PoC-in-GitHub/2019/CVE-2019-11510.json

140 lines
5 KiB
JSON
Raw Normal View History

2020-06-21 05:07:51 +02:00
[
2020-08-06 05:08:30 +02:00
{
"id": 203542766,
"name": "CVE-2019-11510",
"full_name": "projectzeroindia\/CVE-2019-11510",
"owner": {
"login": "projectzeroindia",
"id": 54312442,
2021-01-21 16:10:20 +01:00
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54312442?v=4",
2020-08-06 05:08:30 +02:00
"html_url": "https:\/\/github.com\/projectzeroindia"
},
"html_url": "https:\/\/github.com\/projectzeroindia\/CVE-2019-11510",
"description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)",
"fork": false,
"created_at": "2019-08-21T08:40:26Z",
2021-04-07 17:11:10 +02:00
"updated_at": "2021-04-07T14:49:11Z",
2020-08-06 05:08:30 +02:00
"pushed_at": "2020-01-11T13:55:33Z",
2021-04-07 17:11:10 +02:00
"stargazers_count": 342,
"watchers_count": 342,
2021-02-14 10:09:13 +01:00
"forks_count": 137,
"forks": 137,
2021-04-07 17:11:10 +02:00
"watchers": 342,
2020-08-06 05:08:30 +02:00
"score": 0
},
{
"id": 207348255,
"name": "pwn-pulse",
"full_name": "BishopFox\/pwn-pulse",
"owner": {
"login": "BishopFox",
"id": 4523757,
2021-01-21 16:10:20 +01:00
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4523757?v=4",
2020-08-06 05:08:30 +02:00
"html_url": "https:\/\/github.com\/BishopFox"
},
"html_url": "https:\/\/github.com\/BishopFox\/pwn-pulse",
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
"fork": false,
"created_at": "2019-09-09T15:58:39Z",
2021-03-02 10:09:21 +01:00
"updated_at": "2021-03-02T04:35:42Z",
2020-08-06 05:08:30 +02:00
"pushed_at": "2020-01-15T17:01:50Z",
2021-03-02 10:09:21 +01:00
"stargazers_count": 108,
"watchers_count": 108,
2021-01-24 22:09:42 +01:00
"forks_count": 50,
"forks": 50,
2021-03-02 10:09:21 +01:00
"watchers": 108,
2020-08-06 05:08:30 +02:00
"score": 0
},
2020-06-21 05:07:51 +02:00
{
"id": 226548291,
"name": "pulsexploit",
"full_name": "aqhmal\/pulsexploit",
"owner": {
"login": "aqhmal",
"id": 22043590,
2021-01-21 16:10:20 +01:00
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22043590?v=4",
2020-06-21 05:07:51 +02:00
"html_url": "https:\/\/github.com\/aqhmal"
},
"html_url": "https:\/\/github.com\/aqhmal\/pulsexploit",
"description": "Automated script for Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API. You must have a Shodan account to use this script.",
"fork": false,
"created_at": "2019-12-07T17:09:24Z",
2021-02-01 04:09:42 +01:00
"updated_at": "2021-02-01T00:34:37Z",
2020-06-21 05:07:51 +02:00
"pushed_at": "2020-04-25T05:06:45Z",
2021-02-01 04:09:42 +01:00
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks": 3,
"watchers": 3,
2020-06-21 05:07:51 +02:00
"score": 0
},
{
"id": 256271162,
"name": "check-your-pulse",
"full_name": "cisagov\/check-your-pulse",
"owner": {
"login": "cisagov",
"id": 18539691,
2021-01-21 16:10:20 +01:00
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18539691?v=4",
2020-06-21 05:07:51 +02:00
"html_url": "https:\/\/github.com\/cisagov"
},
"html_url": "https:\/\/github.com\/cisagov\/check-your-pulse",
"description": "This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11510.",
"fork": false,
"created_at": "2020-04-16T16:32:47Z",
2021-03-11 04:09:39 +01:00
"updated_at": "2021-03-10T22:46:37Z",
2020-08-20 05:08:33 +02:00
"pushed_at": "2020-08-19T22:44:06Z",
2021-03-11 04:09:39 +01:00
"stargazers_count": 21,
"watchers_count": 21,
2020-10-21 11:09:06 +02:00
"forks_count": 6,
"forks": 6,
2021-03-11 04:09:39 +01:00
"watchers": 21,
2020-06-21 05:07:51 +02:00
"score": 0
2020-07-27 17:10:13 +02:00
},
{
"id": 282932489,
"name": "pulse-exploit",
"full_name": "andripwn\/pulse-exploit",
"owner": {
"login": "andripwn",
"id": 52893492,
2021-01-21 16:10:20 +01:00
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52893492?v=4",
2020-07-27 17:10:13 +02:00
"html_url": "https:\/\/github.com\/andripwn"
},
"html_url": "https:\/\/github.com\/andripwn\/pulse-exploit",
"description": "Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API.",
"fork": false,
"created_at": "2020-07-27T15:06:08Z",
2020-12-13 16:09:45 +01:00
"updated_at": "2020-12-13T12:56:51Z",
2020-07-27 17:10:13 +02:00
"pushed_at": "2020-07-27T15:07:24Z",
2020-12-13 16:09:45 +01:00
"stargazers_count": 1,
"watchers_count": 1,
2020-07-27 17:10:13 +02:00
"forks_count": 0,
"forks": 0,
2020-12-13 16:09:45 +01:00
"watchers": 1,
2020-07-27 17:10:13 +02:00
"score": 0
2020-09-17 23:09:32 +02:00
},
{
"id": 296402155,
"name": "CVE-2019-11510-PulseVPN",
2020-10-20 23:08:37 +02:00
"full_name": "pwn3z\/CVE-2019-11510-PulseVPN",
2020-09-17 23:09:32 +02:00
"owner": {
2020-10-20 23:08:37 +02:00
"login": "pwn3z",
2020-09-17 23:09:32 +02:00
"id": 71440287,
2021-01-21 16:10:20 +01:00
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71440287?v=4",
2020-10-20 23:08:37 +02:00
"html_url": "https:\/\/github.com\/pwn3z"
2020-09-17 23:09:32 +02:00
},
2020-10-20 23:08:37 +02:00
"html_url": "https:\/\/github.com\/pwn3z\/CVE-2019-11510-PulseVPN",
2020-09-17 23:09:32 +02:00
"description": null,
"fork": false,
"created_at": "2020-09-17T17:53:56Z",
2020-11-06 04:09:07 +01:00
"updated_at": "2020-11-05T21:41:20Z",
"pushed_at": "2020-11-05T21:41:18Z",
2020-09-20 17:08:13 +02:00
"stargazers_count": 1,
"watchers_count": 1,
2020-09-17 23:09:32 +02:00
"forks_count": 0,
"forks": 0,
2020-09-20 17:08:13 +02:00
"watchers": 1,
2020-09-17 23:09:32 +02:00
"score": 0
2020-06-21 05:07:51 +02:00
}
]