[ { "id": 215200285, "name": "CVE-2019-16278", "full_name": "jas502n\/CVE-2019-16278", "owner": { "login": "jas502n", "id": 16593068, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", "html_url": "https:\/\/github.com\/jas502n" }, "html_url": "https:\/\/github.com\/jas502n\/CVE-2019-16278", "description": "Directory transversal to remote code execution", "fork": false, "created_at": "2019-10-15T03:40:13Z", "updated_at": "2023-09-16T21:26:46Z", "pushed_at": "2019-10-15T03:53:55Z", "stargazers_count": 68, "watchers_count": 68, "has_discussions": false, "forks_count": 31, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 31, "watchers": 68, "score": 0, "subscribers_count": 2 }, { "id": 215258157, "name": "CVE-2019-16278-PoC", "full_name": "imjdl\/CVE-2019-16278-PoC", "owner": { "login": "imjdl", "id": 31382943, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31382943?v=4", "html_url": "https:\/\/github.com\/imjdl" }, "html_url": "https:\/\/github.com\/imjdl\/CVE-2019-16278-PoC", "description": "CVE-2019-16728 Proof of Concept", "fork": false, "created_at": "2019-10-15T09:22:36Z", "updated_at": "2023-09-16T21:26:46Z", "pushed_at": "2019-10-15T09:28:25Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 7, "score": 0, "subscribers_count": 2 }, { "id": 215297351, "name": "CVE-2019-16278", "full_name": "ianxtianxt\/CVE-2019-16278", "owner": { "login": "ianxtianxt", "id": 45796484, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45796484?v=4", "html_url": "https:\/\/github.com\/ianxtianxt" }, "html_url": "https:\/\/github.com\/ianxtianxt\/CVE-2019-16278", "description": "CVE-2019-16278Nostromo httpd命令执行", "fork": false, "created_at": "2019-10-15T12:47:59Z", "updated_at": "2023-09-16T21:26:46Z", "pushed_at": "2020-01-11T07:25:38Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 6, "watchers": 2, "score": 0, "subscribers_count": 2 }, { "id": 217164072, "name": "Nostromo_Python3", "full_name": "darkerego\/Nostromo_Python3", "owner": { "login": "darkerego", "id": 8583665, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8583665?v=4", "html_url": "https:\/\/github.com\/darkerego" }, "html_url": "https:\/\/github.com\/darkerego\/Nostromo_Python3", "description": "CVE-2019-16278 Python3 Exploit Code", "fork": false, "created_at": "2019-10-23T22:24:18Z", "updated_at": "2023-09-09T18:40:27Z", "pushed_at": "2019-10-23T22:26:41Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 1, "score": 0, "subscribers_count": 3 }, { "id": 223463242, "name": "CVE-2019-16278", "full_name": "AnubisSec\/CVE-2019-16278", "owner": { "login": "AnubisSec", "id": 38790814, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38790814?v=4", "html_url": "https:\/\/github.com\/AnubisSec" }, "html_url": "https:\/\/github.com\/AnubisSec\/CVE-2019-16278", "description": "A quick python exploit for the Nostromo 1.9.6 remote code execution vulnerability. Simply takes a host and port that the web server is running on. ", "fork": false, "created_at": "2019-11-22T18:35:14Z", "updated_at": "2023-09-16T21:27:49Z", "pushed_at": "2019-11-22T18:57:29Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 7, "score": 0, "subscribers_count": 2 }, { "id": 224208624, "name": "CVE-2019-16278-Nostromo_1.9.6-RCE", "full_name": "theRealFr13nd\/CVE-2019-16278-Nostromo_1.9.6-RCE", "owner": { "login": "theRealFr13nd", "id": 36172640, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36172640?v=4", "html_url": "https:\/\/github.com\/theRealFr13nd" }, "html_url": "https:\/\/github.com\/theRealFr13nd\/CVE-2019-16278-Nostromo_1.9.6-RCE", "description": "Python script to exploit RCE in Nostromo nhttpd <= 1.9.6.", "fork": false, "created_at": "2019-11-26T14:15:44Z", "updated_at": "2023-09-16T21:27:56Z", "pushed_at": "2019-11-26T14:26:03Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 6, "score": 0, "subscribers_count": 1 }, { "id": 231114950, "name": "cve-2019-16278", "full_name": "Kr0ff\/cve-2019-16278", "owner": { "login": "Kr0ff", "id": 