PoC-in-GitHub/2019/CVE-2019-11510.json
2020-10-16 18:09:26 +09:00

278 lines
No EOL
9.8 KiB
JSON

[
{
"id": 203542766,
"name": "CVE-2019-11510",
"full_name": "projectzeroindia\/CVE-2019-11510",
"owner": {
"login": "projectzeroindia",
"id": 54312442,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/54312442?v=4",
"html_url": "https:\/\/github.com\/projectzeroindia"
},
"html_url": "https:\/\/github.com\/projectzeroindia\/CVE-2019-11510",
"description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)",
"fork": false,
"created_at": "2019-08-21T08:40:26Z",
"updated_at": "2020-10-16T07:11:49Z",
"pushed_at": "2020-01-11T13:55:33Z",
"stargazers_count": 334,
"watchers_count": 334,
"forks_count": 132,
"forks": 132,
"watchers": 334,
"score": 0
},
{
"id": 203567273,
"name": "Pulse",
"full_name": "ladyleet1337\/Pulse",
"owner": {
"login": "ladyleet1337",
"id": 26109832,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/26109832?v=4",
"html_url": "https:\/\/github.com\/ladyleet1337"
},
"html_url": "https:\/\/github.com\/ladyleet1337\/Pulse",
"description": "Pulse Secure VPN CVE-2019-11510",
"fork": false,
"created_at": "2019-08-21T11:08:48Z",
"updated_at": "2020-07-13T08:26:29Z",
"pushed_at": "2020-07-13T08:26:27Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"score": 0
},
{
"id": 203747377,
"name": "CVE-2019-11510-poc",
"full_name": "imjdl\/CVE-2019-11510-poc",
"owner": {
"login": "imjdl",
"id": 31382943,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/31382943?v=4",
"html_url": "https:\/\/github.com\/imjdl"
},
"html_url": "https:\/\/github.com\/imjdl\/CVE-2019-11510-poc",
"description": "Pulse Secure SSL VPN pre-auth file reading",
"fork": false,
"created_at": "2019-08-22T08:18:19Z",
"updated_at": "2020-08-07T15:25:41Z",
"pushed_at": "2019-08-26T19:33:43Z",
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 15,
"forks": 15,
"watchers": 47,
"score": 0
},
{
"id": 204579243,
"name": "CVE-2019-11510_poc",
"full_name": "es0\/CVE-2019-11510_poc",
"owner": {
"login": "es0",
"id": 10739380,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/10739380?v=4",
"html_url": "https:\/\/github.com\/es0"
},
"html_url": "https:\/\/github.com\/es0\/CVE-2019-11510_poc",
"description": "PoC for CVE-2019-11510 | Pulse Secure 8.1R15.1\/8.2\/8.3\/9.0 SSL VPN - Arbitrary File Disclosure vulnerability",
"fork": false,
"created_at": "2019-08-26T23:30:15Z",
"updated_at": "2020-07-07T01:57:08Z",
"pushed_at": "2019-08-27T00:52:49Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"forks": 3,
"watchers": 4,
"score": 0
},
{
"id": 204608508,
"name": "http-pulse_ssl_vpn.nse",
"full_name": "r00tpgp\/http-pulse_ssl_vpn.nse",
"owner": {
"login": "r00tpgp",
"id": 29351179,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/29351179?v=4",
"html_url": "https:\/\/github.com\/r00tpgp"
},
"html_url": "https:\/\/github.com\/r00tpgp\/http-pulse_ssl_vpn.nse",
"description": "Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510",
"fork": false,
"created_at": "2019-08-27T03:04:19Z",
"updated_at": "2020-04-21T06:45:53Z",
"pushed_at": "2019-08-27T07:03:26Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 6,
"forks": 6,
"watchers": 13,
"score": 0
},
{
"id": 204666616,
"name": "CVE-2019-11510-1",
"full_name": "jas502n\/CVE-2019-11510-1",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-11510-1",
"description": "SSL VPN Rce",
"fork": false,
"created_at": "2019-08-27T09:21:10Z",
"updated_at": "2020-08-11T18:29:29Z",
"pushed_at": "2019-08-27T09:29:05Z",
