[ { "id": 215297351, "name": "CVE-2019-16278", "full_name": "ianxtianxt\/CVE-2019-16278", "owner": { "login": "ianxtianxt", "id": 45796484, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45796484?v=4", "html_url": "https:\/\/github.com\/ianxtianxt" }, "html_url": "https:\/\/github.com\/ianxtianxt\/CVE-2019-16278", "description": "CVE-2019-16278Nostromo httpd命令执行", "fork": false, "created_at": "2019-10-15T12:47:59Z", "updated_at": "2022-11-09T18:04:55Z", "pushed_at": "2020-01-11T07:25:38Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 6, "watchers": 3, "score": 0 }, { "id": 251251110, "name": "cve-2019-16278", "full_name": "keshiba\/cve-2019-16278", "owner": { "login": "keshiba", "id": 62872563, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62872563?v=4", "html_url": "https:\/\/github.com\/keshiba" }, "html_url": "https:\/\/github.com\/keshiba\/cve-2019-16278", "description": "Exploit for the CVE-2019-16278 vulnerability", "fork": false, "created_at": "2020-03-30T08:54:06Z", "updated_at": "2022-06-24T16:41:10Z", "pushed_at": "2022-06-24T16:41:07Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "exploits", "httpd" ], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 387298591, "name": "CVE-2019-16278", "full_name": "k4u5h41\/CVE-2019-16278", "owner": { "login": "k4u5h41", "id": 66146701, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4", "html_url": "https:\/\/github.com\/k4u5h41" }, "html_url": "https:\/\/github.com\/k4u5h41\/CVE-2019-16278", "description": null, "fork": false, "created_at": "2021-07-19T00:45:07Z", "updated_at": "2022-04-23T17:25:31Z", "pushed_at": "2022-04-23T17:25:29Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 473589212, "name": "CVE-2019-16278", "full_name": "alexander-fernandes\/CVE-2019-16278", "owner": { "login": "alexander-fernandes", "id": 82245105, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82245105?v=4", "html_url": "https:\/\/github.com\/alexander-fernandes" }, "html_url": "https:\/\/github.com\/alexander-fernandes\/CVE-2019-16278", "description": "A quick python exploit for the Nostromo 1.9.6 remote code execution vulnerability. Only takes in host and port of web server as required arguments.", "fork": false, "created_at": "2022-03-24T12:06:55Z", "updated_at": "2022-03-24T12:25:16Z", "pushed_at": "2022-03-24T12:25:13Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 } ]