PoC-in-GitHub/2019/CVE-2019-16278.json
2019-12-16 12:30:01 +09:00

140 lines
No EOL
4.9 KiB
JSON

[
{
"id": 215200285,
"name": "CVE-2019-16278",
"full_name": "jas502n\/CVE-2019-16278",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-16278",
"description": "Directory transversal to remote code execution",
"fork": false,
"created_at": "2019-10-15T03:40:13Z",
"updated_at": "2019-12-16T02:22:08Z",
"pushed_at": "2019-10-15T03:53:55Z",
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 21,
"forks": 21,
"watchers": 53,
"score": 0
},
{
"id": 215258157,
"name": "CVE-2019-16278-PoC",
"full_name": "imjdl\/CVE-2019-16278-PoC",
"owner": {
"login": "imjdl",
"id": 31382943,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/31382943?v=4",
"html_url": "https:\/\/github.com\/imjdl"
},
"html_url": "https:\/\/github.com\/imjdl\/CVE-2019-16278-PoC",
"description": "CVE-2019-16728 Proof of Concept",
"fork": false,
"created_at": "2019-10-15T09:22:36Z",
"updated_at": "2019-11-29T02:47:33Z",
"pushed_at": "2019-10-15T09:28:25Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 5,
"score": 0
},
{
"id": 215297351,
"name": "CVE-2019-16278",
"full_name": "ianxtianxt\/CVE-2019-16278",
"owner": {
"login": "ianxtianxt",
"id": 45796484,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/45796484?v=4",
"html_url": "https:\/\/github.com\/ianxtianxt"
},
"html_url": "https:\/\/github.com\/ianxtianxt\/CVE-2019-16278",
"description": "CVE-2019-16278Nostromo httpd命令执行",
"fork": false,
"created_at": "2019-10-15T12:47:59Z",
"updated_at": "2019-10-29T03:51:07Z",
"pushed_at": "2019-10-15T12:48:39Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 217164072,
"name": "Nostromo_Python3",
"full_name": "darkerego\/Nostromo_Python3",
"owner": {
"login": "darkerego",
"id": 8583665,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8583665?v=4",
"html_url": "https:\/\/github.com\/darkerego"
},
"html_url": "https:\/\/github.com\/darkerego\/Nostromo_Python3",
"description": "CVE-2019-16278 Python3 Exploit Code",
"fork": false,
"created_at": "2019-10-23T22:24:18Z",
"updated_at": "2019-10-23T22:26:43Z",
"pushed_at": "2019-10-23T22:26:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 223463242,
"name": "CVE-2019-16278",
"full_name": "AnubisSec\/CVE-2019-16278",
"owner": {
"login": "AnubisSec",
"id": 38790814,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/38790814?v=4",
"html_url": "https:\/\/github.com\/AnubisSec"
},
"html_url": "https:\/\/github.com\/AnubisSec\/CVE-2019-16278",
"description": "A quick python exploit for the Nostromo 1.9.6 remote code execution vulnerability. Simply takes a host and port that the web server is running on. ",
"fork": false,
"created_at": "2019-11-22T18:35:14Z",
"updated_at": "2019-11-22T18:57:31Z",
"pushed_at": "2019-11-22T18:57:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 224208624,
"name": "CVE-2019-16278-Nostromo_1.9.6-RCE",
"full_name": "rptucker\/CVE-2019-16278-Nostromo_1.9.6-RCE",
"owner": {
"login": "rptucker",
"id": 36172640,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/36172640?v=4",
"html_url": "https:\/\/github.com\/rptucker"
},
"html_url": "https:\/\/github.com\/rptucker\/CVE-2019-16278-Nostromo_1.9.6-RCE",
"description": "Python script to exploit RCE in Nostromo nhttpd <= 1.9.6.",
"fork": false,
"created_at": "2019-11-26T14:15:44Z",
"updated_at": "2019-11-26T14:26:05Z",
"pushed_at": "2019-11-26T14:26:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]