PoC-in-GitHub/2019/CVE-2019-11510.json
2021-03-27 06:12:29 +09:00

140 lines
No EOL
5 KiB
JSON

[
{
"id": 203542766,
"name": "CVE-2019-11510",
"full_name": "projectzeroindia\/CVE-2019-11510",
"owner": {
"login": "projectzeroindia",
"id": 54312442,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54312442?v=4",
"html_url": "https:\/\/github.com\/projectzeroindia"
},
"html_url": "https:\/\/github.com\/projectzeroindia\/CVE-2019-11510",
"description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)",
"fork": false,
"created_at": "2019-08-21T08:40:26Z",
"updated_at": "2021-03-23T00:51:17Z",
"pushed_at": "2020-01-11T13:55:33Z",
"stargazers_count": 341,
"watchers_count": 341,
"forks_count": 137,
"forks": 137,
"watchers": 341,
"score": 0
},
{
"id": 207348255,
"name": "pwn-pulse",
"full_name": "BishopFox\/pwn-pulse",
"owner": {
"login": "BishopFox",
"id": 4523757,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4523757?v=4",
"html_url": "https:\/\/github.com\/BishopFox"
},
"html_url": "https:\/\/github.com\/BishopFox\/pwn-pulse",
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
"fork": false,
"created_at": "2019-09-09T15:58:39Z",
"updated_at": "2021-03-02T04:35:42Z",
"pushed_at": "2020-01-15T17:01:50Z",
"stargazers_count": 108,
"watchers_count": 108,
"forks_count": 50,
"forks": 50,
"watchers": 108,
"score": 0
},
{
"id": 226548291,
"name": "pulsexploit",
"full_name": "aqhmal\/pulsexploit",
"owner": {
"login": "aqhmal",
"id": 22043590,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22043590?v=4",
"html_url": "https:\/\/github.com\/aqhmal"
},
"html_url": "https:\/\/github.com\/aqhmal\/pulsexploit",
"description": "Automated script for Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API. You must have a Shodan account to use this script.",
"fork": false,
"created_at": "2019-12-07T17:09:24Z",
"updated_at": "2021-02-01T00:34:37Z",
"pushed_at": "2020-04-25T05:06:45Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks": 3,
"watchers": 3,
"score": 0
},
{
"id": 256271162,
"name": "check-your-pulse",
"full_name": "cisagov\/check-your-pulse",
"owner": {
"login": "cisagov",
"id": 18539691,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18539691?v=4",
"html_url": "https:\/\/github.com\/cisagov"
},
"html_url": "https:\/\/github.com\/cisagov\/check-your-pulse",
"description": "This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11510.",
"fork": false,
"created_at": "2020-04-16T16:32:47Z",
"updated_at": "2021-03-10T22:46:37Z",
"pushed_at": "2020-08-19T22:44:06Z",
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 6,
"forks": 6,
"watchers": 21,
"score": 0
},
{
"id": 282932489,
"name": "pulse-exploit",
"full_name": "andripwn\/pulse-exploit",
"owner": {
"login": "andripwn",
"id": 52893492,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52893492?v=4",
"html_url": "https:\/\/github.com\/andripwn"
},
"html_url": "https:\/\/github.com\/andripwn\/pulse-exploit",
"description": "Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API.",
"fork": false,
"created_at": "2020-07-27T15:06:08Z",
"updated_at": "2020-12-13T12:56:51Z",
"pushed_at": "2020-07-27T15:07:24Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 296402155,
"name": "CVE-2019-11510-PulseVPN",
"full_name": "pwn3z\/CVE-2019-11510-PulseVPN",
"owner": {
"login": "pwn3z",
"id": 71440287,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71440287?v=4",
"html_url": "https:\/\/github.com\/pwn3z"
},
"html_url": "https:\/\/github.com\/pwn3z\/CVE-2019-11510-PulseVPN",
"description": null,
"fork": false,
"created_at": "2020-09-17T17:53:56Z",
"updated_at": "2020-11-05T21:41:20Z",
"pushed_at": "2020-11-05T21:41:18Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]