PoC-in-GitHub/2019/CVE-2019-11510.json
2024-07-09 15:29:02 +09:00

438 lines
No EOL
15 KiB
JSON
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 203542766,
"name": "CVE-2019-11510",
"full_name": "projectzeroindia\/CVE-2019-11510",
"owner": {
"login": "projectzeroindia",
"id": 54312442,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54312442?v=4",
"html_url": "https:\/\/github.com\/projectzeroindia"
},
"html_url": "https:\/\/github.com\/projectzeroindia\/CVE-2019-11510",
"description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)",
"fork": false,
"created_at": "2019-08-21T08:40:26Z",
"updated_at": "2024-02-20T09:34:27Z",
"pushed_at": "2020-01-11T13:55:33Z",
"stargazers_count": 360,
"watchers_count": 360,
"has_discussions": false,
"forks_count": 138,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 138,
"watchers": 360,
"score": 0,
"subscribers_count": 14
},
{
"id": 203575464,
"name": "Pulse",
"full_name": "nuc13us\/Pulse",
"owner": {
"login": "nuc13us",
"id": 22916937,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22916937?v=4",
"html_url": "https:\/\/github.com\/nuc13us"
},
"html_url": "https:\/\/github.com\/nuc13us\/Pulse",
"description": "Pulse Secure VPN CVE-2019-11510",
"fork": false,
"created_at": "2019-08-21T12:03:14Z",
"updated_at": "2020-10-19T12:40:24Z",
"pushed_at": "2019-08-21T12:03:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 203747377,
"name": "CVE-2019-11510-poc",
"full_name": "imjdl\/CVE-2019-11510-poc",
"owner": {
"login": "imjdl",
"id": 31382943,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31382943?v=4",
"html_url": "https:\/\/github.com\/imjdl"
},
"html_url": "https:\/\/github.com\/imjdl\/CVE-2019-11510-poc",
"description": "Pulse Secure SSL VPN pre-auth file reading",
"fork": false,
"created_at": "2019-08-22T08:18:19Z",
"updated_at": "2024-06-07T04:13:28Z",
"pushed_at": "2019-08-26T19:33:43Z",
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 52,
"score": 0,
"subscribers_count": 2
},
{
"id": 204579243,
"name": "CVE-2019-11510_poc",
"full_name": "es0\/CVE-2019-11510_poc",
"owner": {
"login": "es0",
"id": 10739380,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10739380?v=4",
"html_url": "https:\/\/github.com\/es0"
},
"html_url": "https:\/\/github.com\/es0\/CVE-2019-11510_poc",
"description": "PoC for CVE-2019-11510 | Pulse Secure 8.1R15.1\/8.2\/8.3\/9.0 SSL VPN - Arbitrary File Disclosure vulnerability",
"fork": false,
"created_at": "2019-08-26T23:30:15Z",
"updated_at": "2023-09-28T11:05:34Z",
"pushed_at": "2019-08-27T00:52:49Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
{
"id": 204608508,
"name": "http-pulse_ssl_vpn.nse",
"full_name": "r00tpgp\/http-pulse_ssl_vpn.nse",
"owner": {
"login": "r00tpgp",
"id": 29351179,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29351179?v=4",
"html_url": "https:\/\/github.com\/r00tpgp"
},
"html_url": "https:\/\/github.com\/r00tpgp\/http-pulse_ssl_vpn.nse",
"description": "Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510",
"fork": false,
"created_at": "2019-08-27T03:04:19Z",
"updated_at": "2023-09-28T11:05:34Z",
"pushed_at": "2019-08-27T07:03:26Z",
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 19,
"score": 0,
"subscribers_count": 2
},
{
"id": 204666616,
"name": "CVE-2019-11510-1",
"full_name": "jas502n\/CVE-2019-11510-1",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-11510-1",
"description": "SSL VPN Rce",
"fork": false,
"created_at": "2019-08-27T09:21:10Z",
"updated_at": "2024-04-06T14:08:53Z",
"pushed_at": "2019-08-27T09:29:05Z",
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 55,
"score": 0,
"subscribers_count": 2
},
{
"id": 205106127,
"name": "CVE-2019-11510",
"full_name": "jason3e7\/CVE-2019-11510",
"owner": {
"login": "jason3e7",
"id": 3059297,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3059297?v=4",
"html_url": "https:\/\/github.com\/jason3e7"
},
"html_url": "https:\/\/github.com\/jason3e7\/CVE-2019-11510",
"description": null,
"fork": false,
"created_at": "2019-08-29T07:27:57Z",
"updated_at": "2019-08-29T07:28:54Z",
"pushed_at": "2019-08-29T07:28:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 207348255,
"name": "pwn-pulse",
"full_name": "BishopFox\/pwn-pulse",
"owner": {
"login": "BishopFox",
"id": 4523757,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4523757?v=4",
