2020-06-21 05:07:51 +02:00
[
{
"id" : 251251110 ,
"name" : "cve-2019-16278" ,
"full_name" : "keshiba\/cve-2019-16278" ,
"owner" : {
"login" : "keshiba" ,
"id" : 62872563 ,
2021-01-21 16:10:20 +01:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/62872563?v=4" ,
2020-06-21 05:07:51 +02:00
"html_url" : "https:\/\/github.com\/keshiba"
} ,
"html_url" : "https:\/\/github.com\/keshiba\/cve-2019-16278" ,
"description" : "Exploit for the CVE-2019-16278 vulnerability" ,
"fork" : false ,
"created_at" : "2020-03-30T08:54:06Z" ,
2022-06-24 20:16:21 +02:00
"updated_at" : "2022-06-24T16:41:10Z" ,
"pushed_at" : "2022-06-24T16:41:07Z" ,
2020-06-21 05:07:51 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2022-11-08 01:17:44 +01:00
"has_discussions" : false ,
2021-04-13 23:10:41 +02:00
"forks_count" : 1 ,
2021-09-13 23:12:57 +02:00
"allow_forking" : true ,
2021-10-06 23:13:51 +02:00
"is_template" : false ,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required" : false ,
2021-10-06 23:13:51 +02:00
"topics" : [
"exploits" ,
"httpd"
] ,
2021-10-01 23:13:10 +02:00
"visibility" : "public" ,
2021-04-13 23:10:41 +02:00
"forks" : 1 ,
2020-06-21 05:07:51 +02:00
"watchers" : 0 ,
"score" : 0
2021-07-19 05:12:00 +02:00
} ,
{
"id" : 387298591 ,
"name" : "CVE-2019-16278" ,
2022-03-21 19:14:45 +01:00
"full_name" : "k4u5h41\/CVE-2019-16278" ,
2021-07-19 05:12:00 +02:00
"owner" : {
2022-03-21 19:14:45 +01:00
"login" : "k4u5h41" ,
2021-07-19 05:12:00 +02:00
"id" : 66146701 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4" ,
2022-03-21 19:14:45 +01:00
"html_url" : "https:\/\/github.com\/k4u5h41"
2021-07-19 05:12:00 +02:00
} ,
2022-03-21 19:14:45 +01:00
"html_url" : "https:\/\/github.com\/k4u5h41\/CVE-2019-16278" ,
2021-07-19 05:12:00 +02:00
"description" : null ,
"fork" : false ,
"created_at" : "2021-07-19T00:45:07Z" ,
2022-04-23 20:15:16 +02:00
"updated_at" : "2022-04-23T17:25:31Z" ,
"pushed_at" : "2022-04-23T17:25:29Z" ,
2021-07-19 05:12:00 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2022-11-08 07:19:29 +01:00
"has_discussions" : false ,
2021-07-19 05:12:00 +02:00
"forks_count" : 0 ,
2021-09-13 23:12:57 +02:00
"allow_forking" : true ,
2021-10-06 23:13:51 +02:00
"is_template" : false ,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required" : false ,
2021-10-06 23:13:51 +02:00
"topics" : [ ] ,
2021-10-01 23:13:10 +02:00
"visibility" : "public" ,
2021-07-19 05:12:00 +02:00
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-03-24 13:14:41 +01:00
} ,
{
"id" : 473589212 ,
"name" : "CVE-2019-16278" ,
"full_name" : "alexander-fernandes\/CVE-2019-16278" ,
"owner" : {
"login" : "alexander-fernandes" ,
"id" : 82245105 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/82245105?v=4" ,
"html_url" : "https:\/\/github.com\/alexander-fernandes"
} ,
"html_url" : "https:\/\/github.com\/alexander-fernandes\/CVE-2019-16278" ,
"description" : "A quick python exploit for the Nostromo 1.9.6 remote code execution vulnerability. Only takes in host and port of web server as required arguments." ,
"fork" : false ,
"created_at" : "2022-03-24T12:06:55Z" ,
2022-03-24 19:15:06 +01:00
"updated_at" : "2022-03-24T12:25:16Z" ,
"pushed_at" : "2022-03-24T12:25:13Z" ,
2022-03-24 13:14:41 +01:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2022-11-08 07:19:29 +01:00
"has_discussions" : false ,
2022-03-28 14:17:37 +02:00
"forks_count" : 1 ,
2022-03-24 13:14:41 +01:00
"allow_forking" : true ,
"is_template" : false ,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required" : false ,
2022-03-24 13:14:41 +01:00
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-28 14:17:37 +02:00
"forks" : 1 ,
2022-03-24 13:14:41 +01:00
"watchers" : 0 ,
"score" : 0
2020-06-21 05:07:51 +02:00
}
]