mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
278 lines
No EOL
9.8 KiB
JSON
278 lines
No EOL
9.8 KiB
JSON
[
|
|
{
|
|
"id": 203542766,
|
|
"name": "CVE-2019-11510",
|
|
"full_name": "projectzeroindia\/CVE-2019-11510",
|
|
"owner": {
|
|
"login": "projectzeroindia",
|
|
"id": 54312442,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/54312442?v=4",
|
|
"html_url": "https:\/\/github.com\/projectzeroindia"
|
|
},
|
|
"html_url": "https:\/\/github.com\/projectzeroindia\/CVE-2019-11510",
|
|
"description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)",
|
|
"fork": false,
|
|
"created_at": "2019-08-21T08:40:26Z",
|
|
"updated_at": "2020-12-29T08:55:05Z",
|
|
"pushed_at": "2020-01-11T13:55:33Z",
|
|
"stargazers_count": 339,
|
|
"watchers_count": 339,
|
|
"forks_count": 138,
|
|
"forks": 138,
|
|
"watchers": 339,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 203575464,
|
|
"name": "Pulse",
|
|
"full_name": "nuc13us\/Pulse",
|
|
"owner": {
|
|
"login": "nuc13us",
|
|
"id": 22916937,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22916937?v=4",
|
|
"html_url": "https:\/\/github.com\/nuc13us"
|
|
},
|
|
"html_url": "https:\/\/github.com\/nuc13us\/Pulse",
|
|
"description": "Pulse Secure VPN CVE-2019-11510",
|
|
"fork": false,
|
|
"created_at": "2019-08-21T12:03:14Z",
|
|
"updated_at": "2020-10-19T12:40:24Z",
|
|
"pushed_at": "2019-08-21T12:03:32Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 2,
|
|
"forks": 2,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 203747377,
|
|
"name": "CVE-2019-11510-poc",
|
|
"full_name": "imjdl\/CVE-2019-11510-poc",
|
|
"owner": {
|
|
"login": "imjdl",
|
|
"id": 31382943,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/31382943?v=4",
|
|
"html_url": "https:\/\/github.com\/imjdl"
|
|
},
|
|
"html_url": "https:\/\/github.com\/imjdl\/CVE-2019-11510-poc",
|
|
"description": "Pulse Secure SSL VPN pre-auth file reading",
|
|
"fork": false,
|
|
"created_at": "2019-08-22T08:18:19Z",
|
|
"updated_at": "2020-11-24T06:07:33Z",
|
|
"pushed_at": "2019-08-26T19:33:43Z",
|
|
"stargazers_count": 48,
|
|
"watchers_count": 48,
|
|
"forks_count": 15,
|
|
"forks": 15,
|
|
"watchers": 48,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 204579243,
|
|
"name": "CVE-2019-11510_poc",
|
|
"full_name": "es0\/CVE-2019-11510_poc",
|
|
"owner": {
|
|
"login": "es0",
|
|
"id": 10739380,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/10739380?v=4",
|
|
"html_url": "https:\/\/github.com\/es0"
|
|
},
|
|
"html_url": "https:\/\/github.com\/es0\/CVE-2019-11510_poc",
|
|
"description": "PoC for CVE-2019-11510 | Pulse Secure 8.1R15.1\/8.2\/8.3\/9.0 SSL VPN - Arbitrary File Disclosure vulnerability",
|
|
"fork": false,
|
|
"created_at": "2019-08-26T23:30:15Z",
|
|
"updated_at": "2020-07-07T01:57:08Z",
|
|
"pushed_at": "2019-08-27T00:52:49Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"forks_count": 4,
|
|
"forks": 4,
|
|
"watchers": 4,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 204608508,
|
|
"name": "http-pulse_ssl_vpn.nse",
|
|
"full_name": "r00tpgp\/http-pulse_ssl_vpn.nse",
|
|
"owner": {
|
|
"login": "r00tpgp",
|
|
"id": 29351179,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/29351179?v=4",
|
|
"html_url": "https:\/\/github.com\/r00tpgp"
|
|
},
|
|
"html_url": "https:\/\/github.com\/r00tpgp\/http-pulse_ssl_vpn.nse",
|
|
"description": "Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510",
|
|
"fork": false,
|
|
"created_at": "2019-08-27T03:04:19Z",
|
|
"updated_at": "2020-11-22T22:05:15Z",
|
|
"pushed_at": "2019-08-27T07:03:26Z",
|
|
"stargazers_count": 15,
|
|
"watchers_count": 15,
|
|
"forks_count": 6,
|
|
"forks": 6,
|
|
"watchers": 15,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 204666616,
|
|
"name": "CVE-2019-11510-1",
|
|
"full_name": "jas502n\/CVE-2019-11510-1",
|
|
"owner": {
|
|
"login": "jas502n",
|
|
"id": 16593068,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
|
|
"html_url": "https:\/\/github.com\/jas502n"
|
|
},
|
|
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-11510-1",
|
|
"description": "SSL VPN Rce",
|
|
"fork": false,
|
|
"created_at": "2019-08-27T09:21:10Z",
