[ { "id": 215200285, "name": "CVE-2019-16278", "full_name": "jas502n\/CVE-2019-16278", "owner": { "login": "jas502n", "id": 16593068, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4", "html_url": "https:\/\/github.com\/jas502n" }, "html_url": "https:\/\/github.com\/jas502n\/CVE-2019-16278", "description": "Directory transversal to remote code execution", "fork": false, "created_at": "2019-10-15T03:40:13Z", "updated_at": "2019-12-16T02:22:08Z", "pushed_at": "2019-10-15T03:53:55Z", "stargazers_count": 53, "watchers_count": 53, "forks_count": 21, "forks": 21, "watchers": 53, "score": 0 }, { "id": 215258157, "name": "CVE-2019-16278-PoC", "full_name": "imjdl\/CVE-2019-16278-PoC", "owner": { "login": "imjdl", "id": 31382943, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/31382943?v=4", "html_url": "https:\/\/github.com\/imjdl" }, "html_url": "https:\/\/github.com\/imjdl\/CVE-2019-16278-PoC", "description": "CVE-2019-16728 Proof of Concept", "fork": false, "created_at": "2019-10-15T09:22:36Z", "updated_at": "2019-11-29T02:47:33Z", "pushed_at": "2019-10-15T09:28:25Z", "stargazers_count": 5, "watchers_count": 5, "forks_count": 0, "forks": 0, "watchers": 5, "score": 0 }, { "id": 215297351, "name": "CVE-2019-16278", "full_name": "ianxtianxt\/CVE-2019-16278", "owner": { "login": "ianxtianxt", "id": 45796484, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/45796484?v=4", "html_url": "https:\/\/github.com\/ianxtianxt" }, "html_url": "https:\/\/github.com\/ianxtianxt\/CVE-2019-16278", "description": "CVE-2019-16278Nostromo httpd命令执行", "fork": false, "created_at": "2019-10-15T12:47:59Z", "updated_at": "2019-10-29T03:51:07Z", "pushed_at": "2019-10-15T12:48:39Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 2, "forks": 2, "watchers": 1, "score": 0 }, { "id": 217164072, "name": "Nostromo_Python3", "full_name": "darkerego\/Nostromo_Python3", "owner": { "login": "darkerego", "id": 8583665, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8583665?v=4", "html_url": "https:\/\/github.com\/darkerego" }, "html_url": "https:\/\/github.com\/darkerego\/Nostromo_Python3", "description": "CVE-2019-16278 Python3 Exploit Code", "fork": false, "created_at": "2019-10-23T22:24:18Z", "updated_at": "2019-10-23T22:26:43Z", "pushed_at": "2019-10-23T22:26:41Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "forks": 1, "watchers": 0, "score": 0 }, { "id": 223463242, "name": "CVE-2019-16278", "full_name": "AnubisSec\/CVE-2019-16278", "owner": { "login": "AnubisSec", "id": 38790814, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/38790814?v=4", "html_url": "https:\/\/github.com\/AnubisSec" }, "html_url": "https:\/\/github.com\/AnubisSec\/CVE-2019-16278", "description": "A quick python exploit for the Nostromo 1.9.6 remote code execution vulnerability. Simply takes a host and port that the web server is running on. ", "fork": false, "created_at": "2019-11-22T18:35:14Z", "updated_at": "2019-11-22T18:57:31Z", "pushed_at": "2019-11-22T18:57:29Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 224208624, "name": "CVE-2019-16278-Nostromo_1.9.6-RCE", "full_name": "rptucker\/CVE-2019-16278-Nostromo_1.9.6-RCE", "owner": { "login": "rptucker", "id": 36172640, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/36172640?v=4", "html_url": "https:\/\/github.com\/rptucker" }, "html_url": "https:\/\/github.com\/rptucker\/CVE-2019-16278-Nostromo_1.9.6-RCE", "description": "Python script to exploit RCE in Nostromo nhttpd <= 1.9.6.", "fork": false, "created_at": "2019-11-26T14:15:44Z", "updated_at": "2019-11-26T14:26:05Z", "pushed_at": "2019-11-26T14:26:03Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 } ]