[ { "id": 215200285, "name": "CVE-2019-16278", "full_name": "jas502n\/CVE-2019-16278", "owner": { "login": "jas502n", "id": 16593068, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", "html_url": "https:\/\/github.com\/jas502n" }, "html_url": "https:\/\/github.com\/jas502n\/CVE-2019-16278", "description": "Directory transversal to remote code execution", "fork": false, "created_at": "2019-10-15T03:40:13Z", "updated_at": "2022-11-09T18:04:55Z", "pushed_at": "2019-10-15T03:53:55Z", "stargazers_count": 67, "watchers_count": 67, "has_discussions": false, "forks_count": 31, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 31, "watchers": 67, "score": 0 }, { "id": 215258157, "name": "CVE-2019-16278-PoC", "full_name": "imjdl\/CVE-2019-16278-PoC", "owner": { "login": "imjdl", "id": 31382943, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31382943?v=4", "html_url": "https:\/\/github.com\/imjdl" }, "html_url": "https:\/\/github.com\/imjdl\/CVE-2019-16278-PoC", "description": "CVE-2019-16728 Proof of Concept", "fork": false, "created_at": "2019-10-15T09:22:36Z", "updated_at": "2022-11-09T18:04:55Z", "pushed_at": "2019-10-15T09:28:25Z", "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 8, "score": 0 }, { "id": 215297351, "name": "CVE-2019-16278", "full_name": "ianxtianxt\/CVE-2019-16278", "owner": { "login": "ianxtianxt", "id": 45796484, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45796484?v=4", "html_url": "https:\/\/github.com\/ianxtianxt" }, "html_url": "https:\/\/github.com\/ianxtianxt\/CVE-2019-16278", "description": "CVE-2019-16278Nostromo httpd命令执行", "fork": false, "created_at": "2019-10-15T12:47:59Z", "updated_at": "2022-11-09T18:04:55Z", "pushed_at": "2020-01-11T07:25:38Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 6, "watchers": 3, "score": 0 }, { "id": 217164072, "name": "Nostromo_Python3", "full_name": "darkerego\/Nostromo_Python3", "owner": { "login": "darkerego", "id": 8583665, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8583665?v=4", "html_url": "https:\/\/github.com\/darkerego" }, "html_url": "https:\/\/github.com\/darkerego\/Nostromo_Python3", "description": "CVE-2019-16278 Python3 Exploit Code", "fork": false, "created_at": "2019-10-23T22:24:18Z", "updated_at": "2019-10-23T22:26:43Z", "pushed_at": "2019-10-23T22:26:41Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 0, "score": 0 }, { "id": 223463242, "name": "CVE-2019-16278", "full_name": "AnubisSec\/CVE-2019-16278", "owner": { "login": "AnubisSec", "id": 38790814, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38790814?v=4", "html_url": "https:\/\/github.com\/AnubisSec" }, "html_url": "https:\/\/github.com\/AnubisSec\/CVE-2019-16278", "description": "A quick python exploit for the Nostromo 1.9.6 remote code execution vulnerability. Simply takes a host and port that the web server is running on. ", "fork": false, "created_at": "2019-11-22T18:35:14Z", "updated_at": "2023-01-21T16:12:32Z", "pushed_at": "2019-11-22T18:57:29Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 7, "score": 0 }, { "id": 224208624, "name": "CVE-2019-16278-Nostromo_1.9.6-RCE", "full_name": "theRealFr13nd\/CVE-2019-16278-Nostromo_1.9.6-RCE", "owner": { "login": "theRealFr13nd", "id": 36172640, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36172640?v=4", "html_url": "https:\/\/github.com\/theRealFr13nd" }, "html_url": "https:\/\/github.com\/theRealFr13nd\/CVE-2019-16278-Nostromo_1.9.6-RCE", "description": "Python script to exploit RCE in Nostromo nhttpd <= 1.9.6.", "fork": false, "created_at": "2019-11-26T14:15:44Z", "updated_at": "2022-03-05T13:09:13Z", "pushed_at": "2019-11-26T14:26:03Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 7, "score": 0 }, { "id": 231114950, "name": "cve-2019-16278", "full_name": "Kr0ff\/cve-2019-16278", "owner": { "login": "Kr0ff", "id": 35173514, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35173514?v=4", "html_url": "https:\/\/github.com\/Kr0ff" }, "html_url": "https:\/\/github.com\/Kr0ff\/cve-2019-16278", "description": "(Nhttpd) Nostromo 1.9.6 RCE due to Directory Traversal ", "fork": false, "created_at": "2019-12-31T16:06:13Z", "updated_at": "2020-02-19T19:35:33Z", "pushed_at": "2019-12-31T16:07:48Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 231220055, "name": "CVE-2019-16278", "full_name": "NHPT\/CVE-2019-16278", "owner": { "login": "NHPT", "id": 42366434, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42366434?v=4", "html_url": "https:\/\/github.com\/NHPT" }, "html_url": "https:\/\/github.com\/NHPT\/CVE-2019-16278", "description": "CVE-2019-16278:Nostromo Web服务器的RCE漏洞", "fork": false, "created_at": "2020-01-01T13:28:40Z", "updated_at": "2022-11-09T18:05:44Z", "pushed_at": "2020-01-01T13:36:22Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 251251110, "name": "cve-2019-16278", "full_name": "keshiba\/cve-2019-16278", "owner": { "login": "keshiba", "id": 62872563, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62872563?v=4", "html_url": "https:\/\/github.com\/keshiba" }, "html_url": "https:\/\/github.com\/keshiba\/cve-2019-16278", "description": "Exploit for the CVE-2019-16278 vulnerability", "fork": false, "created_at": "2020-03-30T08:54:06Z", "updated_at": "2022-06-24T16:41:10Z", "pushed_at": "2022-06-24T16:41:07Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "exploits", "httpd" ], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 387298591, "name": "CVE-2019-16278", "full_name": "k4u5h41\/CVE-2019-16278", "owner": { "login": "k4u5h41", "id": 66146701, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4", "html_url": "https:\/\/github.com\/k4u5h41" }, "html_url": "https:\/\/github.com\/k4u5h41\/CVE-2019-16278", "description": null, "fork": false, "created_at": "2021-07-19T00:45:07Z", "updated_at": "2022-04-23T17:25:31Z", "pushed_at": "2022-04-23T17:25:29Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 473589212, "name": "CVE-2019-16278", "full_name": "alexander-fernandes\/CVE-2019-16278", "owner": { "login": "alexander-fernandes", "id": 82245105, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82245105?v=4", "html_url": "https:\/\/github.com\/alexander-fernandes" }, "html_url": "https:\/\/github.com\/alexander-fernandes\/CVE-2019-16278", "description": "A quick python exploit for the Nostromo 1.9.6 remote code execution vulnerability. Only takes in host and port of web server as required arguments.", "fork": false, "created_at": "2022-03-24T12:06:55Z", "updated_at": "2022-03-24T12:25:16Z", "pushed_at": "2022-03-24T12:25:13Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 } ]