|
|
"updated_at": "2020-08-11T18:29:29Z",
|
|
"pushed_at": "2019-08-27T09:29:05Z",
|
|
"stargazers_count": 51,
|
|
"watchers_count": 51,
|
|
"forks_count": 19,
|
|
"forks": 19,
|
|
"watchers": 51,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 205106127,
|
|
"name": "CVE-2019-11510",
|
|
"full_name": "jason3e7\/CVE-2019-11510",
|
|
"owner": {
|
|
"login": "jason3e7",
|
|
"id": 3059297,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/3059297?v=4",
|
|
"html_url": "https:\/\/github.com\/jason3e7"
|
|
},
|
|
"html_url": "https:\/\/github.com\/jason3e7\/CVE-2019-11510",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2019-08-29T07:27:57Z",
|
|
"updated_at": "2019-08-29T07:28:54Z",
|
|
"pushed_at": "2019-08-29T07:28:52Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 207348255,
|
|
"name": "pwn-pulse",
|
|
"full_name": "BishopFox\/pwn-pulse",
|
|
"owner": {
|
|
"login": "BishopFox",
|
|
"id": 4523757,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/4523757?v=4",
|
|
"html_url": "https:\/\/github.com\/BishopFox"
|
|
},
|
|
"html_url": "https:\/\/github.com\/BishopFox\/pwn-pulse",
|
|
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
|
|
"fork": false,
|
|
"created_at": "2019-09-09T15:58:39Z",
|
|
"updated_at": "2020-12-26T03:34:43Z",
|
|
"pushed_at": "2020-01-15T17:01:50Z",
|
|
"stargazers_count": 102,
|
|
"watchers_count": 102,
|
|
"forks_count": 48,
|
|
"forks": 48,
|
|
"watchers": 102,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 226548291,
|
|
"name": "pulsexploit",
|
|
"full_name": "aqhmal\/pulsexploit",
|
|
"owner": {
|
|
"login": "aqhmal",
|
|
"id": 22043590,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/22043590?v=4",
|
|
"html_url": "https:\/\/github.com\/aqhmal"
|
|
},
|
|
"html_url": "https:\/\/github.com\/aqhmal\/pulsexploit",
|
|
"description": "Automated script for Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API. You must have a Shodan account to use this script.",
|
|
"fork": false,
|
|
"created_at": "2019-12-07T17:09:24Z",
|
|
"updated_at": "2020-04-25T05:06:47Z",
|
|
"pushed_at": "2020-04-25T05:06:45Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 2,
|
|
"forks": 2,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 256271162,
|
|
"name": "check-your-pulse",
|
|
"full_name": "cisagov\/check-your-pulse",
|
|
"owner": {
|
|
"login": "cisagov",
|
|
"id": 18539691,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/18539691?v=4",
|
|
"html_url": "https:\/\/github.com\/cisagov"
|
|
},
|
|
"html_url": "https:\/\/github.com\/cisagov\/check-your-pulse",
|
|
"description": "This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11510.",
|
|
"fork": false,
|
|
"created_at": "2020-04-16T16:32:47Z",
|
|
"updated_at": "2020-11-19T17:07:29Z",
|
|
"pushed_at": "2020-08-19T22:44:06Z",
|
|
"stargazers_count": 20,
|
|
"watchers_count": 20,
|
|
"forks_count": 6,
|
|
"forks": 6,
|
|
"watchers": 20,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 282932489,
|
|
"name": "pulse-exploit",
|
|
"full_name": "andripwn\/pulse-exploit",
|
|
"owner": {
|
|
"login": "andripwn",
|
|
"id": 52893492,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/52893492?v=4",
|
|
"html_url": "https:\/\/github.com\/andripwn"
|
|
},
|
|
"html_url": "https:\/\/github.com\/andripwn\/pulse-exploit",
|
|
"description": "Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API.",
|
|
"fork": false,
|
|
"created_at": "2020-07-27T15:06:08Z",
|
|
"updated_at": "2020-12-13T12:56:51Z",
|
|
"pushed_at": "2020-07-27T15:07:24Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 296402155,
|
|
"name": "CVE-2019-11510-PulseVPN",
|
|
"full_name": "pwn3z\/CVE-2019-11510-PulseVPN",
|
|
"owner": {
|
|
"login": "pwn3z",
|
|
"id": 71440287,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/71440287?v=4",
|
|
"html_url": "https:\/\/github.com\/pwn3z"
|
|
},
|
|
"html_url": "https:\/\/github.com\/pwn3z\/CVE-2019-11510-PulseVPN",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2020-09-17T17:53:56Z",
|
|
"updated_at": "2020-11-05T21:41:20Z",
|
|
"pushed_at": "2020-11-05T21:41:18Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
}
|
|
] |