mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
232 lines
No EOL
8.1 KiB
JSON
232 lines
No EOL
8.1 KiB
JSON
[
|
||
{
|
||
"id": 215200285,
|
||
"name": "CVE-2019-16278",
|
||
"full_name": "jas502n\/CVE-2019-16278",
|
||
"owner": {
|
||
"login": "jas502n",
|
||
"id": 16593068,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
|
||
"html_url": "https:\/\/github.com\/jas502n"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-16278",
|
||
"description": "Directory transversal to remote code execution",
|
||
"fork": false,
|
||
"created_at": "2019-10-15T03:40:13Z",
|
||
"updated_at": "2020-08-12T06:18:29Z",
|
||
"pushed_at": "2019-10-15T03:53:55Z",
|
||
"stargazers_count": 66,
|
||
"watchers_count": 66,
|
||
"forks_count": 27,
|
||
"forks": 27,
|
||
"watchers": 66,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 215258157,
|
||
"name": "CVE-2019-16278-PoC",
|
||
"full_name": "imjdl\/CVE-2019-16278-PoC",
|
||
"owner": {
|
||
"login": "imjdl",
|
||
"id": 31382943,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/31382943?v=4",
|
||
"html_url": "https:\/\/github.com\/imjdl"
|
||
},
|
||
"html_url": "https:\/\/github.com\/imjdl\/CVE-2019-16278-PoC",
|
||
"description": "CVE-2019-16728 Proof of Concept",
|
||
"fork": false,
|
||
"created_at": "2019-10-15T09:22:36Z",
|
||
"updated_at": "2020-05-18T10:43:21Z",
|
||
"pushed_at": "2019-10-15T09:28:25Z",
|
||
"stargazers_count": 6,
|
||
"watchers_count": 6,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 6,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 215297351,
|
||
"name": "CVE-2019-16278",
|
||
"full_name": "ianxtianxt\/CVE-2019-16278",
|
||
"owner": {
|
||
"login": "ianxtianxt",
|
||
"id": 45796484,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/45796484?v=4",
|
||
"html_url": "https:\/\/github.com\/ianxtianxt"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ianxtianxt\/CVE-2019-16278",
|
||
"description": "CVE-2019-16278Nostromo httpd命令执行",
|
||
"fork": false,
|
||
"created_at": "2019-10-15T12:47:59Z",
|
||
"updated_at": "2020-05-18T10:43:21Z",
|
||
"pushed_at": "2020-01-11T07:25:38Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 4,
|
||
"forks": 4,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 217164072,
|
||
"name": "Nostromo_Python3",
|
||
"full_name": "darkerego\/Nostromo_Python3",
|
||
"owner": {
|
||
"login": "darkerego",
|
||
"id": 8583665,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8583665?v=4",
|
||
"html_url": "https:\/\/github.com\/darkerego"
|
||
},
|
||
"html_url": "https:\/\/github.com\/darkerego\/Nostromo_Python3",
|
||
"description": "CVE-2019-16278 Python3 Exploit Code",
|
||
"fork": false,
|
||
"created_at": "2019-10-23T22:24:18Z",
|
||
"updated_at": "2019-10-23T22:26:43Z",
|
||
"pushed_at": "2019-10-23T22:26:41Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 2,
|
||
"forks": 2,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 223463242,
|
||
"name": "CVE-2019-16278",
|
||
"full_name": "AnubisSec\/CVE-2019-16278",
|
||
"owner": {
|
||
"login": "AnubisSec",
|
||
"id": 38790814,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/38790814?v=4",
|
||
"html_url": "https:\/\/github.com\/AnubisSec"
|
||
},
|
||
"html_url": "https:\/\/github.com\/AnubisSec\/CVE-2019-16278",
|
||
"description": "A quick python exploit for the Nostromo 1.9.6 remote code execution vulnerability. Simply takes a host and port that the web server is running on. ",
