:16Z" ,
"stargazers_count" : 16 ,
"watchers_count" : 16 ,
"forks_count" : 5 ,
"forks" : 5 ,
"watchers" : 16 ,
"score" : 0
}
]