PoC-in-GitHub/2019/CVE-2019-16278.json
2020-10-26 00:09:01 +09:00

232 lines
No EOL
8.1 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 215200285,
"name": "CVE-2019-16278",
"full_name": "jas502n\/CVE-2019-16278",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-16278",
"description": "Directory transversal to remote code execution",
"fork": false,
"created_at": "2019-10-15T03:40:13Z",
"updated_at": "2020-08-12T06:18:29Z",
"pushed_at": "2019-10-15T03:53:55Z",
"stargazers_count": 66,
"watchers_count": 66,
"forks_count": 28,
"forks": 28,
"watchers": 66,
"score": 0
},
{
"id": 215258157,
"name": "CVE-2019-16278-PoC",
"full_name": "imjdl\/CVE-2019-16278-PoC",
"owner": {
"login": "imjdl",
"id": 31382943,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/31382943?v=4",
"html_url": "https:\/\/github.com\/imjdl"
},
"html_url": "https:\/\/github.com\/imjdl\/CVE-2019-16278-PoC",
"description": "CVE-2019-16728 Proof of Concept",
"fork": false,
"created_at": "2019-10-15T09:22:36Z",
"updated_at": "2020-05-18T10:43:21Z",
"pushed_at": "2019-10-15T09:28:25Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"forks": 1,
"watchers": 6,
"score": 0
},
{
"id": 215297351,
"name": "CVE-2019-16278",
"full_name": "ianxtianxt\/CVE-2019-16278",
"owner": {
"login": "ianxtianxt",
"id": 45796484,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/45796484?v=4",
"html_url": "https:\/\/github.com\/ianxtianxt"
},
"html_url": "https:\/\/github.com\/ianxtianxt\/CVE-2019-16278",
"description": "CVE-2019-16278Nostromo httpd命令执行",
"fork": false,
"created_at": "2019-10-15T12:47:59Z",
"updated_at": "2020-05-18T10:43:21Z",
"pushed_at": "2020-01-11T07:25:38Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 4,
"forks": 4,
"watchers": 3,
"score": 0
},
{
"id": 217164072,
"name": "Nostromo_Python3",
"full_name": "darkerego\/Nostromo_Python3",
"owner": {
"login": "darkerego",
"id": 8583665,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8583665?v=4",
"html_url": "https:\/\/github.com\/darkerego"
},
"html_url": "https:\/\/github.com\/darkerego\/Nostromo_Python3",
"description": "CVE-2019-16278 Python3 Exploit Code",
"fork": false,
"created_at": "2019-10-23T22:24:18Z",
"updated_at": "2019-10-23T22:26:43Z",
"pushed_at": "2019-10-23T22:26:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 223463242,
"name": "CVE-2019-16278",
"full_name": "AnubisSec\/CVE-2019-16278",
"owner": {
"login": "AnubisSec",
"id": 38790814,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/38790814?v=4",
"html_url": "https:\/\/github.com\/AnubisSec"
},
"html_url": "https:\/\/github.com\/AnubisSec\/CVE-2019-16278",
"description": "A quick python exploit for the Nostromo 1.9.6 remote code execution vulnerability. Simply takes a host and port that the web server is running on. ",
"fork": false,
"created_at": "2019-11-22T18:35:14Z",
"updated_at": "2020-05-18T10:43:26Z",
"pushed_at": "2019-11-22T18:57:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 224208624,
"name": "CVE-2019-16278-Nostromo_1.9.6-RCE",
"full_name": "theRealFr13nd\/CVE-2019-16278-Nostromo_1.9.6-RCE",
"owner": {
"login": "theRealFr13nd",
"id": 36172640,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/36172640?v=4",
"html_url": "https:\/\/github.com\/theRealFr13nd"
},
"html_url": "https:\/\/github.com\/theRealFr13nd\/CVE-2019-16278-Nostromo_1.9.6-RCE",
"description": "Python script to exploit RCE in Nostromo nhttpd <= 1.9.6.",
"fork": false,
"created_at": "2019-11-26T14:15:44Z",
"updated_at": "2019-11-26T14:26:05Z",
"pushed_at": "2019-11-26T14:26:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 231114950,
"name": "cve-2019-16278",
"full_name": "Kr0ff\/cve-2019-16278",
"owner": {
"login": "Kr0ff",
"id": 35173514,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/35173514?v=4",
"html_url": "https:\/\/github.com\/Kr0ff"
},
"html_url": "https:\/\/github.com\/Kr0ff\/cve-2019-16278",
"description": "(Nhttpd) Nostromo 1.9.6 RCE due to Directory Traversal ",
"fork": false,
"created_at": "2019-12-31T16:06:13Z",
"updated_at": "2020-02-19T19:35:33Z",
"pushed_at": "2019-12-31T16:07:48Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 231220055,
"name": "CVE-2019-16278",
"full_name": "NHPT\/CVE-2019-16278",
"owner": {
"login": "NHPT",
"id": 42366434,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/42366434?v=4",
"html_url": "https:\/\/github.com\/NHPT"
},
"html_url": "https:\/\/github.com\/NHPT\/CVE-2019-16278",
"description": "CVE-2019-16278Nostromo Web服务器的RCE漏洞",
"fork": false,
"created_at": "2020-01-01T13:28:40Z",
"updated_at": "2020-05-18T10:43:31Z",
"pushed_at": "2020-01-01T13:36:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 243942211,
"name": "nostromo_1_9_6_rce",
"full_name": "Unam3dd\/nostromo_1_9_6_rce",
"owner": {
"login": "Unam3dd",
"id": 34691959,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/34691959?v=4",
"html_url": "https:\/\/github.com\/Unam3dd"
},
"html_url": "https:\/\/github.com\/Unam3dd\/nostromo_1_9_6_rce",
"description": "Nostromo 1.9.6 - Remote Code Exectuion - CVE-2019-16278",
"fork": false,
"created_at": "2020-02-29T09:42:59Z",
"updated_at": "2020-02-29T10:06:50Z",
"pushed_at": "2020-02-29T10:06:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 251251110,
"name": "cve-2019-16278",
"full_name": "keshiba\/cve-2019-16278",
"owner": {
"login": "keshiba",
"id": 62872563,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/62872563?v=4",
"html_url": "https:\/\/github.com\/keshiba"
},
"html_url": "https:\/\/github.com\/keshiba\/cve-2019-16278",
"description": "Exploit for the CVE-2019-16278 vulnerability",
"fork": false,
"created_at": "2020-03-30T08:54:06Z",
"updated_at": "2020-04-01T06:07:06Z",
"pushed_at": "2020-03-31T19:28:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]