PoC-in-GitHub/2019/CVE-2019-16278.json

92 lines
3.1 KiB
JSON
Raw Normal View History

2020-06-21 05:07:51 +02:00
[
{
"id": 251251110,
"name": "cve-2019-16278",
"full_name": "keshiba\/cve-2019-16278",
"owner": {
"login": "keshiba",
"id": 62872563,
2021-01-21 16:10:20 +01:00
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62872563?v=4",
2020-06-21 05:07:51 +02:00
"html_url": "https:\/\/github.com\/keshiba"
},
"html_url": "https:\/\/github.com\/keshiba\/cve-2019-16278",
"description": "Exploit for the CVE-2019-16278 vulnerability",
"fork": false,
"created_at": "2020-03-30T08:54:06Z",
2022-06-24 20:16:21 +02:00
"updated_at": "2022-06-24T16:41:10Z",
"pushed_at": "2022-06-24T16:41:07Z",
2020-06-21 05:07:51 +02:00
"stargazers_count": 0,
"watchers_count": 0,
2022-11-08 01:17:44 +01:00
"has_discussions": false,
2021-04-13 23:10:41 +02:00
"forks_count": 1,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required": false,
2021-10-06 23:13:51 +02:00
"topics": [
"exploits",
"httpd"
],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-04-13 23:10:41 +02:00
"forks": 1,
2020-06-21 05:07:51 +02:00
"watchers": 0,
"score": 0
2021-07-19 05:12:00 +02:00
},
{
"id": 387298591,
"name": "CVE-2019-16278",
2022-03-21 19:14:45 +01:00
"full_name": "k4u5h41\/CVE-2019-16278",
2021-07-19 05:12:00 +02:00
"owner": {
2022-03-21 19:14:45 +01:00
"login": "k4u5h41",
2021-07-19 05:12:00 +02:00
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
2022-03-21 19:14:45 +01:00
"html_url": "https:\/\/github.com\/k4u5h41"
2021-07-19 05:12:00 +02:00
},
2022-03-21 19:14:45 +01:00
"html_url": "https:\/\/github.com\/k4u5h41\/CVE-2019-16278",
2021-07-19 05:12:00 +02:00
"description": null,
"fork": false,
"created_at": "2021-07-19T00:45:07Z",
2022-04-23 20:15:16 +02:00
"updated_at": "2022-04-23T17:25:31Z",
"pushed_at": "2022-04-23T17:25:29Z",
2021-07-19 05:12:00 +02:00
"stargazers_count": 0,
"watchers_count": 0,
2022-11-08 07:19:29 +01:00
"has_discussions": false,
2021-07-19 05:12:00 +02:00
"forks_count": 0,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required": false,
2021-10-06 23:13:51 +02:00
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-07-19 05:12:00 +02:00
"forks": 0,
"watchers": 0,
"score": 0
2022-03-24 13:14:41 +01:00
},
{
"id": 473589212,
"name": "CVE-2019-16278",
"full_name": "alexander-fernandes\/CVE-2019-16278",
"owner": {
"login": "alexander-fernandes",
"id": 82245105,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82245105?v=4",
"html_url": "https:\/\/github.com\/alexander-fernandes"
},
"html_url": "https:\/\/github.com\/alexander-fernandes\/CVE-2019-16278",
"description": "A quick python exploit for the Nostromo 1.9.6 remote code execution vulnerability. Only takes in host and port of web server as required arguments.",
"fork": false,
"created_at": "2022-03-24T12:06:55Z",
2022-03-24 19:15:06 +01:00
"updated_at": "2022-03-24T12:25:16Z",
"pushed_at": "2022-03-24T12:25:13Z",
2022-03-24 13:14:41 +01:00
"stargazers_count": 0,
"watchers_count": 0,
2022-11-08 07:19:29 +01:00
"has_discussions": false,
2022-03-28 14:17:37 +02:00
"forks_count": 1,
2022-03-24 13:14:41 +01:00
"allow_forking": true,
"is_template": false,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required": false,
2022-03-24 13:14:41 +01:00
"topics": [],
"visibility": "public",
2022-03-28 14:17:37 +02:00
"forks": 1,
2022-03-24 13:14:41 +01:00
"watchers": 0,
"score": 0
2020-06-21 05:07:51 +02:00
}
]