"html_url": "https:\/\/github.com\/BishopFox"
},
"html_url": "https:\/\/github.com\/BishopFox\/pwn-pulse",
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
"fork": false,
"created_at": "2019-09-09T15:58:39Z",
"updated_at": "2024-07-09T02:11:32Z",
"pushed_at": "2020-01-15T17:01:50Z",
"stargazers_count": 136,
"watchers_count": 136,
"has_discussions": false,
"forks_count": 60,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"exploit",
"infosec",
"penetration-testing",
"pentest-scripts",
"pentesting",
"red-team",
"security-tools"
],
"visibility": "public",
"forks": 60,
"watchers": 136,
"score": 0,
"subscribers_count": 15
},
{
"id": 226548291,
"name": "pulsexploit",
"full_name": "aqhmal\/pulsexploit",
"owner": {
"login": "aqhmal",
"id": 22043590,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22043590?v=4",
"html_url": "https:\/\/github.com\/aqhmal"
},
"html_url": "https:\/\/github.com\/aqhmal\/pulsexploit",
"description": "Automated script for Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API. You must have a Shodan account to use this script.",
"fork": false,
"created_at": "2019-12-07T17:09:24Z",
"updated_at": "2023-09-28T11:08:51Z",
"pushed_at": "2020-04-25T05:06:45Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"exploit",
"information-extraction",
"infosec",
"offset",
"pentest-script",
"python3"
],
"visibility": "public",
"forks": 4,
"watchers": 9,
"score": 0,
"subscribers_count": 2
},
{
"id": 256271162,
"name": "check-your-pulse",
"full_name": "cisagov\/check-your-pulse",
"owner": {
"login": "cisagov",
"id": 18539691,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18539691?v=4",
"html_url": "https:\/\/github.com\/cisagov"
},
"html_url": "https:\/\/github.com\/cisagov\/check-your-pulse",
"description": "This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11510.",
"fork": false,
"created_at": "2020-04-16T16:32:47Z",
"updated_at": "2024-04-16T22:36:45Z",
"pushed_at": "2020-08-19T22:44:06Z",
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 30,
"score": 0,
"subscribers_count": 7
},
{
"id": 282932489,
"name": "pulse-exploit",
"full_name": "andripwn\/pulse-exploit",
"owner": {
"login": "andripwn",
"id": 52893492,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52893492?v=4",
"html_url": "https:\/\/github.com\/andripwn"
},
"html_url": "https:\/\/github.com\/andripwn\/pulse-exploit",
"description": "Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API.",
"fork": false,
"created_at": "2020-07-27T15:06:08Z",
"updated_at": "2020-12-13T12:56:51Z",
"pushed_at": "2020-07-27T15:07:24Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 296402155,
"name": "CVE-2019-11510-PulseVPN",
"full_name": "pwn3z\/CVE-2019-11510-PulseVPN",
"owner": {
"login": "pwn3z",
"id": 71440287,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71440287?v=4",
"html_url": "https:\/\/github.com\/pwn3z"
},
"html_url": "https:\/\/github.com\/pwn3z\/CVE-2019-11510-PulseVPN",
"description": null,
"fork": false,
"created_at": "2020-09-17T17:53:56Z",
"updated_at": "2020-11-05T21:41:20Z",
"pushed_at": "2020-11-05T21:41:18Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 577662602,
"name": "APT-Backpack",
"full_name": "34zY\/APT-Backpack",
"owner": {
"login": "34zY",
"id": 55347142,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55347142?v=4",
"html_url": "https:\/\/github.com\/34zY"
},
"html_url": "https:\/\/github.com\/34zY\/APT-Backpack",
"description": "cve-2019-11510, cve-2019-19781, cve-2020-5902,               cve-2021-1497, cve-2021-20090, cve-2021-22006, cve-2021-22205, cve-2021-26084, cve-2021-26855, cve-2021-26857, cve-202126857, cve-202126858, cve-202126865",
"fork": false,
"created_at": "2022-12-13T08:41:44Z",
"updated_at": "2024-01-19T09:21:57Z",
"pushed_at": "2023-04-19T17:10:15Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 748485317,
"name": "-CVE-2019-11510-Exploit",
"full_name": "0xab01\/-CVE-2019-11510-Exploit",
"owner": {
"login": "0xab01",
"id": 97664456,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97664456?v=4",
"html_url": "https:\/\/github.com\/0xab01"
},
"html_url": "https:\/\/github.com\/0xab01\/-CVE-2019-11510-Exploit",
"description": null,
"fork": false,
"created_at": "2024-01-26T04:16:27Z",
"updated_at": "2024-04-06T06:23:40Z",
"pushed_at": "2024-02-23T11:20:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]