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 20,
"forks": 20,
"watchers": 51,
"score": 0
},
{
"id": 205106127,
"name": "CVE-2019-11510",
"full_name": "jason3e7\/CVE-2019-11510",
"owner": {
"login": "jason3e7",
"id": 3059297,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/3059297?v=4",
"html_url": "https:\/\/github.com\/jason3e7"
},
"html_url": "https:\/\/github.com\/jason3e7\/CVE-2019-11510",
"description": null,
"fork": false,
"created_at": "2019-08-29T07:27:57Z",
"updated_at": "2019-08-29T07:28:54Z",
"pushed_at": "2019-08-29T07:28:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 207348255,
"name": "pwn-pulse",
"full_name": "BishopFox\/pwn-pulse",
"owner": {
"login": "BishopFox",
"id": 4523757,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/4523757?v=4",
"html_url": "https:\/\/github.com\/BishopFox"
},
"html_url": "https:\/\/github.com\/BishopFox\/pwn-pulse",
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
"fork": false,
"created_at": "2019-09-09T15:58:39Z",
"updated_at": "2020-10-15T16:01:26Z",
"pushed_at": "2020-01-15T17:01:50Z",
"stargazers_count": 93,
"watchers_count": 93,
"forks_count": 41,
"forks": 41,
"watchers": 93,
"score": 0
},
{
"id": 226548291,
"name": "pulsexploit",
"full_name": "aqhmal\/pulsexploit",
"owner": {
"login": "aqhmal",
"id": 22043590,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/22043590?v=4",
"html_url": "https:\/\/github.com\/aqhmal"
},
"html_url": "https:\/\/github.com\/aqhmal\/pulsexploit",
"description": "Automated script for Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API. You must have a Shodan account to use this script.",
"fork": false,
"created_at": "2019-12-07T17:09:24Z",
"updated_at": "2020-04-25T05:06:47Z",
"pushed_at": "2020-04-25T05:06:45Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 256271162,
"name": "check-your-pulse",
"full_name": "cisagov\/check-your-pulse",
"owner": {
"login": "cisagov",
"id": 18539691,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/18539691?v=4",
"html_url": "https:\/\/github.com\/cisagov"
},
"html_url": "https:\/\/github.com\/cisagov\/check-your-pulse",
"description": "This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11510.",
"fork": false,
"created_at": "2020-04-16T16:32:47Z",
"updated_at": "2020-08-31T19:58:28Z",
"pushed_at": "2020-08-19T22:44:06Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 5,
"forks": 5,
"watchers": 18,
"score": 0
},
{
"id": 282932489,
"name": "pulse-exploit",
"full_name": "andripwn\/pulse-exploit",
"owner": {
"login": "andripwn",
"id": 52893492,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/52893492?v=4",
"html_url": "https:\/\/github.com\/andripwn"
},
"html_url": "https:\/\/github.com\/andripwn\/pulse-exploit",
"description": "Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API.",
"fork": false,
"created_at": "2020-07-27T15:06:08Z",
"updated_at": "2020-07-27T15:07:27Z",
"pushed_at": "2020-07-27T15:07:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 296402155,
"name": "CVE-2019-11510-PulseVPN",
"full_name": "mandr4x\/CVE-2019-11510-PulseVPN",
"owner": {
"login": "mandr4x",
"id": 71440287,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/71440287?v=4",
"html_url": "https:\/\/github.com\/mandr4x"
},
"html_url": "https:\/\/github.com\/mandr4x\/CVE-2019-11510-PulseVPN",
"description": null,
"fork": false,
"created_at": "2020-09-17T17:53:56Z",
"updated_at": "2020-09-24T05:39:21Z",
"pushed_at": "2020-09-24T05:39:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]