PoC-in-GitHub/2019/CVE-2019-11510.json
2020-06-10 00:07:57 +09:00

232 lines
No EOL
8.2 KiB
JSON

[
{
"id": 203542766,
"name": "CVE-2019-11510",
"full_name": "projectzeroindia\/CVE-2019-11510",
"owner": {
"login": "projectzeroindia",
"id": 54312442,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/54312442?v=4",
"html_url": "https:\/\/github.com\/projectzeroindia"
},
"html_url": "https:\/\/github.com\/projectzeroindia\/CVE-2019-11510",
"description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)",
"fork": false,
"created_at": "2019-08-21T08:40:26Z",
"updated_at": "2020-05-22T14:36:00Z",
"pushed_at": "2020-01-11T13:55:33Z",
"stargazers_count": 313,
"watchers_count": 313,
"forks_count": 122,
"forks": 122,
"watchers": 313,
"score": 0
},
{
"id": 203567273,
"name": "Pulse",
"full_name": "ladyleet1337\/Pulse",
"owner": {
"login": "ladyleet1337",
"id": 26109832,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/26109832?v=4",
"html_url": "https:\/\/github.com\/ladyleet1337"
},
"html_url": "https:\/\/github.com\/ladyleet1337\/Pulse",
"description": "Pulse Secure VPN CVE-2019-11510",
"fork": false,
"created_at": "2019-08-21T11:08:48Z",
"updated_at": "2019-11-13T06:46:41Z",
"pushed_at": "2019-08-21T12:03:54Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"score": 0
},
{
"id": 203747377,
"name": "CVE-2019-11510-poc",
"full_name": "imjdl\/CVE-2019-11510-poc",
"owner": {
"login": "imjdl",
"id": 31382943,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/31382943?v=4",
"html_url": "https:\/\/github.com\/imjdl"
},
"html_url": "https:\/\/github.com\/imjdl\/CVE-2019-11510-poc",
"description": "Pulse Secure SSL VPN pre-auth file reading",
"fork": false,
"created_at": "2019-08-22T08:18:19Z",
"updated_at": "2020-06-09T11:10:52Z",
"pushed_at": "2019-08-26T19:33:43Z",
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 16,
"forks": 16,
"watchers": 43,
"score": 0
},
{
"id": 204579243,
"name": "CVE-2019-11510_poc",
"full_name": "es0\/CVE-2019-11510_poc",
"owner": {
"login": "es0",
"id": 10739380,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/10739380?v=4",
"html_url": "https:\/\/github.com\/es0"
},
"html_url": "https:\/\/github.com\/es0\/CVE-2019-11510_poc",
"description": "PoC for CVE-2019-11510 | Pulse Secure 8.1R15.1\/8.2\/8.3\/9.0 SSL VPN - Arbitrary File Disclosure vulnerability",
"fork": false,
"created_at": "2019-08-26T23:30:15Z",
"updated_at": "2020-02-27T09:47:01Z",
"pushed_at": "2019-08-27T00:52:49Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 204608508,
"name": "http-pulse_ssl_vpn.nse",
"full_name": "r00tpgp\/http-pulse_ssl_vpn.nse",
"owner": {
"login": "r00tpgp",
"id": 29351179,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/29351179?v=4",
"html_url": "https:\/\/github.com\/r00tpgp"
},
"html_url": "https:\/\/github.com\/r00tpgp\/http-pulse_ssl_vpn.nse",
"description": "Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510",
"fork": false,
"created_at": "2019-08-27T03:04:19Z",
"updated_at": "2020-04-21T06:45:53Z",
"pushed_at": "2019-08-27T07:03:26Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 4,
"forks": 4,
"watchers": 13,
"score": 0
},
{
"id": 204666616,
"name": "CVE-2019-11510-1",
"full_name": "jas502n\/CVE-2019-11510-1",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-11510-1",
"description": "SSL VPN Rce",
"fork": false,
"created_at": "2019-08-27T09:21:10Z",
"updated_at": "2020-05-07T06:15:42Z",
"pushed_at": "2019-08-27T09:29:05Z",
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 17,
"forks": 17,
"watchers": 49,
"score": 0
},
{
"id": 205106127,
"name": "CVE-2019-11510",
"full_name": "jason3e7\/CVE-2019-11510",
"owner": {
"login": "jason3e7",
"id": 3059297,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/3059297?v=4",
"html_url": "https:\/\/github.com\/jason3e7"
},
"html_url": "https:\/\/github.com\/jason3e7\/CVE-2019-11510",
"description": null,
"fork": false,
"created_at": "2019-08-29T07:27:57Z",
"updated_at": "2019-08-29T07:28:54Z",
"pushed_at": "2019-08-29T07:28:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 207348255,
"name": "pwn-pulse",
"full_name": "BishopFox\/pwn-pulse",
"owner": {
"login": "BishopFox",
"id": 4523757,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/4523757?v=4",
"html_url": "https:\/\/github.com\/BishopFox"
},
"html_url": "https:\/\/github.com\/BishopFox\/pwn-pulse",
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
"fork": false,
"created_at": "2019-09-09T15:58:39Z",
"updated_at": "2020-05-05T07:32:43Z",
"pushed_at": "2020-01-15T17:01:50Z",
"stargazers_count": 76,
"watchers_count": 76,
"forks_count": 34,
"forks": 34,
"watchers": 76,
"score": 0
},
{
"id": 226548291,
"name": "pulsexploit",
"full_name": "aqhmal\/pulsexploit",
"owner": {
"login": "aqhmal",
"id": 22043590,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/22043590?v=4",
"html_url": "https:\/\/github.com\/aqhmal"
},
"html_url": "https:\/\/github.com\/aqhmal\/pulsexploit",
"description": "Automated script for Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API. You must have a Shodan account to use this script.",
"fork": false,
"created_at": "2019-12-07T17:09:24Z",
"updated_at": "2020-04-25T05:06:47Z",
"pushed_at": "2020-04-25T05:06:45Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 256271162,
"name": "check-your-pulse",
"full_name": "cisagov\/check-your-pulse",
"owner": {
"login": "cisagov",
"id": 18539691,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/18539691?v=4",
"html_url": "https:\/\/github.com\/cisagov"
},
"html_url": "https:\/\/github.com\/cisagov\/check-your-pulse",
"description": "This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11510.",
"fork": false,
"created_at": "2020-04-16T16:32:47Z",
"updated_at": "2020-05-08T01:51:03Z",
"pushed_at": "2020-04-24T14:06:16Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 5,
"forks": 5,
"watchers": 15,
"score": 0
}
]