35173514, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35173514?v=4", "html_url": "https:\/\/github.com\/Kr0ff" }, "html_url": "https:\/\/github.com\/Kr0ff\/cve-2019-16278", "description": "(Nhttpd) Nostromo 1.9.6 RCE due to Directory Traversal ", "fork": false, "created_at": "2019-12-31T16:06:13Z", "updated_at": "2020-02-19T19:35:33Z", "pushed_at": "2019-12-31T16:07:48Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 231220055, "name": "CVE-2019-16278", "full_name": "NHPT\/CVE-2019-16278", "owner": { "login": "NHPT", "id": 42366434, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42366434?v=4", "html_url": "https:\/\/github.com\/NHPT" }, "html_url": "https:\/\/github.com\/NHPT\/CVE-2019-16278", "description": "CVE-2019-16278:Nostromo Web服务器的RCE漏洞", "fork": false, "created_at": "2020-01-01T13:28:40Z", "updated_at": "2023-09-16T21:28:50Z", "pushed_at": "2020-01-01T13:36:22Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 251251110, "name": "cve-2019-16278", "full_name": "keshiba\/cve-2019-16278", "owner": { "login": "keshiba", "id": 62872563, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62872563?v=4", "html_url": "https:\/\/github.com\/keshiba" }, "html_url": "https:\/\/github.com\/keshiba\/cve-2019-16278", "description": "Exploit for the CVE-2019-16278 vulnerability", "fork": false, "created_at": "2020-03-30T08:54:06Z", "updated_at": "2022-06-24T16:41:10Z", "pushed_at": "2022-06-24T16:41:07Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "exploits", "httpd" ], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 387298591, "name": "CVE-2019-16278", "full_name": "crypticdante\/CVE-2019-16278", "owner": { "login": "crypticdante", "id": 66146701, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4", "html_url": "https:\/\/github.com\/crypticdante" }, "html_url": "https:\/\/github.com\/crypticdante\/CVE-2019-16278", "description": null, "fork": false, "created_at": "2021-07-19T00:45:07Z", "updated_at": "2022-04-23T17:25:31Z", "pushed_at": "2022-04-23T17:25:29Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 473589212, "name": "CVE-2019-16278", "full_name": "alexander-fernandes\/CVE-2019-16278", "owner": { "login": "alexander-fernandes", "id": 82245105, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82245105?v=4", "html_url": "https:\/\/github.com\/alexander-fernandes" }, "html_url": "https:\/\/github.com\/alexander-fernandes\/CVE-2019-16278", "description": "A quick python exploit for the Nostromo 1.9.6 remote code execution vulnerability. Only takes in host and port of web server as required arguments.", "fork": false, "created_at": "2022-03-24T12:06:55Z", "updated_at": "2022-03-24T12:25:16Z", "pushed_at": "2022-03-24T12:25:13Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 636450695, "name": "CVE-2019-16278-Nostromo-1.9.6-RCE", "full_name": "FredBrave\/CVE-2019-16278-Nostromo-1.9.6-RCE", "owner": { "login": "FredBrave", "id": 114189847, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114189847?v=4", "html_url": "https:\/\/github.com\/FredBrave" }, "html_url": "https:\/\/github.com\/FredBrave\/CVE-2019-16278-Nostromo-1.9.6-RCE", "description": "This is a exploit of CVE-2019-16278 for Nostromo 1.9.6 RCE. This exploit allows RCE on the victim machine.", "fork": false, "created_at": "2023-05-04T21:59:23Z", "updated_at": "2023-05-04T22:07:58Z", "pushed_at": "2023-05-04T22:07:53Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 692498488, "name": "CVE-2019-16278", "full_name": "0xTabun\/CVE-2019-16278", "owner": { "login": "0xTabun", "id": 144548207, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144548207?v=4", "html_url": "https:\/\/github.com\/0xTabun" }, "html_url": "https:\/\/github.com\/0xTabun\/CVE-2019-16278", "description": "Nostromo 1.9.6 reverse shell", "fork": false, "created_at": "2023-09-16T17:01:25Z", "updated_at": "2023-09-16T17:01:46Z", "pushed_at": "2023-09-16T17:09:36Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 } ]