|
||
"fork": false,
|
||
"created_at": "2019-11-22T18:35:14Z",
|
||
"updated_at": "2020-05-18T10:43:26Z",
|
||
"pushed_at": "2019-11-22T18:57:29Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 3,
|
||
"forks": 3,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 224208624,
|
||
"name": "CVE-2019-16278-Nostromo_1.9.6-RCE",
|
||
"full_name": "theRealFr13nd\/CVE-2019-16278-Nostromo_1.9.6-RCE",
|
||
"owner": {
|
||
"login": "theRealFr13nd",
|
||
"id": 36172640,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/36172640?v=4",
|
||
"html_url": "https:\/\/github.com\/theRealFr13nd"
|
||
},
|
||
"html_url": "https:\/\/github.com\/theRealFr13nd\/CVE-2019-16278-Nostromo_1.9.6-RCE",
|
||
"description": "Python script to exploit RCE in Nostromo nhttpd <= 1.9.6.",
|
||
"fork": false,
|
||
"created_at": "2019-11-26T14:15:44Z",
|
||
"updated_at": "2019-11-26T14:26:05Z",
|
||
"pushed_at": "2019-11-26T14:26:03Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 231114950,
|
||
"name": "cve-2019-16278",
|
||
"full_name": "Kr0ff\/cve-2019-16278",
|
||
"owner": {
|
||
"login": "Kr0ff",
|
||
"id": 35173514,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/35173514?v=4",
|
||
"html_url": "https:\/\/github.com\/Kr0ff"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Kr0ff\/cve-2019-16278",
|
||
"description": "(Nhttpd) Nostromo 1.9.6 RCE due to Directory Traversal ",
|
||
"fork": false,
|
||
"created_at": "2019-12-31T16:06:13Z",
|
||
"updated_at": "2020-02-19T19:35:33Z",
|
||
"pushed_at": "2019-12-31T16:07:48Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 231220055,
|
||
"name": "CVE-2019-16278",
|
||
"full_name": "NHPT\/CVE-2019-16278",
|
||
"owner": {
|
||
"login": "NHPT",
|
||
"id": 42366434,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/42366434?v=4",
|
||
"html_url": "https:\/\/github.com\/NHPT"
|
||
},
|
||
"html_url": "https:\/\/github.com\/NHPT\/CVE-2019-16278",
|
||
"description": "CVE-2019-16278:Nostromo Web服务器的RCE漏洞",
|
||
"fork": false,
|
||
"created_at": "2020-01-01T13:28:40Z",
|
||
"updated_at": "2020-05-18T10:43:31Z",
|
||
"pushed_at": "2020-01-01T13:36:22Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 243942211,
|
||
"name": "nostromo_1_9_6_rce",
|
||
"full_name": "Unam3dd\/nostromo_1_9_6_rce",
|
||
"owner": {
|
||
"login": "Unam3dd",
|
||
"id": 34691959,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/34691959?v=4",
|
||
"html_url": "https:\/\/github.com\/Unam3dd"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Unam3dd\/nostromo_1_9_6_rce",
|
||
"description": "Nostromo 1.9.6 - Remote Code Exectuion - CVE-2019-16278",
|
||
"fork": false,
|
||
"created_at": "2020-02-29T09:42:59Z",
|
||
"updated_at": "2020-02-29T10:06:50Z",
|
||
"pushed_at": "2020-02-29T10:06:48Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 251251110,
|
||
"name": "cve-2019-16278",
|
||
"full_name": "keshiba\/cve-2019-16278",
|
||
"owner": {
|
||
"login": "keshiba",
|
||
"id": 62872563,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/62872563?v=4",
|
||
"html_url": "https:\/\/github.com\/keshiba"
|
||
},
|
||
"html_url": "https:\/\/github.com\/keshiba\/cve-2019-16278",
|
||
"description": "Exploit for the CVE-2019-16278 vulnerability",
|
||
"fork": false,
|
||
"created_at": "2020-03-30T08:54:06Z",
|
||
"updated_at": "2020-04-01T06:07:06Z",
|
||
"pushed_at": "2020-03-31T19:28:21Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
}
|
||
] |